diff --git a/CVE-2007/CVE-2007-55xx/CVE-2007-5580.json b/CVE-2007/CVE-2007-55xx/CVE-2007-5580.json
index d4e42f3645b..08bbb89a28c 100644
--- a/CVE-2007/CVE-2007-55xx/CVE-2007-5580.json
+++ b/CVE-2007/CVE-2007-55xx/CVE-2007-5580.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2007-5580",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2007-12-15T01:46:00.000",
"lastModified": "2024-11-21T00:38:14.630",
"vulnStatus": "Modified",
@@ -159,46 +159,46 @@
"references": [
{
"url": "http://osvdb.org/39521",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/27947",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/3425",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsl00618",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008090a434.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.nsfocus.com/english/homepage/research/0702.htm",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/archive/1/484669/100/100/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/26723",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019046",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2007/4103",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/39521",
diff --git a/CVE-2007/CVE-2007-55xx/CVE-2007-5581.json b/CVE-2007/CVE-2007-55xx/CVE-2007-5581.json
index f80695c4cd7..ebd4b294067 100644
--- a/CVE-2007/CVE-2007-55xx/CVE-2007-5581.json
+++ b/CVE-2007/CVE-2007-55xx/CVE-2007-5581.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2007-5581",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2007-11-08T02:46:00.000",
"lastModified": "2024-11-21T00:38:14.857",
"vulnStatus": "Modified",
@@ -110,33 +110,33 @@
"references": [
{
"url": "http://secunia.com/advisories/26462",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1018904",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20071107-mp.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/26364",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2007/3772",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38298",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/26462",
diff --git a/CVE-2007/CVE-2007-55xx/CVE-2007-5582.json b/CVE-2007/CVE-2007-55xx/CVE-2007-5582.json
index 9cbdf233e98..821e3937b59 100644
--- a/CVE-2007/CVE-2007-55xx/CVE-2007-5582.json
+++ b/CVE-2007/CVE-2007-55xx/CVE-2007-5582.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2007-5582",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2007-12-15T01:46:00.000",
"lastModified": "2024-11-21T00:38:14.973",
"vulnStatus": "Modified",
@@ -75,46 +75,46 @@
"references": [
{
"url": "http://secunia.com/advisories/27902",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securityreason.com/securityalert/3449",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1019043",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsk69289",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20071205-cw.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.liquidmatrix.org/blog/2007/12/05/advisory-cross-site-scripting-in-ciscoworks/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/archive/1/484609/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/26708",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2007/4102",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38862",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/27902",
diff --git a/CVE-2007/CVE-2007-55xx/CVE-2007-5583.json b/CVE-2007/CVE-2007-55xx/CVE-2007-5583.json
index ae67e47e777..f55925b84a5 100644
--- a/CVE-2007/CVE-2007-55xx/CVE-2007-5583.json
+++ b/CVE-2007/CVE-2007-55xx/CVE-2007-5583.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2007-5583",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2007-12-18T01:46:00.000",
"lastModified": "2024-11-21T00:38:15.080",
"vulnStatus": "Modified",
@@ -74,37 +74,37 @@
"references": [
{
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-December/058837.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-December/058932.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://seclists.org/fulldisclosure/2007/Dec/0196.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/26711",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securitytracker.com/id?1019059",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38853",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.exploit-db.com/exploits/4692",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-December/058837.html",
diff --git a/CVE-2007/CVE-2007-55xx/CVE-2007-5584.json b/CVE-2007/CVE-2007-55xx/CVE-2007-5584.json
index 383713c5463..85466685fc9 100644
--- a/CVE-2007/CVE-2007-55xx/CVE-2007-5584.json
+++ b/CVE-2007/CVE-2007-55xx/CVE-2007-5584.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2007-5584",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2007-12-20T02:46:00.000",
"lastModified": "2024-11-21T00:38:15.197",
"vulnStatus": "Modified",
@@ -91,34 +91,34 @@
"references": [
{
"url": "http://secunia.com/advisories/28175",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008091b11d.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.osvdb.org/39298",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/26941",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securitytracker.com/id?1019120",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2007/4270",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39135",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/28175",
diff --git a/CVE-2008/CVE-2008-00xx/CVE-2008-0026.json b/CVE-2008/CVE-2008-00xx/CVE-2008-0026.json
index b2c3ec5c874..f4146b98a9e 100644
--- a/CVE-2008/CVE-2008-00xx/CVE-2008-0026.json
+++ b/CVE-2008/CVE-2008-00xx/CVE-2008-0026.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0026",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-02-14T12:00:00.000",
"lastModified": "2024-11-21T00:40:59.550",
"vulnStatus": "Modified",
@@ -169,33 +169,33 @@
"references": [
{
"url": "http://secunia.com/advisories/28932",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7c.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/27775",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019404",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0542",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40484",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/28932",
diff --git a/CVE-2008/CVE-2008-00xx/CVE-2008-0027.json b/CVE-2008/CVE-2008-00xx/CVE-2008-0027.json
index daf63590806..94f63cdccf1 100644
--- a/CVE-2008/CVE-2008-00xx/CVE-2008-0027.json
+++ b/CVE-2008/CVE-2008-00xx/CVE-2008-0027.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0027",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-01-17T03:00:00.000",
"lastModified": "2024-11-21T00:40:59.670",
"vulnStatus": "Modified",
@@ -114,42 +114,42 @@
"references": [
{
"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-08-02",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/28530",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securityreason.com/securityalert/3551",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080932c61.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/archive/1/486432/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/27313",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019223",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0171",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39704",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-08-02",
diff --git a/CVE-2008/CVE-2008-00xx/CVE-2008-0028.json b/CVE-2008/CVE-2008-00xx/CVE-2008-0028.json
index 5d51b75471a..6d0cefa66d0 100644
--- a/CVE-2008/CVE-2008-00xx/CVE-2008-0028.json
+++ b/CVE-2008/CVE-2008-00xx/CVE-2008-0028.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0028",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-01-23T21:00:00.000",
"lastModified": "2024-11-21T00:40:59.783",
"vulnStatus": "Modified",
@@ -108,21 +108,21 @@
"references": [
{
"url": "http://secunia.com/advisories/28625",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080123-asa.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/27418",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -130,7 +130,7 @@
},
{
"url": "http://www.securitytracker.com/id?1019262",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -138,7 +138,7 @@
},
{
"url": "http://www.securitytracker.com/id?1019263",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -146,14 +146,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/0259",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39862",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2008/CVE-2008-00xx/CVE-2008-0029.json b/CVE-2008/CVE-2008-00xx/CVE-2008-0029.json
index e3c44ecf99f..d87c2b7a5cf 100644
--- a/CVE-2008/CVE-2008-00xx/CVE-2008-0029.json
+++ b/CVE-2008/CVE-2008-00xx/CVE-2008-0029.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0029",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-01-23T21:00:00.000",
"lastModified": "2024-11-21T00:40:59.907",
"vulnStatus": "Modified",
@@ -102,23 +102,23 @@
"references": [
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080123-avs.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/27421",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019259",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0260",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39860",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080123-avs.shtml",
diff --git a/CVE-2008/CVE-2008-00xx/CVE-2008-0030.json b/CVE-2008/CVE-2008-00xx/CVE-2008-0030.json
index b51cc831083..f3ad6b2c272 100644
--- a/CVE-2008/CVE-2008-00xx/CVE-2008-0030.json
+++ b/CVE-2008/CVE-2008-00xx/CVE-2008-0030.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0030",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:06.433",
"lastModified": "2023-11-07T02:01:39.243",
"vulnStatus": "Rejected",
diff --git a/CVE-2008/CVE-2008-05xx/CVE-2008-0526.json b/CVE-2008/CVE-2008-05xx/CVE-2008-0526.json
index 258cc412e4e..034d23059f3 100644
--- a/CVE-2008/CVE-2008-05xx/CVE-2008-0526.json
+++ b/CVE-2008/CVE-2008-05xx/CVE-2008-0526.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0526",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-02-15T02:00:00.000",
"lastModified": "2024-11-21T00:42:18.710",
"vulnStatus": "Modified",
@@ -183,33 +183,33 @@
"references": [
{
"url": "http://secunia.com/advisories/28935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/27774",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019407",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0543",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40487",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/28935",
diff --git a/CVE-2008/CVE-2008-05xx/CVE-2008-0527.json b/CVE-2008/CVE-2008-05xx/CVE-2008-0527.json
index 8353c572436..bfb689edee0 100644
--- a/CVE-2008/CVE-2008-05xx/CVE-2008-0527.json
+++ b/CVE-2008/CVE-2008-05xx/CVE-2008-0527.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0527",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-02-15T02:00:00.000",
"lastModified": "2024-11-21T00:42:18.827",
"vulnStatus": "Modified",
@@ -183,33 +183,33 @@
"references": [
{
"url": "http://secunia.com/advisories/28935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/27774",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019408",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0543",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40489",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/28935",
diff --git a/CVE-2008/CVE-2008-05xx/CVE-2008-0528.json b/CVE-2008/CVE-2008-05xx/CVE-2008-0528.json
index 7196e70d122..17490eb8217 100644
--- a/CVE-2008/CVE-2008-05xx/CVE-2008-0528.json
+++ b/CVE-2008/CVE-2008-05xx/CVE-2008-0528.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0528",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-02-15T02:00:00.000",
"lastModified": "2024-11-21T00:42:18.943",
"vulnStatus": "Modified",
@@ -183,33 +183,33 @@
"references": [
{
"url": "http://secunia.com/advisories/28935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/27774",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019409",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0543",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40492",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/28935",
diff --git a/CVE-2008/CVE-2008-05xx/CVE-2008-0529.json b/CVE-2008/CVE-2008-05xx/CVE-2008-0529.json
index 748f87d37ee..655df5623fd 100644
--- a/CVE-2008/CVE-2008-05xx/CVE-2008-0529.json
+++ b/CVE-2008/CVE-2008-05xx/CVE-2008-0529.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0529",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-02-15T02:00:00.000",
"lastModified": "2024-11-21T00:42:19.060",
"vulnStatus": "Modified",
@@ -183,33 +183,33 @@
"references": [
{
"url": "http://secunia.com/advisories/28935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/27774",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019410",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0543",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40493",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/28935",
diff --git a/CVE-2008/CVE-2008-05xx/CVE-2008-0530.json b/CVE-2008/CVE-2008-05xx/CVE-2008-0530.json
index 65d38528485..c86a1ec1838 100644
--- a/CVE-2008/CVE-2008-05xx/CVE-2008-0530.json
+++ b/CVE-2008/CVE-2008-05xx/CVE-2008-0530.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0530",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-02-15T02:00:00.000",
"lastModified": "2024-11-21T00:42:19.177",
"vulnStatus": "Modified",
@@ -183,33 +183,33 @@
"references": [
{
"url": "http://secunia.com/advisories/28935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/27774",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019406",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0543",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40485",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/28935",
diff --git a/CVE-2008/CVE-2008-05xx/CVE-2008-0531.json b/CVE-2008/CVE-2008-05xx/CVE-2008-0531.json
index 6bc81fd18e3..3a769d65622 100644
--- a/CVE-2008/CVE-2008-05xx/CVE-2008-0531.json
+++ b/CVE-2008/CVE-2008-05xx/CVE-2008-0531.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0531",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-02-15T02:00:00.000",
"lastModified": "2024-11-21T00:42:19.290",
"vulnStatus": "Modified",
@@ -183,33 +183,33 @@
"references": [
{
"url": "http://secunia.com/advisories/28935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/27774",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019411",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0543",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40498",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/28935",
diff --git a/CVE-2008/CVE-2008-05xx/CVE-2008-0532.json b/CVE-2008/CVE-2008-05xx/CVE-2008-0532.json
index 2112c4c371c..5d5204a0e6e 100644
--- a/CVE-2008/CVE-2008-05xx/CVE-2008-0532.json
+++ b/CVE-2008/CVE-2008-05xx/CVE-2008-0532.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0532",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-03-14T20:44:00.000",
"lastModified": "2024-11-21T00:42:19.410",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://secunia.com/advisories/29351",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -92,30 +92,30 @@
},
{
"url": "http://securityreason.com/securityalert/3743",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1019608",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/archive/1/489463/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/28222",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Patch"
@@ -123,11 +123,11 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/0868",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41154",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/29351",
diff --git a/CVE-2008/CVE-2008-05xx/CVE-2008-0533.json b/CVE-2008/CVE-2008-05xx/CVE-2008-0533.json
index 184aacf7d00..2cd4ee8ce7e 100644
--- a/CVE-2008/CVE-2008-05xx/CVE-2008-0533.json
+++ b/CVE-2008/CVE-2008-05xx/CVE-2008-0533.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0533",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-03-14T20:44:00.000",
"lastModified": "2024-11-21T00:42:19.523",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://secunia.com/advisories/29351",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -92,41 +92,41 @@
},
{
"url": "http://securityreason.com/securityalert/3743",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1019607",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008095f0c4.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.recurity-labs.com/content/pub/RecurityLabs_Cisco_ACS_UCP_advisory.txt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/archive/1/489463/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/28222",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/0868",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41156",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/29351",
diff --git a/CVE-2008/CVE-2008-05xx/CVE-2008-0534.json b/CVE-2008/CVE-2008-05xx/CVE-2008-0534.json
index ef7aa19849e..e0cc2a0190a 100644
--- a/CVE-2008/CVE-2008-05xx/CVE-2008-0534.json
+++ b/CVE-2008/CVE-2008-05xx/CVE-2008-0534.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0534",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-22T13:09:00.000",
"lastModified": "2024-11-21T00:42:19.643",
"vulnStatus": "Modified",
@@ -91,65 +91,65 @@
"references": [
{
"url": "http://secunia.com/advisories/30316",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/30590",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1020074",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008099bf65.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.icon-labs.com/news/read.asp?newsID=77",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.kb.cert.org/vuls/id/626979",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/29316",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/29609",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1604/references",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1774/references",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42565",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30316",
diff --git a/CVE-2008/CVE-2008-05xx/CVE-2008-0535.json b/CVE-2008/CVE-2008-05xx/CVE-2008-0535.json
index c710f10a784..eba97907f90 100644
--- a/CVE-2008/CVE-2008-05xx/CVE-2008-0535.json
+++ b/CVE-2008/CVE-2008-05xx/CVE-2008-0535.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0535",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-22T13:09:00.000",
"lastModified": "2024-11-21T00:42:19.767",
"vulnStatus": "Modified",
@@ -81,65 +81,65 @@
"references": [
{
"url": "http://secunia.com/advisories/30316",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/30590",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1020074",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008099bf65.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.icon-labs.com/news/read.asp?newsID=77",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.kb.cert.org/vuls/id/626979",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/29316",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/29609",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1604/references",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1774/references",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42567",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30316",
diff --git a/CVE-2008/CVE-2008-05xx/CVE-2008-0536.json b/CVE-2008/CVE-2008-05xx/CVE-2008-0536.json
index 21bbf53b60b..0dbd4dbcfb8 100644
--- a/CVE-2008/CVE-2008-05xx/CVE-2008-0536.json
+++ b/CVE-2008/CVE-2008-05xx/CVE-2008-0536.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0536",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-22T13:09:00.000",
"lastModified": "2024-11-21T00:42:19.883",
"vulnStatus": "Modified",
@@ -96,65 +96,65 @@
"references": [
{
"url": "http://secunia.com/advisories/30316",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/30590",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1020074",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008099bf65.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.icon-labs.com/news/read.asp?newsID=77",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.kb.cert.org/vuls/id/626979",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/29316",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/29609",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1604/references",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1774/references",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42566",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30316",
diff --git a/CVE-2008/CVE-2008-05xx/CVE-2008-0537.json b/CVE-2008/CVE-2008-05xx/CVE-2008-0537.json
index a8f7beccfdb..8db86c99600 100644
--- a/CVE-2008/CVE-2008-05xx/CVE-2008-0537.json
+++ b/CVE-2008/CVE-2008-05xx/CVE-2008-0537.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-0537",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-03-27T10:44:00.000",
"lastModified": "2024-11-21T00:42:20.000",
"vulnStatus": "Modified",
@@ -106,40 +106,40 @@
"references": [
{
"url": "http://secunia.com/advisories/29559",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/28463",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019716",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1005/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41466",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/29559",
diff --git a/CVE-2008/CVE-2008-11xx/CVE-2008-1150.json b/CVE-2008/CVE-2008-11xx/CVE-2008-1150.json
index 8d56b47a420..1711fcf1b7b 100644
--- a/CVE-2008/CVE-2008-11xx/CVE-2008-1150.json
+++ b/CVE-2008/CVE-2008-11xx/CVE-2008-1150.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1150",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-03-27T17:44:00.000",
"lastModified": "2024-11-21T00:43:47.867",
"vulnStatus": "Modified",
@@ -75,41 +75,41 @@
"references": [
{
"url": "http://secunia.com/advisories/29507",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1019714",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969862.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/28460",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1006/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41484",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5598",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/29507",
diff --git a/CVE-2008/CVE-2008-11xx/CVE-2008-1151.json b/CVE-2008/CVE-2008-11xx/CVE-2008-1151.json
index d728fef4682..fdf32a1b2c0 100644
--- a/CVE-2008/CVE-2008-11xx/CVE-2008-1151.json
+++ b/CVE-2008/CVE-2008-11xx/CVE-2008-1151.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1151",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-03-27T17:44:00.000",
"lastModified": "2024-11-21T00:43:47.980",
"vulnStatus": "Modified",
@@ -75,38 +75,38 @@
"references": [
{
"url": "http://secunia.com/advisories/29507",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1019714",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969862.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/28460",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1006/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41483",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5287",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/29507",
diff --git a/CVE-2008/CVE-2008-11xx/CVE-2008-1152.json b/CVE-2008/CVE-2008-11xx/CVE-2008-1152.json
index 395535d84bf..179bf2a5b01 100644
--- a/CVE-2008/CVE-2008-11xx/CVE-2008-1152.json
+++ b/CVE-2008/CVE-2008-11xx/CVE-2008-1152.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1152",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-03-27T17:44:00.000",
"lastModified": "2024-11-21T00:43:48.110",
"vulnStatus": "Modified",
@@ -1424,41 +1424,41 @@
"references": [
{
"url": "http://secunia.com/advisories/29507",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/28465",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019712",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1006/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41482",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/29507",
diff --git a/CVE-2008/CVE-2008-11xx/CVE-2008-1153.json b/CVE-2008/CVE-2008-11xx/CVE-2008-1153.json
index 781eeb1989d..55390d14974 100644
--- a/CVE-2008/CVE-2008-11xx/CVE-2008-1153.json
+++ b/CVE-2008/CVE-2008-11xx/CVE-2008-1153.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1153",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-03-27T10:44:00.000",
"lastModified": "2024-11-21T00:43:48.270",
"vulnStatus": "Modified",
@@ -89,11 +89,11 @@
"references": [
{
"url": "http://secunia.com/advisories/29507",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Patch"
@@ -101,37 +101,37 @@
},
{
"url": "http://www.kb.cert.org/vuls/id/936177",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/28461",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019713",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1006/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41475",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5860",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/29507",
diff --git a/CVE-2008/CVE-2008-11xx/CVE-2008-1154.json b/CVE-2008/CVE-2008-11xx/CVE-2008-1154.json
index 60b18b638b6..c03b304a710 100644
--- a/CVE-2008/CVE-2008-11xx/CVE-2008-1154.json
+++ b/CVE-2008/CVE-2008-11xx/CVE-2008-1154.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1154",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-04-04T19:44:00.000",
"lastModified": "2024-11-21T00:43:48.393",
"vulnStatus": "Modified",
@@ -109,30 +109,30 @@
"references": [
{
"url": "http://secunia.com/advisories/29670",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1019768",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008096fd9a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/28591",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1093",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41632",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/29670",
diff --git a/CVE-2008/CVE-2008-11xx/CVE-2008-1155.json b/CVE-2008/CVE-2008-11xx/CVE-2008-1155.json
index 73479e0969f..ce7ac8fdacb 100644
--- a/CVE-2008/CVE-2008-11xx/CVE-2008-1155.json
+++ b/CVE-2008/CVE-2008-11xx/CVE-2008-1155.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1155",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-04-16T17:05:00.000",
"lastModified": "2024-11-21T00:43:48.513",
"vulnStatus": "Modified",
@@ -182,14 +182,14 @@
"references": [
{
"url": "http://secunia.com/advisories/29822",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008097bea0.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -197,19 +197,19 @@
},
{
"url": "http://www.securityfocus.com/bid/28807",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019859",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1248/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41849",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/29822",
diff --git a/CVE-2008/CVE-2008-11xx/CVE-2008-1156.json b/CVE-2008/CVE-2008-11xx/CVE-2008-1156.json
index e80b7dd6bbd..f83c814af34 100644
--- a/CVE-2008/CVE-2008-11xx/CVE-2008-1156.json
+++ b/CVE-2008/CVE-2008-11xx/CVE-2008-1156.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1156",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-03-27T10:44:00.000",
"lastModified": "2024-11-21T00:43:48.640",
"vulnStatus": "Modified",
@@ -93,41 +93,41 @@
"references": [
{
"url": "http://secunia.com/advisories/29507",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/28464",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1019715",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA08-087B.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1006/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41468",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5648",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/29507",
diff --git a/CVE-2008/CVE-2008-11xx/CVE-2008-1157.json b/CVE-2008/CVE-2008-11xx/CVE-2008-1157.json
index 4f7f36f676a..c45b66ad08e 100644
--- a/CVE-2008/CVE-2008-11xx/CVE-2008-1157.json
+++ b/CVE-2008/CVE-2008-11xx/CVE-2008-1157.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1157",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-03-14T20:44:00.000",
"lastModified": "2024-11-21T00:43:48.767",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://secunia.com/advisories/29376",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080313-ipm.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -89,22 +89,22 @@
},
{
"url": "http://www.securityfocus.com/bid/28249",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securitytracker.com/id?1019611",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0876/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41208",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/29376",
diff --git a/CVE-2008/CVE-2008-11xx/CVE-2008-1158.json b/CVE-2008/CVE-2008-11xx/CVE-2008-1158.json
index 1235fd7af36..1ee8fb1b555 100644
--- a/CVE-2008/CVE-2008-11xx/CVE-2008-1158.json
+++ b/CVE-2008/CVE-2008-11xx/CVE-2008-1158.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1158",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-16T12:54:00.000",
"lastModified": "2024-11-21T00:43:48.890",
"vulnStatus": "Modified",
@@ -94,27 +94,27 @@
"references": [
{
"url": "http://secunia.com/advisories/30240",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1020023",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080995682.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/29219",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1534",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42412",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30240",
diff --git a/CVE-2008/CVE-2008-11xx/CVE-2008-1159.json b/CVE-2008/CVE-2008-11xx/CVE-2008-1159.json
index 08253548097..fd048072bc7 100644
--- a/CVE-2008/CVE-2008-11xx/CVE-2008-1159.json
+++ b/CVE-2008/CVE-2008-11xx/CVE-2008-1159.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1159",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-22T13:09:00.000",
"lastModified": "2024-11-21T00:43:49.000",
"vulnStatus": "Modified",
@@ -89,37 +89,37 @@
"references": [
{
"url": "http://secunia.com/advisories/30322",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1020073",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008099567f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/29314",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1605/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42563",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5486",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30322",
diff --git a/CVE-2008/CVE-2008-17xx/CVE-2008-1740.json b/CVE-2008/CVE-2008-17xx/CVE-2008-1740.json
index d256667ad41..d5497a513a0 100644
--- a/CVE-2008/CVE-2008-17xx/CVE-2008-1740.json
+++ b/CVE-2008/CVE-2008-17xx/CVE-2008-1740.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1740",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-16T12:54:00.000",
"lastModified": "2024-11-21T00:45:13.363",
"vulnStatus": "Modified",
@@ -80,30 +80,30 @@
"references": [
{
"url": "http://secunia.com/advisories/30240",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1020023",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080995682.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/29220",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1534",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42412",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30240",
diff --git a/CVE-2008/CVE-2008-17xx/CVE-2008-1741.json b/CVE-2008/CVE-2008-17xx/CVE-2008-1741.json
index 9a8c84c56b4..7a3c6e5bb06 100644
--- a/CVE-2008/CVE-2008-17xx/CVE-2008-1741.json
+++ b/CVE-2008/CVE-2008-17xx/CVE-2008-1741.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1741",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-16T12:54:00.000",
"lastModified": "2024-11-21T00:45:13.470",
"vulnStatus": "Modified",
@@ -80,30 +80,30 @@
"references": [
{
"url": "http://secunia.com/advisories/30269",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1020023",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080995682.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/29222",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1534",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42413",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30269",
diff --git a/CVE-2008/CVE-2008-17xx/CVE-2008-1742.json b/CVE-2008/CVE-2008-17xx/CVE-2008-1742.json
index 44d748e7158..180b8a62d56 100644
--- a/CVE-2008/CVE-2008-17xx/CVE-2008-1742.json
+++ b/CVE-2008/CVE-2008-17xx/CVE-2008-1742.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1742",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-16T12:54:00.000",
"lastModified": "2024-11-21T00:45:13.583",
"vulnStatus": "Modified",
@@ -134,27 +134,27 @@
"references": [
{
"url": "http://secunia.com/advisories/30238",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1020022",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/29221",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1533",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42410",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30238",
diff --git a/CVE-2008/CVE-2008-17xx/CVE-2008-1743.json b/CVE-2008/CVE-2008-17xx/CVE-2008-1743.json
index 29ea9118c84..79fbdffb021 100644
--- a/CVE-2008/CVE-2008-17xx/CVE-2008-1743.json
+++ b/CVE-2008/CVE-2008-17xx/CVE-2008-1743.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1743",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-16T12:54:00.000",
"lastModified": "2024-11-21T00:45:13.697",
"vulnStatus": "Modified",
@@ -83,14 +83,14 @@
"references": [
{
"url": "http://secunia.com/advisories/30238",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1020022",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -98,14 +98,14 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/29221",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -113,14 +113,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/1533",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42414",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2008/CVE-2008-17xx/CVE-2008-1744.json b/CVE-2008/CVE-2008-17xx/CVE-2008-1744.json
index 77b4c7155aa..491d1cce7d0 100644
--- a/CVE-2008/CVE-2008-17xx/CVE-2008-1744.json
+++ b/CVE-2008/CVE-2008-17xx/CVE-2008-1744.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1744",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-16T12:54:00.000",
"lastModified": "2024-11-21T00:45:13.810",
"vulnStatus": "Modified",
@@ -169,27 +169,27 @@
"references": [
{
"url": "http://secunia.com/advisories/30238",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1020022",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/29221",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1533",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42415",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30238",
diff --git a/CVE-2008/CVE-2008-17xx/CVE-2008-1745.json b/CVE-2008/CVE-2008-17xx/CVE-2008-1745.json
index 0a6705c5ba1..f38f65180d1 100644
--- a/CVE-2008/CVE-2008-17xx/CVE-2008-1745.json
+++ b/CVE-2008/CVE-2008-17xx/CVE-2008-1745.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1745",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-16T12:54:00.000",
"lastModified": "2024-11-21T00:45:13.917",
"vulnStatus": "Modified",
@@ -174,27 +174,27 @@
"references": [
{
"url": "http://secunia.com/advisories/30238",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1020022",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/29221",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1533",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42417",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30238",
diff --git a/CVE-2008/CVE-2008-17xx/CVE-2008-1746.json b/CVE-2008/CVE-2008-17xx/CVE-2008-1746.json
index 08ce7e765b1..b031e5af776 100644
--- a/CVE-2008/CVE-2008-17xx/CVE-2008-1746.json
+++ b/CVE-2008/CVE-2008-17xx/CVE-2008-1746.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1746",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-16T12:54:00.000",
"lastModified": "2024-11-21T00:45:14.017",
"vulnStatus": "Modified",
@@ -159,27 +159,27 @@
"references": [
{
"url": "http://secunia.com/advisories/30238",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1020022",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/29221",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1533",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42420",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30238",
diff --git a/CVE-2008/CVE-2008-17xx/CVE-2008-1747.json b/CVE-2008/CVE-2008-17xx/CVE-2008-1747.json
index d987ab0cd4f..d93cdd38c0e 100644
--- a/CVE-2008/CVE-2008-17xx/CVE-2008-1747.json
+++ b/CVE-2008/CVE-2008-17xx/CVE-2008-1747.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1747",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-16T12:54:00.000",
"lastModified": "2024-11-21T00:45:14.123",
"vulnStatus": "Modified",
@@ -104,14 +104,14 @@
"references": [
{
"url": "http://secunia.com/advisories/30238",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1020022",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,14 +119,14 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/29221",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,14 +134,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/1533",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42418",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2008/CVE-2008-17xx/CVE-2008-1748.json b/CVE-2008/CVE-2008-17xx/CVE-2008-1748.json
index 6ccc84719e7..a34c13f1cba 100644
--- a/CVE-2008/CVE-2008-17xx/CVE-2008-1748.json
+++ b/CVE-2008/CVE-2008-17xx/CVE-2008-1748.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1748",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-16T12:54:00.000",
"lastModified": "2024-11-21T00:45:14.240",
"vulnStatus": "Modified",
@@ -104,14 +104,14 @@
"references": [
{
"url": "http://secunia.com/advisories/30238",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1020022",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -127,7 +127,7 @@
},
{
"url": "http://www.securityfocus.com/bid/29221",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,14 +135,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/1533",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42419",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2008/CVE-2008-17xx/CVE-2008-1749.json b/CVE-2008/CVE-2008-17xx/CVE-2008-1749.json
index 27e80d03959..0107bb258ac 100644
--- a/CVE-2008/CVE-2008-17xx/CVE-2008-1749.json
+++ b/CVE-2008/CVE-2008-17xx/CVE-2008-1749.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-1749",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-14T18:20:00.000",
"lastModified": "2024-11-21T00:45:14.353",
"vulnStatus": "Modified",
@@ -134,33 +134,33 @@
"references": [
{
"url": "http://secunia.com/advisories/30223",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080995684.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/29216",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020021",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1532/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42409",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30223",
diff --git a/CVE-2008/CVE-2008-20xx/CVE-2008-2053.json b/CVE-2008/CVE-2008-20xx/CVE-2008-2053.json
index d47dff756be..b4037990887 100644
--- a/CVE-2008/CVE-2008-20xx/CVE-2008-2053.json
+++ b/CVE-2008/CVE-2008-20xx/CVE-2008-2053.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2053",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-22T13:09:00.000",
"lastModified": "2024-11-21T00:45:58.787",
"vulnStatus": "Modified",
@@ -84,36 +84,36 @@
"references": [
{
"url": "http://secunia.com/advisories/30289",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1020080",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a008099beae.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/29315",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1603/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42564",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30289",
diff --git a/CVE-2008/CVE-2008-20xx/CVE-2008-2054.json b/CVE-2008/CVE-2008-20xx/CVE-2008-2054.json
index 5b722fd6a0b..18994d03826 100644
--- a/CVE-2008/CVE-2008-20xx/CVE-2008-2054.json
+++ b/CVE-2008/CVE-2008-20xx/CVE-2008-2054.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2054",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-05-29T16:32:00.000",
"lastModified": "2024-11-21T00:45:58.887",
"vulnStatus": "Modified",
@@ -99,11 +99,11 @@
"references": [
{
"url": "http://secunia.com/advisories/30422",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809a1f14.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -111,19 +111,19 @@
},
{
"url": "http://www.liquidmatrix.org/blog/2008/05/28/advisory-ciscoworks-arbitrary-code-execution-vulnerability/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020127",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1687/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42702",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30422",
diff --git a/CVE-2008/CVE-2008-20xx/CVE-2008-2055.json b/CVE-2008/CVE-2008-20xx/CVE-2008-2055.json
index 239f600ff88..025c7e4cc57 100644
--- a/CVE-2008/CVE-2008-20xx/CVE-2008-2055.json
+++ b/CVE-2008/CVE-2008-20xx/CVE-2008-2055.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2055",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-06-04T21:32:00.000",
"lastModified": "2024-11-21T00:45:58.983",
"vulnStatus": "Modified",
@@ -99,30 +99,30 @@
"references": [
{
"url": "http://secunia.com/advisories/30552",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securitytracker.com/id?1020176",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020177",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1750/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42835",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30552",
diff --git a/CVE-2008/CVE-2008-20xx/CVE-2008-2056.json b/CVE-2008/CVE-2008-20xx/CVE-2008-2056.json
index b703649fae4..0d1444d4e24 100644
--- a/CVE-2008/CVE-2008-20xx/CVE-2008-2056.json
+++ b/CVE-2008/CVE-2008-20xx/CVE-2008-2056.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2056",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-06-04T21:32:00.000",
"lastModified": "2024-11-21T00:45:59.083",
"vulnStatus": "Modified",
@@ -89,30 +89,30 @@
"references": [
{
"url": "http://secunia.com/advisories/30552",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securitytracker.com/id?1020178",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020179",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1750/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42836",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30552",
diff --git a/CVE-2008/CVE-2008-20xx/CVE-2008-2057.json b/CVE-2008/CVE-2008-20xx/CVE-2008-2057.json
index 1ed5468702e..1198d5cc71c 100644
--- a/CVE-2008/CVE-2008-20xx/CVE-2008-2057.json
+++ b/CVE-2008/CVE-2008-20xx/CVE-2008-2057.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2057",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-06-04T21:32:00.000",
"lastModified": "2024-11-21T00:45:59.200",
"vulnStatus": "Modified",
@@ -89,30 +89,30 @@
"references": [
{
"url": "http://secunia.com/advisories/30552",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1020180",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1020181",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1750/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42837",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30552",
diff --git a/CVE-2008/CVE-2008-20xx/CVE-2008-2058.json b/CVE-2008/CVE-2008-20xx/CVE-2008-2058.json
index ebc6b399c77..683866c64df 100644
--- a/CVE-2008/CVE-2008-20xx/CVE-2008-2058.json
+++ b/CVE-2008/CVE-2008-20xx/CVE-2008-2058.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2058",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-06-04T21:32:00.000",
"lastModified": "2024-11-21T00:45:59.307",
"vulnStatus": "Modified",
@@ -89,26 +89,26 @@
"references": [
{
"url": "http://secunia.com/advisories/30552",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1020182",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1020183",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1750/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30552",
diff --git a/CVE-2008/CVE-2008-20xx/CVE-2008-2059.json b/CVE-2008/CVE-2008-20xx/CVE-2008-2059.json
index c094f12cc48..b8a47d5070c 100644
--- a/CVE-2008/CVE-2008-20xx/CVE-2008-2059.json
+++ b/CVE-2008/CVE-2008-20xx/CVE-2008-2059.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2059",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-06-04T21:32:00.000",
"lastModified": "2024-11-21T00:45:59.407",
"vulnStatus": "Modified",
@@ -79,27 +79,27 @@
"references": [
{
"url": "http://secunia.com/advisories/30552",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020184",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020185",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1750/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42841",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30552",
diff --git a/CVE-2008/CVE-2008-20xx/CVE-2008-2060.json b/CVE-2008/CVE-2008-20xx/CVE-2008-2060.json
index d8fe26de4d6..17d235161b7 100644
--- a/CVE-2008/CVE-2008-20xx/CVE-2008-2060.json
+++ b/CVE-2008/CVE-2008-20xx/CVE-2008-2060.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2060",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-06-18T19:41:00.000",
"lastModified": "2024-11-21T00:45:59.500",
"vulnStatus": "Modified",
@@ -83,30 +83,30 @@
"references": [
{
"url": "http://secunia.com/advisories/30767",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809b3842.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/29791",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020326",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1872/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43166",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30767",
diff --git a/CVE-2008/CVE-2008-20xx/CVE-2008-2061.json b/CVE-2008/CVE-2008-20xx/CVE-2008-2061.json
index 4a7a865441d..f1587b54151 100644
--- a/CVE-2008/CVE-2008-20xx/CVE-2008-2061.json
+++ b/CVE-2008/CVE-2008-20xx/CVE-2008-2061.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2061",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-06-26T17:41:00.000",
"lastModified": "2024-11-21T00:45:59.600",
"vulnStatus": "Modified",
@@ -83,14 +83,14 @@
"references": [
{
"url": "http://secunia.com/advisories/30848",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809b9011.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -98,7 +98,7 @@
},
{
"url": "http://www.securityfocus.com/bid/29933",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -106,7 +106,7 @@
},
{
"url": "http://www.securitytracker.com/id?1020360",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,14 +114,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/1933/references",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43349",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2008/CVE-2008-20xx/CVE-2008-2062.json b/CVE-2008/CVE-2008-20xx/CVE-2008-2062.json
index d381c00edae..a8e5c50578c 100644
--- a/CVE-2008/CVE-2008-20xx/CVE-2008-2062.json
+++ b/CVE-2008/CVE-2008-20xx/CVE-2008-2062.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2062",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-06-26T17:41:00.000",
"lastModified": "2024-11-21T00:45:59.707",
"vulnStatus": "Modified",
@@ -97,14 +97,14 @@
"references": [
{
"url": "http://secunia.com/advisories/30848",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809b9011.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -112,7 +112,7 @@
},
{
"url": "http://www.securityfocus.com/bid/29935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -120,7 +120,7 @@
},
{
"url": "http://www.securitytracker.com/id?1020361",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -128,14 +128,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/1933/references",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43355",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2008/CVE-2008-27xx/CVE-2008-2730.json b/CVE-2008/CVE-2008-27xx/CVE-2008-2730.json
index bd7b88984c0..bdfa902ae5c 100644
--- a/CVE-2008/CVE-2008-27xx/CVE-2008-2730.json
+++ b/CVE-2008/CVE-2008-27xx/CVE-2008-2730.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2730",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-06-26T17:41:00.000",
"lastModified": "2024-11-21T00:47:34.463",
"vulnStatus": "Modified",
@@ -79,30 +79,30 @@
"references": [
{
"url": "http://secunia.com/advisories/30848",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809b9011.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/29935",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020361",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1933/references",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43355",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/30848",
diff --git a/CVE-2008/CVE-2008-27xx/CVE-2008-2732.json b/CVE-2008/CVE-2008-27xx/CVE-2008-2732.json
index 2037819649c..2fa3228cc2a 100644
--- a/CVE-2008/CVE-2008-27xx/CVE-2008-2732.json
+++ b/CVE-2008/CVE-2008-27xx/CVE-2008-2732.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2732",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-04T16:41:00.000",
"lastModified": "2024-11-21T00:47:34.577",
"vulnStatus": "Modified",
@@ -99,31 +99,31 @@
"references": [
{
"url": "http://secunia.com/advisories/31730",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/30998",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020808",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020809",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44866",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/31730",
diff --git a/CVE-2008/CVE-2008-27xx/CVE-2008-2733.json b/CVE-2008/CVE-2008-27xx/CVE-2008-2733.json
index 5a4dfe322a4..509d176f5fe 100644
--- a/CVE-2008/CVE-2008-27xx/CVE-2008-2733.json
+++ b/CVE-2008/CVE-2008-27xx/CVE-2008-2733.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2733",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-04T16:41:00.000",
"lastModified": "2024-11-21T00:47:34.687",
"vulnStatus": "Modified",
@@ -99,31 +99,31 @@
"references": [
{
"url": "http://secunia.com/advisories/31730",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/30998",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020810",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020811",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44867",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/31730",
diff --git a/CVE-2008/CVE-2008-27xx/CVE-2008-2734.json b/CVE-2008/CVE-2008-27xx/CVE-2008-2734.json
index b08d040f4cd..b5c4f32aabb 100644
--- a/CVE-2008/CVE-2008-27xx/CVE-2008-2734.json
+++ b/CVE-2008/CVE-2008-27xx/CVE-2008-2734.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2734",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-04T16:41:00.000",
"lastModified": "2024-11-21T00:47:34.803",
"vulnStatus": "Modified",
@@ -83,27 +83,27 @@
"references": [
{
"url": "http://secunia.com/advisories/31730",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/30998",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020812",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44868",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/31730",
diff --git a/CVE-2008/CVE-2008-27xx/CVE-2008-2735.json b/CVE-2008/CVE-2008-27xx/CVE-2008-2735.json
index f725709f3a6..1d7472d070d 100644
--- a/CVE-2008/CVE-2008-27xx/CVE-2008-2735.json
+++ b/CVE-2008/CVE-2008-27xx/CVE-2008-2735.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2735",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-04T16:41:00.000",
"lastModified": "2024-11-21T00:47:34.920",
"vulnStatus": "Modified",
@@ -83,27 +83,27 @@
"references": [
{
"url": "http://secunia.com/advisories/31730",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/30998",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020812",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44869",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/31730",
diff --git a/CVE-2008/CVE-2008-27xx/CVE-2008-2736.json b/CVE-2008/CVE-2008-27xx/CVE-2008-2736.json
index d2fe60910e0..6df3445757f 100644
--- a/CVE-2008/CVE-2008-27xx/CVE-2008-2736.json
+++ b/CVE-2008/CVE-2008-27xx/CVE-2008-2736.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2736",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-04T16:41:00.000",
"lastModified": "2024-11-21T00:47:35.037",
"vulnStatus": "Modified",
@@ -83,31 +83,31 @@
"references": [
{
"url": "http://secunia.com/advisories/31730",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080903-asa",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/security/asa/asa81/release/notes/asarn812.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809f138a.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/30998",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020813",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44870",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/31730",
diff --git a/CVE-2008/CVE-2008-27xx/CVE-2008-2737.json b/CVE-2008/CVE-2008-27xx/CVE-2008-2737.json
index a6747bbd8ea..7677b11b07e 100644
--- a/CVE-2008/CVE-2008-27xx/CVE-2008-2737.json
+++ b/CVE-2008/CVE-2008-27xx/CVE-2008-2737.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2737",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-08-18T20:41:00.000",
"lastModified": "2023-11-07T02:02:17.723",
"vulnStatus": "Rejected",
diff --git a/CVE-2008/CVE-2008-27xx/CVE-2008-2739.json b/CVE-2008/CVE-2008-27xx/CVE-2008-2739.json
index fe85c376517..62df8b09285 100644
--- a/CVE-2008/CVE-2008-27xx/CVE-2008-2739.json
+++ b/CVE-2008/CVE-2008-27xx/CVE-2008-2739.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-2739",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:43.957",
"lastModified": "2024-11-21T00:47:35.177",
"vulnStatus": "Modified",
@@ -184,21 +184,21 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01556.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
@@ -206,7 +206,7 @@
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6058",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
diff --git a/CVE-2008/CVE-2008-37xx/CVE-2008-3798.json b/CVE-2008/CVE-2008-37xx/CVE-2008-3798.json
index 816148c1270..65c59e5ba51 100644
--- a/CVE-2008/CVE-2008-37xx/CVE-2008-3798.json
+++ b/CVE-2008/CVE-2008-37xx/CVE-2008-3798.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3798",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.017",
"lastModified": "2024-11-21T00:50:09.360",
"vulnStatus": "Modified",
@@ -79,21 +79,21 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0146c.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1020930",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -102,14 +102,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6087",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2008/CVE-2008-37xx/CVE-2008-3799.json b/CVE-2008/CVE-2008-37xx/CVE-2008-3799.json
index b08ed9d4b19..d804494bd99 100644
--- a/CVE-2008/CVE-2008-37xx/CVE-2008-3799.json
+++ b/CVE-2008/CVE-2008-37xx/CVE-2008-3799.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3799",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.050",
"lastModified": "2024-11-21T00:50:09.490",
"vulnStatus": "Modified",
@@ -84,21 +84,21 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01562.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1020939",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -107,14 +107,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5927",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3800.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3800.json
index 70130964c89..e0b05485ab5 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3800.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3800.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3800",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.067",
"lastModified": "2024-11-21T00:50:09.610",
"vulnStatus": "Modified",
@@ -119,35 +119,35 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/32013",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01562.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0156a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/31367",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -155,7 +155,7 @@
},
{
"url": "http://www.securitytracker.com/id?1020939",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -164,7 +164,7 @@
},
{
"url": "http://www.securitytracker.com/id?1020942",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -173,21 +173,21 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/2671",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6086",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3801.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3801.json
index fa08fce94e5..9169f3dafc2 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3801.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3801.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3801",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.080",
"lastModified": "2024-11-21T00:50:09.747",
"vulnStatus": "Modified",
@@ -119,35 +119,35 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/32013",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01562.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0156a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/31367",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -155,7 +155,7 @@
},
{
"url": "http://www.securitytracker.com/id?1020939",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -164,7 +164,7 @@
},
{
"url": "http://www.securitytracker.com/id?1020942",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -173,21 +173,21 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/2671",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6047",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3802.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3802.json
index 4680b119dda..298896ada04 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3802.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3802.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3802",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.127",
"lastModified": "2024-11-21T00:50:09.880",
"vulnStatus": "Modified",
@@ -494,21 +494,21 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01562.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1020939",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -517,14 +517,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5889",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3803.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3803.json
index cff84582928..78b9f736d8c 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3803.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3803.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3803",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.160",
"lastModified": "2024-11-21T00:50:10.020",
"vulnStatus": "Modified",
@@ -84,21 +84,21 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014a9.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/31366",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -106,7 +106,7 @@
},
{
"url": "http://www.securitytracker.com/id?1020940",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -115,14 +115,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5919",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3804.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3804.json
index 84b94f33c44..1f6fdaa18d3 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3804.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3804.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3804",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.173",
"lastModified": "2024-11-21T00:50:10.150",
"vulnStatus": "Modified",
@@ -79,21 +79,21 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014ac.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1020934",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -102,14 +102,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5619",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3805.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3805.json
index eef7b55692f..ec5ec735e3b 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3805.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3805.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3805",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.190",
"lastModified": "2024-11-21T00:50:10.280",
"vulnStatus": "Modified",
@@ -124,28 +124,28 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=16646",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014ae.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1020935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -154,14 +154,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5910",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3806.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3806.json
index 898414abf87..d05527dfa9d 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3806.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3806.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3806",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.220",
"lastModified": "2024-11-21T00:50:10.437",
"vulnStatus": "Modified",
@@ -124,28 +124,28 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=16646",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014ae.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45592",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -153,7 +153,7 @@
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7123",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3807.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3807.json
index ba9481d8381..1690882ffb6 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3807.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3807.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3807",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.237",
"lastModified": "2024-11-21T00:50:10.567",
"vulnStatus": "Modified",
@@ -94,21 +94,21 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014b1.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1020941",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -117,14 +117,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5452",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3808.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3808.json
index 247281d4d7c..ad593b02e3c 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3808.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3808.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3808",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.253",
"lastModified": "2024-11-21T00:50:10.690",
"vulnStatus": "Modified",
@@ -1329,21 +1329,21 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01491.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/31356",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1351,7 +1351,7 @@
},
{
"url": "http://www.securitytracker.com/id?1020936",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -1360,14 +1360,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5873",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3809.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3809.json
index 7ca7620d58f..c3180f9bc24 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3809.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3809.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3809",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.283",
"lastModified": "2024-11-21T00:50:10.847",
"vulnStatus": "Modified",
@@ -1089,28 +1089,28 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=16638",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01491.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/31356",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1118,7 +1118,7 @@
},
{
"url": "http://www.securitytracker.com/id?1020936",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -1127,14 +1127,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5477",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3810.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3810.json
index cc3e83e4796..ac94d22bdd0 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3810.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3810.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3810",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.300",
"lastModified": "2024-11-21T00:50:11.000",
"vulnStatus": "Modified",
@@ -154,27 +154,27 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0148e.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/31359",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020937",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6112",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/31990",
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3811.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3811.json
index aae0eac45d0..0c928ac31e2 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3811.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3811.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3811",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.317",
"lastModified": "2024-11-21T00:50:11.133",
"vulnStatus": "Modified",
@@ -154,34 +154,34 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0148e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/31359",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1020937",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45535",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5900",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/31990",
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3812.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3812.json
index 770b7e45edc..0113ee2dddf 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3812.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3812.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3812",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.347",
"lastModified": "2024-11-21T00:50:11.260",
"vulnStatus": "Modified",
@@ -99,28 +99,28 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=16661",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01545.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/31354",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -128,7 +128,7 @@
},
{
"url": "http://www.securitytracker.com/id?1020929",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -137,14 +137,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5302",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3813.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3813.json
index 8d1c11f5a77..f1d1b18f1bd 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3813.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3813.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3813",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-09-26T16:21:44.363",
"lastModified": "2024-11-21T00:50:11.380",
"vulnStatus": "Modified",
@@ -114,21 +114,21 @@
"references": [
{
"url": "http://secunia.com/advisories/31990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0157a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1020938",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -137,14 +137,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2008/2670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5362",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3814.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3814.json
index 5c86d8e262a..4305d8cb3c5 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3814.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3814.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3814",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-10-08T22:00:01.730",
"lastModified": "2024-11-21T00:50:11.490",
"vulnStatus": "Modified",
@@ -139,14 +139,14 @@
"references": [
{
"url": "http://secunia.com/advisories/32187",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0d85f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -154,7 +154,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_response09186a0080a0d861.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -162,30 +162,30 @@
},
{
"url": "http://www.securityfocus.com/bid/31638",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/31642",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021011",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.voipshield.com/research-details.php?id=126",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2771",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45741",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/32187",
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3815.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3815.json
index 1d93878abd8..11f5eefe2d8 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3815.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3815.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3815",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-10-23T22:00:01.137",
"lastModified": "2024-11-21T00:50:11.610",
"vulnStatus": "Modified",
@@ -99,35 +99,35 @@
"references": [
{
"url": "http://secunia.com/advisories/32360",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a183ba.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/31864",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021089",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021090",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2899",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46024",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5983",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/32360",
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3816.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3816.json
index af80922a74d..55e46eec7c8 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3816.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3816.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3816",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-10-23T22:00:01.153",
"lastModified": "2024-11-21T00:50:11.737",
"vulnStatus": "Modified",
@@ -84,11 +84,11 @@
"references": [
{
"url": "http://secunia.com/advisories/32391",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a183ba.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -96,27 +96,27 @@
},
{
"url": "http://www.securityfocus.com/bid/31863",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021086",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021087",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2899",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46025",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5499",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/32391",
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3817.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3817.json
index 8cbc264b4ba..c857a75a5bc 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3817.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3817.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3817",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2008-10-23T22:00:01.183",
"lastModified": "2024-11-21T00:50:11.853",
"vulnStatus": "Modified",
@@ -84,11 +84,11 @@
"references": [
{
"url": "http://secunia.com/advisories/32392",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a183ba.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -96,23 +96,23 @@
},
{
"url": "http://www.securityfocus.com/bid/31865",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021088",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2899",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46027",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5597",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/32392",
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3818.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3818.json
index 55665a23538..531b3244549 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3818.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3818.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3818",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-01-16T21:30:00.187",
"lastModified": "2024-11-21T00:50:11.960",
"vulnStatus": "Modified",
@@ -151,26 +151,26 @@
"references": [
{
"url": "http://securitytracker.com/id?1021592",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4fa.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33261",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0139",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47940",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1021592",
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3819.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3819.json
index f636703e05c..e3cd503f957 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3819.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3819.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3819",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-01-08T19:30:09.827",
"lastModified": "2024-11-21T00:50:12.073",
"vulnStatus": "Modified",
@@ -89,11 +89,11 @@
"references": [
{
"url": "http://securitytracker.com/id?1021530",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a57481.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -101,11 +101,11 @@
},
{
"url": "http://www.securityfocus.com/bid/33152",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47787",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1021530",
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3820.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3820.json
index 516a774a672..71699b1a34a 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3820.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3820.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3820",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-01-22T18:30:03.780",
"lastModified": "2024-11-21T00:50:12.180",
"vulnStatus": "Modified",
@@ -109,14 +109,14 @@
"references": [
{
"url": "http://secunia.com/advisories/33633",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6192a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -124,19 +124,19 @@
},
{
"url": "http://www.securityfocus.com/bid/33381",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021619",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0214",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48134",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/33633",
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3821.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3821.json
index d2808522a40..020fad37961 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3821.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3821.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3821",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-01-16T21:30:03.280",
"lastModified": "2024-11-21T00:50:12.293",
"vulnStatus": "Modified",
@@ -1489,7 +1489,7 @@
"references": [
{
"url": "http://jvn.jp/en/jp/JVN28344798/index.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1497,35 +1497,35 @@
},
{
"url": "http://osvdb.org/51393",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://osvdb.org/51394",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/33461",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/4916",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1021598",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1533,25 +1533,25 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_response09186a0080a5c501.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-19",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/500063/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/33260",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1559,14 +1559,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2009/0138",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Not Applicable"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47947",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3822.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3822.json
index 62466c0bde6..e1c1bd275a9 100644
--- a/CVE-2008/CVE-2008-38xx/CVE-2008-3822.json
+++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3822.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2008-3822",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:07.167",
"lastModified": "2023-11-07T02:02:35.683",
"vulnStatus": "Rejected",
diff --git a/CVE-2009/CVE-2009-00xx/CVE-2009-0053.json b/CVE-2009/CVE-2009-00xx/CVE-2009-0053.json
index 09ce7fff79a..658c2bf6dbb 100644
--- a/CVE-2009/CVE-2009-00xx/CVE-2009-0053.json
+++ b/CVE-2009/CVE-2009-00xx/CVE-2009-0053.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0053",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-01-16T21:30:03.407",
"lastModified": "2024-11-21T00:58:57.513",
"vulnStatus": "Modified",
@@ -174,30 +174,30 @@
"references": [
{
"url": "http://osvdb.org/51395",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/33479",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1021593",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4f7.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33268",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0140",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/51395",
diff --git a/CVE-2009/CVE-2009-00xx/CVE-2009-0054.json b/CVE-2009/CVE-2009-00xx/CVE-2009-0054.json
index 0e3a6ad14ea..ea64cdaf656 100644
--- a/CVE-2009/CVE-2009-00xx/CVE-2009-0054.json
+++ b/CVE-2009/CVE-2009-00xx/CVE-2009-0054.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0054",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-01-16T21:30:03.437",
"lastModified": "2024-11-21T00:58:57.623",
"vulnStatus": "Modified",
@@ -174,30 +174,30 @@
"references": [
{
"url": "http://osvdb.org/51396",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/33479",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1021593",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4f7.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33268",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0140",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/51396",
diff --git a/CVE-2009/CVE-2009-00xx/CVE-2009-0055.json b/CVE-2009/CVE-2009-00xx/CVE-2009-0055.json
index da826886b16..efd76ced711 100644
--- a/CVE-2009/CVE-2009-00xx/CVE-2009-0055.json
+++ b/CVE-2009/CVE-2009-00xx/CVE-2009-0055.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0055",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-01-16T21:30:03.453",
"lastModified": "2024-11-21T00:58:57.743",
"vulnStatus": "Modified",
@@ -174,30 +174,30 @@
"references": [
{
"url": "http://osvdb.org/51397",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/33479",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1021594",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4f7.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33268",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0140",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/51397",
diff --git a/CVE-2009/CVE-2009-00xx/CVE-2009-0056.json b/CVE-2009/CVE-2009-00xx/CVE-2009-0056.json
index e564ed90559..5a04eff976b 100644
--- a/CVE-2009/CVE-2009-00xx/CVE-2009-0056.json
+++ b/CVE-2009/CVE-2009-00xx/CVE-2009-0056.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0056",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-01-16T21:30:03.467",
"lastModified": "2024-11-21T00:58:57.867",
"vulnStatus": "Modified",
@@ -174,30 +174,30 @@
"references": [
{
"url": "http://osvdb.org/51398",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/33479",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1021594",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4f7.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33268",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0140",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/51398",
diff --git a/CVE-2009/CVE-2009-00xx/CVE-2009-0057.json b/CVE-2009/CVE-2009-00xx/CVE-2009-0057.json
index 83aeb155176..94584a4f018 100644
--- a/CVE-2009/CVE-2009-00xx/CVE-2009-0057.json
+++ b/CVE-2009/CVE-2009-00xx/CVE-2009-0057.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0057",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-01-22T18:30:03.813",
"lastModified": "2024-11-21T00:58:57.983",
"vulnStatus": "Modified",
@@ -249,33 +249,33 @@
"references": [
{
"url": "http://secunia.com/advisories/33588",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a61928.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33379",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021620",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0213",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48139",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/33588",
diff --git a/CVE-2009/CVE-2009-00xx/CVE-2009-0058.json b/CVE-2009/CVE-2009-00xx/CVE-2009-0058.json
index 087d5ed00c6..291a063a782 100644
--- a/CVE-2009/CVE-2009-00xx/CVE-2009-0058.json
+++ b/CVE-2009/CVE-2009-00xx/CVE-2009-0058.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0058",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-05T00:30:00.267",
"lastModified": "2024-11-21T00:58:58.107",
"vulnStatus": "Modified",
@@ -144,22 +144,22 @@
"references": [
{
"url": "http://secunia.com/advisories/33749",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6c1dd.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33608",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021679",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/33749",
diff --git a/CVE-2009/CVE-2009-00xx/CVE-2009-0059.json b/CVE-2009/CVE-2009-00xx/CVE-2009-0059.json
index 52a599af997..50d43b7b3e2 100644
--- a/CVE-2009/CVE-2009-00xx/CVE-2009-0059.json
+++ b/CVE-2009/CVE-2009-00xx/CVE-2009-0059.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0059",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-05T00:30:00.280",
"lastModified": "2024-11-21T00:58:58.233",
"vulnStatus": "Modified",
@@ -144,22 +144,22 @@
"references": [
{
"url": "http://secunia.com/advisories/33749",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6c1dd.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33608",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021679",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/33749",
diff --git a/CVE-2009/CVE-2009-00xx/CVE-2009-0061.json b/CVE-2009/CVE-2009-00xx/CVE-2009-0061.json
index 25fbddfc724..381e366230b 100644
--- a/CVE-2009/CVE-2009-00xx/CVE-2009-0061.json
+++ b/CVE-2009/CVE-2009-00xx/CVE-2009-0061.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0061",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-05T00:30:00.297",
"lastModified": "2024-11-21T00:58:58.350",
"vulnStatus": "Modified",
@@ -144,22 +144,22 @@
"references": [
{
"url": "http://secunia.com/advisories/33749",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6c1dd.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33608",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021679",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/33749",
diff --git a/CVE-2009/CVE-2009-00xx/CVE-2009-0062.json b/CVE-2009/CVE-2009-00xx/CVE-2009-0062.json
index ee14b844b40..8439f5901a8 100644
--- a/CVE-2009/CVE-2009-00xx/CVE-2009-0062.json
+++ b/CVE-2009/CVE-2009-00xx/CVE-2009-0062.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0062",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-05T00:30:00.327",
"lastModified": "2024-11-21T00:58:58.470",
"vulnStatus": "Modified",
@@ -99,22 +99,22 @@
"references": [
{
"url": "http://secunia.com/advisories/33749",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6c1dd.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33608",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021678",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/33749",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0614.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0614.json
index 6fe41e166bb..994b4647da6 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0614.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0614.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0614",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-26T16:17:20.017",
"lastModified": "2024-11-21T01:00:31.313",
"vulnStatus": "Modified",
@@ -83,14 +83,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc86.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33901",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -98,7 +98,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48888",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"VDB Entry"
]
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0615.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0615.json
index 956b0eb594d..7d71043d01f 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0615.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0615.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0615",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-26T16:17:20.030",
"lastModified": "2024-11-21T01:00:31.473",
"vulnStatus": "Modified",
@@ -91,18 +91,18 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33903",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021770",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0616.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0616.json
index 50bf8b9d7f9..2da2004cd52 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0616.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0616.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0616",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-26T16:17:20.047",
"lastModified": "2024-11-21T01:00:31.633",
"vulnStatus": "Modified",
@@ -80,18 +80,18 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33903",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021771",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0617.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0617.json
index eae3a4b44d7..8b06511ae30 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0617.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0617.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0617",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-26T16:17:20.077",
"lastModified": "2024-11-21T01:00:31.773",
"vulnStatus": "Modified",
@@ -80,18 +80,18 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33903",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021771",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0618.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0618.json
index e6c628ab205..5646303a8f1 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0618.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0618.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0618",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-26T16:17:20.093",
"lastModified": "2024-11-21T01:00:31.927",
"vulnStatus": "Modified",
@@ -85,7 +85,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -93,11 +93,11 @@
},
{
"url": "http://www.securityfocus.com/bid/33903",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021772",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0619.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0619.json
index 308d766e858..1b71c912ba2 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0619.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0619.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0619",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-03-05T02:30:00.360",
"lastModified": "2024-11-21T01:00:32.080",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a80faa.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -94,15 +94,15 @@
},
{
"url": "http://www.securityfocus.com/bid/33975",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021787",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49055",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a80faa.shtml",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0620.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0620.json
index 35253211ddb..1c3efb45a40 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0620.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0620.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0620",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-26T16:17:20.127",
"lastModified": "2024-11-21T01:00:32.243",
"vulnStatus": "Modified",
@@ -98,14 +98,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33900",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0621.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0621.json
index 5d349972624..554d010b183 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0621.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0621.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0621",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-26T16:17:20.140",
"lastModified": "2024-11-21T01:00:32.400",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -82,7 +82,7 @@
},
{
"url": "http://www.securityfocus.com/bid/33900",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0622.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0622.json
index 60cc1e67c4a..f5010625938 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0622.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0622.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0622",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-26T16:17:20.157",
"lastModified": "2024-11-21T01:00:32.533",
"vulnStatus": "Modified",
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -120,7 +120,7 @@
},
{
"url": "http://www.securityfocus.com/bid/33900",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0623.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0623.json
index 62121aed726..23ef274a161 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0623.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0623.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0623",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-26T16:17:20.170",
"lastModified": "2024-11-21T01:00:32.720",
"vulnStatus": "Modified",
@@ -114,14 +114,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33900",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0624.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0624.json
index efb54a78892..f525d187e31 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0624.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0624.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0624",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-26T16:17:20.187",
"lastModified": "2024-11-21T01:00:32.883",
"vulnStatus": "Modified",
@@ -133,7 +133,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -141,11 +141,11 @@
},
{
"url": "http://www.securityfocus.com/bid/33900",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021769",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0625.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0625.json
index 0029fdcec72..1a26fa85593 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0625.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0625.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0625",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-02-26T16:17:20.217",
"lastModified": "2024-11-21T01:00:33.013",
"vulnStatus": "Modified",
@@ -104,18 +104,18 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/33900",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021769",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0626.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0626.json
index b449369ce7c..7dfbe42b9ff 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0626.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0626.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0626",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-03-27T16:30:01.953",
"lastModified": "2024-11-21T01:00:33.130",
"vulnStatus": "Modified",
@@ -454,47 +454,47 @@
"references": [
{
"url": "http://secunia.com/advisories/34438",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1021896",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/34239",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0851",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49425",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34438",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0627.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0627.json
index f3baf84cd32..33dc24133cd 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0627.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0627.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0627",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-09-08T23:30:00.500",
"lastModified": "2024-11-21T01:00:33.270",
"vulnStatus": "Modified",
@@ -92,7 +92,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -100,7 +100,7 @@
},
{
"url": "http://www.securitytracker.com/id?1022847",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0628.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0628.json
index 0f19c4c3256..eb0d07cd27d 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0628.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0628.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0628",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-03-27T16:30:01.967",
"lastModified": "2024-11-21T01:00:33.397",
"vulnStatus": "Modified",
@@ -404,47 +404,47 @@
"references": [
{
"url": "http://secunia.com/advisories/34438",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1021896",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/34239",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0851",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49427",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34438",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0629.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0629.json
index a2fd6d3099b..011b99a48ba 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0629.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0629.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0629",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-03-27T16:30:01.983",
"lastModified": "2024-11-21T01:00:33.537",
"vulnStatus": "Modified",
@@ -1004,14 +1004,14 @@
"references": [
{
"url": "http://secunia.com/advisories/34438",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1021903",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1019,21 +1019,21 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904cb.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/34238",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1041,14 +1041,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2009/0851",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49420",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0630.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0630.json
index 3b18a20aeb1..fce531fd7bc 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0630.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0630.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0630",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-03-27T16:30:02.017",
"lastModified": "2024-11-21T01:00:33.693",
"vulnStatus": "Modified",
@@ -1619,43 +1619,43 @@
"references": [
{
"url": "http://secunia.com/advisories/34438",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1021897",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c6.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/34242",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0851",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49418",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34438",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0631.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0631.json
index 975f9b97737..fd90b1e5508 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0631.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0631.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0631",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-03-27T15:16:24.047",
"lastModified": "2024-11-21T01:00:33.853",
"vulnStatus": "Modified",
@@ -1619,7 +1619,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90426.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -1627,7 +1627,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -1635,19 +1635,19 @@
},
{
"url": "http://www.securityfocus.com/bid/34245",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021904",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49419",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6720",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90426.shtml",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0632.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0632.json
index 948ab7537b9..f192a106df8 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0632.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0632.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0632",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-03-12T15:20:49.750",
"lastModified": "2024-11-21T01:00:34.007",
"vulnStatus": "Modified",
@@ -219,19 +219,19 @@
"references": [
{
"url": "http://osvdb.org/52589",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34238",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a86434.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -239,15 +239,15 @@
},
{
"url": "http://www.securityfocus.com/bid/34082",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021839",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0675",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -255,7 +255,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49196",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/52589",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0633.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0633.json
index 42d1b4c74cb..da2fa63e6b3 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0633.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0633.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0633",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-03-27T16:30:02.030",
"lastModified": "2024-11-21T01:00:34.133",
"vulnStatus": "Modified",
@@ -404,47 +404,47 @@
"references": [
{
"url": "http://secunia.com/advisories/34438",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1021898",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/34241",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0851",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34438",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0634.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0634.json
index 0fbc7d0f2e2..64844d5a5c8 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0634.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0634.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0634",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-03-27T16:30:02.063",
"lastModified": "2024-11-21T01:00:34.270",
"vulnStatus": "Modified",
@@ -404,51 +404,51 @@
"references": [
{
"url": "http://secunia.com/advisories/34438",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1021898",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/34241",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0851",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34438",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0635.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0635.json
index 89bcc39b896..a640444aa01 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0635.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0635.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0635",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-03-27T16:30:02.077",
"lastModified": "2024-11-21T01:00:34.410",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://secunia.com/advisories/34438",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90459.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -99,7 +99,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -107,22 +107,22 @@
},
{
"url": "http://www.securityfocus.com/bid/34246",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1021895",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0851",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49417",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34438",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0636.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0636.json
index 771ae40f994..3bf1c162cc1 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0636.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0636.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0636",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-03-27T16:30:02.093",
"lastModified": "2024-11-21T01:00:34.533",
"vulnStatus": "Modified",
@@ -1619,18 +1619,18 @@
"references": [
{
"url": "http://secunia.com/advisories/34438",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1021902",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -1638,7 +1638,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c0.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -1646,18 +1646,18 @@
},
{
"url": "http://www.securityfocus.com/bid/34243",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0851",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49421",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34438",
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0637.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0637.json
index c928cdb0abe..c681b295f89 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0637.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0637.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0637",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-03-27T16:30:02.127",
"lastModified": "2024-11-21T01:00:34.690",
"vulnStatus": "Modified",
@@ -1004,14 +1004,14 @@
"references": [
{
"url": "http://secunia.com/advisories/34438",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1021899",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1019,21 +1019,21 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c8.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/34247",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1041,14 +1041,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2009/0851",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Not Applicable"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49423",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2009/CVE-2009-06xx/CVE-2009-0638.json b/CVE-2009/CVE-2009-06xx/CVE-2009-0638.json
index c45d564e81a..16590f48b4a 100644
--- a/CVE-2009/CVE-2009-06xx/CVE-2009-0638.json
+++ b/CVE-2009/CVE-2009-06xx/CVE-2009-0638.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-0638",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-08-21T11:02:41.640",
"lastModified": "2024-11-21T01:00:34.850",
"vulnStatus": "Modified",
@@ -156,18 +156,18 @@
"references": [
{
"url": "http://secunia.com/advisories/36373",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1022747",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af0d1d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -175,21 +175,21 @@
},
{
"url": "http://www.securityfocus.com/bid/36085",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/2329",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52591",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/36373",
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1154.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1154.json
index e4902d99fec..916844023bf 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1154.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1154.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1154",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-08-21T17:30:00.203",
"lastModified": "2024-11-21T01:01:47.580",
"vulnStatus": "Modified",
@@ -165,11 +165,11 @@
"references": [
{
"url": "http://securitytracker.com/id?1022756",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af150f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1155.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1155.json
index e99ccc1ceef..6cc81780bf2 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1155.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1155.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1155",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-04-09T15:08:35.703",
"lastModified": "2024-11-21T01:01:47.690",
"vulnStatus": "Modified",
@@ -109,15 +109,15 @@
"references": [
{
"url": "http://osvdb.org/53441",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34607",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a994f6.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -125,15 +125,15 @@
},
{
"url": "http://www.securityfocus.com/bid/34429",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022016",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0981",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/53441",
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1156.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1156.json
index bf62af9fb60..212d7667f47 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1156.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1156.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1156",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-04-09T15:08:35.717",
"lastModified": "2024-11-21T01:01:47.803",
"vulnStatus": "Modified",
@@ -89,15 +89,15 @@
"references": [
{
"url": "http://osvdb.org/53442",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34607",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a994f6.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -105,15 +105,15 @@
},
{
"url": "http://www.securityfocus.com/bid/34429",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022015",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0981",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/53442",
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1157.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1157.json
index 6bf6cc95d4f..7d87059645a 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1157.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1157.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1157",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-04-09T15:08:35.750",
"lastModified": "2024-11-21T01:01:47.920",
"vulnStatus": "Modified",
@@ -119,15 +119,15 @@
"references": [
{
"url": "http://osvdb.org/53445",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34607",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a994f6.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -135,15 +135,15 @@
},
{
"url": "http://www.securityfocus.com/bid/34429",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022015",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0981",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/53445",
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1158.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1158.json
index 85b5d07d784..250a7b5cfb1 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1158.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1158.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1158",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-04-09T15:08:35.767",
"lastModified": "2024-11-21T01:01:48.030",
"vulnStatus": "Modified",
@@ -119,15 +119,15 @@
"references": [
{
"url": "http://osvdb.org/53444",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34607",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a994f6.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -135,15 +135,15 @@
},
{
"url": "http://www.securityfocus.com/bid/34429",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022015",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0981",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/53444",
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1159.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1159.json
index c700ddf8d01..7c749a036c6 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1159.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1159.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1159",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-04-09T15:08:35.780",
"lastModified": "2024-11-21T01:01:48.137",
"vulnStatus": "Modified",
@@ -99,15 +99,15 @@
"references": [
{
"url": "http://osvdb.org/53446",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34607",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a994f6.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -115,15 +115,15 @@
},
{
"url": "http://www.securityfocus.com/bid/34429",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022015",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0981",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/53446",
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1160.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1160.json
index 35c8f76c69b..7c8f539c4ec 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1160.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1160.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1160",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-04-09T15:08:35.797",
"lastModified": "2024-11-21T01:01:48.250",
"vulnStatus": "Modified",
@@ -114,11 +114,11 @@
"references": [
{
"url": "http://secunia.com/advisories/34607",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a994f6.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -126,15 +126,15 @@
},
{
"url": "http://www.securityfocus.com/bid/34429",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022017",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0981",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34607",
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1161.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1161.json
index 37182be210d..3bb575af802 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1161.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1161.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1161",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-05-21T14:30:00.390",
"lastModified": "2024-11-21T01:01:48.360",
"vulnStatus": "Modified",
@@ -241,27 +241,27 @@
"references": [
{
"url": "http://jvn.jp/en/jp/JVN62527913/index.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000032.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/54616",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/35179",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1022263",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ab7b56.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -269,11 +269,11 @@
},
{
"url": "http://www.securityfocus.com/bid/35040",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/1390",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://jvn.jp/en/jp/JVN62527913/index.html",
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1162.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1162.json
index eda4b21bbbf..cce297abce6 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1162.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1162.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1162",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-06-05T16:00:00.280",
"lastModified": "2024-11-21T01:01:48.467",
"vulnStatus": "Modified",
@@ -156,33 +156,33 @@
"references": [
{
"url": "http://osvdb.org/54884",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/34895",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18365",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/35203",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022335",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50948",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/54884",
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1163.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1163.json
index defae119b04..a5f7f80dce8 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1163.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1163.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1163",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-06-25T01:30:01.687",
"lastModified": "2024-11-21T01:01:48.577",
"vulnStatus": "Modified",
@@ -75,11 +75,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080ad0fb2.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ad0f8b.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -87,11 +87,11 @@
},
{
"url": "http://www.securityfocus.com/bid/35477",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022444",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080ad0fb2.html",
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1164.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1164.json
index e6f01c44b33..4707ad45009 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1164.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1164.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1164",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-07-29T17:30:01.017",
"lastModified": "2024-11-21T01:01:48.680",
"vulnStatus": "Modified",
@@ -194,7 +194,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080adb3d7.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -202,7 +202,7 @@
},
{
"url": "http://www.vupen.com/english/advisories/2009/2021",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080adb3d7.shtml",
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1165.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1165.json
index 092cb1231ae..8d750792501 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1165.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1165.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1165",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-07-29T17:30:01.047",
"lastModified": "2024-11-21T01:01:48.787",
"vulnStatus": "Modified",
@@ -254,7 +254,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080adb3d7.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -262,15 +262,15 @@
},
{
"url": "http://www.securityfocus.com/bid/35817",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022605",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2021",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080adb3d7.shtml",
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1166.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1166.json
index ba1b31cc974..8f816e23040 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1166.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1166.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1166",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-07-29T17:30:01.077",
"lastModified": "2024-11-21T01:01:48.900",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080adb3d7.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -82,11 +82,11 @@
},
{
"url": "http://www.securitytracker.com/id?1022605",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2021",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080adb3d7.shtml",
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1167.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1167.json
index 0eca11bfc41..20975f08fca 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1167.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1167.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1167",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-07-29T17:30:01.110",
"lastModified": "2024-11-21T01:01:49.007",
"vulnStatus": "Modified",
@@ -254,18 +254,18 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080adb3d7.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1022606",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2021",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080adb3d7.shtml",
diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1168.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1168.json
index 4a96951ea11..07f51bb3ecb 100644
--- a/CVE-2009/CVE-2009-11xx/CVE-2009-1168.json
+++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1168.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-1168",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-07-30T18:30:00.203",
"lastModified": "2024-11-21T01:01:49.120",
"vulnStatus": "Modified",
@@ -144,11 +144,11 @@
"references": [
{
"url": "http://secunia.com/advisories/36046",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -156,19 +156,19 @@
},
{
"url": "http://www.securityfocus.com/bid/35862",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022619",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2082",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6697",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/36046",
diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2045.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2045.json
index 68ec73063ad..d330903eb4a 100644
--- a/CVE-2009/CVE-2009-20xx/CVE-2009-2045.json
+++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2045.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2045",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-06-25T01:30:01.780",
"lastModified": "2024-11-21T01:04:00.223",
"vulnStatus": "Modified",
@@ -97,11 +97,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080ad1002.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ad0f8f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -109,7 +109,7 @@
},
{
"url": "http://www.securitytracker.com/id?1022446",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080ad1002.html",
diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2046.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2046.json
index d9e3c1ac4eb..3209d2914c3 100644
--- a/CVE-2009/CVE-2009-20xx/CVE-2009-2046.json
+++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2046.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2046",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-06-25T01:30:01.797",
"lastModified": "2024-11-21T01:04:00.327",
"vulnStatus": "Modified",
@@ -75,11 +75,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080ad1002.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ad0f8f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -87,11 +87,11 @@
},
{
"url": "http://www.securityfocus.com/bid/35478",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022445",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080ad1002.html",
diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2047.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2047.json
index 22981ad07e4..5c1564ea5c1 100644
--- a/CVE-2009/CVE-2009-20xx/CVE-2009-2047.json
+++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2047.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2047",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-07-16T15:30:00.750",
"lastModified": "2024-11-21T01:04:00.427",
"vulnStatus": "Modified",
@@ -234,15 +234,15 @@
"references": [
{
"url": "http://osvdb.org/55936",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/35861",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -250,22 +250,22 @@
},
{
"url": "http://www.securityfocus.com/bid/35706",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securitytracker.com/id?1022569",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/1913",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51731",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/55936",
diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2048.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2048.json
index 3a71bb6f6b8..6d04c2d853b 100644
--- a/CVE-2009/CVE-2009-20xx/CVE-2009-2048.json
+++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2048.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2048",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-07-16T15:30:00.767",
"lastModified": "2024-11-21T01:04:00.537",
"vulnStatus": "Modified",
@@ -234,15 +234,15 @@
"references": [
{
"url": "http://osvdb.org/55937",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/35861",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -250,19 +250,19 @@
},
{
"url": "http://www.securityfocus.com/bid/35705",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022569",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/1913",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51730",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/55937",
diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2049.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2049.json
index 9c4539a7348..925d3f663d6 100644
--- a/CVE-2009/CVE-2009-20xx/CVE-2009-2049.json
+++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2049.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2049",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-07-30T18:30:00.233",
"lastModified": "2024-11-21T01:04:00.653",
"vulnStatus": "Modified",
@@ -144,11 +144,11 @@
"references": [
{
"url": "http://secunia.com/advisories/36046",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -156,19 +156,19 @@
},
{
"url": "http://www.securityfocus.com/bid/35860",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022619",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2082",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6853",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/36046",
diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2050.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2050.json
index e9af0587f68..0b30ddddb2b 100644
--- a/CVE-2009/CVE-2009-20xx/CVE-2009-2050.json
+++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2050.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2050",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-08-27T17:00:00.877",
"lastModified": "2024-11-21T01:04:00.760",
"vulnStatus": "Modified",
@@ -75,28 +75,28 @@
"references": [
{
"url": "http://osvdb.org/57452",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/36495",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/36499",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securityfocus.com/bid/36152",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "http://www.securitytracker.com/id?1022775",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2051.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2051.json
index 72a3bcc4066..041d2bc7510 100644
--- a/CVE-2009/CVE-2009-20xx/CVE-2009-2051.json
+++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2051.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2051",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-08-27T17:00:00.953",
"lastModified": "2024-11-21T01:04:00.877",
"vulnStatus": "Modified",
@@ -111,28 +111,28 @@
"references": [
{
"url": "http://osvdb.org/57453",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/36498",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/36499",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -140,14 +140,14 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a30f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/36152",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -155,7 +155,7 @@
},
{
"url": "http://www.securitytracker.com/id?1022775",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2052.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2052.json
index 73d3dcadace..d5332849d4d 100644
--- a/CVE-2009/CVE-2009-20xx/CVE-2009-2052.json
+++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2052.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2052",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-08-27T17:00:01.000",
"lastModified": "2024-11-21T01:04:01.017",
"vulnStatus": "Modified",
@@ -97,28 +97,28 @@
"references": [
{
"url": "http://secunia.com/advisories/36498",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/36499",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/37039",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1023018",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -134,14 +134,14 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080afc930.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/36152",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "http://www.securityfocus.com/bid/36676",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -157,7 +157,7 @@
},
{
"url": "http://www.securitytracker.com/id?1022775",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -165,7 +165,7 @@
},
{
"url": "http://www.vupen.com/english/advisories/2009/2915",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2053.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2053.json
index 711c12a8fe7..20899398c7f 100644
--- a/CVE-2009/CVE-2009-20xx/CVE-2009-2053.json
+++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2053.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2053",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-08-27T17:00:01.030",
"lastModified": "2024-11-21T01:04:01.140",
"vulnStatus": "Modified",
@@ -97,28 +97,28 @@
"references": [
{
"url": "http://osvdb.org/57455",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/36498",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/36499",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securityfocus.com/bid/36152",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id?1022775",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2054.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2054.json
index 66ed1d7c7e3..1ede3dafd97 100644
--- a/CVE-2009/CVE-2009-20xx/CVE-2009-2054.json
+++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2054.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2054",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-08-27T17:00:01.047",
"lastModified": "2024-11-21T01:04:01.247",
"vulnStatus": "Modified",
@@ -97,28 +97,28 @@
"references": [
{
"url": "http://osvdb.org/57456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/36498",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/36499",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Patch",
@@ -127,7 +127,7 @@
},
{
"url": "http://www.securityfocus.com/bid/36152",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -136,7 +136,7 @@
},
{
"url": "http://www.securitytracker.com/id?1022775",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2055.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2055.json
index 8a5356faf9e..bbff9bf9d6d 100644
--- a/CVE-2009/CVE-2009-20xx/CVE-2009-2055.json
+++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2055.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2055",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-08-19T17:30:01.047",
"lastModified": "2025-01-06T19:08:16.263",
"vulnStatus": "Analyzed",
@@ -168,21 +168,21 @@
"references": [
{
"url": "http://mailman.nanog.org/pipermail/nanog/2009-August/012719.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://securitytracker.com/id?1022739",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af150f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2056.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2056.json
index 9d18581b5aa..3574503c9ea 100644
--- a/CVE-2009/CVE-2009-20xx/CVE-2009-2056.json
+++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2056.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2056",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-08-21T17:30:00.297",
"lastModified": "2024-11-21T01:04:01.500",
"vulnStatus": "Modified",
@@ -235,11 +235,11 @@
"references": [
{
"url": "http://securitytracker.com/id?1022756",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af150f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2861.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2861.json
index 31fb807cfb7..587425c0587 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2861.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2861.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2861",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-08-27T17:00:01.077",
"lastModified": "2024-11-21T01:05:55.540",
"vulnStatus": "Modified",
@@ -79,11 +79,11 @@
"references": [
{
"url": "http://securitytracker.com/id?1022774",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -91,19 +91,19 @@
},
{
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/36145",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2419",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2862.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2862.json
index d75a6963496..e072abdbb55 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2862.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2862.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2862",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-09-28T19:30:01.217",
"lastModified": "2024-11-21T01:05:55.667",
"vulnStatus": "Modified",
@@ -104,28 +104,28 @@
"references": [
{
"url": "http://osvdb.org/58338",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18876",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8119.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/36495",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -133,7 +133,7 @@
},
{
"url": "http://www.securitytracker.com/id?1022933",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -142,7 +142,7 @@
},
{
"url": "http://www.vupen.com/english/advisories/2009/2759",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2863.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2863.json
index 8af8a4a4453..a9c8d8d1115 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2863.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2863.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2863",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-09-28T19:30:01.313",
"lastModified": "2024-11-21T01:05:55.833",
"vulnStatus": "Modified",
@@ -749,33 +749,33 @@
"references": [
{
"url": "http://osvdb.org/58340",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18882",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8132.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/36491",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022935",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53453",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/58340",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2864.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2864.json
index 09f50c126d4..c2b8068472a 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2864.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2864.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2864",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-09-28T19:30:01.360",
"lastModified": "2024-11-21T01:05:55.973",
"vulnStatus": "Modified",
@@ -299,47 +299,47 @@
"references": [
{
"url": "http://osvdb.org/58344",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/36836",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18883",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8118.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/36496",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022931",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2757",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53447",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/58344",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2865.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2865.json
index 99864dd5c09..f0e14eb2b61 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2865.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2865.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2865",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-09-28T19:30:01.377",
"lastModified": "2024-11-21T01:05:56.103",
"vulnStatus": "Modified",
@@ -101,11 +101,11 @@
"references": [
{
"url": "http://osvdb.org/58335",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18884",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -113,7 +113,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8116.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -121,22 +121,22 @@
},
{
"url": "http://www.securityfocus.com/bid/36498",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022932",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2758",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53448",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/58335",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2866.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2866.json
index d5098b3ba41..a704945c9cf 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2866.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2866.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2866",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-09-28T19:30:01.390",
"lastModified": "2024-11-21T01:05:56.230",
"vulnStatus": "Modified",
@@ -429,11 +429,11 @@
"references": [
{
"url": "http://osvdb.org/58337",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18885",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -441,7 +441,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af811a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -449,19 +449,19 @@
},
{
"url": "http://www.securityfocus.com/bid/36494",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1022930",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2759",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53446",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/58337",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2867.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2867.json
index 7775b293800..b9341af6e97 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2867.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2867.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2867",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-09-28T19:30:01.420",
"lastModified": "2024-11-21T01:05:56.363",
"vulnStatus": "Modified",
@@ -109,29 +109,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18886",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8130.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1022930",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2759",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7254",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18886",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2868.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2868.json
index c88e128528e..a9047b104e2 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2868.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2868.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2868",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-09-28T19:30:01.437",
"lastModified": "2024-11-21T01:05:56.477",
"vulnStatus": "Modified",
@@ -269,21 +269,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18887",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8117.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/2759",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18887",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2869.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2869.json
index 1e09a38dc57..ce31833472f 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2869.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2869.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2869",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-09-28T19:30:01.467",
"lastModified": "2024-11-21T01:05:56.607",
"vulnStatus": "Modified",
@@ -119,33 +119,33 @@
"references": [
{
"url": "http://osvdb.org/58342",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18889",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8131.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1022930",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2759",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6712",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/58342",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2870.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2870.json
index b873aefac1e..a4df6bb9a0c 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2870.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2870.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2870",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-09-28T19:30:01.483",
"lastModified": "2024-11-21T01:05:56.720",
"vulnStatus": "Modified",
@@ -164,25 +164,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18891",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af811b.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1022930",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2759",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18891",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2871.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2871.json
index 38025d05252..2c641a503f0 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2871.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2871.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2871",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-09-28T19:30:01.517",
"lastModified": "2024-11-21T01:05:56.843",
"vulnStatus": "Modified",
@@ -154,25 +154,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18892",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af811c.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1022930",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2759",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18892",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2872.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2872.json
index 9b4d442335f..7b23c83c9d7 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2872.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2872.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2872",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-09-28T19:30:01.530",
"lastModified": "2024-11-21T01:05:56.960",
"vulnStatus": "Modified",
@@ -1509,43 +1509,43 @@
"references": [
{
"url": "http://osvdb.org/58333",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18893",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080af8113.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8115.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep09.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1022930",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2759",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/58333",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2873.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2873.json
index d9e2d53a989..4a894a4deae 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2873.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2873.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2873",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-09-28T19:30:01.563",
"lastModified": "2024-11-21T01:05:57.103",
"vulnStatus": "Modified",
@@ -1589,11 +1589,11 @@
"references": [
{
"url": "http://osvdb.org/58334",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18895",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -1601,7 +1601,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080af8113.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -1609,7 +1609,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af8115.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -1617,18 +1617,18 @@
},
{
"url": "http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep09.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1022930",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2759",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/58334",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2874.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2874.json
index c53feeb018d..6a6a0d91fcd 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2874.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2874.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2874",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-10-16T16:30:00.640",
"lastModified": "2024-11-21T01:05:57.250",
"vulnStatus": "Modified",
@@ -129,18 +129,18 @@
"references": [
{
"url": "http://secunia.com/advisories/37039",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1023018",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080afc930.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -148,18 +148,18 @@
},
{
"url": "http://www.securityfocus.com/bid/36675",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/2915",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53772",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/37039",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2875.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2875.json
index d43ef4f0875..aea2c056cab 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2875.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2875.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2875",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-12-18T19:30:00.313",
"lastModified": "2024-11-21T01:05:57.377",
"vulnStatus": "Modified",
@@ -99,18 +99,18 @@
"references": [
{
"url": "http://secunia.com/advisories/37810",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1023360",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=19499",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -118,7 +118,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -126,7 +126,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -134,7 +134,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -142,7 +142,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -150,7 +150,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -158,7 +158,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -166,7 +166,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -174,23 +174,23 @@
},
{
"url": "http://www.fortiguard.com/advisory/FGA-2009-48.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.atas32.dos.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.osvdb.org/61125",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/37352",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/3574",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -198,7 +198,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54841",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/37810",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2876.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2876.json
index 70703d53afe..a8563609ec7 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2876.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2876.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2876",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-12-18T19:30:00.343",
"lastModified": "2024-11-21T01:05:57.530",
"vulnStatus": "Modified",
@@ -99,22 +99,22 @@
"references": [
{
"url": "http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-012-cisco.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/37810",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1023360",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=19499",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -122,7 +122,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -130,7 +130,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -138,7 +138,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -146,7 +146,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -154,7 +154,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -162,7 +162,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -170,7 +170,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -178,26 +178,26 @@
},
{
"url": "http://www.fortiguard.com/advisory/FGA-2009-48.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.osvdb.org/61126",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/37352",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/3574",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54841",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-012-cisco.html",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2877.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2877.json
index 438029d7c1f..bc38e1ce5a0 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2877.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2877.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2877",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-12-18T19:30:00.390",
"lastModified": "2024-11-21T01:05:57.657",
"vulnStatus": "Modified",
@@ -99,18 +99,18 @@
"references": [
{
"url": "http://secunia.com/advisories/37810",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1023360",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=19499",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -118,7 +118,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -126,7 +126,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -134,7 +134,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -142,7 +142,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -150,7 +150,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -158,7 +158,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -166,7 +166,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -174,19 +174,19 @@
},
{
"url": "http://www.fortiguard.com/advisory/FGA-2009-48.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.ataudio.buffer.overflow.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.osvdb.org/61127",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/37352",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -194,7 +194,7 @@
},
{
"url": "http://www.vupen.com/english/advisories/2009/3574",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -202,7 +202,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54841",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/37810",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2878.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2878.json
index 2c5521935e1..1fd595f6d09 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2878.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2878.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2878",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-12-18T19:30:00.420",
"lastModified": "2024-11-21T01:05:57.790",
"vulnStatus": "Modified",
@@ -99,32 +99,32 @@
"references": [
{
"url": "http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-013-cisco.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/37810",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1023360",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=19499",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -132,7 +132,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -140,7 +140,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -148,7 +148,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -156,7 +156,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -164,7 +164,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -172,7 +172,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -180,19 +180,19 @@
},
{
"url": "http://www.fortiguard.com/advisory/FGA-2009-48.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.osvdb.org/61128",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/37352",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/3574",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -200,7 +200,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54841",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-013-cisco.html",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2879.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2879.json
index bb72d6ce076..c5a7ab38ea8 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2879.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2879.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2879",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-12-18T19:30:00.453",
"lastModified": "2024-11-21T01:05:57.933",
"vulnStatus": "Modified",
@@ -99,18 +99,18 @@
"references": [
{
"url": "http://secunia.com/advisories/37810",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1023360",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=19499",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -118,7 +118,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -126,7 +126,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -134,7 +134,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -142,7 +142,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -150,7 +150,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -158,7 +158,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -166,7 +166,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -174,23 +174,23 @@
},
{
"url": "http://www.fortiguard.com/advisory/FGA-2009-48.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.atas32.heap.overflow.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.osvdb.org/61129",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/37352",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/3574",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -198,7 +198,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54841",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/37810",
diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2880.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2880.json
index 187dfbf4ebf..3b31e923bea 100644
--- a/CVE-2009/CVE-2009-28xx/CVE-2009-2880.json
+++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2880.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2009-2880",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2009-12-18T19:30:00.483",
"lastModified": "2024-11-21T01:05:58.077",
"vulnStatus": "Modified",
@@ -99,18 +99,18 @@
"references": [
{
"url": "http://secunia.com/advisories/37810",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1023360",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=19499",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -118,7 +118,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -126,7 +126,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -134,7 +134,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -142,7 +142,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -150,7 +150,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -158,7 +158,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -166,7 +166,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -174,23 +174,23 @@
},
{
"url": "http://www.fortiguard.com/advisory/FGA-2009-48.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.atrpui.dos.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.osvdb.org/61130",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/37352",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/3574",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -198,7 +198,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54841",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/37810",
diff --git a/CVE-2009/CVE-2009-39xx/CVE-2009-3960.json b/CVE-2009/CVE-2009-39xx/CVE-2009-3960.json
index bafcd26a80a..f1755327d99 100644
--- a/CVE-2009/CVE-2009-39xx/CVE-2009-3960.json
+++ b/CVE-2009/CVE-2009-39xx/CVE-2009-3960.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@adobe.com",
"published": "2010-02-15T18:30:00.407",
"lastModified": "2024-12-19T18:09:00.497",
- "vulnStatus": "Analyzed",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0137.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0137.json
index 7069aac5b5e..6ed4343421b 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0137.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0137.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0137",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-01-21T22:30:00.460",
"lastModified": "2024-11-21T01:11:36.543",
"vulnStatus": "Modified",
@@ -114,18 +114,18 @@
"references": [
{
"url": "http://secunia.com/advisories/38227",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1023480",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b13512.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -133,18 +133,18 @@
},
{
"url": "http://www.securityfocus.com/bid/37878",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0183",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55767",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38227",
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0138.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0138.json
index 5ca84229e02..59a1b69d379 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0138.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0138.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0138",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-01-21T22:30:00.523",
"lastModified": "2024-11-21T01:11:36.650",
"vulnStatus": "Modified",
@@ -97,40 +97,40 @@
"references": [
{
"url": "http://secunia.com/advisories/38230",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1023484",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1351d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/37879",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0184",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-004/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55768",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38230",
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0139.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0139.json
index 1474a21fbdf..d84fe095622 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0139.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0139.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0139",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-01-28T20:30:01.417",
"lastModified": "2024-11-21T01:11:36.760",
"vulnStatus": "Modified",
@@ -109,7 +109,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1490b.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -117,7 +117,7 @@
},
{
"url": "http://www.securityfocus.com/bid/37965",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1490b.shtml",
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0140.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0140.json
index ab71029ff2e..0f641dcda64 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0140.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0140.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0140",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-01-28T20:30:01.480",
"lastModified": "2024-11-21T01:11:36.863",
"vulnStatus": "Modified",
@@ -104,7 +104,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1490b.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -112,7 +112,7 @@
},
{
"url": "http://www.securityfocus.com/bid/37965",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1490b.shtml",
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0141.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0141.json
index 15619ccaeeb..4fc6e82e59b 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0141.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0141.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0141",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-01-28T20:30:01.527",
"lastModified": "2024-11-21T01:11:36.970",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1490b.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -92,7 +92,7 @@
},
{
"url": "http://www.securityfocus.com/bid/37965",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1490b.shtml",
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0142.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0142.json
index 1fb71577406..7e765d07c18 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0142.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0142.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0142",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-01-28T20:30:01.557",
"lastModified": "2024-11-21T01:11:37.073",
"vulnStatus": "Modified",
@@ -89,7 +89,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1490b.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -97,7 +97,7 @@
},
{
"url": "http://www.securityfocus.com/bid/37965",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1490b.shtml",
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0143.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0143.json
index 36dcafdaf66..7f90617da8f 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0143.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0143.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0143",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-02-11T17:30:00.657",
"lastModified": "2024-11-21T01:11:37.207",
"vulnStatus": "Modified",
@@ -154,18 +154,18 @@
"references": [
{
"url": "http://secunia.com/advisories/38525",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080b17904.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b17903.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0144.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0144.json
index 794970dd6a6..056879fd7c1 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0144.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0144.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0144",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-02-11T17:30:00.767",
"lastModified": "2024-11-21T01:11:37.327",
"vulnStatus": "Modified",
@@ -154,18 +154,18 @@
"references": [
{
"url": "http://secunia.com/advisories/38525",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080b17904.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b17903.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0145.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0145.json
index eba789731f5..62b56f3cfe9 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0145.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0145.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0145",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-02-11T17:30:00.813",
"lastModified": "2024-11-21T01:11:37.450",
"vulnStatus": "Modified",
@@ -154,18 +154,18 @@
"references": [
{
"url": "http://secunia.com/advisories/38525",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080b17904.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b17903.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0146.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0146.json
index 6a3f17c11fd..8c5be19a4d9 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0146.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0146.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0146",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-02-23T20:30:00.593",
"lastModified": "2024-11-21T01:11:37.563",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/62443",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38619",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -93,22 +93,22 @@
},
{
"url": "http://www.securityfocus.com/bid/38271",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023606",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0416",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56345",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/62443",
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0147.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0147.json
index cbf084c3959..04c5dc958c8 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0147.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0147.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0147",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-02-23T20:30:00.627",
"lastModified": "2024-11-21T01:11:37.680",
"vulnStatus": "Modified",
@@ -84,11 +84,11 @@
"references": [
{
"url": "http://osvdb.org/62444",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38619",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -96,7 +96,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -104,22 +104,22 @@
},
{
"url": "http://www.securityfocus.com/bid/38272",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023606",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0416",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56346",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/62444",
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0148.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0148.json
index 5e23158d0e0..16fb9957bbf 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0148.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0148.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0148",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-02-23T20:30:00.670",
"lastModified": "2024-11-21T01:11:37.793",
"vulnStatus": "Modified",
@@ -86,11 +86,11 @@
"references": [
{
"url": "http://osvdb.org/62445",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38619",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -98,7 +98,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -106,22 +106,22 @@
},
{
"url": "http://www.securityfocus.com/bid/38273",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023607",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0416",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56347",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/62445",
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0149.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0149.json
index 14958e487f0..c42c258b02e 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0149.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0149.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0149",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-02-19T17:30:00.723",
"lastModified": "2024-11-21T01:11:37.910",
"vulnStatus": "Modified",
@@ -99,47 +99,47 @@
"references": [
{
"url": "http://osvdb.org/62433",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38618",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/38636",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/38275",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023612",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0415",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56336",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/62433",
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0150.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0150.json
index 827a506f5c3..aa1d8e63171 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0150.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0150.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0150",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-02-19T17:30:00.753",
"lastModified": "2024-11-21T01:11:38.023",
"vulnStatus": "Modified",
@@ -99,47 +99,47 @@
"references": [
{
"url": "http://osvdb.org/62434",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38618",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/38636",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/38277",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023612",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0415",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56338",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/62434",
diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0151.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0151.json
index ed1b6ea0868..8a64c82a316 100644
--- a/CVE-2010/CVE-2010-01xx/CVE-2010-0151.json
+++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0151.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0151",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-02-19T17:30:00.787",
"lastModified": "2024-11-21T01:11:38.140",
"vulnStatus": "Modified",
@@ -141,18 +141,18 @@
"references": [
{
"url": "http://osvdb.org/62432",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38621",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -160,7 +160,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -168,19 +168,19 @@
},
{
"url": "http://www.securityfocus.com/bid/38274",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023609",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0418",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56333",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/62432",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0565.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0565.json
index c26927bfe04..2256ab00e13 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0565.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0565.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0565",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-02-19T17:30:00.847",
"lastModified": "2024-11-21T01:12:27.853",
"vulnStatus": "Modified",
@@ -99,37 +99,37 @@
"references": [
{
"url": "http://osvdb.org/62430",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38618",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/38280",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023612",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0415",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56339",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/62430",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0566.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0566.json
index e0a5475090f..f5480edfeff 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0566.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0566.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0566",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-02-19T17:30:00.880",
"lastModified": "2024-11-21T01:12:27.963",
"vulnStatus": "Modified",
@@ -99,40 +99,40 @@
"references": [
{
"url": "http://osvdb.org/62431",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38618",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/38278",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023612",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0415",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56340",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/62431",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0567.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0567.json
index 4186334726a..396de0e88b4 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0567.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0567.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0567",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-02-19T17:30:00.910",
"lastModified": "2024-11-21T01:12:28.073",
"vulnStatus": "Modified",
@@ -99,47 +99,47 @@
"references": [
{
"url": "http://osvdb.org/62436",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38618",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/38636",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/38279",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023612",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0415",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56341",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/62436",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0568.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0568.json
index 2e83907bd4d..a359e54c434 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0568.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0568.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0568",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-02-19T17:30:00.957",
"lastModified": "2024-11-21T01:12:28.190",
"vulnStatus": "Modified",
@@ -99,47 +99,47 @@
"references": [
{
"url": "http://osvdb.org/62437",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38618",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/38636",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/38279",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023612",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0415",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56342",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/62437",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0569.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0569.json
index 584cf5a5cfc..45d418eb18c 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0569.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0569.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0569",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-02-19T17:30:00.987",
"lastModified": "2024-11-21T01:12:28.303",
"vulnStatus": "Modified",
@@ -99,47 +99,47 @@
"references": [
{
"url": "http://osvdb.org/62435",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38618",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/38636",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/38281",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023612",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0415",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56337",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/62435",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0570.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0570.json
index 23a18683c83..1418913f94f 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0570.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0570.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0570",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-05T19:30:00.627",
"lastModified": "2024-11-21T01:12:28.430",
"vulnStatus": "Modified",
@@ -94,15 +94,15 @@
"references": [
{
"url": "http://secunia.com/advisories/38800",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1023671",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b923.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -110,15 +110,15 @@
},
{
"url": "http://www.securityfocus.com/bid/38503",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0531",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56634",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38800",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0571.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0571.json
index 2a32fd09191..63437859404 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0571.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0571.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0571",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-05T19:30:00.657",
"lastModified": "2024-11-21T01:12:28.540",
"vulnStatus": "Modified",
@@ -98,15 +98,15 @@
"references": [
{
"url": "http://secunia.com/advisories/38800",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1023671",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b923.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -114,15 +114,15 @@
},
{
"url": "http://www.securityfocus.com/bid/38500",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0531",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56636",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38800",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0572.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0572.json
index 1a96f80c4b2..bc7b3e21f37 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0572.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0572.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0572",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-05T19:30:00.687",
"lastModified": "2024-11-21T01:12:28.647",
"vulnStatus": "Modified",
@@ -95,15 +95,15 @@
"references": [
{
"url": "http://secunia.com/advisories/38800",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1023671",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b923.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -111,15 +111,15 @@
},
{
"url": "http://www.securityfocus.com/bid/38502",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0531",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56637",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38800",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0573.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0573.json
index ef648f1f893..457972ca1e9 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0573.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0573.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0573",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-05T19:30:00.720",
"lastModified": "2024-11-21T01:12:28.753",
"vulnStatus": "Modified",
@@ -89,19 +89,19 @@
"references": [
{
"url": "http://osvdb.org/62723",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/38799",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1023672",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b925.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -109,15 +109,15 @@
},
{
"url": "http://www.securityfocus.com/bid/38504",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0532",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56639",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/62723",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0574.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0574.json
index 908db293a3c..397c03777ac 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0574.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0574.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0574",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-10T18:00:01.800",
"lastModified": "2024-11-21T01:12:28.863",
"vulnStatus": "Modified",
@@ -299,14 +299,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21287",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0575.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0575.json
index 2361f71e74e..8a5bab7e0c8 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0575.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0575.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0575",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-10T18:00:01.863",
"lastModified": "2024-11-21T01:12:28.970",
"vulnStatus": "Modified",
@@ -159,7 +159,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21291",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -167,7 +167,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0576.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0576.json
index b22e592aac5..b8f126641bb 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0576.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0576.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0576",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-25T21:00:00.657",
"lastModified": "2024-11-21T01:12:29.120",
"vulnStatus": "Modified",
@@ -1019,15 +1019,15 @@
"references": [
{
"url": "http://osvdb.org/63188",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/39065",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee2.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -1035,19 +1035,19 @@
},
{
"url": "http://www.securityfocus.com/bid/38938",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023740",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0707",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57143",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/63188",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0577.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0577.json
index 5a630e4721e..4605105334a 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0577.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0577.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0577",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-25T21:00:00.687",
"lastModified": "2024-11-21T01:12:29.243",
"vulnStatus": "Modified",
@@ -749,15 +749,15 @@
"references": [
{
"url": "http://osvdb.org/63178",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/39078",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f34.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -765,19 +765,19 @@
},
{
"url": "http://www.securityfocus.com/bid/38930",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023743",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0703",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57129",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/63178",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0578.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0578.json
index b4baa96d855..73f1a4ed543 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0578.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0578.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0578",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-25T21:00:00.733",
"lastModified": "2024-11-21T01:12:29.387",
"vulnStatus": "Modified",
@@ -396,15 +396,15 @@
"references": [
{
"url": "http://osvdb.org/63182",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/39057",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee5.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -412,19 +412,19 @@
},
{
"url": "http://www.securityfocus.com/bid/38932",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023741",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0709",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57148",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/63182",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0579.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0579.json
index 139f39d247f..7d687090e83 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0579.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0579.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0579",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-25T21:00:00.767",
"lastModified": "2024-11-21T01:12:29.513",
"vulnStatus": "Modified",
@@ -284,15 +284,15 @@
"references": [
{
"url": "http://secunia.com/advisories/39068",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1023744",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=20063",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -300,7 +300,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f32.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0580.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0580.json
index 9c1751d487b..271bd67ae30 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0580.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0580.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0580",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-25T21:00:00.797",
"lastModified": "2024-11-21T01:12:29.627",
"vulnStatus": "Modified",
@@ -284,15 +284,15 @@
"references": [
{
"url": "http://secunia.com/advisories/39068",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1023744",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=20064",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -300,7 +300,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f32.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0581.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0581.json
index aea652aa922..e829c6beddb 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0581.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0581.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0581",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-25T21:00:00.827",
"lastModified": "2024-11-21T01:12:29.737",
"vulnStatus": "Modified",
@@ -289,15 +289,15 @@
"references": [
{
"url": "http://secunia.com/advisories/39068",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1023744",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=20065",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -305,7 +305,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f32.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0582.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0582.json
index 02ac9b0a00d..31cca3a5da0 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0582.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0582.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0582",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-25T21:00:00.860",
"lastModified": "2024-11-21T01:12:29.853",
"vulnStatus": "Modified",
@@ -574,11 +574,11 @@
"references": [
{
"url": "http://secunia.com/advisories/39067",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee4.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -586,11 +586,11 @@
},
{
"url": "http://www.securitytracker.com/id?1023742",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0706",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/39067",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0583.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0583.json
index d007aded882..29a44b7a6f4 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0583.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0583.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0583",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-25T21:00:00.877",
"lastModified": "2024-11-21T01:12:29.970",
"vulnStatus": "Modified",
@@ -84,15 +84,15 @@
"references": [
{
"url": "http://osvdb.org/63181",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/39067",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee4.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -100,19 +100,19 @@
},
{
"url": "http://www.securityfocus.com/bid/38934",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023742",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0706",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57140",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/63181",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0584.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0584.json
index 232c3b07307..f3644887afb 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0584.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0584.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0584",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-25T21:00:00.907",
"lastModified": "2024-11-21T01:12:30.083",
"vulnStatus": "Modified",
@@ -199,26 +199,26 @@
"references": [
{
"url": "http://osvdb.org/63187",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/39062",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee6.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1023739",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0708",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/63187",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0585.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0585.json
index 86f479483c2..7db101c539f 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0585.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0585.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0585",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-25T21:00:00.937",
"lastModified": "2024-11-21T01:12:30.193",
"vulnStatus": "Modified",
@@ -534,11 +534,11 @@
"references": [
{
"url": "http://secunia.com/advisories/39069",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=20069",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -546,7 +546,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f33.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0586.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0586.json
index 4c1410128a8..6720c4f61e6 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0586.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0586.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0586",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-25T21:00:00.967",
"lastModified": "2024-11-21T01:12:30.303",
"vulnStatus": "Modified",
@@ -534,15 +534,15 @@
"references": [
{
"url": "http://osvdb.org/63177",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/39069",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=20070",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -550,7 +550,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f33.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -558,7 +558,7 @@
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6625",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/63177",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0587.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0587.json
index 94ea7458ea1..a5c10cb57b0 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0587.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0587.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0587",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-05T16:30:00.740",
"lastModified": "2024-11-21T01:12:30.430",
"vulnStatus": "Modified",
@@ -369,11 +369,11 @@
"references": [
{
"url": "http://securitytracker.com/id?1023670",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b924.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -381,7 +381,7 @@
},
{
"url": "http://www.securityfocus.com/bid/38496",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1023670",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0588.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0588.json
index 735914f6374..4c1e1ab988a 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0588.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0588.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0588",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-05T16:30:00.770",
"lastModified": "2024-11-21T01:12:30.550",
"vulnStatus": "Modified",
@@ -164,11 +164,11 @@
"references": [
{
"url": "http://securitytracker.com/id?1023670",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b924.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -176,7 +176,7 @@
},
{
"url": "http://www.securityfocus.com/bid/38501",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1023670",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0589.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0589.json
index a275434cb94..3f6265bdd31 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0589.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0589.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0589",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-04-15T17:30:00.523",
"lastModified": "2024-11-21T01:12:30.760",
"vulnStatus": "Modified",
@@ -130,11 +130,11 @@
"references": [
{
"url": "http://securitytracker.com/id?1023881",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b25d01.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -142,15 +142,15 @@
},
{
"url": "http://www.securityfocus.com/bid/39478",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-072/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57812",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1023881",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0590.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0590.json
index d15e1bc980c..33cdb7fec53 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0590.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0590.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0590",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-05T16:30:00.800",
"lastModified": "2024-11-21T01:12:31.413",
"vulnStatus": "Modified",
@@ -94,11 +94,11 @@
"references": [
{
"url": "http://securitytracker.com/id?1023670",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b924.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -106,7 +106,7 @@
},
{
"url": "http://www.securityfocus.com/bid/38495",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1023670",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0591.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0591.json
index 4102019a69c..2b745d95e24 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0591.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0591.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0591",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-05T16:30:00.833",
"lastModified": "2024-11-21T01:12:31.940",
"vulnStatus": "Modified",
@@ -159,11 +159,11 @@
"references": [
{
"url": "http://securitytracker.com/id?1023670",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b924.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -171,7 +171,7 @@
},
{
"url": "http://www.securityfocus.com/bid/38498",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1023670",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0592.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0592.json
index 6ef5bed7ffd..8487606599f 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0592.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0592.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0592",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-03-05T16:30:00.863",
"lastModified": "2024-11-21T01:12:32.130",
"vulnStatus": "Modified",
@@ -359,11 +359,11 @@
"references": [
{
"url": "http://securitytracker.com/id?1023670",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b924.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -371,7 +371,7 @@
},
{
"url": "http://www.securityfocus.com/bid/38497",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1023670",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0593.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0593.json
index 31a85cc5096..1e6b8599f41 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0593.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0593.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0593",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-04-22T14:30:00.853",
"lastModified": "2024-11-21T01:12:32.250",
"vulnStatus": "Modified",
@@ -154,15 +154,15 @@
"references": [
{
"url": "http://osvdb.org/63978",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/39510",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b27511.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -170,19 +170,19 @@
},
{
"url": "http://www.securityfocus.com/bid/39612",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1023906",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0965",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58034",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/63978",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0594.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0594.json
index add2ea67e86..28aef3c95b6 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0594.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0594.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0594",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-04T16:00:35.340",
"lastModified": "2024-11-21T01:12:32.370",
"vulnStatus": "Modified",
@@ -79,11 +79,11 @@
"references": [
{
"url": "http://jvn.jp/en/jp/JVN14313132/index.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000014.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://jvn.jp/en/jp/JVN14313132/index.html",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0595.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0595.json
index 5f848e4100b..b36a1011ee6 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0595.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0595.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0595",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-27T19:30:01.187",
"lastModified": "2024-11-21T01:12:32.480",
"vulnStatus": "Modified",
@@ -106,37 +106,37 @@
"references": [
{
"url": "http://secunia.com/advisories/39904",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1024027",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c518.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/757804",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/40380",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-147-01_Cisco_Network_Building_Mediator.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58893",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/39904",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0596.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0596.json
index 4c28f34e035..f0835c663ae 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0596.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0596.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0596",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-27T19:30:01.313",
"lastModified": "2024-11-21T01:12:32.600",
"vulnStatus": "Modified",
@@ -101,15 +101,15 @@
"references": [
{
"url": "http://secunia.com/advisories/39904",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1024027",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c518.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -117,14 +117,14 @@
},
{
"url": "http://www.kb.cert.org/vuls/id/757804",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-147-01_Cisco_Network_Building_Mediator.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/39904",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0597.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0597.json
index 86550c81677..651d8f45a7d 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0597.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0597.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0597",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-27T19:30:01.407",
"lastModified": "2024-11-21T01:12:32.717",
"vulnStatus": "Modified",
@@ -106,33 +106,33 @@
"references": [
{
"url": "http://secunia.com/advisories/39904",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1024027",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c518.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/757804",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/40386",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-147-01_Cisco_Network_Building_Mediator.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/39904",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0598.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0598.json
index 8d6e3069c76..a60408ab3e3 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0598.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0598.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0598",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-27T19:30:01.437",
"lastModified": "2024-11-21T01:12:32.830",
"vulnStatus": "Modified",
@@ -106,29 +106,29 @@
"references": [
{
"url": "http://secunia.com/advisories/39904",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1024027",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c518.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/757804",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-147-01_Cisco_Network_Building_Mediator.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/39904",
diff --git a/CVE-2010/CVE-2010-05xx/CVE-2010-0599.json b/CVE-2010/CVE-2010-05xx/CVE-2010-0599.json
index 3b119234b33..216da002307 100644
--- a/CVE-2010/CVE-2010-05xx/CVE-2010-0599.json
+++ b/CVE-2010/CVE-2010-05xx/CVE-2010-0599.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0599",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-27T19:30:01.563",
"lastModified": "2024-11-21T01:12:32.943",
"vulnStatus": "Modified",
@@ -106,15 +106,15 @@
"references": [
{
"url": "http://secunia.com/advisories/39904",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1024027",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c518.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -122,14 +122,14 @@
},
{
"url": "http://www.kb.cert.org/vuls/id/757804",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-147-01_Cisco_Network_Building_Mediator.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/39904",
diff --git a/CVE-2010/CVE-2010-06xx/CVE-2010-0600.json b/CVE-2010/CVE-2010-06xx/CVE-2010-0600.json
index c5d1febc8f3..917665220e5 100644
--- a/CVE-2010/CVE-2010-06xx/CVE-2010-0600.json
+++ b/CVE-2010/CVE-2010-06xx/CVE-2010-0600.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0600",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-27T19:30:01.623",
"lastModified": "2024-11-21T01:12:33.067",
"vulnStatus": "Modified",
@@ -106,15 +106,15 @@
"references": [
{
"url": "http://secunia.com/advisories/39904",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1024027",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c518.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -122,18 +122,18 @@
},
{
"url": "http://www.kb.cert.org/vuls/id/757804",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/40384",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-10-147-01_Cisco_Network_Building_Mediator.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/39904",
diff --git a/CVE-2010/CVE-2010-06xx/CVE-2010-0601.json b/CVE-2010/CVE-2010-06xx/CVE-2010-0601.json
index 929afcdb449..82d7e7049e0 100644
--- a/CVE-2010/CVE-2010-06xx/CVE-2010-0601.json
+++ b/CVE-2010/CVE-2010-06xx/CVE-2010-0601.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0601",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-14T20:30:01.173",
"lastModified": "2024-11-21T01:12:33.183",
"vulnStatus": "Modified",
@@ -79,11 +79,11 @@
"references": [
{
"url": "http://osvdb.org/64680",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -91,7 +91,7 @@
},
{
"url": "http://www.securityfocus.com/bid/40117",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/64680",
diff --git a/CVE-2010/CVE-2010-06xx/CVE-2010-0602.json b/CVE-2010/CVE-2010-06xx/CVE-2010-0602.json
index 0b81cfd7ebf..c6f5ec61bc4 100644
--- a/CVE-2010/CVE-2010-06xx/CVE-2010-0602.json
+++ b/CVE-2010/CVE-2010-06xx/CVE-2010-0602.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0602",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-14T20:30:01.203",
"lastModified": "2024-11-21T01:12:33.293",
"vulnStatus": "Modified",
@@ -79,11 +79,11 @@
"references": [
{
"url": "http://osvdb.org/64688",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -91,7 +91,7 @@
},
{
"url": "http://www.securityfocus.com/bid/40120",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/64688",
diff --git a/CVE-2010/CVE-2010-06xx/CVE-2010-0603.json b/CVE-2010/CVE-2010-06xx/CVE-2010-0603.json
index 20d98ab8ee7..0f7c526fcc6 100644
--- a/CVE-2010/CVE-2010-06xx/CVE-2010-0603.json
+++ b/CVE-2010/CVE-2010-06xx/CVE-2010-0603.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0603",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-14T20:30:01.233",
"lastModified": "2024-11-21T01:12:33.397",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -87,7 +87,7 @@
},
{
"url": "http://www.securityfocus.com/bid/40121",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml",
diff --git a/CVE-2010/CVE-2010-06xx/CVE-2010-0604.json b/CVE-2010/CVE-2010-06xx/CVE-2010-0604.json
index 4adec1c3832..ec5674b0226 100644
--- a/CVE-2010/CVE-2010-06xx/CVE-2010-0604.json
+++ b/CVE-2010/CVE-2010-06xx/CVE-2010-0604.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-0604",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-14T20:30:01.267",
"lastModified": "2024-11-21T01:12:33.507",
"vulnStatus": "Modified",
@@ -79,11 +79,11 @@
"references": [
{
"url": "http://osvdb.org/64686",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -91,7 +91,7 @@
},
{
"url": "http://www.securityfocus.com/bid/40122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/64686",
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1561.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1561.json
index 15e8574c81f..c221071ff4c 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1561.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1561.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1561",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-14T20:30:01.360",
"lastModified": "2024-11-21T01:14:42.040",
"vulnStatus": "Modified",
@@ -94,11 +94,11 @@
"references": [
{
"url": "http://osvdb.org/64685",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -106,7 +106,7 @@
},
{
"url": "http://www.securityfocus.com/bid/40123",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/64685",
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1562.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1562.json
index 7009c78eae5..6695d506acd 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1562.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1562.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1562",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-14T20:30:01.390",
"lastModified": "2024-11-21T01:14:42.143",
"vulnStatus": "Modified",
@@ -79,11 +79,11 @@
"references": [
{
"url": "http://osvdb.org/64684",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1563.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1563.json
index 04b6e71331f..a7400089759 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1563.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1563.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1563",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-14T20:30:01.423",
"lastModified": "2024-11-21T01:14:42.253",
"vulnStatus": "Modified",
@@ -79,11 +79,11 @@
"references": [
{
"url": "http://osvdb.org/64683",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -91,7 +91,7 @@
},
{
"url": "http://www.securityfocus.com/bid/40125",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/64683",
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1565.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1565.json
index 3c84a660fae..721d62a3ed5 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1565.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1565.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1565",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-14T20:30:01.437",
"lastModified": "2024-11-21T01:14:42.373",
"vulnStatus": "Modified",
@@ -79,11 +79,11 @@
"references": [
{
"url": "http://osvdb.org/64682",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -91,7 +91,7 @@
},
{
"url": "http://www.securityfocus.com/bid/40128",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/64682",
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1567.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1567.json
index eac4ae41084..6a3d3fdc33c 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1567.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1567.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1567",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-14T20:30:01.483",
"lastModified": "2024-11-21T01:14:42.480",
"vulnStatus": "Modified",
@@ -85,11 +85,11 @@
"references": [
{
"url": "http://osvdb.org/64681",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -97,7 +97,7 @@
},
{
"url": "http://www.securityfocus.com/bid/40126",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/64681",
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1568.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1568.json
index 984ff4ab8ba..8279b360cb2 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1568.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1568.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1568",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-05-14T20:30:01.500",
"lastModified": "2024-11-21T01:14:42.583",
"vulnStatus": "Modified",
@@ -80,7 +80,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_response09186a0080b2c505.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1570.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1570.json
index 284e06f244d..de201afe757 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1570.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1570.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1570",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-06-10T00:30:07.410",
"lastModified": "2024-11-21T01:14:42.680",
"vulnStatus": "Modified",
@@ -134,7 +134,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2f110.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -142,15 +142,15 @@
},
{
"url": "http://www.securityfocus.com/bid/40684",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1024081",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59276",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2f110.shtml",
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1571.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1571.json
index 60d74bc4620..da2ed1f0209 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1571.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1571.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1571",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-06-10T00:30:07.440",
"lastModified": "2024-11-21T01:14:42.797",
"vulnStatus": "Modified",
@@ -134,7 +134,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2f110.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -142,15 +142,15 @@
},
{
"url": "http://www.securityfocus.com/bid/40680",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1024082",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59277",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2f110.shtml",
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1572.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1572.json
index e11b689a33e..6ef5bf60be7 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1572.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1572.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1572",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-06-10T00:30:07.473",
"lastModified": "2024-11-21T01:14:42.910",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3290b.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -87,11 +87,11 @@
},
{
"url": "http://www.securityfocus.com/bid/40682",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59271",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3290b.shtml",
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1573.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1573.json
index c0d358161ec..cb5a996baa0 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1573.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1573.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1573",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-06-10T00:30:07.503",
"lastModified": "2024-11-21T01:14:43.017",
"vulnStatus": "Modified",
@@ -109,14 +109,14 @@
"references": [
{
"url": "http://secunia.com/advisories/40103",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=20682",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Vendor Advisory"
@@ -124,14 +124,14 @@
},
{
"url": "http://www.icysilence.org/?p=268",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/511733/100/0/threaded",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -140,7 +140,7 @@
},
{
"url": "http://www.securityfocus.com/bid/40648",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -149,14 +149,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2010/1419",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59286",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1574.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1574.json
index 1f7d169647d..30fd4062e66 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1574.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1574.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1574",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-07-08T18:30:00.827",
"lastModified": "2024-11-21T01:14:43.150",
"vulnStatus": "Modified",
@@ -91,44 +91,44 @@
"references": [
{
"url": "http://osvdb.org/66120",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/40407",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1024173",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3891f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/732671",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/41436",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/1754",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60145",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/66120",
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1575.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1575.json
index 129e90a5046..12f4e7d57a0 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1575.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1575.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1575",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-07-06T17:17:13.203",
"lastModified": "2024-11-21T01:14:43.277",
"vulnStatus": "Modified",
@@ -74,23 +74,23 @@
"references": [
{
"url": "http://osvdb.org/66091",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1024167",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/archive/1/512144/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/41315",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vsecurity.com/resources/advisory/20100702-1/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1576.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1576.json
index fd7ee6730c6..3378ad6a878 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1576.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1576.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1576",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-07-06T17:17:13.233",
"lastModified": "2024-11-21T01:14:43.387",
"vulnStatus": "Modified",
@@ -121,27 +121,27 @@
"references": [
{
"url": "http://osvdb.org/66092",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1024167",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1024168",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/archive/1/512144/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/41315",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vsecurity.com/resources/advisory/20100702-1/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1577.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1577.json
index 0909cd77add..c805397ecba 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1577.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1577.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1577",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-07-28T12:48:52.463",
"lastModified": "2024-11-21T01:14:43.497",
"vulnStatus": "Modified",
@@ -136,18 +136,18 @@
"references": [
{
"url": "http://osvdb.org/66508",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/40701",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3bd1c.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -155,18 +155,18 @@
},
{
"url": "http://www.securitytracker.com/id?1024234",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/1881",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60567",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/66508",
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1578.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1578.json
index a1ddb723d2f..89ff460154e 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1578.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1578.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1578",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-09T11:58:16.097",
"lastModified": "2024-11-21T01:14:43.610",
"vulnStatus": "Modified",
@@ -271,14 +271,14 @@
"references": [
{
"url": "http://secunia.com/advisories/40842",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1579.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1579.json
index de6258bb127..adada960711 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1579.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1579.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1579",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-09T11:58:16.177",
"lastModified": "2024-11-21T01:14:43.720",
"vulnStatus": "Modified",
@@ -286,14 +286,14 @@
"references": [
{
"url": "http://secunia.com/advisories/40842",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1580.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1580.json
index 68d10580700..ffa2bd50a2c 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1580.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1580.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1580",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-09T11:58:16.207",
"lastModified": "2024-11-21T01:14:43.837",
"vulnStatus": "Modified",
@@ -271,14 +271,14 @@
"references": [
{
"url": "http://secunia.com/advisories/40842",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-15xx/CVE-2010-1581.json b/CVE-2010/CVE-2010-15xx/CVE-2010-1581.json
index 39b4e61a3cf..749234355e5 100644
--- a/CVE-2010/CVE-2010-15xx/CVE-2010-1581.json
+++ b/CVE-2010/CVE-2010-15xx/CVE-2010-1581.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-1581",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-09T11:58:16.253",
"lastModified": "2024-11-21T01:14:43.947",
"vulnStatus": "Modified",
@@ -286,14 +286,14 @@
"references": [
{
"url": "http://secunia.com/advisories/40842",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -301,7 +301,7 @@
},
{
"url": "http://www.securityfocus.com/bid/42187",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/40842",
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2814.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2814.json
index 2f6f2b128bc..04d000612e7 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2814.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2814.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2814",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-09T11:58:17.533",
"lastModified": "2024-11-21T01:17:25.740",
"vulnStatus": "Modified",
@@ -286,14 +286,14 @@
"references": [
{
"url": "http://secunia.com/advisories/40842",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -301,7 +301,7 @@
},
{
"url": "http://www.securityfocus.com/bid/42196",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/40842",
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2815.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2815.json
index 2ca2f9247bd..8379ef223d3 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2815.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2815.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2815",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-09T11:58:17.567",
"lastModified": "2024-11-21T01:17:25.850",
"vulnStatus": "Modified",
@@ -286,14 +286,14 @@
"references": [
{
"url": "http://secunia.com/advisories/40842",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -301,7 +301,7 @@
},
{
"url": "http://www.securityfocus.com/bid/42198",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/40842",
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2816.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2816.json
index 15d1a17cbec..3fa6ba97504 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2816.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2816.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2816",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-09T11:58:17.597",
"lastModified": "2024-11-21T01:17:25.953",
"vulnStatus": "Modified",
@@ -201,14 +201,14 @@
"references": [
{
"url": "http://secunia.com/advisories/40842",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -216,7 +216,7 @@
},
{
"url": "http://www.securityfocus.com/bid/42189",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/40842",
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2817.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2817.json
index bd4bce605e4..a3e65a3a953 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2817.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2817.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2817",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-09T11:58:17.627",
"lastModified": "2024-11-21T01:17:26.057",
"vulnStatus": "Modified",
@@ -401,14 +401,14 @@
"references": [
{
"url": "http://secunia.com/advisories/40842",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -416,7 +416,7 @@
},
{
"url": "http://www.securityfocus.com/bid/42190",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/40842",
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2818.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2818.json
index 153cb424020..2575790d5db 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2818.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2818.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2818",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-09T11:58:17.660",
"lastModified": "2024-11-21T01:17:26.167",
"vulnStatus": "Modified",
@@ -191,14 +191,14 @@
"references": [
{
"url": "http://secunia.com/advisories/40843",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2819.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2819.json
index 3f731b1aa91..e033e274102 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2819.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2819.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2819",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-09T11:58:17.690",
"lastModified": "2024-11-21T01:17:26.270",
"vulnStatus": "Modified",
@@ -191,14 +191,14 @@
"references": [
{
"url": "http://secunia.com/advisories/40843",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/40843",
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2820.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2820.json
index a5fd82b25f4..1e7426c65d6 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2820.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2820.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2820",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-09T11:58:17.723",
"lastModified": "2024-11-21T01:17:26.367",
"vulnStatus": "Modified",
@@ -191,14 +191,14 @@
"references": [
{
"url": "http://secunia.com/advisories/40843",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2821.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2821.json
index 6b9d5be59ec..e46c30c613d 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2821.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2821.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2821",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-09T11:58:17.737",
"lastModified": "2024-11-21T01:17:26.467",
"vulnStatus": "Modified",
@@ -166,14 +166,14 @@
"references": [
{
"url": "http://secunia.com/advisories/40843",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2822.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2822.json
index 9a915ef4e03..2a8a021bcf3 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2822.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2822.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2822",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-17T05:41:21.487",
"lastModified": "2024-11-21T01:17:26.563",
"vulnStatus": "Modified",
@@ -132,7 +132,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4091d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2823.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2823.json
index e5656f8d973..4123efcfe0a 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2823.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2823.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2823",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-17T05:41:21.520",
"lastModified": "2024-11-21T01:17:26.657",
"vulnStatus": "Modified",
@@ -99,7 +99,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4091d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2824.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2824.json
index d2869cdaea5..7354590fc9d 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2824.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2824.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2824",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-17T05:41:21.550",
"lastModified": "2024-11-21T01:17:26.757",
"vulnStatus": "Modified",
@@ -104,7 +104,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4091d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2825.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2825.json
index 1fd19ddc810..9206a4b226f 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2825.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2825.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2825",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-17T05:41:21.583",
"lastModified": "2024-11-21T01:17:26.860",
"vulnStatus": "Modified",
@@ -144,7 +144,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4091d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2826.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2826.json
index 2e692ab5fde..871f9234c1b 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2826.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2826.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2826",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-17T05:41:21.613",
"lastModified": "2024-11-21T01:17:26.960",
"vulnStatus": "Modified",
@@ -100,7 +100,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4091e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2827.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2827.json
index 4a3f5f19e16..627b523a854 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2827.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2827.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2827",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-16T18:39:40.950",
"lastModified": "2024-11-21T01:17:27.060",
"vulnStatus": "Modified",
@@ -74,11 +74,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4095e.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/42426",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4095e.shtml",
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2828.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2828.json
index 5ca2ccf7275..ce74c1fac25 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2828.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2828.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2828",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-23T19:00:01.497",
"lastModified": "2024-11-21T01:17:27.150",
"vulnStatus": "Modified",
@@ -939,7 +939,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a300.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2829.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2829.json
index 17d20143fa5..fac168fb927 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2829.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2829.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2829",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-23T19:00:13.137",
"lastModified": "2024-11-21T01:17:27.257",
"vulnStatus": "Modified",
@@ -939,7 +939,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a300.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2830.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2830.json
index bb216b2ae2e..3366cfcbc51 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2830.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2830.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2830",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-23T19:00:13.217",
"lastModified": "2024-11-21T01:17:27.377",
"vulnStatus": "Modified",
@@ -904,7 +904,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a310.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2831.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2831.json
index bb676d0d21b..7641f5b3087 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2831.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2831.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2831",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-23T19:00:13.310",
"lastModified": "2024-11-21T01:17:27.483",
"vulnStatus": "Modified",
@@ -1044,7 +1044,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a311.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2832.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2832.json
index e4e59cfc444..afce3951f68 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2832.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2832.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2832",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-23T19:00:13.450",
"lastModified": "2024-11-21T01:17:27.617",
"vulnStatus": "Modified",
@@ -1044,7 +1044,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a311.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2833.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2833.json
index ba3796f0366..1caa6194dad 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2833.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2833.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2833",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-23T19:00:13.577",
"lastModified": "2024-11-21T01:17:27.743",
"vulnStatus": "Modified",
@@ -1044,7 +1044,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a311.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2834.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2834.json
index ab326e666b9..93bfd08f738 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2834.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2834.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2834",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-23T19:00:13.717",
"lastModified": "2024-11-21T01:17:27.867",
"vulnStatus": "Modified",
@@ -1254,7 +1254,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a30f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -1262,7 +1262,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a313.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2835.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2835.json
index b06de8a51db..fa874fcd877 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2835.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2835.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2835",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-23T19:00:13.857",
"lastModified": "2024-11-21T01:17:28.000",
"vulnStatus": "Modified",
@@ -1239,7 +1239,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a30f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -1247,7 +1247,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a313.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2836.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2836.json
index faf77b46532..ed23614e642 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2836.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2836.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2836",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-23T19:00:13.980",
"lastModified": "2024-11-21T01:17:28.127",
"vulnStatus": "Modified",
@@ -224,7 +224,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a312.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2837.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2837.json
index d6bd0241666..8409dff80f6 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2837.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2837.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2837",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-26T21:00:01.450",
"lastModified": "2024-11-21T01:17:28.233",
"vulnStatus": "Modified",
@@ -302,7 +302,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b43908.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -310,7 +310,7 @@
},
{
"url": "http://www.vupen.com/english/advisories/2010/2187",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b43908.shtml",
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2838.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2838.json
index 5fa8e36def6..b3c72e39c5f 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2838.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2838.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2838",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-26T21:00:01.497",
"lastModified": "2024-11-21T01:17:28.337",
"vulnStatus": "Modified",
@@ -216,7 +216,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b43908.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -224,7 +224,7 @@
},
{
"url": "http://www.vupen.com/english/advisories/2010/2187",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b43908.shtml",
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2839.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2839.json
index 292ba96ba83..a4c2070ac82 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2839.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2839.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2839",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-26T21:00:01.530",
"lastModified": "2024-11-21T01:17:28.433",
"vulnStatus": "Modified",
@@ -189,7 +189,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b43909.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -197,7 +197,7 @@
},
{
"url": "http://www.vupen.com/english/advisories/2010/2186",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b43909.shtml",
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2840.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2840.json
index 5fc94836568..bbe9dbe2503 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2840.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2840.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2840",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-26T21:00:01.577",
"lastModified": "2024-11-21T01:17:28.530",
"vulnStatus": "Modified",
@@ -189,7 +189,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b43909.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -197,7 +197,7 @@
},
{
"url": "http://www.vupen.com/english/advisories/2010/2186",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b43909.shtml",
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2841.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2841.json
index b017796aac9..435bb4f7727 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2841.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2841.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2841",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-10T18:00:01.927",
"lastModified": "2024-11-21T01:17:28.627",
"vulnStatus": "Modified",
@@ -209,7 +209,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21288",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -217,7 +217,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2842.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2842.json
index 4ba3b7cac14..41b87b067d5 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2842.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2842.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2842",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-10T18:00:01.973",
"lastModified": "2024-11-21T01:17:28.727",
"vulnStatus": "Modified",
@@ -174,7 +174,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21290",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -182,7 +182,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2843.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2843.json
index 5d50957994c..2839379cfe5 100644
--- a/CVE-2010/CVE-2010-28xx/CVE-2010-2843.json
+++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2843.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-2843",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-10T18:00:02.020",
"lastModified": "2024-11-21T01:17:28.823",
"vulnStatus": "Modified",
@@ -174,7 +174,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21290",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -182,7 +182,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3033.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3033.json
index 7953f9e59b5..46762cc1e19 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3033.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3033.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3033",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-10T18:00:02.347",
"lastModified": "2024-11-21T01:17:54.860",
"vulnStatus": "Modified",
@@ -174,7 +174,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21290",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -182,7 +182,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3034.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3034.json
index 161fb2fed7c..2c5cf6e3a2e 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3034.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3034.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3034",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-09-10T18:00:02.393",
"lastModified": "2024-11-21T01:17:54.960",
"vulnStatus": "Modified",
@@ -159,7 +159,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21291",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -167,7 +167,7 @@
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3035.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3035.json
index 181efd58aa1..d270ad8c4ea 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3035.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3035.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3035",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-08-30T21:00:12.203",
"lastModified": "2024-12-19T20:09:31.583",
"vulnStatus": "Analyzed",
@@ -102,28 +102,28 @@
"references": [
{
"url": "http://mailman.nanog.org/pipermail/nanog/2010-August/024837.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://osvdb.org/67696",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/41190",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4411f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Vendor Advisory"
@@ -131,7 +131,7 @@
},
{
"url": "http://www.securitytracker.com/id?1024371",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -140,14 +140,14 @@
},
{
"url": "http://www.vupen.com/english/advisories/2010/2227",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61443",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3036.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3036.json
index 234b642589b..0e90ae5cb04 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3036.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3036.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3036",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-10-29T19:00:02.013",
"lastModified": "2024-11-21T01:17:55.163",
"vulnStatus": "Modified",
@@ -181,22 +181,22 @@
"references": [
{
"url": "http://osvdb.org/68927",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/42011",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1024646",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b51501.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -204,14 +204,14 @@
},
{
"url": "http://www.securityfocus.com/bid/44468",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2010/2793",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3037.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3037.json
index 53524db43b1..b0b91c61fa6 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3037.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3037.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3037",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-11-22T20:00:03.167",
"lastModified": "2024-11-21T01:17:55.263",
"vulnStatus": "Modified",
@@ -163,26 +163,26 @@
"references": [
{
"url": "http://seclists.org/fulldisclosure/2010/Nov/167",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_response09186a0080b56d0d.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/44922",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1024753",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.trustmatta.com/advisories/MATTA-2010-001.txt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://seclists.org/fulldisclosure/2010/Nov/167",
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3038.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3038.json
index c3e4f61e41b..8c8dc9481c8 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3038.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3038.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3038",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-11-22T20:00:03.230",
"lastModified": "2024-11-21T01:17:55.370",
"vulnStatus": "Modified",
@@ -101,26 +101,26 @@
"references": [
{
"url": "http://seclists.org/fulldisclosure/2010/Nov/167",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_response09186a0080b56d0d.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/44924",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1024753",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.trustmatta.com/advisories/MATTA-2010-001.txt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://seclists.org/fulldisclosure/2010/Nov/167",
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3039.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3039.json
index 3c148eb6ab9..fe11b2c0d26 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3039.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3039.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3039",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-11-09T21:00:03.460",
"lastModified": "2024-11-21T01:17:55.463",
"vulnStatus": "Modified",
@@ -304,50 +304,50 @@
"references": [
{
"url": "http://seclists.org/fulldisclosure/2010/Nov/40",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/42129",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21656",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.nsense.fi/advisories/nsense_2010_003.txt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/514668/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/44672",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securitytracker.com/id?1024694",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/2915",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3040.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3040.json
index 3d50450b71d..bf773481e67 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3040.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3040.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3040",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2010-11-09T21:00:03.693",
"lastModified": "2024-11-21T01:17:55.577",
"vulnStatus": "Modified",
@@ -205,48 +205,48 @@
"references": [
{
"url": "http://secunia.com/advisories/42146",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1024693",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21726",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/44699",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/2914",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-232/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-233/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-234/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-235/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/42146",
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3041.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3041.json
index bbc433f8dcd..0f0bbfe5c49 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3041.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3041.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3041",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-02T23:00:02.940",
"lastModified": "2024-11-21T01:17:55.677",
"vulnStatus": "Modified",
@@ -129,30 +129,30 @@
"references": [
{
"url": "http://securitytracker.com/id?1025016",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=22016",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6913f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.fortiguard.com/advisory/FGA-2011-03.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/46075",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65072",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1025016",
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3042.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3042.json
index 43fb7e087f9..e10d352f469 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3042.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3042.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3042",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-02T23:00:31.050",
"lastModified": "2024-11-21T01:17:55.773",
"vulnStatus": "Modified",
@@ -129,18 +129,18 @@
"references": [
{
"url": "http://securitytracker.com/id?1025016",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=22016",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6913f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -148,11 +148,11 @@
},
{
"url": "http://www.securityfocus.com/bid/46075",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65073",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1025016",
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3043.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3043.json
index 1ea83d6c0a0..bf680685184 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3043.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3043.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3043",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-02T23:00:31.223",
"lastModified": "2024-11-21T01:17:55.880",
"vulnStatus": "Modified",
@@ -129,26 +129,26 @@
"references": [
{
"url": "http://securitytracker.com/id?1025016",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=22016",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6913f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46075",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65074",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1025016",
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3044.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3044.json
index 34ab822c761..b01762a742a 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3044.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3044.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3044",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-02T23:00:31.393",
"lastModified": "2024-11-21T01:17:55.977",
"vulnStatus": "Modified",
@@ -129,18 +129,18 @@
"references": [
{
"url": "http://securitytracker.com/id?1025016",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=22016",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6913f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -148,15 +148,15 @@
},
{
"url": "http://www.fortiguard.com/advisory/FGA-2011-03.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/46075",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65075",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1025016",
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3048.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3048.json
index dcf960da92e..dac6a6b8082 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3048.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3048.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3048",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-16T18:15:10.917",
"lastModified": "2024-11-21T01:17:56.077",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.fuzzmyapp.com/advisories/FMA-2010-002/FMA-2010-002-EN.xml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3049.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3049.json
index 325907fb94f..8576b151f58 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3049.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3049.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3049",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-25T17:29:00.193",
"lastModified": "2024-11-21T01:17:56.180",
"vulnStatus": "Modified",
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/release/notes/ol_14271/caveats_SXI_rebuilds.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Patch",
diff --git a/CVE-2010/CVE-2010-30xx/CVE-2010-3050.json b/CVE-2010/CVE-2010-30xx/CVE-2010-3050.json
index 1ccf4974665..e76d6a5c354 100644
--- a/CVE-2010/CVE-2010-30xx/CVE-2010-3050.json
+++ b/CVE-2010/CVE-2010-30xx/CVE-2010-3050.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2010-3050",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-25T17:29:00.240",
"lastModified": "2024-11-21T01:17:56.297",
"vulnStatus": "Modified",
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/release/notes/ol_14271/caveats_SXI_rebuilds.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Patch",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0348.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0348.json
index 770ee781a16..fab162cf279 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0348.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0348.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0348",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-01-28T22:00:05.787",
"lastModified": "2024-11-21T01:23:47.813",
"vulnStatus": "Modified",
@@ -116,37 +116,37 @@
"references": [
{
"url": "http://osvdb.org/70720",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/43052",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1024992",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6791d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46022",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0229",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64936",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/70720",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0349.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0349.json
index f69b1ab3591..9c8bb28b8ce 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0349.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0349.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0349",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-01-28T22:00:05.817",
"lastModified": "2024-11-21T01:23:48.600",
"vulnStatus": "Modified",
@@ -91,37 +91,37 @@
"references": [
{
"url": "http://osvdb.org/70721",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/43052",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1024992",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6791d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46026",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0229",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64937",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/70721",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0350.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0350.json
index 0b37fcbc747..3acd09c074f 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0350.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0350.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0350",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-01-28T22:00:05.863",
"lastModified": "2024-11-21T01:23:48.730",
"vulnStatus": "Modified",
@@ -91,37 +91,37 @@
"references": [
{
"url": "http://osvdb.org/70722",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/43052",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1024992",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6791d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46028",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0229",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64938",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/70722",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0352.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0352.json
index fb386ec4a0c..008c937d2a8 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0352.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0352.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0352",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-01-24T18:00:04.190",
"lastModified": "2024-11-21T01:23:48.923",
"vulnStatus": "Modified",
@@ -97,22 +97,22 @@
"references": [
{
"url": "http://jvn.jp/en/jp/JVN26605630/index.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000007.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/43017",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=22228",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -120,11 +120,11 @@
},
{
"url": "http://www.vupen.com/english/advisories/2011/0205",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64850",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://jvn.jp/en/jp/JVN26605630/index.html",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0354.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0354.json
index 0e76fa5522b..f0bd03a1bde 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0354.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0354.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0354",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-03T16:00:02.570",
"lastModified": "2024-11-21T01:23:49.123",
"vulnStatus": "Modified",
@@ -235,44 +235,44 @@
"references": [
{
"url": "http://secunia.com/advisories/43158",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/8060",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1025017",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=22314",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/ps11422/products_security_advisory09186a0080b69541.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/16100",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.kb.cert.org/vuls/id/436854",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/46107",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/43158",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0355.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0355.json
index 728c91137cf..51ad925a50d 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0355.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0355.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0355",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-17T18:00:03.557",
"lastModified": "2024-11-21T01:23:49.297",
"vulnStatus": "Modified",
@@ -121,63 +121,63 @@
"references": [
{
"url": "http://lists.vmware.com/pipermail/security-announce/2011/000118.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/43084",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/8090",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1025030",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_3_c/release/notes/n1000v_rn.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.osvdb.org/70837",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/archive/1/516259/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/46247",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0002.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2011/0314",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2011/0315",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65217",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://lists.vmware.com/pipermail/security-announce/2011/000118.html",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0364.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0364.json
index b7acc8b1184..dc5ce599c7a 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0364.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0364.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0364",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-19T01:00:02.337",
"lastModified": "2024-11-21T01:23:49.443",
"vulnStatus": "Modified",
@@ -84,63 +84,63 @@
"references": [
{
"url": "http://secunia.com/advisories/43383",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/43393",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/8095",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securityreason.com/securityalert/8197",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securityreason.com/securityalert/8205",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6cee6.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/516505/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/46420",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025088",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0424",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-088",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65436",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/43383",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0372.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0372.json
index 4a6eef705dc..e6a8108d726 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0372.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0372.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0372",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:01.557",
"lastModified": "2024-11-21T01:23:49.580",
"vulnStatus": "Modified",
@@ -354,14 +354,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025112",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0373.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0373.json
index 9576ecf03e2..f1141c8ff86 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0373.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0373.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0373",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:17.633",
"lastModified": "2024-11-21T01:23:49.803",
"vulnStatus": "Modified",
@@ -354,14 +354,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025112",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0374.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0374.json
index 4ef829eb651..772fa0fba25 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0374.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0374.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0374",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:17.727",
"lastModified": "2024-11-21T01:23:49.970",
"vulnStatus": "Modified",
@@ -354,14 +354,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025112",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0375.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0375.json
index 1e6a320aa3b..f8e7fdc420c 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0375.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0375.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0375",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.087",
"lastModified": "2024-11-21T01:23:50.127",
"vulnStatus": "Modified",
@@ -554,14 +554,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025112",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0376.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0376.json
index 5d76fb49ce1..9d42e302424 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0376.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0376.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0376",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.167",
"lastModified": "2024-11-21T01:23:50.300",
"vulnStatus": "Modified",
@@ -404,14 +404,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025112",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0377.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0377.json
index 672279cf95e..7e69c7f8fa5 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0377.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0377.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0377",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.243",
"lastModified": "2024-11-21T01:23:50.457",
"vulnStatus": "Modified",
@@ -554,18 +554,18 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025112",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0378.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0378.json
index 9a189882cff..a640825e7a8 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0378.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0378.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0378",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.307",
"lastModified": "2024-11-21T01:23:50.693",
"vulnStatus": "Modified",
@@ -354,14 +354,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025112",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0379.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0379.json
index cec59930372..5b4818a8f1e 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0379.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0379.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0379",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.383",
"lastModified": "2024-11-21T01:23:50.823",
"vulnStatus": "Modified",
@@ -728,47 +728,47 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025111",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025112",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025113",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025114",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0380.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0380.json
index 58f0933ecf3..2bb492d9b73 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0380.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0380.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0380",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.477",
"lastModified": "2024-11-21T01:23:50.957",
"vulnStatus": "Modified",
@@ -114,22 +114,22 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46526",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025111",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65618",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0381.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0381.json
index 92e18c7bea5..94ff476647e 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0381.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0381.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0381",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.527",
"lastModified": "2024-11-21T01:23:51.073",
"vulnStatus": "Modified",
@@ -114,22 +114,22 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46526",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025111",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65619",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0382.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0382.json
index c01b034d1df..0644c7f74df 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0382.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0382.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0382",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.570",
"lastModified": "2024-11-21T01:23:51.180",
"vulnStatus": "Modified",
@@ -86,18 +86,18 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46522",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025114",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0383.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0383.json
index 79dd7cc2e56..029e5125308 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0383.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0383.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0383",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.603",
"lastModified": "2024-11-21T01:23:51.297",
"vulnStatus": "Modified",
@@ -188,30 +188,30 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/46519",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025113",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025114",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65602",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0384.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0384.json
index 27fcb9cafcd..23b661d7598 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0384.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0384.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0384",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.680",
"lastModified": "2024-11-21T01:23:51.413",
"vulnStatus": "Modified",
@@ -161,22 +161,22 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46520",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025113",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65620",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0385.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0385.json
index a02a0a50542..76432d2b25a 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0385.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0385.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0385",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.727",
"lastModified": "2024-11-21T01:23:51.537",
"vulnStatus": "Modified",
@@ -198,29 +198,29 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025113",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025114",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65604",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0386.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0386.json
index 6f6d41f53de..69315887923 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0386.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0386.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0386",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.790",
"lastModified": "2024-11-21T01:23:51.660",
"vulnStatus": "Modified",
@@ -106,22 +106,22 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46522",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025114",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65605",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0387.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0387.json
index 56e279f68fb..b4b2a0958e1 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0387.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0387.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0387",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.837",
"lastModified": "2024-11-21T01:23:51.780",
"vulnStatus": "Modified",
@@ -161,22 +161,22 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46520",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025113",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65621",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0388.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0388.json
index d6a7495d0da..249b6dedab7 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0388.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0388.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0388",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.900",
"lastModified": "2024-11-21T01:23:51.907",
"vulnStatus": "Modified",
@@ -198,29 +198,29 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46523",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025113",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025114",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0389.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0389.json
index 96660f672ca..13e9c83affc 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0389.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0389.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0389",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:18.963",
"lastModified": "2024-11-21T01:23:52.033",
"vulnStatus": "Modified",
@@ -161,22 +161,22 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46520",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025113",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65622",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0390.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0390.json
index 75cf0b4c60d..6e60a9ed284 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0390.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0390.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0390",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:19.010",
"lastModified": "2024-11-21T01:23:52.153",
"vulnStatus": "Modified",
@@ -166,22 +166,22 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46520",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025113",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65623",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0391.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0391.json
index 47a778ed502..a6672509634 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0391.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0391.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0391",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:19.057",
"lastModified": "2024-11-21T01:23:52.280",
"vulnStatus": "Modified",
@@ -96,22 +96,22 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46522",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025114",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65607",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0392.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0392.json
index c7c16c00596..b1b750d92a7 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0392.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0392.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0392",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:19.103",
"lastModified": "2024-11-21T01:23:52.407",
"vulnStatus": "Modified",
@@ -96,22 +96,22 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46522",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025114",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65609",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0393.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0393.json
index 3c4ccbaefea..be5ce04ed97 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0393.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0393.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0393",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:19.167",
"lastModified": "2024-11-21T01:23:52.510",
"vulnStatus": "Modified",
@@ -402,26 +402,26 @@
"references": [
{
"url": "http://secunia.com/advisories/43488",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025108",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0493",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65589",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/43488",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0394.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0394.json
index 752ab7a5177..3796a5ecec2 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0394.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0394.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0394",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:19.213",
"lastModified": "2024-11-21T01:23:52.650",
"vulnStatus": "Modified",
@@ -579,49 +579,49 @@
"references": [
{
"url": "http://secunia.com/advisories/43453",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/43488",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/46518",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025108",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025109",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0493",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0494",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65593",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/43453",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0395.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0395.json
index 45c5777ec15..e31647832b3 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0395.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0395.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0395",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:19.260",
"lastModified": "2024-11-21T01:23:52.790",
"vulnStatus": "Modified",
@@ -211,26 +211,26 @@
"references": [
{
"url": "http://secunia.com/advisories/43488",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025108",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0493",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65590",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/43488",
diff --git a/CVE-2011/CVE-2011-03xx/CVE-2011-0396.json b/CVE-2011/CVE-2011-03xx/CVE-2011-0396.json
index e0cdba9f7a4..e93aadb8a91 100644
--- a/CVE-2011/CVE-2011-03xx/CVE-2011-0396.json
+++ b/CVE-2011/CVE-2011-03xx/CVE-2011-0396.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0396",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T12:00:19.307",
"lastModified": "2024-11-21T01:23:52.907",
"vulnStatus": "Modified",
@@ -211,26 +211,26 @@
"references": [
{
"url": "http://secunia.com/advisories/43488",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025108",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0493",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65591",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/43488",
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0925.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0925.json
index 8b73a0cc7cc..0feb6206911 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0925.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0925.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0925",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-28T16:00:01.320",
"lastModified": "2024-11-21T01:25:10.940",
"vulnStatus": "Modified",
@@ -74,31 +74,31 @@
"references": [
{
"url": "http://securityreason.com/securityalert/8108",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/archive/1/516648/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/46538",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025118",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0513",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://zerodayinitiative.com/advisories/ZDI-11-092/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65754",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securityreason.com/securityalert/8108",
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0926.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0926.json
index 9df0a8489b6..2ff1c58964e 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0926.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0926.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0926",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-02-25T18:00:01.277",
"lastModified": "2024-11-21T01:25:11.073",
"vulnStatus": "Modified",
@@ -74,31 +74,31 @@
"references": [
{
"url": "http://securityreason.com/securityalert/8105",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/archive/1/516647/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/46536",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025118",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0513",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-091/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65755",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securityreason.com/securityalert/8105",
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0935.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0935.json
index c289a13f833..f611fcd2829 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0935.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0935.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0935",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-04-14T16:55:01.317",
"lastModified": "2024-11-21T01:25:11.193",
"vulnStatus": "Modified",
@@ -79,15 +79,15 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1s/release/notes/15_1s_caveats_15_1_1s.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/47407",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html",
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0939.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0939.json
index 7f49cc86fde..9850939dd5d 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0939.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0939.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0939",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.283",
"lastModified": "2024-11-21T01:25:11.317",
"vulnStatus": "Modified",
@@ -164,14 +164,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24127",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d5a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0941.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0941.json
index 19ca883cd57..f3ec981bd91 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0941.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0941.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0941",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-11-01T19:55:01.587",
"lastModified": "2024-11-21T01:25:11.437",
"vulnStatus": "Modified",
@@ -344,14 +344,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20110928-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24525",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20110928-cucm",
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0943.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0943.json
index de9559ade7c..9ff88c4e961 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0943.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0943.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0943",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-31T20:55:01.843",
"lastModified": "2024-11-21T01:25:11.570",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f18e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0944.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0944.json
index 79546473d4f..657936ec46b 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0944.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0944.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0944",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.330",
"lastModified": "2024-11-21T01:25:11.700",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24131",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d59.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0945.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0945.json
index e3bff4ad56c..c56574ae24f 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0945.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0945.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0945",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.377",
"lastModified": "2024-11-21T01:25:11.833",
"vulnStatus": "Modified",
@@ -1054,11 +1054,11 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24116",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d4e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0946.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0946.json
index 2e655bac76c..050003da6da 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0946.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0946.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0946",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.423",
"lastModified": "2024-11-21T01:25:11.980",
"vulnStatus": "Modified",
@@ -103,14 +103,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24117",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d4d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0949.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0949.json
index f3eef2ce607..8a2d2dcfba1 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0949.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0949.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0949",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-31T20:55:01.877",
"lastModified": "2024-11-21T01:25:12.110",
"vulnStatus": "Modified",
@@ -109,7 +109,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f18f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0951.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0951.json
index 773747c10ab..04d8915294f 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0951.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0951.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0951",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-04-04T12:27:36.843",
"lastModified": "2024-11-21T01:25:12.220",
"vulnStatus": "Modified",
@@ -124,36 +124,36 @@
"references": [
{
"url": "http://secunia.com/advisories/43924",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1025271",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b74117.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/47093",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0821",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66471",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/43924",
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0959.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0959.json
index 85c2e1ea691..25f2d0655af 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0959.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0959.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0959",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-20T22:55:02.907",
"lastModified": "2024-11-21T01:25:12.347",
"vulnStatus": "Modified",
@@ -120,28 +120,28 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=23085",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/17304",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"URL Repurposed"
@@ -149,7 +149,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67521",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html",
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0960.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0960.json
index bd3772ad3ac..393f0c1d080 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0960.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0960.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0960",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-20T22:55:02.953",
"lastModified": "2024-11-21T01:25:12.470",
"vulnStatus": "Modified",
@@ -120,32 +120,32 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=23086",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/17304",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/47898",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"URL Repurposed"
@@ -153,7 +153,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67522",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html",
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0961.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0961.json
index 11a0e12ba2b..1d0f019c0f1 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0961.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0961.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0961",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-20T22:55:02.987",
"lastModified": "2024-11-21T01:25:12.593",
"vulnStatus": "Modified",
@@ -125,35 +125,35 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=23088",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/17304",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/47902",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"URL Repurposed"
@@ -161,7 +161,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67523",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html",
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0962.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0962.json
index 39bc047fde8..a4b2816aca8 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0962.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0962.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0962",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-20T22:55:03.033",
"lastModified": "2024-11-21T01:25:12.723",
"vulnStatus": "Modified",
@@ -120,25 +120,25 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=23087",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.exploit-db.com/exploits/17304",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"URL Repurposed"
@@ -146,7 +146,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67524",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html",
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0963.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0963.json
index 2a842e227d2..efdc31bc87f 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0963.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0963.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0963",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-03-31T22:55:02.973",
"lastModified": "2024-11-21T01:25:12.847",
"vulnStatus": "Modified",
@@ -122,11 +122,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b74114.shtml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025272",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b74114.shtml",
diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0966.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0966.json
index 5a639c99dd1..94a8a62822d 100644
--- a/CVE-2011/CVE-2011-09xx/CVE-2011-0966.json
+++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0966.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-0966",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-20T22:55:03.063",
"lastModified": "2024-11-21T01:25:12.973",
"vulnStatus": "Modified",
@@ -125,25 +125,25 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=23089",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.exploit-db.com/exploits/17304",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"URL Repurposed"
@@ -151,7 +151,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67525",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1602.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1602.json
index 89b50ec04fa..a835105615d 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1602.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1602.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1602",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-06-02T20:55:03.373",
"lastModified": "2024-11-21T01:26:41.150",
"vulnStatus": "Modified",
@@ -802,26 +802,26 @@
"references": [
{
"url": "http://osvdb.org/72717",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/44814/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/48074",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025588",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/72717",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1603.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1603.json
index 4ec5a485abf..33141ce4d75 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1603.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1603.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1603",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-06-02T20:55:03.403",
"lastModified": "2024-11-21T01:26:41.277",
"vulnStatus": "Modified",
@@ -812,26 +812,26 @@
"references": [
{
"url": "http://osvdb.org/72718",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/44814/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/48079",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025588",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/72718",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1604.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1604.json
index 1bdabc6adee..03d93c47bd7 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1604.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1604.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1604",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-03T22:55:02.357",
"lastModified": "2024-11-21T01:26:41.397",
"vulnStatus": "Modified",
@@ -324,34 +324,34 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/44331",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b79904.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/47609",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025449",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/1122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1605.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1605.json
index 50e6f9920ce..f73682cae0c 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1605.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1605.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1605",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-03T22:55:02.387",
"lastModified": "2024-11-21T01:26:41.503",
"vulnStatus": "Modified",
@@ -319,34 +319,34 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/44331",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b79904.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/47610",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025449",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/1122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67123",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1606.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1606.json
index 3387d3b1ef4..4d9f5c2c6ef 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1606.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1606.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1606",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-03T22:55:02.417",
"lastModified": "2024-11-21T01:26:41.630",
"vulnStatus": "Modified",
@@ -314,34 +314,34 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/44331",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b79904.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/47611",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025449",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/1122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67124",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1607.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1607.json
index 0381d237514..c896788443c 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1607.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1607.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1607",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-03T22:55:02.447",
"lastModified": "2024-11-21T01:26:41.747",
"vulnStatus": "Modified",
@@ -319,34 +319,34 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/44331",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b79904.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/47608",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025449",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/1122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67127",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1609.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1609.json
index 4c311ec3ab1..6f09c62415f 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1609.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1609.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1609",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-03T22:55:02.480",
"lastModified": "2024-11-21T01:26:41.853",
"vulnStatus": "Modified",
@@ -314,34 +314,34 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/44331",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b79904.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/47605",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025449",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/1122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67125",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1610.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1610.json
index b6c64d50e8c..2063396fa5f 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1610.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1610.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1610",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-03T22:55:02.667",
"lastModified": "2024-11-21T01:26:41.970",
"vulnStatus": "Modified",
@@ -329,42 +329,42 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/44331",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b79904.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/517727/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/47607",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025449",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/1122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://zerodayinitiative.com/advisories/ZDI-11-143/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67126",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1613.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1613.json
index c74886d6026..91d1cca7b35 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1613.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1613.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1613",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-03T22:55:02.697",
"lastModified": "2024-11-21T01:26:42.090",
"vulnStatus": "Modified",
@@ -109,30 +109,30 @@
"references": [
{
"url": "http://secunia.com/advisories/44384",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7950e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/47606",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025448",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/1123",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67128",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/44384",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1623.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1623.json
index 0efb1d0cd97..bd93ce60db0 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1623.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1623.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1623",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-06-02T20:55:03.450",
"lastModified": "2024-11-21T01:26:42.193",
"vulnStatus": "Modified",
@@ -107,26 +107,26 @@
"references": [
{
"url": "http://osvdb.org/72721",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80122.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/48078",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025590",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67760",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/72721",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1624.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1624.json
index 3dcd13ac6e0..da2d8251b1c 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1624.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1624.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1624",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-08-18T18:55:01.397",
"lastModified": "2024-11-21T01:26:42.300",
"vulnStatus": "Modified",
@@ -74,11 +74,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/cisco_ie3000/software/release/12.2_58_se/release/notes/OL24335.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://supportforums.cisco.com/message/3356210",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/cisco_ie3000/software/release/12.2_58_se/release/notes/OL24335.html",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1625.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1625.json
index a21058e660e..b4628424936 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1625.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1625.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1625",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-08-18T18:55:01.443",
"lastModified": "2024-11-21T01:26:42.397",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/cable/cmts/release/notes/12_2sc/uBR7200/122_33_SCF/caveats.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/cable/cmts/release/notes/12_2sc/uBR7200/122_33_SCF/caveats.html",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1637.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1637.json
index de60e85dbdf..d028615129b 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1637.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1637.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1637",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-06-02T20:55:03.480",
"lastModified": "2024-11-21T01:26:42.487",
"vulnStatus": "Modified",
@@ -812,30 +812,30 @@
"references": [
{
"url": "http://osvdb.org/72719",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/44814/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/48075",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025588",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/72719",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1640.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1640.json
index dbc0ad83203..6a01e97c2ab 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1640.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1640.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1640",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-22T02:59:19.073",
"lastModified": "2024-11-21T01:26:42.613",
"vulnStatus": "Modified",
@@ -98,7 +98,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/caveats_SXJ.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1643.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1643.json
index 060d700c369..60d1cb7e479 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1643.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1643.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1643",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-08-29T15:55:01.127",
"lastModified": "2024-11-21T01:26:42.713",
"vulnStatus": "Modified",
@@ -424,7 +424,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8f532.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1645.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1645.json
index 6092e0589d5..ae3b4c04a7c 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1645.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1645.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1645",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-31T20:55:02.750",
"lastModified": "2024-11-21T01:26:42.833",
"vulnStatus": "Modified",
@@ -158,18 +158,18 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f190.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/47988",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025565",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f190.shtml",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1646.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1646.json
index ccb1a20bb8c..e78856b9807 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1646.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1646.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1646",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-31T20:55:02.780",
"lastModified": "2024-11-21T01:26:42.947",
"vulnStatus": "Modified",
@@ -158,14 +158,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f190.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025565",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f190.shtml",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1647.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1647.json
index c3d30066338..d5d9633e8e1 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1647.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1647.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1647",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-31T20:55:02.827",
"lastModified": "2024-11-21T01:26:43.053",
"vulnStatus": "Modified",
@@ -158,18 +158,18 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f190.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/47985",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025565",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f190.shtml",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1649.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1649.json
index 40853295563..922d05d8f79 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1649.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1649.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1649",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-31T20:55:02.860",
"lastModified": "2024-11-21T01:26:43.160",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f18b.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025564",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f18b.shtml",
diff --git a/CVE-2011/CVE-2011-16xx/CVE-2011-1651.json b/CVE-2011/CVE-2011-16xx/CVE-2011-1651.json
index 2a40e247a8f..68189e0e231 100644
--- a/CVE-2011/CVE-2011-16xx/CVE-2011-1651.json
+++ b/CVE-2011/CVE-2011-16xx/CVE-2011-1651.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-1651",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-05-31T20:55:02.890",
"lastModified": "2024-11-21T01:26:43.263",
"vulnStatus": "Modified",
@@ -109,14 +109,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f191.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025567",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f191.shtml",
diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2024.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2024.json
index 31dd2ce18d5..3d736a1bbb2 100644
--- a/CVE-2011/CVE-2011-20xx/CVE-2011-2024.json
+++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2024.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2024",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-06-02T20:55:03.513",
"lastModified": "2024-11-21T01:27:30.300",
"vulnStatus": "Modified",
@@ -230,26 +230,26 @@
"references": [
{
"url": "http://osvdb.org/72720",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80121.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/48076",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025589",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67782",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/72720",
diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2039.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2039.json
index d27f1f79040..81f96a4569e 100644
--- a/CVE-2011/CVE-2011-20xx/CVE-2011-2039.json
+++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2039.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2039",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-06-02T19:55:04.373",
"lastModified": "2024-11-21T01:27:30.420",
"vulnStatus": "Modified",
@@ -127,37 +127,37 @@
"references": [
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=909",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/72714",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securityreason.com/securityalert/8272",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80123.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/490097",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securitytracker.com/id?1025591",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67739",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=909",
diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2040.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2040.json
index a2e213af143..f8a6757c201 100644
--- a/CVE-2011/CVE-2011-20xx/CVE-2011-2040.json
+++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2040.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2040",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-06-02T19:55:04.420",
"lastModified": "2024-11-21T01:27:30.533",
"vulnStatus": "Modified",
@@ -212,29 +212,29 @@
"references": [
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=910",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80123.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/490097",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securitytracker.com/id?1025591",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67739",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=910",
diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2041.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2041.json
index b474552590e..8cb22705e29 100644
--- a/CVE-2011/CVE-2011-20xx/CVE-2011-2041.json
+++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2041.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2041",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-06-02T20:55:03.543",
"lastModified": "2024-11-21T01:27:30.643",
"vulnStatus": "Modified",
@@ -137,22 +137,22 @@
"references": [
{
"url": "http://osvdb.org/72716",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80123.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/48077",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025591",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/72716",
diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2042.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2042.json
index de3fba80975..32b0f1b558b 100644
--- a/CVE-2011/CVE-2011-20xx/CVE-2011-2042.json
+++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2042.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2042",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-22T02:59:19.103",
"lastModified": "2024-11-21T01:27:30.750",
"vulnStatus": "Modified",
@@ -119,7 +119,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/net_mgmt/ciscoworks_common_services_software/3.3/release/notes/cs33rel.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/net_mgmt/ciscoworks_common_services_software/3.3/release/notes/cs33rel.html",
diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2054.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2054.json
index cd0e7260961..b4f0cb321d4 100644
--- a/CVE-2011/CVE-2011-20xx/CVE-2011-2054.json
+++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2054.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2054",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T03:15:10.277",
"lastModified": "2024-11-21T01:27:30.853",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -435,7 +435,7 @@
"references": [
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCtq58884",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2057.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2057.json
index c193c9668ab..52d26b41b18 100644
--- a/CVE-2011/CVE-2011-20xx/CVE-2011-2057.json
+++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2057.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2057",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-22T02:59:19.150",
"lastModified": "2024-11-21T01:27:31.007",
"vulnStatus": "Modified",
@@ -98,7 +98,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/caveats_SXI_rebuilds.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2058.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2058.json
index eba7123843f..9ba6afb797d 100644
--- a/CVE-2011/CVE-2011-20xx/CVE-2011-2058.json
+++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2058.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2058",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-22T02:59:19.183",
"lastModified": "2024-11-21T01:27:31.120",
"vulnStatus": "Modified",
@@ -98,7 +98,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/caveats_SXI_rebuilds.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2059.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2059.json
index 536b17e4be4..69a01b55657 100644
--- a/CVE-2011/CVE-2011-20xx/CVE-2011-2059.json
+++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2059.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2059",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-22T02:59:19.323",
"lastModified": "2024-11-21T01:27:31.237",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://blogs.cisco.com/security/1999tcp-redux-the-ipv6-flavor",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=36606&signatureSubId=0",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2060.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2060.json
index 7ed9d7f9269..b446093d3e0 100644
--- a/CVE-2011/CVE-2011-20xx/CVE-2011-2060.json
+++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2060.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2060",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-22T02:59:19.370",
"lastModified": "2024-11-21T01:27:31.360",
"vulnStatus": "Modified",
@@ -446,7 +446,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/security/asa/asa84/release/notes/asarn84.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/security/asa/asa84/release/notes/asarn84.html",
diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2064.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2064.json
index d7142b34bd9..6dae5c3ea51 100644
--- a/CVE-2011/CVE-2011-20xx/CVE-2011-2064.json
+++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2064.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2064",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-07-11T20:55:01.270",
"lastModified": "2024-11-21T01:27:31.493",
"vulnStatus": "Modified",
@@ -111,33 +111,33 @@
"references": [
{
"url": "http://osvdb.org/73657",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/45148",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1025748",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b86503.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/48581",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68408",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/73657",
diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2072.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2072.json
index bb02e0c0b3c..57a19eb7d38 100644
--- a/CVE-2011/CVE-2011-20xx/CVE-2011-2072.json
+++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2072.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2072",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.453",
"lastModified": "2024-11-21T01:27:31.617",
"vulnStatus": "Modified",
@@ -459,29 +459,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20110928-cucm",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24129",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d58.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d5a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1026110",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20110928-cucm",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2538.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2538.json
index 1cc595ee3f0..78d4bcd367f 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2538.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2538.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2538",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-29T19:15:13.110",
"lastModified": "2024-11-21T01:28:29.643",
"vulnStatus": "Modified",
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://www.cisco.com/c/dam/en/us/td/docs/telepresence/infrastructure/vcs/release_note/Cisco_VCS_Release_Note_X7-0-3.pdf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2543.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2543.json
index 3c10d9233eb..cfd48de8887 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2543.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2543.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2543",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-09-23T10:55:02.693",
"lastModified": "2024-11-21T01:28:29.757",
"vulnStatus": "Modified",
@@ -121,47 +121,47 @@
"references": [
{
"url": "http://secunia.com/advisories/46057",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/46109",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/8393",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1026072",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.exploit-db.com/exploits/17871",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/519698/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/49670",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69907",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/46057",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2544.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2544.json
index df5544d1c9a..f4ba207e7ec 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2544.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2544.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2544",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-09-23T10:55:02.800",
"lastModified": "2024-11-21T01:28:29.873",
"vulnStatus": "Modified",
@@ -112,44 +112,44 @@
"references": [
{
"url": "http://secunia.com/advisories/46057",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/46109",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/8393",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1026072",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.exploit-db.com/exploits/17871",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/519698/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/49670",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69906",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/46057",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2545.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2545.json
index 426266cb044..be0060c464f 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2545.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2545.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2545",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-06-13T20:55:01.707",
"lastModified": "2024-11-21T01:28:29.980",
"vulnStatus": "Modified",
@@ -299,7 +299,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=26037",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2546.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2546.json
index 1f9a8f3953d..6d15ef47df2 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2546.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2546.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2546",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-07-28T22:55:02.093",
"lastModified": "2024-11-21T01:28:30.090",
"vulnStatus": "Modified",
@@ -132,29 +132,29 @@
"references": [
{
"url": "http://secunia.com/advisories/45355",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1025810",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8915e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/48812",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68737",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/45355",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2547.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2547.json
index 4bbf365fb13..7e2b5ed0b6a 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2547.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2547.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2547",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-07-28T22:55:02.140",
"lastModified": "2024-11-21T01:28:30.200",
"vulnStatus": "Modified",
@@ -132,29 +132,29 @@
"references": [
{
"url": "http://secunia.com/advisories/45355",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1025810",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8915e.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/48810",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68738",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/45355",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2549.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2549.json
index 7976cbabc80..9a1a15beb79 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2549.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2549.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2549",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-07-28T22:55:02.187",
"lastModified": "2024-11-21T01:28:30.317",
"vulnStatus": "Modified",
@@ -91,29 +91,29 @@
"references": [
{
"url": "http://secunia.com/advisories/45333",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1025811",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b89155.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/48811",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68733",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/45333",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2555.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2555.json
index 684f7846ff3..4f66aab92ef 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2555.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2555.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2555",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-08-29T20:55:00.817",
"lastModified": "2024-11-21T01:28:30.437",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://securitytracker.com/id?1025872",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8ad3f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/48932",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68887",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1025872",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2560.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2560.json
index 9c7d2f69103..4808077447f 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2560.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2560.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2560",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-08-29T15:55:01.190",
"lastModified": "2024-11-21T01:28:30.540",
"vulnStatus": "Modified",
@@ -139,7 +139,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8f531.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2561.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2561.json
index d9cbc751064..b17210315ba 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2561.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2561.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2561",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-08-29T15:55:01.220",
"lastModified": "2024-11-21T01:28:30.667",
"vulnStatus": "Modified",
@@ -204,7 +204,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8f531.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2562.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2562.json
index 7402adb83c9..0e64fb77503 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2562.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2562.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2562",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-08-29T15:55:01.267",
"lastModified": "2024-11-21T01:28:30.817",
"vulnStatus": "Modified",
@@ -309,7 +309,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8f531.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2563.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2563.json
index 78da48cbcd6..e64477b1833 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2563.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2563.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2563",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-08-29T15:55:01.300",
"lastModified": "2024-11-21T01:28:30.933",
"vulnStatus": "Modified",
@@ -134,21 +134,21 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8f531.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8f533.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025969",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8f531.shtml",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2564.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2564.json
index 4c61267d268..f06800771c6 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2564.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2564.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2564",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-08-29T15:55:01.347",
"lastModified": "2024-11-21T01:28:31.043",
"vulnStatus": "Modified",
@@ -134,21 +134,21 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8f531.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8f533.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1025969",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8f531.shtml",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2569.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2569.json
index 4a30d670ca5..20d748fb361 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2569.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2569.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2569",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-27T21:55:00.730",
"lastModified": "2024-11-21T01:28:31.170",
"vulnStatus": "Modified",
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24458",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2577.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2577.json
index 64e022a9134..76f0c85796c 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2577.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2577.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2577",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-08-31T23:55:03.300",
"lastModified": "2024-11-21T01:28:31.283",
"vulnStatus": "Modified",
@@ -206,41 +206,41 @@
"references": [
{
"url": "http://securityreason.com/securityalert/8387",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securityreason.com/securityalert/8389",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b91395.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/17871",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/519698/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/49392",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1025994",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69513",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securityreason.com/securityalert/8387",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2578.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2578.json
index 10509caa46a..4f2df714313 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2578.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2578.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2578",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.097",
"lastModified": "2024-11-21T01:28:31.420",
"vulnStatus": "Modified",
@@ -79,18 +79,18 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-4MCAVS.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1027005",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75338",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-4MCAVS.html",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2581.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2581.json
index 932ebcd3ace..50ddf00e911 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2581.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2581.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2581",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-09-14T16:05:23.603",
"lastModified": "2024-11-21T01:28:31.550",
"vulnStatus": "Modified",
@@ -154,18 +154,18 @@
"references": [
{
"url": "http://secunia.com/advisories/45883",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b9250c.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1026019",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/45883",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2583.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2583.json
index 479c6fca5cc..1abc0c033c8 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2583.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2583.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2583",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.143",
"lastModified": "2024-11-21T01:28:31.670",
"vulnStatus": "Modified",
@@ -79,15 +79,15 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/cust_contact/contact_center/crs/express_8_5/release/guide/uccx851rn.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027009",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75339",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/cust_contact/contact_center/crs/express_8_5/release/guide/uccx851rn.pdf",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2584.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2584.json
index 7b05ff9fb69..69eb9654835 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2584.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2584.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2584",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-20T00:55:00.643",
"lastModified": "2024-11-21T01:28:31.787",
"vulnStatus": "Modified",
@@ -85,18 +85,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111019-sns",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/50282",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70757",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111019-sns",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2585.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2585.json
index e61ef71508a..49af10bd932 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2585.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2585.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2585",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-20T00:55:00.707",
"lastModified": "2024-11-21T01:28:31.900",
"vulnStatus": "Modified",
@@ -85,14 +85,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111019-sns",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/50285",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111019-sns",
diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2586.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2586.json
index e8139a5a1e5..2d194151517 100644
--- a/CVE-2011/CVE-2011-25xx/CVE-2011-2586.json
+++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2586.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-2586",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.237",
"lastModified": "2024-11-21T01:28:32.010",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24436",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1027005",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24436",
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3270.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3270.json
index 3d1b162713d..9d9db70a330 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3270.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3270.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3270",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.500",
"lastModified": "2024-11-21T01:30:09.570",
"vulnStatus": "Modified",
@@ -326,11 +326,11 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24114",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d50.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3271.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3271.json
index 968fcd98c41..0f6c20b4703 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3271.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3271.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3271",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.593",
"lastModified": "2024-11-21T01:30:09.710",
"vulnStatus": "Modified",
@@ -79,11 +79,11 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24115",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d4f.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3272.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3272.json
index 923e98430ec..cf4719eff2d 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3272.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3272.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3272",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.640",
"lastModified": "2024-11-21T01:30:09.843",
"vulnStatus": "Modified",
@@ -229,18 +229,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d4c.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1026120",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24122",
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3273.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3273.json
index 496c56fc8a8..140e4fc1d53 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3273.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3273.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3273",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.673",
"lastModified": "2024-11-21T01:30:09.980",
"vulnStatus": "Modified",
@@ -124,11 +124,11 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24123",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d57.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3274.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3274.json
index bfc62c02a5b..f3843d546ed 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3274.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3274.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3274",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.720",
"lastModified": "2024-11-21T01:30:10.130",
"vulnStatus": "Modified",
@@ -264,11 +264,11 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24125",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d52.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3275.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3275.json
index 46a7ad05d64..e98babf6711 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3275.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3275.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3275",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.750",
"lastModified": "2024-11-21T01:30:10.270",
"vulnStatus": "Modified",
@@ -164,11 +164,11 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24130",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d5a.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3276.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3276.json
index 0ee3c43c52a..3d24f395fde 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3276.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3276.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3276",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.797",
"lastModified": "2024-11-21T01:30:10.407",
"vulnStatus": "Modified",
@@ -1024,11 +1024,11 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24118",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d4d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3277.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3277.json
index 75e312da2a3..751fbd8c65f 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3277.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3277.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3277",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.843",
"lastModified": "2024-11-21T01:30:10.573",
"vulnStatus": "Modified",
@@ -1024,14 +1024,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24119",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d4d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3278.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3278.json
index fd589a66924..c975501fd36 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3278.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3278.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3278",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.877",
"lastModified": "2024-11-21T01:30:10.740",
"vulnStatus": "Modified",
@@ -1024,14 +1024,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24120",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d4d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3279.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3279.json
index 7c6345fd46a..94d7270f013 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3279.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3279.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3279",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.907",
"lastModified": "2024-11-21T01:30:10.913",
"vulnStatus": "Modified",
@@ -103,21 +103,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24121",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d4d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13781",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3280.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3280.json
index 8ad440d300c..f31f5946fbf 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3280.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3280.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3280",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.953",
"lastModified": "2024-11-21T01:30:11.053",
"vulnStatus": "Modified",
@@ -1046,14 +1046,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24120",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d4d.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3281.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3281.json
index 589f8d25b31..af141588f5e 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3281.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3281.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3281",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:03.987",
"lastModified": "2024-11-21T01:30:11.220",
"vulnStatus": "Modified",
@@ -124,11 +124,11 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24124",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d57.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3282.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3282.json
index f45ef2bcb7e..22805e7fe0a 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3282.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3282.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3282",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-03T23:55:04.017",
"lastModified": "2024-11-21T01:30:11.363",
"vulnStatus": "Modified",
@@ -264,11 +264,11 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=24126",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d52.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3283.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3283.json
index 951ffba45ed..4f784f47ec8 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3283.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3283.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3283",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.270",
"lastModified": "2024-11-21T01:30:11.520",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://www.cisco.com/cisco/software/release.html?mdfid=280777815&softwareid=280867577&release=3.9.1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securitytracker.com/id?1027006",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75341",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/cisco/software/release.html?mdfid=280777815&softwareid=280867577&release=3.9.1",
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3285.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3285.json
index 61fcea60019..c961d16b0c5 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3285.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3285.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3285",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.317",
"lastModified": "2024-11-21T01:30:11.657",
"vulnStatus": "Modified",
@@ -245,15 +245,15 @@
"references": [
{
"url": "http://www.cisco.com/web/software/280775065/37740/ASA-805-Interim-Release-Notes.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027008",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75343",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/web/software/280775065/37740/ASA-805-Interim-Release-Notes.html",
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3287.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3287.json
index 2f821c90879..7fbcad3e215 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3287.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3287.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3287",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-06T10:55:05.050",
"lastModified": "2024-11-21T01:30:11.800",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d47.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3288.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3288.json
index c7cab1b6478..6b62caead21 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3288.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3288.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3288",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-06T10:55:05.097",
"lastModified": "2024-11-21T01:30:11.943",
"vulnStatus": "Modified",
@@ -97,7 +97,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d47.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Not Applicable"
]
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3289.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3289.json
index 71693dcb3f7..df38a6c0f19 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3289.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3289.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3289",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.347",
"lastModified": "2024-11-21T01:30:12.083",
"vulnStatus": "Modified",
@@ -89,11 +89,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027005",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html",
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3290.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3290.json
index 448f0628a26..2cdc90671f6 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3290.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3290.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3290",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-09-21T16:55:04.147",
"lastModified": "2024-11-21T01:30:12.240",
"vulnStatus": "Modified",
@@ -97,26 +97,26 @@
"references": [
{
"url": "http://secunia.com/advisories/46061",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95105.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/49703",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026075",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69945",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/46061",
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3293.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3293.json
index 7e2be9572bb..e4e50f1511b 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3293.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3293.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3293",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.380",
"lastModified": "2024-11-21T01:30:12.387",
"vulnStatus": "Modified",
@@ -74,15 +74,15 @@
"references": [
{
"url": "http://secunia.com/advisories/49101",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/web/software/282766937/37718/Acs-5-2-0-26-9-Readme.txt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/53436",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/49101",
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3294.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3294.json
index be19519dd8c..5f0506d3a88 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3294.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3294.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3294",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-19T15:55:02.267",
"lastModified": "2024-11-21T01:30:12.520",
"vulnStatus": "Modified",
@@ -97,22 +97,22 @@
"references": [
{
"url": "http://securitytracker.com/id?1026186",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/products/products_security_response09186a0080b98d0b.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/50084",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70563",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://securitytracker.com/id?1026186",
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3295.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3295.json
index ee878ec61b7..6a26909ff07 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3295.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3295.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3295",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.473",
"lastModified": "2024-11-21T01:30:12.690",
"vulnStatus": "Modified",
@@ -139,15 +139,15 @@
"references": [
{
"url": "http://www-europe.cisco.com/cisco/software/release.html?mdfid=279879106&reltype=all&relind=AVAILABLE&release=3.9.2&softwareid=280867577&sortparam=7",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027005",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027006",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www-europe.cisco.com/cisco/software/release.html?mdfid=279879106&reltype=all&relind=AVAILABLE&release=3.9.2&softwareid=280867577&sortparam=7",
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3296.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3296.json
index b5c286c9547..de71fa5dc4a 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3296.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3296.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3296",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-06T10:55:05.143",
"lastModified": "2024-11-21T01:30:12.860",
"vulnStatus": "Modified",
@@ -406,14 +406,14 @@
"references": [
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70326",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml",
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3297.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3297.json
index 33c3eca4ef1..8f0b3802150 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3297.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3297.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3297",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-06T10:55:05.300",
"lastModified": "2024-11-21T01:30:13.013",
"vulnStatus": "Modified",
@@ -406,14 +406,14 @@
"references": [
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70327",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml",
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3298.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3298.json
index 4ab5e6e133e..e2f1e2768e8 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3298.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3298.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3298",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-06T10:55:05.333",
"lastModified": "2024-11-21T01:30:13.160",
"vulnStatus": "Modified",
@@ -798,21 +798,21 @@
"references": [
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70328",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml",
diff --git a/CVE-2011/CVE-2011-32xx/CVE-2011-3299.json b/CVE-2011/CVE-2011-32xx/CVE-2011-3299.json
index 81039d14902..57208a6593f 100644
--- a/CVE-2011/CVE-2011-32xx/CVE-2011-3299.json
+++ b/CVE-2011/CVE-2011-32xx/CVE-2011-3299.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3299",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-06T10:55:05.393",
"lastModified": "2024-11-21T01:30:13.320",
"vulnStatus": "Modified",
@@ -798,21 +798,21 @@
"references": [
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70330",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml",
diff --git a/CVE-2011/CVE-2011-33xx/CVE-2011-3300.json b/CVE-2011/CVE-2011-33xx/CVE-2011-3300.json
index dba7d04492b..6a566e5700c 100644
--- a/CVE-2011/CVE-2011-33xx/CVE-2011-3300.json
+++ b/CVE-2011/CVE-2011-33xx/CVE-2011-3300.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3300",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-06T10:55:05.440",
"lastModified": "2024-11-21T01:30:13.487",
"vulnStatus": "Modified",
@@ -798,25 +798,25 @@
"references": [
{
"url": "http://osvdb.org/76087",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70331",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/76087",
diff --git a/CVE-2011/CVE-2011-33xx/CVE-2011-3301.json b/CVE-2011/CVE-2011-33xx/CVE-2011-3301.json
index ed6e70aa03e..cd83e66a95e 100644
--- a/CVE-2011/CVE-2011-33xx/CVE-2011-3301.json
+++ b/CVE-2011/CVE-2011-33xx/CVE-2011-3301.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3301",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-06T10:55:05.487",
"lastModified": "2024-11-21T01:30:13.660",
"vulnStatus": "Modified",
@@ -798,25 +798,25 @@
"references": [
{
"url": "http://osvdb.org/76088",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70332",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/76088",
diff --git a/CVE-2011/CVE-2011-33xx/CVE-2011-3302.json b/CVE-2011/CVE-2011-33xx/CVE-2011-3302.json
index 6d0c8c38247..1672b1bb25e 100644
--- a/CVE-2011/CVE-2011-33xx/CVE-2011-3302.json
+++ b/CVE-2011/CVE-2011-33xx/CVE-2011-3302.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3302",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-06T10:55:05.550",
"lastModified": "2024-11-21T01:30:13.830",
"vulnStatus": "Modified",
@@ -798,25 +798,25 @@
"references": [
{
"url": "http://osvdb.org/76089",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/76089",
diff --git a/CVE-2011/CVE-2011-33xx/CVE-2011-3303.json b/CVE-2011/CVE-2011-33xx/CVE-2011-3303.json
index 81c37b13e6b..01769929774 100644
--- a/CVE-2011/CVE-2011-33xx/CVE-2011-3303.json
+++ b/CVE-2011/CVE-2011-33xx/CVE-2011-3303.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3303",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-06T10:55:05.597",
"lastModified": "2024-11-21T01:30:14.000",
"vulnStatus": "Modified",
@@ -798,25 +798,25 @@
"references": [
{
"url": "http://osvdb.org/76090",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70329",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/76090",
diff --git a/CVE-2011/CVE-2011-33xx/CVE-2011-3304.json b/CVE-2011/CVE-2011-33xx/CVE-2011-3304.json
index fd1e3b0fc22..1ca811e3623 100644
--- a/CVE-2011/CVE-2011-33xx/CVE-2011-3304.json
+++ b/CVE-2011/CVE-2011-33xx/CVE-2011-3304.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3304",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-06T10:55:05.643",
"lastModified": "2024-11-21T01:30:14.177",
"vulnStatus": "Modified",
@@ -461,22 +461,22 @@
"references": [
{
"url": "http://osvdb.org/76091",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/49952",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70334",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/76091",
diff --git a/CVE-2011/CVE-2011-33xx/CVE-2011-3305.json b/CVE-2011/CVE-2011-33xx/CVE-2011-3305.json
index 12b02423914..0bb58a430a9 100644
--- a/CVE-2011/CVE-2011-33xx/CVE-2011-3305.json
+++ b/CVE-2011/CVE-2011-33xx/CVE-2011-3305.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3305",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-06T10:55:05.723",
"lastModified": "2024-11-21T01:30:14.333",
"vulnStatus": "Modified",
@@ -96,30 +96,30 @@
"references": [
{
"url": "http://osvdb.org/76080",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/46309",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/49954",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026142",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70335",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/76080",
diff --git a/CVE-2011/CVE-2011-33xx/CVE-2011-3309.json b/CVE-2011/CVE-2011-33xx/CVE-2011-3309.json
index 245e5a3989b..86e61d089b8 100644
--- a/CVE-2011/CVE-2011-33xx/CVE-2011-3309.json
+++ b/CVE-2011/CVE-2011-33xx/CVE-2011-3309.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3309",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.520",
"lastModified": "2024-11-21T01:30:14.480",
"vulnStatus": "Modified",
@@ -191,11 +191,11 @@
"references": [
{
"url": "http://www.cisco.com/web/software/280775065/45357/ASA-825-Interim-Release-Notes.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027008",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/web/software/280775065/45357/ASA-825-Interim-Release-Notes.html",
diff --git a/CVE-2011/CVE-2011-33xx/CVE-2011-3310.json b/CVE-2011/CVE-2011-33xx/CVE-2011-3310.json
index bf3eaefff5d..5e2b6aa1e9b 100644
--- a/CVE-2011/CVE-2011-33xx/CVE-2011-3310.json
+++ b/CVE-2011/CVE-2011-33xx/CVE-2011-3310.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3310",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-20T00:55:00.737",
"lastModified": "2024-11-21T01:30:14.630",
"vulnStatus": "Modified",
@@ -122,22 +122,22 @@
"references": [
{
"url": "http://secunia.com/advisories/46533",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111019-cs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/50284",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70759",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/46533",
diff --git a/CVE-2011/CVE-2011-33xx/CVE-2011-3315.json b/CVE-2011/CVE-2011-33xx/CVE-2011-3315.json
index 72e302fae13..7c50bfb5b37 100644
--- a/CVE-2011/CVE-2011-33xx/CVE-2011-3315.json
+++ b/CVE-2011/CVE-2011-33xx/CVE-2011-3315.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3315",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-27T21:55:00.823",
"lastModified": "2024-11-21T01:30:14.773",
"vulnStatus": "Modified",
@@ -461,14 +461,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-uccx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-33xx/CVE-2011-3317.json b/CVE-2011/CVE-2011-33xx/CVE-2011-3317.json
index 6da4a429d5b..3fce69488c8 100644
--- a/CVE-2011/CVE-2011-33xx/CVE-2011-3317.json
+++ b/CVE-2011/CVE-2011-33xx/CVE-2011-3317.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3317",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.550",
"lastModified": "2024-11-21T01:30:14.950",
"vulnStatus": "Modified",
@@ -74,15 +74,15 @@
"references": [
{
"url": "http://secunia.com/advisories/49101",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/web/software/282766937/37718/Acs-5-2-0-26-9-Readme.txt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/53436",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/49101",
diff --git a/CVE-2011/CVE-2011-33xx/CVE-2011-3318.json b/CVE-2011/CVE-2011-33xx/CVE-2011-3318.json
index 9f37269b1a0..9dd697b8d6c 100644
--- a/CVE-2011/CVE-2011-33xx/CVE-2011-3318.json
+++ b/CVE-2011/CVE-2011-33xx/CVE-2011-3318.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3318",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-27T21:55:00.963",
"lastModified": "2024-11-21T01:30:15.113",
"vulnStatus": "Modified",
@@ -174,7 +174,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-camera",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-33xx/CVE-2011-3319.json b/CVE-2011/CVE-2011-33xx/CVE-2011-3319.json
index a60e122b27b..b4add23f6d2 100644
--- a/CVE-2011/CVE-2011-33xx/CVE-2011-3319.json
+++ b/CVE-2011/CVE-2011-33xx/CVE-2011-3319.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-3319",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-27T21:55:01.057",
"lastModified": "2024-11-21T01:30:15.253",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-40xx/CVE-2011-4004.json b/CVE-2011/CVE-2011-40xx/CVE-2011-4004.json
index 5ff8f53f10c..332c2a70fd9 100644
--- a/CVE-2011/CVE-2011-40xx/CVE-2011-4004.json
+++ b/CVE-2011/CVE-2011-40xx/CVE-2011-4004.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4004",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-10-27T21:55:01.107",
"lastModified": "2024-11-21T01:31:41.710",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-40xx/CVE-2011-4005.json b/CVE-2011/CVE-2011-40xx/CVE-2011-4005.json
index 4525d988f0f..abe61c888e8 100644
--- a/CVE-2011/CVE-2011-40xx/CVE-2011-4005.json
+++ b/CVE-2011/CVE-2011-40xx/CVE-2011-4005.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4005",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2011-11-03T10:55:08.700",
"lastModified": "2024-11-21T01:31:41.820",
"vulnStatus": "Modified",
@@ -155,26 +155,26 @@
"references": [
{
"url": "http://secunia.com/advisories/46664",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111102-srp500",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/50495",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026266",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71103",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/46664",
diff --git a/CVE-2011/CVE-2011-40xx/CVE-2011-4006.json b/CVE-2011/CVE-2011-40xx/CVE-2011-4006.json
index 8c9c6cdacc9..050190354ad 100644
--- a/CVE-2011/CVE-2011-40xx/CVE-2011-4006.json
+++ b/CVE-2011/CVE-2011-40xx/CVE-2011-4006.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4006",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.597",
"lastModified": "2024-11-21T01:31:41.933",
"vulnStatus": "Modified",
@@ -206,11 +206,11 @@
"references": [
{
"url": "http://www.cisco.com/web/software/283878312/88166/ASA-851-Interim-Release-Notes.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027008",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/web/software/283878312/88166/ASA-851-Interim-Release-Notes.html",
diff --git a/CVE-2011/CVE-2011-40xx/CVE-2011-4007.json b/CVE-2011/CVE-2011-40xx/CVE-2011-4007.json
index 1d5b713341d..df7bb5c0ff2 100644
--- a/CVE-2011/CVE-2011-40xx/CVE-2011-4007.json
+++ b/CVE-2011/CVE-2011-40xx/CVE-2011-4007.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4007",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.660",
"lastModified": "2024-11-21T01:31:42.050",
"vulnStatus": "Modified",
@@ -174,11 +174,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/ios_xe/3/release/notes/asr1k_caveats_33s.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027005",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/ios_xe/3/release/notes/asr1k_caveats_33s.html",
diff --git a/CVE-2011/CVE-2011-40xx/CVE-2011-4012.json b/CVE-2011/CVE-2011-40xx/CVE-2011-4012.json
index f29fd8a26fa..a99ef577da5 100644
--- a/CVE-2011/CVE-2011-40xx/CVE-2011-4012.json
+++ b/CVE-2011/CVE-2011-40xx/CVE-2011-4012.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4012",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.707",
"lastModified": "2024-11-21T01:31:42.160",
"vulnStatus": "Modified",
@@ -84,11 +84,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/caveats_SXJ.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027005",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/caveats_SXJ.html",
diff --git a/CVE-2011/CVE-2011-40xx/CVE-2011-4014.json b/CVE-2011/CVE-2011-40xx/CVE-2011-4014.json
index b0f70afa2d5..268fffd0395 100644
--- a/CVE-2011/CVE-2011-40xx/CVE-2011-4014.json
+++ b/CVE-2011/CVE-2011-40xx/CVE-2011-4014.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4014",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.753",
"lastModified": "2024-11-21T01:31:42.277",
"vulnStatus": "Modified",
@@ -94,11 +94,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/wireless/wcs/release/notes/WCS_RN7_0_230.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027011",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/wireless/wcs/release/notes/WCS_RN7_0_230.html",
diff --git a/CVE-2011/CVE-2011-40xx/CVE-2011-4015.json b/CVE-2011/CVE-2011-40xx/CVE-2011-4015.json
index 2d811edf9f9..a98a2400a8c 100644
--- a/CVE-2011/CVE-2011-40xx/CVE-2011-4015.json
+++ b/CVE-2011/CVE-2011-40xx/CVE-2011-4015.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4015",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.787",
"lastModified": "2024-11-21T01:31:42.387",
"vulnStatus": "Modified",
@@ -74,11 +74,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_2s/release/notes/15_2s_caveats_15_2_2s.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027005",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_2s/release/notes/15_2s_caveats_15_2_2s.html",
diff --git a/CVE-2011/CVE-2011-40xx/CVE-2011-4016.json b/CVE-2011/CVE-2011-40xx/CVE-2011-4016.json
index 4d2a0c707e9..361f7227085 100644
--- a/CVE-2011/CVE-2011-40xx/CVE-2011-4016.json
+++ b/CVE-2011/CVE-2011-40xx/CVE-2011-4016.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4016",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.817",
"lastModified": "2024-11-21T01:31:42.490",
"vulnStatus": "Modified",
@@ -93,7 +93,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
@@ -101,7 +101,7 @@
},
{
"url": "http://www.securitytracker.com/id?1027005",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2011/CVE-2011-40xx/CVE-2011-4019.json b/CVE-2011/CVE-2011-40xx/CVE-2011-4019.json
index b1d4eb12b11..a0e20becebd 100644
--- a/CVE-2011/CVE-2011-40xx/CVE-2011-4019.json
+++ b/CVE-2011/CVE-2011-40xx/CVE-2011-4019.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4019",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-03T10:11:39.530",
"lastModified": "2024-11-21T01:31:42.607",
"vulnStatus": "Modified",
@@ -264,11 +264,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151TCAVS.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/web/software/282074295/90289/cucm-readme-715bsu5.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151TCAVS.html",
diff --git a/CVE-2011/CVE-2011-40xx/CVE-2011-4022.json b/CVE-2011/CVE-2011-40xx/CVE-2011-4022.json
index 80c2b54ca77..791db003b88 100644
--- a/CVE-2011/CVE-2011-40xx/CVE-2011-4022.json
+++ b/CVE-2011/CVE-2011-40xx/CVE-2011-4022.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4022",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-03T10:11:39.593",
"lastModified": "2024-11-21T01:31:42.717",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://www.cisco.com/web/software/282549709/56954/IPS-7-1-3-E4_readme.txt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/web/software/282549709/56954/IPS-7-1-3-E4_readme.txt",
diff --git a/CVE-2011/CVE-2011-40xx/CVE-2011-4023.json b/CVE-2011/CVE-2011-40xx/CVE-2011-4023.json
index d915ce0eda2..b560c13c1c6 100644
--- a/CVE-2011/CVE-2011-40xx/CVE-2011-4023.json
+++ b/CVE-2011/CVE-2011-40xx/CVE-2011-4023.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4023",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-03T10:11:39.640",
"lastModified": "2024-11-21T01:31:42.820",
"vulnStatus": "Modified",
@@ -211,7 +211,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/release/notes/Rel_5_0_3_N2_1/Nexus5000_Release_Notes_5_0_3_N2.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/release/notes/Rel_5_0_3_N2_1/Nexus5000_Release_Notes_5_0_3_N2.html",
diff --git a/CVE-2011/CVE-2011-42xx/CVE-2011-4231.json b/CVE-2011/CVE-2011-42xx/CVE-2011-4231.json
index 500badc6ca4..00bb650249e 100644
--- a/CVE-2011/CVE-2011-42xx/CVE-2011-4231.json
+++ b/CVE-2011/CVE-2011-42xx/CVE-2011-4231.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4231",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-03T10:11:39.687",
"lastModified": "2024-11-21T01:32:03.250",
"vulnStatus": "Modified",
@@ -204,14 +204,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-4MCAVS.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/en/US/docs/ios/ios_xe/3/release/notes/asr1k_caveats_34s.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-42xx/CVE-2011-4232.json b/CVE-2011/CVE-2011-42xx/CVE-2011-4232.json
index bdc72b37fd8..fea6125a388 100644
--- a/CVE-2011/CVE-2011-42xx/CVE-2011-4232.json
+++ b/CVE-2011/CVE-2011-42xx/CVE-2011-4232.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4232",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-03T10:11:39.733",
"lastModified": "2024-11-21T01:32:03.380",
"vulnStatus": "Modified",
@@ -79,11 +79,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/meetingplace/6_1/release_notes/mp61_rn.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/53432",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/meetingplace/6_1/release_notes/mp61_rn.pdf",
diff --git a/CVE-2011/CVE-2011-42xx/CVE-2011-4237.json b/CVE-2011/CVE-2011-42xx/CVE-2011-4237.json
index b51e55f446a..1b08eece1b0 100644
--- a/CVE-2011/CVE-2011-42xx/CVE-2011-4237.json
+++ b/CVE-2011/CVE-2011-42xx/CVE-2011-4237.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4237",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-03T10:11:39.827",
"lastModified": "2024-11-21T01:32:03.500",
"vulnStatus": "Modified",
@@ -79,15 +79,15 @@
"references": [
{
"url": "http://secunia.com/advisories/49094",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/net_mgmt/ciscoworks_lan_management_solution/4.2/release/notes/lms42rel.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.nessus.org/plugins/index.php?view=single&id=58950",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/49094",
diff --git a/CVE-2011/CVE-2011-44xx/CVE-2011-4486.json b/CVE-2011/CVE-2011-44xx/CVE-2011-4486.json
index ceaa24a1be8..10123983fcc 100644
--- a/CVE-2011/CVE-2011-44xx/CVE-2011-4486.json
+++ b/CVE-2011/CVE-2011-44xx/CVE-2011-4486.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4486",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-01T01:55:00.707",
"lastModified": "2024-11-21T01:32:24.847",
"vulnStatus": "Modified",
@@ -625,7 +625,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-44xx/CVE-2011-4487.json b/CVE-2011/CVE-2011-44xx/CVE-2011-4487.json
index 4ae3dc76c2e..0ebeff37b80 100644
--- a/CVE-2011/CVE-2011-44xx/CVE-2011-4487.json
+++ b/CVE-2011/CVE-2011-44xx/CVE-2011-4487.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4487",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-01T01:55:00.753",
"lastModified": "2024-11-21T01:32:24.970",
"vulnStatus": "Modified",
@@ -625,7 +625,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-46xx/CVE-2011-4650.json b/CVE-2011/CVE-2011-46xx/CVE-2011-4650.json
index e562a04c5bd..dad86f52594 100644
--- a/CVE-2011/CVE-2011-46xx/CVE-2011-4650.json
+++ b/CVE-2011/CVE-2011-46xx/CVE-2011-4650.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4650",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.183",
"lastModified": "2024-11-21T01:32:43.650",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "https://icisystem.blogspot.com/2015/09/cisco-notification-alert-prime-dcnm-01.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCtt15295",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-46xx/CVE-2011-4659.json b/CVE-2011/CVE-2011-46xx/CVE-2011-4659.json
index e4d03b3add0..3a944aa883d 100644
--- a/CVE-2011/CVE-2011-46xx/CVE-2011-4659.json
+++ b/CVE-2011/CVE-2011-46xx/CVE-2011-4659.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4659",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-01-19T15:55:00.820",
"lastModified": "2024-11-21T01:32:43.777",
"vulnStatus": "Modified",
@@ -132,7 +132,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-te",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-46xx/CVE-2011-4661.json b/CVE-2011/CVE-2011-46xx/CVE-2011-4661.json
index cff15fdd71c..7c6020fafee 100644
--- a/CVE-2011/CVE-2011-46xx/CVE-2011-4661.json
+++ b/CVE-2011/CVE-2011-46xx/CVE-2011-4661.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4661",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-12T17:15:11.593",
"lastModified": "2024-11-21T01:32:43.887",
"vulnStatus": "Modified",
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://www.cisco.com/c/en/us/td/docs/ios/15_2m_and_t/release/notes/15_2m_and_t/152-1TCAVS.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2011/CVE-2011-46xx/CVE-2011-4667.json b/CVE-2011/CVE-2011-46xx/CVE-2011-4667.json
index e4e7c02b681..0ff14ff37c5 100644
--- a/CVE-2011/CVE-2011-46xx/CVE-2011-4667.json
+++ b/CVE-2011/CVE-2011-46xx/CVE-2011-4667.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2011-4667",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-25T21:29:00.180",
"lastModified": "2024-11-21T01:32:44.000",
"vulnStatus": "Modified",
@@ -121,14 +121,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20120913-CVE-2011-4667",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/release/notes/ol_14271/caveats_SXI_rebuilds.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0329.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0329.json
index a290e20993f..412fa33e596 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0329.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0329.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0329",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-01-19T15:55:01.023",
"lastModified": "2024-11-21T01:34:48.720",
"vulnStatus": "Modified",
@@ -135,14 +135,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-dmm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1026541",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-dmm",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0330.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0330.json
index ad226cb0eb6..931da1b8e76 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0330.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0330.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0330",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-01T01:55:00.800",
"lastModified": "2024-11-21T01:34:48.827",
"vulnStatus": "Modified",
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0331.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0331.json
index 8b9e7b48a95..fac419de3ce 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0331.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0331.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0331",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-01T01:55:00.847",
"lastModified": "2024-11-21T01:34:48.927",
"vulnStatus": "Modified",
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0333.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0333.json
index 8b59e4db556..ad48f90df1f 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0333.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0333.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0333",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.847",
"lastModified": "2024-11-21T01:34:49.030",
"vulnStatus": "Modified",
@@ -137,11 +137,11 @@
"references": [
{
"url": "http://www-europe.cisco.com/en/US/docs/voice_ip_comm/csbpipp/ip_phones/release/notes/spa525g_relnote_7_5_1.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027012",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www-europe.cisco.com/en/US/docs/voice_ip_comm/csbpipp/ip_phones/release/notes/spa525g_relnote_7_5_1.pdf",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0334.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0334.json
index 8539d024f5b..981bdcd9822 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0334.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0334.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0334",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-15T13:15:12.577",
"lastModified": "2024-11-21T01:34:49.140",
"vulnStatus": "Modified",
@@ -97,7 +97,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/52981",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -105,7 +105,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20120412-CVE-2012-0334",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0335.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0335.json
index ec9b69b15a7..7d38e38163d 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0335.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0335.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0335",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.893",
"lastModified": "2024-11-21T01:34:49.253",
"vulnStatus": "Modified",
@@ -306,19 +306,19 @@
"references": [
{
"url": "http://secunia.com/advisories/49139",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/web/software/280775065/89203/ASA-843-Interim-Release-Notes.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/53558",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027008",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/49139",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0337.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0337.json
index f9c30c007f7..a90ab3b69f4 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0337.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0337.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0337",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:21.927",
"lastModified": "2024-11-21T01:34:49.373",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/meetingplace/7_1/english/release_notes/mp71rn.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/meetingplace/7_1/english/release_notes/mp71rn.html",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0338.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0338.json
index 7056232c0c2..15ba8ba792e 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0338.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0338.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0338",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:22.130",
"lastModified": "2024-11-21T01:34:49.483",
"vulnStatus": "Modified",
@@ -89,15 +89,15 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/caveats_SXH_rebuilds.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027005",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://supportforums.cisco.com/thread/2030226",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/caveats_SXH_rebuilds.html",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0339.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0339.json
index acda3b8fe4f..2db79775d97 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0339.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0339.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0339",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:22.177",
"lastModified": "2024-11-21T01:34:49.580",
"vulnStatus": "Modified",
@@ -89,11 +89,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SXF/native/release/notes/caveats_SXF_rebuilds.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027005",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SXF/native/release/notes/caveats_SXF_rebuilds.html",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0340.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0340.json
index 1a99a3e343d..a07ee0c744b 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0340.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0340.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0340",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-02-13T22:55:01.067",
"lastModified": "2024-11-21T01:34:49.677",
"vulnStatus": "Modified",
@@ -210,14 +210,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=25045",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.secureworks.com/research/advisories/SWRX-2012-001/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=25045",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0352.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0352.json
index 30e0b918a91..496c5634090 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0352.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0352.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0352",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-02-16T21:55:00.943",
"lastModified": "2024-11-21T01:34:49.787",
"vulnStatus": "Modified",
@@ -440,7 +440,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120215-nxos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0353.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0353.json
index 5074b032eda..70d63945458 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0353.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0353.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0353",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-15T00:55:00.850",
"lastModified": "2024-11-21T01:34:49.903",
"vulnStatus": "Modified",
@@ -286,30 +286,30 @@
"references": [
{
"url": "http://osvdb.org/80043",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48423",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52484",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026800",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74029",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/80043",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0354.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0354.json
index d6ce24702cf..b9ed1c70bc9 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0354.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0354.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0354",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-15T00:55:00.960",
"lastModified": "2024-11-21T01:34:50.033",
"vulnStatus": "Modified",
@@ -306,30 +306,30 @@
"references": [
{
"url": "http://osvdb.org/80044",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48423",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52489",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026800",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74030",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/80044",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0355.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0355.json
index d38968c9b3f..5b0336df27d 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0355.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0355.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0355",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-15T00:55:01.023",
"lastModified": "2024-11-21T01:34:50.167",
"vulnStatus": "Modified",
@@ -166,26 +166,26 @@
"references": [
{
"url": "http://osvdb.org/80045",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48423",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52488",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026800",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/80045",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0356.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0356.json
index d5cde576f46..a70dfe3377b 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0356.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0356.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0356",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-15T00:55:01.053",
"lastModified": "2024-11-21T01:34:50.280",
"vulnStatus": "Modified",
@@ -906,41 +906,41 @@
"references": [
{
"url": "http://osvdb.org/80041",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48421",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48423",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-fwsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1026798",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026800",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74028",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/80041",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0358.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0358.json
index b8116f59bc0..e1b6ac7feea 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0358.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0358.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0358",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-15T00:55:01.100",
"lastModified": "2024-11-21T01:34:50.410",
"vulnStatus": "Modified",
@@ -521,25 +521,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asaclient",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/339177",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securitytracker.com/id?1026799",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74027",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asaclient",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0359.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0359.json
index b6566f22b0a..6567b0170e9 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0359.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0359.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0359",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-01T01:55:00.957",
"lastModified": "2024-11-21T01:34:50.530",
"vulnStatus": "Modified",
@@ -117,11 +117,11 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0186.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cius",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0360.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0360.json
index 0bc340caa1e..a2fdff6f630 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0360.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0360.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0360",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:58.743",
"lastModified": "2024-11-21T01:34:50.633",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0361.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0361.json
index aa1f174e3e8..638cd3480d2 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0361.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0361.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0361",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:22.207",
"lastModified": "2024-11-21T01:34:50.723",
"vulnStatus": "Modified",
@@ -109,11 +109,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/cipc/8_5/english/release_notes/CIPC8x_RN.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027013",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/cipc/8_5/english/release_notes/CIPC8x_RN.html",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0362.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0362.json
index 2de8b0318c8..999c83b0b6b 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0362.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0362.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0362",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-02T10:09:22.253",
"lastModified": "2024-11-21T01:34:50.817",
"vulnStatus": "Modified",
@@ -79,11 +79,11 @@
"references": [
{
"url": "http://puck.nether.net/pipermail/cisco-nsp/2012-February/083517.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027005",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://puck.nether.net/pipermail/cisco-nsp/2012-February/083517.html",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0363.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0363.json
index c5c89624a66..41b765256db 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0363.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0363.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0363",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-02-25T04:21:42.120",
"lastModified": "2024-11-21T01:34:50.907",
"vulnStatus": "Modified",
@@ -202,7 +202,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120223-srp500",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -210,7 +210,7 @@
},
{
"url": "http://www.securitytracker.com/id?1026736",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120223-srp500",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0364.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0364.json
index 87f19a0ee7b..3995f966d5f 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0364.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0364.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0364",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-02-25T04:21:42.167",
"lastModified": "2024-11-21T01:34:51.010",
"vulnStatus": "Modified",
@@ -202,7 +202,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120223-srp500",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -210,7 +210,7 @@
},
{
"url": "http://www.securitytracker.com/id?1026736",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120223-srp500",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0365.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0365.json
index a189b11bef6..97766c2bb52 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0365.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0365.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0365",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-02-25T04:21:42.200",
"lastModified": "2024-11-21T01:34:51.110",
"vulnStatus": "Modified",
@@ -202,14 +202,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120223-srp500",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1026736",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120223-srp500",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0366.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0366.json
index 1e2fd34c1c8..f4f45cecc47 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0366.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0366.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0366",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-01T01:55:01.003",
"lastModified": "2024-11-21T01:34:51.210",
"vulnStatus": "Modified",
@@ -310,7 +310,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cuc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0367.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0367.json
index a4872bba6a7..d68fedb4f09 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0367.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0367.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0367",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-01T01:55:01.050",
"lastModified": "2024-11-21T01:34:51.310",
"vulnStatus": "Modified",
@@ -385,7 +385,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cuc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0368.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0368.json
index 06ef1e2070b..5b5368f18b2 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0368.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0368.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0368",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-01T01:55:01.097",
"lastModified": "2024-11-21T01:34:51.413",
"vulnStatus": "Modified",
@@ -366,11 +366,11 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0369.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0369.json
index 17768e9961b..4debb7f2732 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0369.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0369.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0369",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-01T01:55:01.143",
"lastModified": "2024-11-21T01:34:51.520",
"vulnStatus": "Modified",
@@ -186,11 +186,11 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0370.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0370.json
index a6f7433e2ca..645f8ca3c37 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0370.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0370.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0370",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-01T01:55:01.173",
"lastModified": "2024-11-21T01:34:51.620",
"vulnStatus": "Modified",
@@ -366,11 +366,11 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0371.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0371.json
index e0a54588990..5dd35b37e32 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0371.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0371.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0371",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-01T01:55:01.220",
"lastModified": "2024-11-21T01:34:51.727",
"vulnStatus": "Modified",
@@ -356,11 +356,11 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0376.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0376.json
index de132166cf1..d920e9643e0 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0376.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0376.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0376",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-03T20:55:03.513",
"lastModified": "2024-11-21T01:34:51.837",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/cucmbe/rel_notes/8_5_1/cucmbe-rel_notes-851.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/cucmbe/rel_notes/8_5_1/cucmbe-rel_notes-851.html",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0378.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0378.json
index 59d3972e5ae..304018e34b2 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0378.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0378.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0378",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-03T20:55:03.560",
"lastModified": "2024-11-21T01:34:51.930",
"vulnStatus": "Modified",
@@ -241,7 +241,7 @@
"references": [
{
"url": "http://www.cisco.com/web/software/280775065/89203/ASA-843-Interim-Release-Notes.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/web/software/280775065/89203/ASA-843-Interim-Release-Notes.html",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0381.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0381.json
index 46f8abd3804..d48a0d2ad42 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0381.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0381.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0381",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-29T11:01:16.073",
"lastModified": "2024-11-21T01:34:52.050",
"vulnStatus": "Modified",
@@ -3927,35 +3927,35 @@
"references": [
{
"url": "http://osvdb.org/80700",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/48605",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Not Applicable"
]
},
{
"url": "http://secunia.com/advisories/48607",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Not Applicable"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-ike",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52757",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -3963,7 +3963,7 @@
},
{
"url": "http://www.securitytracker.com/id?1026863",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -3971,7 +3971,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74427",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0382.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0382.json
index 4b7e9c026a4..4736695f3b9 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0382.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0382.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0382",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-29T11:01:16.107",
"lastModified": "2024-11-21T01:34:52.283",
"vulnStatus": "Modified",
@@ -3927,35 +3927,35 @@
"references": [
{
"url": "http://osvdb.org/80693",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/48630",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Not Applicable"
]
},
{
"url": "http://secunia.com/advisories/48633",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Not Applicable"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52759",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -3963,7 +3963,7 @@
},
{
"url": "http://www.securitytracker.com/id?1026868",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -3971,7 +3971,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74431",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0383.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0383.json
index 69ef8fc0b46..1696a356a3c 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0383.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0383.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0383",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-29T11:01:16.153",
"lastModified": "2024-11-21T01:34:52.483",
"vulnStatus": "Modified",
@@ -84,30 +84,30 @@
"references": [
{
"url": "http://osvdb.org/80701",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48515",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-nat",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52758",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026864",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74432",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/80701",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0384.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0384.json
index ceac133dd08..57927738a73 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0384.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0384.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0384",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-29T11:01:16.183",
"lastModified": "2024-11-21T01:34:52.590",
"vulnStatus": "Modified",
@@ -4211,28 +4211,28 @@
"references": [
{
"url": "http://osvdb.org/80704",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/48614",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52755",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -4240,7 +4240,7 @@
},
{
"url": "http://www.securitytracker.com/id?1026860",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0385.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0385.json
index 597d5324583..54f8e573543 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0385.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0385.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0385",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-29T11:01:16.230",
"lastModified": "2024-11-21T01:34:52.780",
"vulnStatus": "Modified",
@@ -89,30 +89,30 @@
"references": [
{
"url": "http://osvdb.org/80694",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48610",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-smartinstall",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52756",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026867",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74430",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/80694",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0386.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0386.json
index edac3e9c32c..f353438cea9 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0386.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0386.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0386",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-29T11:01:16.277",
"lastModified": "2024-11-21T01:34:52.880",
"vulnStatus": "Modified",
@@ -249,34 +249,34 @@
"references": [
{
"url": "http://osvdb.org/80695",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48609",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48641",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-ssh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52752",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026866",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74404",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/80695",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0387.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0387.json
index 5edfd78deb8..ff248efe9e3 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0387.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0387.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0387",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-29T11:01:16.307",
"lastModified": "2024-11-21T01:34:52.990",
"vulnStatus": "Modified",
@@ -89,30 +89,30 @@
"references": [
{
"url": "http://osvdb.org/80697",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48608",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-zbfw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52753",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026861",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74435",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/80697",
diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0388.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0388.json
index a23bc4bb44c..31e9fbe410a 100644
--- a/CVE-2012/CVE-2012-03xx/CVE-2012-0388.json
+++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0388.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-0388",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-29T11:01:16.357",
"lastModified": "2024-11-21T01:34:53.103",
"vulnStatus": "Modified",
@@ -89,26 +89,26 @@
"references": [
{
"url": "http://secunia.com/advisories/48608",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-zbfw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52753",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026861",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74436",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48608",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1310.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1310.json
index a7038d879b9..ad255cdde39 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1310.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1310.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1310",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-29T11:01:16.387",
"lastModified": "2024-11-21T01:36:48.360",
"vulnStatus": "Modified",
@@ -89,26 +89,26 @@
"references": [
{
"url": "http://osvdb.org/80696",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48608",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-zbfw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52753",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026861",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/80696",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1311.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1311.json
index e1e1613a462..02b674efede 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1311.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1311.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1311",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-29T11:01:16.433",
"lastModified": "2024-11-21T01:36:48.470",
"vulnStatus": "Modified",
@@ -114,30 +114,30 @@
"references": [
{
"url": "http://osvdb.org/80692",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48611",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48621",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-rsvp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52754",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026865",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/80692",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1312.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1312.json
index 92723ac0b21..993481b65e1 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1312.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1312.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1312",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-29T11:01:16.463",
"lastModified": "2024-11-21T01:36:48.577",
"vulnStatus": "Modified",
@@ -79,30 +79,30 @@
"references": [
{
"url": "http://osvdb.org/80703",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48595",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-mace",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52751",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026862",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74429",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/80703",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1313.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1313.json
index 4a8d5703b12..bbb4221b980 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1313.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1313.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1313",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-27T20:55:03.173",
"lastModified": "2024-11-21T01:36:48.680",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/97776",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-1313",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029103",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1314.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1314.json
index f01dca6578f..b5b5a8a316d 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1314.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1314.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1314",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-29T11:01:16.527",
"lastModified": "2024-11-21T01:36:48.790",
"vulnStatus": "Modified",
@@ -79,30 +79,30 @@
"references": [
{
"url": "http://osvdb.org/80702",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48595",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-mace",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52751",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026862",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74428",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/80702",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1315.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1315.json
index 898cacf686b..bddc58c0507 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1315.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1315.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1315",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-03-29T11:01:16.590",
"lastModified": "2024-11-21T01:36:48.903",
"vulnStatus": "Modified",
@@ -89,30 +89,30 @@
"references": [
{
"url": "http://osvdb.org/80699",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/48608",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-zbfw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52753",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1026861",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74437",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/80699",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1316.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1316.json
index 0a16cc1e877..e083562f4c0 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1316.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1316.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1316",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-15T14:15:11.623",
"lastModified": "2024-11-21T01:36:49.013",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/52981",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://www.secureworks.com/research/transitive-trust",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1317.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1317.json
index 21cc9f898b4..18814e88c54 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1317.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1317.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1317",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:58.977",
"lastModified": "2024-11-21T01:36:49.130",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1324.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1324.json
index 4171f6b4e71..7867aaf14af 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1324.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1324.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1324",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-03T20:55:03.607",
"lastModified": "2024-11-21T01:36:49.227",
"vulnStatus": "Modified",
@@ -79,11 +79,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-3TCAVS.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75414",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-3TCAVS.html",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1326.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1326.json
index f49254608be..538025fde0f 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1326.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1326.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1326",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-15T14:15:11.700",
"lastModified": "2024-11-21T01:36:49.323",
"vulnStatus": "Modified",
@@ -97,7 +97,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/52981",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -105,7 +105,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20120412-CVE-2012-1326",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1327.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1327.json
index a5dadfbe833..76fc0b0aae3 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1327.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1327.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1327",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-03T20:55:03.637",
"lastModified": "2024-11-21T01:36:49.430",
"vulnStatus": "Modified",
@@ -89,7 +89,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
@@ -97,7 +97,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75413",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1328.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1328.json
index 6d03daf59bc..2d08d6b0476 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1328.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1328.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1328",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-03T23:55:01.403",
"lastModified": "2024-11-21T01:36:49.533",
"vulnStatus": "Modified",
@@ -84,11 +84,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/cuipph/9971_9951_8961/firmware/9_2_3/release_notes/9900_8900_923.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75412",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/cuipph/9971_9951_8961/firmware/9_2_3/release_notes/9900_8900_923.html",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1335.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1335.json
index 64b40f0298f..822540d2c3c 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1335.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1335.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1335",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-04-05T13:25:16.163",
"lastModified": "2024-11-21T01:36:49.637",
"vulnStatus": "Modified",
@@ -97,14 +97,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120404-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1026888",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1336.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1336.json
index 47a2a9f203c..6c67c295583 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1336.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1336.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1336",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-04-05T13:25:16.210",
"lastModified": "2024-11-21T01:36:49.740",
"vulnStatus": "Modified",
@@ -97,14 +97,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120404-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1026888",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1337.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1337.json
index c2851e94830..b72b6d2f828 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1337.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1337.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1337",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-04-05T13:25:16.240",
"lastModified": "2024-11-21T01:36:49.850",
"vulnStatus": "Modified",
@@ -97,14 +97,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120404-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1026888",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74606",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"VDB Entry"
]
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1338.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1338.json
index f0a629ac197..fba1d523065 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1338.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1338.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1338",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T17:55:00.697",
"lastModified": "2024-11-21T01:36:49.953",
"vulnStatus": "Modified",
@@ -126,14 +126,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1027349",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1339.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1339.json
index fbc3bfa02c1..266e83263a4 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1339.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1339.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1339",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T17:55:00.760",
"lastModified": "2024-11-21T01:36:50.053",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/unified_computing/ucs/release/notes/OL_25363.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1027350",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/unified_computing/ucs/release/notes/OL_25363.html",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1340.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1340.json
index 788db441a4f..c88fd584da6 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1340.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1340.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1340",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T17:55:00.807",
"lastModified": "2024-11-21T01:36:50.157",
"vulnStatus": "Modified",
@@ -91,14 +91,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/switches/datacenter/mds9000/sw/5_2/release/notes/nx-os/mds_nxos_rel_notes_522.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1027348",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/switches/datacenter/mds9000/sw/5_2/release/notes/nx-os/mds_nxos_rel_notes_522.html",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1342.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1342.json
index 73d6abd01b0..1891146ab8c 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1342.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1342.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1342",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T17:55:00.867",
"lastModified": "2024-11-21T01:36:50.260",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.cisco.com/cisco/software/release.html?mdfid=279506669&catid=268437899&flowid=1915&reltype=all&relind=AVAILABLE&release=3.9.2&softwareid=280867577",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1344.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1344.json
index 1a39a6fd7c4..53f3b8bc68a 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1344.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1344.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1344",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T18:55:00.837",
"lastModified": "2024-11-21T01:36:50.363",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1027371",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1346.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1346.json
index 4bf77155dbd..cacf7eba94f 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1346.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1346.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1346",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T18:55:00.883",
"lastModified": "2024-11-21T01:36:50.463",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "https://www.cisco.com/en/US/docs/voice_ip_comm/cer/8_7/english/release/notes/CER0_BK_CEE780BD_00_cisco-emergency-responder-87-release_chapter_00.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1348.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1348.json
index b4128564647..0632db5c011 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1348.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1348.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1348",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T18:55:00.930",
"lastModified": "2024-11-21T01:36:50.563",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/app_ntwk_services/waas/waas/v501/release/notes/ws501xrn.pdf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1350.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1350.json
index 379934934d6..dc46b98e701 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1350.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1350.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1350",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T18:55:00.977",
"lastModified": "2024-11-21T01:36:50.663",
"vulnStatus": "Modified",
@@ -1686,7 +1686,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1357.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1357.json
index 3c9c964a8a1..3c193ddfebb 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1357.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1357.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1357",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T18:55:01.023",
"lastModified": "2024-11-21T01:36:50.800",
"vulnStatus": "Modified",
@@ -91,7 +91,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/release/notes/Rel_5_1_3_N1_1/Nexus5000_Release_Notes_5_1_3_N1.pdf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1361.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1361.json
index a1c7519bdd6..dcdb1b6a914 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1361.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1361.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1361",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T18:55:01.070",
"lastModified": "2024-11-21T01:36:50.910",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-3TCAVS.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-3TCAVS.html",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1364.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1364.json
index f21c582208e..ced0a37b021 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1364.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1364.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1364",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T15:55:01.150",
"lastModified": "2024-11-21T01:36:51.010",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/unified_computing/ucs/release/notes/OL_24086.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1365.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1365.json
index d2985f5cc29..6f7423562c2 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1365.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1365.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1365",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T15:55:01.197",
"lastModified": "2024-11-21T01:36:51.130",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/unified_computing/ucs/release/notes/OL_24086.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1366.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1366.json
index 6ec89ccb0c4..d093aba958a 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1366.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1366.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1366",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.010",
"lastModified": "2024-11-21T01:36:51.230",
"vulnStatus": "Modified",
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1367.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1367.json
index 8d2d644db31..283c9bc93e5 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1367.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1367.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1367",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T15:55:01.243",
"lastModified": "2024-11-21T01:36:51.337",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/12_2sr/release/notes/122SRcavs1.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Vendor Advisory"
diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1370.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1370.json
index 86aef5de81c..8f78e555823 100644
--- a/CVE-2012/CVE-2012-13xx/CVE-2012-1370.json
+++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1370.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-1370",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T15:55:01.290",
"lastModified": "2024-11-21T01:36:51.437",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2469.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2469.json
index 4e339a78925..0b6e34405a7 100644
--- a/CVE-2012/CVE-2012-24xx/CVE-2012-2469.json
+++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2469.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-2469",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T17:55:00.917",
"lastModified": "2024-11-21T01:39:08.293",
"vulnStatus": "Modified",
@@ -116,18 +116,18 @@
"references": [
{
"url": "http://www.4salesbyself.com/troubleshooting-random-nexus-reboots.aspx",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/release/notes/52_nx-os_release_note.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1027352",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.4salesbyself.com/troubleshooting-random-nexus-reboots.aspx",
diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2472.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2472.json
index b49cce4d539..2e606168ca3 100644
--- a/CVE-2012/CVE-2012-24xx/CVE-2012-2472.json
+++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2472.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-2472",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T17:55:00.963",
"lastModified": "2024-11-21T01:39:08.403",
"vulnStatus": "Modified",
@@ -171,7 +171,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/security/asa/asa84/release/notes/asarn84.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2474.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2474.json
index bffb68fe283..826a6708b53 100644
--- a/CVE-2012/CVE-2012-24xx/CVE-2012-2474.json
+++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2474.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-2474",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T17:55:01.010",
"lastModified": "2024-11-21T01:39:08.510",
"vulnStatus": "Modified",
@@ -169,7 +169,7 @@
"references": [
{
"url": "http://www.cisco.com/web/software/280775065/45357/ASA-825-Interim-Release-Notes.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2486.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2486.json
index b32cc3dc6f4..a3b9e3d8a5b 100644
--- a/CVE-2012/CVE-2012-24xx/CVE-2012-2486.json
+++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2486.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-2486",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-07-12T10:34:42.257",
"lastModified": "2024-11-21T01:39:08.610",
"vulnStatus": "Modified",
@@ -687,28 +687,28 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2488.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2488.json
index 6b914f08bba..8659af5e44a 100644
--- a/CVE-2012/CVE-2012-24xx/CVE-2012-2488.json
+++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2488.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-2488",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-05-31T10:17:38.763",
"lastModified": "2024-11-21T01:39:08.737",
"vulnStatus": "Modified",
@@ -139,22 +139,22 @@
"references": [
{
"url": "http://secunia.com/advisories/49329",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120530-iosxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/53728",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027104",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/49329",
diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2490.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2490.json
index e7b1948b6f7..1e837af4024 100644
--- a/CVE-2012/CVE-2012-24xx/CVE-2012-2490.json
+++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2490.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-2490",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T17:55:01.057",
"lastModified": "2024-11-21T01:39:08.847",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/cipc/8_5/english/release_notes/CIPC8x_RN.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2493.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2493.json
index 6f9a59e499f..3a2ff9e104d 100644
--- a/CVE-2012/CVE-2012-24xx/CVE-2012-2493.json
+++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2493.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-2493",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-06-20T20:55:02.137",
"lastModified": "2024-11-21T01:39:08.943",
"vulnStatus": "Modified",
@@ -263,7 +263,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2494.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2494.json
index f7de742a84c..ea1dbbabf84 100644
--- a/CVE-2012/CVE-2012-24xx/CVE-2012-2494.json
+++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2494.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-2494",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-06-20T20:55:02.543",
"lastModified": "2024-11-21T01:39:09.047",
"vulnStatus": "Modified",
@@ -149,7 +149,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2495.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2495.json
index 741ce3679dc..2e5621dc858 100644
--- a/CVE-2012/CVE-2012-24xx/CVE-2012-2495.json
+++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2495.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-2495",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-06-20T20:55:02.590",
"lastModified": "2024-11-21T01:39:09.153",
"vulnStatus": "Modified",
@@ -160,7 +160,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2496.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2496.json
index 08798e23556..fc452e00559 100644
--- a/CVE-2012/CVE-2012-24xx/CVE-2012-2496.json
+++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2496.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-2496",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-06-20T20:55:02.637",
"lastModified": "2024-11-21T01:39:09.257",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2497.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2497.json
index 824e8cf255a..06318bb290f 100644
--- a/CVE-2012/CVE-2012-24xx/CVE-2012-2497.json
+++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2497.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-2497",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-02T16:55:05.607",
"lastModified": "2023-11-07T02:10:34.120",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2498.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2498.json
index 6477478149e..08d4ff61ca0 100644
--- a/CVE-2012/CVE-2012-24xx/CVE-2012-2498.json
+++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2498.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-2498",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T17:55:01.103",
"lastModified": "2024-11-21T01:39:09.370",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2499.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2499.json
index 227ea746e06..e90c3a94450 100644
--- a/CVE-2012/CVE-2012-24xx/CVE-2012-2499.json
+++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2499.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-2499",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T17:55:01.133",
"lastModified": "2024-11-21T01:39:09.477",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2500.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2500.json
index c03972a8627..bd70adc1db9 100644
--- a/CVE-2012/CVE-2012-25xx/CVE-2012-2500.json
+++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2500.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-2500",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-08-06T17:55:01.180",
"lastModified": "2024-11-21T01:39:09.580",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3047.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3047.json
index 9f32a01d5d0..2949f874ec2 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3047.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3047.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3047",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-10T19:55:03.967",
"lastModified": "2024-11-21T01:40:10.027",
"vulnStatus": "Modified",
@@ -254,7 +254,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=26036",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3051.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3051.json
index ee49bd8d02c..9001a88eb63 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3051.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3051.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3051",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:50.427",
"lastModified": "2024-11-21T01:40:10.157",
"vulnStatus": "Modified",
@@ -106,15 +106,15 @@
"references": [
{
"url": "http://secunia.com/advisories/50671",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/release/notes/52_nx-os_release_note.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/55600",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/50671",
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3052.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3052.json
index 0c8f2581a66..cfc400c54ea 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3052.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3052.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3052",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:50.457",
"lastModified": "2024-11-21T01:40:10.280",
"vulnStatus": "Modified",
@@ -154,7 +154,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/release/notes/anyconnect31rn.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/release/notes/anyconnect31rn.html",
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3053.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3053.json
index 4ec41f0a960..6fbd796221e 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3053.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3053.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3053",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-06-29T14:55:01.017",
"lastModified": "2024-11-21T01:40:10.403",
"vulnStatus": "Modified",
@@ -104,7 +104,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3054.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3054.json
index f4a74decae2..dfe0eed25e9 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3054.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3054.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3054",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-06-29T14:55:01.063",
"lastModified": "2024-11-21T01:40:10.527",
"vulnStatus": "Modified",
@@ -104,7 +104,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3055.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3055.json
index 4db98fd926f..c758032f2f6 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3055.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3055.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3055",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-06-29T14:55:01.093",
"lastModified": "2024-11-21T01:40:10.643",
"vulnStatus": "Modified",
@@ -104,7 +104,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3056.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3056.json
index 4fcce8a4895..c7ed3395d3a 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3056.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3056.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3056",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-06-29T14:55:01.140",
"lastModified": "2024-11-21T01:40:10.753",
"vulnStatus": "Modified",
@@ -104,7 +104,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3057.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3057.json
index 66ed8c54869..dbff5780d15 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3057.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3057.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3057",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-06-29T14:55:01.173",
"lastModified": "2024-11-21T01:40:10.873",
"vulnStatus": "Modified",
@@ -104,7 +104,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3058.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3058.json
index 6a0f80db250..bdf1c6e7946 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3058.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3058.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3058",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-06-20T20:55:02.697",
"lastModified": "2024-11-21T01:40:10.983",
"vulnStatus": "Modified",
@@ -171,14 +171,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-asaipv6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1027187",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-asaipv6",
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3060.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3060.json
index c9e6ea4a0b9..b49d16fd459 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3060.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3060.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3060",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:50.503",
"lastModified": "2024-11-21T01:40:11.107",
"vulnStatus": "Modified",
@@ -84,11 +84,11 @@
"references": [
{
"url": "http://www.cisco.com/web/software/282074295/93949/cucm-readme-862asu2-Rev2.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78922",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/web/software/282074295/93949/cucm-readme-862asu2-Rev2.pdf",
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3062.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3062.json
index 9e0c59520d5..23d08b4f7e0 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3062.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3062.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3062",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.040",
"lastModified": "2024-11-21T01:40:11.227",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3063.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3063.json
index eac302016f9..79af1f40d6f 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3063.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3063.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3063",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-06-20T20:55:02.747",
"lastModified": "2024-11-21T01:40:11.340",
"vulnStatus": "Modified",
@@ -165,14 +165,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ace",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1027188",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ace",
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3073.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3073.json
index ce6e27ca2eb..d0490451e1f 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3073.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3073.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3073",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-07-12T10:34:42.303",
"lastModified": "2024-11-21T01:40:11.460",
"vulnStatus": "Modified",
@@ -662,21 +662,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3074.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3074.json
index 1fb387a10a6..21b99664e95 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3074.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3074.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3074",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-07-12T10:34:42.347",
"lastModified": "2024-11-21T01:40:11.610",
"vulnStatus": "Modified",
@@ -287,7 +287,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3075.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3075.json
index 4b88b23ca32..a68482ab502 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3075.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3075.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3075",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-07-12T10:34:42.380",
"lastModified": "2024-11-21T01:40:11.740",
"vulnStatus": "Modified",
@@ -242,7 +242,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3076.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3076.json
index b87899b5735..4092c301723 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3076.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3076.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3076",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-07-12T10:34:42.427",
"lastModified": "2024-11-21T01:40:11.880",
"vulnStatus": "Modified",
@@ -105,7 +105,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3079.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3079.json
index 2f4ad540b68..4e9c81d0ae8 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3079.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3079.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3079",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:50.550",
"lastModified": "2024-11-21T01:40:12.000",
"vulnStatus": "Modified",
@@ -74,11 +74,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/caveats_SXI_rebuilds.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78921",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/caveats_SXI_rebuilds.html",
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3088.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3088.json
index 2d1d4bef71b..0d5d7124fd6 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3088.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3088.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3088",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:50.580",
"lastModified": "2024-11-21T01:40:12.127",
"vulnStatus": "Modified",
@@ -79,11 +79,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/release/notes/anyconnect31rn.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78920",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/release/notes/anyconnect31rn.html",
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3094.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3094.json
index 24467cb0dfd..253206c5c4c 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3094.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3094.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3094",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:50.627",
"lastModified": "2024-11-21T01:40:12.240",
"vulnStatus": "Modified",
@@ -86,11 +86,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/release/notes/anyconnect31rn.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78916",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/release/notes/anyconnect31rn.html",
diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3096.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3096.json
index d3bf8dd555c..6420837520c 100644
--- a/CVE-2012/CVE-2012-30xx/CVE-2012-3096.json
+++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3096.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3096",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:50.690",
"lastModified": "2024-11-21T01:40:12.363",
"vulnStatus": "Modified",
@@ -84,11 +84,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/connection/7x/release/notes/715cucrn.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78915",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/connection/7x/release/notes/715cucrn.html",
diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3893.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3893.json
index 08e80a39b56..333e264c6a7 100644
--- a/CVE-2012/CVE-2012-38xx/CVE-2012-3893.json
+++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3893.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3893",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:50.783",
"lastModified": "2024-11-21T01:41:48.337",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_2s/release/notes/15_2s_caveats_15_2_4s.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_2s/release/notes/15_2s_caveats_15_2_4s.html",
diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3895.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3895.json
index 4307871536c..094bf019264 100644
--- a/CVE-2012/CVE-2012-38xx/CVE-2012-3895.json
+++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3895.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3895",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:50.863",
"lastModified": "2024-11-21T01:41:48.443",
"vulnStatus": "Modified",
@@ -94,11 +94,11 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_2s/release/notes/15_2s_caveats_15_2_2s.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78872",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_2s/release/notes/15_2s_caveats_15_2_2s.html",
diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3899.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3899.json
index d925d17f44d..472eb04a4ac 100644
--- a/CVE-2012/CVE-2012-38xx/CVE-2012-3899.json
+++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3899.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3899",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:50.910",
"lastModified": "2024-11-21T01:41:48.560",
"vulnStatus": "Modified",
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.cisco.com/web/software/282549758/51927/IPS-6_2-4-E4-readme.txt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3901.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3901.json
index 94fd20a6c51..9373209df37 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3901.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3901.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3901",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:50.940",
"lastModified": "2024-11-21T01:41:48.667",
"vulnStatus": "Modified",
@@ -111,14 +111,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/security/ips/7.0/release/notes/22789_01.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78870",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/security/ips/7.0/release/notes/22789_01.html",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3908.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3908.json
index 834e7b351c6..45a77f30909 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3908.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3908.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3908",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:51.207",
"lastModified": "2024-11-21T01:41:48.777",
"vulnStatus": "Modified",
@@ -106,22 +106,22 @@
"references": [
{
"url": "http://en.securitylab.ru/lab/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/50680",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/security/ise/1.1/release_notes/ise1.1_rn.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55602",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://en.securitylab.ru/lab/",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3913.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3913.json
index c07761503a2..cfe012aeae5 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3913.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3913.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3913",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-01T13:32:30.360",
"lastModified": "2024-11-21T01:41:48.890",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-3913",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3915.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3915.json
index 8244865ad3f..42b7038f408 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3915.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3915.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3915",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:51.270",
"lastModified": "2024-11-21T01:41:49.003",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_2s/release/notes/15_2s_caveats_15_2_2s.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78809",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_2s/release/notes/15_2s_caveats_15_2_2s.html",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3918.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3918.json
index 5108bf07ef0..bbe640b1157 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3918.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3918.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3918",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.073",
"lastModified": "2024-11-21T01:41:49.110",
"vulnStatus": "Modified",
@@ -137,7 +137,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/ios/15_3m_and_t/release/notes/15_3m_and_t.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/ios/15_3m_and_t/release/notes/15_3m_and_t.pdf",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3919.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3919.json
index b548bf67285..17b3468cbf2 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3919.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3919.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3919",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:51.330",
"lastModified": "2024-11-21T01:41:49.233",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/vA2_3_x/Release/Note/RACEA2_3_X.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78808",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/vA2_3_x/Release/Note/RACEA2_3_X.html",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3923.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3923.json
index 81b66d10c39..eda0fb2d960 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3923.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3923.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3923",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:51.393",
"lastModified": "2024-11-21T01:41:49.337",
"vulnStatus": "Modified",
@@ -89,14 +89,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_2m_and_t/release/notes/152-1TCAVS.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78670",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_2m_and_t/release/notes/152-1TCAVS.html",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3924.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3924.json
index 7bdb44e125b..56e3669f0ae 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3924.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3924.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3924",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-16T10:34:51.440",
"lastModified": "2024-11-21T01:41:49.450",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://www.cisco.com/en/US/docs/ios/15_2m_and_t/release/notes/152-1TCAVS.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78672",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/en/US/docs/ios/15_2m_and_t/release/notes/152-1TCAVS.html",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3935.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3935.json
index e2a5c9c33be..477d1dc0317 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3935.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3935.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3935",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-12T23:55:00.807",
"lastModified": "2024-11-21T01:41:49.560",
"vulnStatus": "Modified",
@@ -246,23 +246,23 @@
"references": [
{
"url": "http://osvdb.org/85421",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/50562",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120912-cupxcp",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027520",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78457",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/85421",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3936.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3936.json
index 7fe822a4387..ecdf7af19bf 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3936.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3936.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3936",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-10-25T14:55:01.327",
"lastModified": "2024-11-21T01:41:49.677",
"vulnStatus": "Modified",
@@ -94,19 +94,19 @@
"references": [
{
"url": "http://osvdb.org/86141",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-webex",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/55866",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027639",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/86141",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3937.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3937.json
index a814140bc87..84ed439fec4 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3937.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3937.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3937",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-10-25T14:55:03.607",
"lastModified": "2024-11-21T01:41:49.793",
"vulnStatus": "Modified",
@@ -94,22 +94,22 @@
"references": [
{
"url": "http://osvdb.org/86142",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55866",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027639",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/86142",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3938.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3938.json
index 96a88aed979..821f18cf0e6 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3938.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3938.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3938",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-10-25T14:55:03.670",
"lastModified": "2024-11-21T01:41:49.900",
"vulnStatus": "Modified",
@@ -94,22 +94,22 @@
"references": [
{
"url": "http://osvdb.org/86143",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55866",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027639",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/86143",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3939.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3939.json
index 55181ee7a81..8af8032de0c 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3939.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3939.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3939",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-10-25T14:55:03.717",
"lastModified": "2024-11-21T01:41:50.010",
"vulnStatus": "Modified",
@@ -94,11 +94,11 @@
"references": [
{
"url": "http://osvdb.org/86138",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -106,11 +106,11 @@
},
{
"url": "http://www.securityfocus.com/bid/55866",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027639",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/86138",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3940.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3940.json
index 18f61893189..bfcafdc3b52 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3940.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3940.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3940",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-10-25T14:55:03.767",
"lastModified": "2024-11-21T01:41:50.127",
"vulnStatus": "Modified",
@@ -94,11 +94,11 @@
"references": [
{
"url": "http://osvdb.org/86139",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -106,11 +106,11 @@
},
{
"url": "http://www.securityfocus.com/bid/55866",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027639",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/86139",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3941.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3941.json
index c87fe92a873..620c409860f 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3941.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3941.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3941",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-10-25T14:55:03.813",
"lastModified": "2024-11-21T01:41:50.253",
"vulnStatus": "Modified",
@@ -94,11 +94,11 @@
"references": [
{
"url": "http://osvdb.org/86140",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -106,11 +106,11 @@
},
{
"url": "http://www.securityfocus.com/bid/55866",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027639",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/86140",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3946.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3946.json
index 69d2723aed7..ca96c5e994d 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3946.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3946.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3946",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-24T10:55:02.290",
"lastModified": "2024-11-21T01:41:50.377",
"vulnStatus": "Modified",
@@ -75,7 +75,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/ios/15_3s/release/notes/15_3s_rel_notes/15_3s_caveats_15_3_2s.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/ios/15_3s/release/notes/15_3s_rel_notes/15_3s_caveats_15_3_2s.html",
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3949.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3949.json
index b7b69e017ac..324d46f779e 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3949.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3949.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3949",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-27T00:55:00.797",
"lastModified": "2024-11-21T01:41:50.487",
"vulnStatus": "Modified",
@@ -1369,35 +1369,35 @@
"references": [
{
"url": "http://osvdb.org/85816",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/50774",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Not Applicable"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-sip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55697",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3950.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3950.json
index 7cebe5786e3..6aba3ef6955 100644
--- a/CVE-2012/CVE-2012-39xx/CVE-2012-3950.json
+++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3950.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-3950",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-27T00:55:00.857",
"lastModified": "2024-11-21T01:41:50.630",
"vulnStatus": "Modified",
@@ -1534,26 +1534,26 @@
"references": [
{
"url": "http://secunia.com/advisories/50777",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-ios-ips",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55695",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027580",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78882",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/50777",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4072.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4072.json
index 54c57775bbb..29e152164b7 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4072.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4072.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4072",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-20T16:55:03.427",
"lastModified": "2024-11-21T01:42:10.040",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4072",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029067",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4073.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4073.json
index b592658837a..dc8143b6bee 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4073.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4073.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4073",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-20T16:55:07.690",
"lastModified": "2024-11-21T01:42:10.153",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4073",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029068",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4074.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4074.json
index 977354b91f2..d957666373c 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4074.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4074.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4074",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-20T16:55:07.707",
"lastModified": "2024-11-21T01:42:10.263",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4074",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029073",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4075.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4075.json
index a91b0929a47..67326ea9ab2 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4075.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4075.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4075",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-05T10:55:03.277",
"lastModified": "2024-11-21T01:42:10.380",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://secunia.com/advisories/55196",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4075",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62837",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -93,7 +93,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87668",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/55196",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4076.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4076.json
index 21916dfc7ff..e1f29adbe82 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4076.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4076.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4076",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-14T03:34:51.930",
"lastModified": "2024-11-21T01:42:10.483",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://osvdb.org/98126",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/55205",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4076",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62848",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -97,7 +97,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87678",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/98126",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4077.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4077.json
index 6b3c1dfb74a..acadd638589 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4077.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4077.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4077",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-14T03:34:54.963",
"lastModified": "2024-11-21T01:42:10.600",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://osvdb.org/98127",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/55191",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4077",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62849",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4078.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4078.json
index d798266ef18..6c8ff20a215 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4078.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4078.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4078",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-24T10:35:51.783",
"lastModified": "2024-11-21T01:42:10.707",
"vulnStatus": "Modified",
@@ -89,14 +89,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4078",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029084",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87367",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4078",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4079.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4079.json
index 47386d92d46..25bbde3c9d9 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4079.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4079.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4079",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-26T14:16:06.187",
"lastModified": "2024-11-21T01:42:10.817",
"vulnStatus": "Modified",
@@ -74,11 +74,11 @@
"references": [
{
"url": "http://secunia.com/advisories/54879",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4079",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4080.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4080.json
index a30b69c46f3..b2c12321a4b 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4080.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4080.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4080",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.183",
"lastModified": "2023-11-07T02:11:42.833",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4081.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4081.json
index 06f315dfdeb..1a83b3a653c 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4081.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4081.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4081",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-20T18:55:04.953",
"lastModified": "2024-11-21T01:42:10.937",
"vulnStatus": "Modified",
@@ -154,14 +154,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4081",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029065",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4082.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4082.json
index 9b5ccb03eec..9ae814fc24e 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4082.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4082.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4082",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-20T18:55:09.797",
"lastModified": "2024-11-21T01:42:11.053",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4082",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029062",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87337",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4082",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4083.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4083.json
index 26274d5660d..d555658c682 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4083.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4083.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4083",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-20T16:55:07.723",
"lastModified": "2024-11-21T01:42:11.160",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4083",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029066",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87338",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4083",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4084.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4084.json
index 5170136afbb..0871a9566d2 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4084.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4084.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4084",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-05T10:55:03.290",
"lastModified": "2024-11-21T01:42:11.263",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://osvdb.org/98125",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/55203",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4084",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62851",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -97,7 +97,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87679",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/98125",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4085.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4085.json
index d549dd0c7a5..9b392186ef2 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4085.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4085.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4085",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-24T10:35:51.813",
"lastModified": "2024-11-21T01:42:11.373",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4085",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029081",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87372",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4085",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4086.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4086.json
index 4fff444b18f..eb967e51033 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4086.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4086.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4086",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-25T10:31:26.660",
"lastModified": "2024-11-21T01:42:11.480",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4086",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029083",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87368",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4086",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4087.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4087.json
index 319584036c7..8f019de54cc 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4087.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4087.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4087",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-24T10:35:51.830",
"lastModified": "2024-11-21T01:42:11.583",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4087",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029086",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87371",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4087",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4088.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4088.json
index b25af33cc81..537f107319e 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4088.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4088.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4088",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-26T14:16:22.047",
"lastModified": "2024-11-21T01:42:11.690",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://secunia.com/advisories/54682",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4088",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029102",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4089.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4089.json
index a5e12f2a1c3..fe7259e6adc 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4089.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4089.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4089",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-24T10:35:51.860",
"lastModified": "2024-11-21T01:42:11.800",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4089",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029082",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87369",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4089",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4090.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4090.json
index dd092ecd3d1..e6dd408818f 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4090.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4090.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4090",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-05T10:55:03.307",
"lastModified": "2024-11-21T01:42:11.907",
"vulnStatus": "Modified",
@@ -101,22 +101,22 @@
"references": [
{
"url": "http://osvdb.org/98123",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/55206",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4090",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62841",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029158",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87670",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/98123",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4091.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4091.json
index 9ca0811e11c..9855a185b33 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4091.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4091.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4091",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-05T10:55:03.323",
"lastModified": "2024-11-21T01:42:12.020",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/98124",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4091",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62838",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -93,7 +93,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029159",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -101,7 +101,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87669",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/98124",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4092.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4092.json
index 201efd415f0..407d0db74dd 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4092.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4092.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4092",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-26T14:16:22.047",
"lastModified": "2024-11-21T01:42:12.137",
"vulnStatus": "Modified",
@@ -74,11 +74,11 @@
"references": [
{
"url": "http://secunia.com/advisories/55034",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4092",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4093.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4093.json
index 877fb100fc1..85a003ca947 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4093.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4093.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4093",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-20T16:55:07.753",
"lastModified": "2024-11-21T01:42:12.247",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4093",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029074",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4094.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4094.json
index 104089ead38..6f186cdea9a 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4094.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4094.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4094",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-24T10:35:51.877",
"lastModified": "2024-11-21T01:42:12.357",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4094",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029085",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87370",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4094",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4095.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4095.json
index c80e82a0871..7b9a3bc75f5 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4095.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4095.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4095",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-02T22:55:02.900",
"lastModified": "2024-11-21T01:42:12.470",
"vulnStatus": "Modified",
@@ -74,11 +74,11 @@
"references": [
{
"url": "http://secunia.com/advisories/55135",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4095",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4096.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4096.json
index 349712c5601..11b9e9baf7a 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4096.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4096.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4096",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-01T00:55:12.803",
"lastModified": "2024-11-21T01:42:12.570",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4096",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4097.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4097.json
index 594ac97bddf..cfb820425de 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4097.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4097.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4097",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-14T03:34:54.977",
"lastModified": "2024-11-21T01:42:12.667",
"vulnStatus": "Modified",
@@ -74,11 +74,11 @@
"references": [
{
"url": "http://osvdb.org/98128",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4097",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4098.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4098.json
index 1720cf6e5d9..2a2803deeda 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4098.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4098.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4098",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-05T10:55:03.387",
"lastModified": "2024-11-21T01:42:12.773",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/98129",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4098",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87675",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/98129",
diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4099.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4099.json
index a2c349f8108..c48c58c1c84 100644
--- a/CVE-2012/CVE-2012-40xx/CVE-2012-4099.json
+++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4099.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4099",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-14T03:34:55.010",
"lastModified": "2024-11-21T01:42:12.883",
"vulnStatus": "Modified",
@@ -74,11 +74,11 @@
"references": [
{
"url": "http://osvdb.org/98130",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4099",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4100.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4100.json
index ef66c306621..f6ff8fd12e8 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4100.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4100.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4100",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.217",
"lastModified": "2023-11-07T02:11:43.193",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4101.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4101.json
index 0fb6f337309..ede696dbbcb 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4101.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4101.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4101",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.247",
"lastModified": "2023-11-07T02:11:43.400",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4102.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4102.json
index 4ff832e99e2..2ae8681ecf7 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4102.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4102.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4102",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-02T22:55:23.383",
"lastModified": "2024-11-21T01:42:13.047",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4102",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4103.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4103.json
index 943ffd1c72e..54f6bf0e5a1 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4103.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4103.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4103",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-02T22:55:23.430",
"lastModified": "2024-11-21T01:42:13.153",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4103",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4103",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4104.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4104.json
index e7bf6eaa079..290ddeaa506 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4104.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4104.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4104",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-02T22:55:23.463",
"lastModified": "2024-11-21T01:42:13.253",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4104",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4105.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4105.json
index 7f9b0e1d301..4b76f9179f6 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4105.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4105.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4105",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-13T10:19:59.973",
"lastModified": "2024-11-21T01:42:13.370",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/98437",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4105",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62980",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4106.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4106.json
index f6652e2aaca..af032c95327 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4106.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4106.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4106",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-13T10:20:02.833",
"lastModified": "2024-11-21T01:42:13.480",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/98354",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4106",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62981",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4107.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4107.json
index e66393806d0..0bccce22527 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4107.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4107.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4107",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-13T10:20:02.850",
"lastModified": "2024-11-21T01:42:13.583",
"vulnStatus": "Modified",
@@ -74,11 +74,11 @@
"references": [
{
"url": "http://osvdb.org/98355",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4107",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4108.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4108.json
index fe3ac2cd2b0..191caa06203 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4108.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4108.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4108",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-13T10:20:02.867",
"lastModified": "2024-11-21T01:42:13.687",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4108",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4109.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4109.json
index 8fdf9be28c1..777f720abd2 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4109.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4109.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4109",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-02T22:55:23.477",
"lastModified": "2024-11-21T01:42:13.787",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4109",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4110.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4110.json
index a0df30e3eb8..13e4bf60165 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4110.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4110.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4110",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-02T22:55:23.493",
"lastModified": "2024-11-21T01:42:13.883",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4110",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4111.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4111.json
index 2468bddf11a..1f59ae341fd 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4111.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4111.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4111",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-02T22:55:23.527",
"lastModified": "2024-11-21T01:42:13.987",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4111",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4112.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4112.json
index 71a3fb81019..3550fa6a3d2 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4112.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4112.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4112",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-19T10:36:06.777",
"lastModified": "2024-11-21T01:42:14.097",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4112",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4113.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4113.json
index aba2e950509..1fcde352b6c 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4113.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4113.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4113",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-19T10:36:07.027",
"lastModified": "2024-11-21T01:42:14.197",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4113",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4114.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4114.json
index 8eb933b3a41..71be48f71b4 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4114.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4114.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4114",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-19T10:36:07.197",
"lastModified": "2024-11-21T01:42:14.300",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4114",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4115.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4115.json
index 2ef9feeb159..82752b2fdcd 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4115.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4115.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4115",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-21T10:50:23.687",
"lastModified": "2024-11-21T01:42:14.403",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4115",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4116.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4116.json
index 00ead4eb3d8..8d84e8f39a7 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4116.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4116.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4116",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-19T10:36:07.337",
"lastModified": "2024-11-21T01:42:14.503",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4116",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4117.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4117.json
index d145c31f8f6..881d7ab6e82 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4117.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4117.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4117",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-19T10:36:07.493",
"lastModified": "2024-11-21T01:42:14.603",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4117",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4118.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4118.json
index 284e3e3054e..425d31abfb2 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4118.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4118.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4118",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.263",
"lastModified": "2023-11-07T02:11:43.710",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4119.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4119.json
index 30f86dfb734..c2f5c9ccbfe 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4119.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4119.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4119",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.293",
"lastModified": "2023-11-07T02:11:43.920",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4120.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4120.json
index 6ea60b21d6f..f2d906777fd 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4120.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4120.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4120",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.323",
"lastModified": "2023-11-07T02:11:44.200",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4121.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4121.json
index 3a5d7e74273..8cc223f5d30 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4121.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4121.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4121",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-14T03:34:55.023",
"lastModified": "2024-11-21T01:42:14.767",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4121",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4122.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4122.json
index cb8a92f34f7..96aac6de15e 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4122.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4122.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4122",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-05T10:55:03.400",
"lastModified": "2024-11-21T01:42:14.870",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/98121",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4122",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62843",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -93,7 +93,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87672",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/98121",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4123.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4123.json
index 9b6fd8f9807..2da9a9094b6 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4123.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4123.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4123",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.357",
"lastModified": "2023-11-07T02:11:44.487",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4124.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4124.json
index cfc5be27399..67c148359e4 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4124.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4124.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4124",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.387",
"lastModified": "2023-11-07T02:11:44.700",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4125.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4125.json
index cf88644c44f..b43b01023dc 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4125.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4125.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4125",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.403",
"lastModified": "2023-11-07T02:11:44.917",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4126.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4126.json
index c6b545a74b3..eccefb0877e 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4126.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4126.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4126",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.433",
"lastModified": "2023-11-07T02:11:45.190",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4127.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4127.json
index 130e4bb9441..d40f33297ab 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4127.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4127.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4127",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.467",
"lastModified": "2023-11-07T02:11:45.410",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4128.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4128.json
index 5e713caa298..c3eeaeebf7d 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4128.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4128.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4128",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.497",
"lastModified": "2023-11-07T02:11:45.633",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4129.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4129.json
index 98db2f591ee..92dbff7c1b4 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4129.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4129.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4129",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.513",
"lastModified": "2023-11-07T02:11:45.860",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4130.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4130.json
index 692a859c1d5..6c55ab77620 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4130.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4130.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4130",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.543",
"lastModified": "2023-11-07T02:11:46.077",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4131.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4131.json
index 7a24ed436bf..df117f82c83 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4131.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4131.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4131",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-21T14:22:56.033",
"lastModified": "2024-11-21T01:42:15.070",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4131",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4132.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4132.json
index 82fa1973bb4..fe4ebf8ac1e 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4132.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4132.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4132",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.573",
"lastModified": "2023-11-07T02:11:46.310",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4133.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4133.json
index b3bf7352814..3d50123181a 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4133.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4133.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4133",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.590",
"lastModified": "2023-11-07T02:11:46.527",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4134.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4134.json
index 45daee3c8f6..ff2c58cc82d 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4134.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4134.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4134",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.620",
"lastModified": "2023-11-07T02:11:46.743",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4135.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4135.json
index a1dd52fa6c4..ff88b81dd99 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4135.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4135.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4135",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-21T14:22:56.067",
"lastModified": "2024-11-21T01:42:15.210",
"vulnStatus": "Modified",
@@ -560,14 +560,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4135",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32237",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4136.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4136.json
index 3e64beeaf14..30ce154d9e5 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4136.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4136.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4136",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-03T11:03:38.680",
"lastModified": "2024-11-21T01:42:15.330",
"vulnStatus": "Modified",
@@ -74,11 +74,11 @@
"references": [
{
"url": "http://secunia.com/advisories/54171",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVS-2012-4136",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4137.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4137.json
index 9804a50b040..fa579cc608e 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4137.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4137.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4137",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.637",
"lastModified": "2023-11-07T02:11:46.977",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4138.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4138.json
index e58fbe0c8b5..67c386364dd 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4138.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4138.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4138",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.667",
"lastModified": "2023-11-07T02:11:47.197",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4139.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4139.json
index 89e605a8a2e..d1e965e6ea3 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4139.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4139.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4139",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.700",
"lastModified": "2023-11-07T02:11:47.413",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4140.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4140.json
index 6d505c00320..5e6ca7031d9 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4140.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4140.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4140",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:18.717",
"lastModified": "2023-11-07T02:11:47.633",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4141.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4141.json
index eb44b71702a..472a5fc2d93 100644
--- a/CVE-2012/CVE-2012-41xx/CVE-2012-4141.json
+++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4141.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4141",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-05T10:55:03.417",
"lastModified": "2024-11-21T01:42:15.480",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/98122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4141",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62839",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -93,7 +93,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029160",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4617.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4617.json
index 38395f89420..916d61d8243 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4617.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4617.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4617",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-27T00:55:00.903",
"lastModified": "2024-11-21T01:43:16.217",
"vulnStatus": "Modified",
@@ -114,18 +114,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-bgp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55694",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027576",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-bgp",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4618.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4618.json
index e80eef21e5f..0cf5d3fe72b 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4618.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4618.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4618",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-27T00:55:00.937",
"lastModified": "2024-11-21T01:43:16.337",
"vulnStatus": "Modified",
@@ -99,18 +99,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-nat",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55693",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027579",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-nat",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4619.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4619.json
index d6bba193b77..1f1eb68118c 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4619.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4619.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4619",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-27T00:55:00.997",
"lastModified": "2024-11-21T01:43:16.453",
"vulnStatus": "Modified",
@@ -99,18 +99,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-nat",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55705",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027579",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-nat",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4620.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4620.json
index a7a9b81b25e..74ab54df0ee 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4620.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4620.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4620",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-27T00:55:01.047",
"lastModified": "2024-11-21T01:43:16.573",
"vulnStatus": "Modified",
@@ -109,22 +109,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-c10k-tunnels",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55696",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027578",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78883",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-c10k-tunnels",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4621.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4621.json
index 781e0bfc176..accebb46cac 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4621.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4621.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4621",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-27T00:55:01.093",
"lastModified": "2024-11-21T01:43:16.690",
"vulnStatus": "Modified",
@@ -89,14 +89,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-dhcp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1027572",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-dhcp",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4622.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4622.json
index 0fa19ce8a66..01f5fe5a1d3 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4622.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4622.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4622",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-27T00:55:01.140",
"lastModified": "2024-11-21T01:43:16.803",
"vulnStatus": "Modified",
@@ -86,26 +86,26 @@
"references": [
{
"url": "http://osvdb.org/85821",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-ecc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55701",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027573",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78886",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/85821",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4623.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4623.json
index ec18521ea11..6ccf848c894 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4623.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4623.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4623",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-27T00:55:01.187",
"lastModified": "2024-11-21T01:43:16.927",
"vulnStatus": "Modified",
@@ -1779,26 +1779,26 @@
"references": [
{
"url": "http://osvdb.org/85810",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-dhcpv6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55700",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027577",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78885",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/85810",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4629.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4629.json
index 564f7f49f0d..d9b11a67924 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4629.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4629.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4629",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-12T23:55:00.853",
"lastModified": "2024-11-21T01:43:17.077",
"vulnStatus": "Modified",
@@ -86,11 +86,11 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120912-asacx",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/55515",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120912-asacx",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4638.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4638.json
index a8c63cc6042..14383b1ca07 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4638.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4638.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4638",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.103",
"lastModified": "2024-11-21T01:43:17.183",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4643.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4643.json
index 66fc733bf93..0f6e06bc958 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4643.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4643.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4643",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-10-29T20:55:01.103",
"lastModified": "2024-11-21T01:43:17.290",
"vulnStatus": "Modified",
@@ -421,18 +421,18 @@
"references": [
{
"url": "http://osvdb.org/86145",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55861",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/86145",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4651.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4651.json
index bb97498f89d..9a6dc451d30 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4651.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4651.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4651",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.133",
"lastModified": "2024-11-21T01:43:17.440",
"vulnStatus": "Modified",
@@ -105,7 +105,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/ios/15_3m_and_t/release/notes/15_3m_and_t.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/ios/15_3m_and_t/release/notes/15_3m_and_t.pdf",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4655.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4655.json
index 69195d4d25b..0e9be2ce246 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4655.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4655.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4655",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-09-24T17:55:07.157",
"lastModified": "2024-11-21T01:43:17.553",
"vulnStatus": "Modified",
@@ -194,22 +194,22 @@
"references": [
{
"url": "http://secunia.com/advisories/50669",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55606",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78677",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/50669",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4658.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4658.json
index 16c8873d070..9a329ad9a41 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4658.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4658.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4658",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.150",
"lastModified": "2024-11-21T01:43:17.677",
"vulnStatus": "Modified",
@@ -90,7 +90,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4659.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4659.json
index 49e6e1b7b68..78880d36544 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4659.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4659.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4659",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-10-29T20:55:01.150",
"lastModified": "2024-11-21T01:43:17.793",
"vulnStatus": "Modified",
@@ -181,18 +181,18 @@
"references": [
{
"url": "http://osvdb.org/86137",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55865",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/86137",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4660.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4660.json
index 4b61f1a684d..09f46649f67 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4660.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4660.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4660",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-10-29T20:55:01.197",
"lastModified": "2024-11-21T01:43:17.910",
"vulnStatus": "Modified",
@@ -226,18 +226,18 @@
"references": [
{
"url": "http://osvdb.org/86144",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55864",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/86144",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4661.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4661.json
index 00fe9e8f518..eca3fbc66cc 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4661.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4661.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4661",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-10-29T20:55:01.257",
"lastModified": "2024-11-21T01:43:18.037",
"vulnStatus": "Modified",
@@ -191,27 +191,27 @@
"references": [
{
"url": "http://osvdb.org/86146",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/50857",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-fwsm",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/55863",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79173",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/86146",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4662.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4662.json
index 521a2758bea..7939a0e478a 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4662.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4662.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4662",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-10-29T20:55:01.307",
"lastModified": "2024-11-21T01:43:18.157",
"vulnStatus": "Modified",
@@ -181,30 +181,30 @@
"references": [
{
"url": "http://osvdb.org/86147",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/50857",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-fwsm",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/55862",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79174",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/86147",
diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4663.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4663.json
index bbcc4ff7c07..bad76bbed39 100644
--- a/CVE-2012/CVE-2012-46xx/CVE-2012-4663.json
+++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4663.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-4663",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-10-29T20:55:01.353",
"lastModified": "2024-11-21T01:43:18.280",
"vulnStatus": "Modified",
@@ -181,30 +181,30 @@
"references": [
{
"url": "http://osvdb.org/86148",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/50857",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-fwsm",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/55862",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79175",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/86148",
diff --git a/CVE-2012/CVE-2012-50xx/CVE-2012-5010.json b/CVE-2012/CVE-2012-50xx/CVE-2012-5010.json
index 1a16be32a4e..892fe3b9db4 100644
--- a/CVE-2012/CVE-2012-50xx/CVE-2012-5010.json
+++ b/CVE-2012/CVE-2012-50xx/CVE-2012-5010.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5010",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-27T20:29:00.230",
"lastModified": "2024-11-21T01:43:54.720",
"vulnStatus": "Modified",
@@ -97,7 +97,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99332",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -105,7 +105,7 @@
},
{
"url": "https://icisystem.blogspot.com/2016/01/cisco-notification-alert-asa-5500.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2012/CVE-2012-50xx/CVE-2012-5014.json b/CVE-2012/CVE-2012-50xx/CVE-2012-5014.json
index b9a2c9bc7d3..aa552510c8c 100644
--- a/CVE-2012/CVE-2012-50xx/CVE-2012-5014.json
+++ b/CVE-2012/CVE-2012-50xx/CVE-2012-5014.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5014",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.150",
"lastModified": "2024-11-21T01:43:54.837",
"vulnStatus": "Modified",
@@ -95,7 +95,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
diff --git a/CVE-2012/CVE-2012-50xx/CVE-2012-5017.json b/CVE-2012/CVE-2012-50xx/CVE-2012-5017.json
index 9dc8d44f579..4da18b5b2c9 100644
--- a/CVE-2012/CVE-2012-50xx/CVE-2012-5017.json
+++ b/CVE-2012/CVE-2012-50xx/CVE-2012-5017.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5017",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.167",
"lastModified": "2024-11-21T01:43:54.940",
"vulnStatus": "Modified",
@@ -122,7 +122,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
diff --git a/CVE-2012/CVE-2012-50xx/CVE-2012-5030.json b/CVE-2012/CVE-2012-50xx/CVE-2012-5030.json
index d585d0b7d37..df0201af922 100644
--- a/CVE-2012/CVE-2012-50xx/CVE-2012-5030.json
+++ b/CVE-2012/CVE-2012-50xx/CVE-2012-5030.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5030",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-02T19:29:00.227",
"lastModified": "2024-11-21T01:43:55.040",
"vulnStatus": "Modified",
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://www.cisco.com/c/en/us/td/docs/ios/15_2s/release/notes/15_2s_rel_notes/15_2s_caveats_15_2_4s.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2012/CVE-2012-50xx/CVE-2012-5032.json b/CVE-2012/CVE-2012-50xx/CVE-2012-5032.json
index 5eba60623ae..1496b92a8b6 100644
--- a/CVE-2012/CVE-2012-50xx/CVE-2012-5032.json
+++ b/CVE-2012/CVE-2012-50xx/CVE-2012-5032.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5032",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.167",
"lastModified": "2024-11-21T01:43:55.157",
"vulnStatus": "Modified",
@@ -90,7 +90,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
diff --git a/CVE-2012/CVE-2012-50xx/CVE-2012-5036.json b/CVE-2012/CVE-2012-50xx/CVE-2012-5036.json
index 7ef65524382..0f1c1508ca7 100644
--- a/CVE-2012/CVE-2012-50xx/CVE-2012-5036.json
+++ b/CVE-2012/CVE-2012-50xx/CVE-2012-5036.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5036",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.167",
"lastModified": "2024-11-21T01:43:55.263",
"vulnStatus": "Modified",
@@ -99,7 +99,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/release/notes/ol_20679.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/release/notes/ol_20679.html",
diff --git a/CVE-2012/CVE-2012-50xx/CVE-2012-5037.json b/CVE-2012/CVE-2012-50xx/CVE-2012-5037.json
index fbd232dde8b..7718b7cf880 100644
--- a/CVE-2012/CVE-2012-50xx/CVE-2012-5037.json
+++ b/CVE-2012/CVE-2012-50xx/CVE-2012-5037.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5037",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.180",
"lastModified": "2024-11-21T01:43:55.370",
"vulnStatus": "Modified",
@@ -92,7 +92,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
diff --git a/CVE-2012/CVE-2012-50xx/CVE-2012-5039.json b/CVE-2012/CVE-2012-50xx/CVE-2012-5039.json
index 0fcb7c73c92..b627ce334c3 100644
--- a/CVE-2012/CVE-2012-50xx/CVE-2012-5039.json
+++ b/CVE-2012/CVE-2012-50xx/CVE-2012-5039.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5039",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.180",
"lastModified": "2024-11-21T01:43:55.470",
"vulnStatus": "Modified",
@@ -75,7 +75,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/release/notes/ol_20679.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/release/notes/ol_20679.html",
diff --git a/CVE-2012/CVE-2012-50xx/CVE-2012-5044.json b/CVE-2012/CVE-2012-50xx/CVE-2012-5044.json
index 3f94ad327cb..79208019483 100644
--- a/CVE-2012/CVE-2012-50xx/CVE-2012-5044.json
+++ b/CVE-2012/CVE-2012-50xx/CVE-2012-5044.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5044",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.197",
"lastModified": "2024-11-21T01:43:55.573",
"vulnStatus": "Modified",
@@ -75,7 +75,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/ios/15_3m_and_t/release/notes/15_3m_and_t.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/ios/15_3m_and_t/release/notes/15_3m_and_t.pdf",
diff --git a/CVE-2012/CVE-2012-54xx/CVE-2012-5415.json b/CVE-2012/CVE-2012-54xx/CVE-2012-5415.json
index 5706334a996..96677466444 100644
--- a/CVE-2012/CVE-2012-54xx/CVE-2012-5415.json
+++ b/CVE-2012/CVE-2012-54xx/CVE-2012-5415.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5415",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-16T14:04:30.890",
"lastModified": "2024-11-21T01:44:40.197",
"vulnStatus": "Modified",
@@ -89,7 +89,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-5415",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-54xx/CVE-2012-5416.json b/CVE-2012/CVE-2012-54xx/CVE-2012-5416.json
index 62f6415bfba..e53d43d588d 100644
--- a/CVE-2012/CVE-2012-54xx/CVE-2012-5416.json
+++ b/CVE-2012/CVE-2012-54xx/CVE-2012-5416.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5416",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-11-02T04:46:09.263",
"lastModified": "2024-11-21T01:44:40.293",
"vulnStatus": "Modified",
@@ -145,18 +145,18 @@
"references": [
{
"url": "http://osvdb.org/86859",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121031-mp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79721",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/86859",
diff --git a/CVE-2012/CVE-2012-54xx/CVE-2012-5417.json b/CVE-2012/CVE-2012-54xx/CVE-2012-5417.json
index 21f6ca1760d..222b6321e08 100644
--- a/CVE-2012/CVE-2012-54xx/CVE-2012-5417.json
+++ b/CVE-2012/CVE-2012-54xx/CVE-2012-5417.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5417",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-11-02T04:46:09.310",
"lastModified": "2024-11-21T01:44:40.393",
"vulnStatus": "Modified",
@@ -159,18 +159,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121031-dcnm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/56348",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027712",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121031-dcnm",
diff --git a/CVE-2012/CVE-2012-54xx/CVE-2012-5419.json b/CVE-2012/CVE-2012-54xx/CVE-2012-5419.json
index 9674e49aaab..37546835fef 100644
--- a/CVE-2012/CVE-2012-54xx/CVE-2012-5419.json
+++ b/CVE-2012/CVE-2012-54xx/CVE-2012-5419.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5419",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-17T15:55:01.470",
"lastModified": "2024-11-21T01:44:40.497",
"vulnStatus": "Modified",
@@ -91,7 +91,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130116-asa1000v",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-54xx/CVE-2012-5422.json b/CVE-2012/CVE-2012-54xx/CVE-2012-5422.json
index 7d4dad4132a..61ddf5479d4 100644
--- a/CVE-2012/CVE-2012-54xx/CVE-2012-5422.json
+++ b/CVE-2012/CVE-2012-54xx/CVE-2012-5422.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5422",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.197",
"lastModified": "2024-11-21T01:44:40.593",
"vulnStatus": "Modified",
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/ios/15_3m_and_t/release/notes/15_3m_and_t.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/ios/15_3m_and_t/release/notes/15_3m_and_t.pdf",
diff --git a/CVE-2012/CVE-2012-54xx/CVE-2012-5424.json b/CVE-2012/CVE-2012-54xx/CVE-2012-5424.json
index 638682aeb64..c9873e085d1 100644
--- a/CVE-2012/CVE-2012-54xx/CVE-2012-5424.json
+++ b/CVE-2012/CVE-2012-54xx/CVE-2012-5424.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5424",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-11-07T23:55:01.320",
"lastModified": "2024-11-21T01:44:40.700",
"vulnStatus": "Modified",
@@ -89,30 +89,30 @@
"references": [
{
"url": "http://osvdb.org/87251",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/51194",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121107-acs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/56433",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id?1027733",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79860",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/87251",
diff --git a/CVE-2012/CVE-2012-54xx/CVE-2012-5427.json b/CVE-2012/CVE-2012-54xx/CVE-2012-5427.json
index 3a248c61921..fc676f38881 100644
--- a/CVE-2012/CVE-2012-54xx/CVE-2012-5427.json
+++ b/CVE-2012/CVE-2012-54xx/CVE-2012-5427.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5427",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.213",
"lastModified": "2024-11-21T01:44:40.803",
"vulnStatus": "Modified",
@@ -80,7 +80,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/ios/15_3m_and_t/release/notes/15_3m_and_t.pdf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/ios/15_3m_and_t/release/notes/15_3m_and_t.pdf",
diff --git a/CVE-2012/CVE-2012-54xx/CVE-2012-5429.json b/CVE-2012/CVE-2012-54xx/CVE-2012-5429.json
index 3a26aec5283..58a55d48d1c 100644
--- a/CVE-2012/CVE-2012-54xx/CVE-2012-5429.json
+++ b/CVE-2012/CVE-2012-54xx/CVE-2012-5429.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5429",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-17T21:55:00.887",
"lastModified": "2024-11-21T01:44:40.900",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-5429",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-54xx/CVE-2012-5444.json b/CVE-2012/CVE-2012-54xx/CVE-2012-5444.json
index 2f8d2174edb..67137f39a9d 100644
--- a/CVE-2012/CVE-2012-54xx/CVE-2012-5444.json
+++ b/CVE-2012/CVE-2012-54xx/CVE-2012-5444.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5444",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-17T15:55:01.500",
"lastModified": "2024-11-21T01:44:41.000",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-5444",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-54xx/CVE-2012-5445.json b/CVE-2012/CVE-2012-54xx/CVE-2012-5445.json
index 33fb50f8ca7..aca58e4e482 100644
--- a/CVE-2012/CVE-2012-54xx/CVE-2012-5445.json
+++ b/CVE-2012/CVE-2012-54xx/CVE-2012-5445.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5445",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-12-28T11:48:44.673",
"lastModified": "2024-11-21T01:44:41.100",
"vulnStatus": "Modified",
@@ -857,11 +857,11 @@
"references": [
{
"url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html",
diff --git a/CVE-2012/CVE-2012-57xx/CVE-2012-5717.json b/CVE-2012/CVE-2012-57xx/CVE-2012-5717.json
index 0c5c29de0bc..32fe252059e 100644
--- a/CVE-2012/CVE-2012-57xx/CVE-2012-5717.json
+++ b/CVE-2012/CVE-2012-57xx/CVE-2012-5717.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5717",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-18T21:55:00.900",
"lastModified": "2024-11-21T01:45:10.223",
"vulnStatus": "Modified",
@@ -241,7 +241,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-5717",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-57xx/CVE-2012-5723.json b/CVE-2012/CVE-2012-57xx/CVE-2012-5723.json
index 4652197a66a..4417799f81a 100644
--- a/CVE-2012/CVE-2012-57xx/CVE-2012-5723.json
+++ b/CVE-2012/CVE-2012-57xx/CVE-2012-5723.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5723",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-24T10:55:02.320",
"lastModified": "2024-11-21T01:45:10.337",
"vulnStatus": "Modified",
@@ -172,7 +172,7 @@
"references": [
{
"url": "http://www.cisco.com/c/en/us/td/docs/routers/asr1000/release/notes/asr1k_rn_rel_notes/asr1k_caveats_38s.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/routers/asr1000/release/notes/asr1k_rn_rel_notes/asr1k_caveats_38s.html",
diff --git a/CVE-2012/CVE-2012-57xx/CVE-2012-5744.json b/CVE-2012/CVE-2012-57xx/CVE-2012-5744.json
index 1c1d26e61ae..d5c626c4d7c 100644
--- a/CVE-2012/CVE-2012-57xx/CVE-2012-5744.json
+++ b/CVE-2012/CVE-2012-57xx/CVE-2012-5744.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5744",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-30T01:55:08.437",
"lastModified": "2024-11-21T01:45:10.450",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-5744",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-59xx/CVE-2012-5990.json b/CVE-2012/CVE-2012-59xx/CVE-2012-5990.json
index cb78885129d..7db1667695e 100644
--- a/CVE-2012/CVE-2012-59xx/CVE-2012-5990.json
+++ b/CVE-2012/CVE-2012-59xx/CVE-2012-5990.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5990",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-06T11:15:35.370",
"lastModified": "2024-11-21T01:45:38.420",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://www.kb.cert.org/vuls/id/830316",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"US Government Resource"
]
diff --git a/CVE-2012/CVE-2012-59xx/CVE-2012-5991.json b/CVE-2012/CVE-2012-59xx/CVE-2012-5991.json
index 3fa7786376c..28c27bc3632 100644
--- a/CVE-2012/CVE-2012-59xx/CVE-2012-5991.json
+++ b/CVE-2012/CVE-2012-59xx/CVE-2012-5991.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5991",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-12-19T11:56:00.220",
"lastModified": "2024-11-21T01:45:38.530",
"vulnStatus": "Modified",
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://infosec42.blogspot.dk/2012/12/cisco-wlc-csrf-dos-and-persistent-xss.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
diff --git a/CVE-2012/CVE-2012-59xx/CVE-2012-5992.json b/CVE-2012/CVE-2012-59xx/CVE-2012-5992.json
index bacf4818110..20d50929435 100644
--- a/CVE-2012/CVE-2012-59xx/CVE-2012-5992.json
+++ b/CVE-2012/CVE-2012-59xx/CVE-2012-5992.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-5992",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-12-19T11:56:00.250",
"lastModified": "2024-11-21T01:45:38.653",
"vulnStatus": "Modified",
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://infosec42.blogspot.dk/2012/12/cisco-wlc-csrf-dos-and-persistent-xss.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
diff --git a/CVE-2012/CVE-2012-60xx/CVE-2012-6007.json b/CVE-2012/CVE-2012-60xx/CVE-2012-6007.json
index 007f1395c3f..f91436b8714 100644
--- a/CVE-2012/CVE-2012-60xx/CVE-2012-6007.json
+++ b/CVE-2012/CVE-2012-60xx/CVE-2012-6007.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6007",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2012-12-19T11:56:00.297",
"lastModified": "2024-11-21T01:45:38.773",
"vulnStatus": "Modified",
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://infosec42.blogspot.dk/2012/12/cisco-wlc-csrf-dos-and-persistent-xss.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
diff --git a/CVE-2012/CVE-2012-60xx/CVE-2012-6026.json b/CVE-2012/CVE-2012-60xx/CVE-2012-6026.json
index 190e7555b99..9a2cadac10a 100644
--- a/CVE-2012/CVE-2012-60xx/CVE-2012-6026.json
+++ b/CVE-2012/CVE-2012-60xx/CVE-2012-6026.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6026",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-03-05T05:04:04.077",
"lastModified": "2024-11-21T01:45:38.897",
"vulnStatus": "Modified",
@@ -101,14 +101,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6026",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=28436",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-60xx/CVE-2012-6029.json b/CVE-2012/CVE-2012-60xx/CVE-2012-6029.json
index 7f9812208dc..d8ea63036b0 100644
--- a/CVE-2012/CVE-2012-60xx/CVE-2012-6029.json
+++ b/CVE-2012/CVE-2012-60xx/CVE-2012-6029.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6029",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-31T12:06:18.283",
"lastModified": "2024-11-21T01:45:39.020",
"vulnStatus": "Modified",
@@ -125,14 +125,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6029",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.secureworks.com/cyber-threat-intelligence/advisories/SWRX-2013-001/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6029",
diff --git a/CVE-2012/CVE-2012-63xx/CVE-2012-6392.json b/CVE-2012/CVE-2012-63xx/CVE-2012-6392.json
index f41bbf53f04..c5458feeace 100644
--- a/CVE-2012/CVE-2012-63xx/CVE-2012-6392.json
+++ b/CVE-2012/CVE-2012-63xx/CVE-2012-6392.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6392",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-17T15:55:01.563",
"lastModified": "2024-11-21T01:46:04.873",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-lms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-63xx/CVE-2012-6395.json b/CVE-2012/CVE-2012-63xx/CVE-2012-6395.json
index 94934163065..e867397b600 100644
--- a/CVE-2012/CVE-2012-63xx/CVE-2012-6395.json
+++ b/CVE-2012/CVE-2012-63xx/CVE-2012-6395.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6395",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-18T21:55:01.073",
"lastModified": "2024-11-21T01:46:05.030",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://secunia.com/advisories/51955",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6395",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028009",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/51955",
diff --git a/CVE-2012/CVE-2012-63xx/CVE-2012-6396.json b/CVE-2012/CVE-2012-63xx/CVE-2012-6396.json
index 3a490295cb4..cd420686ff5 100644
--- a/CVE-2012/CVE-2012-63xx/CVE-2012-6396.json
+++ b/CVE-2012/CVE-2012-63xx/CVE-2012-6396.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6396",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-19T20:55:01.043",
"lastModified": "2024-11-21T01:46:05.167",
"vulnStatus": "Modified",
@@ -101,14 +101,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6396",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028018",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6396",
diff --git a/CVE-2012/CVE-2012-63xx/CVE-2012-6397.json b/CVE-2012/CVE-2012-63xx/CVE-2012-6397.json
index 6788f572cc0..aebcc56adc8 100644
--- a/CVE-2012/CVE-2012-63xx/CVE-2012-6397.json
+++ b/CVE-2012/CVE-2012-63xx/CVE-2012-6397.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6397",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-17T15:55:01.610",
"lastModified": "2024-11-21T01:46:05.290",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6397",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-63xx/CVE-2012-6399.json b/CVE-2012/CVE-2012-63xx/CVE-2012-6399.json
index 4fc8afcfc38..7b745fa060a 100644
--- a/CVE-2012/CVE-2012-63xx/CVE-2012-6399.json
+++ b/CVE-2012/CVE-2012-63xx/CVE-2012-6399.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6399",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-27T14:55:01.037",
"lastModified": "2024-11-21T01:46:05.410",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://secunia.com/advisories/51412",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6401.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6401.json
index 5406716be27..3142268cf61 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6401.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6401.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6401",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.340",
"lastModified": "2023-11-07T02:13:18.250",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6402.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6402.json
index 6304b0e0e4a..b0298d3ce71 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6402.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6402.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6402",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.370",
"lastModified": "2023-11-07T02:13:18.587",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6403.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6403.json
index 8c24ff53ca5..78f6679a6db 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6403.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6403.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6403",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.403",
"lastModified": "2023-11-07T02:13:18.817",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6404.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6404.json
index cbec23bbb28..51cf9364584 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6404.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6404.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6404",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.417",
"lastModified": "2023-11-07T02:13:19.033",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6405.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6405.json
index 3b05f85ea19..532cf62fbab 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6405.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6405.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6405",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.450",
"lastModified": "2023-11-07T02:13:19.243",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6406.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6406.json
index 41afcfb5f5b..1168d1f9e48 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6406.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6406.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6406",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.480",
"lastModified": "2023-11-07T02:13:19.470",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6407.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6407.json
index 83516844200..702047316e3 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6407.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6407.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6407",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.497",
"lastModified": "2023-11-07T02:13:19.683",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6408.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6408.json
index 605c67b1104..e8bbf5b54ef 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6408.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6408.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6408",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.527",
"lastModified": "2023-11-07T02:13:19.907",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6409.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6409.json
index 0f984811858..da069857501 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6409.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6409.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6409",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.543",
"lastModified": "2023-11-07T02:13:20.133",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6410.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6410.json
index c0ac51fab78..0d21082d0e7 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6410.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6410.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6410",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.577",
"lastModified": "2023-11-07T02:13:20.380",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6411.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6411.json
index b26bf9e238c..58748d1cfa0 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6411.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6411.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6411",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.590",
"lastModified": "2023-11-07T02:13:20.607",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6412.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6412.json
index e14075fd390..2928a1157fa 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6412.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6412.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6412",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.620",
"lastModified": "2023-11-07T02:13:20.827",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6413.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6413.json
index 5f951b29351..0add50ed3ae 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6413.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6413.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6413",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.637",
"lastModified": "2023-11-07T02:13:21.047",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6414.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6414.json
index 478d9ee192b..b189cec9dac 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6414.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6414.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6414",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.653",
"lastModified": "2023-11-07T02:13:21.287",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6415.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6415.json
index 52e6e29897a..442b404c711 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6415.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6415.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6415",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.683",
"lastModified": "2023-11-07T02:13:21.513",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6416.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6416.json
index ca8c03188c6..ff16749b73e 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6416.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6416.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6416",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.700",
"lastModified": "2023-11-07T02:13:21.730",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6417.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6417.json
index eccd4be9804..e024ff984a6 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6417.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6417.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6417",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.730",
"lastModified": "2023-11-07T02:13:21.947",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6418.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6418.json
index cc1fa5129e0..b4415525661 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6418.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6418.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6418",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.747",
"lastModified": "2023-11-07T02:13:22.167",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6419.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6419.json
index 018c59f1464..6feb81721ca 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6419.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6419.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6419",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.777",
"lastModified": "2023-11-07T02:13:22.427",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6420.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6420.json
index ff51ac3f9e1..07f690d2753 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6420.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6420.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6420",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.793",
"lastModified": "2023-11-07T02:13:22.650",
"vulnStatus": "Rejected",
diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6421.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6421.json
index bfbabdf066c..8456b4fa33d 100644
--- a/CVE-2012/CVE-2012-64xx/CVE-2012-6421.json
+++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6421.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2012-6421",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:23.827",
"lastModified": "2023-11-07T02:13:22.873",
"vulnStatus": "Rejected",
diff --git a/CVE-2013/CVE-2013-10xx/CVE-2013-1099.json b/CVE-2013/CVE-2013-10xx/CVE-2013-1099.json
index bf9d8528d8f..66d90a77224 100644
--- a/CVE-2013/CVE-2013-10xx/CVE-2013-1099.json
+++ b/CVE-2013/CVE-2013-10xx/CVE-2013-1099.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1099",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:25.327",
"lastModified": "2023-11-07T02:14:40.323",
"vulnStatus": "Rejected",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1100.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1100.json
index 617ef75d798..d180f3bfef0 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1100.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1100.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1100",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-13T23:55:01.117",
"lastModified": "2024-11-21T01:48:54.600",
"vulnStatus": "Modified",
@@ -561,7 +561,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1102.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1102.json
index bbe97f70051..bdcf7035c7a 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1102.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1102.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1102",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-24T21:55:05.900",
"lastModified": "2024-11-21T01:48:54.720",
"vulnStatus": "Modified",
@@ -141,22 +141,22 @@
"references": [
{
"url": "http://secunia.com/advisories/51965",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/57524",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028027",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/51965",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1103.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1103.json
index c95d741adc3..fd83197b604 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1103.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1103.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1103",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-24T21:55:05.947",
"lastModified": "2024-11-21T01:48:54.843",
"vulnStatus": "Modified",
@@ -141,26 +141,26 @@
"references": [
{
"url": "http://osvdb.org/89530",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/51965",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/57524",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028027",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/89530",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1104.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1104.json
index 8767876f977..052d5aad83d 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1104.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1104.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1104",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-24T21:55:05.977",
"lastModified": "2024-11-21T01:48:54.963",
"vulnStatus": "Modified",
@@ -121,30 +121,30 @@
"references": [
{
"url": "http://osvdb.org/89533",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/51965",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/57524",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028027",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81489",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/89533",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1105.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1105.json
index 79de4263385..30dc1b0222e 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1105.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1105.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1105",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-24T21:55:06.023",
"lastModified": "2024-11-21T01:48:55.073",
"vulnStatus": "Modified",
@@ -146,30 +146,30 @@
"references": [
{
"url": "http://osvdb.org/89532",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/51965",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/57524",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028027",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81490",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/89532",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1107.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1107.json
index ec64d55bc9a..37a5e5ebd1e 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1107.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1107.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1107",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-06T12:05:43.803",
"lastModified": "2024-11-21T01:48:55.200",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1107",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1108.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1108.json
index e8708c75260..12c05ea3bfb 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1108.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1108.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1108",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-21T21:55:01.543",
"lastModified": "2024-11-21T01:48:55.313",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1108",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028014",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1108",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1109.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1109.json
index 12473b54f5b..311c5450da5 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1109.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1109.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1109",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-17T15:55:01.657",
"lastModified": "2024-11-21T01:48:55.423",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1109",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028016",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1109",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1110.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1110.json
index 5437f343230..6ca55e4dbcc 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1110.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1110.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1110",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-21T21:55:01.603",
"lastModified": "2024-11-21T01:48:55.533",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1110",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/57488",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028013",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1110",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1111.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1111.json
index 4a64832fc9f..a63b898e91d 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1111.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1111.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1111",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-13T23:55:01.180",
"lastModified": "2024-11-21T01:48:55.647",
"vulnStatus": "Modified",
@@ -91,7 +91,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130206-ata187",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1112.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1112.json
index 2697bd35097..af231bca6b2 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1112.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1112.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1112",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-31T12:06:18.363",
"lastModified": "2024-11-21T01:48:55.760",
"vulnStatus": "Modified",
@@ -259,18 +259,18 @@
"references": [
{
"url": "http://osvdb.org/89643",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1112",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/57604",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/89643",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1113.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1113.json
index 133311a0e3b..8cc026aee4c 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1113.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1113.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1113",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-01-31T12:06:18.410",
"lastModified": "2024-11-21T01:48:55.897",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://osvdb.org/89608",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/51954",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1113",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/57567",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81529",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/89608",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1114.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1114.json
index 61f8a15e569..721431e6f32 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1114.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1114.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1114",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-13T23:55:01.227",
"lastModified": "2024-11-21T01:48:56.010",
"vulnStatus": "Modified",
@@ -155,7 +155,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1114",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1115.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1115.json
index e828ce9c703..320cceac825 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1115.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1115.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1115",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-06T11:15:37.133",
"lastModified": "2024-11-21T01:48:56.123",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1116.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1116.json
index 499dd44c6ce..4a174bf9f5d 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1116.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1116.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1116",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-06T11:15:37.153",
"lastModified": "2024-11-21T01:48:56.237",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1117.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1117.json
index d3e6d4d564a..c7e79129aef 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1117.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1117.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1117",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-06T11:15:37.173",
"lastModified": "2024-11-21T01:48:56.350",
"vulnStatus": "Modified",
@@ -104,7 +104,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1118.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1118.json
index c18abd425c3..b9892842692 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1118.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1118.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1118",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-06T11:15:37.187",
"lastModified": "2024-11-21T01:48:56.460",
"vulnStatus": "Modified",
@@ -104,7 +104,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1119.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1119.json
index 3089dbba713..76bf2fbc5b8 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1119.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1119.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1119",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-06T11:15:37.207",
"lastModified": "2024-11-21T01:48:56.570",
"vulnStatus": "Modified",
@@ -104,7 +104,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1120.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1120.json
index c30c7ce69ae..522c04a400b 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1120.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1120.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1120",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-06T12:05:43.833",
"lastModified": "2024-11-21T01:48:56.690",
"vulnStatus": "Modified",
@@ -152,7 +152,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1120",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1121.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1121.json
index 5b418122141..46b9e86ef09 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1121.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1121.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1121",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-19T18:55:05.540",
"lastModified": "2024-11-21T01:48:56.810",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1121",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1122.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1122.json
index 66c121600ad..81d03d07fe2 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1122.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1122.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1122",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-13T23:55:01.273",
"lastModified": "2024-11-21T01:48:56.933",
"vulnStatus": "Modified",
@@ -436,7 +436,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1122",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1123.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1123.json
index 33cd41668b9..b2d156aec47 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1123.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1123.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1123",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-15T12:09:28.977",
"lastModified": "2024-11-21T01:48:57.057",
"vulnStatus": "Modified",
@@ -74,36 +74,36 @@
"references": [
{
"url": "http://osvdb.org/90075",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/52109",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1123",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=28228",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/57885",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81986",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/90075",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1124.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1124.json
index def67a5e20d..dc219ce42d5 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1124.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1124.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1124",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-28T23:55:01.160",
"lastModified": "2024-11-21T01:48:57.177",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1124",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1125.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1125.json
index 3dc417da782..c246fa458c0 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1125.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1125.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1125",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-19T23:55:02.097",
"lastModified": "2024-11-21T01:48:57.287",
"vulnStatus": "Modified",
@@ -119,7 +119,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1125",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1125",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1128.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1128.json
index 223a8b0bdf2..37d006029ca 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1128.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1128.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1128",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-15T12:09:29.023",
"lastModified": "2024-11-21T01:48:57.400",
"vulnStatus": "Modified",
@@ -120,21 +120,21 @@
"references": [
{
"url": "http://secunia.com/advisories/52194",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1128",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=28217",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1129.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1129.json
index e51476e6f6b..d31ab6dd9a1 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1129.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1129.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1129",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-19T23:55:02.130",
"lastModified": "2024-11-21T01:48:57.510",
"vulnStatus": "Modified",
@@ -89,7 +89,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1129",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1130.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1130.json
index 9afb45fc401..30bd5ef5b5b 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1130.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1130.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1130",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-20T16:55:07.770",
"lastModified": "2024-11-21T01:48:57.613",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1130",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1131.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1131.json
index 48654b7eb4f..73bcb9e9967 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1131.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1131.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1131",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-13T23:55:01.320",
"lastModified": "2024-11-21T01:48:57.730",
"vulnStatus": "Modified",
@@ -89,7 +89,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1131",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1132.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1132.json
index 2d6281acfdf..5acc3b044b5 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1132.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1132.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1132",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-10T21:55:00.907",
"lastModified": "2024-11-21T01:48:57.850",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1132",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1133.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1133.json
index 377a3fd6ac6..39147f179f6 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1133.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1133.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1133",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-27T21:55:04.107",
"lastModified": "2024-11-21T01:48:57.957",
"vulnStatus": "Modified",
@@ -109,7 +109,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130227-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1134.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1134.json
index 5782908554a..c87ec209ecf 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1134.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1134.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1134",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-27T21:55:04.167",
"lastModified": "2024-11-21T01:48:58.063",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130227-cucm",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130227-cucm",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1135.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1135.json
index b5fedad12b2..f9fc0d6037f 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1135.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1135.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1135",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-27T21:55:04.230",
"lastModified": "2024-11-21T01:48:58.167",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130227-hcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1135",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130227-hcs",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1136.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1136.json
index b2e78edd316..699a7b817ff 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1136.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1136.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1136",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-13T11:50:48.467",
"lastModified": "2024-11-21T01:48:58.273",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1136",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1137.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1137.json
index 777d23f7658..4d1f9d6ad3f 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1137.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1137.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1137",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-27T21:55:04.293",
"lastModified": "2024-11-21T01:48:58.390",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130227-cups",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1138.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1138.json
index 01bbbb46b2f..fa997ec9300 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1138.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1138.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1138",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-25T20:55:01.003",
"lastModified": "2024-11-21T01:48:58.503",
"vulnStatus": "Modified",
@@ -541,7 +541,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1138",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1139.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1139.json
index 25bc78390ae..80f9c8f73cf 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1139.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1139.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1139",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-27T00:55:01.330",
"lastModified": "2024-11-21T01:48:58.637",
"vulnStatus": "Modified",
@@ -94,14 +94,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1139",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=28387",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1140.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1140.json
index 4241cec2bd2..d11a56e64c0 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1140.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1140.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1140",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-03-06T13:10:25.970",
"lastModified": "2024-11-21T01:48:58.747",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1140",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1140",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1141.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1141.json
index d9cd7e60588..a6ee378996d 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1141.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1141.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1141",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-02-28T23:55:01.287",
"lastModified": "2024-11-21T01:48:58.857",
"vulnStatus": "Modified",
@@ -367,14 +367,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1141",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=28417",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1142.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1142.json
index 451356377a0..87ec6ec34a6 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1142.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1142.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1142",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-03-28T23:55:01.547",
"lastModified": "2024-11-21T01:48:58.987",
"vulnStatus": "Modified",
@@ -83,14 +83,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-nat",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1142",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1143.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1143.json
index b26aa8954ac..b2c8b285ae2 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1143.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1143.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1143",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-03-28T23:55:01.563",
"lastModified": "2024-11-21T01:48:59.110",
"vulnStatus": "Modified",
@@ -214,11 +214,11 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-rsvp",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1143",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1144.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1144.json
index b04e62f8a17..43c8635cd1b 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1144.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1144.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1144",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-03-28T23:55:01.580",
"lastModified": "2024-11-21T01:48:59.230",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-ike",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1145.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1145.json
index 51ff0787676..806ae56d9ae 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1145.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1145.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1145",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-03-28T23:55:01.597",
"lastModified": "2024-11-21T01:48:59.340",
"vulnStatus": "Modified",
@@ -89,7 +89,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-cce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1146.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1146.json
index 135aea2f1e5..3a1e4c8290d 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1146.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1146.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1146",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-03-28T23:55:01.610",
"lastModified": "2024-11-21T01:48:59.463",
"vulnStatus": "Modified",
@@ -99,7 +99,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-smartinstall",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1147.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1147.json
index 4570bb0181b..fa9903f1c89 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1147.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1147.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1147",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-03-28T23:55:01.627",
"lastModified": "2024-11-21T01:48:59.573",
"vulnStatus": "Modified",
@@ -99,7 +99,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-pt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1148.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1148.json
index e00cf3c4c5d..a9c699c061d 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1148.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1148.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1148",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-03-28T23:55:01.643",
"lastModified": "2024-11-21T01:48:59.683",
"vulnStatus": "Modified",
@@ -189,7 +189,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-ipsla",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1149.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1149.json
index e2131773207..df7dfa0caec 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1149.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1149.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1149",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:01.770",
"lastModified": "2024-11-21T01:48:59.800",
"vulnStatus": "Modified",
@@ -967,14 +967,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1150.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1150.json
index 72e5e832d33..ef7fff5c198 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1150.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1150.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1150",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:01.790",
"lastModified": "2024-11-21T01:48:59.947",
"vulnStatus": "Modified",
@@ -730,14 +730,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1150",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1151.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1151.json
index cf10b9a905f..fba15a8e6ba 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1151.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1151.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1151",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:01.813",
"lastModified": "2024-11-21T01:49:00.100",
"vulnStatus": "Modified",
@@ -564,7 +564,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1152.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1152.json
index 6765d94551f..753a253d3b2 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1152.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1152.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1152",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:01.840",
"lastModified": "2024-11-21T01:49:00.240",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1153.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1153.json
index c5f9087356d..a62d353c2f8 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1153.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1153.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1153",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-03-07T20:55:02.253",
"lastModified": "2024-11-21T01:49:00.357",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1153",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1154.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1154.json
index 6b8041cf017..da93ee69045 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1154.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1154.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1154",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-03-07T20:55:02.313",
"lastModified": "2024-11-21T01:49:00.487",
"vulnStatus": "Modified",
@@ -343,15 +343,15 @@
"references": [
{
"url": "http://jvn.jp/en/jp/JVN05132866/index.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000017",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=27502",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1155.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1155.json
index d417e8bfd29..2b95f7de597 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1155.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1155.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1155",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:01.857",
"lastModified": "2024-11-21T01:49:00.623",
"vulnStatus": "Modified",
@@ -284,7 +284,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1156.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1156.json
index bb69bceed0e..47d426ca692 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1156.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1156.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1156",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-01T12:00:08.430",
"lastModified": "2024-11-21T01:49:00.733",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1156",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1157.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1157.json
index eaad95a791e..ca46e14df95 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1157.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1157.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1157",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-01T12:00:08.473",
"lastModified": "2024-11-21T01:49:00.843",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1157",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1158.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1158.json
index e5651b1bb30..bdf051463ba 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1158.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1158.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1158",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-01T12:00:08.503",
"lastModified": "2024-11-21T01:49:00.960",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1158",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1159.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1159.json
index ae5f7736634..7570dcff254 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1159.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1159.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1159",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-01T12:00:08.533",
"lastModified": "2024-11-21T01:49:01.067",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1159",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1160.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1160.json
index b51eb6f5acb..01d653af9a8 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1160.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1160.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1160",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-01T12:00:08.557",
"lastModified": "2024-11-21T01:49:01.190",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1160",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1161.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1161.json
index 20929dedb01..3d3e5bffc3a 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1161.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1161.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1161",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-03-26T03:42:06.840",
"lastModified": "2024-11-21T01:49:01.310",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1161",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1162.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1162.json
index 1f3c29d3094..50f7ba41b07 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1162.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1162.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1162",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-03-26T03:42:06.927",
"lastModified": "2024-11-21T01:49:01.427",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1162",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1163.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1163.json
index d5d36cf7ce2..d2935972520 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1163.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1163.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1163",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-01T19:55:01.263",
"lastModified": "2024-11-21T01:49:01.543",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1163",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1164.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1164.json
index 9a007d720c6..cc9d6db2cc0 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1164.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1164.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1164",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:01.873",
"lastModified": "2024-11-21T01:49:01.663",
"vulnStatus": "Modified",
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1165.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1165.json
index e7b024001c6..9ff08fec360 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1165.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1165.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1165",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:01.890",
"lastModified": "2024-11-21T01:49:01.807",
"vulnStatus": "Modified",
@@ -267,7 +267,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1166.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1166.json
index 33e8426ee2e..040a2980412 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1166.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1166.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1166",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:01.910",
"lastModified": "2024-11-21T01:49:01.940",
"vulnStatus": "Modified",
@@ -176,7 +176,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1167.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1167.json
index ce66da96d25..5aef6010a5c 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1167.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1167.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1167",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:01.943",
"lastModified": "2024-11-21T01:49:02.060",
"vulnStatus": "Modified",
@@ -231,7 +231,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1168.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1168.json
index abd9b0a14b9..a6146d48359 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1168.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1168.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1168",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:01.993",
"lastModified": "2024-11-21T01:49:02.180",
"vulnStatus": "Modified",
@@ -159,7 +159,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-mp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1169.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1169.json
index 0acc909618f..284b68442e2 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1169.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1169.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1169",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:02.037",
"lastModified": "2024-11-21T01:49:02.310",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-mp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1170.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1170.json
index 4a6caf06983..a762fdef448 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1170.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1170.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1170",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:02.070",
"lastModified": "2024-11-21T01:49:02.427",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-ncs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1171.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1171.json
index 7bed376cd67..66da2eecb8d 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1171.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1171.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1171",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-01T19:55:01.297",
"lastModified": "2024-11-21T01:49:02.540",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1171",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1172.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1172.json
index 11e57091ab3..c7e20cceac3 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1172.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1172.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1172",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:02.090",
"lastModified": "2024-11-21T01:49:02.653",
"vulnStatus": "Modified",
@@ -374,7 +374,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1172",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1173.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1173.json
index 23df7d6c7e3..e8942598edb 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1173.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1173.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1173",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:02.107",
"lastModified": "2024-11-21T01:49:02.783",
"vulnStatus": "Modified",
@@ -374,7 +374,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1173",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1174.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1174.json
index 510b39b5f5b..baa4542cae0 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1174.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1174.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1174",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-05T16:55:01.747",
"lastModified": "2024-11-21T01:49:02.930",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1174",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1175.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1175.json
index 32b1d687dd8..ccdce1e34c6 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1175.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1175.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1175",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-16T03:36:22.627",
"lastModified": "2023-11-07T02:14:40.970",
"vulnStatus": "Rejected",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1176.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1176.json
index 8d39a5e0969..2580082bee0 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1176.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1176.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1176",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-18T18:55:03.970",
"lastModified": "2024-11-21T01:49:03.067",
"vulnStatus": "Modified",
@@ -296,7 +296,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi",
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1177.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1177.json
index 9086fdab85a..7787270c992 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1177.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1177.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1177",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-18T18:55:06.910",
"lastModified": "2024-11-21T01:49:03.213",
"vulnStatus": "Modified",
@@ -100,7 +100,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-nac",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1178.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1178.json
index 4a1d2de2446..5be1ce0032e 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1178.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1178.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1178",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-25T10:55:01.570",
"lastModified": "2024-11-21T01:49:03.347",
"vulnStatus": "Modified",
@@ -1793,7 +1793,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1179.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1179.json
index 423646d1181..2bb586cd621 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1179.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1179.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1179",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-25T10:55:01.617",
"lastModified": "2024-11-21T01:49:03.523",
"vulnStatus": "Modified",
@@ -813,7 +813,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1180.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1180.json
index 9ec473fe9ce..deafb281bea 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1180.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1180.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1180",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-25T10:55:01.640",
"lastModified": "2024-11-21T01:49:03.670",
"vulnStatus": "Modified",
@@ -813,7 +813,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1181.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1181.json
index 4d7c875fe30..1e37b7db8ab 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1181.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1181.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1181",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-25T10:55:01.663",
"lastModified": "2024-11-21T01:49:03.803",
"vulnStatus": "Modified",
@@ -666,7 +666,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1182.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1182.json
index ba17af9f764..110430a9fdc 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1182.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1182.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1182",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-25T10:55:01.683",
"lastModified": "2024-11-21T01:49:03.947",
"vulnStatus": "Modified",
@@ -157,7 +157,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-ucsmulti",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1183.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1183.json
index ca93c560ad6..8934084ab31 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1183.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1183.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1183",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-25T10:55:01.707",
"lastModified": "2024-11-21T01:49:04.067",
"vulnStatus": "Modified",
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-ucsmulti",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1184.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1184.json
index d265108dedb..48b8b0c0704 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1184.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1184.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1184",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-25T10:55:01.723",
"lastModified": "2024-11-21T01:49:04.190",
"vulnStatus": "Modified",
@@ -136,7 +136,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-ucsmulti",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1185.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1185.json
index 9149f06d7d4..b47627a4d61 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1185.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1185.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1185",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-25T10:55:01.750",
"lastModified": "2024-11-21T01:49:04.310",
"vulnStatus": "Modified",
@@ -281,7 +281,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-ucsmulti",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1186.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1186.json
index ef3f70d3484..fd40124e3e4 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1186.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1186.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1186",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-25T10:55:01.770",
"lastModified": "2024-11-21T01:49:04.437",
"vulnStatus": "Modified",
@@ -256,7 +256,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-ucsmulti",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1187.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1187.json
index 7a8fef2e5b7..cf70ff48f73 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1187.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1187.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1187",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-16T14:04:30.907",
"lastModified": "2024-11-21T01:49:04.587",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1187",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1188.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1188.json
index b19e5c1cdb0..1cec9543777 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1188.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1188.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1188",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-16T03:36:22.690",
"lastModified": "2024-11-21T01:49:04.713",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1188",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1189.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1189.json
index 2d5bc0772e4..0ea6dd20f08 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1189.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1189.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1189",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-11T10:55:02.123",
"lastModified": "2024-11-21T01:49:04.843",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1189",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1190.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1190.json
index d7bd61c1b8c..c06669c189b 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1190.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1190.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1190",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-02T12:10:40.373",
"lastModified": "2024-11-21T01:49:04.960",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1190",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1191.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1191.json
index 0aa436d0156..764a81d7d6c 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1191.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1191.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1191",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-26T00:25:31.673",
"lastModified": "2024-11-21T01:49:05.073",
"vulnStatus": "Modified",
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1192.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1192.json
index 0d52f67f798..d5cfaf19685 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1192.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1192.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1192",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-25T10:55:01.787",
"lastModified": "2024-11-21T01:49:05.190",
"vulnStatus": "Modified",
@@ -290,7 +290,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-fmdm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1193.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1193.json
index ae6d43177c1..7e352c19a21 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1193.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1193.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1193",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-16T14:04:30.917",
"lastModified": "2024-11-21T01:49:05.330",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1193",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1194.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1194.json
index e59056ff142..c00efc71a80 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1194.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1194.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1194",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-18T18:55:06.937",
"lastModified": "2024-11-21T01:49:05.457",
"vulnStatus": "Modified",
@@ -86,14 +86,14 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0198.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1194",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1195.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1195.json
index 4fe49a2e0ca..f98693a7b7b 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1195.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1195.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1195",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-24T10:28:37.890",
"lastModified": "2024-11-21T01:49:05.583",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1195",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1196.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1196.json
index ff1fada00d9..9405ea0b8e8 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1196.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1196.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1196",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-29T21:55:37.203",
"lastModified": "2024-11-21T01:49:05.700",
"vulnStatus": "Modified",
@@ -124,7 +124,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1196",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1197.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1197.json
index 28b6e6b8c94..6ac5fb9b687 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1197.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1197.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1197",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-16T14:04:30.923",
"lastModified": "2024-11-21T01:49:05.820",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1197",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1198.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1198.json
index d400bacfb56..5f2954a389a 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1198.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1198.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1198",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-29T12:20:36.197",
"lastModified": "2024-11-21T01:49:05.933",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1198",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-11xx/CVE-2013-1199.json b/CVE-2013/CVE-2013-11xx/CVE-2013-1199.json
index 346c29b583d..886d3a32d1e 100644
--- a/CVE-2013/CVE-2013-11xx/CVE-2013-1199.json
+++ b/CVE-2013/CVE-2013-11xx/CVE-2013-1199.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1199",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-18T18:55:07.000",
"lastModified": "2024-11-21T01:49:06.057",
"vulnStatus": "Modified",
@@ -91,7 +91,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1199",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1200.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1200.json
index eea4fe4b439..71ef8d9defe 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1200.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1200.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1200",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-16T03:36:22.710",
"lastModified": "2024-11-21T01:49:06.177",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1200",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1202.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1202.json
index 212ab35511a..31ea62cb824 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1202.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1202.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1202",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-07T14:15:11.000",
"lastModified": "2024-11-21T01:49:06.303",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20130516-CVE-2013-1202",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1203.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1203.json
index 3f18c854391..08e98e91f16 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1203.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1203.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1203",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-18T14:55:01.930",
"lastModified": "2024-11-21T01:49:06.437",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1203",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1203",
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1204.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1204.json
index ce25f5b8a6a..e985147e4f1 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1204.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1204.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1204",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-23T13:36:30.313",
"lastModified": "2024-11-21T01:49:06.553",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1204",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1205.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1205.json
index cf279a472d4..e2b8cc4c0aa 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1205.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1205.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1205",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-06T13:02:13.007",
"lastModified": "2024-11-21T01:49:06.680",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1205",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1208.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1208.json
index 06a4b393c71..b3debdf0d21 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1208.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1208.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1208",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-29T19:55:00.973",
"lastModified": "2024-11-21T01:49:06.790",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1208",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1209.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1209.json
index 9dfe5c627a1..e74d1e2554d 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1209.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1209.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1209",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-29T19:55:01.023",
"lastModified": "2024-11-21T01:49:06.900",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1209",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1210.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1210.json
index 91f6e23bb79..28f4cb793e6 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1210.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1210.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1210",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-29T19:55:01.043",
"lastModified": "2024-11-21T01:49:07.017",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1210",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1211.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1211.json
index e968f8c075a..e9ecfb7a26e 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1211.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1211.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1211",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-29T19:55:01.067",
"lastModified": "2024-11-21T01:49:07.143",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1211",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1212.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1212.json
index bc66a77d6ba..d5e8efd2852 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1212.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1212.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1212",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-29T19:55:01.087",
"lastModified": "2024-11-21T01:49:07.283",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1212",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1213.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1213.json
index e074f013780..26e3fac9269 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1213.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1213.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1213",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-29T19:55:01.110",
"lastModified": "2024-11-21T01:49:07.440",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1213",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1214.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1214.json
index b3df2900882..3b9bbe765ae 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1214.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1214.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1214",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-24T10:28:37.917",
"lastModified": "2024-11-21T01:49:07.563",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1214",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1215.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1215.json
index bd1a8832356..888d3bcb9d7 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1215.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1215.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1215",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-25T20:55:09.587",
"lastModified": "2024-11-21T01:49:07.693",
"vulnStatus": "Modified",
@@ -91,7 +91,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1215",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1216.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1216.json
index de5bbdddf21..122efaaa791 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1216.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1216.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1216",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-29T12:20:36.227",
"lastModified": "2024-11-21T01:49:07.830",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1216",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1217.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1217.json
index 1bbe2be425e..5178eedb88a 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1217.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1217.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1217",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-24T10:28:37.933",
"lastModified": "2024-11-21T01:49:07.960",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1217",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1218.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1218.json
index 4ef83c607ab..e617c013941 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1218.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1218.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1218",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-18T12:48:56.047",
"lastModified": "2024-11-21T01:49:08.087",
"vulnStatus": "Modified",
@@ -115,7 +115,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-ips",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1219.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1219.json
index a542d9cadfd..5db6c1e75df 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1219.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1219.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1219",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-29T12:20:36.250",
"lastModified": "2024-11-21T01:49:08.213",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1219",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1220.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1220.json
index 030426c008a..a72e1c94da0 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1220.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1220.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1220",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-09T12:31:19.153",
"lastModified": "2024-11-21T01:49:08.370",
"vulnStatus": "Modified",
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130508-cvp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1221.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1221.json
index 085805ef649..d94a7848931 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1221.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1221.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1221",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-09T12:31:19.173",
"lastModified": "2024-11-21T01:49:08.483",
"vulnStatus": "Modified",
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130508-cvp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1222.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1222.json
index 84520542771..e8e7df04326 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1222.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1222.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1222",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-09T12:31:19.190",
"lastModified": "2024-11-21T01:49:08.597",
"vulnStatus": "Modified",
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130508-cvp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1223.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1223.json
index 43d4e203ebc..73018758b67 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1223.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1223.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1223",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-09T12:31:19.207",
"lastModified": "2024-11-21T01:49:08.727",
"vulnStatus": "Modified",
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130508-cvp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1224.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1224.json
index 59fc9415aaf..919ef3ef763 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1224.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1224.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1224",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-09T12:31:19.227",
"lastModified": "2024-11-21T01:49:08.850",
"vulnStatus": "Modified",
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130508-cvp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1225.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1225.json
index 14eaad8cc91..064a379e0c5 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1225.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1225.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1225",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-09T12:31:19.243",
"lastModified": "2024-11-21T01:49:08.987",
"vulnStatus": "Modified",
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130508-cvp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1226.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1226.json
index 1195c24dace..37dcda3c238 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1226.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1226.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1226",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-29T12:20:36.267",
"lastModified": "2024-11-21T01:49:09.120",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1226",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1227.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1227.json
index 14d031a45ce..5c3c14f697c 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1227.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1227.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1227",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-04-29T12:20:36.287",
"lastModified": "2024-11-21T01:49:09.247",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1227",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1228.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1228.json
index 67714a7a917..668e0850605 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1228.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1228.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1228",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-06T11:15:37.223",
"lastModified": "2024-11-21T01:49:09.370",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1228",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1229.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1229.json
index f258746facd..5ffb33c2b67 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1229.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1229.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1229",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-01T12:00:08.580",
"lastModified": "2024-11-21T01:49:09.490",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1229",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1230.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1230.json
index a09c984893d..da44043c6ad 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1230.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1230.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1230",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-01T12:00:08.640",
"lastModified": "2024-11-21T01:49:09.610",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1230",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1231.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1231.json
index 7832c544bc0..fb21b69af83 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1231.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1231.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1231",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-03T11:57:44.923",
"lastModified": "2024-11-21T01:49:09.730",
"vulnStatus": "Modified",
@@ -83,7 +83,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1231",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1232.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1232.json
index 66db5e62059..1f032f7dc20 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1232.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1232.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1232",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-04T03:24:41.700",
"lastModified": "2024-11-21T01:49:09.843",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1232",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1233.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1233.json
index c73b7551d7b..e619861c465 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1233.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1233.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1233",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:25.340",
"lastModified": "2023-11-07T02:14:41.510",
"vulnStatus": "Rejected",
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1234.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1234.json
index 998cee46255..90fc1f1b7ae 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1234.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1234.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1234",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-03T11:57:44.960",
"lastModified": "2024-11-21T01:49:09.977",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1234",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1235.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1235.json
index 57ba183cf9a..5e091088e7f 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1235.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1235.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1235",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-04T03:24:41.720",
"lastModified": "2024-11-21T01:49:10.087",
"vulnStatus": "Modified",
@@ -149,7 +149,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1235",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1236.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1236.json
index 3df6ee26b0a..20c9cda2ae4 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1236.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1236.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1236",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-16T03:36:22.727",
"lastModified": "2024-11-21T01:49:10.220",
"vulnStatus": "Modified",
@@ -87,7 +87,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130515-mse",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1240.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1240.json
index c4fae40f754..ec7748aa54b 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1240.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1240.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1240",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-04T03:24:41.737",
"lastModified": "2024-11-21T01:49:10.357",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1240",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1241.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1241.json
index 94893645c3c..7496d34b664 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1241.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1241.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1241",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-08T12:09:33.697",
"lastModified": "2024-11-21T01:49:10.487",
"vulnStatus": "Modified",
@@ -211,7 +211,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1241",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1242.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1242.json
index 531d6d54255..622ddca8467 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1242.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1242.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1242",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-10T11:42:30.143",
"lastModified": "2024-11-21T01:49:10.613",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1242",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1243.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1243.json
index c26213b549c..2fb28b66d61 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1243.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1243.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1243",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-18T12:48:56.927",
"lastModified": "2024-11-21T01:49:10.733",
"vulnStatus": "Modified",
@@ -115,7 +115,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-ips",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1244.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1244.json
index 1b6c72dae40..6cdb1440467 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1244.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1244.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1244",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-16T03:36:22.747",
"lastModified": "2024-11-21T01:49:10.850",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1244",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1245.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1245.json
index 981f715abd5..3f2b2fba297 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1245.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1245.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1245",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-16T03:36:22.767",
"lastModified": "2024-11-21T01:49:10.970",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1245",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1246.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1246.json
index a29fd679944..54154d716cd 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1246.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1246.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1246",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-31T15:55:01.117",
"lastModified": "2024-11-21T01:49:11.080",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1246",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-12xx/CVE-2013-1247.json b/CVE-2013/CVE-2013-12xx/CVE-2013-1247.json
index 842c94be709..e6b898ecc1a 100644
--- a/CVE-2013/CVE-2013-12xx/CVE-2013-1247.json
+++ b/CVE-2013/CVE-2013-12xx/CVE-2013-1247.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-1247",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-05-31T21:55:01.127",
"lastModified": "2024-11-21T01:49:11.193",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1247",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3375.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3375.json
index e2c63816019..ac14ca38b85 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3375.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3375.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3375",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-14T13:07:29.450",
"lastModified": "2024-11-21T01:53:30.620",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3375",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3376.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3376.json
index 664a6e57833..3ede60b619f 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3376.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3376.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3376",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-14T13:07:29.493",
"lastModified": "2024-11-21T01:53:30.730",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3376",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3377.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3377.json
index b0d002e6534..db452008455 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3377.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3377.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3377",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-21T13:57:25.623",
"lastModified": "2024-11-21T01:53:30.843",
"vulnStatus": "Modified",
@@ -280,7 +280,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc",
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3378.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3378.json
index 4c2857d95e0..04b50ce6162 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3378.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3378.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3378",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-21T13:57:25.640",
"lastModified": "2024-11-21T01:53:30.983",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3379.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3379.json
index 03d69f9b13c..8bc0487fcaa 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3379.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3379.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3379",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-21T13:57:25.660",
"lastModified": "2024-11-21T01:53:31.107",
"vulnStatus": "Modified",
@@ -95,7 +95,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3380.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3380.json
index 71e1b71e8ee..195bacf2e3d 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3380.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3380.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3380",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-12T03:30:15.243",
"lastModified": "2024-11-21T01:53:31.253",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3380",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3381.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3381.json
index db7dc41f711..965360a6a3a 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3381.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3381.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3381",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-12T03:30:15.267",
"lastModified": "2024-11-21T01:53:31.390",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3381",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3382.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3382.json
index 658b4e9d227..128005b0138 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3382.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3382.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3382",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-26T19:55:01.103",
"lastModified": "2024-11-21T01:53:31.507",
"vulnStatus": "Modified",
@@ -174,7 +174,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-ngfw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3383.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3383.json
index 93fb5e07b05..c77f7c5338d 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3383.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3383.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3383",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-27T21:55:06.987",
"lastModified": "2024-11-21T01:53:31.633",
"vulnStatus": "Modified",
@@ -97,7 +97,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-wsa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3384.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3384.json
index 5f0d82cca7a..914ea2cc78b 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3384.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3384.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3384",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-27T21:55:07.023",
"lastModified": "2024-11-21T01:53:31.753",
"vulnStatus": "Modified",
@@ -132,21 +132,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-esa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-sma",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-wsa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3385.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3385.json
index fae13ed6339..85bbf0207e7 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3385.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3385.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3385",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-27T21:55:07.057",
"lastModified": "2024-11-21T01:53:31.910",
"vulnStatus": "Modified",
@@ -132,18 +132,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-esa",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-sma",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-wsa",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-esa",
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3386.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3386.json
index 00333740fc9..61bd9b01451 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3386.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3386.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3386",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-27T21:55:07.090",
"lastModified": "2024-11-21T01:53:32.063",
"vulnStatus": "Modified",
@@ -117,14 +117,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-esa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-sma",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-esa",
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3387.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3387.json
index cb638edb836..c73f4b5a116 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3387.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3387.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3387",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-25T03:27:32.510",
"lastModified": "2024-11-21T01:53:32.197",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130821-hcm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3388.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3388.json
index 79f12cdd07a..7c6efdf50c3 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3388.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3388.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3388",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-25T03:27:32.537",
"lastModified": "2024-11-21T01:53:32.337",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130821-hcm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3389.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3389.json
index 13b5cdcfdd0..8b2f2045ed9 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3389.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3389.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3389",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-25T03:27:32.560",
"lastModified": "2024-11-21T01:53:32.473",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130821-hcm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3390.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3390.json
index 5fe4b02f9da..3405030e6e0 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3390.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3390.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3390",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-25T03:27:32.577",
"lastModified": "2024-11-21T01:53:32.610",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130821-hcm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3392.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3392.json
index 1a6fdb710da..c0ad015a014 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3392.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3392.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3392",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-21T21:55:00.987",
"lastModified": "2024-11-21T01:53:32.727",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3392",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3393.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3393.json
index 1d6fac24fdd..71b11a9045c 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3393.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3393.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3393",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-26T19:55:01.133",
"lastModified": "2024-11-21T01:53:32.847",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3393",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3393",
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3394.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3394.json
index 5964d66a14b..c5c0523929d 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3394.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3394.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3394",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-27T04:43:33.060",
"lastModified": "2024-11-21T01:53:32.970",
"vulnStatus": "Modified",
@@ -80,14 +80,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3394",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31921",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3395.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3395.json
index eed74881fda..22aedb755f5 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3395.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3395.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3395",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-02T03:43:34.647",
"lastModified": "2024-11-21T01:53:33.100",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3395",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3396.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3396.json
index a20e367501d..274762fc05a 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3396.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3396.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3396",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-26T21:55:01.873",
"lastModified": "2024-11-21T01:53:33.227",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3396",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/60829",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3396",
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3397.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3397.json
index 946e10fbd55..d5beb7e1fe9 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3397.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3397.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3397",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-26T21:55:04.333",
"lastModified": "2024-11-21T01:53:33.353",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3397",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3398.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3398.json
index 581ca402141..7b983db5a3c 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3398.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3398.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3398",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-06-26T21:55:04.360",
"lastModified": "2024-11-21T01:53:33.473",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3398",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-33xx/CVE-2013-3399.json b/CVE-2013/CVE-2013-33xx/CVE-2013-3399.json
index 2da9b02f86f..9dc44da6806 100644
--- a/CVE-2013/CVE-2013-33xx/CVE-2013-3399.json
+++ b/CVE-2013/CVE-2013-33xx/CVE-2013-3399.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3399",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-02T03:43:34.663",
"lastModified": "2024-11-21T01:53:33.603",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3399",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3399",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3400.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3400.json
index 3b0c8c863ef..9a9e3f42034 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3400.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3400.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3400",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-10T20:55:02.090",
"lastModified": "2024-11-21T01:53:33.707",
"vulnStatus": "Modified",
@@ -86,14 +86,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3400",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028763",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3400",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3401.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3401.json
index 3301185b0f8..911f70c8556 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3401.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3401.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3401",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-02T03:43:34.677",
"lastModified": "2024-11-21T01:53:33.823",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3401",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3402.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3402.json
index 1a149705834..f0fa89de5bc 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3402.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3402.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3402",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-18T12:48:56.933",
"lastModified": "2024-11-21T01:53:33.943",
"vulnStatus": "Modified",
@@ -389,11 +389,11 @@
"references": [
{
"url": "http://secunia.com/advisories/54249",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3403.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3403.json
index af0a02d2b51..1effddf3c34 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3403.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3403.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3403",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-18T12:48:56.940",
"lastModified": "2024-11-21T01:53:34.070",
"vulnStatus": "Modified",
@@ -389,11 +389,11 @@
"references": [
{
"url": "http://secunia.com/advisories/54249",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3404.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3404.json
index 92b66d7a21c..b2e88d4af59 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3404.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3404.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3404",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-18T12:48:56.947",
"lastModified": "2024-11-21T01:53:34.203",
"vulnStatus": "Modified",
@@ -389,11 +389,11 @@
"references": [
{
"url": "http://secunia.com/advisories/54249",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3405.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3405.json
index 16ee1c37a5e..597a8e7ba8b 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3405.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3405.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3405",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-10T20:55:02.107",
"lastModified": "2024-11-21T01:53:34.333",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3405",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3406.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3406.json
index 1a9b9b33207..64179669ddd 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3406.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3406.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3406",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-18T03:55:05.540",
"lastModified": "2024-11-21T01:53:34.447",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3406",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31775",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3407.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3407.json
index edfd44469d3..0f9710c6655 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3407.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3407.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3407",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-18T03:55:05.570",
"lastModified": "2024-11-21T01:53:34.567",
"vulnStatus": "Modified",
@@ -100,14 +100,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3407",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31776",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3408.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3408.json
index 8a7a7077321..fd663701ad5 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3408.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3408.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3408",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-10T21:55:00.930",
"lastModified": "2024-11-21T01:53:34.677",
"vulnStatus": "Modified",
@@ -91,14 +91,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3408",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028764",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3408",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3409.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3409.json
index 92ef3da5806..12c36c0f0a4 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3409.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3409.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3409",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-10T10:55:06.317",
"lastModified": "2024-11-21T01:53:34.787",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3409",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3410.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3410.json
index 585808e25ae..4da124ad395 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3410.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3410.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3410",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-18T12:48:56.953",
"lastModified": "2024-11-21T01:53:34.900",
"vulnStatus": "Modified",
@@ -132,11 +132,11 @@
"references": [
{
"url": "http://secunia.com/advisories/54243",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-ips",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3411.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3411.json
index dde614c3dc9..a2b659631bd 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3411.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3411.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3411",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-18T12:48:56.960",
"lastModified": "2024-11-21T01:53:35.023",
"vulnStatus": "Modified",
@@ -86,11 +86,11 @@
"references": [
{
"url": "http://secunia.com/advisories/54242",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-ips",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3412.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3412.json
index 394238922d0..58b36f8f596 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3412.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3412.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3412",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-18T12:48:56.967",
"lastModified": "2024-11-21T01:53:35.150",
"vulnStatus": "Modified",
@@ -389,11 +389,11 @@
"references": [
{
"url": "http://secunia.com/advisories/54249",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3413.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3413.json
index ea8c484c018..311964030fa 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3413.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3413.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3413",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-04T14:33:41.557",
"lastModified": "2024-11-21T01:53:35.270",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3413",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3413",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3414.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3414.json
index e8296b2169b..58041493392 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3414.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3414.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3414",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-25T15:53:16.177",
"lastModified": "2024-11-21T01:53:35.393",
"vulnStatus": "Modified",
@@ -86,25 +86,25 @@
"references": [
{
"url": "http://osvdb.org/95660",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3414",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30214",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028831",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85949",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/95660",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3415.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3415.json
index 6d4e75d0be1..d6fd9b6f374 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3415.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3415.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3415",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-13T10:20:03.740",
"lastModified": "2024-11-21T01:53:35.523",
"vulnStatus": "Modified",
@@ -109,14 +109,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3415",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3416.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3416.json
index f5168506c3c..8ef151a68ba 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3416.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3416.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3416",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-10T21:55:00.947",
"lastModified": "2024-11-21T01:53:35.650",
"vulnStatus": "Modified",
@@ -79,15 +79,15 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3416",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028765",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028766",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3416",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3417.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3417.json
index 68f0cafa5e7..9a6bef16db7 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3417.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3417.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3417",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-30T17:09:08.863",
"lastModified": "2024-11-21T01:53:35.773",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3417",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3418.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3418.json
index 9258a129832..ea66822734f 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3418.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3418.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3418",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-11T22:55:00.950",
"lastModified": "2024-11-21T01:53:35.890",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3418",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3418",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3419.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3419.json
index eaa037821b6..6c9c9e22f7f 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3419.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3419.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3419",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-11T22:55:00.967",
"lastModified": "2024-11-21T01:53:36.000",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3419",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3420.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3420.json
index 48c6dfd7aea..536807420e5 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3420.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3420.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3420",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-18T12:51:14.243",
"lastModified": "2024-11-21T01:53:36.110",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3420",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3421.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3421.json
index 6c9b9721033..b1f474e4efc 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3421.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3421.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3421",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-12T21:55:00.997",
"lastModified": "2024-11-21T01:53:36.220",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3421",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85622",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3421",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3422.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3422.json
index f3103353953..187fac1c20b 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3422.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3422.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3422",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-12T21:55:01.020",
"lastModified": "2024-11-21T01:53:36.337",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3422",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85623",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3422",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3423.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3423.json
index f469e9fdbf1..3ce69a24a84 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3423.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3423.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3423",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-12T21:55:01.040",
"lastModified": "2024-11-21T01:53:36.453",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3423",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85624",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3423",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3424.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3424.json
index da8ba20ef06..660992e55db 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3424.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3424.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3424",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-12T21:55:01.057",
"lastModified": "2024-11-21T01:53:36.550",
"vulnStatus": "Modified",
@@ -74,11 +74,11 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3424",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85625",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3424",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3425.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3425.json
index 5aad1971499..7058b9b05cf 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3425.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3425.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3425",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-31T13:20:18.877",
"lastModified": "2024-11-21T01:53:36.663",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/95876",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3425",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86150",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/95876",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3426.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3426.json
index 66d59b26f38..cd7813076a3 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3426.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3426.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3426",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-18T12:51:14.250",
"lastModified": "2024-11-21T01:53:36.777",
"vulnStatus": "Modified",
@@ -91,7 +91,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3426",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3428.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3428.json
index 3a647d20a22..a131ade4a3e 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3428.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3428.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3428",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-15T15:55:01.400",
"lastModified": "2024-11-21T01:53:36.903",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3428",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3429.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3429.json
index 42f89421ac3..ddc1556a233 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3429.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3429.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3429",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-25T15:53:16.203",
"lastModified": "2024-11-21T01:53:37.030",
"vulnStatus": "Modified",
@@ -175,22 +175,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130724-vsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61430",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028827",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85947",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130724-vsm",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3430.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3430.json
index 67fcef7e88f..e38c37f502c 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3430.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3430.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3430",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-25T15:53:16.217",
"lastModified": "2024-11-21T01:53:37.157",
"vulnStatus": "Modified",
@@ -175,22 +175,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130724-vsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61432",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028827",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85946",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130724-vsm",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3431.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3431.json
index f2471e9db88..fd60901894d 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3431.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3431.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3431",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-25T15:53:16.233",
"lastModified": "2024-11-21T01:53:37.293",
"vulnStatus": "Modified",
@@ -175,22 +175,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130724-vsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61431",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028827",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85945",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130724-vsm",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3433.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3433.json
index fd78ff01d91..bacb0bcf5d1 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3433.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3433.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3433",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-18T12:48:56.977",
"lastModified": "2024-11-21T01:53:37.430",
"vulnStatus": "Modified",
@@ -389,22 +389,22 @@
"references": [
{
"url": "http://osvdb.org/95404",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/54249",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61297",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/95404",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3434.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3434.json
index abef04b74e8..8330d150721 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3434.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3434.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3434",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-18T12:48:56.983",
"lastModified": "2024-11-21T01:53:37.583",
"vulnStatus": "Modified",
@@ -389,22 +389,22 @@
"references": [
{
"url": "http://osvdb.org/95403",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/54249",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61296",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/95403",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3435.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3435.json
index 20c1db4848b..c7785e23e36 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3435.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3435.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3435",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-23T11:03:01.997",
"lastModified": "2024-11-21T01:53:37.723",
"vulnStatus": "Modified",
@@ -86,18 +86,18 @@
"references": [
{
"url": "http://osvdb.org/95471",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3435",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30152",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3436.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3436.json
index 7a0f35cdeca..74f82d59bf1 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3436.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3436.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3436",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-19T14:36:13.367",
"lastModified": "2024-11-21T01:53:37.847",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://osvdb.org/95460",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3436",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30140",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61362",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028810",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85868",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/95460",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3437.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3437.json
index 76409c4ea71..66693a29acd 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3437.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3437.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3437",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-23T11:03:02.037",
"lastModified": "2024-11-21T01:53:37.963",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/95472",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3437",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30153",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3438.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3438.json
index 812a3f7bc6b..2f4834d80fb 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3438.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3438.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3438",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-24T12:01:57.703",
"lastModified": "2024-11-21T01:53:38.087",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/95583",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3438",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30186",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3439.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3439.json
index de081618e57..f0ecb34108c 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3439.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3439.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3439",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-23T17:20:53.230",
"lastModified": "2024-11-21T01:53:38.197",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/95585",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3439",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30174",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61416",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028825",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/95585",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3440.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3440.json
index 82fe21a2327..dfd18fa65e0 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3440.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3440.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3440",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-23T17:20:53.237",
"lastModified": "2024-11-21T01:53:38.320",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/95584",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3440",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30175",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61414",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028819",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/95584",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3441.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3441.json
index 8af36ba55d1..f7bc08d2418 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3441.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3441.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3441",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-23T11:03:11.990",
"lastModified": "2024-11-21T01:53:38.447",
"vulnStatus": "Modified",
@@ -89,29 +89,29 @@
"references": [
{
"url": "http://osvdb.org/95548",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3441",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30170",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61404",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028818",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/95548",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3442.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3442.json
index 83df5f18bb4..efe04dff663 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3442.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3442.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3442",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-05T13:22:47.897",
"lastModified": "2024-11-21T01:53:38.557",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3442",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3443.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3443.json
index 10840023006..12c3da5ec78 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3443.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3443.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3443",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-01T13:32:30.387",
"lastModified": "2024-11-21T01:53:38.670",
"vulnStatus": "Modified",
@@ -439,34 +439,34 @@
"references": [
{
"url": "http://osvdb.org/95877",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/54367",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/54372",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130731-waascm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61542",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028851",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86121",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/95877",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3444.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3444.json
index 1acb9ac0e83..304ad6eaef9 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3444.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3444.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3444",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-01T13:32:30.397",
"lastModified": "2024-11-21T01:53:38.797",
"vulnStatus": "Modified",
@@ -749,42 +749,42 @@
"references": [
{
"url": "http://secunia.com/advisories/54367",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/54369",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/54370",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/54372",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130731-cm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61543",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028852",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028853",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/54367",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3445.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3445.json
index 5df9f6668f6..58a2dd90b63 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3445.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3445.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3445",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-07-29T13:59:06.027",
"lastModified": "2024-11-21T01:53:38.953",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://osvdb.org/95659",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3445",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30217",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61452",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028837",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85982",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/95659",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3446.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3446.json
index ce52e0db18d..14be0ed1dab 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3446.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3446.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3446",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-12T13:28:32.190",
"lastModified": "2024-11-21T01:53:39.070",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3446",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3448.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3448.json
index 74d50db84d0..8f03233e162 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3448.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3448.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3448",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-02T12:10:40.477",
"lastModified": "2024-11-21T01:53:39.177",
"vulnStatus": "Modified",
@@ -74,25 +74,25 @@
"references": [
{
"url": "http://osvdb.org/95880",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3448",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30277",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/61572",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3450.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3450.json
index 92d88a7dae7..2974d87e3cf 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3450.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3450.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3450",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-05T13:22:47.910",
"lastModified": "2024-11-21T01:53:39.300",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3450",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3451.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3451.json
index d4f99eb6ee9..d30a5d6e79a 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3451.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3451.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3451",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-05T13:22:47.910",
"lastModified": "2024-11-21T01:53:39.413",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3451",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3453.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3453.json
index 00eb3a4845e..b4abeb7d8a8 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3453.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3453.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3453",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-22T22:55:05.093",
"lastModified": "2024-11-21T01:53:39.523",
"vulnStatus": "Modified",
@@ -645,7 +645,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130821-cup",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3454.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3454.json
index 4bd6164cdc6..5c9e4b6a264 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3454.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3454.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3454",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-08T14:55:08.717",
"lastModified": "2024-11-21T01:53:39.660",
"vulnStatus": "Modified",
@@ -515,7 +515,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3455.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3455.json
index fb89af258f4..09cedb87899 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3455.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3455.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3455",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-12T10:58:49.253",
"lastModified": "2024-11-21T01:53:39.787",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3455",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028897",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86357",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3455",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3457.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3457.json
index 395b27a1a95..3af001f7146 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3457.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3457.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3457",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-12T10:58:49.297",
"lastModified": "2024-11-21T01:53:39.903",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3457",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028896",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86356",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3457",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3458.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3458.json
index 6fbb3b8e5ce..a1be345102c 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3458.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3458.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3458",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-08T03:17:39.537",
"lastModified": "2024-11-21T01:53:40.030",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3458",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3459.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3459.json
index 5f9c1e1192f..cbfad35c780 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3459.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3459.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3459",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-25T03:27:32.597",
"lastModified": "2024-11-21T01:53:40.140",
"vulnStatus": "Modified",
@@ -184,14 +184,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130821-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028938",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130821-cucm",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3460.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3460.json
index 19bdadfcca9..1dfdaae71e2 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3460.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3460.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3460",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-25T03:27:32.650",
"lastModified": "2024-11-21T01:53:40.260",
"vulnStatus": "Modified",
@@ -164,14 +164,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130821-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028938",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3461.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3461.json
index 35155ce56c1..ba6fdbb9f0b 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3461.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3461.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3461",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-25T03:27:32.673",
"lastModified": "2024-11-21T01:53:40.383",
"vulnStatus": "Modified",
@@ -164,14 +164,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130821-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028938",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3462.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3462.json
index 174d36487bb..3d7366a71e1 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3462.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3462.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3462",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-25T03:27:32.690",
"lastModified": "2024-11-21T01:53:40.500",
"vulnStatus": "Modified",
@@ -299,14 +299,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130821-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028938",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3463.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3463.json
index d7a0226db45..32aa2e8c8f7 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3463.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3463.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3463",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-30T01:55:08.503",
"lastModified": "2024-11-21T01:53:40.623",
"vulnStatus": "Modified",
@@ -86,21 +86,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3463",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30607",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62068",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -108,7 +108,7 @@
},
{
"url": "http://www.securitytracker.com/id/1028968",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3464.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3464.json
index 7e6e9ae9134..30d8aef79da 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3464.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3464.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3464",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-13T15:04:14.017",
"lastModified": "2024-11-21T01:53:40.743",
"vulnStatus": "Modified",
@@ -354,14 +354,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3464",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028914",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -369,7 +369,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86385",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3464",
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3466.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3466.json
index ad93c2e4eee..7e0dcda0fdb 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3466.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3466.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3466",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-29T12:07:53.977",
"lastModified": "2024-11-21T01:53:40.870",
"vulnStatus": "Modified",
@@ -120,18 +120,18 @@
"references": [
{
"url": "http://osvdb.org/96668",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130828-acs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028958",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3467.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3467.json
index 7873535e9e4..23e7fddb55f 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3467.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3467.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3467",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-30T01:55:08.527",
"lastModified": "2024-11-21T01:53:40.987",
"vulnStatus": "Modified",
@@ -79,18 +79,18 @@
"references": [
{
"url": "http://osvdb.org/96731",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3467",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62065",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -98,7 +98,7 @@
},
{
"url": "http://www.securitytracker.com/id/1028960",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3468.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3468.json
index d6d851a017f..e7359da5cfe 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3468.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3468.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3468",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-29T12:07:54.003",
"lastModified": "2024-11-21T01:53:41.117",
"vulnStatus": "Modified",
@@ -79,18 +79,18 @@
"references": [
{
"url": "http://osvdb.org/96669",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3468",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028964",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3469.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3469.json
index b5cb3498b42..e535e6c54ab 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3469.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3469.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3469",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-04T03:24:36.997",
"lastModified": "2024-11-21T01:53:41.227",
"vulnStatus": "Modified",
@@ -74,21 +74,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3469",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30617",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62091",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -96,7 +96,7 @@
},
{
"url": "http://www.securitytracker.com/id/1028972",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3470.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3470.json
index d7a9d74c054..5180823a146 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3470.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3470.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3470",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-30T01:55:08.557",
"lastModified": "2024-11-21T01:53:41.350",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/96732",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3470",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62066",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -93,7 +93,7 @@
},
{
"url": "http://www.securitytracker.com/id/1028962",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3471.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3471.json
index 4d453998b80..ebd28c0513a 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3471.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3471.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3471",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-29T12:07:54.037",
"lastModified": "2024-11-21T01:53:41.470",
"vulnStatus": "Modified",
@@ -74,21 +74,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3471",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30524",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028965",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3472.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3472.json
index 31c70fbfe54..3e990295657 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3472.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3472.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3472",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-29T12:07:54.057",
"lastModified": "2024-11-21T01:53:41.580",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3472",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1028963",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3473.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3473.json
index 81b75d53160..8119276a273 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3473.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3473.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3473",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-20T18:55:09.830",
"lastModified": "2024-11-21T01:53:41.690",
"vulnStatus": "Modified",
@@ -95,7 +95,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130918-pc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-34xx/CVE-2013-3474.json b/CVE-2013/CVE-2013-34xx/CVE-2013-3474.json
index 47f3bb157c9..30188cb53b1 100644
--- a/CVE-2013/CVE-2013-34xx/CVE-2013-3474.json
+++ b/CVE-2013/CVE-2013-34xx/CVE-2013-3474.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-3474",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-30T20:55:08.647",
"lastModified": "2024-11-21T01:53:41.800",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://osvdb.org/96763",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3474",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62084",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028970",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86811",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/96763",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5469.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5469.json
index 3941c40b73c..9ef8fc822ec 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5469.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5469.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5469",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-08-30T20:55:08.737",
"lastModified": "2024-11-21T01:57:32.277",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://osvdb.org/96764",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5469",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62083",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028969",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86794",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/96764",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5470.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5470.json
index 3a6fa9d6b31..ccdaac2a9f6 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5470.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5470.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5470",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-04T03:24:37.017",
"lastModified": "2024-11-21T01:57:32.407",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/96822",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5470",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62145",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5471.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5471.json
index f18a54c6b79..69ea8747449 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5471.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5471.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5471",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-05T03:27:32.580",
"lastModified": "2024-11-21T01:57:32.540",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://osvdb.org/96823",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5471",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62166",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028985",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/96823",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5472.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5472.json
index cc78b84171b..eaa3246a78f 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5472.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5472.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5472",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-27T10:08:04.180",
"lastModified": "2024-11-21T01:57:32.660",
"vulnStatus": "Modified",
@@ -314,7 +314,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-ntp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5473.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5473.json
index f78a2a185ec..ca635118a5c 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5473.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5473.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5473",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-27T10:08:04.197",
"lastModified": "2024-11-21T01:57:32.793",
"vulnStatus": "Modified",
@@ -119,7 +119,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-ike",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5474.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5474.json
index b3430dd90d7..c3507e6008f 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5474.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5474.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5474",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-27T10:08:04.227",
"lastModified": "2024-11-21T01:57:32.940",
"vulnStatus": "Modified",
@@ -104,7 +104,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-ipv6vfr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5475.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5475.json
index 3ba562d2b5f..4fa7d95d6bb 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5475.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5475.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5475",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-27T10:08:04.243",
"lastModified": "2024-11-21T01:57:33.063",
"vulnStatus": "Modified",
@@ -419,7 +419,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-dhcp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5476.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5476.json
index 3085c35d44c..b08b765e8a7 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5476.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5476.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5476",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-27T10:08:04.257",
"lastModified": "2024-11-21T01:57:33.190",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-cce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5477.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5477.json
index fa748338dbb..c436632cf4c 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5477.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5477.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5477",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-27T10:08:04.273",
"lastModified": "2024-11-21T01:57:33.293",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-wedge",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5478.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5478.json
index a23a7055e88..4abe630521e 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5478.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5478.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5478",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-27T10:08:04.307",
"lastModified": "2024-11-21T01:57:33.417",
"vulnStatus": "Modified",
@@ -269,7 +269,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-rsvp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5479.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5479.json
index 6ce0b47b839..5352bc38765 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5479.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5479.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5479",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-27T10:08:04.320",
"lastModified": "2024-11-21T01:57:33.543",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-nat",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5480.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5480.json
index e3e16e52ea6..e335c2fdea9 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5480.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5480.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5480",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-27T10:08:04.337",
"lastModified": "2024-11-21T01:57:33.657",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-nat",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5481.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5481.json
index f47cf78911f..5b5201793ac 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5481.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5481.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5481",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-27T10:08:04.353",
"lastModified": "2024-11-21T01:57:33.767",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-nat",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5482.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5482.json
index 06c55aa8152..13388406f56 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5482.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5482.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5482",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-13T14:10:27.317",
"lastModified": "2024-11-21T01:57:33.880",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5482",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5483.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5483.json
index dafed0fd990..68e253fc86d 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5483.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5483.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5483",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-08T03:17:39.757",
"lastModified": "2024-11-21T01:57:33.993",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5483",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30674",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/62252",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1028989",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86912",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5483",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5486.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5486.json
index dc8b2ed338f..ffd94026e4d 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5486.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5486.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5486",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-23T10:18:59.157",
"lastModified": "2024-11-21T01:57:34.113",
"vulnStatus": "Modified",
@@ -185,14 +185,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130918-dcnm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/30008",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5487.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5487.json
index 411bdf1c981..52df7a74372 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5487.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5487.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5487",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-23T10:18:59.173",
"lastModified": "2024-11-21T01:57:34.253",
"vulnStatus": "Modified",
@@ -185,7 +185,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130918-dcnm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5488.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5488.json
index 8d4627e466c..8c9a3a1ac83 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5488.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5488.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5488",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-12T13:28:32.207",
"lastModified": "2024-11-21T01:57:34.377",
"vulnStatus": "Modified",
@@ -89,22 +89,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5488",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30749",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/62333",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87026",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5488",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5489.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5489.json
index e85be9c5fbc..e692c0be750 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5489.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5489.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5489",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-13T14:10:27.343",
"lastModified": "2024-11-21T01:57:34.507",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5489",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30734",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86965",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5489",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5490.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5490.json
index 5eadb782221..6be286e17dc 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5490.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5490.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5490",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-23T10:18:59.190",
"lastModified": "2024-11-21T01:57:34.620",
"vulnStatus": "Modified",
@@ -185,18 +185,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130918-dcnm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62485",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87191",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130918-dcnm",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5492.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5492.json
index 53a162d4fbd..3a54b2daa39 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5492.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5492.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5492",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-13T14:10:27.447",
"lastModified": "2024-11-21T01:57:34.740",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5492",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029033",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5492",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5493.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5493.json
index b178a31f904..dfbb50c9296 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5493.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5493.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5493",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-13T14:10:27.543",
"lastModified": "2024-11-21T01:57:34.853",
"vulnStatus": "Modified",
@@ -79,25 +79,25 @@
"references": [
{
"url": "http://osvdb.org/97239",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5493",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30777",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029032",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/97239",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5494.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5494.json
index 0df9f197a9e..49e0a24ad0c 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5494.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5494.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5494",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-16T13:02:35.737",
"lastModified": "2024-11-21T01:57:34.970",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5494",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029037",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5494",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5495.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5495.json
index 9ed41a04e37..9aa580744f8 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5495.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5495.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5495",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-16T13:02:35.737",
"lastModified": "2024-11-21T01:57:35.083",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5495",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029038",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5495",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5496.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5496.json
index 55c77b1b716..513cf558693 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5496.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5496.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5496",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-16T13:02:35.753",
"lastModified": "2024-11-21T01:57:35.203",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5496",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029036",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5496",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5497.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5497.json
index fdb73011705..13321464aab 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5497.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5497.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5497",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-19T18:55:05.620",
"lastModified": "2024-11-21T01:57:35.320",
"vulnStatus": "Modified",
@@ -74,25 +74,25 @@
"references": [
{
"url": "http://osvdb.org/97525",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5497",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30913",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62517",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -100,7 +100,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029057",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -108,7 +108,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87280",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/97525",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5498.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5498.json
index 3cf69ee4f46..585ab9e6c62 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5498.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5498.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5498",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-27T20:55:04.377",
"lastModified": "2024-11-21T01:57:35.450",
"vulnStatus": "Modified",
@@ -74,25 +74,25 @@
"references": [
{
"url": "http://osvdb.org/97777",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5498",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30994",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62651",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -100,7 +100,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87462",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/97777",
diff --git a/CVE-2013/CVE-2013-54xx/CVE-2013-5499.json b/CVE-2013/CVE-2013-54xx/CVE-2013-5499.json
index e95daeb748b..3371ac12e59 100644
--- a/CVE-2013/CVE-2013-54xx/CVE-2013-5499.json
+++ b/CVE-2013/CVE-2013-54xx/CVE-2013-5499.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5499",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-10T10:55:06.567",
"lastModified": "2024-11-21T01:57:35.563",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5499",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5500.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5500.json
index 1440f62b922..b4b0ee2a67a 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5500.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5500.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5500",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-20T16:55:07.787",
"lastModified": "2024-11-21T01:57:35.673",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5500",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62575",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029064",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5500",
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5501.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5501.json
index 833836843fb..4298500a4d5 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5501.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5501.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5501",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-20T16:55:07.817",
"lastModified": "2024-11-21T01:57:35.797",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5501",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62574",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029064",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5501",
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5502.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5502.json
index 1fd005a7bae..3fd00268bda 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5502.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5502.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5502",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-23T10:18:59.207",
"lastModified": "2024-11-21T01:57:35.913",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/97532",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5502",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30934",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5503.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5503.json
index e23694cba41..d16461d26ee 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5503.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5503.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5503",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-02T22:55:23.633",
"lastModified": "2024-11-21T01:57:36.027",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131002-iosxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5504.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5504.json
index c08671a1713..4b0d1458c83 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5504.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5504.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5504",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-30T17:09:25.457",
"lastModified": "2024-11-21T01:57:36.137",
"vulnStatus": "Modified",
@@ -74,25 +74,25 @@
"references": [
{
"url": "http://osvdb.org/97877",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5504",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31007",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62694",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -100,7 +100,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029110",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -108,7 +108,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87531",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/97877",
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5505.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5505.json
index c9fb68af48e..2c1818bf5d6 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5505.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5505.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5505",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-09-30T17:09:25.473",
"lastModified": "2024-11-21T01:57:36.257",
"vulnStatus": "Modified",
@@ -74,40 +74,40 @@
"references": [
{
"url": "http://osvdb.org/97875",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/54626",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5505",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31008",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62693",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029111",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87530",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/97875",
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5506.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5506.json
index f2242984291..b15bddea1b5 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5506.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5506.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5506",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-13T10:20:04.223",
"lastModified": "2024-11-21T01:57:36.377",
"vulnStatus": "Modified",
@@ -429,7 +429,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5507.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5507.json
index 37ab32328ef..605f1518fe8 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5507.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5507.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5507",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-13T10:20:04.257",
"lastModified": "2024-11-21T01:57:36.500",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5507",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5508.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5508.json
index 9a4827add56..d4f498a402b 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5508.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5508.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5508",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-13T10:20:04.270",
"lastModified": "2024-11-21T01:57:36.610",
"vulnStatus": "Modified",
@@ -929,21 +929,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5508",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5509.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5509.json
index 032266ada5b..ed9050e1510 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5509.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5509.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5509",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-13T10:20:04.287",
"lastModified": "2024-11-21T01:57:36.760",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5509",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5510.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5510.json
index 63921f2d018..618b1976348 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5510.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5510.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5510",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-13T10:20:04.303",
"lastModified": "2024-11-21T01:57:36.887",
"vulnStatus": "Modified",
@@ -494,14 +494,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5510",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5511.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5511.json
index e39a662d219..f1c26b393bb 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5511.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5511.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5511",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-13T10:20:04.333",
"lastModified": "2024-11-21T01:57:37.017",
"vulnStatus": "Modified",
@@ -289,14 +289,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5511",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5512.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5512.json
index f6760818aef..2bc8009b247 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5512.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5512.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5512",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-13T10:20:04.350",
"lastModified": "2024-11-21T01:57:37.150",
"vulnStatus": "Modified",
@@ -234,14 +234,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5512",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5513.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5513.json
index 6140353ce07..57c582b07ee 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5513.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5513.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5513",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-13T10:20:04.367",
"lastModified": "2024-11-21T01:57:37.270",
"vulnStatus": "Modified",
@@ -224,14 +224,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5513",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5515.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5515.json
index d1557dcaaf7..3d8d29dc73d 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5515.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5515.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5515",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-13T10:20:04.380",
"lastModified": "2024-11-21T01:57:37.407",
"vulnStatus": "Modified",
@@ -269,14 +269,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5515",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5516.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5516.json
index 07bd6cad0bc..aa8664d8bf5 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5516.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5516.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5516",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-01T00:55:12.913",
"lastModified": "2024-11-21T01:57:37.540",
"vulnStatus": "Modified",
@@ -74,21 +74,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5516",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31028",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029109",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5516",
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5517.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5517.json
index cedde631cdc..6fb3af527bf 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5517.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5517.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5517",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-02T22:55:23.650",
"lastModified": "2024-11-21T01:57:37.653",
"vulnStatus": "Modified",
@@ -74,32 +74,32 @@
"references": [
{
"url": "http://osvdb.org/98019",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/54847",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5517",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31073",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62746",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/98019",
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5519.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5519.json
index d6e382b5535..d00535f4b57 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5519.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5519.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5519",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-03T11:04:43.540",
"lastModified": "2024-11-21T01:57:37.773",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/98083",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/55171",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5519",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31112",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/62787",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/98083",
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5521.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5521.json
index bbc176af8b5..d5e65d7281f 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5521.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5521.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5521",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-25T03:52:54.953",
"lastModified": "2024-11-21T01:57:37.903",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5521",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5522.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5522.json
index d9b755b4653..d1727846b5f 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5522.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5522.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5522",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-25T03:52:54.970",
"lastModified": "2024-11-21T01:57:38.030",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5522",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5523.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5523.json
index 9b0da2702a8..8086d7e54aa 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5523.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5523.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5523",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-10T10:55:06.583",
"lastModified": "2024-11-21T01:57:38.150",
"vulnStatus": "Modified",
@@ -85,29 +85,29 @@
"references": [
{
"url": "http://osvdb.org/98168",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/55207",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5523",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31161",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62869",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029157",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -123,7 +123,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87724",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/98168",
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5524.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5524.json
index 15ab0a85729..8bf929e4b64 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5524.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5524.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5524",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-10T10:55:06.617",
"lastModified": "2024-11-21T01:57:38.280",
"vulnStatus": "Modified",
@@ -85,29 +85,29 @@
"references": [
{
"url": "http://osvdb.org/98166",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/55067",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5524",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31159",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62870",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029155",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -123,7 +123,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87722",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/98166",
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5525.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5525.json
index 76b5e3e3dd9..1a2877bf0ce 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5525.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5525.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5525",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-10T10:55:06.677",
"lastModified": "2024-11-21T01:57:38.407",
"vulnStatus": "Modified",
@@ -85,29 +85,29 @@
"references": [
{
"url": "http://osvdb.org/98167",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/55098",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5525",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31160",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029156",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87723",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/98167",
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5526.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5526.json
index 9ef9648ac3b..857fc47a08f 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5526.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5526.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5526",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-10T10:55:06.723",
"lastModified": "2024-11-21T01:57:38.527",
"vulnStatus": "Modified",
@@ -79,22 +79,22 @@
"references": [
{
"url": "http://osvdb.org/98254",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/55231",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5526",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62905",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5527.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5527.json
index 888c06d662f..e2f59f0c830 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5527.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5527.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5527",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-10T10:55:06.770",
"lastModified": "2024-11-21T01:57:38.647",
"vulnStatus": "Modified",
@@ -79,18 +79,18 @@
"references": [
{
"url": "http://osvdb.org/98253",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5527",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62904",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -98,7 +98,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87762",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/98253",
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5528.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5528.json
index a43669a8ab2..78c9981d0c6 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5528.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5528.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5528",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-11T03:54:53.800",
"lastModified": "2024-11-21T01:57:38.763",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://osvdb.org/98336",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://packetstormsecurity.com/files/140071/Cisco-Unified-Communications-Manager-7-8-9-Directory-Traversal.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -90,14 +90,14 @@
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5528",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62960",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -105,7 +105,7 @@
},
{
"url": "https://www.exploit-db.com/exploits/40887/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5529.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5529.json
index 77dff250f72..dd73bba97b9 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5529.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5529.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5529",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-16T10:52:45.277",
"lastModified": "2024-11-21T01:57:38.880",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5529",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5530.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5530.json
index 6ca99972011..14a99beba6a 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5530.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5530.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5530",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-25T03:52:54.987",
"lastModified": "2024-11-21T01:57:38.983",
"vulnStatus": "Modified",
@@ -104,14 +104,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/952422",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5531.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5531.json
index b810c850e91..8b232b63212 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5531.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5531.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5531",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-25T03:52:55.017",
"lastModified": "2024-11-21T01:57:39.097",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5532.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5532.json
index 3be08b04963..35e2a257d75 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5532.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5532.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5532",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-11T03:54:53.817",
"lastModified": "2024-11-21T01:57:39.200",
"vulnStatus": "Modified",
@@ -91,22 +91,22 @@
"references": [
{
"url": "http://osvdb.org/98338",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/55275",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5532",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62944",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5533.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5533.json
index bb9d600e448..3c42f9f90de 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5533.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5533.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5533",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-11T03:54:53.830",
"lastModified": "2024-11-21T01:57:39.300",
"vulnStatus": "Modified",
@@ -91,18 +91,18 @@
"references": [
{
"url": "http://osvdb.org/98337",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5533",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/62943",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5534.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5534.json
index c345c021425..3be1bb36e4b 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5534.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5534.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5534",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-19T10:36:08.167",
"lastModified": "2024-11-21T01:57:39.413",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5534",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5535.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5535.json
index 74ae7c04688..08667c9d557 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5535.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5535.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5535",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-16T10:52:45.307",
"lastModified": "2024-11-21T01:57:39.517",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5535",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5536.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5536.json
index 5b49cf7393d..189e5398478 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5536.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5536.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5536",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-24T10:53:09.880",
"lastModified": "2024-11-21T01:57:39.620",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5536",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5537.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5537.json
index 9061ddb8849..7cf04d60570 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5537.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5537.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5537",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-24T10:53:09.897",
"lastModified": "2024-11-21T01:57:39.720",
"vulnStatus": "Modified",
@@ -104,7 +104,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5537",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5538.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5538.json
index 5c440c991bd..fb7d5579abd 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5538.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5538.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5538",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-16T10:52:45.340",
"lastModified": "2024-11-21T01:57:39.823",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5538",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5539.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5539.json
index 2a29f666c50..1b48db4b6aa 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5539.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5539.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5539",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-16T10:52:45.387",
"lastModified": "2024-11-21T01:57:39.937",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5539",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5540.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5540.json
index 92272dce625..6d17173d5bb 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5540.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5540.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5540",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-16T10:52:45.417",
"lastModified": "2024-11-21T01:57:40.047",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5540",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5541.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5541.json
index 9eadb3d0e25..a6ef99915ae 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5541.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5541.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5541",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-16T10:52:45.433",
"lastModified": "2024-11-21T01:57:40.157",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5541",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5542.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5542.json
index 6f9bfc45c71..d86fd3c762a 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5542.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5542.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5542",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-21T10:54:30.507",
"lastModified": "2024-11-21T01:57:40.270",
"vulnStatus": "Modified",
@@ -199,7 +199,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5543.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5543.json
index 12071026679..a7d0dacfce5 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5543.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5543.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5543",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-31T21:55:02.830",
"lastModified": "2024-11-21T01:57:40.387",
"vulnStatus": "Modified",
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131030-asr1000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5544.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5544.json
index 68c4d2dbd9d..6d8ee453cdc 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5544.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5544.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5544",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-22T11:17:15.500",
"lastModified": "2024-11-21T01:57:40.500",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5544",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5545.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5545.json
index 6259cc5b6d4..b57654dcda5 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5545.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5545.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5545",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-31T21:55:02.860",
"lastModified": "2024-11-21T01:57:40.607",
"vulnStatus": "Modified",
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131030-asr1000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5546.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5546.json
index 92697e6cac2..68a69878f87 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5546.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5546.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5546",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-31T21:55:02.877",
"lastModified": "2024-11-21T01:57:40.717",
"vulnStatus": "Modified",
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131030-asr1000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5547.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5547.json
index a951492890c..9cd8118b001 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5547.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5547.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5547",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-31T21:55:02.893",
"lastModified": "2024-11-21T01:57:40.837",
"vulnStatus": "Modified",
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131030-asr1000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5548.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5548.json
index 4f5d906da4d..76530fb70f6 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5548.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5548.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5548",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-01T02:55:04.997",
"lastModified": "2024-11-21T01:57:40.947",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5548",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5549.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5549.json
index 5a9496dc0ab..333992d1f29 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5549.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5549.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5549",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-25T03:52:55.033",
"lastModified": "2024-11-21T01:57:41.060",
"vulnStatus": "Modified",
@@ -149,7 +149,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-iosxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5550.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5550.json
index a0d94ebafb1..e958df1d6bc 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5550.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5550.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5550",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-10-22T11:17:15.513",
"lastModified": "2024-11-21T01:57:41.170",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5550",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5551.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5551.json
index bdb4044c2ef..87c5be5b125 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5551.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5551.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5551",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-01T02:55:05.010",
"lastModified": "2024-11-21T01:57:41.283",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5551",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5552.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5552.json
index ae9a12f3c32..5f765ad0953 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5552.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5552.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5552",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-13T15:55:03.767",
"lastModified": "2024-11-21T01:57:41.387",
"vulnStatus": "Modified",
@@ -207,14 +207,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5552",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31715",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5553.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5553.json
index df6ec7ebbc5..5145af61de3 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5553.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5553.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5553",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-08T04:47:23.010",
"lastModified": "2024-11-21T01:57:41.513",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131106-sip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5554.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5554.json
index 537ab4607ed..c8486ae59a7 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5554.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5554.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5554",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-08T04:47:23.027",
"lastModified": "2024-11-21T01:57:41.617",
"vulnStatus": "Modified",
@@ -120,7 +120,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131106-waasm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5555.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5555.json
index 48f5561ce7c..69eb4e79c6e 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5555.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5555.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5555",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-01T02:55:05.027",
"lastModified": "2024-11-21T01:57:41.730",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5555",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5556.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5556.json
index 8cb1adbf3ce..9f2983cdd1b 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5556.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5556.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5556",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-18T03:55:06.040",
"lastModified": "2024-11-21T01:57:41.837",
"vulnStatus": "Modified",
@@ -135,14 +135,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5556",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31774",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5557.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5557.json
index febbd8ec85c..e80dd9bf885 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5557.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5557.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5557",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-07T04:59:00.047",
"lastModified": "2024-11-21T01:57:41.953",
"vulnStatus": "Modified",
@@ -75,7 +75,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5557",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Vendor Advisory"
@@ -83,14 +83,14 @@
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37383",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72529",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -98,7 +98,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100694",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5558.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5558.json
index 49ae70330b7..d1a741a167f 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5558.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5558.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5558",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-08T04:47:23.040",
"lastModified": "2024-11-21T01:57:42.070",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131106-tvxca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5559.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5559.json
index b74ac9989be..fba6aec4603 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5559.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5559.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5559",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-04T16:55:05.140",
"lastModified": "2024-11-21T01:57:42.177",
"vulnStatus": "Modified",
@@ -284,7 +284,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5559",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5560.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5560.json
index 084023f3513..deedad4dc5a 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5560.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5560.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5560",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-13T15:55:03.783",
"lastModified": "2024-11-21T01:57:42.330",
"vulnStatus": "Modified",
@@ -660,14 +660,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5560",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31716",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5561.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5561.json
index 9f525d6361e..80a8685ab18 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5561.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5561.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5561",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-04T16:55:05.170",
"lastModified": "2024-11-21T01:57:42.470",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5561",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5562.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5562.json
index d21f9f4f331..453299521ab 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5562.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5562.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5562",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-06T15:55:06.750",
"lastModified": "2024-11-21T01:57:42.570",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5562",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5563.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5563.json
index e71c04e2541..b4c4587d92b 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5563.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5563.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5563",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-06T15:55:06.827",
"lastModified": "2024-11-21T01:57:42.673",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-11/0016.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://research.smartnetsecurity.net/advisory/-smt-sa-2013-02-cisco-mars-cross-site-scripting-vulnerability",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5564.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5564.json
index 5d1ed8fd7ee..6c3d81fabb2 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5564.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5564.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5564",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-04T16:55:05.187",
"lastModified": "2024-11-21T01:57:42.783",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5564",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5565.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5565.json
index 57110391876..fbbc4e94ea7 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5565.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5565.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5565",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-08T04:47:23.057",
"lastModified": "2024-11-21T01:57:42.890",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5565",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31675",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5566.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5566.json
index b2a8470702d..93c511cfafe 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5566.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5566.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5566",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-08T04:47:23.073",
"lastModified": "2024-11-21T01:57:42.993",
"vulnStatus": "Modified",
@@ -272,14 +272,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5566",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31663",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5567.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5567.json
index a668bc7a348..daa1b90d981 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5567.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5567.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5567",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-14T21:55:05.377",
"lastModified": "2024-11-21T01:57:43.117",
"vulnStatus": "Modified",
@@ -75,7 +75,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5567",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Vendor Advisory"
@@ -83,14 +83,14 @@
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34911",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68504",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -98,7 +98,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030555",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -107,7 +107,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94445",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5568.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5568.json
index a7174b8674b..02f7ec65624 100644
--- a/CVE-2013/CVE-2013-55xx/CVE-2013-5568.json
+++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5568.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-5568",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-13T15:55:03.813",
"lastModified": "2024-11-21T01:57:43.267",
"vulnStatus": "Modified",
@@ -640,14 +640,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5568",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31693",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6682.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6682.json
index f43c891992e..6f1a757627e 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6682.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6682.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6682",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-13T15:55:04.440",
"lastModified": "2024-11-21T01:59:32.733",
"vulnStatus": "Modified",
@@ -640,14 +640,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6682",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31692",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6683.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6683.json
index eca71ebabb0..76f31853358 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6683.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6683.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6683",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-13T15:55:04.487",
"lastModified": "2024-11-21T01:59:32.867",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6683",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6684.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6684.json
index a412a3375be..c7a9bed9519 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6684.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6684.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6684",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-13T15:55:04.517",
"lastModified": "2024-11-21T01:59:32.983",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6684",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6685.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6685.json
index 508bec67b89..a53b3e812ee 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6685.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6685.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6685",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-13T15:55:04.550",
"lastModified": "2024-11-21T01:59:33.093",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6685",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6686.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6686.json
index 26ae8727e39..99a3c704cb5 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6686.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6686.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6686",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-18T03:55:06.070",
"lastModified": "2024-11-21T01:59:33.207",
"vulnStatus": "Modified",
@@ -95,14 +95,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6686",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31757",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6687.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6687.json
index b6374134907..dd33ac94110 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6687.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6687.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6687",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-16T19:55:04.560",
"lastModified": "2024-11-21T01:59:33.317",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6687",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6688.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6688.json
index 930513126d7..cfe3f40a3f9 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6688.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6688.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6688",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-18T03:55:06.103",
"lastModified": "2024-11-21T01:59:33.433",
"vulnStatus": "Modified",
@@ -635,14 +635,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6688",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31759",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6689.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6689.json
index 1a0ec2ca2a9..65d7473bac3 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6689.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6689.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6689",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-18T03:55:06.133",
"lastModified": "2024-11-21T01:59:33.560",
"vulnStatus": "Modified",
@@ -635,14 +635,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6689",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31758",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6690.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6690.json
index 57e0fdcabbf..0fa8fa466c2 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6690.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6690.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6690",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-03T19:56:32.203",
"lastModified": "2024-11-21T01:59:33.683",
"vulnStatus": "Modified",
@@ -74,25 +74,25 @@
"references": [
{
"url": "http://secunia.com/advisories/55954",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6690",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31998",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029425",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6691.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6691.json
index d62192337bf..f69e0904d93 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6691.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6691.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6691",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-14T21:55:05.437",
"lastModified": "2024-11-21T01:59:33.793",
"vulnStatus": "Modified",
@@ -75,7 +75,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6691",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Vendor Advisory"
@@ -83,14 +83,14 @@
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34921",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68517",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -98,7 +98,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030565",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -107,7 +107,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94459",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6692.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6692.json
index af507a66f75..6f90eca3c3f 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6692.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6692.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6692",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-22T01:55:04.043",
"lastModified": "2024-11-21T01:59:33.900",
"vulnStatus": "Modified",
@@ -105,14 +105,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6692",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31860",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6693.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6693.json
index ba6b8597dbe..49c29682e52 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6693.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6693.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6693",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-22T01:55:04.073",
"lastModified": "2024-11-21T01:59:34.007",
"vulnStatus": "Modified",
@@ -97,14 +97,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6693",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31861",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6694.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6694.json
index 1e429c1484f..0fde969f1c1 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6694.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6694.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6694",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-22T19:55:09.890",
"lastModified": "2024-11-21T01:59:34.117",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6694",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6695.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6695.json
index d51411466ef..9341c4d0d72 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6695.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6695.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6695",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-02T22:55:24.430",
"lastModified": "2024-11-21T01:59:34.220",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6695",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6696.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6696.json
index cf69dffeeaa..d17cc521d16 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6696.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6696.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6696",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-02T22:55:36.443",
"lastModified": "2024-11-21T01:59:34.337",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6696",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6698.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6698.json
index 5436bb73010..74e8c7d020e 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6698.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6698.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6698",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-22T19:55:09.907",
"lastModified": "2024-11-21T01:59:34.443",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6698",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6699.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6699.json
index 01edc33acfd..b1d354a6f37 100644
--- a/CVE-2013/CVE-2013-66xx/CVE-2013-6699.json
+++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6699.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6699",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-22T19:55:09.920",
"lastModified": "2024-11-21T01:59:34.550",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6699",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-67xx/CVE-2013-6700.json b/CVE-2013/CVE-2013-67xx/CVE-2013-6700.json
index 8ee626dd744..e2bee025d60 100644
--- a/CVE-2013/CVE-2013-67xx/CVE-2013-6700.json
+++ b/CVE-2013/CVE-2013-67xx/CVE-2013-6700.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6700",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-29T04:33:29.107",
"lastModified": "2024-11-21T01:59:34.660",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6700",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2013/CVE-2013-67xx/CVE-2013-6701.json b/CVE-2013/CVE-2013-67xx/CVE-2013-6701.json
index aa3fce892b6..820219fb90a 100644
--- a/CVE-2013/CVE-2013-67xx/CVE-2013-6701.json
+++ b/CVE-2013/CVE-2013-67xx/CVE-2013-6701.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6701",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-18T16:04:34.350",
"lastModified": "2024-11-21T01:59:34.770",
"vulnStatus": "Modified",
@@ -151,21 +151,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6701",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32200",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029512",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-67xx/CVE-2013-6702.json b/CVE-2013/CVE-2013-67xx/CVE-2013-6702.json
index de5ff0f5e9e..022d4290811 100644
--- a/CVE-2013/CVE-2013-67xx/CVE-2013-6702.json
+++ b/CVE-2013/CVE-2013-67xx/CVE-2013-6702.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6702",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-04T18:56:56.617",
"lastModified": "2024-11-21T01:59:34.880",
"vulnStatus": "Modified",
@@ -87,21 +87,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6702",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31999",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029421",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-67xx/CVE-2013-6703.json b/CVE-2013/CVE-2013-67xx/CVE-2013-6703.json
index 9f95411396d..81e7b9878c2 100644
--- a/CVE-2013/CVE-2013-67xx/CVE-2013-6703.json
+++ b/CVE-2013/CVE-2013-67xx/CVE-2013-6703.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6703",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-03T19:56:32.280",
"lastModified": "2024-11-21T01:59:34.987",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6703",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029422",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-67xx/CVE-2013-6704.json b/CVE-2013/CVE-2013-67xx/CVE-2013-6704.json
index 2c8dce35fcc..17d53d3f1f5 100644
--- a/CVE-2013/CVE-2013-67xx/CVE-2013-6704.json
+++ b/CVE-2013/CVE-2013-67xx/CVE-2013-6704.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6704",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-03T19:56:32.327",
"lastModified": "2024-11-21T01:59:35.103",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6704",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029424",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-67xx/CVE-2013-6705.json b/CVE-2013/CVE-2013-67xx/CVE-2013-6705.json
index 4723fcb6514..3224303d680 100644
--- a/CVE-2013/CVE-2013-67xx/CVE-2013-6705.json
+++ b/CVE-2013/CVE-2013-67xx/CVE-2013-6705.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6705",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-03T19:56:32.390",
"lastModified": "2024-11-21T01:59:35.210",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6705",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029423",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-67xx/CVE-2013-6706.json b/CVE-2013/CVE-2013-67xx/CVE-2013-6706.json
index 92b989a1eea..cfb3a309198 100644
--- a/CVE-2013/CVE-2013-67xx/CVE-2013-6706.json
+++ b/CVE-2013/CVE-2013-67xx/CVE-2013-6706.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6706",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-11-29T04:33:29.137",
"lastModified": "2024-11-21T01:59:35.327",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/100394",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/55817",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6706",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31950",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/63979",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029407",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-67xx/CVE-2013-6707.json b/CVE-2013/CVE-2013-67xx/CVE-2013-6707.json
index 3935f0088ea..85f2d0fc093 100644
--- a/CVE-2013/CVE-2013-67xx/CVE-2013-6707.json
+++ b/CVE-2013/CVE-2013-67xx/CVE-2013-6707.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6707",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-07T05:33:32.333",
"lastModified": "2024-11-21T01:59:35.443",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://osvdb.org/100682",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6707",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Vendor Advisory"
@@ -90,14 +90,14 @@
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32065",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64148",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -105,7 +105,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029441",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -114,7 +114,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89442",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-67xx/CVE-2013-6708.json b/CVE-2013/CVE-2013-67xx/CVE-2013-6708.json
index 6fc437cd9f6..336c74f1e22 100644
--- a/CVE-2013/CVE-2013-67xx/CVE-2013-6708.json
+++ b/CVE-2013/CVE-2013-67xx/CVE-2013-6708.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6708",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-10T06:14:55.337",
"lastModified": "2024-11-21T01:59:35.560",
"vulnStatus": "Modified",
@@ -74,25 +74,25 @@
"references": [
{
"url": "http://osvdb.org/100730",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6708",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32094",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64163",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -100,14 +100,14 @@
},
{
"url": "http://www.securitytracker.com/id/1029450",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89492",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/100730",
diff --git a/CVE-2013/CVE-2013-67xx/CVE-2013-6709.json b/CVE-2013/CVE-2013-67xx/CVE-2013-6709.json
index 67a6a468bf9..d1361248181 100644
--- a/CVE-2013/CVE-2013-67xx/CVE-2013-6709.json
+++ b/CVE-2013/CVE-2013-67xx/CVE-2013-6709.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6709",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:03.597",
"lastModified": "2024-11-21T01:59:35.670",
"vulnStatus": "Modified",
@@ -74,21 +74,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6709",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32153",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029492",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-67xx/CVE-2013-6710.json b/CVE-2013/CVE-2013-67xx/CVE-2013-6710.json
index 9abab76230f..a1f88547496 100644
--- a/CVE-2013/CVE-2013-67xx/CVE-2013-6710.json
+++ b/CVE-2013/CVE-2013-67xx/CVE-2013-6710.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6710",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.207",
"lastModified": "2024-11-21T01:59:35.780",
"vulnStatus": "Modified",
@@ -74,21 +74,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6710",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32154",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029492",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-67xx/CVE-2013-6711.json b/CVE-2013/CVE-2013-67xx/CVE-2013-6711.json
index a977dce4834..d0c8aa8c699 100644
--- a/CVE-2013/CVE-2013-67xx/CVE-2013-6711.json
+++ b/CVE-2013/CVE-2013-67xx/CVE-2013-6711.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6711",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.223",
"lastModified": "2024-11-21T01:59:35.890",
"vulnStatus": "Modified",
@@ -74,21 +74,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6711",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32156",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029493",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6959.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6959.json
index 90d704199af..34f1cdb8fb0 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6959.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6959.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6959",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.253",
"lastModified": "2024-11-21T02:00:03.570",
"vulnStatus": "Modified",
@@ -74,25 +74,25 @@
"references": [
{
"url": "http://osvdb.org/100901",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6959",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32155",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029493",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -100,7 +100,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89698",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/100901",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6960.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6960.json
index 403b26ac03f..03dbdc6b371 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6960.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6960.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6960",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.287",
"lastModified": "2024-11-21T02:00:03.727",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://osvdb.org/100904",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6960",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32152",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64273",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029494",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89693",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/100904",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6961.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6961.json
index 568baebf574..2fb60a07104 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6961.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6961.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6961",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.300",
"lastModified": "2024-11-21T02:00:03.863",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://osvdb.org/100905",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6961",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64288",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029494",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89696",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/100905",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6962.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6962.json
index 47cef38f7eb..43c73524644 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6962.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6962.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6962",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.333",
"lastModified": "2024-11-21T02:00:03.983",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://osvdb.org/100906",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6962",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64275",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029494",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89694",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/100906",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6963.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6963.json
index 5189aef20a9..00ae5cfabbe 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6963.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6963.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6963",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.363",
"lastModified": "2024-11-21T02:00:04.100",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://osvdb.org/100907",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6963",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64277",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029492",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -97,7 +97,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89695",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/100907",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6964.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6964.json
index bf009725792..7d2748fe712 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6964.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6964.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6964",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.397",
"lastModified": "2024-11-21T02:00:04.230",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://osvdb.org/100908",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6964",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32158",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64280",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029494",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89690",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/100908",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6965.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6965.json
index 9d026fd04b7..af52b4b063c 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6965.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6965.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6965",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.410",
"lastModified": "2024-11-21T02:00:04.350",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/100911",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6965",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32157",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64281",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029492",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89691",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/100911",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6966.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6966.json
index d93d618dc9d..b3638238405 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6966.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6966.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6966",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-17T04:46:45.957",
"lastModified": "2024-11-21T02:00:04.470",
"vulnStatus": "Modified",
@@ -74,25 +74,25 @@
"references": [
{
"url": "http://osvdb.org/100909",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6966",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32149",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029492",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -100,7 +100,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89686",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/100909",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6967.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6967.json
index 5c9420af427..1c405de25bf 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6967.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6967.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6967",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.443",
"lastModified": "2024-11-21T02:00:04.593",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/100912",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6967",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029493",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -93,7 +93,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89685",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/100912",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6968.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6968.json
index 69f1f611a6c..ffa950f3953 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6968.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6968.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6968",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.473",
"lastModified": "2024-11-21T02:00:04.727",
"vulnStatus": "Modified",
@@ -74,25 +74,25 @@
"references": [
{
"url": "http://osvdb.org/100913",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6968",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32147",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029492",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -100,7 +100,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89688",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/100913",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6969.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6969.json
index bd58cabde71..7541179f1c8 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6969.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6969.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6969",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.503",
"lastModified": "2024-11-21T02:00:04.840",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://osvdb.org/101003",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6969",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64305",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89684",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101003",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6970.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6970.json
index ee54ae7cbf8..9808f8aaf82 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6970.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6970.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6970",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.520",
"lastModified": "2024-11-21T02:00:04.957",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://osvdb.org/101002",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6970",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64306",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89708",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101002",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6971.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6971.json
index 0e333c6252c..a38fde48088 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6971.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6971.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6971",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.550",
"lastModified": "2024-11-21T02:00:05.070",
"vulnStatus": "Modified",
@@ -74,25 +74,25 @@
"references": [
{
"url": "http://osvdb.org/100910",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6971",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32146",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029492",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -100,7 +100,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89653",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/100910",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6972.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6972.json
index 878c5ccbac6..c262fdba1f2 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6972.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6972.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6972",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.567",
"lastModified": "2024-11-21T02:00:05.187",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/100914",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6972",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32145",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64282",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029492",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89652",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/100914",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6973.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6973.json
index 7aeea8f1419..4777ff8a232 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6973.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6973.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6973",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-14T22:55:14.597",
"lastModified": "2024-11-21T02:00:05.313",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/100915",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6973",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32144",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64286",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029492",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89651",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/100915",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6974.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6974.json
index a23a5d6c56c..c6ca3f86281 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6974.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6974.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6974",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-10T12:02:51.670",
"lastModified": "2024-11-21T02:00:05.430",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://osvdb.org/101894",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56353",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6974",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64752",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -97,7 +97,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029594",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6975.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6975.json
index 35b9055e679..937856a9205 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6975.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6975.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6975",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-20T11:13:37.327",
"lastModified": "2024-11-21T02:00:05.550",
"vulnStatus": "Modified",
@@ -110,21 +110,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6975",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34260",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67426",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6975",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6976.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6976.json
index ac40e98f881..59efc200386 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6976.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6976.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6976",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-19T22:55:04.540",
"lastModified": "2024-11-21T02:00:05.677",
"vulnStatus": "Modified",
@@ -74,11 +74,11 @@
"references": [
{
"url": "http://osvdb.org/101097",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://packetstormsecurity.com/files/124449/Cisco-EPC3925-Cross-Site-Request-Forgery.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -87,7 +87,7 @@
},
{
"url": "http://www.exploit-db.com/exploits/30362/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -96,14 +96,14 @@
},
{
"url": "http://www.nerdbox.it/cisco-epc3925-csrf-vulnerability/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/64341",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6978.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6978.json
index 40811f26bc7..19e7417832b 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6978.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6978.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6978",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-21T14:22:57.190",
"lastModified": "2024-11-21T02:00:05.790",
"vulnStatus": "Modified",
@@ -635,25 +635,25 @@
"references": [
{
"url": "http://osvdb.org/101162",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6978",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32219",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64421",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -661,7 +661,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -669,7 +669,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89834",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101162",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6979.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6979.json
index e2af92322a7..7de4e0de067 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6979.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6979.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6979",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-23T22:55:03.177",
"lastModified": "2024-11-21T02:00:05.923",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/101351",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6979",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64502",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -93,7 +93,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029537",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -101,7 +101,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89901",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101351",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6981.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6981.json
index 94ee007fae8..867fe31ee45 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6981.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6981.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6981",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-28T04:53:06.740",
"lastModified": "2024-11-21T02:00:06.040",
"vulnStatus": "Modified",
@@ -215,29 +215,29 @@
"references": [
{
"url": "http://osvdb.org/101423",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56206",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6981",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32281",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64514",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -245,7 +245,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029538",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6982.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6982.json
index 661ba246982..65685018751 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6982.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6982.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6982",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-08T21:55:06.193",
"lastModified": "2024-11-21T02:00:06.167",
"vulnStatus": "Modified",
@@ -575,29 +575,29 @@
"references": [
{
"url": "http://osvdb.org/101713",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56169",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6982",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32325",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -605,7 +605,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029568",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -613,7 +613,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90119",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101713",
diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6983.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6983.json
index 13683c0be87..0819e1a71ee 100644
--- a/CVE-2013/CVE-2013-69xx/CVE-2013-6983.json
+++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6983.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-6983",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-31T15:16:44.643",
"lastModified": "2024-11-21T02:00:06.293",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://osvdb.org/101514",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56273",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6983",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64551",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -97,7 +97,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029547",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -105,7 +105,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90011",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101514",
diff --git a/CVE-2013/CVE-2013-71xx/CVE-2013-7136.json b/CVE-2013/CVE-2013-71xx/CVE-2013-7136.json
index 8a4b833d2e3..61b1c7574eb 100644
--- a/CVE-2013/CVE-2013-71xx/CVE-2013-7136.json
+++ b/CVE-2013/CVE-2013-71xx/CVE-2013-7136.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2013-7136",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2013-12-19T22:55:04.697",
"lastModified": "2024-11-21T02:00:24.003",
"vulnStatus": "Modified",
@@ -74,21 +74,21 @@
"references": [
{
"url": "http://www.exploit-db.com/exploits/30358/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://www.planitcomputing.ie/upc-wifi-attack.pdf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90133",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.exploit-db.com/exploits/30358/",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0648.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0648.json
index b3656b75c6f..b57359e064e 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0648.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0648.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0648",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-16T19:55:04.637",
"lastModified": "2024-11-21T02:02:34.990",
"vulnStatus": "Modified",
@@ -200,29 +200,29 @@
"references": [
{
"url": "http://osvdb.org/102117",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56213",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140115-csacs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32379",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64962",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -230,7 +230,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029634",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -238,7 +238,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90431",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102117",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0649.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0649.json
index 51baaf08b8d..fccaee8d372 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0649.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0649.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0649",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-16T19:55:04.670",
"lastModified": "2024-11-21T02:02:35.107",
"vulnStatus": "Modified",
@@ -200,29 +200,29 @@
"references": [
{
"url": "http://osvdb.org/102116",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56213",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140115-csacs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32378",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64958",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -230,7 +230,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029634",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -238,7 +238,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90430",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102116",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0650.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0650.json
index 6a85ced9d26..d59ef3a0250 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0650.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0650.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0650",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-16T19:55:04.700",
"lastModified": "2024-11-21T02:02:35.237",
"vulnStatus": "Modified",
@@ -180,29 +180,29 @@
"references": [
{
"url": "http://osvdb.org/102115",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56213",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140115-csacs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32380",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64964",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -210,7 +210,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029634",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -218,7 +218,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90432",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102115",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0651.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0651.json
index 4bc89b160a3..f9d911a95b9 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0651.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0651.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0651",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-08T21:55:06.223",
"lastModified": "2024-11-21T02:02:35.387",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/101809",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56365",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0651",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32364",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64706",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029573",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90166",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101809",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0652.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0652.json
index eba5d593e24..b069efb9033 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0652.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0652.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0652",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-08T21:55:06.240",
"lastModified": "2024-11-21T02:02:35.510",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/101803",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56365",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0652",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32365",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64703",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029572",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90167",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101803",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0653.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0653.json
index 68f70b3cda8..96f0671a7d0 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0653.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0653.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0653",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-08T21:55:06.270",
"lastModified": "2024-11-21T02:02:35.630",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/101834",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56366",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0653",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32363",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64708",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029570",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90165",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101834",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0654.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0654.json
index 5c334c28375..729de253e38 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0654.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0654.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0654",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-08T21:55:06.303",
"lastModified": "2024-11-21T02:02:35.747",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/101802",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56365",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0654",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32366",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64709",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029574",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90168",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101802",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0655.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0655.json
index b815ac5e8c0..eaf5e80c89d 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0655.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0655.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0655",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-08T21:55:06.333",
"lastModified": "2024-11-21T02:02:35.893",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/101838",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56366",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0655",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32362",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64700",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029575",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90164",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101838",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0656.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0656.json
index acfc96f34e6..04f66fec507 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0656.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0656.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0656",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-08T21:55:06.380",
"lastModified": "2024-11-21T02:02:36.017",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/101801",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0656",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64701",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -93,7 +93,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029569",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -101,7 +101,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90169",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101801",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0657.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0657.json
index aba7904871f..8a1835b642e 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0657.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0657.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0657",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-08T21:55:06.410",
"lastModified": "2024-11-21T02:02:36.123",
"vulnStatus": "Modified",
@@ -635,29 +635,29 @@
"references": [
{
"url": "http://osvdb.org/101800",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56368",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0657",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32341",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64690",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -665,7 +665,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029571",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -673,7 +673,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90120",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101800",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0658.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0658.json
index eac24f3c670..6d34af2d5d2 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0658.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0658.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0658",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-10T16:47:06.037",
"lastModified": "2024-11-21T02:02:36.270",
"vulnStatus": "Modified",
@@ -91,29 +91,29 @@
"references": [
{
"url": "http://osvdb.org/101913",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56384",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0658",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32402",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64770",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -121,7 +121,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029596",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90236",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101913",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0659.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0659.json
index fd9694838ae..0ab5e3908d6 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0659.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0659.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0659",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-12T18:34:55.957",
"lastModified": "2024-11-21T02:02:36.400",
"vulnStatus": "Modified",
@@ -192,25 +192,25 @@
"references": [
{
"url": "http://secunia.com/advisories/56292",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140110-sbd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32381",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64776",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -218,7 +218,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029579",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -226,7 +226,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029580",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -234,11 +234,11 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90233",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://github.com/elvanderb/TCP-32764",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Patch"
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0660.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0660.json
index baf81f3534d..37705ef7cb3 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0660.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0660.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0660",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-22T21:55:02.823",
"lastModified": "2024-11-21T02:02:36.537",
"vulnStatus": "Modified",
@@ -90,29 +90,29 @@
"references": [
{
"url": "http://osvdb.org/102361",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56591",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-isdngw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32460",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65072",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -120,7 +120,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029657",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -128,7 +128,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90622",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102361",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0661.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0661.json
index 4db4533b269..8e621a08a03 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0661.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0661.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0661",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-22T21:55:03.560",
"lastModified": "2024-11-21T02:02:36.660",
"vulnStatus": "Modified",
@@ -290,22 +290,22 @@
"references": [
{
"url": "http://osvdb.org/102362",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56533",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65071",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -313,7 +313,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029656",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -321,7 +321,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102362",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0662.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0662.json
index 5b3a15c7024..e097af18c57 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0662.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0662.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0662",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-22T21:55:03.573",
"lastModified": "2024-11-21T02:02:36.797",
"vulnStatus": "Modified",
@@ -120,35 +120,35 @@
"references": [
{
"url": "http://osvdb.org/102363",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/56592",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=32409",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65076",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -156,7 +156,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029655",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -164,7 +164,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90621",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102363",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0663.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0663.json
index 704d5b782c7..354daa9b418 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0663.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0663.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0663",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-10T16:47:06.067",
"lastModified": "2024-11-21T02:02:36.917",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/101914",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56382",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0663",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32403",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64773",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029595",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90232",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101914",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0664.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0664.json
index 434870c6e55..c3d06064518 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0664.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0664.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0664",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-10T16:47:06.083",
"lastModified": "2024-11-21T02:02:37.043",
"vulnStatus": "Modified",
@@ -74,28 +74,28 @@
"references": [
{
"url": "http://osvdb.org/101915",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/56370",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0664",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64772",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -103,7 +103,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029593",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -111,7 +111,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90234",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/101915",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0665.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0665.json
index 45bf3cadf89..b304d4ed741 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0665.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0665.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0665",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-15T16:11:08.457",
"lastModified": "2024-11-21T02:02:37.190",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/102118",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56439",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0665",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32448",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64939",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029624",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90463",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102118",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0666.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0666.json
index 7719f57916e..c12ee9cff93 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0666.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0666.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0666",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-16T19:55:04.730",
"lastModified": "2024-11-21T02:02:37.310",
"vulnStatus": "Modified",
@@ -155,29 +155,29 @@
"references": [
{
"url": "http://osvdb.org/102122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56331",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0666",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32451",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64965",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -185,7 +185,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029635",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -193,7 +193,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90435",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102122",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0667.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0667.json
index 81025373025..8d630474e5b 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0667.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0667.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0667",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-16T19:55:04.763",
"lastModified": "2024-11-21T02:02:37.440",
"vulnStatus": "Modified",
@@ -74,25 +74,25 @@
"references": [
{
"url": "http://osvdb.org/102168",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0667",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32468",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/64983",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -100,7 +100,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029641",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -108,7 +108,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90497",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102168",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0668.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0668.json
index 4fbf8a75e0d..889324139ce 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0668.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0668.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0668",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-20T04:58:49.807",
"lastModified": "2024-11-21T02:02:37.557",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/102256",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56543",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0668",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32489",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65016",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029654",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90561",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102256",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0669.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0669.json
index 4977a635548..536bda33ba2 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0669.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0669.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0669",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-22T05:22:20.720",
"lastModified": "2024-11-21T02:02:37.680",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/102318",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56546",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0669",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32513",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65052",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029666",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90614",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102318",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0670.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0670.json
index 174a16b27d2..fb86ea86829 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0670.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0670.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0670",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-22T05:22:20.737",
"lastModified": "2024-11-21T02:02:37.800",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/102319",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56563",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32514",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65053",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029667",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90615",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102319",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0671.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0671.json
index d25f891af29..1dffa7f1163 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0671.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0671.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0671",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-22T05:22:20.767",
"lastModified": "2024-11-21T02:02:37.920",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/102341",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56544",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0671",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32517",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65055",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029669",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90617",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102341",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0672.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0672.json
index ed167c73b18..bf0b3356cb6 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0672.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0672.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0672",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-22T05:22:20.783",
"lastModified": "2024-11-21T02:02:38.030",
"vulnStatus": "Modified",
@@ -74,35 +74,35 @@
"references": [
{
"url": "http://osvdb.org/102342",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/56600",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0672",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32516",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65054",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -110,7 +110,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029668",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -118,7 +118,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90616",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102342",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0673.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0673.json
index 548fcc52ac3..3e88d7fb6e6 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0673.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0673.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0673",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-25T22:55:03.300",
"lastModified": "2024-11-21T02:02:38.143",
"vulnStatus": "Modified",
@@ -79,35 +79,35 @@
"references": [
{
"url": "http://osvdb.org/102557",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/56552",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0673",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32568",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65145",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029689",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -123,7 +123,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90733",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102557",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0674.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0674.json
index f1cdb1e817f..48877b03827 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0674.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0674.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0674",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-24T04:38:09.667",
"lastModified": "2024-11-21T02:02:38.263",
"vulnStatus": "Modified",
@@ -74,34 +74,34 @@
"references": [
{
"url": "http://osvdb.org/102409",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56619",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0674",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65111",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029692",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.ubuntu.com/usn/USN-2739-1",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90651",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102409",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0675.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0675.json
index d88c45f247a..4cd918615b1 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0675.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0675.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0675",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-23T04:41:16.097",
"lastModified": "2024-11-21T02:02:38.380",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/102377",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56621",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0675",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32540",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65101",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029682",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90650",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102377",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0676.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0676.json
index 2581cc77d44..ba73591e49d 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0676.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0676.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0676",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-22T21:55:03.607",
"lastModified": "2024-11-21T02:02:38.493",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/102366",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56597",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0676",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32531",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65083",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029690",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90627",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102366",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0677.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0677.json
index 711ac9cb801..1001b571a75 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0677.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0677.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0677",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-22T21:55:03.637",
"lastModified": "2024-11-21T02:02:38.600",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/102368",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56611",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0677",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32532",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65074",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029691",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90623",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102368",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0678.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0678.json
index 5d146721ceb..eeb8d867761 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0678.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0678.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0678",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-25T22:55:03.567",
"lastModified": "2024-11-21T02:02:38.710",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://osvdb.org/102558",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56540",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0678",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32567",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65144",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029688",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90732",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102558",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0679.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0679.json
index ee8cef95c94..79286abeb1c 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0679.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0679.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0679",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-27T20:55:05.130",
"lastModified": "2024-11-21T02:02:38.827",
"vulnStatus": "Modified",
@@ -99,7 +99,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140226-pi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0680.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0680.json
index 5209f10e744..b546554aa40 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0680.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0680.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0680",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-29T18:34:05.310",
"lastModified": "2024-11-21T02:02:38.933",
"vulnStatus": "Modified",
@@ -74,30 +74,30 @@
"references": [
{
"url": "http://osvdb.org/102588",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56672",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0680",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32617",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/65227",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029701",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102588",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0681.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0681.json
index 322bdcf514a..4887275e946 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0681.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0681.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0681",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-29T18:34:05.340",
"lastModified": "2024-11-21T02:02:39.053",
"vulnStatus": "Modified",
@@ -75,35 +75,35 @@
"references": [
{
"url": "http://osvdb.org/102589",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/56714",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0681",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32609",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65183",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -111,7 +111,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029699",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102589",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0682.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0682.json
index 1d6aed9c8aa..7f81a55b9bf 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0682.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0682.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0682",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-01-29T18:34:05.373",
"lastModified": "2024-11-21T02:02:39.163",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://osvdb.org/102590",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56668",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0682",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32618",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/65198",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -101,7 +101,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029700",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102590",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0683.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0683.json
index e9c615ebe05..0d9e016da9b 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0683.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0683.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0683",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-06T11:55:05.287",
"lastModified": "2024-11-21T02:02:39.287",
"vulnStatus": "Modified",
@@ -143,7 +143,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-rpd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -151,7 +151,7 @@
},
{
"url": "https://www.exploit-db.com/exploits/45986/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-rpd",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0684.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0684.json
index b91e04c6b2a..ad916a3639a 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0684.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0684.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0684",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-07T10:55:04.603",
"lastModified": "2024-11-21T02:02:39.407",
"vulnStatus": "Modified",
@@ -101,14 +101,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0684",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34131",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0685.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0685.json
index 5011f5ea873..9d270f34b39 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0685.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0685.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0685",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-07T10:55:04.727",
"lastModified": "2024-11-21T02:02:39.520",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0685",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34130",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0686.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0686.json
index 9b3e55185fd..10aca278269 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0686.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0686.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0686",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-04T05:39:08.480",
"lastModified": "2024-11-21T02:02:39.650",
"vulnStatus": "Modified",
@@ -85,33 +85,33 @@
"references": [
{
"url": "http://osvdb.org/102750",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/56818",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0686",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32683",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65281",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90852",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/102750",
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0691.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0691.json
index 4518b63832a..858c4381012 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0691.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0691.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0691",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-24T14:29:00.207",
"lastModified": "2024-11-21T02:02:39.777",
"vulnStatus": "Modified",
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://www.cisco.com/c/en/us/td/docs/collaboration/CWMS/1_1/b_Release_Notes.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
diff --git a/CVE-2014/CVE-2014-06xx/CVE-2014-0694.json b/CVE-2014/CVE-2014-06xx/CVE-2014-0694.json
index b1ad2987730..2eb4bf7de2b 100644
--- a/CVE-2014/CVE-2014-06xx/CVE-2014-0694.json
+++ b/CVE-2014/CVE-2014-06xx/CVE-2014-0694.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0694",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-14T10:55:05.723",
"lastModified": "2024-11-21T02:02:39.877",
"vulnStatus": "Modified",
@@ -110,11 +110,11 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0694",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33336",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0694",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0701.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0701.json
index 6ca9d146bba..a1cd32b3de7 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0701.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0701.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0701",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-06T11:55:05.317",
"lastModified": "2024-11-21T02:02:39.977",
"vulnStatus": "Modified",
@@ -132,7 +132,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0703.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0703.json
index e0b1d3a30c4..dcec62c2d3f 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0703.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0703.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0703",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-06T11:55:05.333",
"lastModified": "2024-11-21T02:02:40.100",
"vulnStatus": "Modified",
@@ -91,7 +91,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0704.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0704.json
index 95913b1bcee..258813e80eb 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0704.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0704.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0704",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-06T11:55:05.367",
"lastModified": "2024-11-21T02:02:40.210",
"vulnStatus": "Modified",
@@ -346,7 +346,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0705.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0705.json
index f4676392afd..e4d8f1abf91 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0705.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0705.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0705",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-06T11:55:05.380",
"lastModified": "2024-11-21T02:02:40.327",
"vulnStatus": "Modified",
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0706.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0706.json
index 5d376833c3c..b3b1c459732 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0706.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0706.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0706",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-06T11:55:05.413",
"lastModified": "2024-11-21T02:02:40.437",
"vulnStatus": "Modified",
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0707.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0707.json
index ad5977c909e..1747d85f34e 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0707.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0707.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0707",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-06T11:55:05.427",
"lastModified": "2024-11-21T02:02:40.543",
"vulnStatus": "Modified",
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0708.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0708.json
index c08a0ecf820..5003cf9d12a 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0708.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0708.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0708",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-21T01:04:02.903",
"lastModified": "2024-11-21T02:02:40.647",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0708",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0709.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0709.json
index 8b5990f59f5..d1432a4d3c4 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0709.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0709.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0709",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-22T21:55:09.500",
"lastModified": "2024-11-21T02:02:40.747",
"vulnStatus": "Modified",
@@ -85,7 +85,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-ucsd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0710.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0710.json
index 111e3e8ecf8..ac94ae13998 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0710.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0710.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0710",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-22T21:55:09.530",
"lastModified": "2024-11-21T02:02:40.843",
"vulnStatus": "Modified",
@@ -474,7 +474,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-fwsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0718.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0718.json
index cf7869962b9..302abf727f0 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0718.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0718.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0718",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-22T21:55:09.547",
"lastModified": "2024-11-21T02:02:40.963",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-ips",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0719.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0719.json
index 40d16f2e73f..320ee11ab61 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0719.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0719.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0719",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-22T21:55:09.577",
"lastModified": "2024-11-21T02:02:41.073",
"vulnStatus": "Modified",
@@ -110,7 +110,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-ips",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0720.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0720.json
index fb864ed5ce5..37ec167ec8a 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0720.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0720.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0720",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-22T21:55:09.593",
"lastModified": "2024-11-21T02:02:41.177",
"vulnStatus": "Modified",
@@ -110,7 +110,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-ips",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0721.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0721.json
index 4dc696850da..24be36653a2 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0721.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0721.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0721",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-22T21:55:09.627",
"lastModified": "2024-11-21T02:02:41.280",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-phone",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0722.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0722.json
index ff4ab1f37da..ea35b74b520 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0722.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0722.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0722",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-13T05:24:51.450",
"lastModified": "2024-11-21T02:02:41.383",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0722",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0723.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0723.json
index 11c1d13fa0a..d3e04b0c425 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0723.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0723.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0723",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-13T05:24:51.497",
"lastModified": "2024-11-21T02:02:41.483",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://osvdb.org/103222",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0723",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65495",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029756",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/103222",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0724.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0724.json
index 71bce55d382..b96cb2931ce 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0724.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0724.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0724",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-13T05:24:51.527",
"lastModified": "2024-11-21T02:02:41.593",
"vulnStatus": "Modified",
@@ -80,14 +80,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0724",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32825",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0725.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0725.json
index ff72a5d0e4b..bfd53adf796 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0725.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0725.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0725",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-13T05:24:51.557",
"lastModified": "2024-11-21T02:02:41.707",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0725",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0726.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0726.json
index 27585fcd9ee..51a9d501fc8 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0726.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0726.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0726",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-13T05:24:51.573",
"lastModified": "2024-11-21T02:02:41.810",
"vulnStatus": "Modified",
@@ -80,25 +80,25 @@
"references": [
{
"url": "http://osvdb.org/103218",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0726",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32843",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65514",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/103218",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0727.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0727.json
index 07f9c1caae9..584382fe0c4 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0727.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0727.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0727",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-13T05:24:51.607",
"lastModified": "2024-11-21T02:02:41.917",
"vulnStatus": "Modified",
@@ -74,25 +74,25 @@
"references": [
{
"url": "http://osvdb.org/103219",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0727",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32844",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65516",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/103219",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0728.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0728.json
index 2307c2f096c..54d635496e2 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0728.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0728.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0728",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-13T05:24:51.637",
"lastModified": "2024-11-21T02:02:42.027",
"vulnStatus": "Modified",
@@ -80,25 +80,25 @@
"references": [
{
"url": "http://osvdb.org/103221",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0728",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32834",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65499",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/103221",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0729.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0729.json
index c7515167eff..81f743d2dbe 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0729.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0729.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0729",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-13T05:24:51.667",
"lastModified": "2024-11-21T02:02:42.130",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://osvdb.org/103220",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0729",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65501",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://osvdb.org/103220",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0730.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0730.json
index 3157a707418..d52bddf83c3 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0730.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0730.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0730",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-22T21:55:09.640",
"lastModified": "2024-11-21T02:02:42.247",
"vulnStatus": "Modified",
@@ -80,14 +80,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0730",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32910",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0731.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0731.json
index cfde1381c11..0fcce7a8c33 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0731.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0731.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0731",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-22T21:55:09.670",
"lastModified": "2024-11-21T02:02:42.357",
"vulnStatus": "Modified",
@@ -160,14 +160,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0731",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32915",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0732.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0732.json
index a2b6ef6a046..bcd63e4e3f2 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0732.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0732.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0732",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-20T05:18:04.140",
"lastModified": "2024-11-21T02:02:42.473",
"vulnStatus": "Modified",
@@ -160,14 +160,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0732",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32913",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0733.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0733.json
index 7cc122b0e75..2ae001fa0ab 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0733.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0733.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0733",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-20T15:27:09.437",
"lastModified": "2024-11-21T02:02:42.583",
"vulnStatus": "Modified",
@@ -160,14 +160,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0733",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32914",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0734.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0734.json
index 723afd528ac..814b6100341 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0734.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0734.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0734",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-20T05:18:04.203",
"lastModified": "2024-11-21T02:02:42.697",
"vulnStatus": "Modified",
@@ -160,21 +160,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0734",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32916",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65645",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0734",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0735.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0735.json
index 31bd363bd8a..0a72cc67c32 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0735.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0735.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0735",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-20T05:18:04.233",
"lastModified": "2024-11-21T02:02:42.823",
"vulnStatus": "Modified",
@@ -160,25 +160,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0735",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32912",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65641",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029793",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0735",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0736.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0736.json
index e3b14e4399b..e42da508754 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0736.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0736.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0736",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-20T05:18:04.267",
"lastModified": "2024-11-21T02:02:42.937",
"vulnStatus": "Modified",
@@ -160,21 +160,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0736",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32911",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029792",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0736",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0737.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0737.json
index 2e93d00e7b3..3ce73421fb6 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0737.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0737.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0737",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-22T21:55:09.703",
"lastModified": "2024-11-21T02:02:43.050",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32957",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0737",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0738.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0738.json
index dc421b9895b..e143858230f 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0738.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0738.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0738",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-22T21:55:09.717",
"lastModified": "2024-11-21T02:02:43.157",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0738",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32956",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0739.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0739.json
index 48d7b72ff53..8655e90bd02 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0739.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0739.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0739",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-22T21:55:09.750",
"lastModified": "2024-11-21T02:02:43.260",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0739",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32955",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0740.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0740.json
index 225dc93b9f9..9c434798109 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0740.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0740.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0740",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-27T01:55:03.290",
"lastModified": "2024-11-21T02:02:43.383",
"vulnStatus": "Modified",
@@ -160,21 +160,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0740",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33049",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029843",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0740",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0741.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0741.json
index a338bcf2766..1ba666ffd6f 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0741.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0741.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0741",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-27T01:55:03.320",
"lastModified": "2024-11-21T02:02:43.503",
"vulnStatus": "Modified",
@@ -160,21 +160,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0741",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33046",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029843",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0741",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0742.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0742.json
index 8fc10b69cf0..f037e3ca4fc 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0742.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0742.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0742",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-27T01:55:03.350",
"lastModified": "2024-11-21T02:02:43.620",
"vulnStatus": "Modified",
@@ -160,21 +160,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0742",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33045",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029843",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0742",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0743.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0743.json
index 055ab27279d..1f2557f15bb 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0743.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0743.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0743",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-27T01:55:03.367",
"lastModified": "2024-11-21T02:02:43.740",
"vulnStatus": "Modified",
@@ -160,21 +160,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0743",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33044",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029843",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0743",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0744.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0744.json
index f13763a7fec..e0a2e24caa8 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0744.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0744.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0744",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:33.200",
"lastModified": "2023-11-07T02:18:25.860",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0745.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0745.json
index f2fa0da55fd..87b6e51a52e 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0745.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0745.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0745",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-27T01:55:03.397",
"lastModified": "2024-11-21T02:02:43.863",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0745",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029842",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0745",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0746.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0746.json
index 836c6f884c9..bc02fe07fca 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0746.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0746.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0746",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-27T01:55:03.430",
"lastModified": "2024-11-21T02:02:43.967",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0746",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029842",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0746",
diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0747.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0747.json
index 369c7969495..913c75b5aa2 100644
--- a/CVE-2014/CVE-2014-07xx/CVE-2014-0747.json
+++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0747.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-0747",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-27T01:55:03.447",
"lastModified": "2024-11-21T02:02:44.087",
"vulnStatus": "Modified",
@@ -160,21 +160,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0747",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33048",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029843",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0747",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2102.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2102.json
index a0824b83078..61f02c1a9db 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2102.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2102.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2102",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-27T01:55:04.307",
"lastModified": "2024-11-21T02:05:39.520",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2102",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029842",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2102",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2103.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2103.json
index c8d710b069e..0e17eb9630e 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2103.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2103.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2103",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-02-27T20:55:06.957",
"lastModified": "2024-11-21T02:05:39.637",
"vulnStatus": "Modified",
@@ -149,7 +149,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2103",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2104.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2104.json
index a8b77dcbd55..6fe8a889c15 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2104.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2104.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2104",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-02T04:57:25.870",
"lastModified": "2024-11-21T02:05:39.750",
"vulnStatus": "Modified",
@@ -74,21 +74,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2104",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33111",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/65869",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2104",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2106.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2106.json
index b5b7c5e7d17..6a919c58a1d 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2106.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2106.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2106",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-27T21:55:08.940",
"lastModified": "2024-11-21T02:05:39.867",
"vulnStatus": "Modified",
@@ -89,7 +89,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-sip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2107.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2107.json
index 942a90d7038..fb3c7cfca7b 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2107.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2107.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2107",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-27T21:55:08.987",
"lastModified": "2024-11-21T02:05:39.980",
"vulnStatus": "Modified",
@@ -99,7 +99,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-RSP72010GE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2108.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2108.json
index 9308dc4f47e..bbcd6b22615 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2108.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2108.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2108",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-27T21:55:09.003",
"lastModified": "2024-11-21T02:05:40.100",
"vulnStatus": "Modified",
@@ -414,7 +414,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2109.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2109.json
index a2e86f6e2ad..ff914699681 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2109.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2109.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2109",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-27T21:55:09.033",
"lastModified": "2024-11-21T02:05:40.227",
"vulnStatus": "Modified",
@@ -109,14 +109,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-nat",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/66470",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-nat",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2111.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2111.json
index 12d3ba0ff7e..db4f30acb0c 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2111.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2111.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2111",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-27T21:55:09.063",
"lastModified": "2024-11-21T02:05:40.357",
"vulnStatus": "Modified",
@@ -109,14 +109,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-nat",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/66470",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-nat",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2112.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2112.json
index db04ae3f790..0c463b6c23d 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2112.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2112.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2112",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-27T21:55:09.080",
"lastModified": "2024-11-21T02:05:40.467",
"vulnStatus": "Modified",
@@ -89,14 +89,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ios-sslvpn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/66462",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ios-sslvpn",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2113.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2113.json
index aa1861fdcc5..8934dd481c7 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2113.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2113.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2113",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-27T21:55:09.110",
"lastModified": "2024-11-21T02:05:40.570",
"vulnStatus": "Modified",
@@ -234,14 +234,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ipv6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/66467",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ipv6",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2114.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2114.json
index d91a4789631..6058deda86c 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2114.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2114.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2114",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-04T15:10:20.293",
"lastModified": "2024-11-21T02:05:40.683",
"vulnStatus": "Modified",
@@ -75,25 +75,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2114",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33644",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/66635",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030019",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2114",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2115.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2115.json
index e2c3f72fa65..c2bb009fc6d 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2115.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2115.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2115",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-04T15:10:37.387",
"lastModified": "2024-11-21T02:05:40.880",
"vulnStatus": "Modified",
@@ -75,25 +75,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2115",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33643",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/66631",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030019",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2115",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2116.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2116.json
index 6fe9b10599d..22e90c37d95 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2116.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2116.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2116",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-04T15:10:37.403",
"lastModified": "2024-11-21T02:05:41.003",
"vulnStatus": "Modified",
@@ -75,25 +75,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2116",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33641",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/66632",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030019",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2116",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2117.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2117.json
index b8c1666065a..5a33a8cafab 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2117.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2117.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2117",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-04T15:10:37.450",
"lastModified": "2024-11-21T02:05:41.123",
"vulnStatus": "Modified",
@@ -75,25 +75,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2117",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33642",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/66634",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030019",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2117",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2118.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2118.json
index b693e7ec043..69eda96cc62 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2118.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2118.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2118",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-27T21:55:09.127",
"lastModified": "2024-11-21T02:05:41.240",
"vulnStatus": "Modified",
@@ -120,25 +120,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2118",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33542",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/66488",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1029968",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2118",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2119.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2119.json
index cca7bf02704..21f9ad26315 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2119.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2119.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2119",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-21T01:04:02.937",
"lastModified": "2024-11-21T02:05:41.360",
"vulnStatus": "Modified",
@@ -140,7 +140,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140319-asyncos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2120.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2120.json
index 53c5431d00a..39ab892b9ff 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2120.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2120.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2120",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-19T01:15:04.007",
"lastModified": "2024-12-19T19:31:33.220",
"vulnStatus": "Analyzed",
@@ -130,7 +130,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2120",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Vendor Advisory"
@@ -138,7 +138,7 @@
},
{
"url": "http://www.securityfocus.com/bid/66290",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -147,7 +147,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2121.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2121.json
index f094ed06dbf..b635bec502a 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2121.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2121.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2121",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-19T01:15:04.037",
"lastModified": "2024-11-21T02:05:41.687",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2121",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/66283",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029933",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2122.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2122.json
index 1ccdfe47a5d..412538d04a7 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2122.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2122.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2122",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-19T01:15:04.053",
"lastModified": "2024-11-21T02:05:41.800",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2122",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/66293",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029936",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -97,7 +97,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91907",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2122",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2124.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2124.json
index b09373d8839..dc4888e4efd 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2124.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2124.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2124",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-21T01:04:02.967",
"lastModified": "2024-11-21T02:05:41.920",
"vulnStatus": "Modified",
@@ -87,28 +87,28 @@
"references": [
{
"url": "http://secunia.com/advisories/57515",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2124",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33413",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/66301",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -116,7 +116,7 @@
},
{
"url": "http://www.securitytracker.com/id/1029942",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91904",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/57515",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2125.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2125.json
index 67bd6b291af..d72425b233b 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2125.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2125.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2125",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-02T03:58:17.090",
"lastModified": "2024-11-21T02:05:42.047",
"vulnStatus": "Modified",
@@ -110,21 +110,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2125",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33603",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1029988",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2125",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2126.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2126.json
index c3227517a54..09be50f714b 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2126.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2126.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2126",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-10T04:34:50.930",
"lastModified": "2024-11-21T02:05:42.160",
"vulnStatus": "Modified",
@@ -94,7 +94,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2127.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2127.json
index ba4f5469d7a..cd430a16a19 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2127.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2127.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2127",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-10T04:34:50.960",
"lastModified": "2024-11-21T02:05:42.273",
"vulnStatus": "Modified",
@@ -109,7 +109,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2128.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2128.json
index 5f0b1e0c4f1..696c8bce713 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2128.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2128.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2128",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-10T04:34:51.007",
"lastModified": "2024-11-21T02:05:42.387",
"vulnStatus": "Modified",
@@ -99,7 +99,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2129.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2129.json
index b509e0a2fc9..e8dc6bdb752 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2129.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2129.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2129",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-10T04:34:51.037",
"lastModified": "2024-11-21T02:05:42.507",
"vulnStatus": "Modified",
@@ -89,7 +89,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2130.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2130.json
index f3967ed5b13..a91eef11996 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2130.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2130.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2130",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-06T02:59:00.080",
"lastModified": "2024-11-21T02:05:42.610",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2130",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031844",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2130",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2131.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2131.json
index af079d13533..d65496d6cda 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2131.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2131.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2131",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-03-29T01:55:07.327",
"lastModified": "2024-11-21T02:05:42.723",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2131",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2132.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2132.json
index 4d64b0c8c16..5582fc69229 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2132.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2132.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2132",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-08T10:55:03.700",
"lastModified": "2024-11-21T02:05:42.840",
"vulnStatus": "Modified",
@@ -99,7 +99,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2133.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2133.json
index 614330f0ceb..9e994807d18 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2133.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2133.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2133",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-08T10:55:03.857",
"lastModified": "2024-11-21T02:05:42.947",
"vulnStatus": "Modified",
@@ -99,7 +99,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2134.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2134.json
index 58f066f17ed..e2778e69947 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2134.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2134.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2134",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-08T10:55:03.950",
"lastModified": "2024-11-21T02:05:43.060",
"vulnStatus": "Modified",
@@ -99,7 +99,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2135.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2135.json
index 5054f594151..ca777500a58 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2135.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2135.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2135",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-08T10:55:04.073",
"lastModified": "2024-11-21T02:05:43.177",
"vulnStatus": "Modified",
@@ -99,7 +99,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2136.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2136.json
index b024396853e..9c52bbb0534 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2136.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2136.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2136",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-08T10:55:04.153",
"lastModified": "2024-11-21T02:05:43.287",
"vulnStatus": "Modified",
@@ -99,7 +99,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2137.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2137.json
index 96bfe065558..084783c9757 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2137.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2137.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2137",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-02T03:58:17.123",
"lastModified": "2024-11-21T02:05:43.400",
"vulnStatus": "Modified",
@@ -115,14 +115,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2137",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33608",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2138.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2138.json
index 9c5e95f0cdb..2b7e538c85d 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2138.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2138.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2138",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-02T03:58:17.137",
"lastModified": "2024-11-21T02:05:43.520",
"vulnStatus": "Modified",
@@ -225,14 +225,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2138",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33607",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2139.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2139.json
index 0877e55985d..9e7f115c50b 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2139.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2139.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2139",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-12T04:37:31.817",
"lastModified": "2024-11-21T02:05:43.643",
"vulnStatus": "Modified",
@@ -122,14 +122,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2139",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33681",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2140.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2140.json
index 7269c278b45..b812ded92c4 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2140.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2140.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2140",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-12T04:37:31.847",
"lastModified": "2024-11-21T02:05:43.760",
"vulnStatus": "Modified",
@@ -122,14 +122,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2140",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33680",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2141.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2141.json
index bb97c9c6ae6..f1c8313fc71 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2141.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2141.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2141",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-10T04:34:51.053",
"lastModified": "2024-11-21T02:05:43.877",
"vulnStatus": "Modified",
@@ -122,14 +122,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2141",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33682",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2142.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2142.json
index 2fbf1d2c025..682393d9431 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2142.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2142.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2142",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-12T04:37:31.877",
"lastModified": "2024-11-21T02:05:43.990",
"vulnStatus": "Modified",
@@ -132,14 +132,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2142",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33679",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2143.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2143.json
index 69102e8f62c..090d4219872 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2143.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2143.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2143",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-04T15:10:37.513",
"lastModified": "2024-11-21T02:05:44.103",
"vulnStatus": "Modified",
@@ -140,14 +140,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2143",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33639",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2144.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2144.json
index afd3fb320d9..f68fd4f6a30 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2144.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2144.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2144",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-05T04:01:38.687",
"lastModified": "2024-11-21T02:05:44.220",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2144",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2145.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2145.json
index 6ebc909c4f6..30f78322057 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2145.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2145.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2145",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-05T04:01:38.700",
"lastModified": "2024-11-21T02:05:44.330",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2145",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/66676",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2145",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2146.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2146.json
index 4b367c18ad3..72b57801f8b 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2146.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2146.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2146",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-22T17:59:00.133",
"lastModified": "2024-11-21T02:05:44.440",
"vulnStatus": "Modified",
@@ -103,11 +103,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93126",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=39129",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2147.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2147.json
index e46ebda0aed..ca7bb1d5cc6 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2147.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2147.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2147",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-12T01:59:00.063",
"lastModified": "2024-11-21T02:05:44.570",
"vulnStatus": "Modified",
@@ -75,29 +75,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2147",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37419",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72551",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031715",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100755",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2147",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2149.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2149.json
index 376d6644a7e..51b4677025e 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2149.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2149.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2149",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:34.530",
"lastModified": "2023-11-07T02:19:29.830",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2150.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2150.json
index d7ec13710e4..e391b6d46bd 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2150.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2150.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2150",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:34.577",
"lastModified": "2023-11-07T02:19:30.040",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2151.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2151.json
index 663076adb36..67d2b506869 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2151.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2151.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2151",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-18T16:55:07.203",
"lastModified": "2024-11-21T02:05:44.717",
"vulnStatus": "Modified",
@@ -75,7 +75,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2151",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Vendor Advisory"
@@ -83,14 +83,14 @@
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34627",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68063",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -98,7 +98,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030445",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2152.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2152.json
index 60bcc040f6a..b08439da8c5 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2152.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2152.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2152",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-12T01:59:16.593",
"lastModified": "2024-11-21T02:05:44.850",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2152",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72558",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031715",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100747",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2152",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2153.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2153.json
index ff450c1d3ef..12f0e966002 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2153.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2153.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2153",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-12T01:59:17.767",
"lastModified": "2024-11-21T02:05:44.967",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2153",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72555",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031715",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100746",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2153",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2154.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2154.json
index 8eeacc0aa22..e99003817d1 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2154.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2154.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2154",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-23T11:52:59.790",
"lastModified": "2024-11-21T02:05:45.077",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2154",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2155.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2155.json
index 1877da42213..fa81ef9b6bb 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2155.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2155.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2155",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-19T21:55:07.087",
"lastModified": "2024-11-21T02:05:45.200",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2155",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33850",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2156.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2156.json
index fe2d7c17eb4..e453cbb4f5d 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2156.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2156.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2156",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:07.977",
"lastModified": "2024-11-21T02:05:45.317",
"vulnStatus": "Modified",
@@ -187,7 +187,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2157.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2157.json
index 4e849bb492d..c55161d96d0 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2157.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2157.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2157",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.007",
"lastModified": "2024-11-21T02:05:45.437",
"vulnStatus": "Modified",
@@ -187,7 +187,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2158.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2158.json
index c6b35134ba4..c7f1fc49b32 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2158.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2158.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2158",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.037",
"lastModified": "2024-11-21T02:05:45.570",
"vulnStatus": "Modified",
@@ -187,7 +187,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2159.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2159.json
index 5a9e92e03e0..2dca8c89154 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2159.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2159.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2159",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.070",
"lastModified": "2024-11-21T02:05:45.683",
"vulnStatus": "Modified",
@@ -187,7 +187,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2160.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2160.json
index f338f442037..ce44230e502 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2160.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2160.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2160",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.100",
"lastModified": "2024-11-21T02:05:45.797",
"vulnStatus": "Modified",
@@ -187,7 +187,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2161.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2161.json
index 564e9457634..05e238beb62 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2161.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2161.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2161",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.117",
"lastModified": "2024-11-21T02:05:45.913",
"vulnStatus": "Modified",
@@ -187,7 +187,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2162.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2162.json
index ed83a784aee..30f53123a8e 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2162.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2162.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2162",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.147",
"lastModified": "2024-11-21T02:05:46.057",
"vulnStatus": "Modified",
@@ -209,7 +209,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2163.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2163.json
index 26c606861f7..6e69a89f042 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2163.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2163.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2163",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.180",
"lastModified": "2024-11-21T02:05:46.190",
"vulnStatus": "Modified",
@@ -204,7 +204,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2164.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2164.json
index 79a4dd1e9f5..77c99e40044 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2164.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2164.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2164",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.193",
"lastModified": "2024-11-21T02:05:46.317",
"vulnStatus": "Modified",
@@ -209,7 +209,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2165.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2165.json
index da2c796b090..e1bfcee6e0c 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2165.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2165.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2165",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.227",
"lastModified": "2024-11-21T02:05:46.440",
"vulnStatus": "Modified",
@@ -209,7 +209,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2166.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2166.json
index 4cc05134e11..4d88156d8e3 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2166.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2166.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2166",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.240",
"lastModified": "2024-11-21T02:05:46.567",
"vulnStatus": "Modified",
@@ -149,7 +149,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2167.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2167.json
index a5540bddc5b..f6f44202dae 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2167.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2167.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2167",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.273",
"lastModified": "2024-11-21T02:05:46.683",
"vulnStatus": "Modified",
@@ -209,7 +209,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2168.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2168.json
index f9319bce1e8..ebaabf5d7cd 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2168.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2168.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2168",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.287",
"lastModified": "2024-11-21T02:05:46.810",
"vulnStatus": "Modified",
@@ -209,7 +209,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2169.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2169.json
index 93b5a42a3a9..c12589047a7 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2169.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2169.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2169",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.320",
"lastModified": "2024-11-21T02:05:46.920",
"vulnStatus": "Modified",
@@ -234,7 +234,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2170.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2170.json
index d17c10b0713..19211938def 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2170.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2170.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2170",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.337",
"lastModified": "2024-11-21T02:05:47.047",
"vulnStatus": "Modified",
@@ -209,7 +209,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2171.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2171.json
index 2750b8515ac..1a6d10f4fd0 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2171.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2171.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2171",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.367",
"lastModified": "2024-11-21T02:05:47.167",
"vulnStatus": "Modified",
@@ -219,7 +219,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2172.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2172.json
index 2a0de5bd4bf..a923f3330a9 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2172.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2172.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2172",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.383",
"lastModified": "2024-11-21T02:05:47.290",
"vulnStatus": "Modified",
@@ -209,7 +209,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2173.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2173.json
index 90d7484ec62..ee43296b370 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2173.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2173.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2173",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.413",
"lastModified": "2024-11-21T02:05:47.413",
"vulnStatus": "Modified",
@@ -209,7 +209,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2174.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2174.json
index 5d56df5d800..98a58d50441 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2174.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2174.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2174",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-25T00:59:00.073",
"lastModified": "2024-11-21T02:05:47.530",
"vulnStatus": "Modified",
@@ -289,7 +289,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2175.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2175.json
index c9ec7fa88f3..07bf438a5a3 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2175.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2175.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2175",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-02T10:55:08.430",
"lastModified": "2024-11-21T02:05:47.653",
"vulnStatus": "Modified",
@@ -209,7 +209,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2176.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2176.json
index a65642c0013..b141a39d6f6 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2176.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2176.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2176",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-14T11:18:55.127",
"lastModified": "2024-11-21T02:05:47.780",
"vulnStatus": "Modified",
@@ -131,21 +131,21 @@
"references": [
{
"url": "http://secunia.com/advisories/58722",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140611-ipv6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68005",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -153,7 +153,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030400",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2177.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2177.json
index aa5555992a2..6f310f4f6ef 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2177.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2177.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2177",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-07T11:55:02.407",
"lastModified": "2024-11-21T02:05:47.910",
"vulnStatus": "Modified",
@@ -148,15 +148,15 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://seclists.org/fulldisclosure/2014/Nov/6",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -164,15 +164,15 @@
},
{
"url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031171",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98497",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2178.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2178.json
index e35fe1a8996..3000e566db1 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2178.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2178.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2178",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-07T11:55:02.487",
"lastModified": "2024-11-21T02:05:48.050",
"vulnStatus": "Modified",
@@ -148,15 +148,15 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://seclists.org/fulldisclosure/2014/Nov/6",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -164,15 +164,15 @@
},
{
"url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031171",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98498",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2179.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2179.json
index 16c62a3bc14..0e3574ff7bc 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2179.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2179.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2179",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-07T11:55:02.517",
"lastModified": "2024-11-21T02:05:48.177",
"vulnStatus": "Modified",
@@ -148,15 +148,15 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://seclists.org/fulldisclosure/2014/Nov/6",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -164,15 +164,15 @@
},
{
"url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031171",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98499",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2180.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2180.json
index 6cb34ee9e93..67e01b9ad91 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2180.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2180.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2180",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-29T10:37:03.967",
"lastModified": "2024-11-21T02:05:48.307",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2180",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2181.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2181.json
index ef66d3d5882..29eb691753b 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2181.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2181.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2181",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-07T10:55:05.057",
"lastModified": "2024-11-21T02:05:48.430",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2181",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2182.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2182.json
index e490cf5f132..3c0d0dcab54 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2182.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2182.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2182",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-29T10:37:03.997",
"lastModified": "2024-11-21T02:05:48.547",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2182",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2183.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2183.json
index c47b48fb78b..937befd6d9b 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2183.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2183.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2183",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-29T10:37:04.013",
"lastModified": "2024-11-21T02:05:48.660",
"vulnStatus": "Modified",
@@ -142,14 +142,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2183",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33971",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2184.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2184.json
index 853ab8d9396..8bd2d0c2fd7 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2184.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2184.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2184",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-29T10:37:04.047",
"lastModified": "2024-11-21T02:05:48.783",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2184",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2185.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2185.json
index ea7267ae26e..f343a70971a 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2185.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2185.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2185",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-29T10:37:04.077",
"lastModified": "2024-11-21T02:05:48.897",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2185",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2186.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2186.json
index c260bf2f4ca..03de0706092 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2186.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2186.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2186",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-04-30T10:49:05.207",
"lastModified": "2024-11-21T02:05:49.030",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2186",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030173",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2186",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2188.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2188.json
index ebe6e516a98..4381c9f02d2 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2188.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2188.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2188",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-27T02:59:00.057",
"lastModified": "2023-11-07T02:19:30.650",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2189.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2189.json
index eeb1a15124e..22253950845 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2189.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2189.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2189",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:34.623",
"lastModified": "2023-11-07T02:19:31.080",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2190.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2190.json
index afe8c6860c0..c6d0776d42c 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2190.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2190.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2190",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-07T10:55:05.227",
"lastModified": "2024-11-21T02:05:49.180",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2190",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030199",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2190",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2191.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2191.json
index e79bdf1f806..e6ee71ed6e5 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2191.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2191.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2191",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-07T10:55:05.337",
"lastModified": "2024-11-21T02:05:49.313",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2191",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030198",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2191",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2192.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2192.json
index cd2a68eb568..1be5577a6d2 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2192.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2192.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2192",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-20T11:13:37.407",
"lastModified": "2024-11-21T02:05:49.437",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2192",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34269",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67464",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2192",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2193.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2193.json
index 6b901c7a6d0..330c479371b 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2193.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2193.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2193",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-20T11:13:37.467",
"lastModified": "2024-11-21T02:05:49.560",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2193",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2194.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2194.json
index 73d4f404c1f..9067a6da3ba 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2194.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2194.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2194",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-20T11:13:37.530",
"lastModified": "2024-11-21T02:05:49.680",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2194",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34270",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2195.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2195.json
index 95371a791c7..652ebaae101 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2195.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2195.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2195",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-20T11:13:37.593",
"lastModified": "2024-11-21T02:05:49.797",
"vulnStatus": "Modified",
@@ -91,14 +91,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030258",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2196.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2196.json
index 3555a278a36..a45a9107f84 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2196.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2196.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2196",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-26T00:25:31.157",
"lastModified": "2024-11-21T02:05:49.940",
"vulnStatus": "Modified",
@@ -94,14 +94,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-waas",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030265",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2197.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2197.json
index ca935a440c3..73c9c183b78 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2197.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2197.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2197",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-07T11:01:29.337",
"lastModified": "2024-11-21T02:05:50.057",
"vulnStatus": "Modified",
@@ -80,26 +80,26 @@
"references": [
{
"url": "http://secunia.com/advisories/59573",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140702-cucdm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=34689",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/68333",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030515",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59573",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2198.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2198.json
index e3797138219..a7afe9c2a31 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2198.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2198.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2198",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-07T11:01:29.383",
"lastModified": "2024-11-21T02:05:50.177",
"vulnStatus": "Modified",
@@ -80,26 +80,26 @@
"references": [
{
"url": "http://secunia.com/advisories/59544",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140702-cucdm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=34689",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/68334",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030515",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59544",
diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2199.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2199.json
index 90b33ef2478..cadcf7c009c 100644
--- a/CVE-2014/CVE-2014-21xx/CVE-2014-2199.json
+++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2199.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2199",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-20T11:13:37.657",
"lastModified": "2024-11-21T02:05:50.297",
"vulnStatus": "Modified",
@@ -110,21 +110,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2199",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34252",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030251",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-22xx/CVE-2014-2200.json b/CVE-2014/CVE-2014-22xx/CVE-2014-2200.json
index f3658b05b6c..f5acded765a 100644
--- a/CVE-2014/CVE-2014-22xx/CVE-2014-2200.json
+++ b/CVE-2014/CVE-2014-22xx/CVE-2014-2200.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2200",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-26T00:25:31.720",
"lastModified": "2024-11-21T02:05:50.413",
"vulnStatus": "Modified",
@@ -246,7 +246,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-22xx/CVE-2014-2201.json b/CVE-2014/CVE-2014-22xx/CVE-2014-2201.json
index f9ee723cae1..44c927d316f 100644
--- a/CVE-2014/CVE-2014-22xx/CVE-2014-2201.json
+++ b/CVE-2014/CVE-2014-22xx/CVE-2014-2201.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-2201",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-26T00:25:31.767",
"lastModified": "2024-11-21T02:05:50.537",
"vulnStatus": "Modified",
@@ -159,7 +159,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3261.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3261.json
index d4c87226263..ba8060b43ac 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3261.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3261.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3261",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-26T00:25:32.220",
"lastModified": "2024-11-21T02:07:44.867",
"vulnStatus": "Modified",
@@ -639,7 +639,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3262.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3262.json
index 2fc614a7a41..fefe5c1641c 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3262.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3262.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3262",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-16T11:12:01.040",
"lastModified": "2024-11-21T02:07:45.000",
"vulnStatus": "Modified",
@@ -95,21 +95,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3262",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34233",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030243",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3263.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3263.json
index d293815479c..fcd1761a35b 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3263.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3263.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3263",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-16T11:12:01.103",
"lastModified": "2024-11-21T02:07:45.110",
"vulnStatus": "Modified",
@@ -79,21 +79,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3263",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34234",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030244",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3264.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3264.json
index 1a8648d2865..992b440420d 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3264.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3264.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3264",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-20T11:13:37.953",
"lastModified": "2024-11-21T02:07:45.217",
"vulnStatus": "Modified",
@@ -75,7 +75,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3264",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Vendor Advisory"
@@ -83,7 +83,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34273",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3265.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3265.json
index cc7535e3c31..383f549ce67 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3265.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3265.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3265",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-20T11:13:38.013",
"lastModified": "2024-11-21T02:07:45.327",
"vulnStatus": "Modified",
@@ -74,21 +74,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3265",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34274",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030260",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3266.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3266.json
index bf7b2934bd4..276420e1edc 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3266.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3266.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3266",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-26T00:25:31.300",
"lastModified": "2024-11-21T02:07:45.443",
"vulnStatus": "Modified",
@@ -160,25 +160,25 @@
"references": [
{
"url": "http://secunia.com/advisories/58923",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3266",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34340",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67569",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/58923",
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3267.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3267.json
index f75269ced6e..e4dcc5f86a0 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3267.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3267.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3267",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-26T00:25:31.330",
"lastModified": "2024-11-21T02:07:45.560",
"vulnStatus": "Modified",
@@ -160,21 +160,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3267",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34325",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030271",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3268.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3268.json
index 7f9010184c2..a57bfe457e6 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3268.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3268.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3268",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-20T11:13:38.077",
"lastModified": "2024-11-21T02:07:45.680",
"vulnStatus": "Modified",
@@ -86,14 +86,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3268",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34272",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3269.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3269.json
index b27c250ce12..8df85ddc372 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3269.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3269.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3269",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-20T11:13:38.140",
"lastModified": "2024-11-21T02:07:45.790",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3269",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34268",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3270.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3270.json
index 38dfd211ec5..8361d998e94 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3270.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3270.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3270",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-20T11:13:38.203",
"lastModified": "2024-11-21T02:07:45.890",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3270",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030259",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3271.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3271.json
index e5c65edebd9..f69062ee6b2 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3271.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3271.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3271",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-20T11:13:38.263",
"lastModified": "2024-11-21T02:07:46.000",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3271",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030259",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3272.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3272.json
index f3fa78a2663..ae892ace7cd 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3272.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3272.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3272",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-26T00:25:31.360",
"lastModified": "2024-11-21T02:07:46.107",
"vulnStatus": "Modified",
@@ -120,25 +120,25 @@
"references": [
{
"url": "http://secunia.com/advisories/58922",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3272",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34339",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030275",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3273.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3273.json
index ad4078620ef..ccd359cd77c 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3273.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3273.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3273",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-20T11:13:38.343",
"lastModified": "2024-11-21T02:07:46.217",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3273",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030257",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3274.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3274.json
index 4b532289033..410bcf76545 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3274.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3274.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3274",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-26T00:25:31.407",
"lastModified": "2024-11-21T02:07:46.323",
"vulnStatus": "Modified",
@@ -360,21 +360,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3274",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34327",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030272",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3275.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3275.json
index 8763b8cb72f..3c21853378e 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3275.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3275.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3275",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-26T00:25:31.440",
"lastModified": "2024-11-21T02:07:46.457",
"vulnStatus": "Modified",
@@ -85,25 +85,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3275",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34328",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67555",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030273",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3275",
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3276.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3276.json
index afbb24aac3a..efb386f3ddb 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3276.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3276.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3276",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-26T00:25:31.470",
"lastModified": "2024-11-21T02:07:46.573",
"vulnStatus": "Modified",
@@ -85,21 +85,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3276",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34329",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030274",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3277.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3277.json
index 959199a5ef0..0feba0a2db0 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3277.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3277.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3277",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-29T17:55:05.133",
"lastModified": "2024-11-21T02:07:46.700",
"vulnStatus": "Modified",
@@ -95,25 +95,25 @@
"references": [
{
"url": "http://secunia.com/advisories/58400",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3277",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34380",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67664",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -121,7 +121,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030306",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3278.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3278.json
index cb49b506a6f..3b4f3d80c59 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3278.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3278.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3278",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-08T16:55:02.673",
"lastModified": "2024-11-21T02:07:46.827",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://secunia.com/advisories/58657",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3278",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67924",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/58657",
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3279.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3279.json
index 926a75ec838..827eb3c49ef 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3279.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3279.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3279",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-29T17:55:05.210",
"lastModified": "2024-11-21T02:07:46.937",
"vulnStatus": "Modified",
@@ -95,33 +95,33 @@
"references": [
{
"url": "http://secunia.com/advisories/58400",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/58657",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3279",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34381",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67663",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030306",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/58400",
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3280.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3280.json
index 534f82dfe87..bffe4373454 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3280.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3280.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3280",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-03T04:44:49.417",
"lastModified": "2024-11-21T02:07:47.047",
"vulnStatus": "Modified",
@@ -95,28 +95,28 @@
"references": [
{
"url": "http://secunia.com/advisories/58400",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3280",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34379",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67661",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030306",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3281.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3281.json
index aa4e001685a..706f9a2052f 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3281.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3281.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3281",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-08T16:55:02.753",
"lastModified": "2024-11-21T02:07:47.163",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://secunia.com/advisories/58657",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3281",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67925",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/58657",
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3282.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3282.json
index 6885fd350de..ca6f7ba9c1b 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3282.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3282.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3282",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-29T17:55:05.273",
"lastModified": "2024-11-21T02:07:47.267",
"vulnStatus": "Modified",
@@ -95,28 +95,28 @@
"references": [
{
"url": "http://secunia.com/advisories/58400",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3282",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34382",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67666",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030306",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3283.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3283.json
index c880d1ea4a0..50bb72b7de8 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3283.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3283.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3283",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-29T17:55:05.337",
"lastModified": "2024-11-21T02:07:47.380",
"vulnStatus": "Modified",
@@ -95,28 +95,28 @@
"references": [
{
"url": "http://secunia.com/advisories/58400",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3283",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34383",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67665",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030306",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3284.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3284.json
index 12a0cad1e2f..d38b100e196 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3284.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3284.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3284",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-25T22:55:02.393",
"lastModified": "2024-11-21T02:07:47.493",
"vulnStatus": "Modified",
@@ -121,28 +121,28 @@
"references": [
{
"url": "http://secunia.com/advisories/58405",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3284",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34346",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67603",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -150,7 +150,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030283",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3285.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3285.json
index 4ab04d16726..d8c54128ab0 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3285.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3285.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3285",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-05-29T17:55:05.397",
"lastModified": "2024-11-21T02:07:47.610",
"vulnStatus": "Modified",
@@ -145,28 +145,28 @@
"references": [
{
"url": "http://secunia.com/advisories/58806",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3285",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34395",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67696",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -174,7 +174,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030307",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3286.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3286.json
index ec42bfbbecf..a520257dc00 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3286.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3286.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3286",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-08T16:55:02.813",
"lastModified": "2024-11-21T02:07:47.733",
"vulnStatus": "Modified",
@@ -74,21 +74,21 @@
"references": [
{
"url": "http://secunia.com/advisories/58571",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3286",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67922",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3287.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3287.json
index e92a046dced..029b4950064 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3287.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3287.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3287",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-10T11:19:35.737",
"lastModified": "2024-11-21T02:07:47.843",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3287",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030411",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3289.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3289.json
index 9fdffe50532..4f79fa8ff77 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3289.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3289.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3289",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-10T11:19:35.797",
"lastModified": "2024-11-21T02:07:47.950",
"vulnStatus": "Modified",
@@ -142,11 +142,11 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/127004/Cisco-Ironport-Email-Security-Virtual-Appliance-8.0.0-671-XSS.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://seclists.org/fulldisclosure/2014/Jun/57",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -155,32 +155,32 @@
},
{
"url": "http://secunia.com/advisories/58296",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3289",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34569",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/613308",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/67943",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -188,7 +188,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030407",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3290.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3290.json
index fa51fdcb234..a16ff612f9b 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3290.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3290.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3290",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-14T11:18:55.190",
"lastModified": "2024-11-21T02:07:48.073",
"vulnStatus": "Modified",
@@ -74,28 +74,28 @@
"references": [
{
"url": "http://secunia.com/advisories/58715",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3290",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34613",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68021",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -103,7 +103,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030444",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3291.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3291.json
index 4b33e7da21e..c3886909534 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3291.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3291.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3291",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-08T16:55:02.877",
"lastModified": "2024-11-21T02:07:48.197",
"vulnStatus": "Modified",
@@ -74,28 +74,28 @@
"references": [
{
"url": "http://secunia.com/advisories/57895",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3291",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34558",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67926",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -103,7 +103,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030410",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3292.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3292.json
index d2ff7741435..d457afa4cca 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3292.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3292.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3292",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-10T11:19:35.860",
"lastModified": "2024-11-21T02:07:48.317",
"vulnStatus": "Modified",
@@ -74,28 +74,28 @@
"references": [
{
"url": "http://secunia.com/advisories/58315",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3292",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34574",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030408",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3293.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3293.json
index 7e17530a6c5..26027234352 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3293.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3293.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3293",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-28T19:55:02.653",
"lastModified": "2024-11-21T02:07:48.437",
"vulnStatus": "Modified",
@@ -86,33 +86,33 @@
"references": [
{
"url": "http://secunia.com/advisories/61830",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3293",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36195",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/70744",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97769",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/61830",
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3294.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3294.json
index 3d57eeece16..4b6d3c94904 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3294.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3294.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3294",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-10T11:19:35.940",
"lastModified": "2024-11-21T02:07:48.553",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3294",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68001",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030412",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3295.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3295.json
index fe79beb8055..b855e7939a6 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3295.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3295.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3295",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-14T04:26:47.173",
"lastModified": "2024-11-21T02:07:48.663",
"vulnStatus": "Modified",
@@ -240,28 +240,28 @@
"references": [
{
"url": "http://secunia.com/advisories/59158",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3295",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34585",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67983",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -269,7 +269,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030409",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3296.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3296.json
index 86f7b865c1b..614d1df2430 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3296.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3296.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3296",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-21T15:55:04.197",
"lastModified": "2024-11-21T02:07:48.790",
"vulnStatus": "Modified",
@@ -80,25 +80,25 @@
"references": [
{
"url": "http://secunia.com/advisories/59263",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3296",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34663",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68118",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3297.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3297.json
index 4af6fd9345a..3396f33cece 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3297.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3297.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3297",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-02T10:35:25.547",
"lastModified": "2024-11-21T02:07:48.907",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://secunia.com/advisories/58985",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59401",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3297",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34834",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68308",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030510",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/58985",
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3298.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3298.json
index ce3a97af1db..6641895e417 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3298.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3298.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3298",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-02T10:35:25.597",
"lastModified": "2024-11-21T02:07:49.020",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://secunia.com/advisories/58985",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3298",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34833",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68309",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030511",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/58985",
diff --git a/CVE-2014/CVE-2014-32xx/CVE-2014-3299.json b/CVE-2014/CVE-2014-32xx/CVE-2014-3299.json
index 566332421b2..5508313c392 100644
--- a/CVE-2014/CVE-2014-32xx/CVE-2014-3299.json
+++ b/CVE-2014/CVE-2014-32xx/CVE-2014-3299.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3299",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-06-25T11:19:21.963",
"lastModified": "2024-11-21T02:07:49.137",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://secunia.com/advisories/59382",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3299",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68177",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -93,7 +93,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030473",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3300.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3300.json
index ab2d83a7ede..817e157e6eb 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3300.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3300.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3300",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-07T11:01:30.180",
"lastModified": "2024-11-21T02:07:49.250",
"vulnStatus": "Modified",
@@ -85,25 +85,25 @@
"references": [
{
"url": "http://secunia.com/advisories/59556",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140702-cucdm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=34689",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68331",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -111,7 +111,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030515",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3301.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3301.json
index 1603eb640ed..3c1086a090a 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3301.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3301.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3301",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-26T11:11:57.080",
"lastModified": "2024-11-21T02:07:49.370",
"vulnStatus": "Modified",
@@ -85,25 +85,25 @@
"references": [
{
"url": "http://secunia.com/advisories/60573",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3301",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35040",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68894",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -111,7 +111,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030642",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94895",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60573",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3302.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3302.json
index f4003e96ef4..dc805ef884b 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3302.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3302.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3302",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-01T05:12:51.963",
"lastModified": "2024-11-21T02:07:49.497",
"vulnStatus": "Modified",
@@ -85,25 +85,25 @@
"references": [
{
"url": "http://secunia.com/advisories/58624",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3302",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35050",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68904",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -111,7 +111,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030646",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94892",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/58624",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3303.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3303.json
index d962b69b507..a764c61a066 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3303.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3303.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3303",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-28T17:55:07.247",
"lastModified": "2024-11-21T02:07:49.620",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3303",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68910",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030645",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -97,7 +97,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94893",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3303",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3304.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3304.json
index a16d699403f..634f58641d9 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3304.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3304.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3304",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-28T17:55:07.293",
"lastModified": "2024-11-21T02:07:49.760",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3304",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68911",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030641",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -97,7 +97,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94880",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3304",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3305.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3305.json
index 8fbe2f8cdf6..44c90bbfed0 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3305.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3305.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3305",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-26T11:11:57.127",
"lastModified": "2024-11-21T02:07:49.877",
"vulnStatus": "Modified",
@@ -85,21 +85,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3305",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35051",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68903",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -107,7 +107,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030644",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94894",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3305",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3306.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3306.json
index e85d442315f..94e3b5a4169 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3306.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3306.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3306",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-18T00:55:04.830",
"lastModified": "2024-11-21T02:07:49.997",
"vulnStatus": "Modified",
@@ -114,14 +114,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ciscosa-20140716-cm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030598",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030599",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3307.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3307.json
index c2b0096f621..ffcae5df2a8 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3307.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3307.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3307",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-02T10:35:25.643",
"lastModified": "2024-11-21T02:07:50.103",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://secunia.com/advisories/59024",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3307",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68307",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030509",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59024",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3308.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3308.json
index 4dc21ed40f5..9593efcf31a 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3308.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3308.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3308",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-07T11:01:30.227",
"lastModified": "2024-11-21T02:07:50.213",
"vulnStatus": "Modified",
@@ -116,25 +116,25 @@
"references": [
{
"url": "http://secunia.com/advisories/58869",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3308",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34843",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68351",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030525",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3309.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3309.json
index 4bc0fad5b3d..3a5add08f14 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3309.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3309.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3309",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-09T11:07:01.447",
"lastModified": "2024-11-21T02:07:50.337",
"vulnStatus": "Modified",
@@ -79,22 +79,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3309",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68463",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030549",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94420",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3309",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3310.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3310.json
index 0583374d04c..230362f049d 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3310.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3310.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3310",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-10T11:06:27.880",
"lastModified": "2024-11-21T02:07:50.450",
"vulnStatus": "Modified",
@@ -79,22 +79,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3310",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68503",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030551",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94431",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3310",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3311.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3311.json
index 90bc6ed191a..85a727012fd 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3311.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3311.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3311",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-10T11:06:27.927",
"lastModified": "2024-11-21T02:07:50.563",
"vulnStatus": "Modified",
@@ -79,22 +79,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3311",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68502",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030550",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94432",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3311",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3312.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3312.json
index e87d3bde53e..3631f3f24ed 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3312.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3312.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3312",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-09T11:07:01.493",
"lastModified": "2024-11-21T02:07:50.677",
"vulnStatus": "Modified",
@@ -149,22 +149,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3312",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68465",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030552",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94421",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3312",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3313.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3313.json
index e90804d91c4..68d3b7f849a 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3313.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3313.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3313",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-09T11:07:01.540",
"lastModified": "2024-11-21T02:07:50.797",
"vulnStatus": "Modified",
@@ -149,33 +149,33 @@
"references": [
{
"url": "http://secunia.com/advisories/59808",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3313",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34885",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68464",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030553",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94422",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59808",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3314.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3314.json
index 3b99aa280d2..e3236a44b25 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3314.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3314.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3314",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-14T19:59:00.053",
"lastModified": "2024-11-21T02:07:50.927",
"vulnStatus": "Modified",
@@ -89,7 +89,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3314",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3315.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3315.json
index 2c765ace346..ba175efe559 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3315.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3315.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3315",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-10T11:06:27.973",
"lastModified": "2024-11-21T02:07:51.037",
"vulnStatus": "Modified",
@@ -79,29 +79,29 @@
"references": [
{
"url": "http://secunia.com/advisories/59739",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3315",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34900",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68477",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94430",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59739",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3316.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3316.json
index 8746afe07c4..d81632e1a78 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3316.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3316.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3316",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-10T11:06:28.020",
"lastModified": "2024-11-21T02:07:51.147",
"vulnStatus": "Modified",
@@ -79,33 +79,33 @@
"references": [
{
"url": "http://secunia.com/advisories/59730",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3316",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34899",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68479",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030554",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94429",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59730",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3317.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3317.json
index 49e81740148..0bb793e85e5 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3317.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3317.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3317",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-14T21:55:05.797",
"lastModified": "2024-11-21T02:07:51.270",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://secunia.com/advisories/59727",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3317",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34898",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68481",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030554",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94435",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59727",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3318.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3318.json
index d17fbde1fab..39ad7e9108d 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3318.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3318.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3318",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-10T11:06:28.067",
"lastModified": "2024-11-21T02:07:51.387",
"vulnStatus": "Modified",
@@ -79,33 +79,33 @@
"references": [
{
"url": "http://secunia.com/advisories/59728",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3318",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34897",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68482",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030554",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94433",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59728",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3319.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3319.json
index cea73aa9b82..50828b8c946 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3319.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3319.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3319",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-14T21:55:05.843",
"lastModified": "2024-11-21T02:07:51.507",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://secunia.com/advisories/59734",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3319",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34909",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030554",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94436",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59734",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3320.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3320.json
index ab9b92f3527..583886b02f7 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3320.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3320.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3320",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-18T00:55:04.877",
"lastModified": "2024-11-21T02:07:51.623",
"vulnStatus": "Modified",
@@ -95,21 +95,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3320",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34960",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68694",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -117,7 +117,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030613",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3321.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3321.json
index 8479d45ff71..1d18a9eab4c 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3321.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3321.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3321",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-18T00:55:04.923",
"lastModified": "2024-11-21T02:07:51.750",
"vulnStatus": "Modified",
@@ -132,21 +132,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3321",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34936",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1030597",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3322.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3322.json
index b8c8d8eb109..b399bdddaa0 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3322.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3322.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3322",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-24T14:55:07.723",
"lastModified": "2024-11-21T02:07:51.870",
"vulnStatus": "Modified",
@@ -127,25 +127,25 @@
"references": [
{
"url": "http://secunia.com/advisories/60311",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3322",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35009",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68833",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -153,7 +153,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030623",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3323.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3323.json
index 827b82ca307..2bb7570ff39 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3323.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3323.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3323",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-18T00:55:04.970",
"lastModified": "2024-11-21T02:07:51.990",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3323",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68686",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030612",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3323",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3324.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3324.json
index e8b9a34bb6d..410db462047 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3324.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3324.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3324",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-26T11:11:57.177",
"lastModified": "2024-11-21T02:07:52.100",
"vulnStatus": "Modified",
@@ -89,25 +89,25 @@
"references": [
{
"url": "http://secunia.com/advisories/60456",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3324",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35031",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68885",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030640",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -123,7 +123,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94847",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60456",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3325.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3325.json
index 64e5f10b526..801d7ab3c11 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3325.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3325.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3325",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-19T19:55:06.450",
"lastModified": "2024-11-21T02:07:52.230",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://secunia.com/advisories/60546",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3325",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68691",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3326.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3326.json
index bab674a0b0f..bf709131fd2 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3326.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3326.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3326",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-26T11:11:57.223",
"lastModified": "2024-11-21T02:07:52.350",
"vulnStatus": "Modified",
@@ -79,25 +79,25 @@
"references": [
{
"url": "http://secunia.com/advisories/60455",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3326",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35029",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68877",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -105,7 +105,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030639",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -113,7 +113,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94841",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60455",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3327.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3327.json
index 033ed882cb7..09616ac7676 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3327.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3327.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3327",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-11T22:55:04.617",
"lastModified": "2024-11-21T02:07:52.463",
"vulnStatus": "Modified",
@@ -154,25 +154,25 @@
"references": [
{
"url": "http://secunia.com/advisories/60650",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140806-energywise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69066",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1030682",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -180,7 +180,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95137",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60650",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3328.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3328.json
index 63ccc26c70e..be24e860b4d 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3328.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3328.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3328",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-26T11:11:57.270",
"lastModified": "2024-11-21T02:07:52.583",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3328",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68901",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030643",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -97,7 +97,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94879",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3328",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3329.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3329.json
index 05b8db179ab..bbed1762ae9 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3329.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3329.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3329",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-07-29T20:55:08.520",
"lastModified": "2024-11-21T02:07:52.703",
"vulnStatus": "Modified",
@@ -110,21 +110,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3329",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35065",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/68926",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "http://www.securitytracker.com/id/1030652",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -140,7 +140,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94889",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3329",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3330.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3330.json
index b3db82e371c..a2738a666b4 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3330.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3330.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3330",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-11T22:55:04.663",
"lastModified": "2024-11-21T02:07:52.823",
"vulnStatus": "Modified",
@@ -86,29 +86,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3330",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35181",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69057",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030676",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3330",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3331.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3331.json
index 84a3a3bd2a0..020dea51de0 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3331.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3331.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3331",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-20T11:17:14.250",
"lastModified": "2024-11-21T02:07:52.940",
"vulnStatus": "Modified",
@@ -119,33 +119,33 @@
"references": [
{
"url": "http://secunia.com/advisories/60706",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3331",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35346",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69281",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030747",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95357",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60706",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3332.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3332.json
index c5b86204202..2100a4dce75 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3332.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3332.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3332",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-11T20:55:07.107",
"lastModified": "2024-11-21T02:07:53.053",
"vulnStatus": "Modified",
@@ -75,29 +75,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3332",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35198",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69068",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030687",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95136",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3332",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3333.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3333.json
index a7c973ba2c8..8b0c7c0569d 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3333.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3333.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3333",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-11T20:55:07.170",
"lastModified": "2024-11-21T02:07:53.180",
"vulnStatus": "Modified",
@@ -79,33 +79,33 @@
"references": [
{
"url": "http://secunia.com/advisories/59768",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3333",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35200",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69074",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030688",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95135",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59768",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3334.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3334.json
index 846c62050e4..cc9d78698ac 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3334.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3334.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3334",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:34.937",
"lastModified": "2023-11-07T02:20:06.220",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3335.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3335.json
index 020941124eb..ed920fa3ac1 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3335.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3335.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3335",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-26T10:55:04.573",
"lastModified": "2024-11-21T02:07:53.310",
"vulnStatus": "Modified",
@@ -127,33 +127,33 @@
"references": [
{
"url": "http://secunia.com/advisories/60222",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3335",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35416",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69383",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030757",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95443",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60222",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3336.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3336.json
index 89953b96b5b..22ce60a0aa1 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3336.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3336.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3336",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-11T20:55:07.217",
"lastModified": "2024-11-21T02:07:53.450",
"vulnStatus": "Modified",
@@ -79,33 +79,33 @@
"references": [
{
"url": "http://secunia.com/advisories/59498",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3336",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35228",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69163",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030704",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95187",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59498",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3337.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3337.json
index a719978c8cb..86f98ef92e3 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3337.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3337.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3337",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-12T22:55:02.887",
"lastModified": "2024-11-21T02:07:53.563",
"vulnStatus": "Modified",
@@ -75,33 +75,33 @@
"references": [
{
"url": "http://secunia.com/advisories/60088",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3337",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35257",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69177",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030709",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95245",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60088",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3338.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3338.json
index 0de9a2074df..7a0279faf86 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3338.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3338.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3338",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-12T23:55:03.907",
"lastModified": "2024-11-21T02:07:53.690",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://secunia.com/advisories/60054",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3338",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35258",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69176",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030710",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95246",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60054",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3339.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3339.json
index f7dca2d5bf8..e6db42d27df 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3339.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3339.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3339",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-12T23:55:03.957",
"lastModified": "2024-11-21T02:07:53.813",
"vulnStatus": "Modified",
@@ -79,18 +79,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3339",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69200",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95250",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3339",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3340.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3340.json
index 7ced417becd..b22ed0d40b7 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3340.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3340.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3340",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-20T11:17:14.297",
"lastModified": "2024-11-21T02:07:53.933",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3340",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69285",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030748",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95358",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3340",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3341.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3341.json
index a38e0b9077f..cfc205c687f 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3341.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3341.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3341",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-19T11:16:58.540",
"lastModified": "2024-11-21T02:07:54.053",
"vulnStatus": "Modified",
@@ -415,29 +415,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3341",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35338",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69266",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030746",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95329",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3341",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3342.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3342.json
index 7b8f16a50f5..744b9c4e77e 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3342.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3342.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3342",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-12T01:55:06.967",
"lastModified": "2024-11-21T02:07:54.187",
"vulnStatus": "Modified",
@@ -86,18 +86,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3342",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69735",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95884",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3342",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3343.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3343.json
index 2c411713c9e..549aa6ba96c 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3343.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3343.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3343",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-10T10:55:07.833",
"lastModified": "2024-11-21T02:07:54.307",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://secunia.com/advisories/60122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3343",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35651",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69667",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030816",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95781",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60122",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3344.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3344.json
index c13ac2a8317..b0bda18e7cd 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3344.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3344.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3344",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-28T01:55:03.387",
"lastModified": "2024-11-21T02:07:54.420",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://secunia.com/advisories/60278",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3344",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35431",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69412",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030760",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95482",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60278",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3345.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3345.json
index 60ec4308610..c147512bbea 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3345.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3345.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3345",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-28T23:55:05.483",
"lastModified": "2024-11-21T02:07:54.540",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://secunia.com/advisories/60391",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35468",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69442",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030774",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95589",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60391",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3346.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3346.json
index 3d4b178deae..167220daab2 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3346.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3346.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3346",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-29T09:55:08.087",
"lastModified": "2024-11-21T02:07:54.653",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3346",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69441",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030773",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95588",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3346",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3347.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3347.json
index 88efdf1be3a..02bf84b2e86 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3347.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3347.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3347",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-28T23:55:05.513",
"lastModified": "2024-11-21T02:07:54.767",
"vulnStatus": "Modified",
@@ -116,29 +116,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3347",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35453",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69439",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030772",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95558",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3347",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3348.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3348.json
index 4d98b36c567..6c83d3a49be 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3348.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3348.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3348",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-10T10:55:07.880",
"lastModified": "2024-11-21T02:07:54.907",
"vulnStatus": "Modified",
@@ -117,36 +117,36 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140908-ucse",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3348",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35588",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69652",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030813",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95782",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140908-ucse",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3349.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3349.json
index 70c74f712e5..27aace57ccb 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3349.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3349.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3349",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-29T09:55:08.167",
"lastModified": "2024-11-21T02:07:55.030",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3349",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69455",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030783",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95586",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3349",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3350.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3350.json
index 62dc9b02f65..8205ddb5168 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3350.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3350.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3350",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-29T09:55:08.213",
"lastModified": "2024-11-21T02:07:55.153",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3350",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69457",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030784",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95587",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3350",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3351.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3351.json
index d3a14205cdb..370ea0b1ce0 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3351.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3351.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3351",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-29T09:55:08.290",
"lastModified": "2024-11-21T02:07:55.277",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://secunia.com/advisories/60960",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3351",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69456",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030782",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95585",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60960",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3352.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3352.json
index 1cb80658bb6..7a74d470d26 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3352.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3352.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3352",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-08-30T09:55:05.237",
"lastModified": "2024-11-21T02:07:55.400",
"vulnStatus": "Modified",
@@ -130,33 +130,33 @@
"references": [
{
"url": "http://secunia.com/advisories/60956",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3352",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35479",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69458",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030785",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95605",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60956",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3353.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3353.json
index 10b41b7514f..02675104ca7 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3353.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3353.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3353",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-04T10:55:07.457",
"lastModified": "2024-11-21T02:07:55.527",
"vulnStatus": "Modified",
@@ -85,33 +85,33 @@
"references": [
{
"url": "http://secunia.com/advisories/60205",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3353",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35559",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69506",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030790",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95623",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60205",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3354.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3354.json
index 7688febcc92..dff7a9d008f 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3354.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3354.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3354",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-25T10:55:08.403",
"lastModified": "2024-11-21T02:07:55.643",
"vulnStatus": "Modified",
@@ -724,30 +724,30 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-rsvp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-rsvp/cvrf/cisco-sa-20140924-rsvp_cvrf.xml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/70131",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/70183",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030893",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96178",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-rsvp",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3355.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3355.json
index 2c523e4760f..c5af992ca70 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3355.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3355.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3355",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-25T10:55:08.447",
"lastModified": "2024-11-21T02:07:55.780",
"vulnStatus": "Modified",
@@ -154,26 +154,26 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata/cvrf/cisco-sa-20140924-metadata_cvrf.xml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/70130",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030894",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96175",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3356.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3356.json
index be258fb3e31..0828826c184 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3356.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3356.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3356",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-25T10:55:08.497",
"lastModified": "2024-11-21T02:07:55.903",
"vulnStatus": "Modified",
@@ -154,26 +154,26 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata/cvrf/cisco-sa-20140924-metadata_cvrf.xml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/70135",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030894",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96176",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3357.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3357.json
index fbadd29d66e..f5f1f6e30d8 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3357.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3357.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3357",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-25T10:55:08.557",
"lastModified": "2024-11-21T02:07:56.023",
"vulnStatus": "Modified",
@@ -119,26 +119,26 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-mdns",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-mdns/cvrf/cisco-sa-20140924-mdns_cvrf.xml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/70132",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030898",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96182",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-mdns",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3358.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3358.json
index 7afd2de63c7..817a1491e1f 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3358.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3358.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3358",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-25T10:55:08.590",
"lastModified": "2024-11-21T02:07:56.143",
"vulnStatus": "Modified",
@@ -119,26 +119,26 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-mdns",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-mdns/cvrf/cisco-sa-20140924-mdns_cvrf.xml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/70139",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030898",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96183",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-mdns",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3359.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3359.json
index c4f43806db0..230d1bae9c9 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3359.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3359.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3359",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-25T10:55:08.637",
"lastModified": "2024-11-21T02:07:56.260",
"vulnStatus": "Modified",
@@ -239,26 +239,26 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-dhcpv6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-dhcpv6/cvrf/cisco-sa-20140924-dhcpv6_cvrf.xml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/70140",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030895",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96177",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-dhcpv6",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3360.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3360.json
index ae5852578b2..543b83918e9 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3360.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3360.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3360",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-25T10:55:08.683",
"lastModified": "2024-11-21T02:07:56.390",
"vulnStatus": "Modified",
@@ -299,26 +299,26 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-sip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-sip/cvrf/cisco-sa-20140924-sip_cvrf.xml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/70141",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030897",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96174",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-sip",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3361.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3361.json
index 743624530d0..eb014e7a390 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3361.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3361.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3361",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-25T10:55:08.730",
"lastModified": "2024-11-21T02:07:56.523",
"vulnStatus": "Modified",
@@ -94,26 +94,26 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-nat",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-nat/cvrf/cisco-sa-20140924-nat_cvrf.xml",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/70129",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030896",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96181",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-nat",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3362.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3362.json
index 6f319b30a83..3fea2571f7d 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3362.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3362.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3362",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-12T01:55:07.013",
"lastModified": "2024-11-21T02:07:56.640",
"vulnStatus": "Modified",
@@ -152,25 +152,25 @@
"references": [
{
"url": "http://secunia.com/advisories/61072",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3362",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35674",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95883",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/61072",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3363.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3363.json
index b5d102f72bf..898d769dca2 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3363.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3363.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3363",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-12T01:55:07.060",
"lastModified": "2024-11-21T02:07:56.763",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://secunia.com/advisories/59105",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3363",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35672",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69739",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030836",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95882",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59105",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3364.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3364.json
index 626a0593717..4b057bf22d5 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3364.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3364.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3364",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-13T00:59:00.070",
"lastModified": "2024-11-21T02:07:56.880",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3364",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36741",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3365.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3365.json
index 0638561d3ae..4648742288d 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3365.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3365.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3365",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-12T01:59:19.030",
"lastModified": "2024-11-21T02:07:56.993",
"vulnStatus": "Modified",
@@ -75,25 +75,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3365",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37418",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031716",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100756",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3365",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3366.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3366.json
index 4609662babd..9f9abcc9ef2 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3366.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3366.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3366",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-31T10:55:02.033",
"lastModified": "2024-11-21T02:07:57.117",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3366",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/70855",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031160",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98405",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3366",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3367.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3367.json
index cc5f1b02aac..a89a8fec71b 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3367.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3367.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3367",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-20T10:55:04.840",
"lastModified": "2024-11-21T02:07:57.240",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://secunia.com/advisories/61426",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3367",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/70010",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030881",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96126",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/61426",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3368.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3368.json
index 1ae181eb243..d63c62a701a 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3368.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3368.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3368",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-19T01:55:13.480",
"lastModified": "2024-11-21T02:07:57.360",
"vulnStatus": "Modified",
@@ -81,25 +81,25 @@
"references": [
{
"url": "http://secunia.com/advisories/60850",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35827",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031055",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60850",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3369.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3369.json
index 9bb2434f166..f254ebfec14 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3369.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3369.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3369",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-19T01:55:13.527",
"lastModified": "2024-11-21T02:07:57.480",
"vulnStatus": "Modified",
@@ -91,22 +91,22 @@
"references": [
{
"url": "http://secunia.com/advisories/60850",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35828",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031055",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60850",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3370.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3370.json
index 41462bc6670..11df547df42 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3370.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3370.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3370",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-19T01:55:13.560",
"lastModified": "2024-11-21T02:07:57.600",
"vulnStatus": "Modified",
@@ -91,25 +91,25 @@
"references": [
{
"url": "http://secunia.com/advisories/60850",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35829",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031055",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60850",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3371.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3371.json
index b9c999b04ec..09ec95c520c 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3371.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3371.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3371",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:34.967",
"lastModified": "2023-11-07T02:20:06.770",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3372.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3372.json
index 7c33097cbf6..68cc5059897 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3372.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3372.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3372",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-31T10:55:02.097",
"lastModified": "2024-11-21T02:07:57.723",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://secunia.com/advisories/61003",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3372",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36292",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/70846",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031159",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98404",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/61003",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3373.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3373.json
index c46886c48a2..ae784cfdfef 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3373.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3373.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3373",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-31T10:55:02.143",
"lastModified": "2024-11-21T02:07:57.833",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://secunia.com/advisories/59692",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3373",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36294",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/70848",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031161",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98406",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59692",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3374.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3374.json
index 0c479efb111..ccedccef893 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3374.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3374.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3374",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-31T10:55:02.190",
"lastModified": "2024-11-21T02:07:57.947",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://secunia.com/advisories/59696",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3374",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36295",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/70849",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031162",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98407",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59696",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3375.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3375.json
index 5169135dde6..e47465bcca8 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3375.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3375.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3375",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-31T10:55:02.237",
"lastModified": "2024-11-21T02:07:58.057",
"vulnStatus": "Modified",
@@ -74,30 +74,30 @@
"references": [
{
"url": "http://secunia.com/advisories/61025",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3375",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36297",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/70850",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031163",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98408",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/61025",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3376.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3376.json
index 38a6da17de4..9b9ddd7e371 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3376.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3376.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3376",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-20T10:55:04.887",
"lastModified": "2024-11-21T02:07:58.170",
"vulnStatus": "Modified",
@@ -344,33 +344,33 @@
"references": [
{
"url": "http://secunia.com/advisories/59638",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3376",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35773",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69956",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030878",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96065",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59638",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3377.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3377.json
index b92234ea748..eb36a6524b7 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3377.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3377.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3377",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-20T10:55:04.933",
"lastModified": "2024-11-21T02:07:58.300",
"vulnStatus": "Modified",
@@ -344,33 +344,33 @@
"references": [
{
"url": "http://secunia.com/advisories/59606",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3377",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35774",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69959",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030878",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96066",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59606",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3378.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3378.json
index f4da513068f..91ca11f11ba 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3378.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3378.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3378",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-20T10:55:04.980",
"lastModified": "2024-11-21T02:07:58.427",
"vulnStatus": "Modified",
@@ -344,37 +344,37 @@
"references": [
{
"url": "http://secunia.com/advisories/59632",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59649",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3378",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35775",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69957",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030878",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96067",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/59632",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3379.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3379.json
index 4661f7cd32e..555fe838d6e 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3379.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3379.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3379",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-20T10:55:05.027",
"lastModified": "2024-11-21T02:07:58.547",
"vulnStatus": "Modified",
@@ -361,33 +361,33 @@
"references": [
{
"url": "http://secunia.com/advisories/61372",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3379",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35776",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/69960",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030878",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96068",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/61372",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3380.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3380.json
index f17dd414e06..6edca11946a 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3380.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3380.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3380",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-24T00:55:02.870",
"lastModified": "2024-11-21T02:07:58.673",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3380",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35803",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/70044",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1030885",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96146",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3380",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3381.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3381.json
index c4002d0a138..be2d9002e4f 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3381.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3381.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3381",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-19T01:55:13.607",
"lastModified": "2024-11-21T02:07:58.787",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3381",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36062",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3382.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3382.json
index 6a04ff47afb..0d1882341bf 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3382.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3382.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3382",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T10:55:06.133",
"lastModified": "2024-11-21T02:07:58.893",
"vulnStatus": "Modified",
@@ -204,7 +204,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3383.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3383.json
index c98bdc406b4..9d317184bc9 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3383.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3383.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3383",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T10:55:06.197",
"lastModified": "2024-11-21T02:07:59.010",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/70302",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3384.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3384.json
index 2f4a47d6e8c..fb6ada4a94e 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3384.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3384.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3384",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T10:55:06.243",
"lastModified": "2024-11-21T02:07:59.123",
"vulnStatus": "Modified",
@@ -119,7 +119,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3385.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3385.json
index a512a6768cb..1d44c940cd4 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3385.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3385.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3385",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T10:55:06.290",
"lastModified": "2024-11-21T02:07:59.230",
"vulnStatus": "Modified",
@@ -149,7 +149,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3386.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3386.json
index bd078c1930d..9b8ea5e791b 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3386.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3386.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3386",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T10:55:06.337",
"lastModified": "2024-11-21T02:07:59.337",
"vulnStatus": "Modified",
@@ -169,7 +169,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3387.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3387.json
index 92d217bc51b..c7c97fff8c2 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3387.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3387.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3387",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T10:55:06.383",
"lastModified": "2024-11-21T02:07:59.443",
"vulnStatus": "Modified",
@@ -204,7 +204,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3388.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3388.json
index 7d44049bd49..605c432ca4a 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3388.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3388.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3388",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T10:55:06.430",
"lastModified": "2024-11-21T02:07:59.553",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3389.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3389.json
index ca672700a4d..aa5e15856eb 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3389.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3389.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3389",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T10:55:06.477",
"lastModified": "2024-11-21T02:07:59.653",
"vulnStatus": "Modified",
@@ -199,7 +199,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3390.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3390.json
index e27b936c3ae..2028d782f8c 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3390.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3390.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3390",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T10:55:06.507",
"lastModified": "2024-11-21T02:07:59.763",
"vulnStatus": "Modified",
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3391.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3391.json
index fca90882e4c..cad3f6120ee 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3391.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3391.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3391",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T10:55:06.557",
"lastModified": "2024-11-21T02:07:59.863",
"vulnStatus": "Modified",
@@ -399,7 +399,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3392.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3392.json
index e870aafb7cc..1c77902619e 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3392.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3392.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3392",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T10:55:06.603",
"lastModified": "2024-11-21T02:08:00.000",
"vulnStatus": "Modified",
@@ -594,7 +594,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3393.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3393.json
index fc82d46932a..e9c3c4d5876 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3393.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3393.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3393",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T10:55:06.650",
"lastModified": "2024-11-21T02:08:00.143",
"vulnStatus": "Modified",
@@ -579,7 +579,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3394.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3394.json
index e7046ed075e..b5c38235ca1 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3394.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3394.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3394",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T10:55:06.680",
"lastModified": "2024-11-21T02:08:00.277",
"vulnStatus": "Modified",
@@ -476,7 +476,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3395.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3395.json
index f81c180d05b..43b785b9eae 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3395.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3395.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3395",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-09-30T22:55:06.153",
"lastModified": "2024-11-21T02:08:00.400",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3395",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35876",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3396.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3396.json
index 5ce404b530a..2dd6979801e 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3396.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3396.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3396",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-05T01:55:13.110",
"lastModified": "2024-11-21T02:08:00.510",
"vulnStatus": "Modified",
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3396",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3397.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3397.json
index b665a0fc0b3..1b8af6b9105 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3397.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3397.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3397",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-19T01:55:13.637",
"lastModified": "2024-11-21T02:08:00.623",
"vulnStatus": "Modified",
@@ -75,22 +75,22 @@
"references": [
{
"url": "http://secunia.com/advisories/60855",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-mcu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36016",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031054",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60855",
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3398.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3398.json
index edb84d57723..79bfa749f62 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3398.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3398.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3398",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-05T01:55:13.173",
"lastModified": "2024-11-21T02:08:00.727",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3398",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-33xx/CVE-2014-3399.json b/CVE-2014/CVE-2014-33xx/CVE-2014-3399.json
index 26d3bd524e7..ad153e887ea 100644
--- a/CVE-2014/CVE-2014-33xx/CVE-2014-3399.json
+++ b/CVE-2014/CVE-2014-33xx/CVE-2014-3399.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3399",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-07T10:55:04.150",
"lastModified": "2024-11-21T02:08:00.830",
"vulnStatus": "Modified",
@@ -75,7 +75,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3399",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Vendor Advisory"
@@ -83,7 +83,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35989",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-34xx/CVE-2014-3400.json b/CVE-2014/CVE-2014-34xx/CVE-2014-3400.json
index 35377534e92..91038c13e44 100644
--- a/CVE-2014/CVE-2014-34xx/CVE-2014-3400.json
+++ b/CVE-2014/CVE-2014-34xx/CVE-2014-3400.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3400",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-05T01:55:13.237",
"lastModified": "2024-11-21T02:08:00.940",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3400",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-34xx/CVE-2014-3402.json b/CVE-2014/CVE-2014-34xx/CVE-2014-3402.json
index a38c7f24aec..ed2fc82c179 100644
--- a/CVE-2014/CVE-2014-34xx/CVE-2014-3402.json
+++ b/CVE-2014/CVE-2014-34xx/CVE-2014-3402.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3402",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T10:55:06.727",
"lastModified": "2024-11-21T02:08:01.057",
"vulnStatus": "Modified",
@@ -120,14 +120,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3402",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36014",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-34xx/CVE-2014-3403.json b/CVE-2014/CVE-2014-34xx/CVE-2014-3403.json
index 3dc2e5ae321..21aca749c3a 100644
--- a/CVE-2014/CVE-2014-34xx/CVE-2014-3403.json
+++ b/CVE-2014/CVE-2014-34xx/CVE-2014-3403.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3403",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T01:55:09.070",
"lastModified": "2024-11-21T02:08:01.167",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3403",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-34xx/CVE-2014-3404.json b/CVE-2014/CVE-2014-34xx/CVE-2014-3404.json
index 80e749f20e1..b951348a2c1 100644
--- a/CVE-2014/CVE-2014-34xx/CVE-2014-3404.json
+++ b/CVE-2014/CVE-2014-34xx/CVE-2014-3404.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3404",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T01:55:09.150",
"lastModified": "2024-11-21T02:08:01.280",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3404",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-34xx/CVE-2014-3405.json b/CVE-2014/CVE-2014-34xx/CVE-2014-3405.json
index 47982d237cc..483e08f4a63 100644
--- a/CVE-2014/CVE-2014-34xx/CVE-2014-3405.json
+++ b/CVE-2014/CVE-2014-34xx/CVE-2014-3405.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3405",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-10T01:55:09.290",
"lastModified": "2024-11-21T02:08:01.393",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3405",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-34xx/CVE-2014-3406.json b/CVE-2014/CVE-2014-34xx/CVE-2014-3406.json
index 371ace96274..5be56300152 100644
--- a/CVE-2014/CVE-2014-34xx/CVE-2014-3406.json
+++ b/CVE-2014/CVE-2014-34xx/CVE-2014-3406.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3406",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-19T01:55:13.683",
"lastModified": "2024-11-21T02:08:01.513",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3406",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36078",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-34xx/CVE-2014-3407.json b/CVE-2014/CVE-2014-34xx/CVE-2014-3407.json
index e1a6746e2d2..cf0a3f990db 100644
--- a/CVE-2014/CVE-2014-34xx/CVE-2014-3407.json
+++ b/CVE-2014/CVE-2014-34xx/CVE-2014-3407.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3407",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-28T02:59:00.080",
"lastModified": "2024-11-21T02:08:01.623",
"vulnStatus": "Modified",
@@ -75,7 +75,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3407",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Vendor Advisory"
@@ -83,7 +83,7 @@
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36542",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-34xx/CVE-2014-3408.json b/CVE-2014/CVE-2014-34xx/CVE-2014-3408.json
index 6c04f35609a..41da7c3feb3 100644
--- a/CVE-2014/CVE-2014-34xx/CVE-2014-3408.json
+++ b/CVE-2014/CVE-2014-34xx/CVE-2014-3408.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3408",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-19T01:55:13.717",
"lastModified": "2024-11-21T02:08:01.733",
"vulnStatus": "Modified",
@@ -74,21 +74,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3408",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36099",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/70594",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3408",
diff --git a/CVE-2014/CVE-2014-34xx/CVE-2014-3409.json b/CVE-2014/CVE-2014-34xx/CVE-2014-3409.json
index 5869e7fc526..89bf88787f8 100644
--- a/CVE-2014/CVE-2014-34xx/CVE-2014-3409.json
+++ b/CVE-2014/CVE-2014-34xx/CVE-2014-3409.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3409",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-10-25T10:55:05.790",
"lastModified": "2024-11-21T02:08:01.853",
"vulnStatus": "Modified",
@@ -81,25 +81,25 @@
"references": [
{
"url": "http://secunia.com/advisories/61799",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3409",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36184",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/70715",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -107,7 +107,7 @@
},
{
"url": "http://www.securitytracker.com/id/1031119",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97758",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/61799",
diff --git a/CVE-2014/CVE-2014-34xx/CVE-2014-3410.json b/CVE-2014/CVE-2014-34xx/CVE-2014-3410.json
index 73f34eb773e..5b7a08ffd7d 100644
--- a/CVE-2014/CVE-2014-34xx/CVE-2014-3410.json
+++ b/CVE-2014/CVE-2014-34xx/CVE-2014-3410.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-3410",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-20T00:59:00.057",
"lastModified": "2024-11-21T02:08:01.970",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3410",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7988.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7988.json
index b81d3008ef6..f3e60fb6179 100644
--- a/CVE-2014/CVE-2014-79xx/CVE-2014-7988.json
+++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7988.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-7988",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-07T11:55:03.813",
"lastModified": "2024-11-21T02:18:23.063",
"vulnStatus": "Modified",
@@ -75,29 +75,29 @@
"references": [
{
"url": "http://secunia.com/advisories/62106",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7988",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36340",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031177",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98493",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62106",
diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7989.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7989.json
index a2976e498d3..1766a9eb560 100644
--- a/CVE-2014/CVE-2014-79xx/CVE-2014-7989.json
+++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7989.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-7989",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-07T11:55:03.860",
"lastModified": "2024-11-21T02:18:23.170",
"vulnStatus": "Modified",
@@ -109,22 +109,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7989",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/70969",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031178",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98530",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7989",
diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7990.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7990.json
index 8d069edb075..505b5f4ba0b 100644
--- a/CVE-2014/CVE-2014-79xx/CVE-2014-7990.json
+++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7990.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-7990",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-07T11:55:03.907",
"lastModified": "2024-11-21T02:18:23.293",
"vulnStatus": "Modified",
@@ -97,29 +97,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36351",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/70968",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031179",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98529",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7990",
diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7991.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7991.json
index a3d9b466489..a8819da1a60 100644
--- a/CVE-2014/CVE-2014-79xx/CVE-2014-7991.json
+++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7991.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-7991",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-14T00:59:03.807",
"lastModified": "2024-11-21T02:18:23.403",
"vulnStatus": "Modified",
@@ -80,33 +80,33 @@
"references": [
{
"url": "http://secunia.com/advisories/62267",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7991",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36381",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71013",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031181",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98574",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62267",
diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7992.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7992.json
index a97de179b36..392b997c092 100644
--- a/CVE-2014/CVE-2014-79xx/CVE-2014-7992.json
+++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7992.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-7992",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-18T01:59:07.217",
"lastModified": "2024-11-21T02:18:23.510",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7992",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36453",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71145",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031220",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98724",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7992",
diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7993.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7993.json
index 728a2531211..c9c9ba64901 100644
--- a/CVE-2014/CVE-2014-79xx/CVE-2014-7993.json
+++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7993.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-7993",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-24T00:59:00.063",
"lastModified": "2024-11-21T02:18:23.620",
"vulnStatus": "Modified",
@@ -143,14 +143,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36797",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://dashboard.meraki.com/firmware_security",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36797",
diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7994.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7994.json
index 82f8161aa2c..2e6d40cfd27 100644
--- a/CVE-2014/CVE-2014-79xx/CVE-2014-7994.json
+++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7994.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-7994",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-24T00:59:01.547",
"lastModified": "2024-11-21T02:18:23.730",
"vulnStatus": "Modified",
@@ -143,14 +143,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36798",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://dashboard.meraki.com/firmware_security",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36798",
diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7995.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7995.json
index da81f9d083f..409790b82df 100644
--- a/CVE-2014/CVE-2014-79xx/CVE-2014-7995.json
+++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7995.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-7995",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-24T00:59:02.423",
"lastModified": "2024-11-21T02:18:23.833",
"vulnStatus": "Modified",
@@ -143,14 +143,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36799",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://dashboard.meraki.com/firmware_security",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36799",
diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7996.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7996.json
index 6a3b7a17d6e..386428a5b11 100644
--- a/CVE-2014/CVE-2014-79xx/CVE-2014-7996.json
+++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7996.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-7996",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-18T23:59:04.567",
"lastModified": "2024-11-21T02:18:23.947",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://secunia.com/advisories/62565",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7996",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71171",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98769",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62565",
diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7997.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7997.json
index 0bb2d55fa05..8eed568ebea 100644
--- a/CVE-2014/CVE-2014-79xx/CVE-2014-7997.json
+++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7997.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-7997",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-15T02:59:01.517",
"lastModified": "2024-11-21T02:18:24.057",
"vulnStatus": "Modified",
@@ -191,18 +191,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031218",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997",
diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7998.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7998.json
index 33555690254..923e817c77c 100644
--- a/CVE-2014/CVE-2014-79xx/CVE-2014-7998.json
+++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7998.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-7998",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-15T02:59:02.893",
"lastModified": "2024-11-21T02:18:24.163",
"vulnStatus": "Modified",
@@ -191,18 +191,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031219",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98692",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998",
diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7999.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7999.json
index 47893eebceb..b63fd35e9b6 100644
--- a/CVE-2014/CVE-2014-79xx/CVE-2014-7999.json
+++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7999.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-7999",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-24T00:59:03.343",
"lastModified": "2024-11-21T02:18:24.277",
"vulnStatus": "Modified",
@@ -143,14 +143,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36800",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://dashboard.meraki.com/firmware_security",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36800",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8000.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8000.json
index 442ba608a0e..bf6720bf1fc 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8000.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8000.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8000",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-21T02:59:05.630",
"lastModified": "2024-11-21T02:18:24.383",
"vulnStatus": "Modified",
@@ -74,33 +74,33 @@
"references": [
{
"url": "http://secunia.com/advisories/62558",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36467",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71173",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031240",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98786",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62558",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8001.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8001.json
index 97edb8f1201..0857d46bd9b 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8001.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8001.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8001",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-25T17:59:00.080",
"lastModified": "2024-11-21T02:18:24.490",
"vulnStatus": "Modified",
@@ -75,7 +75,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36500",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -83,7 +83,7 @@
},
{
"url": "https://github.com/cisco/openh264/pull/1088/files",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8002.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8002.json
index a23ca7c1ce6..5da9e053399 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8002.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8002.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8002",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-25T17:59:01.627",
"lastModified": "2024-11-21T02:18:24.590",
"vulnStatus": "Modified",
@@ -75,7 +75,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36501",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -83,7 +83,7 @@
},
{
"url": "https://github.com/cisco/openh264/pull/1096/files",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch"
]
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8003.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8003.json
index da5bcb2a831..0ba7155b24a 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8003.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8003.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8003",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-10T21:59:14.303",
"lastModified": "2024-11-21T02:18:24.693",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8003",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36562",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8004.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8004.json
index 00ffe728dab..d1102b12b56 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8004.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8004.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8004",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-25T17:59:03.003",
"lastModified": "2024-11-21T02:18:24.800",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8004",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031258",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98923",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8004",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8005.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8005.json
index bbe9c223f6d..3b3b332197b 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8005.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8005.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8005",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-11-26T02:59:04.450",
"lastModified": "2024-11-21T02:18:24.907",
"vulnStatus": "Modified",
@@ -75,29 +75,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8005",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36532",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71287",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031262",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98937",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8005",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8006.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8006.json
index 7bc2dfc7fd0..50592167d1c 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8006.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8006.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8006",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-17T00:59:02.330",
"lastModified": "2024-11-21T02:18:25.017",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8006",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8007.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8007.json
index 022b54e6bcb..9b81d5e1a10 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8007.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8007.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8007",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-20T00:59:01.290",
"lastModified": "2024-11-21T02:18:25.127",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8007",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031416",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8007",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8008.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8008.json
index b11fb2ff722..eaa4e6c5d73 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8008.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8008.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8008",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-22T14:01:14.913",
"lastModified": "2024-11-21T02:18:25.240",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8008",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72263",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031604",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=37111",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8008",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8009.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8009.json
index dc5788ab12e..7d997420d7e 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8009.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8009.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8009",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-10T21:59:15.337",
"lastModified": "2024-11-21T02:18:25.353",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8009",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36640",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8010.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8010.json
index a47fb1ec441..64c1b25b3fa 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8010.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8010.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8010",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-10T21:59:16.290",
"lastModified": "2024-11-21T02:18:25.463",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8010",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031339",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8010",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8012.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8012.json
index 2bd4373c978..6397976e2e0 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8012.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8012.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8012",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-18T16:59:15.223",
"lastModified": "2024-11-21T02:18:25.570",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8012",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031395",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8012",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8013.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8013.json
index 5794642b1f9..1ef81bbe759 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8013.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8013.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8013",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-03T22:59:00.050",
"lastModified": "2024-11-21T02:18:25.680",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8013",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72393",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031685",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8013",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8014.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8014.json
index 7c412c33341..36b6647b280 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8014.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8014.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8014",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-18T16:59:16.817",
"lastModified": "2024-11-21T02:18:25.797",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8014",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031396",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8014",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8015.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8015.json
index 4a272ca65c8..61fc1ded9f6 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8015.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8015.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8015",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-22T19:59:00.053",
"lastModified": "2024-11-21T02:18:25.903",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8015",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031423",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8015",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8016.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8016.json
index d44244c44de..8caa8ce6522 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8016.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8016.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8016",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-19T02:59:04.813",
"lastModified": "2024-11-21T02:18:26.007",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8016",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8017.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8017.json
index af33b2ac2aa..b91c77cdd03 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8017.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8017.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8017",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-22T19:59:01.287",
"lastModified": "2024-11-21T02:18:26.130",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8017",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71767",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031425",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8017",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8018.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8018.json
index 8fcd1f1b16a..9d3917b0e96 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8018.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8018.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8018",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-22T19:59:02.303",
"lastModified": "2024-11-21T02:18:26.240",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8018",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71771",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031424",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8018",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8019.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8019.json
index 57a2723e915..d396851ecfe 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8019.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8019.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8019",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-20T00:59:02.460",
"lastModified": "2024-11-21T02:18:26.350",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8019",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031417",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8019",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8020.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8020.json
index 048ca1df557..b09bb549e3e 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8020.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8020.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8020",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-10T02:59:29.147",
"lastModified": "2024-11-21T02:18:26.453",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8020",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71975",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031520",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100573",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8020",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8021.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8021.json
index 077078be8fa..71f8c9bf1d0 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8021.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8021.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8021",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-03T22:59:01.253",
"lastModified": "2024-11-21T02:18:26.567",
"vulnStatus": "Modified",
@@ -91,25 +91,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8021",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37323",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72475",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100666",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8021",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8022.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8022.json
index c37631b64c5..13420268448 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8022.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8022.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8022",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-15T22:59:01.413",
"lastModified": "2024-11-21T02:18:26.677",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8022",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72083",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031560",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100664",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=37045",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8022",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8023.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8023.json
index aff7bc7d1b2..7243cbb907e 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8023.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8023.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8023",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-17T01:59:02.270",
"lastModified": "2024-11-21T02:18:26.787",
"vulnStatus": "Modified",
@@ -75,29 +75,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8023",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37489",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72618",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031755",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100922",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8023",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8024.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8024.json
index 2a882a28861..e64368cfc1d 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8024.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8024.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8024",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-23T02:59:04.453",
"lastModified": "2024-11-21T02:18:26.897",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8024",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71770",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031422",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=36870",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8024",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8025.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8025.json
index d6555cf7081..6e716d209e3 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8025.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8025.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8025",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-23T02:59:05.670",
"lastModified": "2024-11-21T02:18:27.007",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8025",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71768",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031422",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=36871",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8025",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8026.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8026.json
index f24c718325c..0bb1a507f4c 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8026.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8026.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8026",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2014-12-23T02:59:06.593",
"lastModified": "2024-11-21T02:18:27.123",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8026",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71769",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031422",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=36872",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8026",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8027.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8027.json
index 24a639f6a1e..bafce259b65 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8027.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8027.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8027",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-09T02:59:03.383",
"lastModified": "2024-11-21T02:18:27.240",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://secunia.com/advisories/62159",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8027",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71944",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031516",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100558",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62159",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8028.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8028.json
index cdcf8793d1b..086f1f17d8c 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8028.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8028.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8028",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-09T02:59:04.397",
"lastModified": "2024-11-21T02:18:27.363",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://secunia.com/advisories/62159",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8028",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71946",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031515",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100553",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62159",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8029.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8029.json
index 273335469b1..82e66d4a51c 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8029.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8029.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8029",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-09T02:59:05.257",
"lastModified": "2024-11-21T02:18:27.470",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://secunia.com/advisories/62159",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8029",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71948",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031514",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100548",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62159",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8030.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8030.json
index 9e625a353c7..348f9283cef 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8030.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8030.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8030",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-09T02:59:06.023",
"lastModified": "2024-11-21T02:18:27.573",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://secunia.com/advisories/62163",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8030",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71945",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031517",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100574",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62163",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8031.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8031.json
index b62fc545c5d..704a0d7e4d3 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8031.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8031.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8031",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-09T02:59:06.773",
"lastModified": "2024-11-21T02:18:27.677",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://secunia.com/advisories/62173",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8031",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71943",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031517",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100575",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62173",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8032.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8032.json
index 2b86e1597a6..9bb197a095b 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8032.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8032.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8032",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-09T02:59:07.727",
"lastModified": "2024-11-21T02:18:27.787",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8032",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71947",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031517",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100564",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8032",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8033.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8033.json
index 4a812a99d07..a5de07d744e 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8033.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8033.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8033",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-09T02:59:08.587",
"lastModified": "2024-11-21T02:18:27.897",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://secunia.com/advisories/60279",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8033",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71950",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031517",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100572",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60279",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8034.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8034.json
index c8e1af81192..24d07970907 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8034.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8034.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8034",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-15T22:59:02.727",
"lastModified": "2024-11-21T02:18:28.010",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8034",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71978",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031543",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100552",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8034",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8035.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8035.json
index cec1acfd58a..0a2b16a9979 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8035.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8035.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8035",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-10T02:59:30.070",
"lastModified": "2024-11-21T02:18:28.123",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8035",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71980",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100662",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8035",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8036.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8036.json
index 2d0cf75b2ba..0661be4acd1 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8036.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8036.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8036",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-10T02:59:30.977",
"lastModified": "2024-11-21T02:18:28.227",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://secunia.com/advisories/60330",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8036",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71982",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100571",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/60330",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8038.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8038.json
index 111022c4edb..4d816d0c629 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8038.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8038.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8038",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:39.717",
"lastModified": "2023-11-07T02:22:07.033",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8039.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8039.json
index 654d505396c..1de80fe2ab6 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8039.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8039.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8039",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:39.733",
"lastModified": "2023-11-07T02:22:07.250",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8040.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8040.json
index 2422485b53b..99daf2911a0 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8040.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8040.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8040",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:39.763",
"lastModified": "2023-11-07T02:22:07.537",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8041.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8041.json
index fa56f944b5b..60519d1039a 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8041.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8041.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8041",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:39.780",
"lastModified": "2023-11-07T02:22:07.800",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8042.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8042.json
index cb6105e15a5..9994a918462 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8042.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8042.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8042",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:39.797",
"lastModified": "2023-11-07T02:22:08.040",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8043.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8043.json
index ab4be5a4f40..0d6fcc0ae91 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8043.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8043.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8043",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:39.827",
"lastModified": "2023-11-07T02:22:08.280",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8044.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8044.json
index 140f6c5d47a..ce6039e0cc4 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8044.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8044.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8044",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:39.843",
"lastModified": "2023-11-07T02:22:08.517",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8045.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8045.json
index 4564b4e185f..3191fde9e74 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8045.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8045.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8045",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:39.857",
"lastModified": "2023-11-07T02:22:08.757",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8046.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8046.json
index 929f77ab76f..dd303f885f7 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8046.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8046.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8046",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:39.887",
"lastModified": "2023-11-07T02:22:08.990",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8047.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8047.json
index 4c944ffb122..72eedecb304 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8047.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8047.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8047",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:39.920",
"lastModified": "2023-11-07T02:22:09.230",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8048.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8048.json
index 8723f3a093d..efda24636a8 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8048.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8048.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8048",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:39.950",
"lastModified": "2023-11-07T02:22:09.457",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8049.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8049.json
index 082c92fa110..7333d7c0933 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8049.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8049.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8049",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:39.967",
"lastModified": "2023-11-07T02:22:09.777",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8050.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8050.json
index 6db6a57fb27..3a2060e57d9 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8050.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8050.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8050",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:39.997",
"lastModified": "2023-11-07T02:22:09.997",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8051.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8051.json
index 85552766cff..238f89dbbaf 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8051.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8051.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8051",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.013",
"lastModified": "2023-11-07T02:22:10.247",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8052.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8052.json
index 1edd541e779..50655c31aa9 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8052.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8052.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8052",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.030",
"lastModified": "2023-11-07T02:22:10.473",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8053.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8053.json
index 17bce2118fb..1a5b12511ef 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8053.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8053.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8053",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.060",
"lastModified": "2023-11-07T02:22:10.777",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8054.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8054.json
index 9bc9f739685..9f5968e35d0 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8054.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8054.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8054",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.077",
"lastModified": "2023-11-07T02:22:11.017",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8055.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8055.json
index bd9a3bfd1a9..1b1ed5acc2f 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8055.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8055.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8055",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.107",
"lastModified": "2023-11-07T02:22:11.253",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8056.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8056.json
index de3ac1b443c..8de05f22ca3 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8056.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8056.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8056",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.123",
"lastModified": "2023-11-07T02:22:11.490",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8057.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8057.json
index 802eb7fa689..05a9580308e 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8057.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8057.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8057",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.153",
"lastModified": "2023-11-07T02:22:11.727",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8058.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8058.json
index 531f6952134..c651b66a32c 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8058.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8058.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8058",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.170",
"lastModified": "2023-11-07T02:22:11.970",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8059.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8059.json
index 78f06252d9d..a2134e992c9 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8059.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8059.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8059",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.200",
"lastModified": "2023-11-07T02:22:12.227",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8060.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8060.json
index 7777a45c48b..da2a7eab28d 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8060.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8060.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8060",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.233",
"lastModified": "2023-11-07T02:22:12.473",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8061.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8061.json
index f92273841b5..e14809ff3be 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8061.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8061.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8061",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.247",
"lastModified": "2023-11-07T02:22:12.733",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8062.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8062.json
index 4abe6d1e628..d88bc113b44 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8062.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8062.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8062",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.280",
"lastModified": "2023-11-07T02:22:12.967",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8063.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8063.json
index 76abc06cc9f..b89ff3018af 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8063.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8063.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8063",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.297",
"lastModified": "2023-11-07T02:22:13.207",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8064.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8064.json
index c9fadaecb67..7ce0fceb060 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8064.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8064.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8064",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.327",
"lastModified": "2023-11-07T02:22:13.440",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8065.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8065.json
index 5a239023fa2..8b02b1a6937 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8065.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8065.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8065",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.343",
"lastModified": "2023-11-07T02:22:13.690",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8066.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8066.json
index 32be85f2179..471e8377421 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8066.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8066.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8066",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.373",
"lastModified": "2023-11-07T02:22:13.960",
"vulnStatus": "Rejected",
diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8067.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8067.json
index 469feefaa27..b37ba9ff2a0 100644
--- a/CVE-2014/CVE-2014-80xx/CVE-2014-8067.json
+++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8067.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2014-8067",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:40.390",
"lastModified": "2023-11-07T02:22:14.193",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0577.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0577.json
index 820f64f18c7..a22c72db077 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0577.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0577.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0577",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-14T19:59:01.600",
"lastModified": "2024-11-21T02:23:21.030",
"vulnStatus": "Modified",
@@ -74,26 +74,26 @@
"references": [
{
"url": "http://secunia.com/advisories/62289",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72056",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031544",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62289",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0578.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0578.json
index 6d95a828e38..6d60b31a415 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0578.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0578.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0578",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-14T19:59:02.740",
"lastModified": "2024-11-21T02:23:21.140",
"vulnStatus": "Modified",
@@ -78,14 +78,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0578",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72718",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -93,7 +93,7 @@
},
{
"url": "http://www.securitytracker.com/id/1031542",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -101,11 +101,11 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100549",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=37022",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0579.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0579.json
index 4b31b792cde..341d7a889c9 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0579.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0579.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0579",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-14T19:59:03.633",
"lastModified": "2024-11-21T02:23:21.257",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0579",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72057",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -94,7 +94,7 @@
},
{
"url": "http://www.securitytracker.com/id/1031541",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -102,7 +102,7 @@
},
{
"url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=37007",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0580.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0580.json
index 6a558d74d52..4eba6bf6f53 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0580.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0580.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0580",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-12T01:59:21.593",
"lastModified": "2024-11-21T02:23:21.360",
"vulnStatus": "Modified",
@@ -75,22 +75,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150211-csacs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72576",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031740",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100812",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150211-csacs",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0581.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0581.json
index 8e91d9e2681..85819f3e2a3 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0581.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0581.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0581",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-28T22:59:02.937",
"lastModified": "2024-11-21T02:23:21.463",
"vulnStatus": "Modified",
@@ -75,18 +75,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-psc-xmlee",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72350",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031658",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-psc-xmlee",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0582.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0582.json
index b03d0765706..d98f93b1eda 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0582.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0582.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0582",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-10T02:59:43.367",
"lastModified": "2024-11-21T02:23:21.563",
"vulnStatus": "Modified",
@@ -86,14 +86,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0582",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/71979",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -101,7 +101,7 @@
},
{
"url": "http://www.securitytracker.com/id/1031539",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99995",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0582",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0583.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0583.json
index 4a695b44989..766d9e1e219 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0583.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0583.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0583",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-14T19:59:04.867",
"lastModified": "2024-11-21T02:23:21.670",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0583",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72012",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100565",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0583",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0584.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0584.json
index 28c8c386a7d..f35a0570ee6 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0584.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0584.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0584",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-20T02:59:00.067",
"lastModified": "2024-11-21T02:23:21.770",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0584",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72696",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0584",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0586.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0586.json
index 3c6ed514615..a51e48d28b3 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0586.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0586.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0586",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-28T22:59:04.153",
"lastModified": "2024-11-21T02:23:21.873",
"vulnStatus": "Modified",
@@ -87,21 +87,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0586",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37171",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72309",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "http://www.securitytracker.com/id/1031659",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -117,7 +117,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100660",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0586",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0588.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0588.json
index 768b7f0c965..5d7b8628c79 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0588.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0588.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0588",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-15T22:59:05.460",
"lastModified": "2024-11-21T02:23:21.983",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://secunia.com/advisories/62352",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0588",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72082",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -93,7 +93,7 @@
},
{
"url": "http://www.securitytracker.com/id/1031559",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -101,7 +101,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100657",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62352",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0589.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0589.json
index 2d1b41a136b..f4a1e92c7d8 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0589.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0589.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0589",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-07T15:59:06.143",
"lastModified": "2024-11-21T02:23:22.090",
"vulnStatus": "Modified",
@@ -84,26 +84,26 @@
"references": [
{
"url": "http://secunia.com/advisories/62799",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150204-wbx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72493",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031692",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100719",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62799",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0590.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0590.json
index 364767057a3..cb652254726 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0590.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0590.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0590",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-17T11:59:05.030",
"lastModified": "2024-11-21T02:23:22.197",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0590",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031558",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100576",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0590",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0591.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0591.json
index e4205d52874..7d51e22f0a0 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0591.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0591.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0591",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-01-15T22:59:06.507",
"lastModified": "2024-11-21T02:23:22.303",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0591",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72084",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1031561",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -97,7 +97,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100661",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0591",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0592.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0592.json
index db7112f5b6e..10763e74696 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0592.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0592.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0592",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-12T01:59:22.717",
"lastModified": "2024-11-21T02:23:22.417",
"vulnStatus": "Modified",
@@ -120,25 +120,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0592",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37416",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031713",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100758",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0592",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0593.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0593.json
index f48aef37ce3..e4c3d4b7960 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0593.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0593.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0593",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-13T02:59:09.063",
"lastModified": "2024-11-21T02:23:22.523",
"vulnStatus": "Modified",
@@ -79,25 +79,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0593",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37417",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72549",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100757",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0593",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0594.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0594.json
index 5139269ad37..2822bf240c3 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0594.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0594.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0594",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-27T02:59:32.353",
"lastModified": "2024-11-21T02:23:22.630",
"vulnStatus": "Modified",
@@ -79,22 +79,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0594",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72793",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031813",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031814",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0594",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0595.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0595.json
index 1ccab524354..2caeb59ee05 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0595.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0595.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0595",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-02T01:59:06.670",
"lastModified": "2024-11-21T02:23:22.737",
"vulnStatus": "Modified",
@@ -75,25 +75,25 @@
"references": [
{
"url": "http://secunia.com/advisories/62686",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0595",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37238",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72370",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -101,7 +101,7 @@
},
{
"url": "http://www.securitytracker.com/id/1031676",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100667",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62686",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0596.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0596.json
index 2b81d8fa73a..f90f0239aac 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0596.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0596.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0596",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-02T01:59:07.890",
"lastModified": "2024-11-21T02:23:22.840",
"vulnStatus": "Modified",
@@ -75,25 +75,25 @@
"references": [
{
"url": "http://secunia.com/advisories/61797",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0596",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37239",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72371",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -101,7 +101,7 @@
},
{
"url": "http://www.securitytracker.com/id/1031677",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100665",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/61797",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0597.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0597.json
index f350779a832..68cd171dbec 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0597.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0597.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0597",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-02T01:59:08.950",
"lastModified": "2024-11-21T02:23:22.947",
"vulnStatus": "Modified",
@@ -79,21 +79,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0597",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37240",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72373",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -101,7 +101,7 @@
},
{
"url": "http://www.securitytracker.com/id/1031678",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100658",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0597",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0598.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0598.json
index 0587326eb80..cc2ca3933c3 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0598.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0598.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0598",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-06T03:00:11.673",
"lastModified": "2024-11-21T02:23:23.067",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0598",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031842",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0598",
diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0599.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0599.json
index 03c08197626..a071e88285e 100644
--- a/CVE-2015/CVE-2015-05xx/CVE-2015-0599.json
+++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0599.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0599",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-03T22:59:02.317",
"lastModified": "2024-11-21T02:23:23.187",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://secunia.com/advisories/62762",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0599",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37324",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72509",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100614",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62762",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0600.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0600.json
index 7bf454236b2..e28c6e67b80 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0600.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0600.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0600",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-07T15:59:07.237",
"lastModified": "2024-11-21T02:23:23.300",
"vulnStatus": "Modified",
@@ -92,25 +92,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0600",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37341",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72481",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100726",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0600",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0601.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0601.json
index 5489bfe41ca..526330c058e 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0601.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0601.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0601",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-07T04:59:05.047",
"lastModified": "2024-11-21T02:23:23.423",
"vulnStatus": "Modified",
@@ -115,25 +115,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0601",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37344",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72483",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100617",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0601",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0602.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0602.json
index 08b008b1f39..01579918b2a 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0602.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0602.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0602",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-07T15:59:08.207",
"lastModified": "2024-11-21T02:23:23.540",
"vulnStatus": "Modified",
@@ -92,25 +92,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0602",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37342",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72482",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100615",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0602",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0603.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0603.json
index 450a3b18268..8b89893e340 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0603.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0603.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0603",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-07T04:59:06.467",
"lastModified": "2024-11-21T02:23:23.647",
"vulnStatus": "Modified",
@@ -92,25 +92,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0603",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72484",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100619",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0603",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0604.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0604.json
index e2ad3727584..634fcefde22 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0604.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0604.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0604",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-07T04:59:07.797",
"lastModified": "2024-11-21T02:23:23.750",
"vulnStatus": "Modified",
@@ -113,29 +113,29 @@
"references": [
{
"url": "http://secunia.com/advisories/62761",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0604",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37346",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72485",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100620",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62761",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0605.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0605.json
index e29c6883d3f..fbde9a4feae 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0605.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0605.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0605",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-07T04:59:09.000",
"lastModified": "2024-11-21T02:23:23.853",
"vulnStatus": "Modified",
@@ -87,29 +87,29 @@
"references": [
{
"url": "http://secunia.com/advisories/62829",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37384",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72528",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100695",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secunia.com/advisories/62829",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0606.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0606.json
index 7e7104e6599..eaf769df0da 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0606.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0606.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0606",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-12T01:59:23.703",
"lastModified": "2024-11-21T02:23:23.957",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0606",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72550",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031717",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100810",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0606",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0607.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0607.json
index 367e764b432..f4b7959dd98 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0607.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0607.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0607",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-06T03:00:13.470",
"lastModified": "2024-11-21T02:23:24.060",
"vulnStatus": "Modified",
@@ -124,25 +124,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0607",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37711",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72794",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031817",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0607",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0608.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0608.json
index bfb33b09d76..77f899e76b1 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0608.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0608.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0608",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-12T01:59:25.047",
"lastModified": "2024-11-21T02:23:24.163",
"vulnStatus": "Modified",
@@ -120,29 +120,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0608",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37421",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72566",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031731",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100808",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0608",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0609.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0609.json
index 1050d23db6f..0b17e73f09d 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0609.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0609.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0609",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-16T00:59:05.010",
"lastModified": "2024-11-21T02:23:24.277",
"vulnStatus": "Modified",
@@ -120,29 +120,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0609",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37420",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72564",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031731",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100809",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0609",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0610.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0610.json
index ed5d25dfd40..69890121720 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0610.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0610.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0610",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-12T01:59:26.233",
"lastModified": "2024-11-21T02:23:24.390",
"vulnStatus": "Modified",
@@ -90,29 +90,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0610",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37423",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72565",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031732",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100807",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0610",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0611.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0611.json
index ab74a74648a..5d5cebdb12c 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0611.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0611.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0611",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-12T01:59:27.187",
"lastModified": "2024-11-21T02:23:24.497",
"vulnStatus": "Modified",
@@ -96,29 +96,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0611",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37430",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72568",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031733",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100806",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0611",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0612.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0612.json
index a3be9d260e1..8ab82b5d99c 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0612.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0612.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0612",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-03T18:59:00.067",
"lastModified": "2024-11-21T02:23:24.600",
"vulnStatus": "Modified",
@@ -159,14 +159,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032010",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0613.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0613.json
index 52e4d9fefa9..22abbf085a0 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0613.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0613.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0613",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-03T18:59:01.490",
"lastModified": "2024-11-21T02:23:24.707",
"vulnStatus": "Modified",
@@ -174,14 +174,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032010",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0614.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0614.json
index 91368a6ce84..254911db9e5 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0614.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0614.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0614",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-03T18:59:02.693",
"lastModified": "2024-11-21T02:23:24.810",
"vulnStatus": "Modified",
@@ -174,14 +174,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032010",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0615.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0615.json
index 8bf28afb4b0..5eda71c38fd 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0615.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0615.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0615",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-03T18:59:03.787",
"lastModified": "2024-11-21T02:23:24.920",
"vulnStatus": "Modified",
@@ -174,14 +174,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032010",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0616.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0616.json
index 0d0b25d0429..ec86d3b1e16 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0616.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0616.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0616",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-03T18:59:04.757",
"lastModified": "2024-11-21T02:23:25.030",
"vulnStatus": "Modified",
@@ -164,14 +164,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032010",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0617.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0617.json
index b2df7de4314..b20a175ee6e 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0617.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0617.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0617",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-18T02:59:02.470",
"lastModified": "2024-11-21T02:23:25.140",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0617",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031754",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100923",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0617",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0618.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0618.json
index 3abf76a3e8c..622f6307355 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0618.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0618.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0618",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-21T11:59:01.327",
"lastModified": "2024-11-21T02:23:25.247",
"vulnStatus": "Modified",
@@ -111,18 +111,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150220-ipv6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72713",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031778",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150220-ipv6",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0619.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0619.json
index 84b45bcaccb..95e64f04510 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0619.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0619.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0619",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-12T01:59:38.500",
"lastModified": "2024-11-21T02:23:25.350",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0619",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72579",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031745",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100864",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0619",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0620.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0620.json
index 9aa9bb1903f..d707d13582e 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0620.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0620.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0620",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-18T02:59:03.860",
"lastModified": "2024-11-21T02:23:25.460",
"vulnStatus": "Modified",
@@ -85,25 +85,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0620",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37491",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031753",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100924",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0620",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0621.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0621.json
index c2819d8401f..bfd12b3abbb 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0621.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0621.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0621",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-18T02:59:04.737",
"lastModified": "2024-11-21T02:23:25.563",
"vulnStatus": "Modified",
@@ -74,29 +74,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0621",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37495",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72635",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031756",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100936",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0621",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0622.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0622.json
index fe0e7c5e160..99520e57200 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0622.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0622.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0622",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-19T00:59:00.070",
"lastModified": "2024-11-21T02:23:25.673",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0622",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0623.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0623.json
index 3e19a141098..7645fd771ae 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0623.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0623.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0623",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-19T00:59:01.227",
"lastModified": "2024-11-21T02:23:25.780",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0623",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0624.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0624.json
index b19707401e4..af52651c8f6 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0624.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0624.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0624",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-21T11:59:02.920",
"lastModified": "2024-11-21T02:23:25.880",
"vulnStatus": "Modified",
@@ -84,29 +84,29 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/130525/Cisco-Ironport-AsyncOS-HTTP-Header-Injection.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0624",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72702",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031781",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031782",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://packetstormsecurity.com/files/130525/Cisco-Ironport-AsyncOS-HTTP-Header-Injection.html",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0626.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0626.json
index a541368e261..f4466f317d6 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0626.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0626.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0626",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-19T00:59:02.273",
"lastModified": "2024-11-21T02:23:25.987",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0626",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0628.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0628.json
index 099e1471f45..e549e2715ab 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0628.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0628.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0628",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-20T02:59:01.723",
"lastModified": "2024-11-21T02:23:26.097",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0628",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0631.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0631.json
index 413ae925203..57c98286a8c 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0631.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0631.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0631",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-21T11:59:04.027",
"lastModified": "2024-11-21T02:23:26.210",
"vulnStatus": "Modified",
@@ -141,18 +141,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0631",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72700",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031780",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0631",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0632.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0632.json
index 7da56cd3d39..2f4f2633727 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0632.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0632.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0632",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-27T02:59:33.247",
"lastModified": "2024-11-21T02:23:26.327",
"vulnStatus": "Modified",
@@ -79,18 +79,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0632",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72797",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031816",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0632",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0633.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0633.json
index 57069cec6bd..ac679873864 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0633.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0633.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0633",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-26T01:59:00.063",
"lastModified": "2024-11-21T02:23:26.437",
"vulnStatus": "Modified",
@@ -281,29 +281,29 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0633",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37575",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72760",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/85711",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031796",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0633",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0634.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0634.json
index 3c40adc949d..e6cdb1a0dfc 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0634.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0634.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0634",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-15T01:59:01.957",
"lastModified": "2024-11-21T02:23:26.557",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38811",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74647",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -94,7 +94,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032329",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0635.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0635.json
index d6e06191398..44e9ccca2a5 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0635.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0635.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0635",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:00.067",
"lastModified": "2024-11-21T02:23:26.667",
"vulnStatus": "Modified",
@@ -294,14 +294,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031982",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0636.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0636.json
index 0083cda1f47..fb41e7ddaa4 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0636.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0636.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0636",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:02.473",
"lastModified": "2024-11-21T02:23:26.777",
"vulnStatus": "Modified",
@@ -224,14 +224,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031982",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0637.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0637.json
index 0590eb1ddb1..b9e49f2ef93 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0637.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0637.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0637",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:03.427",
"lastModified": "2024-11-21T02:23:26.887",
"vulnStatus": "Modified",
@@ -284,14 +284,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031982",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0638.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0638.json
index b7f2c23708e..972a8fedecc 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0638.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0638.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0638",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:04.443",
"lastModified": "2024-11-21T02:23:26.997",
"vulnStatus": "Modified",
@@ -224,14 +224,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-wedge",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031983",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-wedge",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0639.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0639.json
index 4735ec8ce41..425dec3f27e 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0639.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0639.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0639",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:05.410",
"lastModified": "2024-11-21T02:23:27.110",
"vulnStatus": "Modified",
@@ -124,14 +124,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031981",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0640.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0640.json
index 669ffa33258..e07fe316ffc 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0640.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0640.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0640",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:06.270",
"lastModified": "2024-11-21T02:23:27.220",
"vulnStatus": "Modified",
@@ -309,14 +309,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031981",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0641.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0641.json
index 0ab0379f682..db7b98ea001 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0641.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0641.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0641",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:07.020",
"lastModified": "2024-11-21T02:23:27.337",
"vulnStatus": "Modified",
@@ -279,14 +279,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031981",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0642.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0642.json
index 4917145f495..e85f088542a 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0642.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0642.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0642",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:07.927",
"lastModified": "2024-11-21T02:23:27.457",
"vulnStatus": "Modified",
@@ -499,25 +499,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ikev2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37816",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/73333",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031978",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ikev2",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0643.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0643.json
index e32c437a511..55ece03fc6c 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0643.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0643.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0643",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:08.847",
"lastModified": "2024-11-21T02:23:27.583",
"vulnStatus": "Modified",
@@ -394,25 +394,25 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ikev2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37815",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/73333",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031978",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ikev2",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0644.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0644.json
index 02760effc02..fe8070fa4ef 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0644.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0644.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0644",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:09.847",
"lastModified": "2024-11-21T02:23:27.710",
"vulnStatus": "Modified",
@@ -144,14 +144,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031981",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0645.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0645.json
index 0d3953f7713..fb1c3919fe4 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0645.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0645.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0645",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:10.753",
"lastModified": "2024-11-21T02:23:27.827",
"vulnStatus": "Modified",
@@ -269,14 +269,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031981",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0646.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0646.json
index 8e28ac78ff2..dcc604b1727 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0646.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0646.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0646",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:11.613",
"lastModified": "2024-11-21T02:23:27.950",
"vulnStatus": "Modified",
@@ -259,18 +259,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-tcpleak",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/73340",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031980",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-tcpleak",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0647.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0647.json
index e96cae8e4bd..453f67d6e7d 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0647.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0647.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0647",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:12.473",
"lastModified": "2024-11-21T02:23:28.063",
"vulnStatus": "Modified",
@@ -364,7 +364,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0648.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0648.json
index 8c3db57c24f..77b973506fd 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0648.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0648.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0648",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:13.270",
"lastModified": "2024-11-21T02:23:28.203",
"vulnStatus": "Modified",
@@ -374,7 +374,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0649.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0649.json
index 1b1fb116539..ba65c9794a7 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0649.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0649.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0649",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:14.037",
"lastModified": "2024-11-21T02:23:28.323",
"vulnStatus": "Modified",
@@ -294,7 +294,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0650.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0650.json
index fc20b0670d4..b33a1626492 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0650.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0650.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0650",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:14.990",
"lastModified": "2024-11-21T02:23:28.430",
"vulnStatus": "Modified",
@@ -194,14 +194,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-mdns",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031979",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-mdns",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0651.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0651.json
index 6876ac0018b..1826a6dd416 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0651.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0651.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0651",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-27T02:59:34.167",
"lastModified": "2024-11-21T02:23:28.537",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0651",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72796",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031815",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0651",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0652.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0652.json
index 1ed4b7a763e..fd951ac1f98 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0652.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0652.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0652",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-13T01:59:31.523",
"lastModified": "2024-11-21T02:23:28.633",
"vulnStatus": "Modified",
@@ -87,14 +87,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150311-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031910",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150311-vcs",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0653.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0653.json
index c846396945f..4412c94bfaf 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0653.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0653.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0653",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-13T01:59:32.427",
"lastModified": "2024-11-21T02:23:28.730",
"vulnStatus": "Modified",
@@ -125,14 +125,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150311-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031910",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0654.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0654.json
index 6fa11858630..11ba3dbb9e3 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0654.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0654.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0654",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-13T01:59:33.240",
"lastModified": "2024-11-21T02:23:28.830",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150311-ips",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031908",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150311-ips",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0655.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0655.json
index 546282443fc..1cf411b7ace 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0655.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0655.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0655",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-02-28T02:59:11.830",
"lastModified": "2024-11-21T02:23:28.920",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0655",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72824",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1031820",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0655",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0656.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0656.json
index 26f813f94f6..9d86dc934ad 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0656.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0656.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0656",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-04T02:59:00.053",
"lastModified": "2024-11-21T02:23:29.017",
"vulnStatus": "Modified",
@@ -91,14 +91,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0656",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031827",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0656",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0657.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0657.json
index 98f27f7d8c0..fa3cb56c4d8 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0657.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0657.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0657",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-06T03:00:14.377",
"lastModified": "2024-11-21T02:23:29.117",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0657",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031841",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0657",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0658.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0658.json
index a677a73706b..19c0dc20b51 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0658.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0658.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0658",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-28T01:59:49.210",
"lastModified": "2024-11-21T02:23:29.213",
"vulnStatus": "Modified",
@@ -714,14 +714,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38062",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031992",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38062",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0659.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0659.json
index 5a0c415ec0e..3da9cffe427 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0659.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0659.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0659",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-06T03:00:15.237",
"lastModified": "2024-11-21T02:23:29.320",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0659",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031845",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0659",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0660.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0660.json
index 382a8001b97..495f2f91680 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0660.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0660.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0660",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-14T01:59:09.033",
"lastModified": "2024-11-21T02:23:29.420",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0660",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031924",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0660",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0661.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0661.json
index 6da9df848d3..3dc0b951655 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0661.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0661.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0661",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-06T03:00:16.110",
"lastModified": "2024-11-21T02:23:29.517",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0661",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031843",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0661",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0662.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0662.json
index 0eb2ac9b612..22fac8cb49f 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0662.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0662.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0662",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-17T02:01:47.693",
"lastModified": "2024-11-21T02:23:29.610",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37860",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031933",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37860",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0663.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0663.json
index 4efd8bb9b5b..2001342b32e 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0663.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0663.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0663",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-17T02:01:49.007",
"lastModified": "2024-11-21T02:23:29.710",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37863",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031930",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37863",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0664.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0664.json
index 58ee9500e3d..3e5bcc89937 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0664.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0664.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0664",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-18T23:59:00.067",
"lastModified": "2024-11-21T02:23:29.823",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37861",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031932",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37861",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0665.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0665.json
index cac1cc037f8..735ea61e8f0 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0665.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0665.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0665",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-17T02:01:49.867",
"lastModified": "2024-11-21T02:23:29.930",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37862",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031931",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37862",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0666.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0666.json
index efecef13c4e..4d1288f3bd3 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0666.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0666.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0666",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-03T10:59:04.290",
"lastModified": "2024-12-19T19:12:51.923",
"vulnStatus": "Analyzed",
@@ -94,14 +94,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-dcnm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032009",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0667.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0667.json
index c4ad95b487a..8c163801340 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0667.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0667.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0667",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-18T23:59:01.330",
"lastModified": "2024-11-21T02:23:30.150",
"vulnStatus": "Modified",
@@ -87,14 +87,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37889",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031939",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37889",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0668.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0668.json
index 7161272d3f6..df440d9abc6 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0668.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0668.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0668",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-20T01:59:00.063",
"lastModified": "2024-11-21T02:23:30.253",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37934",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031968",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37934",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0669.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0669.json
index fbf5178253d..0c21e61d894 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0669.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0669.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0669",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-21T01:59:00.090",
"lastModified": "2024-11-21T02:23:30.360",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031967",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37935",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0670.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0670.json
index 3478aaaf937..87d08a55b4b 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0670.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0670.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0670",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-21T01:59:01.560",
"lastModified": "2024-11-21T02:23:30.467",
"vulnStatus": "Modified",
@@ -168,14 +168,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37946",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031969",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37946",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0671.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0671.json
index a6d8950ad32..e9acabec3df 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0671.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0671.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0671",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-20T01:59:01.687",
"lastModified": "2024-11-21T02:23:30.570",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37947",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0672.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0672.json
index e0de6d71cc6..8ebf4a71878 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0672.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0672.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0672",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:15.740",
"lastModified": "2024-11-21T02:23:30.670",
"vulnStatus": "Modified",
@@ -111,14 +111,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38006",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031970",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38006",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0673.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0673.json
index 0770713cc1b..259bf99248a 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0673.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0673.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0673",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-26T10:59:16.503",
"lastModified": "2024-11-21T02:23:30.773",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38007",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031971",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38007",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0674.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0674.json
index 2067668374b..69ffa8478c0 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0674.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0674.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0674",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-25T18:29:00.180",
"lastModified": "2024-11-21T02:23:30.873",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=38058",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0675.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0675.json
index f357bf5b1d8..8584712a23e 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0675.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0675.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0675",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-13T01:59:00.063",
"lastModified": "2024-11-21T02:23:30.980",
"vulnStatus": "Modified",
@@ -184,14 +184,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032045",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0676.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0676.json
index bb3a6527d68..18c2e9b02b5 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0676.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0676.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0676",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-13T01:59:01.953",
"lastModified": "2024-11-21T02:23:31.090",
"vulnStatus": "Modified",
@@ -1274,14 +1274,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032045",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0677.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0677.json
index e38229e73e9..6b792960a60 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0677.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0677.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0677",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-13T01:59:03.033",
"lastModified": "2024-11-21T02:23:31.243",
"vulnStatus": "Modified",
@@ -419,14 +419,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032045",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0678.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0678.json
index e6b27aa5856..4e8d875b739 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0678.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0678.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0678",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-11T01:59:00.087",
"lastModified": "2024-11-21T02:23:31.367",
"vulnStatus": "Modified",
@@ -184,14 +184,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-cxfp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032046",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-cxfp",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0679.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0679.json
index 6b345d213e2..61a83cb260f 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0679.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0679.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0679",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-28T01:59:53.083",
"lastModified": "2024-11-21T02:23:31.480",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38076",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031990",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38076",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0680.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0680.json
index 6b02353ba8c..92b31f8f2f6 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0680.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0680.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0680",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-03-28T01:59:53.833",
"lastModified": "2024-11-21T02:23:31.583",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38079",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1031991",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38079",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0681.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0681.json
index 154718c3d17..f072d9336a7 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0681.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0681.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0681",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-24T16:59:00.067",
"lastModified": "2024-11-21T02:23:31.687",
"vulnStatus": "Modified",
@@ -379,21 +379,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-tftp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-tftp/cvrf/cisco-sa-20150722-tftp_cvrf.xml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033023",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-tftp",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0682.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0682.json
index e05b533e805..d7dfd2a584d 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0682.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0682.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0682",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-03T10:59:06.337",
"lastModified": "2024-11-21T02:23:31.810",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38113",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032002",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38113",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0683.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0683.json
index 2c4b717c6c8..1ea64766127 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0683.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0683.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0683",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-03T10:59:07.227",
"lastModified": "2024-11-21T02:23:31.910",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38118",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032003",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38118",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0684.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0684.json
index d28f416a569..4aff8e762ae 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0684.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0684.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0684",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-03T10:59:07.960",
"lastModified": "2024-11-21T02:23:32.010",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38114",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032001",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38114",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0685.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0685.json
index 5de101df275..8f1fd94324f 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0685.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0685.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0685",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-03T02:00:24.317",
"lastModified": "2024-11-21T02:23:32.110",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38124",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032004",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38124",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0686.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0686.json
index 5255951a0e8..dcdfc932282 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0686.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0686.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0686",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-03T02:00:25.097",
"lastModified": "2024-11-21T02:23:32.210",
"vulnStatus": "Modified",
@@ -116,14 +116,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38193",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032021",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38193",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0687.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0687.json
index aacd5203a1d..d91f3c078eb 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0687.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0687.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0687",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-03T02:00:25.910",
"lastModified": "2024-11-21T02:23:32.313",
"vulnStatus": "Modified",
@@ -121,14 +121,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38194",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032022",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38194",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0688.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0688.json
index 871a4d39b63..5c07693d66d 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0688.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0688.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0688",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-04T01:59:02.593",
"lastModified": "2024-11-21T02:23:32.420",
"vulnStatus": "Modified",
@@ -116,14 +116,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38210",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032023",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38210",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0689.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0689.json
index 3ca6ca205a2..01c0c275b69 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0689.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0689.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0689",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-19T15:29:00.523",
"lastModified": "2024-11-21T02:23:32.527",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=38221",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0690.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0690.json
index 0f7cee9d022..99e3f7ad02d 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0690.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0690.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0690",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-07T02:00:21.297",
"lastModified": "2024-11-21T02:23:32.647",
"vulnStatus": "Modified",
@@ -85,14 +85,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38222",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032024",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38222",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0691.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0691.json
index 9d47e968678..295b56a3465 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0691.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0691.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0691",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-17T01:59:25.420",
"lastModified": "2024-11-21T02:23:32.760",
"vulnStatus": "Modified",
@@ -258,7 +258,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150415-csd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
@@ -266,7 +266,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032140",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0692.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0692.json
index 09f2890a156..c292c439eaa 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0692.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0692.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0692",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-11T01:59:02.633",
"lastModified": "2024-11-21T02:23:32.880",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38305",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032097",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0693.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0693.json
index a4ab1a7dc6b..83b1c3617c4 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0693.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0693.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0693",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-15T10:59:01.393",
"lastModified": "2024-11-21T02:23:32.990",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38306",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032097",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0694.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0694.json
index ef2a2f9cb2e..584a1d9e51a 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0694.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0694.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0694",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-11T01:59:03.803",
"lastModified": "2024-11-21T02:23:33.090",
"vulnStatus": "Modified",
@@ -111,14 +111,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38292",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032059",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38292",
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0695.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0695.json
index 7cafca9b984..4be36704f43 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0695.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0695.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0695",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-17T01:59:26.263",
"lastModified": "2024-11-21T02:23:33.193",
"vulnStatus": "Modified",
@@ -155,14 +155,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150415-iosxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74162",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -170,7 +170,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032139",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0696.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0696.json
index 0bf6f2c770f..5395c9bc5b9 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0696.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0696.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0696",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-15T10:59:02.423",
"lastModified": "2024-11-21T02:23:33.337",
"vulnStatus": "Modified",
@@ -139,14 +139,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38349",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032137",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0697.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0697.json
index da91cbfaae7..d5ce063cff1 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0697.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0697.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0697",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-15T10:59:03.533",
"lastModified": "2024-11-21T02:23:33.450",
"vulnStatus": "Modified",
@@ -144,14 +144,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38350",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032136",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0698.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0698.json
index 3832553ed58..903f40a8083 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0698.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0698.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0698",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-15T10:59:04.580",
"lastModified": "2024-11-21T02:23:33.557",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38351",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032135",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0699.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0699.json
index 8bbf543848f..053047f92ff 100644
--- a/CVE-2015/CVE-2015-06xx/CVE-2015-0699.json
+++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0699.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0699",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-15T10:59:05.440",
"lastModified": "2024-11-21T02:23:33.660",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38366",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032134",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0700.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0700.json
index 6212ab90c66..9fd0c7464b8 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0700.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0700.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0700",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-17T01:59:27.030",
"lastModified": "2024-11-21T02:23:33.760",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38403",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032163",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0701.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0701.json
index 592f6ce0d02..53008199e9c 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0701.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0701.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0701",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-07T01:59:02.323",
"lastModified": "2024-11-21T02:23:33.863",
"vulnStatus": "Modified",
@@ -99,18 +99,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150506-ucsc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74491",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1032267",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150506-ucsc",
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0702.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0702.json
index e1cfc90bdcd..ab06f0781a7 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0702.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0702.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0702",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-21T02:59:00.997",
"lastModified": "2024-11-21T02:23:33.963",
"vulnStatus": "Modified",
@@ -78,14 +78,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38455",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032165",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0703.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0703.json
index c463c57fea4..144cbfaa72c 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0703.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0703.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0703",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-21T02:59:03.887",
"lastModified": "2024-11-21T02:23:34.077",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38459",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032164",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0704.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0704.json
index aa33d1c54e3..6902421ea43 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0704.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0704.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0704",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-22T01:59:00.083",
"lastModified": "2024-11-21T02:23:34.197",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38460",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032334",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0705.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0705.json
index 00cbf46aa34..671b1d31389 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0705.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0705.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0705",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-22T01:59:01.413",
"lastModified": "2024-11-21T02:23:34.317",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38461",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74258",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032335",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -97,7 +97,7 @@
},
{
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0706.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0706.json
index 330638a4072..c188e9e9f15 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0706.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0706.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0706",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-23T02:00:16.257",
"lastModified": "2024-11-21T02:23:34.430",
"vulnStatus": "Modified",
@@ -84,7 +84,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38486",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0707.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0707.json
index 2d612b20e0f..921be3b88c1 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0707.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0707.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0707",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-23T02:00:17.193",
"lastModified": "2024-11-21T02:23:34.537",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38487",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0708.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0708.json
index 9080bf12371..9a1aa7c4639 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0708.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0708.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0708",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-29T01:59:00.073",
"lastModified": "2024-11-21T02:23:34.637",
"vulnStatus": "Modified",
@@ -129,14 +129,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38543",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032210",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38543",
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0709.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0709.json
index f96edb03278..ba03a4e1eae 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0709.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0709.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0709",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-29T01:59:01.353",
"lastModified": "2024-11-21T02:23:34.743",
"vulnStatus": "Modified",
@@ -94,14 +94,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38544",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032211",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38544",
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0710.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0710.json
index 96dbe176214..a9a117c1143 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0710.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0710.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0710",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-29T01:59:02.247",
"lastModified": "2024-11-21T02:23:34.853",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38549",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032212",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38549",
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0711.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0711.json
index 292f580a095..52a4adced52 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0711.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0711.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0711",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-04-29T01:59:03.183",
"lastModified": "2024-11-21T02:23:34.963",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38557",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032213",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38557",
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0712.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0712.json
index 770847102c0..2bd0d550d81 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0712.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0712.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0712",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-01T10:59:01.153",
"lastModified": "2024-11-21T02:23:35.080",
"vulnStatus": "Modified",
@@ -111,14 +111,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38580",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032219",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38580",
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0713.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0713.json
index 68389cc62a9..abbf677198b 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0713.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0713.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0713",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-25T00:59:01.357",
"lastModified": "2024-11-21T02:23:35.193",
"vulnStatus": "Modified",
@@ -279,7 +279,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0714.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0714.json
index 263488546e9..02ef3468121 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0714.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0714.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0714",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-02T14:59:00.103",
"lastModified": "2024-11-21T02:23:35.310",
"vulnStatus": "Modified",
@@ -89,14 +89,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38607",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032222",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38607",
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0715.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0715.json
index 7c2410c4200..8c4be70b705 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0715.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0715.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0715",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-07T01:59:03.433",
"lastModified": "2024-11-21T02:23:35.410",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38674",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032260",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38674",
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0716.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0716.json
index 40bef378e25..1c5c32f2141 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0716.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0716.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0716",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-07T01:59:04.420",
"lastModified": "2024-11-21T02:23:35.520",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38675",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032259",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38675",
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0717.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0717.json
index 26509abb547..272d210df95 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0717.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0717.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0717",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-16T14:59:00.063",
"lastModified": "2024-11-21T02:23:35.633",
"vulnStatus": "Modified",
@@ -78,14 +78,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38763",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032278",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0718.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0718.json
index 46183a1d80b..548ac7653e1 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0718.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0718.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0718",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-03T22:59:02.707",
"lastModified": "2024-11-21T02:23:35.747",
"vulnStatus": "Modified",
@@ -417,18 +417,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-netstack",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035159",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035160",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-netstack",
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0721.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0721.json
index 57fcf06ad7b..ac685aa0048 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0721.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0721.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0721",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-06T10:59:00.210",
"lastModified": "2024-11-21T02:23:35.893",
"vulnStatus": "Modified",
@@ -1450,18 +1450,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-nxaaa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93410",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036947",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-nxaaa",
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0722.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0722.json
index 5d734657bf1..5dda44b779e 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0722.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0722.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0722",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-25T00:59:02.637",
"lastModified": "2024-11-21T02:23:36.057",
"vulnStatus": "Modified",
@@ -369,7 +369,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0723.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0723.json
index f5107fdcf5f..bf948a9d3d4 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0723.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0723.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0723",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-16T14:59:01.203",
"lastModified": "2024-11-21T02:23:36.180",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38749",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032277",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0724.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0724.json
index c0fbdcd8909..3678b74c087 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0724.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0724.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0724",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-15T01:59:03.173",
"lastModified": "2024-11-21T02:23:36.293",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38767",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032304",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0725.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0725.json
index e0d0e1a3dd7..929287a6bba 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0725.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0725.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0725",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-16T21:59:00.090",
"lastModified": "2024-11-21T02:23:36.413",
"vulnStatus": "Modified",
@@ -324,7 +324,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150715-vds",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -332,7 +332,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032936",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150715-vds",
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0726.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0726.json
index 6ed4a61bf83..6be8da18503 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0726.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0726.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0726",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-16T14:59:02.187",
"lastModified": "2024-11-21T02:23:36.530",
"vulnStatus": "Modified",
@@ -129,14 +129,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38789",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74641",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032327",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0727.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0727.json
index 5985c254c59..196ab8b09da 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0727.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0727.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0727",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-15T01:59:04.127",
"lastModified": "2024-11-21T02:23:36.637",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38788",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032326",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0728.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0728.json
index feb9cfc4563..657513a90f2 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0728.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0728.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0728",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-15T01:59:05.283",
"lastModified": "2024-11-21T02:23:36.740",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38808",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032328",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0729.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0729.json
index 9510c1e96eb..d0c47fd4488 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0729.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0729.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0729",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-16T14:59:03.093",
"lastModified": "2024-11-21T02:23:36.840",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38864",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032338",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0730.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0730.json
index 2ceee8088e7..803903378f4 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0730.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0730.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0730",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-16T14:59:03.953",
"lastModified": "2024-11-21T02:23:36.943",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38865",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032339",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0731.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0731.json
index defb5185a3b..686f29bed1c 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0731.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0731.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0731",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-16T02:01:44.637",
"lastModified": "2024-11-21T02:23:37.043",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38833",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032337",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0732.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0732.json
index c5ac00faa44..e5d2dfd9a83 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0732.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0732.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0732",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-29T01:59:00.093",
"lastModified": "2024-11-21T02:23:37.150",
"vulnStatus": "Modified",
@@ -119,18 +119,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40172",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033086",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1033087",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40172",
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0733.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0733.json
index c8d69d85640..b9a907f7b76 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0733.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0733.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0733",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-30T14:59:00.067",
"lastModified": "2024-11-21T02:23:37.267",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38863",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032445",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0734.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0734.json
index 56809803269..78cbc2fdfeb 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0734.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0734.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0734",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-15T01:59:06.143",
"lastModified": "2024-11-21T02:23:37.377",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38866",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032333",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0735.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0735.json
index 98e7aa2f515..f0ee98b8899 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0735.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0735.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0735",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-17T01:59:01.237",
"lastModified": "2024-11-21T02:23:37.480",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38868",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032340",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0736.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0736.json
index c52eaf2da26..09f4d0ccb8f 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0736.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0736.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0736",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-16T02:01:45.667",
"lastModified": "2024-11-21T02:23:37.583",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38869",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032336",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0737.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0737.json
index b85f330d17a..1a27d91b5e3 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0737.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0737.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0737",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-12T10:59:00.243",
"lastModified": "2024-11-21T02:23:37.683",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38883",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032518",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0738.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0738.json
index 0154be308e1..f6c23cfddec 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0738.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0738.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0738",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-17T01:59:02.113",
"lastModified": "2024-11-21T02:23:37.793",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38884",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032349",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0739.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0739.json
index d62b3c24bf0..6508f729342 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0739.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0739.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0739",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-19T02:00:18.917",
"lastModified": "2024-11-21T02:23:37.900",
"vulnStatus": "Modified",
@@ -126,14 +126,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38905",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74709",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -141,7 +141,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032359",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0740.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0740.json
index 1d0a41e0aa9..0c95d2d84db 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0740.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0740.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0740",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-20T00:59:00.077",
"lastModified": "2024-11-21T02:23:38.010",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38913",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74732",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032367",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0741.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0741.json
index 34876dadab8..6154eb2c22d 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0741.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0741.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0741",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-21T10:59:00.067",
"lastModified": "2024-11-21T02:23:38.117",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38927",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74754",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -90,7 +90,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032380",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0742.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0742.json
index 147394eb9af..25253812088 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0742.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0742.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0742",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-21T10:59:02.067",
"lastModified": "2024-11-21T02:23:38.227",
"vulnStatus": "Modified",
@@ -124,14 +124,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38937",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74750",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032381",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0743.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0743.json
index 7824169471b..665d768c297 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0743.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0743.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0743",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-30T14:59:01.757",
"lastModified": "2024-11-21T02:23:38.337",
"vulnStatus": "Modified",
@@ -104,14 +104,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38938",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032445",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0744.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0744.json
index 83e2f0909e0..e894a1b5a50 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0744.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0744.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0744",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-30T14:59:02.723",
"lastModified": "2024-11-21T02:23:38.467",
"vulnStatus": "Modified",
@@ -109,14 +109,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38943",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74916",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032445",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0745.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0745.json
index fca8a8fde90..65ff2bd5701 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0745.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0745.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0745",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-30T14:59:03.833",
"lastModified": "2024-11-21T02:23:38.570",
"vulnStatus": "Modified",
@@ -104,14 +104,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38944",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032445",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0746.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0746.json
index 1af6a16466f..26ff6cbb176 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0746.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0746.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0746",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-22T00:59:00.097",
"lastModified": "2024-11-21T02:23:38.673",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38946",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032387",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38946",
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0747.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0747.json
index c48de3e26d3..e88fdff6b5f 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0747.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0747.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0747",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-30T14:59:04.817",
"lastModified": "2024-11-21T02:23:38.777",
"vulnStatus": "Modified",
@@ -109,14 +109,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38945",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032447",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0749.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0749.json
index 11dc68c8515..9ad4f6c845c 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0749.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0749.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0749",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T03:15:10.370",
"lastModified": "2024-11-21T02:23:38.883",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20150522-CVE-2015-0749",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0750.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0750.json
index 3386b471be2..30aceb428b5 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0750.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0750.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0750",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-23T01:59:00.077",
"lastModified": "2024-11-21T02:23:39.000",
"vulnStatus": "Modified",
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38969",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0751.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0751.json
index ee42743728a..945e1ca3519 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0751.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0751.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0751",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-29T15:59:05.390",
"lastModified": "2024-11-21T02:23:39.100",
"vulnStatus": "Modified",
@@ -90,14 +90,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39011",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032407",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0752.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0752.json
index 06dc2982826..baa5d1e8a35 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0752.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0752.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0752",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-29T15:59:06.483",
"lastModified": "2024-11-21T02:23:39.210",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39012",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032421",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0753.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0753.json
index f73fff37304..81dbfe60924 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0753.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0753.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0753",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-29T15:59:07.373",
"lastModified": "2024-11-21T02:23:39.313",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39013",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032422",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0754.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0754.json
index 7c2095b5917..068bc94e75b 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0754.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0754.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0754",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-29T15:59:08.373",
"lastModified": "2024-11-21T02:23:39.423",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39015",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032423",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0755.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0755.json
index a88816d57af..4d88e98fff5 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0755.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0755.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0755",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-29T15:59:09.327",
"lastModified": "2024-11-21T02:23:39.530",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39018",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032424",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0756.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0756.json
index cfd8e614335..7b4b9fb2669 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0756.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0756.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0756",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-29T15:59:10.203",
"lastModified": "2024-11-21T02:23:39.637",
"vulnStatus": "Modified",
@@ -78,14 +78,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39041",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032419",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0757.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0757.json
index 0c7357462f6..57b3ffc61d2 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0757.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0757.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0757",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-29T15:59:11.170",
"lastModified": "2024-11-21T02:23:39.743",
"vulnStatus": "Modified",
@@ -79,18 +79,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39042",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74864",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1032420",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0758.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0758.json
index 603843109f0..0fe13f03aea 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0758.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0758.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0758",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-05-30T14:59:05.660",
"lastModified": "2024-11-21T02:23:39.850",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39130",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032448",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0759.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0759.json
index e7f21402e34..e9fa1288805 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0759.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0759.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0759",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-02T14:59:02.927",
"lastModified": "2024-11-21T02:23:39.970",
"vulnStatus": "Modified",
@@ -78,14 +78,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39133",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032446",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0760.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0760.json
index 183029e7454..c90abcf5fe5 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0760.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0760.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0760",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-04T10:59:00.067",
"lastModified": "2024-11-21T02:23:40.077",
"vulnStatus": "Modified",
@@ -80,14 +80,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39157",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032473",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0761.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0761.json
index 67be28ae367..23d103c1a49 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0761.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0761.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0761",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-04T10:59:01.520",
"lastModified": "2024-11-21T02:23:40.190",
"vulnStatus": "Modified",
@@ -85,14 +85,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39158",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74954",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -100,7 +100,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032472",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0762.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0762.json
index e6585ecf1cd..57d07f6c426 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0762.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0762.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0762",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-04T10:59:02.707",
"lastModified": "2024-11-21T02:23:40.297",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39161",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032470",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0763.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0763.json
index 9a59df6fd08..fc35a5d16d3 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0763.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0763.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0763",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-04T10:59:03.800",
"lastModified": "2024-11-21T02:23:40.410",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39162",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032471",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0764.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0764.json
index aec2fb9f4cf..1f7ea460f20 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0764.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0764.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0764",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-04T10:59:04.833",
"lastModified": "2024-11-21T02:23:40.520",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39163",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032481",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0765.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0765.json
index 9947d99a7a7..01a074b0bb4 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0765.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0765.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0765",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-04T10:59:05.957",
"lastModified": "2024-11-21T02:23:40.630",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39172",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032483",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0766.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0766.json
index 6978148bc11..ca3b5171209 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0766.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0766.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0766",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-04T10:59:06.863",
"lastModified": "2024-11-21T02:23:40.737",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39171",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032482",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0767.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0767.json
index 888cf154934..27e2a6311e8 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0767.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0767.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0767",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-07T18:59:04.577",
"lastModified": "2024-11-21T02:23:40.847",
"vulnStatus": "Modified",
@@ -91,7 +91,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39187",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0768.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0768.json
index b27dc17343a..7ad226314e2 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0768.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0768.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0768",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-12T14:59:00.067",
"lastModified": "2024-11-21T02:23:40.957",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39192",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032541",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0769.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0769.json
index 2cbbde5f5ec..7030f165bb5 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0769.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0769.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0769",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-12T14:59:01.113",
"lastModified": "2024-11-21T02:23:41.070",
"vulnStatus": "Modified",
@@ -119,14 +119,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150611-iosxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032563",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0770.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0770.json
index cb4e449b2bf..b93edcaebdf 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0770.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0770.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0770",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-07T18:59:05.470",
"lastModified": "2024-11-21T02:23:41.200",
"vulnStatus": "Modified",
@@ -143,14 +143,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39210",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032511",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0771.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0771.json
index 72eb0be2c40..358c53ab5cd 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0771.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0771.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0771",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-12T10:59:01.683",
"lastModified": "2024-11-21T02:23:41.323",
"vulnStatus": "Modified",
@@ -126,14 +126,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39233",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032517",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0772.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0772.json
index d5b3eb6bc8e..df48a5d4da3 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0772.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0772.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0772",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-12T14:59:01.957",
"lastModified": "2024-11-21T02:23:41.433",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39240",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032540",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0773.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0773.json
index 99e3ab76cc2..2c09c517db3 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0773.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0773.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0773",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-12T10:59:02.587",
"lastModified": "2024-11-21T02:23:41.540",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39256",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032542",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0774.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0774.json
index 0c606df73f3..0be50816438 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0774.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0774.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0774",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-12T10:59:03.587",
"lastModified": "2024-11-21T02:23:41.653",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39257",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032539",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0775.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0775.json
index 9f25028e4bc..0306b47f46b 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0775.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0775.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0775",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-12T14:59:02.770",
"lastModified": "2024-11-21T02:23:41.770",
"vulnStatus": "Modified",
@@ -302,14 +302,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39280",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032561",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -317,7 +317,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032562",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0776.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0776.json
index 11b606eec2c..c77db1c2804 100644
--- a/CVE-2015/CVE-2015-07xx/CVE-2015-0776.json
+++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0776.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-0776",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-12T14:59:03.647",
"lastModified": "2024-11-21T02:23:41.890",
"vulnStatus": "Modified",
@@ -86,14 +86,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39293",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032560",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4182.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4182.json
index 304ac98b610..7c5c0d1fd60 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4182.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4182.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4182",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-12T14:59:04.443",
"lastModified": "2024-11-21T02:30:35.333",
"vulnStatus": "Modified",
@@ -114,14 +114,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39299",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75152",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032579",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4183.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4183.json
index 3333a2efa7d..b92ccdd0780 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4183.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4183.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4183",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-17T10:59:03.930",
"lastModified": "2024-11-21T02:30:35.457",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39324",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75205",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1032584",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39324",
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4184.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4184.json
index 4b21c27a700..268e2021166 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4184.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4184.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4184",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-13T10:59:00.067",
"lastModified": "2024-11-21T02:30:35.583",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39339",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75181",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -99,7 +99,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032582",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4185.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4185.json
index 3713bb13323..50ba5a8dc04 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4185.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4185.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4185",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-13T10:59:01.097",
"lastModified": "2024-11-21T02:30:35.707",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39343",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72310",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -94,7 +94,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032581",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4186.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4186.json
index 17e16cbe11e..9a41941bfaf 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4186.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4186.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4186",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-17T10:59:04.883",
"lastModified": "2024-11-21T02:30:35.830",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39347",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75195",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1032583",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39347",
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4188.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4188.json
index 5309c4d7d19..c8c1a085a58 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4188.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4188.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4188",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-17T10:59:05.727",
"lastModified": "2024-11-21T02:30:35.947",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39365",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75268",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1032592",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39365",
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4189.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4189.json
index 4c96d08d3dd..5dc7025623a 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4189.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4189.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4189",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-23T14:59:00.087",
"lastModified": "2024-11-21T02:30:36.067",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39377",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75349",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39377",
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4190.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4190.json
index aac74ad3cfc..03e6e88b44d 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4190.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4190.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4190",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-17T10:59:06.777",
"lastModified": "2024-11-21T02:30:36.197",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39380",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75271",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1032593",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1032594",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39380",
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4191.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4191.json
index 8c4111f3c24..92bb547f25a 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4191.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4191.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4191",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-19T01:59:00.070",
"lastModified": "2024-11-21T02:30:36.320",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39383",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75260",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032615",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4194.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4194.json
index 7da40db0f55..0de30b508cd 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4194.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4194.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4194",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-19T01:59:01.023",
"lastModified": "2024-11-21T02:30:36.453",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39420",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75296",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032660",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4195.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4195.json
index a58aea062f0..6de975cbf0d 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4195.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4195.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4195",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-19T01:59:01.930",
"lastModified": "2024-11-21T02:30:36.573",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39402",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75295",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032661",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4196.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4196.json
index d24f495a580..1b3a9b34ba5 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4196.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4196.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4196",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-04T10:59:02.217",
"lastModified": "2024-11-21T02:30:36.697",
"vulnStatus": "Modified",
@@ -89,14 +89,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150701-cucdm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032774",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4197.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4197.json
index 8f7d4d87da6..9f11d767b49 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4197.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4197.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4197",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-20T14:59:00.087",
"lastModified": "2024-11-21T02:30:36.807",
"vulnStatus": "Modified",
@@ -91,14 +91,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39421",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75324",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -106,7 +106,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032675",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4198.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4198.json
index 2cd7682dcf9..ccb89255726 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4198.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4198.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4198",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-20T14:59:01.027",
"lastModified": "2024-11-21T02:30:36.927",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39422",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75326",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032676",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-41xx/CVE-2015-4199.json b/CVE-2015/CVE-2015-41xx/CVE-2015-4199.json
index 693fc3a68cc..ec66a44dce3 100644
--- a/CVE-2015/CVE-2015-41xx/CVE-2015-4199.json
+++ b/CVE-2015/CVE-2015-41xx/CVE-2015-4199.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4199",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-27T10:59:00.143",
"lastModified": "2024-11-21T02:30:37.050",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39423",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75335",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032692",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4200.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4200.json
index f4c7d73ad3e..d2970c6618a 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4200.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4200.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4200",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-23T12:59:00.100",
"lastModified": "2024-11-21T02:30:37.170",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39424",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75254",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -94,7 +94,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032692",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4201.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4201.json
index 3921e4d112c..ca43169d3b6 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4201.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4201.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4201",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-20T10:59:00.077",
"lastModified": "2024-11-21T02:30:37.293",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39431",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75323",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -94,7 +94,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032677",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4202.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4202.json
index dc5fa1430de..f66a5a504de 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4202.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4202.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4202",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-20T14:59:01.947",
"lastModified": "2024-11-21T02:30:37.410",
"vulnStatus": "Modified",
@@ -91,14 +91,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39432",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75321",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -106,7 +106,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032678",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4203.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4203.json
index bcf468eb344..c76377bc3e9 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4203.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4203.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4203",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-23T14:59:01.370",
"lastModified": "2024-11-21T02:30:37.540",
"vulnStatus": "Modified",
@@ -91,14 +91,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39439",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75339",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -106,7 +106,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032692",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4204.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4204.json
index 62fd4557273..9e79d939d56 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4204.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4204.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4204",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-23T12:59:01.367",
"lastModified": "2024-11-21T02:30:37.660",
"vulnStatus": "Modified",
@@ -91,14 +91,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39440",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75337",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -106,7 +106,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032692",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4205.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4205.json
index e26117c9306..728551df59c 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4205.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4205.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4205",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-23T14:59:02.743",
"lastModified": "2024-11-21T02:30:37.800",
"vulnStatus": "Modified",
@@ -111,14 +111,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39455",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75352",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032691",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4206.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4206.json
index fa512568243..953b0702476 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4206.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4206.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4206",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-15T05:59:00.317",
"lastModified": "2024-11-21T02:30:37.920",
"vulnStatus": "Modified",
@@ -109,18 +109,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151214-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/79196",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034430",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151214-ucm",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4207.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4207.json
index a8f1997d98d..fc0e7d714ea 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4207.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4207.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4207",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-23T14:59:03.633",
"lastModified": "2024-11-21T02:30:38.053",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39457",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75350",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032705",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4208.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4208.json
index 6410ab0c5a7..3ba69cc3e78 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4208.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4208.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4208",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-24T10:59:05.930",
"lastModified": "2024-11-21T02:30:38.163",
"vulnStatus": "Modified",
@@ -78,14 +78,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39458",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75361",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -93,7 +93,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032705",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4209.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4209.json
index 68b12d3f82d..6cb83a0d10b 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4209.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4209.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4209",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-23T14:59:04.557",
"lastModified": "2024-11-21T02:30:38.293",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39459",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75351",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032705",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4210.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4210.json
index f3efe049e20..41c84cb1fd7 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4210.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4210.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4210",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-23T14:59:05.337",
"lastModified": "2024-11-21T02:30:38.423",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39460",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75348",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032705",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4211.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4211.json
index 959b37ff34a..9aa1e12017e 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4211.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4211.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4211",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-24T10:59:07.243",
"lastModified": "2024-11-21T02:30:38.537",
"vulnStatus": "Modified",
@@ -86,14 +86,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39466",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75373",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -101,7 +101,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032704",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4212.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4212.json
index 23ccb0bf78f..728cb8fa1d2 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4212.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4212.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4212",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-24T10:59:08.087",
"lastModified": "2024-11-21T02:30:38.660",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39467",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75381",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032705",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4213.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4213.json
index 05bcac27244..d8d85235b61 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4213.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4213.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4213",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-24T10:59:09.073",
"lastModified": "2024-11-21T02:30:38.780",
"vulnStatus": "Modified",
@@ -136,14 +136,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39469",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75378",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -151,7 +151,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032712",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4214.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4214.json
index a4419c6928b..d38e96a2b3c 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4214.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4214.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4214",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-24T10:59:09.977",
"lastModified": "2024-11-21T02:30:38.897",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39470",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75380",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -94,7 +94,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032703",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4215.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4215.json
index a21895a712f..12c772f22ac 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4215.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4215.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4215",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-24T10:59:10.917",
"lastModified": "2024-11-21T02:30:39.003",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39472",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75369",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032697",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4216.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4216.json
index 93d146aa4b7..f7517eb0b15 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4216.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4216.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4216",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-26T10:59:03.327",
"lastModified": "2024-11-21T02:30:39.123",
"vulnStatus": "Modified",
@@ -129,14 +129,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150625-ironport",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75417",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032725",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -152,7 +152,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032726",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4217.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4217.json
index 01e7bb05830..3919a27793b 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4217.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4217.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4217",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-26T10:59:04.343",
"lastModified": "2024-11-21T02:30:39.247",
"vulnStatus": "Modified",
@@ -133,21 +133,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150625-ironport",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39461",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75418",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -155,7 +155,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032725",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -163,7 +163,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032726",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4218.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4218.json
index ec244a8a4eb..4621cf0f196 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4218.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4218.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4218",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-24T10:59:11.790",
"lastModified": "2024-11-21T02:30:39.370",
"vulnStatus": "Modified",
@@ -119,14 +119,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39494",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75377",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032711",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4219.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4219.json
index 8d2e12ae066..20a2704f540 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4219.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4219.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4219",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-24T10:59:12.807",
"lastModified": "2024-11-21T02:30:39.487",
"vulnStatus": "Modified",
@@ -89,14 +89,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39501",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75379",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032713",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032714",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4220.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4220.json
index 72f51895530..a859d941903 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4220.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4220.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4220",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-25T16:59:01.220",
"lastModified": "2024-11-21T02:30:39.610",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39504",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75407",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032717",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4221.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4221.json
index c8b24fb5007..732e2e279ef 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4221.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4221.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4221",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-26T10:59:05.420",
"lastModified": "2024-11-21T02:30:39.727",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39505",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75401",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032716",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4222.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4222.json
index 2ba51c30be3..a1704e8c11c 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4222.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4222.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4222",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-26T10:59:06.297",
"lastModified": "2024-11-21T02:30:39.837",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39506",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75400",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032716",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4223.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4223.json
index d544fad7e70..3c5aab7a4b1 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4223.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4223.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4223",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-25T16:59:02.297",
"lastModified": "2024-11-21T02:30:39.947",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39509",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75399",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032715",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4224.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4224.json
index 881071198a6..de6c1e9203d 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4224.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4224.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4224",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-26T10:59:07.123",
"lastModified": "2024-11-21T02:30:40.060",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39517",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75415",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032728",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4225.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4225.json
index 932471e56aa..d40ebd0c470 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4225.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4225.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4225",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-27T10:59:01.173",
"lastModified": "2024-11-21T02:30:40.183",
"vulnStatus": "Modified",
@@ -141,14 +141,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39529",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75433",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -156,7 +156,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032735",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4226.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4226.json
index dc601bb6774..b7520a2f5ce 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4226.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4226.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4226",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-30T15:59:17.700",
"lastModified": "2024-11-21T02:30:40.300",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39554",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75471",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032748",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4227.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4227.json
index 0a3f4a372e2..b5e42faaf08 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4227.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4227.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4227",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-30T10:59:01.167",
"lastModified": "2024-11-21T02:30:40.407",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39555",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75465",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032747",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4228.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4228.json
index d511e8a7f29..2be73c600cd 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4228.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4228.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4228",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-02T14:59:01.107",
"lastModified": "2024-11-21T02:30:40.520",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39556",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4229.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4229.json
index ec8a66397d7..e20e5f3bfcc 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4229.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4229.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4229",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-06-30T10:59:02.527",
"lastModified": "2024-11-21T02:30:40.630",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39557",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75473",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032749",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4230.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4230.json
index 26637a70b7c..e8db1dfda07 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4230.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4230.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4230",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-06T14:59:03.280",
"lastModified": "2024-11-21T02:30:40.737",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39562",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75464",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032747",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4231.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4231.json
index 7c00c320fbf..c3c10c7c1b6 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4231.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4231.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4231",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-03T10:59:00.077",
"lastModified": "2024-11-21T02:30:40.853",
"vulnStatus": "Modified",
@@ -91,14 +91,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39568",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032763",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4232.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4232.json
index 54fa079f56e..9177d901a1f 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4232.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4232.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4232",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-03T10:59:01.343",
"lastModified": "2024-11-21T02:30:40.970",
"vulnStatus": "Modified",
@@ -156,14 +156,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39569",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75503",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -171,7 +171,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032764",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4233.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4233.json
index c510cebd4b6..18e19e89e2e 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4233.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4233.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4233",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-02T10:59:00.080",
"lastModified": "2024-11-21T02:30:41.090",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39570",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75500",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032766",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4234.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4234.json
index 269f7670bda..89a4db78494 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4234.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4234.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4234",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-03T10:59:02.217",
"lastModified": "2024-11-21T02:30:41.200",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39571",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75502",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -94,7 +94,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032765",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4235.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4235.json
index 671030c525a..5577308a859 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4235.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4235.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4235",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-24T14:59:00.073",
"lastModified": "2024-11-21T02:30:41.317",
"vulnStatus": "Modified",
@@ -129,14 +129,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-apic",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033025",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-apic",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4236.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4236.json
index 8f8f7fc10a3..e653cb25c59 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4236.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4236.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4236",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-10T19:59:00.097",
"lastModified": "2024-11-21T02:30:41.437",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39785",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75703",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -99,7 +99,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032855",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4237.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4237.json
index e94399640e0..7d50c73b362 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4237.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4237.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4237",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-03T10:59:03.060",
"lastModified": "2024-11-21T02:30:41.570",
"vulnStatus": "Modified",
@@ -402,14 +402,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39583",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032775",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4238.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4238.json
index 582913adc9b..4243d9e6f5e 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4238.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4238.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4238",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-02T14:59:02.137",
"lastModified": "2024-11-21T02:30:41.707",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39611",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032776",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4239.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4239.json
index 31fbc7f827e..f5485953801 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4239.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4239.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4239",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-03T10:59:03.920",
"lastModified": "2024-11-21T02:30:41.823",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39612",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032780",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4240.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4240.json
index 87fe7b8b69a..e6ef4511df9 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4240.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4240.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4240",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-08T14:59:00.973",
"lastModified": "2024-11-21T02:30:41.933",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39623",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032807",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4241.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4241.json
index a4c43c851c1..48b49c0ea8b 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4241.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4241.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4241",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-08T14:59:02.067",
"lastModified": "2024-11-21T02:30:42.040",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39641",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Not Applicable",
"Vendor Advisory"
@@ -82,7 +82,7 @@
},
{
"url": "http://www.securitytracker.com/id/1032808",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4242.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4242.json
index 1c08602637d..89e2d9b7d02 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4242.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4242.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4242",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-08T14:59:02.940",
"lastModified": "2024-11-21T02:30:42.170",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39643",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032806",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4243.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4243.json
index 07f9f87e867..682966fffb4 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4243.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4243.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4243",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-08T14:59:03.817",
"lastModified": "2024-11-21T02:30:42.300",
"vulnStatus": "Modified",
@@ -116,14 +116,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39675",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032805",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4244.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4244.json
index 869cdd384b5..f1516fe589b 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4244.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4244.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4244",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-10T10:59:00.067",
"lastModified": "2024-11-21T02:30:42.423",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39677",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032839",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4245.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4245.json
index a66ccf5b984..019d5297998 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4245.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4245.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4245",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-21T14:59:00.080",
"lastModified": "2023-11-07T02:25:48.133",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4246.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4246.json
index 667a8ab361e..a3d4debdfc8 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4246.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4246.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4246",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-21T14:59:01.970",
"lastModified": "2023-11-07T02:25:48.347",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4247.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4247.json
index 9a313d43bcb..435a4921cb1 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4247.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4247.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4247",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-21T14:59:02.893",
"lastModified": "2023-11-07T02:25:48.580",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4248.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4248.json
index 66d8583d34c..5fbaf375591 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4248.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4248.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4248",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:46.407",
"lastModified": "2023-11-07T02:25:49.000",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4249.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4249.json
index 236ce39abc2..c43184a490f 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4249.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4249.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4249",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-13T10:59:00.077",
"lastModified": "2023-11-07T02:25:49.483",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4250.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4250.json
index 7c38f35b3eb..efd48892711 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4250.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4250.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4250",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:46.420",
"lastModified": "2023-11-07T02:25:49.750",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4251.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4251.json
index 5211fdd4c30..8fe47a56631 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4251.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4251.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4251",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:46.453",
"lastModified": "2023-11-07T02:25:49.987",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4252.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4252.json
index 5f50695c617..a7d41949a76 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4252.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4252.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4252",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-10T00:59:00.087",
"lastModified": "2024-11-21T02:30:42.627",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032838",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4253.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4253.json
index e817d7ee939..12006f11869 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4253.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4253.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4253",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-10T00:59:01.977",
"lastModified": "2024-11-21T02:30:42.743",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39796",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032838",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4254.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4254.json
index 68d01b4972e..3601d39454e 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4254.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4254.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4254",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-10T17:59:02.750",
"lastModified": "2024-11-21T02:30:42.890",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39797",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4255.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4255.json
index fee351c57ca..02675b1bdfc 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4255.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4255.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4255",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-10T00:59:03.057",
"lastModified": "2024-11-21T02:30:43.003",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39798",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032838",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4256.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4256.json
index 30fd9d9da67..92b3bdab744 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4256.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4256.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4256",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-10T00:59:03.947",
"lastModified": "2024-11-21T02:30:43.110",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39800",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032838",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4257.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4257.json
index ee25d5b898c..aafdffa825b 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4257.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4257.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4257",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-10T00:59:04.867",
"lastModified": "2024-11-21T02:30:43.220",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39801",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032838",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4258.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4258.json
index db1d4178687..68a2a4a5aa4 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4258.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4258.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4258",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-10T00:59:05.777",
"lastModified": "2024-11-21T02:30:43.337",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39802",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032838",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4259.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4259.json
index 0769c9b40bb..b7dc002d332 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4259.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4259.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4259",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-10T15:59:03.277",
"lastModified": "2024-11-21T02:30:43.450",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39803",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032872",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4260.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4260.json
index 152205b0b55..a7528737531 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4260.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4260.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4260",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-10T10:59:01.440",
"lastModified": "2024-11-21T02:30:43.557",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39804",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032840",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4261.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4261.json
index 7af31d5be8b..eef3eff18fa 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4261.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4261.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4261",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:46.483",
"lastModified": "2023-11-07T02:25:50.293",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4262.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4262.json
index 9e5c61afd35..153c16439bc 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4262.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4262.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4262",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-24T14:59:02.227",
"lastModified": "2024-11-21T02:30:43.680",
"vulnStatus": "Modified",
@@ -154,14 +154,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-mp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033024",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-mp",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4263.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4263.json
index 09221945c7b..b288dbde924 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4263.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4263.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4263",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-10T19:59:01.237",
"lastModified": "2024-11-21T02:30:43.790",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39825",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032854",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4265.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4265.json
index fa8dd26ce72..6926b4ecf52 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4265.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4265.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4265",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-12T10:59:03.117",
"lastModified": "2024-11-21T02:30:43.897",
"vulnStatus": "Modified",
@@ -164,14 +164,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151006-ucs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033752",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4266.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4266.json
index 42bf1383bca..be3bdaa539e 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4266.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4266.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4266",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-16T19:59:00.083",
"lastModified": "2024-11-21T02:30:44.013",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39871",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032930",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39871",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4267.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4267.json
index 29ec4e3e2d2..6a349461889 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4267.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4267.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4267",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-15T18:59:00.083",
"lastModified": "2024-11-21T02:30:44.120",
"vulnStatus": "Modified",
@@ -99,14 +99,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39872",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032929",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4268.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4268.json
index c87100703dd..2c52220ba1f 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4268.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4268.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4268",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-14T17:59:04.290",
"lastModified": "2024-11-21T02:30:44.230",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39873",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032889",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4269.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4269.json
index 7ded11d36ac..b05df6e6d06 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4269.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4269.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4269",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-14T14:59:03.077",
"lastModified": "2024-11-21T02:30:44.347",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39877",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032886",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4270.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4270.json
index 7a6ffca57ed..d5a32aec170 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4270.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4270.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4270",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-14T17:59:05.337",
"lastModified": "2024-11-21T02:30:44.453",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39879",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032887",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4271.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4271.json
index ee95f0bd580..410079a8648 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4271.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4271.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4271",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-15T18:59:00.960",
"lastModified": "2024-11-21T02:30:44.557",
"vulnStatus": "Modified",
@@ -89,14 +89,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39880",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032931",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4272.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4272.json
index 52478b96689..171ea506440 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4272.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4272.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4272",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-14T14:59:05.137",
"lastModified": "2024-11-21T02:30:44.663",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39905",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032888",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4273.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4273.json
index a80f63d8d30..5678b61e504 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4273.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4273.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4273",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-15T14:59:02.940",
"lastModified": "2024-11-21T02:30:44.777",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39907",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032928",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4274.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4274.json
index a37e2b24a2b..5fc75a5c656 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4274.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4274.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4274",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-16T19:59:01.007",
"lastModified": "2024-11-21T02:30:44.890",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39920",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032962",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39920",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4275.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4275.json
index 94b480ff37f..39fd0ffe470 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4275.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4275.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4275",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-16T19:59:02.007",
"lastModified": "2024-11-21T02:30:45.003",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39934",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032984",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39934",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4276.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4276.json
index 69d9720b3c1..8cbd02f9956 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4276.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4276.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4276",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-16T19:59:02.897",
"lastModified": "2024-11-21T02:30:45.110",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39938",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75917",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1032963",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39938",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4277.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4277.json
index e6125603a3d..13a4a89b542 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4277.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4277.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4277",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-19T18:59:00.123",
"lastModified": "2024-11-21T02:30:45.220",
"vulnStatus": "Modified",
@@ -141,14 +141,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39939",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033259",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39939",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4278.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4278.json
index 7c690e7d6df..5e1d83b9e0e 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4278.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4278.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4278",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-16T19:59:03.757",
"lastModified": "2024-11-21T02:30:45.330",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39940",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1032961",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39940",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4279.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4279.json
index 7aecffbba7a..7c38ca7d1a3 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4279.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4279.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4279",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-20T23:59:04.690",
"lastModified": "2024-11-21T02:30:45.433",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75953",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1032999",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39990",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4280.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4280.json
index 433d8be172e..18ba957b39c 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4280.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4280.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4280",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-18T10:59:01.603",
"lastModified": "2024-11-21T02:30:45.540",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40003",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75931",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1032968",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40003",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4281.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4281.json
index 33757f19858..8dd8e6a2ae8 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4281.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4281.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4281",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-22T14:59:01.017",
"lastModified": "2024-11-21T02:30:45.643",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40021",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75979",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1033016",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40021",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4282.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4282.json
index 19f466f4d48..372ea56c084 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4282.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4282.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4282",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-06T11:59:00.120",
"lastModified": "2024-11-21T02:30:45.753",
"vulnStatus": "Modified",
@@ -139,14 +139,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-privmse",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/77435",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -154,7 +154,7 @@
},
{
"url": "http://www.securitytracker.com/id/1034066",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4283.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4283.json
index f82cbb8e1d5..61559ec8c23 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4283.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4283.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4283",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-21T14:59:03.690",
"lastModified": "2024-11-21T02:30:45.873",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40050",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75958",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40050",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4284.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4284.json
index 33d1063e456..e9978ed5d16 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4284.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4284.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4284",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-22T14:59:02.377",
"lastModified": "2024-11-21T02:30:45.980",
"vulnStatus": "Modified",
@@ -111,18 +111,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40067",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75980",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1033017",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40067",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4285.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4285.json
index e8cfbac3720..b2924d67526 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4285.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4285.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4285",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-23T14:59:00.067",
"lastModified": "2024-11-21T02:30:46.097",
"vulnStatus": "Modified",
@@ -89,14 +89,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40068",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033043",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40068",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4286.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4286.json
index b456bedb5a3..6fc896515c8 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4286.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4286.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4286",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-29T14:59:02.947",
"lastModified": "2024-11-21T02:30:46.220",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40151",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033112",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40151",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4287.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4287.json
index faf01cc9448..ea72f58b1e2 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4287.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4287.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4287",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-29T01:59:05.920",
"lastModified": "2024-11-21T02:30:46.353",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40136",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4288.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4288.json
index 3cd25ab5cc5..409e268cb79 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4288.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4288.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4288",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-29T01:59:06.890",
"lastModified": "2024-11-21T02:30:46.463",
"vulnStatus": "Modified",
@@ -104,7 +104,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40137",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4289.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4289.json
index 94128b96d48..9008ba469e5 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4289.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4289.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4289",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-01T01:59:14.787",
"lastModified": "2024-11-21T02:30:46.593",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40175",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033173",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40175",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4290.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4290.json
index 00607766752..6f363b342c9 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4290.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4290.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4290",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-29T14:59:04.413",
"lastModified": "2024-11-21T02:30:46.707",
"vulnStatus": "Modified",
@@ -86,14 +86,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40176",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033113",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40176",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4291.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4291.json
index d35c46de6e1..e8d1940c859 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4291.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4291.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4291",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-01T01:59:16.007",
"lastModified": "2024-11-21T02:30:46.827",
"vulnStatus": "Modified",
@@ -134,14 +134,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150730-asr1k",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033131",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150730-asr1k",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4292.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4292.json
index 3265e10c4a9..41806b65bc2 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4292.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4292.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4292",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-01T01:59:16.957",
"lastModified": "2024-11-21T02:30:46.937",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40214",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033172",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40214",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4293.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4293.json
index 0cb19e5e9a0..4f4cefb2a80 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4293.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4293.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4293",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-07-30T14:59:00.087",
"lastModified": "2024-11-21T02:30:47.053",
"vulnStatus": "Modified",
@@ -214,14 +214,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40215",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40215",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4294.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4294.json
index 07ec8bdcea6..c4754adfec4 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4294.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4294.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4294",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-01T01:59:17.847",
"lastModified": "2024-11-21T02:30:47.170",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40217",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033171",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40217",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4295.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4295.json
index f6f80ee5026..bfe00d8fef4 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4295.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4295.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4295",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-01T01:59:18.693",
"lastModified": "2024-11-21T02:30:47.283",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40223",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033174",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40223",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4296.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4296.json
index 9ffa9bcb5b0..ea2b10f247a 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4296.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4296.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4296",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-19T23:59:00.123",
"lastModified": "2024-11-21T02:30:47.397",
"vulnStatus": "Modified",
@@ -131,14 +131,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40426",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033264",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40426",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4297.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4297.json
index 45c05ccc5b1..4de5a33ce60 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4297.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4297.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4297",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-19T14:59:00.140",
"lastModified": "2024-11-21T02:30:47.497",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40427",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76328",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40427",
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4298.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4298.json
index 35f1baa5a65..261887a5a36 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4298.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4298.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4298",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-19T15:59:01.540",
"lastModified": "2024-11-21T02:30:47.623",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40428",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76348",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -94,7 +94,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033286",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-42xx/CVE-2015-4299.json b/CVE-2015/CVE-2015-42xx/CVE-2015-4299.json
index 9ae9e0b11ec..f893739bb1b 100644
--- a/CVE-2015/CVE-2015-42xx/CVE-2015-4299.json
+++ b/CVE-2015/CVE-2015-42xx/CVE-2015-4299.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4299",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-19T15:59:02.727",
"lastModified": "2024-11-21T02:30:47.740",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40429",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74572",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033285",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4300.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4300.json
index 3bdca8e0097..f6595b7fb27 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4300.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4300.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4300",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:46.497",
"lastModified": "2023-11-07T02:25:50.760",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4301.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4301.json
index a854de6e0e8..e86e3c75232 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4301.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4301.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4301",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-19T15:59:03.727",
"lastModified": "2024-11-21T02:30:47.870",
"vulnStatus": "Modified",
@@ -111,14 +111,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40431",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033267",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4302.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4302.json
index 9076a9c37dc..66a12968538 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4302.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4302.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4302",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-19T14:59:01.767",
"lastModified": "2024-11-21T02:30:48.000",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40432",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033279",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4303.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4303.json
index 6a2c67e772e..db3cc40ef50 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4303.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4303.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4303",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-20T10:59:06.763",
"lastModified": "2024-11-21T02:30:48.117",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40433",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76322",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1033268",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40433",
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4304.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4304.json
index de8eb1e1020..4a3e31466b2 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4304.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4304.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4304",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-20T01:59:00.097",
"lastModified": "2024-11-21T02:30:48.230",
"vulnStatus": "Modified",
@@ -99,14 +99,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150916-pca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033581",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4305.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4305.json
index 77c6d3a147c..6dd09d706f7 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4305.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4305.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4305",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-20T01:59:01.847",
"lastModified": "2024-11-21T02:30:48.340",
"vulnStatus": "Modified",
@@ -99,21 +99,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150916-pca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033581",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4306.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4306.json
index 0591ba01dd2..240ab6b7699 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4306.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4306.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4306",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-20T01:59:03.113",
"lastModified": "2024-11-21T02:30:48.457",
"vulnStatus": "Modified",
@@ -99,14 +99,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150916-pca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033581",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4307.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4307.json
index dc2b3755ea9..5c0de7a47d1 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4307.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4307.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4307",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-20T01:59:04.207",
"lastModified": "2024-11-21T02:30:48.580",
"vulnStatus": "Modified",
@@ -99,14 +99,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150916-pcp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033579",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4308.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4308.json
index 0d75ccc1d07..817bd569bd7 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4308.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4308.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4308",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-19T15:59:04.913",
"lastModified": "2024-11-21T02:30:48.683",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40434",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76349",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033280",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4310.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4310.json
index de91710e9a0..52114de8d38 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4310.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4310.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4310",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-19T23:59:01.480",
"lastModified": "2024-11-21T02:30:48.800",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40436",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76407",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033331",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4314.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4314.json
index 43117a17e52..7016114ab8a 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4314.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4314.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4314",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-20T00:59:00.123",
"lastModified": "2024-11-21T02:30:48.913",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40439",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033266",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40439",
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4315.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4315.json
index a062e9edfb6..eb19c200c77 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4315.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4315.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4315",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-20T00:59:01.700",
"lastModified": "2024-11-21T02:30:49.030",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40446",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76352",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1033283",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40446",
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4316.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4316.json
index 6d34d967167..8fb4857d775 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4316.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4316.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4316",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-20T10:59:07.903",
"lastModified": "2024-11-21T02:30:49.143",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40445",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76353",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1033282",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40445",
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4317.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4317.json
index deaee7978c6..18e501d9530 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4317.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4317.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4317",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-20T00:59:02.653",
"lastModified": "2024-11-21T02:30:49.267",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40444",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76351",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1033281",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40444",
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4318.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4318.json
index c3d1a8695e6..2cb6bb787a7 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4318.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4318.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4318",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-20T15:59:00.080",
"lastModified": "2024-11-21T02:30:49.383",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40443",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76347",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1033281",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40443",
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4319.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4319.json
index e6b5b776826..2a4e3f0afee 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4319.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4319.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4319",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-20T10:59:08.903",
"lastModified": "2024-11-21T02:30:49.497",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40442",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76366",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033323",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4320.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4320.json
index da252ececfd..65aac70b3a2 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4320.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4320.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4320",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-20T00:59:03.873",
"lastModified": "2024-11-21T02:30:49.610",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40441",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76350",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1033284",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40441",
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4321.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4321.json
index 61b0b45374d..ee04acc585d 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4321.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4321.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4321",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-20T10:59:09.950",
"lastModified": "2024-11-21T02:30:49.733",
"vulnStatus": "Modified",
@@ -89,14 +89,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40440",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033265",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40440",
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4322.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4322.json
index 397283c8b05..d4d57c86bda 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4322.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4322.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4322",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-19T15:59:05.883",
"lastModified": "2024-11-21T02:30:49.857",
"vulnStatus": "Modified",
@@ -84,18 +84,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40450",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76365",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1033322",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40450",
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4323.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4323.json
index 4d4d8072f47..26674acc9f7 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4323.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4323.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4323",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-19T23:59:02.590",
"lastModified": "2024-11-21T02:30:49.973",
"vulnStatus": "Modified",
@@ -329,18 +329,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40469",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76367",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1033321",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40469",
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4324.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4324.json
index ce965730eda..bc54c54d58d 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4324.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4324.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4324",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-19T15:59:06.837",
"lastModified": "2024-11-21T02:30:50.107",
"vulnStatus": "Modified",
@@ -299,14 +299,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40470",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76372",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -314,7 +314,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033327",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4325.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4325.json
index 6b1a612015f..cb4e5a6d7d3 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4325.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4325.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4325",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-12T10:59:04.540",
"lastModified": "2024-11-21T02:30:50.240",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151006-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033751",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4327.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4327.json
index 0b904a2de09..009941ebe4a 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4327.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4327.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4327",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-20T00:59:04.967",
"lastModified": "2024-11-21T02:30:50.357",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40518",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76408",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033332",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4328.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4328.json
index f37ea07e904..91b1247ca1b 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4328.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4328.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4328",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-20T00:59:06.060",
"lastModified": "2024-11-21T02:30:50.470",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40522",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76399",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033329",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4329.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4329.json
index c65c44eb980..b325964ce62 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4329.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4329.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4329",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-20T10:59:10.903",
"lastModified": "2024-11-21T02:30:50.587",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40523",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76395",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033329",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4330.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4330.json
index 9a790a3375d..05a990448f9 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4330.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4330.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4330",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-02T16:59:00.173",
"lastModified": "2024-11-21T02:30:50.700",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40541",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033442",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-43xx/CVE-2015-4331.json b/CVE-2015/CVE-2015-43xx/CVE-2015-4331.json
index 503c3633900..4fd14de8193 100644
--- a/CVE-2015/CVE-2015-43xx/CVE-2015-4331.json
+++ b/CVE-2015/CVE-2015-43xx/CVE-2015-4331.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-4331",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-22T17:59:00.113",
"lastModified": "2024-11-21T02:30:50.813",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40553",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033356",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6255.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6255.json
index 48001b38ad8..1a08f8c519a 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6255.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6255.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6255",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-19T15:59:10.853",
"lastModified": "2024-11-21T02:34:39.200",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40555",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76406",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -89,7 +89,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033330",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6256.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6256.json
index fb8abd5dfcd..dc169ca5dfa 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6256.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6256.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6256",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-22T17:59:01.410",
"lastModified": "2024-11-21T02:34:39.313",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40585",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033355",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6258.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6258.json
index 9b79cbf3d6c..0f318ee64f4 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6258.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6258.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6258",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-22T17:59:02.583",
"lastModified": "2024-11-21T02:34:39.417",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40586",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033360",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6259.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6259.json
index 94b11b5abc2..564564aff49 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6259.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6259.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6259",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-04T01:59:02.910",
"lastModified": "2024-11-21T02:34:39.520",
"vulnStatus": "Modified",
@@ -136,14 +136,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150902-cimcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033451",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6260.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6260.json
index 4fc2944361e..69e6726bbd7 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6260.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6260.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6260",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-03T22:59:08.693",
"lastModified": "2024-11-21T02:34:39.633",
"vulnStatus": "Modified",
@@ -148,14 +148,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n5ksnmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035158",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n5ksnmp",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6261.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6261.json
index 05f357a61ce..450abda071f 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6261.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6261.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6261",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-26T14:59:00.130",
"lastModified": "2024-11-21T02:34:39.757",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40620",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033379",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6262.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6262.json
index 91d75613fce..d21242c1e3f 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6262.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6262.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6262",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-25T01:59:10.790",
"lastModified": "2024-11-21T02:34:39.863",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40652",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033364",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6263.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6263.json
index 7eb9b188824..6e4d0bcd5fe 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6263.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6263.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6263",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-12T01:59:20.440",
"lastModified": "2024-11-21T02:34:39.977",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151005-ios-radius",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033747",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6264.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6264.json
index 94b52e5a2d3..bdc67be72c3 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6264.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6264.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6264",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-01T22:59:00.120",
"lastModified": "2023-11-07T02:26:48.420",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6265.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6265.json
index ec58bf77d33..ea7e24f2b22 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6265.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6265.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6265",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-27T02:59:15.077",
"lastModified": "2024-11-21T02:34:40.097",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40666",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76491",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -90,7 +90,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033381",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6266.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6266.json
index bf6b5f44deb..fe35708c795 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6266.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6266.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6266",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-28T15:59:01.297",
"lastModified": "2024-11-21T02:34:40.200",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40691",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033405",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40691",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6267.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6267.json
index 55f5128af35..0bd4f9f8a10 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6267.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6267.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6267",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-29T01:59:00.113",
"lastModified": "2024-11-21T02:34:40.310",
"vulnStatus": "Modified",
@@ -121,14 +121,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40684",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033410",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40684",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6268.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6268.json
index f339ed0162c..9aebd33c2a1 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6268.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6268.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6268",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-29T01:59:01.517",
"lastModified": "2024-11-21T02:34:40.430",
"vulnStatus": "Modified",
@@ -121,14 +121,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40685",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033406",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40685",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6269.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6269.json
index 4e4c3e96a26..d57a9075ffe 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6269.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6269.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6269",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-31T20:59:02.937",
"lastModified": "2024-11-21T02:34:40.540",
"vulnStatus": "Modified",
@@ -121,14 +121,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40686",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033410",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40686",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6270.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6270.json
index 30db2679706..b6809a00232 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6270.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6270.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6270",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-31T20:59:04.170",
"lastModified": "2024-11-21T02:34:40.660",
"vulnStatus": "Modified",
@@ -121,14 +121,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40687",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033410",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40687",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6271.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6271.json
index 8e53b66cf5c..9f5c4fbefab 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6271.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6271.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6271",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-31T20:59:05.217",
"lastModified": "2024-11-21T02:34:40.780",
"vulnStatus": "Modified",
@@ -191,14 +191,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40688",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033410",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40688",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6272.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6272.json
index c3d208750ca..8707eebe52a 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6272.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6272.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6272",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-31T20:59:06.280",
"lastModified": "2024-11-21T02:34:40.900",
"vulnStatus": "Modified",
@@ -151,14 +151,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40689",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033410",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40689",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6273.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6273.json
index 5e7ebd26746..668cb50668c 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6273.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6273.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6273",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-08-29T01:59:02.690",
"lastModified": "2024-11-21T02:34:41.017",
"vulnStatus": "Modified",
@@ -136,14 +136,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40690",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033408",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40690",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6274.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6274.json
index 3b0e6e2734f..a0494c79ed3 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6274.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6274.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6274",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-02T16:59:02.080",
"lastModified": "2024-11-21T02:34:41.140",
"vulnStatus": "Modified",
@@ -86,14 +86,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40708",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033437",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40708",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6276.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6276.json
index 46a2b0a5ced..775862d34ca 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6276.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6276.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6276",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-05T02:59:05.367",
"lastModified": "2024-11-21T02:34:41.257",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40727",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033477",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6277.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6277.json
index 6ce53bf5248..3d8abd5d690 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6277.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6277.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6277",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-02T16:59:03.907",
"lastModified": "2024-11-21T02:34:41.370",
"vulnStatus": "Modified",
@@ -187,14 +187,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40748",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033443",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40748",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6278.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6278.json
index 831fbfb16ff..000efbf95fd 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6278.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6278.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6278",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-28T02:59:09.887",
"lastModified": "2024-11-21T02:34:41.480",
"vulnStatus": "Modified",
@@ -844,21 +844,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-fhs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-fhs/cvrf/cisco-sa-20150923-fhs_cvrf.xml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033647",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6279.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6279.json
index 0d139ad5a20..e678063a794 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6279.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6279.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6279",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-28T02:59:11.027",
"lastModified": "2024-11-21T02:34:41.617",
"vulnStatus": "Modified",
@@ -764,21 +764,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-fhs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-fhs/cvrf/cisco-sa-20150923-fhs_cvrf.xml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033647",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6280.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6280.json
index d2458e22f25..ff4d7984757 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6280.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6280.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6280",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-28T02:59:12.013",
"lastModified": "2024-11-21T02:34:41.753",
"vulnStatus": "Modified",
@@ -439,21 +439,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk/cvrf/cisco-sa-20150923-sshpk_cvrf.xml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033646",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6282.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6282.json
index 0962628ed7f..6cfe6e1c17a 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6282.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6282.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6282",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-26T01:59:06.470",
"lastModified": "2024-11-21T02:34:41.870",
"vulnStatus": "Modified",
@@ -548,14 +548,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-iosxe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033645",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6283.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6283.json
index 1139c7114f8..f8d234c07ca 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6283.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6283.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6283",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.640",
"lastModified": "2023-11-07T02:26:48.740",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6284.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6284.json
index 9ea472a64f0..1faba1aca12 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6284.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6284.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6284",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-20T14:59:02.367",
"lastModified": "2024-11-21T02:34:42.013",
"vulnStatus": "Modified",
@@ -176,14 +176,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150916-tps",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033580",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6285.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6285.json
index 9b957ae36f0..276557a9f49 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6285.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6285.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6285",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-14T01:59:03.137",
"lastModified": "2024-11-21T02:34:42.137",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40844",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033531",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6286.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6286.json
index d71b657f957..1e607d52720 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6286.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6286.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6286",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-14T01:59:04.230",
"lastModified": "2024-11-21T02:34:42.260",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40845",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6287.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6287.json
index 9f960b3989d..30625c80510 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6287.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6287.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6287",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-14T01:59:05.433",
"lastModified": "2024-11-21T02:34:42.373",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40846",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76677",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -99,7 +99,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033529",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6288.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6288.json
index 833a8bc3a2b..e45e7629168 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6288.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6288.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6288",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-14T01:59:06.327",
"lastModified": "2024-11-21T02:34:42.493",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40847",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033505",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6289.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6289.json
index c7017390091..a9fb8d42aea 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6289.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6289.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6289",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-23T00:59:00.127",
"lastModified": "2024-11-21T02:34:42.600",
"vulnStatus": "Modified",
@@ -118,14 +118,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-isr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91322",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -133,7 +133,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036141",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6290.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6290.json
index d0c2eeb8e51..19d3970b694 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6290.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6290.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6290",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-14T01:59:07.717",
"lastModified": "2024-11-21T02:34:42.723",
"vulnStatus": "Modified",
@@ -89,14 +89,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40896",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/76687",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033530",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6291.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6291.json
index 009c6cd80da..bbebc2a8245 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6291.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6291.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6291",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-06T03:59:00.090",
"lastModified": "2024-11-21T02:34:42.863",
"vulnStatus": "Modified",
@@ -149,14 +149,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-esa2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034064",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-esa2",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6292.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6292.json
index 4404f0221c0..df1402755e0 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6292.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6292.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6292",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-06T11:59:02.807",
"lastModified": "2024-11-21T02:34:42.993",
"vulnStatus": "Modified",
@@ -104,14 +104,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-wsa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034062",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-wsa1",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6293.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6293.json
index ea38104e361..e59ce5d9c0e 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6293.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6293.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6293",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-06T03:59:02.497",
"lastModified": "2024-11-21T02:34:43.110",
"vulnStatus": "Modified",
@@ -119,14 +119,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-wsa2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034063",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-wsa2",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6294.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6294.json
index 78be59b4021..4307bea036d 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6294.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6294.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6294",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-18T22:59:01.827",
"lastModified": "2024-11-21T02:34:43.227",
"vulnStatus": "Modified",
@@ -119,14 +119,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41006",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033612",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6295.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6295.json
index 779e607300f..ec80d9786a8 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6295.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6295.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6295",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-20T14:59:03.850",
"lastModified": "2024-11-21T02:34:43.340",
"vulnStatus": "Modified",
@@ -121,14 +121,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033611",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6296.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6296.json
index b861422bdef..e97897b22cf 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6296.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6296.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6296",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-18T22:59:03.217",
"lastModified": "2024-11-21T02:34:43.460",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41041",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033613",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6297.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6297.json
index b5bee9e9a58..1d858089b45 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6297.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6297.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6297",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-18T22:59:04.343",
"lastModified": "2024-11-21T02:34:43.577",
"vulnStatus": "Modified",
@@ -111,14 +111,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41060",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033614",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6298.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6298.json
index e8a24d5306c..4542e383faa 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6298.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6298.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6298",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-06T11:59:03.730",
"lastModified": "2024-11-21T02:34:43.693",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-wsa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034059",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-wsa",
diff --git a/CVE-2015/CVE-2015-62xx/CVE-2015-6299.json b/CVE-2015/CVE-2015-62xx/CVE-2015-6299.json
index b9f5bd66354..266d9de7d26 100644
--- a/CVE-2015/CVE-2015-62xx/CVE-2015-6299.json
+++ b/CVE-2015/CVE-2015-62xx/CVE-2015-6299.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6299",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-20T14:59:04.943",
"lastModified": "2024-11-21T02:34:43.810",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41074",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033622",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6300.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6300.json
index 6c5ce9877bc..2f77fc185f3 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6300.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6300.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6300",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-20T14:59:05.960",
"lastModified": "2024-11-21T02:34:43.943",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41087",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033615",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6301.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6301.json
index f158ba52d82..73500bb06bc 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6301.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6301.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6301",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-20T14:59:06.960",
"lastModified": "2024-11-21T02:34:44.060",
"vulnStatus": "Modified",
@@ -111,14 +111,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41101",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033623",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6302.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6302.json
index 62b11ca443c..b5a00a84c47 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6302.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6302.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6302",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-26T01:59:08.673",
"lastModified": "2024-11-21T02:34:44.187",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41102",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033624",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6303.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6303.json
index 45a107018bb..82f7464bb6e 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6303.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6303.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6303",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-24T14:59:00.123",
"lastModified": "2024-11-21T02:34:44.303",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41127",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6304.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6304.json
index fcd7df9798d..f1da2e8fe6d 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6304.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6304.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6304",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-24T14:59:01.703",
"lastModified": "2024-11-21T02:34:44.417",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41128",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033644",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6305.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6305.json
index 696c0e59e06..49a13412704 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6305.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6305.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6305",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-26T01:59:09.627",
"lastModified": "2024-11-21T02:34:44.527",
"vulnStatus": "Modified",
@@ -336,7 +336,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/133876/Cisco-AnyConnect-Secure-Mobility-Client-3.1.08009-Privilege-Elevation.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -344,7 +344,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2015/Sep/80",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -352,14 +352,14 @@
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41136",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033643",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -367,7 +367,7 @@
},
{
"url": "https://code.google.com/p/google-security-research/issues/detail?id=460",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Vendor Advisory"
@@ -375,7 +375,7 @@
},
{
"url": "https://www.exploit-db.com/exploits/38289/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6306.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6306.json
index 6a698806b5b..39958dafb23 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6306.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6306.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6306",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-26T01:59:10.657",
"lastModified": "2024-11-21T02:34:44.670",
"vulnStatus": "Modified",
@@ -91,7 +91,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/133685/Cisco-AnyConnect-DMG-Install-Script-Privilege-Escalation.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -100,7 +100,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2015/Sep/86",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -108,18 +108,18 @@
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41135",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/536534/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1033656",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://www.exploit-db.com/exploits/38303/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -136,7 +136,7 @@
},
{
"url": "https://www.securify.nl/advisory/SFY20150701/cisco_anyconnect_elevation_%20of_privileges_via_dmg_install_script.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Third Party Advisory"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6307.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6307.json
index 44c1572222e..80eac09aad6 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6307.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6307.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6307",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-28T02:59:13.107",
"lastModified": "2024-11-21T02:34:44.803",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41131",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6308.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6308.json
index 8b4deac08dd..957ef5c4b16 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6308.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6308.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6308",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-02T15:59:01.457",
"lastModified": "2024-11-21T02:34:44.910",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41240",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033717",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6309.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6309.json
index e91b9633ce4..5f69ca44b78 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6309.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6309.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6309",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-02T15:59:03.223",
"lastModified": "2024-11-21T02:34:45.023",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41241",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033716",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6310.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6310.json
index a1e88603a66..80ae76239ce 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6310.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6310.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6310",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-08T20:59:01.817",
"lastModified": "2024-11-21T02:34:45.123",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41242",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033732",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6311.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6311.json
index be4c93d5b41..a162a746312 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6311.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6311.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6311",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-08T20:59:03.380",
"lastModified": "2024-11-21T02:34:45.270",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=41249",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033731",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6312.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6312.json
index d08a3571e93..c5c90ee5959 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6312.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6312.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6312",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-06T23:59:00.113",
"lastModified": "2024-11-21T02:34:45.453",
"vulnStatus": "Modified",
@@ -144,14 +144,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035500",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts2",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6313.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6313.json
index 2b45f2b7ca1..0be7e81fbd7 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6313.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6313.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6313",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-06T23:59:01.283",
"lastModified": "2024-11-21T02:34:45.620",
"vulnStatus": "Modified",
@@ -143,14 +143,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035501",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts1",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6314.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6314.json
index 441650e259b..3be8ecf718e 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6314.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6314.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6314",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-15T03:59:05.153",
"lastModified": "2024-11-21T02:34:45.787",
"vulnStatus": "Modified",
@@ -120,14 +120,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034665",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-wlc",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6315.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6315.json
index 18bc786c886..f6a7bcabe52 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6315.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6315.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6315",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-13T00:59:00.107",
"lastModified": "2024-11-21T02:34:45.940",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151005-aironet",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033746",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6316.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6316.json
index 5fa8c1e9f09..fdcd575e54b 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6316.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6316.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6316",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-06T11:59:04.777",
"lastModified": "2024-11-21T02:34:46.113",
"vulnStatus": "Modified",
@@ -139,7 +139,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-mse-cred",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
@@ -147,7 +147,7 @@
},
{
"url": "http://www.securityfocus.com/bid/77432",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -155,7 +155,7 @@
},
{
"url": "http://www.securitytracker.com/id/1034065",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6317.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6317.json
index d3a676df64b..801172be1b5 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6317.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6317.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6317",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-23T05:59:00.113",
"lastModified": "2024-11-21T02:34:46.270",
"vulnStatus": "Modified",
@@ -330,14 +330,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-ise2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034767",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-ise2",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6318.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6318.json
index 5b7d0f6feef..370c36a8214 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6318.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6318.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6318",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-12T10:59:09.210",
"lastModified": "2024-11-21T02:34:46.447",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151007-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033781",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6319.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6319.json
index 588be05bb8c..027aaf5bf7b 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6319.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6319.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6319",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-27T22:59:00.100",
"lastModified": "2024-11-21T02:34:46.617",
"vulnStatus": "Modified",
@@ -267,14 +267,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034830",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6320.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6320.json
index 150df5e8e0d..91a507500bb 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6320.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6320.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6320",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-15T03:59:06.077",
"lastModified": "2024-11-21T02:34:46.773",
"vulnStatus": "Modified",
@@ -127,14 +127,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-aironet",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034668",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-aironet",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6321.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6321.json
index 2b940505d23..3bf4c78cd1c 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6321.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6321.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6321",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-06T03:59:03.433",
"lastModified": "2024-11-21T02:34:46.890",
"vulnStatus": "Modified",
@@ -289,18 +289,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-aos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034060",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034061",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-aos",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6322.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6322.json
index 80e98b7fb8c..c9484fff39c 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6322.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6322.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6322",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-12T10:59:10.320",
"lastModified": "2024-11-21T02:34:47.010",
"vulnStatus": "Modified",
@@ -329,14 +329,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151008-asmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033785",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6323.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6323.json
index 35f436f17e8..0a4dea8b782 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6323.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6323.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6323",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-15T03:59:06.950",
"lastModified": "2024-11-21T02:34:47.143",
"vulnStatus": "Modified",
@@ -340,14 +340,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034666",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-ise",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6324.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6324.json
index 1354000011b..28a0a69098b 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6324.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6324.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6324",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-25T02:59:05.133",
"lastModified": "2024-11-21T02:34:47.277",
"vulnStatus": "Modified",
@@ -314,14 +314,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dhcp1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033912",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6325.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6325.json
index 164fdc6d2ac..53e239a86ed 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6325.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6325.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6325",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-25T02:59:07.247",
"lastModified": "2024-11-21T02:34:47.410",
"vulnStatus": "Modified",
@@ -944,14 +944,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/77260",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -959,7 +959,7 @@
},
{
"url": "http://www.securitytracker.com/id/1033913",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6326.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6326.json
index 237cf658a40..a6d32fee6da 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6326.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6326.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6326",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-25T02:59:08.353",
"lastModified": "2024-11-21T02:34:47.560",
"vulnStatus": "Modified",
@@ -974,14 +974,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034156",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns2",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6327.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6327.json
index ef072abd564..4fcc149d53c 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6327.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6327.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6327",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-25T02:59:09.527",
"lastModified": "2024-11-21T02:34:47.717",
"vulnStatus": "Modified",
@@ -939,14 +939,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-ike",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033914",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6328.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6328.json
index 60667e07d10..b35c0091073 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6328.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6328.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6328",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-13T00:59:01.543",
"lastModified": "2024-11-21T02:34:47.867",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151008-pca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033784",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6329.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6329.json
index 1744693edd1..570aa113080 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6329.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6329.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6329",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-12T10:59:11.430",
"lastModified": "2024-11-21T02:34:48.003",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151008-pcp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033783",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6330.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6330.json
index 3e2695ad798..a850ee08681 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6330.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6330.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6330",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-18T11:59:00.120",
"lastModified": "2024-11-21T02:34:48.113",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151008-pca1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6331.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6331.json
index 32b2c1e4c95..31394025d03 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6331.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6331.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6331",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-12T10:59:12.337",
"lastModified": "2024-11-21T02:34:48.220",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151008-pca2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033782",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6332.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6332.json
index 20a088f1d22..1678d4c23e9 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6332.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6332.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6332",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-13T00:59:02.543",
"lastModified": "2024-11-21T02:34:48.330",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151008-cpi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033786",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6333.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6333.json
index ca33ff5b92f..154eddcac02 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6333.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6333.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6333",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-16T01:59:05.857",
"lastModified": "2024-11-21T02:34:48.447",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151012-apic",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033793",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6334.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6334.json
index cd5f579480a..db9c3600ada 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6334.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6334.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6334",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-16T01:59:08.153",
"lastModified": "2024-11-21T02:34:48.563",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151012-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033792",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6335.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6335.json
index 745cdb9c953..ed36b67e4bf 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6335.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6335.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6335",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-25T02:59:10.467",
"lastModified": "2024-11-21T02:34:48.677",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151016-fmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033873",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6336.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6336.json
index b8cb7f94bfc..d779fd26ab9 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6336.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6336.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6336",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-15T03:59:08.107",
"lastModified": "2024-11-21T02:34:48.793",
"vulnStatus": "Modified",
@@ -147,14 +147,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-air",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034667",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-air",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6337.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6337.json
index f937b661e7a..af4d6302456 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6337.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6337.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6337",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-26T05:59:00.083",
"lastModified": "2024-11-21T02:34:48.913",
"vulnStatus": "Modified",
@@ -101,14 +101,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160125-api",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034827",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160125-api",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6338.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6338.json
index 795362be746..3b6b59ed99d 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6338.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6338.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6338",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.670",
"lastModified": "2023-11-07T02:26:49.443",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6339.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6339.json
index f9272920d5d..4d378076eb7 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6339.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6339.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6339",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.687",
"lastModified": "2023-11-07T02:26:49.660",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6340.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6340.json
index 9340ae1828b..72f9dd48255 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6340.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6340.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6340",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-27T02:59:01.683",
"lastModified": "2024-11-21T02:34:49.053",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151016-asrcdma",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033872",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6341.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6341.json
index d87020c0f6e..333428e6e11 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6341.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6341.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6341",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-25T02:59:11.480",
"lastModified": "2024-11-21T02:34:49.167",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151016-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033871",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6342.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6342.json
index 282378995f3..679915d3c1b 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6342.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6342.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6342",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.717",
"lastModified": "2023-11-07T02:26:49.910",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6343.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6343.json
index 7ac019b4269..1dc2681c590 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6343.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6343.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6343",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-31T04:59:04.177",
"lastModified": "2024-11-21T02:34:49.297",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151026-cube",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6344.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6344.json
index eced7a3fe3a..ac96b672236 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6344.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6344.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6344",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-30T10:59:00.117",
"lastModified": "2024-11-21T02:34:49.400",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151027-cas",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034001",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151027-cas",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6345.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6345.json
index 4b68419d11a..a67d2a0628a 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6345.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6345.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6345",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-30T10:59:02.430",
"lastModified": "2024-11-21T02:34:49.507",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033967",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6346.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6346.json
index 6ac8999a248..39f43059e17 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6346.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6346.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6346",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-30T10:59:03.603",
"lastModified": "2024-11-21T02:34:49.620",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033969",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_xss",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6347.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6347.json
index ed0f9fd6204..d164f2e6797 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6347.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6347.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6347",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-30T10:59:04.683",
"lastModified": "2024-11-21T02:34:49.727",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_rbac",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033971",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_rbac",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6348.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6348.json
index 3de8bc8ee0d..b84a99dfc46 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6348.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6348.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6348",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-30T10:59:06.010",
"lastModified": "2024-11-21T02:34:49.837",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_rbac1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033970",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_rbac1",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6349.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6349.json
index 65652dcf7a5..af1aaeacf9d 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6349.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6349.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6349",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-30T10:59:07.107",
"lastModified": "2024-11-21T02:34:49.940",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_xss1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1033968",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_xss1",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6350.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6350.json
index 1c031c4d2e7..838ad8f3cc3 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6350.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6350.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6350",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-30T10:59:08.433",
"lastModified": "2024-11-21T02:34:50.047",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151028-psc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034023",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151028-psc",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6351.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6351.json
index 43cfdeeaa71..cb552e3d897 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6351.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6351.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6351",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-30T10:59:09.527",
"lastModified": "2024-11-21T02:34:50.157",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151028-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034024",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151028-asr",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6352.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6352.json
index d505a7be350..73f73a34e06 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6352.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6352.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6352",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-30T10:59:10.967",
"lastModified": "2024-11-21T02:34:50.267",
"vulnStatus": "Modified",
@@ -89,18 +89,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151027-ucd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/77341",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034022",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151027-ucd",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6353.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6353.json
index 1788ea74921..bebd4c7d0ca 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6353.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6353.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6353",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-31T04:59:05.757",
"lastModified": "2024-11-21T02:34:50.377",
"vulnStatus": "Modified",
@@ -104,14 +104,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151029-fsmc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034040",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151029-fsmc1",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6354.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6354.json
index 464d884fb69..8be136e2e02 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6354.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6354.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6354",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-10-31T04:59:06.663",
"lastModified": "2024-11-21T02:34:50.480",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151029-fsmc2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034041",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151029-fsmc2",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6355.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6355.json
index d9ddc28d9e3..d42781d860b 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6355.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6355.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6355",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-04T03:59:09.340",
"lastModified": "2024-11-21T02:34:50.593",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151102-ucs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034042",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151102-ucs",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6356.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6356.json
index 850d341d84a..3484014ade9 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6356.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6356.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6356",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-04T03:59:10.577",
"lastModified": "2024-11-21T02:34:50.707",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151103-csm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034048",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151103-csm",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6357.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6357.json
index 2eb74c1bd9d..80ec63344c5 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6357.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6357.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6357",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-18T11:59:01.387",
"lastModified": "2024-11-21T02:34:50.813",
"vulnStatus": "Modified",
@@ -104,30 +104,30 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/134390/Cisco-FireSIGHT-Management-Center-Certificate-Validation.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://seclists.org/fulldisclosure/2015/Nov/79",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151116-fmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://wadofstuff.blogspot.com.au/2015/11/cve-2015-6357-firepwner-exploit-for.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/archive/1/536913/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034161",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://packetstormsecurity.com/files/134390/Cisco-FireSIGHT-Management-Center-Certificate-Validation.html",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6358.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6358.json
index 77317907642..b269c17c8d6 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6358.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6358.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6358",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-12T15:29:00.217",
"lastModified": "2024-11-21T02:34:50.923",
"vulnStatus": "Modified",
@@ -752,7 +752,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Patch",
@@ -761,7 +761,7 @@
},
{
"url": "http://www.kb.cert.org/vuls/id/566724",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -769,7 +769,7 @@
},
{
"url": "http://www.securityfocus.com/bid/78047",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -777,7 +777,7 @@
},
{
"url": "http://www.securitytracker.com/id/1034255",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -785,7 +785,7 @@
},
{
"url": "http://www.securitytracker.com/id/1034256",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -793,7 +793,7 @@
},
{
"url": "http://www.securitytracker.com/id/1034257",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -801,7 +801,7 @@
},
{
"url": "http://www.securitytracker.com/id/1034258",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6359.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6359.json
index 7ca90c7add6..225131e005e 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6359.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6359.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6359",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-15T05:59:02.913",
"lastModified": "2024-11-21T02:34:51.087",
"vulnStatus": "Modified",
@@ -94,18 +94,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151214-ios",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/79200",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034432",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151214-ios",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6360.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6360.json
index 429572133a6..a41a986d94a 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6360.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6360.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6360",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-21T10:59:00.117",
"lastModified": "2024-11-21T02:34:51.213",
"vulnStatus": "Modified",
@@ -1616,42 +1616,42 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-libsrtp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2016/dsa-3539",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035636",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035637",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035648",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035649",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035650",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035651",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035652",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-libsrtp",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6361.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6361.json
index 347877a450a..20eba1dbc97 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6361.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6361.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6361",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-13T03:59:00.127",
"lastModified": "2024-11-21T02:34:51.393",
"vulnStatus": "Modified",
@@ -86,7 +86,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151208-xb3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6362.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6362.json
index e2276146eee..5830045dba8 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6362.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6362.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6362",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-10T03:59:01.473",
"lastModified": "2024-11-21T02:34:51.510",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151109-cg-nms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034106",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151109-cg-nms",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6363.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6363.json
index 07cf95ed639..2bc9fe7e6ad 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6363.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6363.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6363",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-12T03:59:01.293",
"lastModified": "2024-11-21T02:34:51.617",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151111-fmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034138",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151111-fmc",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6364.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6364.json
index c2569661225..f16eb8a863a 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6364.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6364.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6364",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-14T03:59:01.723",
"lastModified": "2024-11-21T02:34:51.730",
"vulnStatus": "Modified",
@@ -75,14 +75,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151112-vds",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034159",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151112-vds",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6365.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6365.json
index 5400c1c58c8..0cf8308fc95 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6365.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6365.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6365",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-14T03:59:03.240",
"lastModified": "2024-11-21T02:34:51.837",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151112-ios1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034158",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151112-ios1",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6366.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6366.json
index 301920c543f..736cc45d054 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6366.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6366.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6366",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-13T03:59:02.913",
"lastModified": "2024-11-21T02:34:51.947",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151112-ios2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034141",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151112-ios2",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6367.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6367.json
index 40b67b9323d..ad15d020f42 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6367.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6367.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6367",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-14T03:59:04.160",
"lastModified": "2024-11-21T02:34:52.060",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151113-aironet",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034157",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151113-aironet",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6368.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6368.json
index 62cab6f3e4b..858c5148ffe 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6368.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6368.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6368",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-19T02:59:00.107",
"lastModified": "2024-11-21T02:34:52.177",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151116-firepower",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6369.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6369.json
index c404f5ddc59..d31aadcdb48 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6369.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6369.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6369",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-19T02:59:02.657",
"lastModified": "2024-11-21T02:34:52.290",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151116-fire",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6370.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6370.json
index 7eb7881e515..a543be8e2e6 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6370.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6370.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6370",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-19T02:59:03.830",
"lastModified": "2024-11-21T02:34:52.390",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151116-fire1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6371.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6371.json
index 33494f4e6e8..1b111fbd358 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6371.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6371.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6371",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-19T02:59:05.097",
"lastModified": "2024-11-21T02:34:52.507",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151117-firepower1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6372.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6372.json
index 7a8be0c3692..7a225c477a2 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6372.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6372.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6372",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-18T15:59:02.040",
"lastModified": "2024-11-21T02:34:52.620",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151117-firepower2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6373.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6373.json
index 7755c9c5674..5f87b974d29 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6373.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6373.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6373",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-18T15:59:03.290",
"lastModified": "2024-11-21T02:34:52.730",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151117-firepower3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6374.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6374.json
index 661ec2d3414..5cd45f18d33 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6374.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6374.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6374",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-19T02:59:06.317",
"lastModified": "2024-11-21T02:34:52.840",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151117-firepower4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6375.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6375.json
index a4d53dc978c..b10349bbd8f 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6375.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6375.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6375",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-21T11:59:02.563",
"lastModified": "2024-11-21T02:34:52.970",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151120-ns",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/77676",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151120-ns",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6376.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6376.json
index 76fd2957005..abd61e31a20 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6376.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6376.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6376",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-21T11:59:14.977",
"lastModified": "2024-11-21T02:34:53.100",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151120-tvcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6377.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6377.json
index 4c0a430cf4b..8d75c82a6d3 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6377.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6377.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6377",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-24T04:59:00.177",
"lastModified": "2024-11-21T02:34:53.217",
"vulnStatus": "Modified",
@@ -79,7 +79,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151123-vts",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6378.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6378.json
index f31de961fae..d2e15409c1a 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6378.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6378.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6378",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-14T03:59:00.117",
"lastModified": "2024-11-21T02:34:53.347",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151208-gateway",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034345",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151208-gateway",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6379.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6379.json
index 25b3c8667aa..869b7b735af 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6379.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6379.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6379",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-25T04:59:00.153",
"lastModified": "2024-11-21T02:34:53.467",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151123-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034251",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151123-asa",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6380.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6380.json
index e219e432631..b05768750aa 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6380.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6380.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6380",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-24T04:59:03.007",
"lastModified": "2024-11-21T02:34:53.590",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151123-fire",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6382.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6382.json
index f3ebcca620d..953cbf36fc6 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6382.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6382.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6382",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-11-26T03:59:00.130",
"lastModified": "2024-11-21T02:34:53.700",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-asr5000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034254",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-asr5000",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6383.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6383.json
index cffcafeca3a..f9a5b775e78 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6383.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6383.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6383",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-03T03:59:00.127",
"lastModified": "2024-11-21T02:34:53.820",
"vulnStatus": "Modified",
@@ -74,22 +74,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151130-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/78521",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034277",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034296",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151130-asa",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6384.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6384.json
index 0ff56b704e4..2ca51b6924a 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6384.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6384.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6384",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-05T03:59:00.137",
"lastModified": "2024-11-21T02:34:53.933",
"vulnStatus": "Modified",
@@ -74,7 +74,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151201-wmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6385.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6385.json
index 753273cf5b4..de333e382bd 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6385.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6385.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6385",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-01T11:59:00.127",
"lastModified": "2024-11-21T02:34:54.043",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151130-csr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034274",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151130-csr",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6386.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6386.json
index cfb4b121398..3f0f7c0caf0 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6386.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6386.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6386",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-01T11:59:03.143",
"lastModified": "2024-11-21T02:34:54.147",
"vulnStatus": "Modified",
@@ -79,14 +79,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151130-wsa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034276",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151130-wsa",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6387.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6387.json
index 8b710e24146..82846255c5c 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6387.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6387.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6387",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-05T03:59:02.750",
"lastModified": "2024-11-21T02:34:54.253",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151201-ucs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034275",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151201-ucs",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6388.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6388.json
index 04c3fd8596e..c74f404d78d 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6388.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6388.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6388",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-05T03:59:04.173",
"lastModified": "2024-11-21T02:34:54.363",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151201-ucs1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/78870",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034380",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151201-ucs1",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6389.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6389.json
index a4ba58b418c..1bb7f877309 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6389.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6389.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6389",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-13T03:59:01.517",
"lastModified": "2024-11-21T02:34:54.473",
"vulnStatus": "Modified",
@@ -79,18 +79,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-pca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/78738",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034361",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-pca",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6390.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6390.json
index 3e648f73bc8..60fa17fa7f2 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6390.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6390.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6390",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-03T03:59:02.000",
"lastModified": "2024-11-21T02:34:54.583",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151202-pca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034286",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151202-pca",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6391.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6391.json
index 4ced4a610b9..8de083e49a5 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6391.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6391.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6391",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-05T03:59:05.360",
"lastModified": "2024-11-21T02:34:54.697",
"vulnStatus": "Modified",
@@ -104,14 +104,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151202-sip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034285",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151202-sip",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6392.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6392.json
index 2d998e8fa71..2d6f727d0e1 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6392.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6392.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6392",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-06T01:59:01.637",
"lastModified": "2024-11-21T02:34:54.800",
"vulnStatus": "Modified",
@@ -874,18 +874,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-dhcp1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93406",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036948",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-dhcp1",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6393.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6393.json
index 0b85d773f62..5fd47c88e45 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6393.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6393.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6393",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-06T10:59:01.477",
"lastModified": "2024-11-21T02:34:54.953",
"vulnStatus": "Modified",
@@ -819,18 +819,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-dhcp2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93419",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036949",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-dhcp2",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6394.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6394.json
index 6f04ba894d3..e290239d77c 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6394.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6394.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6394",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-05T03:59:06.347",
"lastModified": "2024-11-21T02:34:55.097",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-nexus",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034295",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-nexus",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6395.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6395.json
index 3489cadb20b..1f418c7bb6e 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6395.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6395.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6395",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-12T11:59:00.120",
"lastModified": "2024-11-21T02:34:55.207",
"vulnStatus": "Modified",
@@ -89,14 +89,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151207-psc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034313",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151207-psc",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6396.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6396.json
index 0884f8935ac..cb262942349 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6396.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6396.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6396",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-08T00:59:00.140",
"lastModified": "2024-11-21T02:34:55.313",
"vulnStatus": "Modified",
@@ -162,7 +162,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv110_130w1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
@@ -170,15 +170,15 @@
},
{
"url": "http://www.securityfocus.com/bid/92269",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036528",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.exploit-db.com/exploits/45986/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv110_130w1",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6397.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6397.json
index 4dbbf150a3d..1245ec2734e 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6397.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6397.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6397",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-08T00:59:01.267",
"lastModified": "2024-11-21T02:34:55.440",
"vulnStatus": "Modified",
@@ -162,7 +162,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv110_130w2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"VDB Entry",
@@ -171,11 +171,11 @@
},
{
"url": "http://www.securityfocus.com/bid/92273",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036524",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv110_130w2",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6398.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6398.json
index b94e738d712..6c0a21b9f6b 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6398.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6398.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6398",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-07T11:59:00.100",
"lastModified": "2024-11-21T02:34:55.550",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-n9knci",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034928",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-n9knci",
diff --git a/CVE-2015/CVE-2015-63xx/CVE-2015-6399.json b/CVE-2015/CVE-2015-63xx/CVE-2015-6399.json
index 340611a4784..5edde36a417 100644
--- a/CVE-2015/CVE-2015-63xx/CVE-2015-6399.json
+++ b/CVE-2015/CVE-2015-63xx/CVE-2015-6399.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6399",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-15T05:59:03.883",
"lastModified": "2024-11-21T02:34:55.653",
"vulnStatus": "Modified",
@@ -79,22 +79,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151211-imc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/108851",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/79031",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1038475",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151211-imc",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6400.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6400.json
index 74dcaeef6d3..510995f74a1 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6400.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6400.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6400",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-13T03:59:02.877",
"lastModified": "2024-11-21T02:34:55.770",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-cer",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/78878",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-cer",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6401.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6401.json
index e31dbd69ca5..5a50786e141 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6401.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6401.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6401",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-14T03:59:01.510",
"lastModified": "2024-11-21T02:34:55.883",
"vulnStatus": "Modified",
@@ -84,18 +84,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151208-cwr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034347",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.exploit-db.com/exploits/39904/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151208-cwr",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6402.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6402.json
index b7207172b99..5c52bb32137 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6402.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6402.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6402",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-14T03:59:02.730",
"lastModified": "2024-11-21T02:34:55.993",
"vulnStatus": "Modified",
@@ -84,18 +84,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151208-wrg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034346",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.exploit-db.com/exploits/39904/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151208-wrg",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6403.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6403.json
index ed884507593..2510dead6e8 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6403.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6403.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6403",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-15T05:59:04.853",
"lastModified": "2024-11-21T02:34:56.100",
"vulnStatus": "Modified",
@@ -163,18 +163,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-ipp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/78739",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034376",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-ipp",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6404.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6404.json
index fc4bc63287f..bb167d8f091 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6404.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6404.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6404",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-15T05:59:05.777",
"lastModified": "2024-11-21T02:34:56.203",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-hcm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/78874",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-hcm",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6405.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6405.json
index e5b679fc23d..9d676e56f1c 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6405.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6405.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6405",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-13T03:59:04.050",
"lastModified": "2024-11-21T02:34:56.310",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-cers",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/78812",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034385",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-cers",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6406.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6406.json
index be8a7787a94..7a530de388f 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6406.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6406.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6406",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-13T03:59:05.147",
"lastModified": "2024-11-21T02:34:56.413",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-ert",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/78816",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034384",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-ert",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6407.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6407.json
index 4274a714eb0..bbb4cf2fe15 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6407.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6407.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6407",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-13T03:59:06.367",
"lastModified": "2024-11-21T02:34:56.520",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-erw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/78817",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034383",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-erw",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6408.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6408.json
index 669cf672bec..b3ac68bc53e 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6408.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6408.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6408",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-12T16:59:00.147",
"lastModified": "2024-11-21T02:34:56.617",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-uc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/78875",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034379",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-uc",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6409.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6409.json
index 315b01b81a2..a9b309fd605 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6409.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6409.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6409",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-26T22:59:00.100",
"lastModified": "2024-11-21T02:34:56.727",
"vulnStatus": "Modified",
@@ -96,22 +96,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151224-jab",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/79678",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034540",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.synacktiv.com/ressources/cisco_jabber_starttls_downgrade.pdf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6410.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6410.json
index b776e4ff8d2..ed006ed524c 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6410.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6410.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6410",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-14T03:59:03.840",
"lastModified": "2024-11-21T02:34:56.837",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/78741",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034377",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-ucm",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6411.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6411.json
index 3cf1ff316b4..bd41f9cbb35 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6411.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6411.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6411",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-15T05:59:06.857",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -84,14 +84,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-fmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/78740",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-fmc",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6412.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6412.json
index 16713963d16..c87c1befb7f 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6412.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6412.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6412",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-22T11:59:00.130",
"lastModified": "2024-11-21T02:34:57.047",
"vulnStatus": "Modified",
@@ -122,7 +122,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-d9036",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6413.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6413.json
index 47ba6899bcf..52c88d57f24 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6413.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6413.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6413",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-13T03:59:07.460",
"lastModified": "2024-11-21T02:34:57.140",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-tvc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/79088",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034378",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-tvc",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6414.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6414.json
index b7e3f437373..abdfbf4fc9c 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6414.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6414.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6414",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-13T03:59:08.400",
"lastModified": "2024-11-21T02:34:57.250",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-tvcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/79065",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034429",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-tvcs",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6415.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6415.json
index aa350ffdbf4..bd32467e356 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6415.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6415.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6415",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-12T16:59:01.603",
"lastModified": "2024-11-21T02:34:57.360",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-ucs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/85711",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034381",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-ucs",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6416.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6416.json
index 21b204f1ead..321e0dcd405 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6416.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6416.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6416",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-14T03:59:05.030",
"lastModified": "2024-11-21T02:34:57.457",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-uim",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/79034",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034382",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-uim",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6417.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6417.json
index 24601ce9b6c..903a8f971fb 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6417.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6417.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6417",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-12T11:59:01.543",
"lastModified": "2024-11-21T02:34:57.557",
"vulnStatus": "Modified",
@@ -94,14 +94,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-vdssm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/78871",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-vdssm",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6418.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6418.json
index de870a687a2..a199d293e33 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6418.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6418.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6418",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-13T03:59:09.477",
"lastModified": "2024-11-21T02:34:57.660",
"vulnStatus": "Modified",
@@ -139,22 +139,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-dwvr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/78876",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034408",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034409",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-dwvr",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6419.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6419.json
index 68cb0b34550..c4beffc58f4 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6419.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6419.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6419",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-12T16:59:02.993",
"lastModified": "2024-11-21T02:34:57.763",
"vulnStatus": "Modified",
@@ -94,14 +94,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151211-fmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/79033",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151211-fmc",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6420.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6420.json
index 23122768f2c..47f365083ba 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6420.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6420.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6420",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-15T05:59:07.823",
"lastModified": "2024-11-21T02:34:57.870",
"vulnStatus": "Modified",
@@ -80,18 +80,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/78872",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -99,36 +99,36 @@
},
{
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21%40%3Ccommits.samza.apache.org%3E",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.kb.cert.org/vuls/id/581311",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.tenable.com/security/research/tra-2017-14",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2017-23",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6421.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6421.json
index 35684a0749a..c07c829f728 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6421.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6421.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6421",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-27T22:59:01.363",
"lastModified": "2024-11-21T02:34:58.017",
"vulnStatus": "Modified",
@@ -155,14 +155,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-waascifs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034831",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-waascifs",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6422.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6422.json
index 35b2e92f635..82071cd74d3 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6422.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6422.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6422",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-14T03:59:06.060",
"lastModified": "2024-11-21T02:34:58.183",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151211-ucdm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/79032",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034407",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151211-ucdm",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6423.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6423.json
index d14b295af10..4e373f224ae 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6423.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6423.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6423",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-15T03:59:08.997",
"lastModified": "2024-11-21T02:34:58.293",
"vulnStatus": "Modified",
@@ -125,14 +125,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160111-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034644",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160111-asa",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6424.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6424.json
index 765342ad4de..3bb10817735 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6424.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6424.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6424",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-18T11:59:00.123",
"lastModified": "2024-11-21T02:34:58.407",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151216-apic",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/79410",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034468",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151216-apic",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6425.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6425.json
index 826d1650d59..f078f295dab 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6425.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6425.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6425",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-16T15:59:00.117",
"lastModified": "2024-11-21T02:34:58.510",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151215-ucmim",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/79275",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034431",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151215-ucmim",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6426.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6426.json
index 1ecc0be345f..0e2569a2574 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6426.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6426.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6426",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-18T11:59:01.560",
"lastModified": "2024-11-21T02:34:58.623",
"vulnStatus": "Modified",
@@ -74,14 +74,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151217-pnsc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/79582",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151217-pnsc",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6427.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6427.json
index 04c656d8405..33f3fc173ad 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6427.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6427.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6427",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-18T11:59:02.793",
"lastModified": "2024-11-21T02:34:58.723",
"vulnStatus": "Modified",
@@ -169,14 +169,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151217-fsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034488",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151217-fsm",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6428.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6428.json
index 6487f767a62..88a8a43c9f2 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6428.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6428.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6428",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-18T11:59:03.937",
"lastModified": "2024-11-21T02:34:58.853",
"vulnStatus": "Modified",
@@ -74,18 +74,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151217-gateway",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/79594",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034487",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151217-gateway",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6429.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6429.json
index 1ea0be4dee5..d6abac85373 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6429.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6429.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6429",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-19T14:59:00.123",
"lastModified": "2024-11-21T02:34:58.960",
"vulnStatus": "Modified",
@@ -169,14 +169,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151218-ios",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034505",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151218-ios",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6431.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6431.json
index 14879ee0457..3bd403f972d 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6431.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6431.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6431",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-12-23T03:59:00.153",
"lastModified": "2024-11-21T02:34:59.063",
"vulnStatus": "Modified",
@@ -95,18 +95,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2015-1221-iosxe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/79654",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034514",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2015-1221-iosxe",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6432.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6432.json
index 77eeb17064b..6ada345c07a 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6432.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6432.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6432",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-05T02:59:05.427",
"lastModified": "2024-11-21T02:34:59.173",
"vulnStatus": "Modified",
@@ -135,14 +135,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160104-iosxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034570",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160104-iosxr",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6433.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6433.json
index 68aa08365e4..440a44450cb 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6433.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6433.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6433",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-08T02:59:00.107",
"lastModified": "2024-11-21T02:34:59.290",
"vulnStatus": "Modified",
@@ -95,14 +95,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160105-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034583",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160105-cucm",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6434.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6434.json
index 787c09b9316..57663236058 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6434.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6434.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6434",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-08T02:59:01.357",
"lastModified": "2024-11-21T02:34:59.397",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160105-pi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034582",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160105-pi",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6435.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6435.json
index 9fb5bd0b6c3..cec9e95fca1 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6435.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6435.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6435",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-22T11:59:01.473",
"lastModified": "2024-11-21T02:34:59.503",
"vulnStatus": "Modified",
@@ -530,7 +530,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/160991/Cisco-UCS-Manager-2.2-1d-Remote-Command-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -539,14 +539,14 @@
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-ucsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034743",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6436.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6436.json
index 20d7a12822c..820a08bdbe8 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6436.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6436.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6436",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.733",
"lastModified": "2023-11-07T02:26:50.840",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6437.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6437.json
index 143a813cce2..97d7635f343 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6437.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6437.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6437",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.763",
"lastModified": "2023-11-07T02:26:51.080",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6438.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6438.json
index c8df58b02dd..1f5eedd3b48 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6438.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6438.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6438",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.780",
"lastModified": "2023-11-07T02:26:51.310",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6439.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6439.json
index c755c260a69..37a095203c3 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6439.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6439.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6439",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.810",
"lastModified": "2023-11-07T02:26:51.533",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6440.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6440.json
index e6a52513c31..e1d9249da4f 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6440.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6440.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6440",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.827",
"lastModified": "2023-11-07T02:26:51.767",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6441.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6441.json
index 90aa7aa686e..5386dfca5a3 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6441.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6441.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6441",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.857",
"lastModified": "2023-11-07T02:26:52.010",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6442.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6442.json
index 292d32e30f2..fbf7d8a2b6f 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6442.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6442.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6442",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.873",
"lastModified": "2023-11-07T02:26:52.240",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6443.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6443.json
index 7b3901e4e50..63d3fe67358 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6443.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6443.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6443",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.907",
"lastModified": "2023-11-07T02:26:52.487",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6444.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6444.json
index d768a0468cc..ad9cb9aa836 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6444.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6444.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6444",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.920",
"lastModified": "2023-11-07T02:26:52.720",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6445.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6445.json
index 5bb2fd0c64b..8061c1c99bb 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6445.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6445.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6445",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.953",
"lastModified": "2023-11-07T02:26:52.960",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6446.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6446.json
index d6b0b32f1e6..43c60c1ddbe 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6446.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6446.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6446",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:49.967",
"lastModified": "2023-11-07T02:26:53.187",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6447.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6447.json
index c5814350f9f..79aeeb6db65 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6447.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6447.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6447",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:50.000",
"lastModified": "2023-11-07T02:26:53.410",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6448.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6448.json
index c2eb57320e8..8f0c7be7113 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6448.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6448.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6448",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:50.013",
"lastModified": "2023-11-07T02:26:53.647",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6449.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6449.json
index 14ec7b2e4c0..288067b9e5a 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6449.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6449.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6449",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:50.047",
"lastModified": "2023-11-07T02:26:53.900",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6450.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6450.json
index e31804598b5..af44617a2cb 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6450.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6450.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6450",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:50.060",
"lastModified": "2023-11-07T02:26:54.137",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6451.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6451.json
index e9c091e6000..aa57da6b294 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6451.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6451.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6451",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:50.093",
"lastModified": "2023-11-07T02:26:54.367",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6452.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6452.json
index 072c39f7404..fd986cffc0b 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6452.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6452.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6452",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:50.123",
"lastModified": "2023-11-07T02:26:54.600",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6453.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6453.json
index 9a48079862c..be3c8f3c8dc 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6453.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6453.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6453",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:50.140",
"lastModified": "2023-11-07T02:26:54.857",
"vulnStatus": "Rejected",
diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6454.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6454.json
index 9a1f103feef..887c5febe6b 100644
--- a/CVE-2015/CVE-2015-64xx/CVE-2015-6454.json
+++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6454.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2015-6454",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2015-09-26T01:59:11.750",
"lastModified": "2024-11-21T02:34:59.887",
"vulnStatus": "Modified",
@@ -75,7 +75,7 @@
"references": [
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-232-01",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
diff --git a/CVE-2016/CVE-2016-12xx/CVE-2016-1287.json b/CVE-2016/CVE-2016-12xx/CVE-2016-1287.json
index 5eb14276bcc..b3f292a4800 100644
--- a/CVE-2016/CVE-2016-12xx/CVE-2016-1287.json
+++ b/CVE-2016/CVE-2016-12xx/CVE-2016-1287.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1287",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-11T18:59:00.137",
"lastModified": "2024-11-21T02:46:07.187",
"vulnStatus": "Modified",
@@ -1086,7 +1086,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/137100/Cisco-ASA-Software-IKEv1-IKEv2-Buffer-Overflow.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -1095,14 +1095,14 @@
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034997",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1110,7 +1110,7 @@
},
{
"url": "https://blog.exodusintel.com/2016/02/10/firewall-hacking/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Technical Description",
@@ -1119,7 +1119,7 @@
},
{
"url": "https://www.exploit-db.com/exploits/39823/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -1128,7 +1128,7 @@
},
{
"url": "https://www.kb.cert.org/vuls/id/327976",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
diff --git a/CVE-2016/CVE-2016-12xx/CVE-2016-1288.json b/CVE-2016/CVE-2016-12xx/CVE-2016-1288.json
index 00bcdaa4d06..292709c2e69 100644
--- a/CVE-2016/CVE-2016-12xx/CVE-2016-1288.json
+++ b/CVE-2016/CVE-2016-12xx/CVE-2016-1288.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1288",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-03T22:59:12.490",
"lastModified": "2024-11-21T02:46:07.367",
"vulnStatus": "Modified",
@@ -100,14 +100,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-wsa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035163",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-wsa",
diff --git a/CVE-2016/CVE-2016-12xx/CVE-2016-1289.json b/CVE-2016/CVE-2016-12xx/CVE-2016-1289.json
index 24407a59b75..55b37bcbc5a 100644
--- a/CVE-2016/CVE-2016-12xx/CVE-2016-1289.json
+++ b/CVE-2016/CVE-2016-12xx/CVE-2016-1289.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1289",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-02T14:59:06.100",
"lastModified": "2024-11-21T02:46:07.487",
"vulnStatus": "Modified",
@@ -171,18 +171,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-piauthbypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91504",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036195",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-piauthbypass",
diff --git a/CVE-2016/CVE-2016-12xx/CVE-2016-1290.json b/CVE-2016/CVE-2016-12xx/CVE-2016-1290.json
index 870a030cc79..639a394645a 100644
--- a/CVE-2016/CVE-2016-12xx/CVE-2016-1290.json
+++ b/CVE-2016/CVE-2016-12xx/CVE-2016-1290.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1290",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-06T23:59:10.910",
"lastModified": "2024-11-21T02:46:07.610",
"vulnStatus": "Modified",
@@ -160,14 +160,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-privauth",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035498",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-privauth",
diff --git a/CVE-2016/CVE-2016-12xx/CVE-2016-1291.json b/CVE-2016/CVE-2016-12xx/CVE-2016-1291.json
index 9f5b973501e..cd47926810a 100644
--- a/CVE-2016/CVE-2016-12xx/CVE-2016-1291.json
+++ b/CVE-2016/CVE-2016-12xx/CVE-2016-1291.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1291",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-06T23:59:11.847",
"lastModified": "2024-11-21T02:46:07.733",
"vulnStatus": "Modified",
@@ -161,18 +161,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-remcode",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035497",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://blogs.securiteam.com/index.php/archives/2727",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-12xx/CVE-2016-1293.json b/CVE-2016/CVE-2016-12xx/CVE-2016-1293.json
index 650bd84e1ab..2211a40d8ff 100644
--- a/CVE-2016/CVE-2016-12xx/CVE-2016-1293.json
+++ b/CVE-2016/CVE-2016-12xx/CVE-2016-1293.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1293",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-16T05:59:05.440",
"lastModified": "2024-11-21T02:46:07.853",
"vulnStatus": "Modified",
@@ -101,14 +101,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160115-FireSIGHT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034689",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-12xx/CVE-2016-1294.json b/CVE-2016/CVE-2016-12xx/CVE-2016-1294.json
index 6544ad8da9c..b125de0e7b3 100644
--- a/CVE-2016/CVE-2016-12xx/CVE-2016-1294.json
+++ b/CVE-2016/CVE-2016-12xx/CVE-2016-1294.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1294",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-16T05:59:06.473",
"lastModified": "2024-11-21T02:46:07.973",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160115-fmc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034690",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-12xx/CVE-2016-1295.json b/CVE-2016/CVE-2016-12xx/CVE-2016-1295.json
index 676eae1082d..f7cd9936ae0 100644
--- a/CVE-2016/CVE-2016-12xx/CVE-2016-1295.json
+++ b/CVE-2016/CVE-2016-12xx/CVE-2016-1295.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1295",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-16T05:59:07.410",
"lastModified": "2024-11-21T02:46:08.090",
"vulnStatus": "Modified",
@@ -221,14 +221,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160115-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034691",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-12xx/CVE-2016-1296.json b/CVE-2016/CVE-2016-12xx/CVE-2016-1296.json
index 1ded1e50fc1..b0b796e22f9 100644
--- a/CVE-2016/CVE-2016-12xx/CVE-2016-1296.json
+++ b/CVE-2016/CVE-2016-12xx/CVE-2016-1296.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1296",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-20T05:59:02.220",
"lastModified": "2024-11-21T02:46:08.217",
"vulnStatus": "Modified",
@@ -106,14 +106,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160119-wsa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034763",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-12xx/CVE-2016-1297.json b/CVE-2016/CVE-2016-12xx/CVE-2016-1297.json
index 1166ddc3c85..ceafe97e372 100644
--- a/CVE-2016/CVE-2016-12xx/CVE-2016-1297.json
+++ b/CVE-2016/CVE-2016-12xx/CVE-2016-1297.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1297",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-26T05:59:00.130",
"lastModified": "2024-11-21T02:46:08.330",
"vulnStatus": "Modified",
@@ -126,14 +126,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160224-ace",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035104",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160224-ace",
diff --git a/CVE-2016/CVE-2016-12xx/CVE-2016-1298.json b/CVE-2016/CVE-2016-12xx/CVE-2016-1298.json
index 413feb475d2..ce9b703e737 100644
--- a/CVE-2016/CVE-2016-12xx/CVE-2016-1298.json
+++ b/CVE-2016/CVE-2016-12xx/CVE-2016-1298.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1298",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-26T05:59:01.223",
"lastModified": "2024-11-21T02:46:08.447",
"vulnStatus": "Modified",
@@ -111,14 +111,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160125-ucce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034828",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-12xx/CVE-2016-1299.json b/CVE-2016/CVE-2016-12xx/CVE-2016-1299.json
index bb0fef44a98..8109bbf85ee 100644
--- a/CVE-2016/CVE-2016-12xx/CVE-2016-1299.json
+++ b/CVE-2016/CVE-2016-12xx/CVE-2016-1299.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1299",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-27T22:59:02.677",
"lastModified": "2024-11-21T02:46:08.590",
"vulnStatus": "Modified",
@@ -237,7 +237,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-sbms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1300.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1300.json
index 7ea6ac1c14e..03470764f09 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1300.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1300.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1300",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-27T22:59:03.770",
"lastModified": "2024-11-21T02:46:08.707",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-uc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1301.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1301.json
index 3fd16ee7572..d25c8869f62 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1301.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1301.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1301",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-07T11:59:01.053",
"lastModified": "2024-11-21T02:46:08.817",
"vulnStatus": "Modified",
@@ -220,18 +220,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-prsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034926",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034927",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-prsm",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1302.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1302.json
index ecda4550c2c..8ded5ad3fa2 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1302.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1302.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1302",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-07T11:59:01.943",
"lastModified": "2024-11-21T02:46:08.933",
"vulnStatus": "Modified",
@@ -234,14 +234,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-apic",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034925",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-apic",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1303.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1303.json
index 76295c6a27a..1c52c1b81d1 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1303.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1303.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1303",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-30T12:59:01.290",
"lastModified": "2024-11-21T02:46:09.050",
"vulnStatus": "Modified",
@@ -177,7 +177,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160128-sbs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1304.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1304.json
index 878844fa0f0..cbc2c526415 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1304.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1304.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1304",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-01-30T12:59:02.243",
"lastModified": "2024-11-21T02:46:09.167",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160128-uc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034868",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160128-uc",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1305.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1305.json
index 0e7aa4a17e8..ee6d30ca727 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1305.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1305.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1305",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-07T11:59:02.880",
"lastModified": "2024-11-21T02:46:09.263",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160201-apic-em",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034902",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160201-apic-em",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1306.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1306.json
index eaf38c03c88..17ab0f97b9a 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1306.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1306.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1306",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-06T05:59:03.370",
"lastModified": "2024-11-21T02:46:09.367",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160201-fd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1307.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1307.json
index 11defb44858..3b37fb32af9 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1307.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1307.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1307",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-07T11:59:03.880",
"lastModified": "2024-11-21T02:46:09.473",
"vulnStatus": "Modified",
@@ -121,18 +121,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160202-fducce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034920",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034921",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160202-fducce",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1308.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1308.json
index 6b200021d10..e65c000a42c 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1308.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1308.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1308",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-07T11:59:04.803",
"lastModified": "2024-11-21T02:46:09.580",
"vulnStatus": "Modified",
@@ -95,14 +95,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034938",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-ucm",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1309.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1309.json
index d9af327b7af..988528ac901 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1309.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1309.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1309",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-07T11:59:05.710",
"lastModified": "2024-11-21T02:46:09.690",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160202-wms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034919",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160202-wms",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1310.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1310.json
index 924e318075a..8915e4aaece 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1310.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1310.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1310",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-06T05:59:04.387",
"lastModified": "2024-11-21T02:46:09.797",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-uc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034937",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-uc",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1311.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1311.json
index bc852c69a34..ba1e1acbb3f 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1311.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1311.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1311",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-06T05:59:05.417",
"lastModified": "2024-11-21T02:46:09.903",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-jgs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034936",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-jgs",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1312.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1312.json
index 10f194867e2..2678956d36f 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1312.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1312.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1312",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-09T20:59:00.147",
"lastModified": "2024-11-21T02:46:10.007",
"vulnStatus": "Modified",
@@ -111,15 +111,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/84281",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035230",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160309-csc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1313.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1313.json
index d438fbd40f9..d9d9baa3ae9 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1313.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1313.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1313",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-06T23:59:12.817",
"lastModified": "2024-11-21T02:46:10.120",
"vulnStatus": "Modified",
@@ -105,14 +105,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-ucs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035496",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-ucs",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1314.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1314.json
index 6767a488fe2..43d3e6ed0a0 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1314.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1314.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1314",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-28T23:59:01.517",
"lastModified": "2024-11-21T02:46:10.243",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160328-ucdm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035425",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160328-ucdm",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1315.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1315.json
index 22917a0867b..9763f9af29b 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1315.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1315.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1315",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-12T01:59:02.113",
"lastModified": "2024-11-21T02:46:10.353",
"vulnStatus": "Modified",
@@ -116,14 +116,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160211-esaamp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035008",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1316.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1316.json
index 71329615f76..f1c48c733bb 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1316.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1316.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1316",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-09T03:59:00.117",
"lastModified": "2024-11-21T02:46:10.463",
"vulnStatus": "Modified",
@@ -155,14 +155,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160208-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034956",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160208-vcs",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1317.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1317.json
index 6191cb4729d..e22fe2a8b07 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1317.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1317.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1317",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-09T03:59:01.070",
"lastModified": "2024-11-21T02:46:10.573",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-201600208-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034957",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-201600208-ucm",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1318.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1318.json
index 44f3d4529de..c5b7ba85f35 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1318.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1318.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1318",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-09T03:59:01.930",
"lastModified": "2024-11-21T02:46:10.680",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160208-apic",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034955",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160208-apic",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1319.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1319.json
index ee10cebbc6c..8dfc168d4f5 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1319.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1319.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1319",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-09T03:59:03.320",
"lastModified": "2024-11-21T02:46:10.783",
"vulnStatus": "Modified",
@@ -151,22 +151,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160208-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1034958",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034959",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1034960",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160208-ucm",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1320.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1320.json
index 32c9e100f2c..18dd5774d10 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1320.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1320.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1320",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-12T01:59:03.083",
"lastModified": "2024-11-21T02:46:10.900",
"vulnStatus": "Modified",
@@ -110,14 +110,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160209-pcp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2016-38",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1321.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1321.json
index 62656ab4e58..2358f89f0f5 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1321.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1321.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1321",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-15T23:59:02.083",
"lastModified": "2024-11-21T02:46:11.010",
"vulnStatus": "Modified",
@@ -155,14 +155,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160212-usc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035014",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160212-usc",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1322.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1322.json
index fc68de168fc..e23ade99b71 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1322.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1322.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1322",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-12T01:59:04.083",
"lastModified": "2024-11-21T02:46:11.120",
"vulnStatus": "Modified",
@@ -95,7 +95,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-sp1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1323.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1323.json
index 6b986b1f486..c5ddaf5ea14 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1323.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1323.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1323",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-12T01:59:05.020",
"lastModified": "2024-11-21T02:46:11.233",
"vulnStatus": "Modified",
@@ -95,7 +95,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-sp2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1324.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1324.json
index 111b47dc300..920846d8aff 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1324.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1324.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1324",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-12T01:59:06.007",
"lastModified": "2024-11-21T02:46:11.347",
"vulnStatus": "Modified",
@@ -95,7 +95,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-sp3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1325.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1325.json
index c8d9a75e472..a606e6c5d05 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1325.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1325.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1325",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-09T20:59:02.193",
"lastModified": "2024-11-21T02:46:11.453",
"vulnStatus": "Modified",
@@ -134,15 +134,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/84278",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035232",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160309-rgid",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1326.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1326.json
index 0ce866f0463..89911442fb7 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1326.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1326.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1326",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-09T20:59:03.147",
"lastModified": "2024-11-21T02:46:11.567",
"vulnStatus": "Modified",
@@ -95,15 +95,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/84280",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035234",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160309-cmdos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1327.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1327.json
index d0b645efccb..3778130236e 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1327.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1327.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1327",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-09T20:59:04.177",
"lastModified": "2024-11-21T02:46:11.677",
"vulnStatus": "Modified",
@@ -134,15 +134,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/84279",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035235",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160309-cmre",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1328.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1328.json
index d60fe149032..31400684a73 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1328.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1328.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1328",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-03T21:59:04.540",
"lastModified": "2024-11-21T02:46:11.790",
"vulnStatus": "Modified",
@@ -108,7 +108,7 @@
"references": [
{
"url": "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"URL Repurposed"
@@ -116,15 +116,15 @@
},
{
"url": "http://www.securityfocus.com/archive/1/538627/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/91547",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.exploit-db.com/exploits/39904/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1329.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1329.json
index 1e468a831f0..c26c4e6d328 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1329.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1329.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1329",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-03T11:59:00.117",
"lastModified": "2024-11-21T02:46:11.900",
"vulnStatus": "Modified",
@@ -186,18 +186,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n3k",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035161",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://isc.sans.edu/forums/diary/20795",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n3k",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1330.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1330.json
index 4f9fe699b5d..81e93ee7dc4 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1330.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1330.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1330",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-15T23:59:03.083",
"lastModified": "2024-11-21T02:46:12.007",
"vulnStatus": "Modified",
@@ -95,14 +95,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160215-ie2000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035013",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160215-ie2000",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1331.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1331.json
index 839c561a5f3..eacad05d4bc 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1331.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1331.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1331",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-15T23:59:04.037",
"lastModified": "2024-11-21T02:46:12.117",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160215-er",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035012",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160215-er",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1332.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1332.json
index 2d2301cde8a..7bb281c6dd6 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1332.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1332.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1332",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:29:57.827",
"lastModified": "2023-11-07T02:29:55.563",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1333.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1333.json
index fb1cf36e081..2809f5ca55a 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1333.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1333.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1333",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-17T16:59:00.173",
"lastModified": "2024-11-21T02:46:12.230",
"vulnStatus": "Modified",
@@ -101,14 +101,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160216-grid",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035035",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160216-grid",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1334.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1334.json
index c27255d268d..d4332181226 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1334.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1334.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1334",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-17T16:59:01.517",
"lastModified": "2024-11-21T02:46:12.333",
"vulnStatus": "Modified",
@@ -95,14 +95,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160216-wap",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035036",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160216-wap",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1335.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1335.json
index a5d1c28fb26..84fbd85fe09 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1335.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1335.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1335",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-19T19:59:03.157",
"lastModified": "2024-11-21T02:46:12.437",
"vulnStatus": "Modified",
@@ -121,14 +121,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160218-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035062",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1336.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1336.json
index e4596d24a27..1beb8ffbc8b 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1336.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1336.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1336",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-03T21:59:05.633",
"lastModified": "2024-11-21T02:46:12.543",
"vulnStatus": "Modified",
@@ -108,7 +108,7 @@
"references": [
{
"url": "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"URL Repurposed"
@@ -116,15 +116,15 @@
},
{
"url": "http://www.securityfocus.com/archive/1/538627/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/91543",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.exploit-db.com/exploits/39904/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1337.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1337.json
index 94b31c338aa..3ed4766bf9e 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1337.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1337.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1337",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-03T21:59:06.727",
"lastModified": "2024-11-21T02:46:12.650",
"vulnStatus": "Modified",
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"URL Repurposed"
@@ -120,15 +120,15 @@
},
{
"url": "http://www.securityfocus.com/archive/1/538627/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/91541",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.exploit-db.com/exploits/39904/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1338.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1338.json
index 671e71236c5..82f5314a5ea 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1338.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1338.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1338",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-12T02:59:02.660",
"lastModified": "2024-11-21T02:46:12.757",
"vulnStatus": "Modified",
@@ -104,7 +104,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160309-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1339.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1339.json
index 1ed7312ee0d..1a2ad02577e 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1339.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1339.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1339",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-16T01:59:04.590",
"lastModified": "2024-11-21T02:46:12.860",
"vulnStatus": "Modified",
@@ -106,14 +106,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160414-ucspe1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035581",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1340.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1340.json
index 0633e1eefe8..af4c2789629 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1340.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1340.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1340",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-16T01:59:05.560",
"lastModified": "2024-11-21T02:46:12.967",
"vulnStatus": "Modified",
@@ -106,14 +106,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160414-ucspe2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035582",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1341.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1341.json
index 51dd5a7981f..bbeb87867c9 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1341.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1341.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1341",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-24T03:59:01.087",
"lastModified": "2024-11-21T02:46:13.080",
"vulnStatus": "Modified",
@@ -110,14 +110,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160223-nx2000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035088",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160223-nx2000",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1342.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1342.json
index fee18f6eca0..7a39cd26999 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1342.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1342.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1342",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-02-26T05:59:01.193",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -175,7 +175,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160224-fmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1343.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1343.json
index a65df4f2e5e..d1c670a53f4 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1343.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1343.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1343",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-30T10:59:04.643",
"lastModified": "2024-11-21T02:46:13.297",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-cis",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1344.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1344.json
index 37a48e8e164..8b8861a3519 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1344.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1344.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1344",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-26T01:59:01.247",
"lastModified": "2024-11-21T02:46:13.400",
"vulnStatus": "Modified",
@@ -633,18 +633,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-ios-ikev2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/85311",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035382",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-ios-ikev2",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1345.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1345.json
index 910c4b014dd..9fcf9e93485 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1345.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1345.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1345",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-01T00:59:00.113",
"lastModified": "2024-11-21T02:46:13.527",
"vulnStatus": "Modified",
@@ -205,22 +205,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160330-fp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035437",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035438",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035439",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160330-fp",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1346.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1346.json
index ccbafff947a..bf0db6c91a5 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1346.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1346.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1346",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-06T23:59:13.740",
"lastModified": "2024-11-21T02:46:13.650",
"vulnStatus": "Modified",
@@ -129,14 +129,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035499",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1347.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1347.json
index cbdc5174a24..011c9412edc 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1347.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1347.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1347",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-24T22:59:00.077",
"lastModified": "2024-11-21T02:46:13.770",
"vulnStatus": "Modified",
@@ -255,14 +255,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-l4f",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035380",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1348.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1348.json
index f5f126ad86b..884241a2260 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1348.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1348.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1348",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-26T01:59:02.200",
"lastModified": "2024-11-21T02:46:13.897",
"vulnStatus": "Modified",
@@ -502,14 +502,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-dhcpv6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035381",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-dhcpv6",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1349.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1349.json
index 21319769195..6f6013b8eeb 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1349.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1349.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1349",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-26T01:59:03.120",
"lastModified": "2024-11-21T02:46:14.013",
"vulnStatus": "Modified",
@@ -282,14 +282,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-smi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035385",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-smi",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1350.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1350.json
index 18b36b1a07c..63cd723409d 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1350.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1350.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1350",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-26T01:59:04.090",
"lastModified": "2024-11-21T02:46:14.123",
"vulnStatus": "Modified",
@@ -182,22 +182,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-sip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/85372",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035420",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035421",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-sip",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1351.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1351.json
index c60dba6e55b..5bb82eef2b4 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1351.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1351.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1351",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-26T01:59:05.073",
"lastModified": "2024-11-21T02:46:14.240",
"vulnStatus": "Modified",
@@ -389,14 +389,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-lisp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035383",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -405,7 +405,7 @@
},
{
"url": "http://www.securitytracker.com/id/1035384",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1352.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1352.json
index ef311eda268..10259ad23c3 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1352.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1352.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1352",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-14T01:59:03.240",
"lastModified": "2024-11-21T02:46:14.373",
"vulnStatus": "Modified",
@@ -95,14 +95,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160413-ucs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035565",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160413-ucs",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1353.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1353.json
index f402072b555..0ddec58dc00 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1353.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1353.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1353",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-01T04:59:00.123",
"lastModified": "2024-11-21T02:46:14.480",
"vulnStatus": "Modified",
@@ -110,14 +110,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160226-vds-is",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035123",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160226-vds-is",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1354.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1354.json
index f3ed80aa467..879e1d82b2c 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1354.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1354.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1354",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-03T15:59:00.117",
"lastModified": "2024-11-21T02:46:14.613",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-cucdm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1355.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1355.json
index e284eb6d97c..554bde9a282 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1355.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1355.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1355",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-03T15:59:01.743",
"lastModified": "2024-11-21T02:46:14.717",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-FireSIGHT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035188",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-FireSIGHT",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1356.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1356.json
index ef9513e6c62..edc7b5857fd 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1356.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1356.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1356",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-03T22:59:13.333",
"lastModified": "2024-11-21T02:46:14.827",
"vulnStatus": "Modified",
@@ -99,14 +99,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-FireSIGHT1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035189",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-FireSIGHT1",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1357.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1357.json
index 2bfafa6445f..2254d5eb520 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1357.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1357.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1357",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-03T22:59:14.193",
"lastModified": "2024-11-21T02:46:14.933",
"vulnStatus": "Modified",
@@ -120,7 +120,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-psc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1358.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1358.json
index 01d95d7115a..e09ce49b5e0 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1358.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1358.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1358",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-03T22:59:15.037",
"lastModified": "2024-11-21T02:46:15.053",
"vulnStatus": "Modified",
@@ -106,14 +106,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-cpi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035181",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-cpi",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1359.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1359.json
index fb5efd6a688..1d60e18cec7 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1359.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1359.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1359",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-03T22:59:15.867",
"lastModified": "2024-11-21T02:46:15.167",
"vulnStatus": "Modified",
@@ -95,14 +95,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-cpi1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035186",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-cpi1",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1360.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1360.json
index e3f393ce647..7c7934477f0 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1360.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1360.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1360",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-12T02:59:03.910",
"lastModified": "2024-11-21T02:46:15.267",
"vulnStatus": "Modified",
@@ -125,14 +125,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160310-prime-lms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035313",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160310-prime-lms",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1361.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1361.json
index 7af31c4d5f8..173301134e3 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1361.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1361.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1361",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-12T02:59:04.910",
"lastModified": "2024-11-21T02:46:15.380",
"vulnStatus": "Modified",
@@ -287,14 +287,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160311-gsr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035314",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160311-gsr",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1362.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1362.json
index 52d81f7f207..a8a1a7bc91a 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1362.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1362.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1362",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-21T11:00:00.493",
"lastModified": "2024-11-21T02:46:15.500",
"vulnStatus": "Modified",
@@ -110,14 +110,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035634",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-wlc",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1363.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1363.json
index 113ee27ed2a..a79681f02d4 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1363.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1363.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1363",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-21T11:00:01.587",
"lastModified": "2024-11-21T02:46:15.613",
"vulnStatus": "Modified",
@@ -104,14 +104,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-htrd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035633",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1364.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1364.json
index 633a6bd40cd..76b130d8cef 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1364.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1364.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1364",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-21T11:00:02.620",
"lastModified": "2024-11-21T02:46:15.720",
"vulnStatus": "Modified",
@@ -140,14 +140,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-bdos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035632",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-bdos",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1365.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1365.json
index 1b3a4d8d04d..1888b2aa3fe 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1365.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1365.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1365",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-18T19:59:00.147",
"lastModified": "2024-11-21T02:46:15.840",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-apic",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92507",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036634",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-apic",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1366.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1366.json
index 0b40c12e137..a51c225c6b0 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1366.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1366.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1366",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-03-24T22:59:00.953",
"lastModified": "2024-11-21T02:46:15.953",
"vulnStatus": "Modified",
@@ -120,14 +120,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-ncs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035407",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-ncs",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1367.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1367.json
index 5f23e2c42d0..eb87e08d2e6 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1367.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1367.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1367",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-21T11:00:03.587",
"lastModified": "2024-11-21T02:46:16.060",
"vulnStatus": "Modified",
@@ -95,14 +95,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-asa-dhcpv6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035635",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-asa-dhcpv6",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1368.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1368.json
index 3a1cd661dcd..6f544cb19fa 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1368.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1368.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1368",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-05T21:59:00.470",
"lastModified": "2024-11-21T02:46:16.167",
"vulnStatus": "Modified",
@@ -231,7 +231,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-firepower",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1369.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1369.json
index 2f0ca5d77ba..f30265c09b8 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1369.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1369.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1369",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-05T21:59:01.830",
"lastModified": "2024-11-21T02:46:16.290",
"vulnStatus": "Modified",
@@ -176,14 +176,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-fpkern",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035743",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-fpkern",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1370.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1370.json
index 346b9abd949..03fa34a916b 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1370.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1370.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1370",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-03T02:01:06.567",
"lastModified": "2024-11-21T02:46:17.180",
"vulnStatus": "Modified",
@@ -113,14 +113,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036016",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1371.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1371.json
index 72f94941daa..cf6a88bc1de 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1371.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1371.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1371",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-03T18:59:02.733",
"lastModified": "2024-11-21T02:46:17.540",
"vulnStatus": "Modified",
@@ -122,14 +122,14 @@
"references": [
{
"url": "http://blog.clamav.net/2016/05/clamav-0992-has-been-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93222",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,21 +137,21 @@
},
{
"url": "http://www.ubuntu.com/usn/USN-3093-1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=11514",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://foxglovesecurity.com/2016/06/13/finding-pearls-fuzzing-clamav/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Technical Description",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1372.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1372.json
index aeb60b80063..99824bd208c 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1372.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1372.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1372",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-03T18:59:03.797",
"lastModified": "2024-11-21T02:46:17.673",
"vulnStatus": "Modified",
@@ -122,14 +122,14 @@
"references": [
{
"url": "http://blog.clamav.net/2016/05/clamav-0992-has-been-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93221",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,21 +137,21 @@
},
{
"url": "http://www.ubuntu.com/usn/USN-3093-1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=11514",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://foxglovesecurity.com/2016/06/13/finding-pearls-fuzzing-clamav/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Technical Description",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1373.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1373.json
index 41b21297b47..88f597689c5 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1373.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1373.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1373",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-05T21:59:03.267",
"lastModified": "2024-11-21T02:46:17.783",
"vulnStatus": "Modified",
@@ -246,14 +246,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-finesse",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035756",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-finesse",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1374.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1374.json
index 93c83d0ed16..b426df0e5d9 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1374.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1374.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1374",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-28T01:59:38.150",
"lastModified": "2024-11-21T02:46:17.893",
"vulnStatus": "Modified",
@@ -111,18 +111,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160720-ucsperf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92044",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036410",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160720-ucsperf",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1375.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1375.json
index f5454c3d840..6ffe8e95164 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1375.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1375.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1375",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-08T15:59:04.247",
"lastModified": "2024-11-21T02:46:18.000",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160407-cic",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1376.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1376.json
index bc3be0793ef..0360e8d812c 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1376.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1376.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1376",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-12T23:59:34.323",
"lastModified": "2024-11-21T02:46:18.107",
"vulnStatus": "Modified",
@@ -110,14 +110,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160412-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035560",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160412-asr",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1377.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1377.json
index 0569247e390..9e48e771f34 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1377.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1377.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1377",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-12T23:59:35.587",
"lastModified": "2024-11-21T02:46:18.220",
"vulnStatus": "Modified",
@@ -121,14 +121,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160412-unity",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035562",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160412-unity",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1378.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1378.json
index d2a47dfd6bf..140823689fd 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1378.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1378.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1378",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-14T01:59:04.537",
"lastModified": "2024-11-21T02:46:18.317",
"vulnStatus": "Modified",
@@ -230,14 +230,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160413-nms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035566",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160413-nms",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1379.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1379.json
index 0ebe73045d2..f31e17b2d30 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1379.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1379.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1379",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-28T01:59:00.117",
"lastModified": "2024-11-21T02:46:18.427",
"vulnStatus": "Modified",
@@ -431,7 +431,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160517-asa-vpn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1380.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1380.json
index 320af6c290b..0df89263406 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1380.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1380.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1380",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-25T01:59:04.020",
"lastModified": "2024-11-21T02:46:20.080",
"vulnStatus": "Modified",
@@ -173,14 +173,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035908",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa1",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1381.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1381.json
index d484854abd5..ee91616f460 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1381.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1381.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1381",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-25T01:59:05.020",
"lastModified": "2024-11-21T02:46:20.197",
"vulnStatus": "Modified",
@@ -153,14 +153,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035909",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa2",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1382.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1382.json
index 31890c34eb2..39ae54f6510 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1382.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1382.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1382",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-25T01:59:06.020",
"lastModified": "2024-11-21T02:46:20.303",
"vulnStatus": "Modified",
@@ -238,14 +238,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035910",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa3",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1383.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1383.json
index ede21d29eed..2683542ca18 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1383.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1383.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1383",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-25T01:59:07.177",
"lastModified": "2024-11-21T02:46:20.400",
"vulnStatus": "Modified",
@@ -238,14 +238,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035911",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa4",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1384.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1384.json
index dfe7b784db7..f02e2487607 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1384.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1384.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1384",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-20T17:59:01.133",
"lastModified": "2024-11-21T02:46:20.510",
"vulnStatus": "Modified",
@@ -1036,15 +1036,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/86685",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035622",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160419-ios",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1385.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1385.json
index 8964cb3b5f0..6d342ec1c22 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1385.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1385.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1385",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-26T15:59:01.463",
"lastModified": "2024-11-21T02:46:20.643",
"vulnStatus": "Modified",
@@ -757,14 +757,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160517-asa-xml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035976",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160517-asa-xml",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1386.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1386.json
index b04312c214c..7fe1b3cf661 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1386.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1386.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1386",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-28T22:59:00.147",
"lastModified": "2024-11-21T02:46:20.787",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-apic",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035702",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-apic",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1387.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1387.json
index 9072e90d9d7..cd30b5012e6 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1387.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1387.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1387",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-05T21:59:04.423",
"lastModified": "2024-11-21T02:46:20.900",
"vulnStatus": "Modified",
@@ -121,14 +121,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-tpxml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035744",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-tpxml",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1388.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1388.json
index 2af0afaec05..3158f5007e7 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1388.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1388.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1388",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-03T02:01:07.613",
"lastModified": "2024-11-21T02:46:21.007",
"vulnStatus": "Modified",
@@ -163,14 +163,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036013",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1389.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1389.json
index b54772bf0d4..ad0e5873bf4 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1389.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1389.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1389",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-04-28T22:59:01.273",
"lastModified": "2024-11-21T02:46:21.113",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-cwms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035703",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-cwms",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1390.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1390.json
index 76e595c5b02..4a99f6b49dc 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1390.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1390.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1390",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-04T01:59:02.897",
"lastModified": "2024-11-21T02:46:21.227",
"vulnStatus": "Modified",
@@ -151,14 +151,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036015",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1391.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1391.json
index e71d718cf0b..97a079ac07f 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1391.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1391.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1391",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-04T01:59:03.897",
"lastModified": "2024-11-21T02:46:21.333",
"vulnStatus": "Modified",
@@ -156,14 +156,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036014",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1392.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1392.json
index e0de2e21b3b..53c9bf9be05 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1392.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1392.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1392",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-05T21:59:05.800",
"lastModified": "2024-11-21T02:46:21.460",
"vulnStatus": "Modified",
@@ -111,14 +111,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160503-pca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035736",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160503-pca",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1393.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1393.json
index e76da60b912..d1c806e57d3 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1393.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1393.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1393",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-12T01:59:10.590",
"lastModified": "2024-11-21T02:46:21.567",
"vulnStatus": "Modified",
@@ -101,14 +101,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160510-cnap",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/90519",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160510-cnap",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1394.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1394.json
index 0f5bbef270f..e507bed02d4 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1394.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1394.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1394",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-03T01:59:02.860",
"lastModified": "2024-11-21T02:46:21.683",
"vulnStatus": "Modified",
@@ -115,14 +115,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-fp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91503",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-fp",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1395.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1395.json
index b348e4cc3a5..2db618d90fc 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1395.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1395.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1395",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-19T01:59:03.077",
"lastModified": "2024-11-21T02:46:21.790",
"vulnStatus": "Modified",
@@ -207,14 +207,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160615-rv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036113",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160615-rv",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1396.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1396.json
index 493ddb7174b..18902663287 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1396.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1396.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1396",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-19T01:59:04.043",
"lastModified": "2024-11-21T02:46:21.903",
"vulnStatus": "Modified",
@@ -207,14 +207,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160615-rv1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036114",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160615-rv1",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1397.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1397.json
index de0d05b0031..cece764e174 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1397.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1397.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1397",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-19T01:59:05.107",
"lastModified": "2024-11-21T02:46:22.020",
"vulnStatus": "Modified",
@@ -207,14 +207,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160615-rv2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036115",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160615-rv2",
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1398.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1398.json
index 5db6fa71c96..031e8a46097 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1398.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1398.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1398",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-03T21:59:07.680",
"lastModified": "2024-11-21T02:46:22.127",
"vulnStatus": "Modified",
@@ -207,11 +207,11 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1036115",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160615-rv3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1399.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1399.json
index 84a1b2a69d1..334bd0d3fd6 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1399.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1399.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1399",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-14T01:59:01.420",
"lastModified": "2024-11-21T02:46:22.233",
"vulnStatus": "Modified",
@@ -215,22 +215,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160513-ies",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/90665",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035898",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-175-01",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160513-ies",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1400.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1400.json
index 5700a03332b..2118ac15524 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1400.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1400.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1400",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-25T01:59:08.537",
"lastModified": "2024-11-21T02:46:22.343",
"vulnStatus": "Modified",
@@ -168,14 +168,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160516-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035899",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160516-vcs",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1401.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1401.json
index c9fb3bd17a2..e1d075166e4 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1401.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1401.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1401",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-21T01:59:00.113",
"lastModified": "2024-11-21T02:46:22.447",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160517-ucs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035933",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160517-ucs",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1402.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1402.json
index 36ed6a08d6f..ab44f2e461f 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1402.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1402.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1402",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-21T01:59:01.520",
"lastModified": "2024-11-21T02:46:22.550",
"vulnStatus": "Modified",
@@ -137,14 +137,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160517-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035946",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160517-ise",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1403.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1403.json
index 53a95795bf4..81646795eb7 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1403.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1403.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1403",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-04T14:59:01.407",
"lastModified": "2024-11-21T02:46:22.660",
"vulnStatus": "Modified",
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160603-ipp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1404.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1404.json
index a33ef4651a6..5bab381ba9d 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1404.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1404.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1404",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-29T22:59:00.123",
"lastModified": "2024-11-21T02:46:22.760",
"vulnStatus": "Modified",
@@ -121,14 +121,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160524-ucs-inv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035957",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160524-ucs-inv",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1405.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1405.json
index ebb43aff47d..28f9602cd1c 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1405.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1405.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1405",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-08T14:59:12.827",
"lastModified": "2024-11-21T02:46:22.860",
"vulnStatus": "Modified",
@@ -123,30 +123,30 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160531-wsa-esa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/90968",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035993",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035994",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.ubuntu.com/usn/USN-3093-1",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://github.com/vrtadmin/clamav-devel/blob/master/ChangeLog",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160531-wsa-esa",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1406.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1406.json
index 8138b1f5466..5af121ad3d7 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1406.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1406.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1406",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-25T01:59:09.757",
"lastModified": "2024-11-21T02:46:22.967",
"vulnStatus": "Modified",
@@ -181,14 +181,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160523-pi-epnm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035948",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160523-pi-epnm",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1407.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1407.json
index a7dfdfcc0ff..a6eab454bdc 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1407.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1407.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1407",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-25T01:59:10.773",
"lastModified": "2024-11-21T02:46:23.070",
"vulnStatus": "Modified",
@@ -523,14 +523,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160519-ios-xr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1035934",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160519-ios-xr",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1408.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1408.json
index e9fca7f06bd..95b9227e378 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1408.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1408.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1408",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-02T14:59:07.430",
"lastModified": "2024-11-21T02:46:23.193",
"vulnStatus": "Modified",
@@ -206,18 +206,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-pi-epnm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91506",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036197",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-pi-epnm",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1409.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1409.json
index 3740b8ca77e..95027b3f535 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1409.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1409.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1409",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-29T22:59:01.373",
"lastModified": "2024-11-21T02:46:23.300",
"vulnStatus": "Modified",
@@ -24546,21 +24546,21 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160525-ipv6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-ipv6-en",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/90872",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -24568,7 +24568,7 @@
},
{
"url": "http://www.securitytracker.com/id/1035962",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -24576,7 +24576,7 @@
},
{
"url": "http://www.securitytracker.com/id/1035963",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -24584,7 +24584,7 @@
},
{
"url": "http://www.securitytracker.com/id/1035964",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -24592,7 +24592,7 @@
},
{
"url": "http://www.securitytracker.com/id/1035965",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -24600,7 +24600,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036651",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160525-ipv6",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1410.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1410.json
index f256a90a985..10453dd1286 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1410.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1410.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1410",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-28T01:59:01.307",
"lastModified": "2024-11-21T02:46:23.837",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160526-wmc",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/90908",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1035977",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160526-wmc",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1411.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1411.json
index c564b1471cc..a05439cab71 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1411.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1411.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1411",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:00.173",
"lastModified": "2024-11-21T02:46:23.943",
"vulnStatus": "Modified",
@@ -171,7 +171,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94791",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -179,7 +179,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-asyncos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1413.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1413.json
index b81fd0a9a07..a4b0778b2d3 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1413.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1413.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1413",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-05-28T01:59:02.290",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160527-fmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1415.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1415.json
index a4e75ea3e7d..cf011561384 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1415.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1415.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1415",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-03T20:59:03.843",
"lastModified": "2024-11-21T02:46:24.187",
"vulnStatus": "Modified",
@@ -96,22 +96,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92711",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036713",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.exploit-db.com/exploits/40509/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-webex",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1416.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1416.json
index f5bf6d06872..b274d525757 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1416.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1416.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1416",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-02T14:59:08.367",
"lastModified": "2024-11-21T02:46:24.317",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-cpcpauthbypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91505",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036212",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-cpcpauthbypass",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1417.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1417.json
index 575e1e5c181..0b2b68d3025 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1417.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1417.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1417",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-23T21:59:01.003",
"lastModified": "2024-11-21T02:46:24.427",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://hyp3rlinx.altervista.org/advisories/SNORT-DLL-HIJACK.txt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -104,7 +104,7 @@
},
{
"url": "http://packetstormsecurity.com/files/138915/Snort-2.9.7.0-WIN32-DLL-Hijacking.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -113,11 +113,11 @@
},
{
"url": "http://www.securityfocus.com/archive/1/539579/100/0/threaded",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/93269",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036936",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1418.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1418.json
index 09517f92c42..1480c51f8be 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1418.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1418.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1418",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-08T14:59:14.153",
"lastModified": "2024-11-21T02:46:24.547",
"vulnStatus": "Modified",
@@ -133,14 +133,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160606-aap",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036042",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160606-aap",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1419.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1419.json
index 09dd212af4d..1457d722526 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1419.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1419.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1419",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-10T01:59:04.020",
"lastModified": "2024-11-21T02:46:24.653",
"vulnStatus": "Modified",
@@ -108,14 +108,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160608-aironet",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036626",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160608-aironet",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1420.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1420.json
index f8d9f84a389..0edc85edbef 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1420.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1420.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1420",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-10T01:59:05.037",
"lastModified": "2024-11-21T02:46:24.760",
"vulnStatus": "Modified",
@@ -178,7 +178,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160609-apic",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1421.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1421.json
index 6ae0629c42d..63ccae54a62 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1421.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1421.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1421",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-10T01:59:06.037",
"lastModified": "2024-11-21T02:46:24.870",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,18 +118,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160609-ipp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160609-ipp",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.tenable.com/security/research/tra-2020-24",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160609-ipp",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1423.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1423.json
index 0da42f6dbe3..3c7a966361e 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1423.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1423.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1423",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-28T10:59:00.213",
"lastModified": "2024-11-21T02:46:24.997",
"vulnStatus": "Modified",
@@ -146,15 +146,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93912",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037113",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1424.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1424.json
index a8c1a1aab29..3096914e359 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1424.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1424.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1424",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-19T01:59:06.153",
"lastModified": "2024-11-21T02:46:25.120",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160616-ios",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1425.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1425.json
index a501eebebf4..46e48b3173b 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1425.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1425.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1425",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-03T21:59:08.777",
"lastModified": "2024-11-21T02:46:25.227",
"vulnStatus": "Modified",
@@ -116,15 +116,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/91545",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036129",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160616-ios1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1426.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1426.json
index d31fa85b23e..bdcff6ca08d 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1426.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1426.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1426",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-15T16:59:00.157",
"lastModified": "2024-11-21T02:46:25.337",
"vulnStatus": "Modified",
@@ -173,18 +173,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160713-ncs6k",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91748",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036295",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160713-ncs6k",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1427.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1427.json
index bd2cc6dd90d..f63db824bbd 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1427.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1427.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1427",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-18T01:59:00.183",
"lastModified": "2024-11-21T02:46:25.443",
"vulnStatus": "Modified",
@@ -145,14 +145,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160616-pnr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036128",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160616-pnr",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1428.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1428.json
index 7f457829728..abe7fbfcc52 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1428.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1428.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1428",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-23T00:59:02.237",
"lastModified": "2024-11-21T02:46:25.550",
"vulnStatus": "Modified",
@@ -110,14 +110,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-iosxe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036140",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-iosxe",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1429.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1429.json
index dd36e049d93..4d28d35a294 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1429.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1429.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1429",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-08T00:59:02.373",
"lastModified": "2024-11-21T02:46:25.653",
"vulnStatus": "Modified",
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv180_1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
@@ -143,11 +143,11 @@
},
{
"url": "http://www.securityfocus.com/bid/92270",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036527",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv180_1",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1430.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1430.json
index 9bd93ba06f0..27da218ce2c 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1430.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1430.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1430",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-08T00:59:04.000",
"lastModified": "2024-11-21T02:46:25.767",
"vulnStatus": "Modified",
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv180_2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
@@ -143,11 +143,11 @@
},
{
"url": "http://www.securityfocus.com/bid/92275",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036525",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv180_2",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1431.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1431.json
index 4f654a0fb49..d63e4719c90 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1431.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1431.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1431",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-18T01:59:01.107",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160617-fmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1432.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1432.json
index aaf8d84c965..a88d5595351 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1432.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1432.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1432",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-18T01:59:02.107",
"lastModified": "2024-11-21T02:46:25.983",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160617-cbr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1433.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1433.json
index ba405e64831..295b43a089b 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1433.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1433.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1433",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-18T22:59:00.140",
"lastModified": "2024-11-21T02:46:26.090",
"vulnStatus": "Modified",
@@ -106,18 +106,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-iosxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92961",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036832",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-iosxr",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1434.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1434.json
index 6a965c61aad..e5c35a75513 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1434.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1434.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1434",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-23T00:59:03.190",
"lastModified": "2024-11-21T02:46:26.197",
"vulnStatus": "Modified",
@@ -112,14 +112,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-ip-phone",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036139",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-ip-phone",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1435.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1435.json
index 21f14dfd692..904b3ac292f 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1435.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1435.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1435",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-23T00:59:04.223",
"lastModified": "2024-11-21T02:46:26.307",
"vulnStatus": "Modified",
@@ -108,14 +108,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-ipp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036138",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-ipp",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1436.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1436.json
index 496df879d31..3b42fb33f21 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1436.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1436.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1436",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-23T00:59:05.177",
"lastModified": "2024-11-21T02:46:26.410",
"vulnStatus": "Modified",
@@ -201,14 +201,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160621-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036152",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160621-asr",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1437.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1437.json
index e1dd1ab4a2b..aeaaa6ee1db 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1437.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1437.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1437",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-23T00:59:06.143",
"lastModified": "2024-11-21T02:46:26.523",
"vulnStatus": "Modified",
@@ -111,14 +111,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160621-pcd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036151",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160621-pcd",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1438.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1438.json
index f4ba24a68b5..c5ecebb6b97 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1438.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1438.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1438",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-23T00:59:07.037",
"lastModified": "2024-11-21T02:46:26.630",
"vulnStatus": "Modified",
@@ -112,14 +112,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036156",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1439.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1439.json
index 10db8cdfbe4..b5b270b6620 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1439.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1439.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1439",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-06-23T00:59:07.987",
"lastModified": "2024-11-21T02:46:26.750",
"vulnStatus": "Modified",
@@ -436,14 +436,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-ucce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036155",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-ucce",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1440.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1440.json
index 932e067ac85..e77a03a71ff 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1440.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1440.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1440",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-02T14:59:09.273",
"lastModified": "2024-11-21T02:46:26.887",
"vulnStatus": "Modified",
@@ -276,14 +276,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160627-wsa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036188",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160627-wsa",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1441.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1441.json
index 66cb2b263f3..9d89decf9e1 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1441.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1441.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1441",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-03T01:59:03.767",
"lastModified": "2024-11-21T02:46:27.000",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160630-cca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91523",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160630-cca",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1442.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1442.json
index 101963eb54e..25d25089b8d 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1442.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1442.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1442",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-07T14:59:03.063",
"lastModified": "2024-11-21T02:46:27.110",
"vulnStatus": "Modified",
@@ -101,14 +101,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160706-pi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036238",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160706-pi",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1443.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1443.json
index af102e018ad..2446a6ca41a 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1443.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1443.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1443",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-07T14:59:04.313",
"lastModified": "2024-11-21T02:46:27.213",
"vulnStatus": "Modified",
@@ -181,7 +181,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160706-tg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1444.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1444.json
index eb9ededd541..f68a76b0214 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1444.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1444.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1444",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-07T14:59:05.970",
"lastModified": "2024-11-21T02:46:27.317",
"vulnStatus": "Modified",
@@ -181,14 +181,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160706-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91669",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -196,7 +196,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036237",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1445.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1445.json
index c842fb6c301..b4a02ad0464 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1445.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1445.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1445",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-12T01:59:45.140",
"lastModified": "2024-11-21T02:46:27.437",
"vulnStatus": "Modified",
@@ -112,14 +112,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160711-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91693",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036271",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1446.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1446.json
index 46cdfa533b3..87f64fdbfde 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1446.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1446.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1446",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-15T16:59:01.207",
"lastModified": "2024-11-21T02:46:27.550",
"vulnStatus": "Modified",
@@ -101,18 +101,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91786",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036312",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1447.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1447.json
index bf8631ec658..fce7c28bb26 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1447.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1447.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1447",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-15T16:59:02.157",
"lastModified": "2024-11-21T02:46:27.657",
"vulnStatus": "Modified",
@@ -101,18 +101,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91781",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036314",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms1",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1448.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1448.json
index eb0a92e4737..5f1e9eba70d 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1448.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1448.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1448",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-17T22:59:02.193",
"lastModified": "2024-11-21T02:46:27.760",
"vulnStatus": "Modified",
@@ -101,18 +101,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91799",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036320",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms2",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1449.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1449.json
index b8040b3c4cc..8e0983d7cde 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1449.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1449.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1449",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-15T16:59:03.143",
"lastModified": "2024-11-21T02:46:27.867",
"vulnStatus": "Modified",
@@ -101,18 +101,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91780",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036313",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms3",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1450.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1450.json
index a263aaba6d0..7c06c95fbcc 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1450.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1450.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1450",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-15T16:59:04.173",
"lastModified": "2024-11-21T02:46:27.970",
"vulnStatus": "Modified",
@@ -101,18 +101,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91779",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036315",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms4",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1451.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1451.json
index e04170f1450..d0e7457627b 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1451.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1451.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1451",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-15T16:59:05.207",
"lastModified": "2024-11-21T02:46:28.073",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-ms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1452.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1452.json
index 8dbb45ff786..9339c050d4c 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1452.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1452.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1452",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-15T16:59:06.207",
"lastModified": "2024-11-21T02:46:28.180",
"vulnStatus": "Modified",
@@ -162,18 +162,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160713-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91756",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036298",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160713-asr",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1453.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1453.json
index 4ca3963bd28..bccfec73e9d 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1453.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1453.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1453",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-06T10:59:02.693",
"lastModified": "2024-11-21T02:46:28.293",
"vulnStatus": "Modified",
@@ -321,7 +321,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-otv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
@@ -329,7 +329,7 @@
},
{
"url": "http://www.securityfocus.com/bid/93409",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Not Applicable",
"Third Party Advisory",
@@ -338,7 +338,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036946",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Not Applicable",
"Third Party Advisory",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1454.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1454.json
index b337908f3cc..fc2dc4402a0 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1454.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1454.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1454",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-06T10:59:03.913",
"lastModified": "2024-11-21T02:46:28.437",
"vulnStatus": "Modified",
@@ -543,14 +543,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-bgp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93417",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -558,7 +558,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036950",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1455.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1455.json
index 32f08d67df3..163a1dfce79 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1455.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1455.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1455",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T20:59:00.180",
"lastModified": "2024-11-21T02:46:28.567",
"vulnStatus": "Modified",
@@ -158,18 +158,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-n9kinfo",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93415",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036957",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-n9kinfo",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1456.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1456.json
index f9bf226ee89..28802031cca 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1456.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1456.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1456",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-15T16:59:07.190",
"lastModified": "2024-11-21T02:46:28.680",
"vulnStatus": "Modified",
@@ -106,18 +106,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-ios-xr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91785",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036311",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-ios-xr",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1457.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1457.json
index 14d01cb8e7b..a88d9988757 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1457.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1457.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1457",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-18T19:59:01.410",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -116,18 +116,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-fmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92509",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036642",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-fmc",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1458.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1458.json
index 73a457fbd9c..064de2fa6b5 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1458.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1458.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1458",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-18T19:59:02.537",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -116,14 +116,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepower",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92512",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepower",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1459.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1459.json
index 0a7dc9fcc4e..2fb0b19d784 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1459.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1459.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1459",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-17T22:59:03.303",
"lastModified": "2024-11-21T02:46:28.993",
"vulnStatus": "Modified",
@@ -316,18 +316,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160715-bgp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91800",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036321",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160715-bgp",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1460.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1460.json
index a9986541219..8c62b6bf3fc 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1460.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1460.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1460",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-28T01:59:41.727",
"lastModified": "2024-11-21T02:46:29.110",
"vulnStatus": "Modified",
@@ -101,18 +101,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92158",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036468",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-wlc",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1461.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1461.json
index 8ed986330ce..3a9134d9c05 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1461.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1461.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1461",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-01T02:59:00.167",
"lastModified": "2024-11-21T02:46:29.223",
"vulnStatus": "Modified",
@@ -109,14 +109,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92155",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036470",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1462.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1462.json
index 3c29aeea84b..af2a48574a4 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1462.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1462.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1462",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-28T01:59:42.697",
"lastModified": "2024-11-21T02:46:29.343",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-psc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92156",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036472",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-psc",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1463.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1463.json
index b05a352cec4..67fd4b1a8b0 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1463.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1463.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1463",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-28T01:59:43.760",
"lastModified": "2024-11-21T02:46:29.463",
"vulnStatus": "Modified",
@@ -116,18 +116,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-firesight",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92152",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036471",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-firesight",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1464.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1464.json
index eb2322980cd..e9fe001645f 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1464.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1464.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1464",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-03T20:59:05.140",
"lastModified": "2024-11-21T02:46:29.570",
"vulnStatus": "Modified",
@@ -96,22 +96,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-meetings-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92708",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036712",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.exploit-db.com/exploits/40508/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-meetings-player",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1465.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1465.json
index 9c3ce7b2d27..b24de6f055c 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1465.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1465.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1465",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-28T01:59:44.853",
"lastModified": "2024-11-21T02:46:29.680",
"vulnStatus": "Modified",
@@ -208,18 +208,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-avs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92154",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036469",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-avs",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1466.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1466.json
index 5f459ecfa89..844eafae612 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1466.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1466.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1466",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-08T00:59:05.453",
"lastModified": "2024-11-21T02:46:29.790",
"vulnStatus": "Modified",
@@ -111,18 +111,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92271",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036526",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-ucm",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1467.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1467.json
index fdff6dd568b..b202c8aac4e 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1467.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1467.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1467",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-07-28T01:59:46.150",
"lastModified": "2024-11-21T02:46:29.897",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-vsrm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92151",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-vsrm",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1468.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1468.json
index 65e24bded91..c76c3adc0e7 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1468.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1468.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1468",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-08T00:59:06.577",
"lastModified": "2024-11-21T02:46:30.000",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-vcse",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92274",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036529",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-vcse",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1469.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1469.json
index d8418d720b0..1ba2cf75c19 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1469.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1469.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1469",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-12T01:59:00.130",
"lastModified": "2024-11-21T02:46:30.107",
"vulnStatus": "Modified",
@@ -120,14 +120,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-spa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92706",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036717",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1470.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1470.json
index bc6b625c897..d6eff408b1b 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1470.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1470.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1470",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-02T00:59:00.137",
"lastModified": "2024-11-21T02:46:30.230",
"vulnStatus": "Modified",
@@ -106,22 +106,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-sps",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92709",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036722",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.synacktiv.com/ressources/advisories_cisco_switch_sg220_csrf.pdf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1471.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1471.json
index c8099cf40f8..3139299a9d3 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1471.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1471.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1471",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-02T00:59:01.310",
"lastModified": "2024-11-21T02:46:30.340",
"vulnStatus": "Modified",
@@ -106,22 +106,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-sps1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92713",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036723",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.synacktiv.com/ressources/advisories_cisco_switch_sg220_xss.pdf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1472.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1472.json
index 11a0cfb8385..5916a28c86e 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1472.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1472.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1472",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-02T00:59:02.403",
"lastModified": "2024-11-21T02:46:30.447",
"vulnStatus": "Modified",
@@ -106,22 +106,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-sps2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92707",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036724",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.synacktiv.com/ressources/advisories_cisco_switch_sg220_dos.pdf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1473.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1473.json
index f5731074267..e3b9f9b0fa5 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1473.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1473.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1473",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-02T00:59:03.497",
"lastModified": "2024-11-21T02:46:30.557",
"vulnStatus": "Modified",
@@ -106,22 +106,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-sps3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92710",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036711",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.synacktiv.com/ressources/advisories_cisco_switch_sg220_default_snmp.pdf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1474.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1474.json
index 64f2b4f542b..44b43cb2be2 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1474.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1474.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1474",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-08T00:59:07.687",
"lastModified": "2024-11-21T02:46:30.667",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-cpi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92278",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036530",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-cpi",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1476.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1476.json
index 351bc98edf7..c20bd06ecac 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1476.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1476.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1476",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-22T10:59:02.073",
"lastModified": "2024-11-21T02:46:30.773",
"vulnStatus": "Modified",
@@ -108,7 +108,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160810-ip-phone-8800",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
@@ -116,11 +116,11 @@
},
{
"url": "http://www.securityfocus.com/bid/92404",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036595",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160810-ip-phone-8800",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1477.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1477.json
index be364ce40df..27d7f6c0227 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1477.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1477.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1477",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-23T02:10:20.237",
"lastModified": "2024-11-21T02:46:30.887",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160810-csa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92398",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160810-csa",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1478.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1478.json
index e2062d7f4b0..e16b678a3db 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1478.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1478.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1478",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-08T00:59:09.203",
"lastModified": "2024-11-21T02:46:31.000",
"vulnStatus": "Modified",
@@ -111,18 +111,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160804-wedge",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92317",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036541",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160804-wedge",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1479.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1479.json
index fe560fde0e1..62fe9646727 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1479.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1479.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1479",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-22T10:59:03.197",
"lastModified": "2024-11-21T02:46:31.117",
"vulnStatus": "Modified",
@@ -108,7 +108,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-ipp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
@@ -116,11 +116,11 @@
},
{
"url": "http://www.securityfocus.com/bid/92515",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036646",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-ipp",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1480.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1480.json
index 14819ffea75..e1f9a13cf0f 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1480.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1480.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1480",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-28T10:59:01.993",
"lastModified": "2024-11-21T02:46:31.230",
"vulnStatus": "Modified",
@@ -246,19 +246,19 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93914",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037116",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037117",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1481.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1481.json
index 70b15646be5..6a50e5f0df9 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1481.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1481.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1481",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-28T10:59:03.713",
"lastModified": "2024-11-21T02:46:31.353",
"vulnStatus": "Modified",
@@ -241,15 +241,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93908",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037123",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1482.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1482.json
index 822e007dcc9..12d7c3f50bb 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1482.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1482.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1482",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-17T21:59:00.167",
"lastModified": "2024-11-21T02:46:31.470",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-wem",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92959",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036809",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-wem",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1483.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1483.json
index e2ae7ad85c4..8d1b99148fa 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1483.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1483.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1483",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-19T01:59:01.570",
"lastModified": "2024-11-21T02:46:31.587",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-wms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92957",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036808",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-wms",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1484.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1484.json
index e44b6d56205..062d40c75ee 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1484.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1484.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1484",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-23T02:10:21.317",
"lastModified": "2024-11-21T02:46:31.700",
"vulnStatus": "Modified",
@@ -105,18 +105,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-wms1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92519",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036649",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-wms1",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1485.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1485.json
index 379cddf8fab..a0e5e7db57d 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1485.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1485.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1485",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-22T10:59:04.480",
"lastModified": "2024-11-21T02:46:31.813",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92518",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036647",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-ise",
diff --git a/CVE-2016/CVE-2016-14xx/CVE-2016-1486.json b/CVE-2016/CVE-2016-14xx/CVE-2016-1486.json
index 8c5a843ef8e..60a090cf8ef 100644
--- a/CVE-2016/CVE-2016-14xx/CVE-2016-1486.json
+++ b/CVE-2016/CVE-2016-14xx/CVE-2016-1486.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-1486",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-28T10:59:05.197",
"lastModified": "2024-11-21T02:46:31.923",
"vulnStatus": "Modified",
@@ -241,15 +241,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93906",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037124",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6355.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6355.json
index c5a30ed934b..f7d2bf7bb1b 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6355.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6355.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6355",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-23T02:11:03.007",
"lastModified": "2024-11-21T02:55:58.020",
"vulnStatus": "Modified",
@@ -161,18 +161,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160810-iosxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92399",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036585",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160810-iosxr",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6356.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6356.json
index 1c9482d2666..3ffcb028585 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6356.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6356.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6356",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-28T10:59:06.587",
"lastModified": "2024-11-21T02:55:58.163",
"vulnStatus": "Modified",
@@ -371,15 +371,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93907",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037122",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6357.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6357.json
index c9e082e497f..8a7d4083da4 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6357.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6357.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6357",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-28T10:59:07.917",
"lastModified": "2024-11-21T02:55:58.290",
"vulnStatus": "Modified",
@@ -101,15 +101,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93909",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037114",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6358.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6358.json
index 3ebffd6c3d1..eb5e072d988 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6358.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6358.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6358",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-28T10:59:09.197",
"lastModified": "2024-11-21T02:55:58.410",
"vulnStatus": "Modified",
@@ -121,15 +121,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93905",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037115",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6359.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6359.json
index 3b1b87569cc..de4371b3733 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6359.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6359.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6359",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-22T10:59:09.043",
"lastModified": "2024-11-21T02:55:58.527",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-sch",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92516",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-sch",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6360.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6360.json
index 95706237d7b..41e1dafa255 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6360.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6360.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6360",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-28T10:59:10.213",
"lastModified": "2024-11-21T02:55:58.640",
"vulnStatus": "Modified",
@@ -171,7 +171,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93910",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -179,15 +179,15 @@
},
{
"url": "http://www.securitytracker.com/id/1037120",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037121",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6361.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6361.json
index 3593256f52b..343cecad615 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6361.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6361.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6361",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-22T10:59:10.043",
"lastModified": "2024-11-21T02:55:58.763",
"vulnStatus": "Modified",
@@ -126,14 +126,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-aap",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92508",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -141,7 +141,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036648",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6362.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6362.json
index 8b87d65b1f1..c2de3429395 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6362.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6362.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6362",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-22T10:59:11.120",
"lastModified": "2024-11-21T02:55:58.890",
"vulnStatus": "Modified",
@@ -126,14 +126,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-aap1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92513",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -141,7 +141,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036644",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6363.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6363.json
index ec510c9d6c4..b9b92aaa6f0 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6363.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6363.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6363",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-22T10:59:12.137",
"lastModified": "2024-11-21T02:55:59.000",
"vulnStatus": "Modified",
@@ -126,14 +126,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-aap2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92511",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -141,7 +141,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036645",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6364.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6364.json
index 9a2ad64b558..a53282fa98a 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6364.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6364.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6364",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-23T02:11:03.930",
"lastModified": "2024-11-21T02:55:59.110",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92517",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -111,7 +111,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036650",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6365.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6365.json
index 80572673116..2e2afc618ed 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6365.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6365.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6365",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-23T02:11:04.960",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -121,14 +121,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepowermc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92510",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6366.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6366.json
index e20c022ddd6..269f139ebdc 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6366.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6366.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6366",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-18T18:59:00.117",
"lastModified": "2024-11-21T02:55:59.330",
"vulnStatus": "Undergoing Analysis",
@@ -403,7 +403,7 @@
"references": [
{
"url": "http://blogs.cisco.com/security/shadow-brokers",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Press/Media Coverage",
@@ -412,21 +412,21 @@
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92521",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Not Applicable",
@@ -436,7 +436,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036637",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -445,7 +445,7 @@
},
{
"url": "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Exploit"
@@ -453,7 +453,7 @@
},
{
"url": "https://www.exploit-db.com/exploits/40258/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -461,7 +461,7 @@
},
{
"url": "https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Technical Description"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6367.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6367.json
index bff5059ad8e..04299190f14 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6367.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6367.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6367",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-18T18:59:01.463",
"lastModified": "2024-11-21T02:55:59.507",
"vulnStatus": "Undergoing Analysis",
@@ -261,7 +261,7 @@
"references": [
{
"url": "http://blogs.cisco.com/security/shadow-brokers",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Press/Media Coverage",
@@ -270,21 +270,21 @@
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-cli",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -293,7 +293,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036636",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -302,7 +302,7 @@
},
{
"url": "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40271.zip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Exploit"
@@ -310,7 +310,7 @@
},
{
"url": "https://www.exploit-db.com/exploits/40271/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6368.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6368.json
index c5961ea9815..a70e702eab3 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6368.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6368.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6368",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.197",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97932",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,11 +129,11 @@
},
{
"url": "http://www.securityfocus.com/bid/98292",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6369.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6369.json
index c514858fda1..712a40a6425 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6369.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6369.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6369",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-08-25T21:59:05.103",
"lastModified": "2024-11-21T02:55:59.783",
"vulnStatus": "Modified",
@@ -376,14 +376,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160824-anyconnect",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92625",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -391,7 +391,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036697",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6370.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6370.json
index ef8689114b7..fba7822da7e 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6370.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6370.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6370",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-12T10:59:05.273",
"lastModified": "2024-11-21T02:55:59.903",
"vulnStatus": "Modified",
@@ -106,14 +106,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-hcm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92704",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -121,7 +121,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036718",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6371.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6371.json
index 7e97a7413ec..019239db864 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6371.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6371.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6371",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-12T10:59:06.350",
"lastModified": "2024-11-21T02:56:00.017",
"vulnStatus": "Modified",
@@ -106,14 +106,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-hcmf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92705",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -121,7 +121,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036719",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6372.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6372.json
index 3430b331e28..ee7c085501e 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6372.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6372.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6372",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-28T10:59:11.387",
"lastModified": "2024-11-21T02:56:00.140",
"vulnStatus": "Modified",
@@ -476,19 +476,19 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93911",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037118",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037119",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6373.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6373.json
index ea4c1b0aa55..4500f9af5ab 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6373.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6373.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6373",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-22T22:59:19.867",
"lastModified": "2024-11-21T02:56:00.263",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-csp2100-1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93093",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036865",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-csp2100-1",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6374.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6374.json
index e3cf8afc224..f64ef422776 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6374.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6374.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6374",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-22T22:59:21.223",
"lastModified": "2024-11-21T02:56:00.367",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-csp2100-2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93095",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -111,7 +111,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036864",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6375.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6375.json
index bf374eb756a..485146338a5 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6375.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6375.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6375",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-12T01:59:01.130",
"lastModified": "2024-11-21T02:56:00.477",
"vulnStatus": "Modified",
@@ -578,18 +578,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92712",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036721",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-1",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6376.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6376.json
index 8d39bcb72e6..c7911214579 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6376.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6376.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6376",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-02T00:59:04.420",
"lastModified": "2024-11-21T02:56:00.600",
"vulnStatus": "Modified",
@@ -566,18 +566,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92716",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036720",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-2",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6377.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6377.json
index 2b2f48114ed..1dc8a0bfc4d 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6377.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6377.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6377",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-03T20:59:08.310",
"lastModified": "2024-11-21T02:56:00.723",
"vulnStatus": "Modified",
@@ -151,14 +151,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-vmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92715",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-vmp",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6378.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6378.json
index 91f9714ec7d..3ed3703a5bf 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6378.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6378.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6378",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T20:59:01.960",
"lastModified": "2024-11-21T02:56:00.840",
"vulnStatus": "Modified",
@@ -506,18 +506,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-esp-nat",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93200",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036914",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-esp-nat",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6379.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6379.json
index b88b25445ac..d917c301c44 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6379.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6379.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6379",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T20:59:02.977",
"lastModified": "2024-11-21T02:56:00.997",
"vulnStatus": "Modified",
@@ -251,18 +251,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ipdr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93205",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036914",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ipdr",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6380.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6380.json
index 723bab9ae3d..29e362cf06f 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6380.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6380.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6380",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T20:59:04.150",
"lastModified": "2024-11-21T02:56:01.110",
"vulnStatus": "Modified",
@@ -16761,22 +16761,22 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-dns",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93201",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036914",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-287-04",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-dns",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6381.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6381.json
index c93d3db7b3e..2516383d4bb 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6381.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6381.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6381",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T17:59:00.180",
"lastModified": "2024-11-21T02:56:01.510",
"vulnStatus": "Modified",
@@ -3631,14 +3631,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ios-ikev1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93195",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -3646,7 +3646,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036914",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ios-ikev1",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6382.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6382.json
index a2badc7b08f..8fcb93fade6 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6382.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6382.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6382",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T17:59:01.447",
"lastModified": "2024-11-21T02:56:01.703",
"vulnStatus": "Modified",
@@ -936,14 +936,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-msdp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93211",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -951,11 +951,11 @@
},
{
"url": "http://www.securitytracker.com/id/1036914",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-287-04",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6383.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6383.json
index 15507e40473..abc6142ee27 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6383.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6383.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6383",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:07.203",
"lastModified": "2023-11-07T02:33:59.783",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6384.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6384.json
index 52ccc28d59e..68fef812498 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6384.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6384.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6384",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T17:59:02.727",
"lastModified": "2024-11-21T02:56:01.860",
"vulnStatus": "Modified",
@@ -117,14 +117,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-h323",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93209",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036914",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6385.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6385.json
index 5c95bf007b6..a8c85b0a5db 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6385.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6385.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6385",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T20:59:05.477",
"lastModified": "2024-11-21T02:56:01.980",
"vulnStatus": "Modified",
@@ -1041,7 +1041,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-smi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
@@ -1049,7 +1049,7 @@
},
{
"url": "http://www.securityfocus.com/bid/93203",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1057,11 +1057,11 @@
},
{
"url": "http://www.securitytracker.com/id/1036914",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-287-04",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6386.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6386.json
index 887604b3a32..0353c7acee5 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6386.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6386.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6386",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T17:59:03.807",
"lastModified": "2024-11-21T02:56:02.117",
"vulnStatus": "Modified",
@@ -761,18 +761,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-frag",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93202",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036914",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-frag",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6387.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6387.json
index 9dbbd0f8df5..a9d54e04760 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6387.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6387.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6387",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:07.250",
"lastModified": "2023-11-07T02:34:00.037",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6388.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6388.json
index 70c1f3e1229..8c9d3964899 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6388.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6388.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6388",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:07.280",
"lastModified": "2023-11-07T02:34:00.253",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6389.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6389.json
index 9b6f6afa44b..aa978dde523 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6389.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6389.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6389",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:07.313",
"lastModified": "2023-11-07T02:34:00.510",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6390.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6390.json
index 6e15709bcde..b60837ebdce 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6390.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6390.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6390",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:07.327",
"lastModified": "2023-11-07T02:34:00.760",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6391.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6391.json
index 3b1c2bb3df9..2b3ae0dc0c0 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6391.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6391.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6391",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T20:59:06.650",
"lastModified": "2024-11-21T02:56:02.303",
"vulnStatus": "Modified",
@@ -516,18 +516,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93197",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036914",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6392.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6392.json
index 98667fca3bb..e55d9fc8c9f 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6392.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6392.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6392",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T17:59:04.900",
"lastModified": "2024-11-21T02:56:02.447",
"vulnStatus": "Modified",
@@ -2621,14 +2621,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-msdp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93211",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -2636,7 +2636,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036914",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6393.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6393.json
index 42fa2bce86a..71257a1cdc6 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6393.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6393.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6393",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T20:59:07.853",
"lastModified": "2024-11-21T02:56:02.633",
"vulnStatus": "Modified",
@@ -117,14 +117,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-aaados",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93196",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036914",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -140,7 +140,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-287-04",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6394.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6394.json
index 553c78e8d1d..bcc696d8cc7 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6394.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6394.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6394",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-12T10:59:07.287",
"lastModified": "2024-11-21T02:56:02.767",
"vulnStatus": "Modified",
@@ -281,18 +281,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92825",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036757",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsmc",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6395.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6395.json
index 9c562ce3f71..a35d7a4c6b3 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6395.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6395.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6395",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-12T10:59:08.227",
"lastModified": "2024-11-21T02:56:02.890",
"vulnStatus": "Modified",
@@ -351,18 +351,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92824",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036755",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsss",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6396.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6396.json
index 54013bf0cb4..685096db873 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6396.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6396.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6396",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-12T10:59:09.523",
"lastModified": "2024-11-21T02:56:03.020",
"vulnStatus": "Modified",
@@ -351,18 +351,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsss1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92826",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036756",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsss1",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6397.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6397.json
index c6719d752f1..44d66be90b5 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6397.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6397.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6397",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-28T10:59:12.433",
"lastModified": "2024-11-21T02:56:03.160",
"vulnStatus": "Modified",
@@ -116,11 +116,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93913",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-ipics",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6398.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6398.json
index 94eaa99f50c..655dab2ee5f 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6398.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6398.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6398",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-12T10:59:10.507",
"lastModified": "2024-11-21T02:56:03.313",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160902-ios",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92734",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036732",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160902-ios",
diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6399.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6399.json
index 41c882c9d53..19e378a5e79 100644
--- a/CVE-2016/CVE-2016-63xx/CVE-2016-6399.json
+++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6399.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6399",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-12T10:59:11.507",
"lastModified": "2024-11-21T02:56:03.463",
"vulnStatus": "Modified",
@@ -391,18 +391,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92867",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036748",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6401.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6401.json
index 0cd3f3be20e..634eb4ca6af 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6401.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6401.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6401",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-17T02:59:01.617",
"lastModified": "2024-11-21T02:56:03.607",
"vulnStatus": "Modified",
@@ -101,18 +101,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-crs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92964",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036830",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-crs",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6402.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6402.json
index 76afe066a05..f8acefbbfb7 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6402.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6402.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6402",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-18T22:59:11.550",
"lastModified": "2024-11-21T02:56:03.720",
"vulnStatus": "Modified",
@@ -231,18 +231,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-ucs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92956",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036831",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-ucs",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6403.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6403.json
index 64c94a493f3..48a7f62e210 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6403.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6403.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6403",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-18T22:59:12.533",
"lastModified": "2024-11-21T02:56:03.833",
"vulnStatus": "Modified",
@@ -97,18 +97,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-ios-xe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92960",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036833",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-ios-xe",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6404.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6404.json
index 5345395bf33..6c409606a4a 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6404.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6404.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6404",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-18T22:59:13.517",
"lastModified": "2024-11-21T02:56:03.947",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-ios",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92963",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036834",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-ios",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6405.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6405.json
index b915d3abe31..2498e7414ec 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6405.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6405.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6405",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-18T22:59:14.813",
"lastModified": "2024-11-21T02:56:04.060",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-ioxfd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92958",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-ioxfd",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6406.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6406.json
index bd1bd78fd4d..2f511ff1321 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6406.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6406.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6406",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-22T22:59:22.193",
"lastModified": "2024-11-21T02:56:04.173",
"vulnStatus": "Modified",
@@ -131,14 +131,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160922-esa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93116",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -146,7 +146,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036881",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160922-esa",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6407.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6407.json
index 07be832ad19..3b8efdc420d 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6407.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6407.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6407",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-17T02:59:02.647",
"lastModified": "2024-11-21T02:56:04.300",
"vulnStatus": "Modified",
@@ -296,18 +296,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-wsa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/92955",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036829",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-wsa",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6408.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6408.json
index 2fed3454235..3a72b2762fc 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6408.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6408.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6408",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-24T01:59:00.150",
"lastModified": "2024-11-21T02:56:04.427",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-cph",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93092",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-cph",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6409.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6409.json
index e0edcc84c8d..38fbb0daa26 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6409.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6409.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6409",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-24T01:59:01.650",
"lastModified": "2024-11-21T02:56:04.540",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-dmo",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93094",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036875",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-dmo",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6410.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6410.json
index 7736908b001..54409407c44 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6410.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6410.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6410",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-24T01:59:02.900",
"lastModified": "2024-11-21T02:56:04.643",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-caf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93090",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036873",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-caf",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6411.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6411.json
index 6b0404336a3..cc11fefb4f4 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6411.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6411.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6411",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-24T01:59:04.057",
"lastModified": "2024-11-21T02:56:04.757",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-fmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036877",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-fmc",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6412.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6412.json
index 4fd1e59389c..7424a624187 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6412.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6412.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6412",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-24T01:59:05.057",
"lastModified": "2024-11-21T02:56:04.863",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-caf1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93088",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036874",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-caf1",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6413.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6413.json
index a4e4a5aa026..99367a8817b 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6413.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6413.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6413",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-24T01:59:06.120",
"lastModified": "2024-11-21T02:56:04.973",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-apic",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1036872",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-apic",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6414.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6414.json
index daaacf7fa6f..24f64e16597 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6414.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6414.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6414",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-22T22:59:23.223",
"lastModified": "2024-11-21T02:56:05.077",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-iox",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93091",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036876",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-iox",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6415.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6415.json
index e1f12881630..e16119bcfbe 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6415.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6415.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6415",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-09-19T01:59:06.167",
"lastModified": "2024-11-21T02:56:05.187",
"vulnStatus": "Undergoing Analysis",
@@ -129,14 +129,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160916-ikev1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93003",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036841",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6416.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6416.json
index 1784e8d13af..3eddd4d1344 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6416.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6416.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6416",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T17:59:05.900",
"lastModified": "2024-11-21T02:56:05.307",
"vulnStatus": "Modified",
@@ -196,26 +196,26 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-aos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93198",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036915",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036916",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036917",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-aos",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6417.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6417.json
index f565aaa2637..cf434172ef0 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6417.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6417.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6417",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T17:59:06.820",
"lastModified": "2024-11-21T02:56:05.433",
"vulnStatus": "Modified",
@@ -441,18 +441,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-fmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93199",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036918",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-fmc",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6418.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6418.json
index 94c4c25bb4a..6f5ad6d48e8 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6418.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6418.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6418",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T17:59:07.757",
"lastModified": "2024-11-21T02:56:05.557",
"vulnStatus": "Modified",
@@ -116,14 +116,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-vds",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93207",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6419.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6419.json
index dea500c33a0..a4fc5e7e6b8 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6419.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6419.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6419",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T10:59:19.393",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -116,14 +116,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-fpmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93206",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-fpmc",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6420.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6420.json
index 965718ea3e7..5f6a9c90ffa 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6420.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6420.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6420",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T10:59:20.550",
"lastModified": "2024-11-21T02:56:05.770",
"vulnStatus": "Modified",
@@ -120,18 +120,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-fmc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93204",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036919",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-fmc1",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6421.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6421.json
index bcd901469bd..1f2165749b2 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6421.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6421.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6421",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T20:59:09.027",
"lastModified": "2024-11-21T02:56:05.883",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ospf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93212",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036909",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ospf",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6422.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6422.json
index ba32f5fb63b..d77cd4a3eb8 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6422.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6422.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6422",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-06T10:59:09.243",
"lastModified": "2024-11-21T02:56:06.003",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-catalyst",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securityfocus.com/bid/93404",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036954",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-catalyst",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6423.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6423.json
index 08a8e9ff820..0b8d131d398 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6423.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6423.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6423",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T20:59:10.120",
"lastModified": "2024-11-21T02:56:06.120",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ios-ikev",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93411",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036955",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ios-ikev",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6424.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6424.json
index 3d95e065e96..deaa12ee138 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6424.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6424.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6424",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-06T10:59:10.163",
"lastModified": "2024-11-21T02:56:06.230",
"vulnStatus": "Modified",
@@ -101,14 +101,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-asa-dhcp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93408",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -116,7 +116,7 @@
},
{
"url": "http://www.securitytracker.com/id/1036961",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6425.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6425.json
index 4605836fb58..1e517751b9b 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6425.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6425.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6425",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-06T10:59:11.257",
"lastModified": "2024-11-21T02:56:06.347",
"vulnStatus": "Modified",
@@ -126,18 +126,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ucis1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93422",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036951",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ucis1",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6426.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6426.json
index 94cd5037f06..311b069ac49 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6426.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6426.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6426",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-05T21:59:00.180",
"lastModified": "2024-11-21T02:56:06.463",
"vulnStatus": "Modified",
@@ -126,18 +126,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ucis2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93420",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036952",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ucis2",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6427.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6427.json
index d17ead8fcaf..a7029c4ce20 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6427.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6427.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6427",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-06T10:59:12.227",
"lastModified": "2024-11-21T02:56:06.580",
"vulnStatus": "Modified",
@@ -126,18 +126,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ucis3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93418",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036953",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ucis3",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6428.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6428.json
index a777791662f..ff386515a44 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6428.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6428.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6428",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-06T10:59:13.243",
"lastModified": "2024-11-21T02:56:06.697",
"vulnStatus": "Modified",
@@ -96,18 +96,18 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-iosxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93416",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1036956",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-iosxr",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6429.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6429.json
index 77ad80a34f0..8f153328ff1 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6429.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6429.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6429",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-03T21:59:00.217",
"lastModified": "2024-11-21T02:56:06.803",
"vulnStatus": "Modified",
@@ -96,11 +96,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93915",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-ipics1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6430.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6430.json
index 8787a309a2c..81ebe4a6544 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6430.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6430.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6430",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-03T21:59:01.310",
"lastModified": "2024-11-21T02:56:06.920",
"vulnStatus": "Modified",
@@ -136,11 +136,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93919",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-ipics2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6431.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6431.json
index 3fb68a394d7..83f85836e5a 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6431.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6431.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6431",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-27T21:59:05.763",
"lastModified": "2024-11-21T02:56:07.067",
"vulnStatus": "Modified",
@@ -1121,14 +1121,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-asa-ca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93786",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1136,7 +1136,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037060",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-asa-ca",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6432.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6432.json
index 79fbedece08..a6c7b2a8169 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6432.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6432.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6432",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-27T21:59:07.200",
"lastModified": "2024-11-21T02:56:07.233",
"vulnStatus": "Modified",
@@ -741,7 +741,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93784",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -749,11 +749,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037059",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-asa-idfw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6433.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6433.json
index aaa73faa3e2..93d3feb5316 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6433.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6433.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6433",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-06T10:59:14.337",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -191,7 +191,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/140467/Cisco-Firepower-Management-Console-6.0-Post-Authentication-UserAdd.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -199,14 +199,14 @@
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93414",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -214,14 +214,14 @@
},
{
"url": "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/40463/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -229,7 +229,7 @@
},
{
"url": "https://www.exploit-db.com/exploits/41041/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -237,7 +237,7 @@
},
{
"url": "https://www.korelogic.com/Resources/Advisories/KL-001-2016-007.txt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6434.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6434.json
index 7085598adb4..6819d618e20 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6434.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6434.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6434",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-06T10:59:15.383",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -96,26 +96,26 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93412",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.exploit-db.com/exploits/40465/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.korelogic.com/Resources/Advisories/KL-001-2016-005.txt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc1",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6435.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6435.json
index f6c5e0a0f16..8767993cbb2 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6435.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6435.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6435",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-06T10:59:16.460",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -96,26 +96,26 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93421",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://blog.korelogic.com/blog/2016/10/10/virtual_appliance_spelunking",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.exploit-db.com/exploits/40464/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.korelogic.com/Resources/Advisories/KL-001-2016-006.txt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-ftmc2",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6436.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6436.json
index 11df84aa39a..6cc5926f4fc 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6436.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6436.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6436",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-06T10:59:17.570",
"lastModified": "2024-11-21T02:56:07.790",
"vulnStatus": "Modified",
@@ -201,14 +201,14 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-chs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93407",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-chs",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6437.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6437.json
index 952e6dd1375..794deea122c 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6437.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6437.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6437",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-27T21:59:08.733",
"lastModified": "2024-11-21T02:56:07.920",
"vulnStatus": "Modified",
@@ -156,15 +156,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93524",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037002",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-waas",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6438.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6438.json
index 1c07211f1e1..23f7ad8ac00 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6438.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6438.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6438",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-27T21:59:09.810",
"lastModified": "2024-11-21T02:56:08.037",
"vulnStatus": "Modified",
@@ -176,15 +176,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93518",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037003",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-cbr-8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6439.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6439.json
index 9077d6ce06e..da28e92b2ef 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6439.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6439.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6439",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-27T21:59:11.093",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -211,15 +211,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93787",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037061",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-fpsnort",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6440.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6440.json
index 7371ef9a55b..a42527b2e4c 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6440.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6440.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6440",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-27T21:59:12.577",
"lastModified": "2024-11-21T02:56:08.277",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93521",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037005",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6441.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6441.json
index f0a93e20fc5..282c6d7a05d 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6441.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6441.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6441",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-03T21:59:02.967",
"lastModified": "2024-11-21T02:56:08.390",
"vulnStatus": "Modified",
@@ -126,15 +126,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94072",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037179",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tl1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6442.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6442.json
index b970708d2ba..fd0037de197 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6442.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6442.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6442",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-27T21:59:13.767",
"lastModified": "2024-11-21T02:56:08.507",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93519",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037004",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-fin",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6443.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6443.json
index 43c193ab768..c7133859f3e 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6443.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6443.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6443",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-27T21:59:14.860",
"lastModified": "2024-11-21T02:56:08.640",
"vulnStatus": "Modified",
@@ -181,7 +181,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93522",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -189,7 +189,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037006",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -197,7 +197,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-prime",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6444.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6444.json
index d50a51822c3..00b63f9ca0f 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6444.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6444.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6444",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-27T21:59:15.907",
"lastModified": "2024-11-21T02:56:08.763",
"vulnStatus": "Modified",
@@ -136,11 +136,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93785",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-cms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6445.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6445.json
index 3c035789515..4cd11db2670 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6445.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6445.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6445",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-27T21:59:17.063",
"lastModified": "2024-11-21T02:56:08.870",
"vulnStatus": "Modified",
@@ -136,7 +136,7 @@
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-msc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
@@ -144,11 +144,11 @@
},
{
"url": "http://www.securityfocus.com/bid/93517",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037000",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-msc",
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6446.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6446.json
index 3b92a3f0ff2..399b6ee2866 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6446.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6446.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6446",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-10-27T21:59:18.390",
"lastModified": "2024-11-21T02:56:08.987",
"vulnStatus": "Modified",
@@ -136,11 +136,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93782",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-cms1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6447.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6447.json
index ac773184184..651633a4809 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6447.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6447.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6447",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-03T21:59:04.217",
"lastModified": "2024-11-21T02:56:09.110",
"vulnStatus": "Modified",
@@ -116,15 +116,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94073",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037180",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-cms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6448.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6448.json
index 8afa410ebea..34c1b72b763 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6448.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6448.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6448",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-03T21:59:05.527",
"lastModified": "2024-11-21T02:56:09.227",
"vulnStatus": "Modified",
@@ -136,15 +136,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94076",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037181",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-cms1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6449.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6449.json
index 2fbb0d1bd21..2f334e5c574 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6449.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6449.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6449",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:01.610",
"lastModified": "2024-11-21T02:56:09.337",
"vulnStatus": "Modified",
@@ -101,11 +101,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94814",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-fireamp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6450.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6450.json
index be7eb52402a..597bdcba339 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6450.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6450.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6450",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-19T03:02:59.117",
"lastModified": "2024-11-21T02:56:09.453",
"vulnStatus": "Modified",
@@ -141,15 +141,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94340",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037299",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161115-iosxe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6451.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6451.json
index c3b593e977b..7e1666536e6 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6451.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6451.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6451",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-03T21:59:06.793",
"lastModified": "2024-11-21T02:56:09.580",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93917",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037112",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-pcp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6452.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6452.json
index 5e31bca9c66..e86ee2ff670 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6452.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6452.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6452",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-03T21:59:07.873",
"lastModified": "2024-11-21T02:56:09.700",
"vulnStatus": "Modified",
@@ -106,11 +106,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94070",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-cph",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6453.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6453.json
index a981083c321..899a3375598 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6453.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6453.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6453",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-03T21:59:08.920",
"lastModified": "2024-11-21T02:56:09.813",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93897",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037109",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6454.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6454.json
index 2b22bd18238..d6d972db63b 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6454.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6454.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6454",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-03T21:59:10.013",
"lastModified": "2024-11-21T02:56:09.923",
"vulnStatus": "Modified",
@@ -111,11 +111,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/93916",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-hcmf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6455.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6455.json
index 2fd72f6240c..77344fc6acd 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6455.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6455.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6455",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-03T21:59:10.967",
"lastModified": "2024-11-21T02:56:10.037",
"vulnStatus": "Modified",
@@ -208,15 +208,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94071",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037186",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6457.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6457.json
index b32c0ac1684..3613565d9ab 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6457.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6457.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6457",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-19T03:03:00.303",
"lastModified": "2024-11-21T02:56:10.163",
"vulnStatus": "Modified",
@@ -293,7 +293,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94077",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -301,7 +301,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037185",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -309,7 +309,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-n9kapic",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6458.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6458.json
index 796b7ad3db0..23d259cb060 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6458.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6458.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6458",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-19T03:03:01.383",
"lastModified": "2024-11-21T02:56:10.293",
"vulnStatus": "Modified",
@@ -131,15 +131,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94074",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037182",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-esa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6459.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6459.json
index 12776092166..4f13e44fa05 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6459.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6459.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6459",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-19T03:03:02.507",
"lastModified": "2024-11-21T02:56:10.413",
"vulnStatus": "Modified",
@@ -146,15 +146,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94075",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037187",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6460.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6460.json
index fd378eac3ad..85736d688a3 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6460.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6460.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6460",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-19T03:03:03.537",
"lastModified": "2024-11-21T02:56:10.513",
"vulnStatus": "Modified",
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94359",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161116-fss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6461.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6461.json
index e27ba30bdae..bebd9037f12 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6461.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6461.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6461",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-19T03:03:04.570",
"lastModified": "2024-11-21T02:56:10.633",
"vulnStatus": "Modified",
@@ -406,15 +406,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94365",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037306",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161116-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6462.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6462.json
index 2b8a6911dc5..dc273b7117a 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6462.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6462.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6462",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-19T03:03:05.587",
"lastModified": "2024-11-21T02:56:10.787",
"vulnStatus": "Modified",
@@ -106,15 +106,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94360",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037307",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161116-esa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6463.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6463.json
index 9cdae9eed0a..75f4035416f 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6463.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6463.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6463",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-19T03:03:06.743",
"lastModified": "2024-11-21T02:56:10.907",
"vulnStatus": "Modified",
@@ -106,11 +106,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94363",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161116-esa2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6464.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6464.json
index 67702945445..55e838a4c72 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6464.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6464.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6464",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:03.203",
"lastModified": "2024-11-21T02:56:11.030",
"vulnStatus": "Modified",
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94802",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037412",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6465.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6465.json
index 35757b9491d..c661b3d4cc9 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6465.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6465.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6465",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:04.547",
"lastModified": "2024-11-21T02:56:11.147",
"vulnStatus": "Modified",
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94901",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037404",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-esa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6466.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6466.json
index 8b81530f397..0edf141779f 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6466.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6466.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6466",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-19T03:03:08.150",
"lastModified": "2024-11-21T02:56:11.263",
"vulnStatus": "Modified",
@@ -111,15 +111,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94361",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037308",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161116-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6467.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6467.json
index 05385feebeb..fb79d819ba6 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6467.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6467.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6467",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:06.203",
"lastModified": "2024-11-21T02:56:11.380",
"vulnStatus": "Modified",
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94772",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037416",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6468.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6468.json
index 7316f9ef314..2797c18077b 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6468.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6468.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6468",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:07.627",
"lastModified": "2024-11-21T02:56:11.507",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94786",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037428",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-cer",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6469.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6469.json
index 10a4f89ba74..b9ac4329299 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6469.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6469.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6469",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:08.957",
"lastModified": "2024-11-21T02:56:11.620",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94775",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-wsa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6470.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6470.json
index 995f0a73402..a356c8e6ba7 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6470.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6470.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6470",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:10.127",
"lastModified": "2024-11-21T02:56:11.737",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94818",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-hms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6471.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6471.json
index 822f9f07962..6d703085216 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6471.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6471.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6471",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:11.753",
"lastModified": "2024-11-21T02:56:11.850",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94805",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037411",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-vdc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6472.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6472.json
index 3ee5e6269a3..7ed67964683 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6472.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6472.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6472",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-11-19T03:03:09.180",
"lastModified": "2024-11-21T02:56:11.960",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94364",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037305",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161116-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6473.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6473.json
index 6064d4e7fae..bf9dce534c1 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6473.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6473.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6473",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:12.940",
"lastModified": "2024-11-21T02:56:12.073",
"vulnStatus": "Modified",
@@ -130,7 +130,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94815",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -138,7 +138,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6474.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6474.json
index 21641d314c9..82b5bb6df8c 100644
--- a/CVE-2016/CVE-2016-64xx/CVE-2016-6474.json
+++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6474.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-6474",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:14.160",
"lastModified": "2024-11-21T02:56:12.197",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94773",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037420",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios-xe-x509",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2016/CVE-2016-91xx/CVE-2016-9192.json b/CVE-2016/CVE-2016-91xx/CVE-2016-9192.json
index ddf43f02d6d..116d1deeaf3 100644
--- a/CVE-2016/CVE-2016-91xx/CVE-2016-9192.json
+++ b/CVE-2016/CVE-2016-91xx/CVE-2016-9192.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9192",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:15.223",
"lastModified": "2024-11-21T03:00:46.443",
"vulnStatus": "Modified",
@@ -191,7 +191,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94770",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -199,7 +199,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037409",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -207,15 +207,15 @@
},
{
"url": "https://github.com/nettitude/PoshC2/blob/master/Modules/CVE-2016-9192.ps1",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://github.com/serializingme/cve-2016-9192",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-anyconnect1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-91xx/CVE-2016-9193.json b/CVE-2016/CVE-2016-91xx/CVE-2016-9193.json
index c0a4b61441f..6406a7e208c 100644
--- a/CVE-2016/CVE-2016-91xx/CVE-2016-9193.json
+++ b/CVE-2016/CVE-2016-91xx/CVE-2016-9193.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9193",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:16.973",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -151,7 +151,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94801",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -159,7 +159,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037421",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -167,7 +167,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-firepower",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-91xx/CVE-2016-9194.json b/CVE-2016/CVE-2016-91xx/CVE-2016-9194.json
index f892b4f94b5..5d65e577708 100644
--- a/CVE-2016/CVE-2016-91xx/CVE-2016-9194.json
+++ b/CVE-2016/CVE-2016-91xx/CVE-2016-9194.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9194",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-06T18:59:00.230",
"lastModified": "2024-11-21T03:00:46.667",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -366,7 +366,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97424",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -374,11 +374,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038182",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-wlc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-91xx/CVE-2016-9195.json b/CVE-2016/CVE-2016-91xx/CVE-2016-9195.json
index 81e1290f5d0..7296146ff50 100644
--- a/CVE-2016/CVE-2016-91xx/CVE-2016-9195.json
+++ b/CVE-2016/CVE-2016-91xx/CVE-2016-9195.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9195",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.183",
"lastModified": "2024-11-21T03:00:46.787",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97425",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038188",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-wlc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-91xx/CVE-2016-9196.json b/CVE-2016/CVE-2016-91xx/CVE-2016-9196.json
index 00e225e1c28..4309ab0099e 100644
--- a/CVE-2016/CVE-2016-91xx/CVE-2016-9196.json
+++ b/CVE-2016/CVE-2016-91xx/CVE-2016-9196.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9196",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.230",
"lastModified": "2024-11-21T03:00:46.893",
"vulnStatus": "Modified",
@@ -163,7 +163,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97468",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -171,11 +171,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038187",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-aironet",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-91xx/CVE-2016-9197.json b/CVE-2016/CVE-2016-91xx/CVE-2016-9197.json
index 21df0e9ad83..0bb452bb136 100644
--- a/CVE-2016/CVE-2016-91xx/CVE-2016-9197.json
+++ b/CVE-2016/CVE-2016-91xx/CVE-2016-9197.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9197",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.263",
"lastModified": "2024-11-21T03:00:47.003",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97469",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cme",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-91xx/CVE-2016-9198.json b/CVE-2016/CVE-2016-91xx/CVE-2016-9198.json
index 35ff14ee262..c59916d7055 100644
--- a/CVE-2016/CVE-2016-91xx/CVE-2016-9198.json
+++ b/CVE-2016/CVE-2016-91xx/CVE-2016-9198.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9198",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:18.300",
"lastModified": "2024-11-21T03:00:47.110",
"vulnStatus": "Modified",
@@ -108,7 +108,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94810",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -116,7 +116,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037415",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2016/CVE-2016-91xx/CVE-2016-9199.json b/CVE-2016/CVE-2016-91xx/CVE-2016-9199.json
index f5e93c2ff8d..251587c0a8d 100644
--- a/CVE-2016/CVE-2016-91xx/CVE-2016-9199.json
+++ b/CVE-2016/CVE-2016-91xx/CVE-2016-9199.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9199",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:19.347",
"lastModified": "2024-11-21T03:00:47.217",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94788",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037427",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-caf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9200.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9200.json
index 907500ceed6..10671ca1dbf 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9200.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9200.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9200",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:20.520",
"lastModified": "2024-11-21T03:00:47.337",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94806",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037414",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -117,7 +117,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-pca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9201.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9201.json
index 8257c107258..319f3b06f8a 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9201.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9201.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9201",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:21.943",
"lastModified": "2024-11-21T03:00:47.440",
"vulnStatus": "Modified",
@@ -100,7 +100,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94811",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -108,7 +108,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037419",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -116,7 +116,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios-zbf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9202.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9202.json
index 521e4eaf6e1..b61c6e79fb2 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9202.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9202.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9202",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:23.020",
"lastModified": "2024-11-21T03:00:47.540",
"vulnStatus": "Modified",
@@ -171,7 +171,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94799",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -179,7 +179,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037423",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -187,7 +187,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-esa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9203.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9203.json
index b51402de741..e99a795c73e 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9203.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9203.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9203",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:23.943",
"lastModified": "2024-11-21T03:00:47.647",
"vulnStatus": "Modified",
@@ -108,7 +108,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94790",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -116,7 +116,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037413",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-asr1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9204.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9204.json
index 81d1b48908b..34a331c4561 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9204.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9204.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9204",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:25.223",
"lastModified": "2024-11-21T03:00:47.747",
"vulnStatus": "Modified",
@@ -108,7 +108,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94816",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -116,7 +116,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-icf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"VDB Entry"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9205.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9205.json
index a80675602d4..a569e9cf536 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9205.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9205.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9205",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:26.397",
"lastModified": "2024-11-21T03:00:47.853",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94813",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios-xr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9206.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9206.json
index d809ba99e63..11cecb6e815 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9206.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9206.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9206",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:27.490",
"lastModified": "2024-11-21T03:00:47.953",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94793",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037424",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9207.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9207.json
index faf9a1e7057..3e2c69b3435 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9207.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9207.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9207",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:28.693",
"lastModified": "2024-11-21T03:00:48.060",
"vulnStatus": "Modified",
@@ -105,7 +105,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94797",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -113,7 +113,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037422",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -121,7 +121,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-expressway",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9208.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9208.json
index faa2fc1c31d..bd7cdcefc8a 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9208.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9208.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9208",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:29.617",
"lastModified": "2024-11-21T03:00:48.167",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94800",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037426",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-cer1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9209.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9209.json
index 261d56ed5c7..ed5966d8080 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9209.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9209.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9209",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:30.803",
"lastModified": "2024-11-21T03:00:48.270",
"vulnStatus": "Modified",
@@ -156,7 +156,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94817",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -164,7 +164,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-fpwr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9210.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9210.json
index 1f5e1b76f98..4d6e7336bb0 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9210.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9210.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9210",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:32.227",
"lastModified": "2024-11-21T03:00:48.377",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94798",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-cur",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9211.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9211.json
index fbe8a054100..19eb6e56201 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9211.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9211.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9211",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:33.227",
"lastModified": "2024-11-21T03:00:48.477",
"vulnStatus": "Modified",
@@ -108,7 +108,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -116,7 +116,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037425",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-cons",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9212.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9212.json
index a03d13fb86c..ea5efa19bc3 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9212.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9212.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9212",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:34.303",
"lastModified": "2024-11-21T03:00:48.577",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94774",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037410",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -117,7 +117,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-wsa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9213.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9213.json
index 2f18ebb5d80..b57f83ca3a9 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9213.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9213.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9213",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.063",
"lastModified": "2023-11-07T02:36:51.007",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9214.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9214.json
index b55899ec191..488d35fd98a 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9214.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9214.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9214",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:35.443",
"lastModified": "2024-11-21T03:00:48.700",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94807",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037417",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ise1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9215.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9215.json
index a253e47c9a9..4db6e52de1b 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9215.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9215.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9215",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-14T00:59:36.477",
"lastModified": "2024-11-21T03:00:48.800",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/94812",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037418",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-iosxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9216.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9216.json
index b7f71ddcea0..d3130605db5 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9216.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9216.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9216",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.137",
"lastModified": "2024-11-21T03:00:48.900",
"vulnStatus": "Modified",
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95629",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,11 +139,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037652",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9217.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9217.json
index 00103ec2095..1bb966217e3 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9217.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9217.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9217",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-26T08:59:00.143",
"lastModified": "2024-11-21T03:00:49.000",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95023",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161221-icf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9218.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9218.json
index 175e28342ab..fd008b4d003 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9218.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9218.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9218",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.187",
"lastModified": "2024-11-21T03:00:49.103",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95634",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-hms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9219.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9219.json
index 6bac03c9d15..fd6f7a612cd 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9219.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9219.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9219",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-06T18:59:00.260",
"lastModified": "2024-11-21T03:00:49.207",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -123,7 +123,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97423",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -131,11 +131,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038183",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-wlc2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9220.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9220.json
index 195ad03fae8..2322d699f29 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9220.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9220.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9220",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.233",
"lastModified": "2024-11-21T03:00:49.343",
"vulnStatus": "Modified",
@@ -96,11 +96,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95633",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-cme1",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/95633",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9221.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9221.json
index 600133d8758..f7282a10b06 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9221.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9221.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9221",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.247",
"lastModified": "2024-11-21T03:00:49.450",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95631",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-cme2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9222.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9222.json
index db10cfdd059..c98c6b5421b 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9222.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9222.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9222",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.280",
"lastModified": "2024-11-21T03:00:49.560",
"vulnStatus": "Modified",
@@ -96,11 +96,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95640",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-nga",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9223.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9223.json
index d4c574fcf72..8e6f2eb98ff 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9223.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9223.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9223",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-26T08:59:00.207",
"lastModified": "2024-11-21T03:00:49.670",
"vulnStatus": "Modified",
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95024",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161221-cco",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9224.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9224.json
index b07c553af38..729084b114c 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9224.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9224.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9224",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2016-12-26T08:59:00.237",
"lastModified": "2024-11-21T03:00:49.777",
"vulnStatus": "Modified",
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95016",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037516",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161221-jabber",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9225.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9225.json
index 5a33da6c7b0..618482a7110 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9225.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9225.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9225",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-01T19:59:00.157",
"lastModified": "2024-11-21T03:00:49.890",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -221,7 +221,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95788",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -229,7 +229,7 @@
},
{
"url": "http://www.securitytracker.com/id/1037696",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -237,7 +237,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170125-cas",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9226.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9226.json
index a84f87de83f..2761b762b96 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9226.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9226.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9226",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.097",
"lastModified": "2023-11-07T02:36:51.323",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9227.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9227.json
index d7e620c99b5..a2c4b40ad77 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9227.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9227.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9227",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.143",
"lastModified": "2023-11-07T02:36:51.540",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9228.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9228.json
index f041d895d64..86676a06372 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9228.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9228.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9228",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.173",
"lastModified": "2023-11-07T02:36:51.763",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9229.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9229.json
index 9df2c2ee382..40914f96178 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9229.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9229.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9229",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.187",
"lastModified": "2023-11-07T02:36:51.993",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9230.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9230.json
index cbcd6e39175..f6099a073a6 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9230.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9230.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9230",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.220",
"lastModified": "2023-11-07T02:36:52.240",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9231.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9231.json
index 05984fcd54d..1b7e71a8b8f 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9231.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9231.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9231",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.237",
"lastModified": "2023-11-07T02:36:52.473",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9232.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9232.json
index 75c866876e9..66bdddeecda 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9232.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9232.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9232",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.267",
"lastModified": "2023-11-07T02:36:52.707",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9233.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9233.json
index c64b3f689fc..4026eb10ce6 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9233.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9233.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9233",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.283",
"lastModified": "2023-11-07T02:36:52.940",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9234.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9234.json
index 05d76106fa3..fd1b7d98468 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9234.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9234.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9234",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.313",
"lastModified": "2023-11-07T02:36:53.177",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9235.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9235.json
index 50fef548be8..eeade2541d1 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9235.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9235.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9235",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.347",
"lastModified": "2023-11-07T02:36:53.473",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9236.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9236.json
index 3ee3a183a6f..72aef0bbb6a 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9236.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9236.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9236",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.360",
"lastModified": "2023-11-07T02:36:53.710",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9237.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9237.json
index b8f3e968e6e..b1d4ea95074 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9237.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9237.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9237",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.393",
"lastModified": "2023-11-07T02:36:53.943",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9238.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9238.json
index 3b119ed65de..0b77a1add57 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9238.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9238.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9238",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.487",
"lastModified": "2023-11-07T02:36:54.177",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9239.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9239.json
index 5a8ebe8639a..dbe63b73c4c 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9239.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9239.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9239",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.517",
"lastModified": "2023-11-07T02:36:54.447",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9240.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9240.json
index 0e4e39801c4..2b81a216b6a 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9240.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9240.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9240",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.533",
"lastModified": "2023-11-07T02:36:54.677",
"vulnStatus": "Rejected",
diff --git a/CVE-2016/CVE-2016-92xx/CVE-2016-9241.json b/CVE-2016/CVE-2016-92xx/CVE-2016-9241.json
index 8a8f72766f0..eadb446f0ed 100644
--- a/CVE-2016/CVE-2016-92xx/CVE-2016-9241.json
+++ b/CVE-2016/CVE-2016-92xx/CVE-2016-9241.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2016-9241",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-11T14:30:17.627",
"lastModified": "2023-11-07T02:36:54.910",
"vulnStatus": "Rejected",
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12211.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12211.json
index 964a84fe990..c591211f2d2 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12211.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12211.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12211",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.193",
"lastModified": "2024-11-21T03:09:02.560",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100648",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039290",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,14 +127,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb14640",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12212.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12212.json
index 44d51d25498..74911da16a6 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12212.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12212.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12212",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.270",
"lastModified": "2024-11-21T03:09:02.687",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100645",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039277",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,14 +122,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf25345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-cuc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12213.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12213.json
index c074ee9179e..b274cd58ceb 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12213.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12213.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12213",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.317",
"lastModified": "2024-11-21T03:09:02.813",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100663",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039284",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-cat",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12214.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12214.json
index 44dfa61f93a..7a55c08d6c4 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12214.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12214.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12214",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-21T05:29:00.233",
"lastModified": "2024-11-21T03:09:02.943",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100931",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039411",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-cvp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12215.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12215.json
index 30cf58226db..d9011254411 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12215.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12215.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12215",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-21T05:29:00.277",
"lastModified": "2024-11-21T03:09:03.067",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100920",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039414",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -152,7 +152,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12216.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12216.json
index 645fd2f6905..a6e7e7d0973 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12216.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12216.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12216",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.347",
"lastModified": "2024-11-21T03:09:03.193",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100664",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039274",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-socmin",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12217.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12217.json
index 00933996965..26f501a3988 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12217.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12217.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12217",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.380",
"lastModified": "2024-11-21T03:09:03.310",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100642",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039276",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12218.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12218.json
index ed7bb04c712..9574a370e06 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12218.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12218.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12218",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.410",
"lastModified": "2024-11-21T03:09:03.433",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100681",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039288",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12219.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12219.json
index cbba91e268c..9eccfcce7ef 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12219.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12219.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12219",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-21T05:29:00.327",
"lastModified": "2024-11-21T03:09:03.620",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -388,7 +388,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100926",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -396,7 +396,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039413",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -404,7 +404,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-spa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12220.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12220.json
index cbed1f506e3..4daae014cb5 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12220.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12220.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12220",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.443",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100639",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12221.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12221.json
index b87d5e01627..dc4cf202407 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12221.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12221.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12221",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.490",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100640",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-firepower-2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12222.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12222.json
index 49cc0a5090a..705c7ebe983 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12222.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12222.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12222",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:48.560",
"lastModified": "2024-11-21T03:09:04.020",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -166,7 +166,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101035",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -174,7 +174,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039458",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -182,7 +182,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ios-xe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12223.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12223.json
index 619fbff3a42..29a3dd6e092 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12223.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12223.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12223",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.520",
"lastModified": "2024-11-21T03:09:04.160",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100689",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039275",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-isr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12224.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12224.json
index 40591c65194..f61f9aa3ef9 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12224.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12224.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12224",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.567",
"lastModified": "2024-11-21T03:09:04.280",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100657",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039283",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-cms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12225.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12225.json
index b7609c9e6ab..71c3be96f1c 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12225.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12225.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12225",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.597",
"lastModified": "2024-11-21T03:09:04.397",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1039285",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,14 +114,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf58392",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-prime-lms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12226.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12226.json
index caa08fcf5d2..d01a29701d0 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12226.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12226.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12226",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:48.593",
"lastModified": "2024-11-21T03:09:04.510",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101063",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -147,7 +147,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039457",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -155,7 +155,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ngwc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12227.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12227.json
index 7b7c5fe683b..19199227b9b 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12227.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12227.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12227",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.630",
"lastModified": "2024-11-21T03:09:04.630",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100653",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039287",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-cer",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12228.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12228.json
index 06ecf5e088c..6c23cfe9202 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12228.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12228.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12228",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:48.640",
"lastModified": "2024-11-21T03:09:04.743",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3007,7 +3007,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101065",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -3015,7 +3015,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039450",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -3023,7 +3023,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-pnp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12229.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12229.json
index 5e86b21203c..3626a2b746f 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12229.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12229.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12229",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:48.670",
"lastModified": "2024-11-21T03:09:04.917",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -186,7 +186,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101032",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -194,7 +194,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039447",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -202,7 +202,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-restapi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12230.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12230.json
index 42a6679d738..066d451bca3 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12230.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12230.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12230",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:48.717",
"lastModified": "2024-11-21T03:09:05.040",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101036",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039446",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-privesc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12231.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12231.json
index 6c8a01e0edb..342d9985b4b 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12231.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12231.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12231",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:48.747",
"lastModified": "2024-11-21T03:09:05.157",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS Software Network Address Translation Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1764,7 +1764,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101039",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -1773,7 +1773,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039449",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -1782,7 +1782,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-nat",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12232.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12232.json
index 6d9160ff9a1..502fc177e72 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12232.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12232.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12232",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:48.780",
"lastModified": "2024-11-21T03:09:05.340",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS Software for Cisco Integrated Services Routers Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -764,7 +764,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101044",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -773,7 +773,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039452",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -782,7 +782,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12233.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12233.json
index 1fa1095bd6a..c1c6c45029d 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12233.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12233.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12233",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:48.827",
"lastModified": "2024-11-21T03:09:05.490",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS Software Common Industrial Protocol Request Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -389,7 +389,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101038",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -398,7 +398,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039459",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -407,7 +407,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12234.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12234.json
index 65e69ba3289..c61c6e56343 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12234.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12234.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12234",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:48.857",
"lastModified": "2024-11-21T03:09:05.637",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS Software Common Industrial Protocol Request Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -389,7 +389,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101038",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -398,7 +398,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039459",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -407,7 +407,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12235.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12235.json
index d461743b8a0..13a4e41074b 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12235.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12235.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12235",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:48.890",
"lastModified": "2024-11-21T03:09:05.773",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS Software for Cisco Industrial Ethernet Switches PROFINET Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101043",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -278,7 +278,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039451",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -287,7 +287,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-profinet",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12236.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12236.json
index eb2eaa259dc..de1862857f9 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12236.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12236.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12236",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:48.937",
"lastModified": "2024-11-21T03:09:05.913",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101033",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039448",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-lisp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12237.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12237.json
index 190178b5164..664aadb55ed 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12237.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12237.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12237",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:48.967",
"lastModified": "2024-11-21T03:09:06.030",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS and IOS XE Software Internet Key Exchange Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1621,7 +1621,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101037",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -1630,7 +1630,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039460",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -1639,7 +1639,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12238.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12238.json
index 3edcd71ae23..eb22ee5621a 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12238.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12238.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12238",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:48.997",
"lastModified": "2024-11-21T03:09:06.197",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco Catalyst 6800 Series Switches VPLS Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101040",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -253,7 +253,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039453",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -262,7 +262,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-vpls",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12239.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12239.json
index d52258e263e..b2b83fff651 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12239.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12239.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12239",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:49.030",
"lastModified": "2024-11-21T03:09:06.343",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -471,7 +471,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101042",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -479,7 +479,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039454",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -487,7 +487,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039455",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -495,7 +495,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12240.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12240.json
index cca27eb0b26..8ac277e7914 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12240.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12240.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12240",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-29T01:34:49.077",
"lastModified": "2024-11-21T03:09:06.497",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS and IOS XE Software DHCP Remote Code Execution Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1439,7 +1439,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101034",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -1448,7 +1448,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039445",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -1457,21 +1457,21 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCsm45390",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCuw77959",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-dhcp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12243.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12243.json
index b05f7663424..2b2d9b6fd9c 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12243.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12243.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12243",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.193",
"lastModified": "2024-11-21T03:09:06.650",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -187,7 +187,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101652",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -195,7 +195,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039719",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -203,7 +203,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-arce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12244.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12244.json
index dfeea3a54f6..5ee9b48bf6f 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12244.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12244.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12244",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-05T07:29:00.213",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -161,7 +161,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101119",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -169,7 +169,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-fpsnort",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12245.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12245.json
index 23611931cd9..f11b01ef71d 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12245.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12245.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12245",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-05T07:29:00.307",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -146,7 +146,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101118",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -154,7 +154,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12246.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12246.json
index 8fd4254cf7d..98cbd9101cf 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12246.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12246.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12246",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-05T07:29:00.357",
"lastModified": "2024-11-21T03:09:07.037",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101165",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039503",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12248.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12248.json
index 74b47133ee6..151f657427c 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12248.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12248.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12248",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-21T05:29:00.357",
"lastModified": "2024-11-21T03:09:07.163",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100921",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039408",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-cuic",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12249.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12249.json
index 5824b00ecbc..b02f11a1256 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12249.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12249.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12249",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-13T22:29:00.207",
"lastModified": "2024-11-21T03:09:07.293",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -192,7 +192,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100821",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -200,7 +200,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039357",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -208,7 +208,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170913-cmsturn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12250.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12250.json
index 9226b645e7a..f3c1bd8daaf 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12250.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12250.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12250",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-21T05:29:00.387",
"lastModified": "2024-11-21T03:09:10.090",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100928",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039415",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-waas",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12251.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12251.json
index becf008876d..0e6374beb63 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12251.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12251.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12251",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.217",
"lastModified": "2024-11-21T03:09:10.210",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101487",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039613",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -147,7 +147,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-ccs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12252.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12252.json
index ba88f44ad72..9f1a4490352 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12252.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12252.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12252",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-21T05:29:00.420",
"lastModified": "2024-11-21T03:09:10.327",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100923",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-findit",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12253.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12253.json
index 300a19d0aac..c5d98762c38 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12253.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12253.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12253",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-21T05:29:00.687",
"lastModified": "2024-11-21T03:09:10.430",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100919",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039409",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-cuic1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12254.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12254.json
index 407bec77460..3094d3ed931 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12254.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12254.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12254",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-21T05:29:00.780",
"lastModified": "2024-11-21T03:09:10.533",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100922",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039410",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-cuic2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12255.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12255.json
index ec52c759fae..6cb7ffe51ce 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12255.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12255.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12255",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-21T05:29:00.840",
"lastModified": "2024-11-21T03:09:10.640",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100932",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039412",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-ucs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12256.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12256.json
index fb66206f896..510461f3872 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12256.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12256.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12256",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-05T07:29:00.403",
"lastModified": "2024-11-21T03:09:10.753",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101180",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-waas",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12257.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12257.json
index 8ba6cbc4d40..9efe5f3499e 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12257.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12257.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12257",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-05T07:29:00.433",
"lastModified": "2024-11-21T03:09:10.857",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101167",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-wms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12258.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12258.json
index d42c1adcf48..ed77e0567c2 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12258.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12258.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12258",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-05T07:29:00.480",
"lastModified": "2024-11-21T03:09:10.963",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101172",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039505",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12259.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12259.json
index 03cb8806855..048b7e39ccf 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12259.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12259.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12259",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.263",
"lastModified": "2024-11-21T03:09:11.063",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -119,7 +119,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101488",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039615",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-sip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12260.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12260.json
index 8723a7ccbd0..dc262255ae0 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12260.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12260.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12260",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.310",
"lastModified": "2024-11-21T03:09:11.170",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -315,7 +315,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101495",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -323,7 +323,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039616",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -331,7 +331,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-sip1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12261.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12261.json
index 3a8faee027f..72b86824b80 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12261.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12261.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12261",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.223",
"lastModified": "2024-11-21T03:09:11.287",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -181,7 +181,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101641",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -189,7 +189,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039717",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -197,7 +197,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12262.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12262.json
index 9f9fd30e9bb..aef1a997e03 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12262.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12262.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12262",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.253",
"lastModified": "2024-11-21T03:09:11.397",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101647",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039716",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -123,7 +123,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-apicem",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12263.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12263.json
index e08877cd210..426794b648c 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12263.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12263.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12263",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-05T07:29:00.510",
"lastModified": "2024-11-21T03:09:11.507",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-clm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12264.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12264.json
index 41626fbe421..282cdc2191a 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12264.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12264.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12264",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-05T07:29:00.557",
"lastModified": "2024-11-21T03:09:11.610",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101148",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039506",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-cms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12265.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12265.json
index 5a0cd141523..8ce5951df73 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12265.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12265.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12265",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-05T07:29:00.590",
"lastModified": "2024-11-21T03:09:11.717",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101170",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039502",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-asa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12266.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12266.json
index 8d21031cb87..a7063d3b6b9 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12266.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12266.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12266",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-05T07:29:00.620",
"lastModified": "2024-11-21T03:09:11.827",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101158",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-cma",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12267.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12267.json
index 085b0c8f134..d1f9ad0b439 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12267.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12267.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12267",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-05T07:29:00.667",
"lastModified": "2024-11-21T03:09:11.937",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101176",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-waas1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12268.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12268.json
index c83271ac8fb..92f63403278 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12268.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12268.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12268",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-05T07:29:00.700",
"lastModified": "2024-11-21T03:09:12.047",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101157",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039507",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-anam",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12269.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12269.json
index c2d848b7e0b..4bb1e7bb582 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12269.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12269.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12269",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-05T07:29:00.747",
"lastModified": "2024-11-21T03:09:12.153",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101150",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-sprk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12270.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12270.json
index b423712de96..fb6a86a6008 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12270.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12270.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12270",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-05T07:29:00.777",
"lastModified": "2024-11-21T03:09:12.280",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101171",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039504",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ncs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12271.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12271.json
index aac5cf94e95..95fe5b8053a 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12271.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12271.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12271",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.343",
"lastModified": "2024-11-21T03:09:12.393",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -130,7 +130,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101524",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -138,7 +138,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039621",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -146,7 +146,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-spa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12272.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12272.json
index c4646815a9b..308f1d0569c 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12272.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12272.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12272",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.373",
"lastModified": "2024-11-21T03:09:12.503",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101494",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039627",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-cisco-ios-xe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12273.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12273.json
index a126c1d7cb6..ac20ddf9fff 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12273.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12273.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12273",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.300",
"lastModified": "2024-11-21T03:09:12.627",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -197,7 +197,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101655",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -205,7 +205,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039714",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -213,7 +213,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12274.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12274.json
index 8ca6477ef72..e80a173528f 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12274.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12274.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12274",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.333",
"lastModified": "2024-11-21T03:09:12.737",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -197,7 +197,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101648",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -205,7 +205,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039715",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -213,7 +213,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12275.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12275.json
index e980ca21de8..54fb0efceb5 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12275.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12275.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12275",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.363",
"lastModified": "2024-11-21T03:09:12.850",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101657",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039713",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-wlc2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12276.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12276.json
index 289b41cf1cf..8882c1b6c20 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12276.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12276.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12276",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.397",
"lastModified": "2024-11-21T03:09:12.963",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101640",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039711",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -123,7 +123,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-cpcp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12277.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12277.json
index 5f25d00172d..5aa4311a1e9 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12277.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12277.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12277",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.427",
"lastModified": "2024-11-21T03:09:13.077",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -153,7 +153,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101661",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -161,7 +161,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-fpwr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12278.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12278.json
index bc4d5e380af..0ce1e2d2e67 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12278.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12278.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12278",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.490",
"lastModified": "2024-11-21T03:09:13.193",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101642",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039712",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-wlc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12279.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12279.json
index e636bb58dd3..266151d9ca6 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12279.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12279.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12279",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.537",
"lastModified": "2024-11-21T03:09:13.300",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101643",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039720",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-iosap",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12280.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12280.json
index be690486e69..5c9b654f8f4 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12280.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12280.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12280",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.567",
"lastModified": "2024-11-21T03:09:13.413",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101646",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039723",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-wlc3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12281.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12281.json
index 144896bc8e4..db9f2671ce2 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12281.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12281.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12281",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.613",
"lastModified": "2024-11-21T03:09:13.520",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -202,7 +202,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101649",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -210,7 +210,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039725",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -218,7 +218,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12282.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12282.json
index 5a5803ba466..7c344c4ca3d 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12282.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12282.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12282",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.647",
"lastModified": "2024-11-21T03:09:13.640",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101650",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039724",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-wlc4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12283.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12283.json
index 9c1e14c513e..2e946181f13 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12283.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12283.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12283",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.677",
"lastModified": "2024-11-21T03:09:13.757",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101645",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039718",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12284.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12284.json
index b0a0ae4c914..3a412115a74 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12284.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12284.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12284",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.420",
"lastModified": "2024-11-21T03:09:13.897",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101501",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039624",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-jab",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12285.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12285.json
index c03a4d04bd2..d79ee126da6 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12285.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12285.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12285",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.467",
"lastModified": "2024-11-21T03:09:14.013",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -110,7 +110,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101527",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -118,7 +118,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039623",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-nam",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12286.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12286.json
index e37b267a86d..a92c228211d 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12286.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12286.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12286",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.497",
"lastModified": "2024-11-21T03:09:14.127",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101515",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039625",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-jab1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12287.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12287.json
index 38ce468c22b..67ab7334136 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12287.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12287.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12287",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.530",
"lastModified": "2024-11-21T03:09:14.237",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101525",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039626",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-expressway-tp-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12288.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12288.json
index 4738426c611..f38e4700c14 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12288.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12288.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12288",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.560",
"lastModified": "2024-11-21T03:09:14.350",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101514",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039620",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-ucce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12289.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12289.json
index 95f8dbdc82c..ccc44f80095 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12289.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12289.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12289",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.593",
"lastModified": "2024-11-21T03:09:14.460",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101509",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039628",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -123,7 +123,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-cisco-ios-xe1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12290.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12290.json
index 8909409f4ab..111db1fcb5e 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12290.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12290.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12290",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.210",
"lastModified": "2024-11-21T03:09:14.573",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101863",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-res",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12291.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12291.json
index 2cfbcf1d067..e253afa3fc1 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12291.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12291.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12291",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.257",
"lastModified": "2024-11-21T03:09:14.690",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101863",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-res",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12292.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12292.json
index d265d45749c..85a10780c2c 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12292.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12292.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12292",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.290",
"lastModified": "2024-11-21T03:09:14.800",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101863",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-res",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12293.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12293.json
index a5eccaf0317..c797498ca01 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12293.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12293.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12293",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.623",
"lastModified": "2024-11-21T03:09:14.910",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -110,7 +110,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101492",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -118,7 +118,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039618",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-wms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12294.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12294.json
index 27532439bcf..ec43dc94e31 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12294.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12294.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12294",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.707",
"lastModified": "2024-11-21T03:09:15.023",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101654",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039721",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-webex1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12295.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12295.json
index 29da93edbfc..76d6a21003b 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12295.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12295.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12295",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-02T16:29:00.740",
"lastModified": "2024-11-21T03:09:15.133",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101651",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039722",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-webex2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12296.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12296.json
index 52d84f01994..25610513186 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12296.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12296.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12296",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.653",
"lastModified": "2024-11-21T03:09:15.250",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101489",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039617",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-wms1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12297.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12297.json
index 2b831dfa30a..63e5034123a 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12297.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12297.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12297",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.197",
"lastModified": "2024-11-21T03:09:15.360",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -156,7 +156,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101985",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -164,7 +164,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039919",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -172,7 +172,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-wmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12298.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12298.json
index bd56cd302de..75a15e19377 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12298.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12298.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12298",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.700",
"lastModified": "2024-11-21T03:09:15.490",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101491",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039619",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-wmc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12299.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12299.json
index 8c23653f597..8e847b22fb4 100644
--- a/CVE-2017/CVE-2017-122xx/CVE-2017-12299.json
+++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12299.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12299",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.320",
"lastModified": "2024-11-21T03:09:15.610",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101915",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-firepower1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12300.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12300.json
index 06389452c51..6db14cdff5f 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12300.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12300.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12300",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.367",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101862",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-firepower2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12301.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12301.json
index c716a805d97..5676f93ca40 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12301.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12301.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12301",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.733",
"lastModified": "2024-11-21T03:09:15.857",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -434,7 +434,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1039622",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -442,7 +442,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-ppe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12302.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12302.json
index de345a5cf5a..765fe8e6bd7 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12302.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12302.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12302",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.397",
"lastModified": "2024-11-21T03:09:15.987",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101853",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039826",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12303.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12303.json
index 6130f10d7e8..04ccf49422a 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12303.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12303.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12303",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.430",
"lastModified": "2024-11-21T03:09:16.107",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101932",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039828",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12304.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12304.json
index 1addb8f683f..59eb6b5afea 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12304.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12304.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12304",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.460",
"lastModified": "2024-11-21T03:09:16.217",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101856",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039825",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-ios",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12305.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12305.json
index 3829a453da3..5a91fd72807 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12305.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12305.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12305",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.507",
"lastModified": "2024-11-21T03:09:16.333",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101869",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039829",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-ipp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12306.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12306.json
index 4d52fb89a1d..10a42114f02 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12306.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12306.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12306",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.540",
"lastModified": "2024-11-21T03:09:16.450",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101914",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-spark",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12307.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12307.json
index 56c657a565f..726bc393447 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12307.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12307.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12307",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:00.207",
"lastModified": "2024-11-21T03:09:16.587",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -2556,7 +2556,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102718",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -2564,7 +2564,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12308.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12308.json
index c3e7f65d054..fa40055b6cc 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12308.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12308.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12308",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:00.267",
"lastModified": "2024-11-21T03:09:16.797",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -2556,7 +2556,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12309.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12309.json
index a491c3dc0ad..ebacd67ae54 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12309.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12309.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12309",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.570",
"lastModified": "2024-11-21T03:09:16.990",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101928",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039831",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-esa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12310.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12310.json
index fc20b471308..d2d85c86570 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12310.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12310.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12310",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-27T09:29:00.217",
"lastModified": "2024-11-21T03:09:17.107",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171023-spark",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12311.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12311.json
index 8a9fec60703..a7000acc445 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12311.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12311.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12311",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.600",
"lastModified": "2024-11-21T03:09:17.227",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101855",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039827",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-cms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12312.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12312.json
index 60b86873600..8e8090c3983 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12312.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12312.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12312",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.633",
"lastModified": "2024-11-21T03:09:17.357",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -110,7 +110,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101930",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -118,7 +118,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-iami",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12313.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12313.json
index 50fd93fe6ed..a2807b133af 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12313.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12313.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12313",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.663",
"lastModified": "2024-11-21T03:09:17.483",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -110,7 +110,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101858",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -118,7 +118,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-cpt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12314.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12314.json
index 71d7317e8db..b205faf2e9c 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12314.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12314.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12314",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.710",
"lastModified": "2024-11-21T03:09:17.610",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101896",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-findit",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12315.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12315.json
index 1a9c6440f24..fad37165ce1 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12315.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12315.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12315",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.743",
"lastModified": "2024-11-21T03:09:17.733",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101864",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-hyperflex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12316.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12316.json
index 14ec432b960..ce9a714536b 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12316.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12316.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12316",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.773",
"lastModified": "2024-11-21T03:09:17.860",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101931",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039830",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12317.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12317.json
index c8eb899d3db..6368d8bc0a0 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12317.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12317.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12317",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-22T18:29:00.277",
"lastModified": "2024-11-21T03:09:17.973",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -246,7 +246,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -254,7 +254,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171020-ampfe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12318.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12318.json
index 8450ee05603..8989dd75dff 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12318.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12318.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12318",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.807",
"lastModified": "2024-11-21T03:09:18.083",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101854",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-rf-gateway-1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12319.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12319.json
index 1affffd2984..b848c4f2cca 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12319.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12319.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12319",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-27T09:29:00.280",
"lastModified": "2024-11-21T03:09:18.213",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS XE Software Ethernet Virtual Private Network Border Gateway Protocol Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1103,7 +1103,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101676",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -1112,7 +1112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171103-bgp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12320.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12320.json
index 994588b4634..633faee0fba 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12320.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12320.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12320",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.837",
"lastModified": "2024-11-21T03:09:18.363",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101863",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-res",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12321.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12321.json
index 2fe4b654eb9..d9e011136ac 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12321.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12321.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12321",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.883",
"lastModified": "2024-11-21T03:09:18.483",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101863",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-res",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12322.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12322.json
index f8b0f60202f..c33e9ebc4ec 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12322.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12322.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12322",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.947",
"lastModified": "2024-11-21T03:09:18.600",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101863",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-res",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12323.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12323.json
index b688528542a..ac9e595a6d4 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12323.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12323.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12323",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:00.977",
"lastModified": "2024-11-21T03:09:18.713",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101863",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-res",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12328.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12328.json
index 3faae3aa306..9648c19de17 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12328.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12328.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12328",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.260",
"lastModified": "2024-11-21T03:09:18.827",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102003",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039922",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-ipp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12329.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12329.json
index 87e0b77dacd..bcf23ffb255 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12329.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12329.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12329",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.290",
"lastModified": "2024-11-21T03:09:18.977",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102015",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -159,7 +159,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039928",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -167,7 +167,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-fxnx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12330.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12330.json
index f8acfdb1e42..cd505b0e532 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12330.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12330.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12330",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.323",
"lastModified": "2024-11-21T03:09:19.110",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102012",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039929",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12331.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12331.json
index e3fc6edc6bd..2272cd8b0b0 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12331.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12331.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12331",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.370",
"lastModified": "2024-11-21T03:09:19.230",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,11 +121,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102159",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1039930",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -133,7 +133,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12332.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12332.json
index bf5445b3b4d..d141f9d0228 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12332.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12332.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12332",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.400",
"lastModified": "2024-11-21T03:09:19.357",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,11 +126,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102160",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1039931",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -138,7 +138,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12333.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12333.json
index 7ac58a9977e..d595eb16e55 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12333.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12333.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12333",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.433",
"lastModified": "2024-11-21T03:09:19.480",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,11 +121,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102161",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1039933",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -133,7 +133,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12334.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12334.json
index 3d30f03c66d..3d79a8bd7ae 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12334.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12334.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12334",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.480",
"lastModified": "2024-11-21T03:09:19.607",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,11 +141,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102162",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1039934",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -153,7 +153,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12335.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12335.json
index b6527d50f34..5a578ca4a58 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12335.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12335.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12335",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.510",
"lastModified": "2024-11-21T03:09:19.727",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,11 +131,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102165",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1039935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -143,7 +143,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12336.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12336.json
index 53c1ebff6da..595f526eb4f 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12336.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12336.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12336",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.540",
"lastModified": "2024-11-21T03:09:19.857",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -146,11 +146,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102168",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1039936",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -158,7 +158,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12337.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12337.json
index 4ba18f40b80..ae71bd8e77d 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12337.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12337.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12337",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:01.023",
"lastModified": "2024-11-21T03:09:19.983",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -161,7 +161,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101865",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -169,7 +169,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039813",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -177,7 +177,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039814",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -185,7 +185,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039815",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -193,7 +193,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039816",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -201,7 +201,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039817",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -209,7 +209,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039818",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -217,7 +217,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039819",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -225,7 +225,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039820",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -233,7 +233,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-vos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12338.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12338.json
index 60627e811a7..dee302b6430 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12338.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12338.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12338",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.573",
"lastModified": "2024-11-21T03:09:20.140",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -146,7 +146,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1039937",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -154,7 +154,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12339.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12339.json
index 1e28bd15f21..0bbd3b2c134 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12339.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12339.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12339",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.620",
"lastModified": "2024-11-21T03:09:20.263",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,11 +131,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102198",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1039938",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -143,7 +143,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12340.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12340.json
index a6523d8873e..452e35f8b00 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12340.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12340.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12340",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.650",
"lastModified": "2024-11-21T03:09:20.383",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,11 +106,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102069",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-switch",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12341.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12341.json
index 86d38c3bd20..ab3134097c0 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12341.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12341.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12341",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.683",
"lastModified": "2024-11-21T03:09:20.500",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1039939",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12342.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12342.json
index f9a029f4ced..2d187fee40b 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12342.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12342.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12342",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.713",
"lastModified": "2024-11-21T03:09:20.623",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102027",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039940",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12343.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12343.json
index eb67353565a..2b58b6ffe55 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12343.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12343.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12343",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.760",
"lastModified": "2024-11-21T03:09:20.743",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101996",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-dcnm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12344.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12344.json
index 8a7c4a219b5..61feb67bd7c 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12344.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12344.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12344",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.790",
"lastModified": "2024-11-21T03:09:20.870",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101996",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-dcnm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12345.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12345.json
index 8ca3873a33b..3e48d798601 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12345.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12345.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12345",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.823",
"lastModified": "2024-11-21T03:09:20.993",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101996",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-dcnm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12346.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12346.json
index 2de9f5f0b16..37f07c4047c 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12346.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12346.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12346",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.853",
"lastModified": "2024-11-21T03:09:21.120",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101996",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-dcnm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12347.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12347.json
index d577119466b..44d9812d5bd 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12347.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12347.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12347",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.887",
"lastModified": "2024-11-21T03:09:21.240",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101996",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-dcnm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12348.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12348.json
index 9a052d8a681..ef6f1eac729 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12348.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12348.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12348",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.933",
"lastModified": "2024-11-21T03:09:21.363",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102018",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039924",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-ucs-central",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12349.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12349.json
index c0b11023de2..6481f3e3949 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12349.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12349.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12349",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.963",
"lastModified": "2024-11-21T03:09:21.487",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102018",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039924",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-ucs-central",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12350.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12350.json
index 69ae8ebf3a0..588dd02ee33 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12350.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12350.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12350",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-16T07:29:01.057",
"lastModified": "2024-11-21T03:09:21.610",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101879",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,14 +115,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-uva",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.info-sec.ca/advisories/Cisco-Umbrella-Hardcoded-Credentials.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12351.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12351.json
index c144eaed66b..26a8fce6408 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12351.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12351.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12351",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:00.997",
"lastModified": "2024-11-21T03:09:21.730",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102019",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039932",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos10",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12352.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12352.json
index 059f1190504..1e4de6ffb05 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12352.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12352.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12352",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.027",
"lastModified": "2024-11-21T03:09:21.860",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101993",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039925",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-apic",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12353.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12353.json
index 5250ec5d673..6d1c14bd35f 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12353.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12353.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12353",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.073",
"lastModified": "2024-11-21T03:09:21.983",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102002",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039917",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-esa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12354.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12354.json
index 661aa11c63e..4e2253eadb0 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12354.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12354.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12354",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.103",
"lastModified": "2024-11-21T03:09:22.103",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101986",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039923",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-acs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12355.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12355.json
index e8e8288b6a8..5df4f0c1782 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12355.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12355.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12355",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.137",
"lastModified": "2024-11-21T03:09:22.223",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101989",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039927",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-ios-xr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12356.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12356.json
index 7d8b538113d..c33ca7f13ac 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12356.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12356.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12356",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.167",
"lastModified": "2024-11-21T03:09:22.357",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039914",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-jabber",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12357.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12357.json
index 62e368ee655..7874479eb3b 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12357.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12357.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12357",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.197",
"lastModified": "2024-11-21T03:09:22.493",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101988",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039916",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12358.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12358.json
index 59f860dd9e7..aa5c48dc0de 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12358.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12358.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12358",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.230",
"lastModified": "2024-11-21T03:09:22.617",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101992",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-jabber1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12359.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12359.json
index b8783dd8627..583d35156e8 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12359.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12359.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12359",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.277",
"lastModified": "2024-11-21T03:09:22.757",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,11 +131,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102186",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12360.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12360.json
index d2a8509ff7f..3dac30a98e4 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12360.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12360.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12360",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.307",
"lastModified": "2024-11-21T03:09:22.907",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102001",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12361.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12361.json
index 5c51ba4e906..1c820746b43 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12361.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12361.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12361",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.353",
"lastModified": "2024-11-21T03:09:23.073",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101994",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039915",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-jabber2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12362.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12362.json
index 096b48934e8..166de753721 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12362.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12362.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12362",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.387",
"lastModified": "2024-11-21T03:09:23.200",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101987",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039913",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -123,7 +123,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-cms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12363.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12363.json
index 01ba503a624..b9303258088 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12363.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12363.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12363",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.417",
"lastModified": "2024-11-21T03:09:23.323",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039921",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12364.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12364.json
index 147ada7bc48..248dbd52178 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12364.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12364.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12364",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.447",
"lastModified": "2024-11-21T03:09:23.453",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102004",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039926",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-prime",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12365.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12365.json
index 7547c9659a1..474dcbfe44a 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12365.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12365.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12365",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.497",
"lastModified": "2024-11-21T03:09:23.577",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101999",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039920",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12366.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12366.json
index c32fec1911c..f2a0899f48d 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12366.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12366.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12366",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.527",
"lastModified": "2024-11-21T03:09:23.737",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101984",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039918",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12367.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12367.json
index 6226b7ae3dd..cd443c92d17 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12367.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12367.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12367",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.557",
"lastModified": "2024-11-21T03:09:23.853",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102017",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039895",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex-players",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12368.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12368.json
index 128883204e7..b0160ab2b2f 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12368.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12368.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12368",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.587",
"lastModified": "2024-11-21T03:09:23.970",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102017",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039895",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -157,7 +157,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex-players",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12369.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12369.json
index 1b18c711786..b9291a736d6 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12369.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12369.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12369",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.620",
"lastModified": "2024-11-21T03:09:24.123",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102017",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039895",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex-players",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12370.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12370.json
index c2baa8c6e6b..5dd2db355d8 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12370.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12370.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12370",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.650",
"lastModified": "2024-11-21T03:09:24.240",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102017",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039895",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex-players",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12371.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12371.json
index 44b3dcf411e..379216a2d94 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12371.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12371.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12371",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.683",
"lastModified": "2024-11-21T03:09:24.357",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102017",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039895",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex-players",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12372.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12372.json
index d039b7500d3..c1951ebb4c2 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12372.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12372.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12372",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-11-30T09:29:01.713",
"lastModified": "2024-11-21T03:09:24.467",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102017",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039895",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -152,7 +152,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex-players",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12373.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12373.json
index 7a0621639e8..4a02cbaee3e 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12373.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12373.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12373",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-12-15T20:29:00.207",
"lastModified": "2024-11-21T03:09:24.577",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -226,7 +226,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102170",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -234,7 +234,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171212-bleichenbacher",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Mitigation",
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12374.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12374.json
index 031fb322755..57eba04ca3b 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12374.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12374.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12374",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-26T20:29:00.283",
"lastModified": "2024-11-21T03:09:24.693",
"vulnStatus": "Modified",
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
@@ -120,7 +120,7 @@
},
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=11939",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Issue Tracking",
@@ -130,7 +130,7 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -138,11 +138,11 @@
},
{
"url": "https://usn.ubuntu.com/3550-1/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://usn.ubuntu.com/3550-2/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html",
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12375.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12375.json
index 6023a3fe976..fa6f106421b 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12375.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12375.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12375",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-26T20:29:00.363",
"lastModified": "2024-11-21T03:09:24.807",
"vulnStatus": "Modified",
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
@@ -120,7 +120,7 @@
},
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=11940",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Issue Tracking",
@@ -130,7 +130,7 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -138,11 +138,11 @@
},
{
"url": "https://usn.ubuntu.com/3550-1/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://usn.ubuntu.com/3550-2/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html",
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12376.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12376.json
index 0727a26ff05..1f3d6929e6a 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12376.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12376.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12376",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-26T20:29:00.427",
"lastModified": "2024-11-21T03:09:24.920",
"vulnStatus": "Modified",
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
@@ -120,7 +120,7 @@
},
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=11942",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Issue Tracking",
@@ -130,7 +130,7 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -138,11 +138,11 @@
},
{
"url": "https://usn.ubuntu.com/3550-1/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://usn.ubuntu.com/3550-2/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html",
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12377.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12377.json
index 8091efaf69a..b7b924076d8 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12377.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12377.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12377",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-26T20:29:00.487",
"lastModified": "2024-11-21T03:09:25.030",
"vulnStatus": "Modified",
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
@@ -120,7 +120,7 @@
},
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=11943",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Issue Tracking",
@@ -129,7 +129,7 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -137,11 +137,11 @@
},
{
"url": "https://usn.ubuntu.com/3550-1/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://usn.ubuntu.com/3550-2/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html",
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12378.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12378.json
index 99c78e655ce..032c56e6c42 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12378.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12378.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12378",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-26T20:29:00.550",
"lastModified": "2024-11-21T03:09:25.143",
"vulnStatus": "Modified",
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
@@ -120,7 +120,7 @@
},
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=11946",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Issue Tracking",
@@ -130,7 +130,7 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -138,11 +138,11 @@
},
{
"url": "https://usn.ubuntu.com/3550-1/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://usn.ubuntu.com/3550-2/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html",
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12379.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12379.json
index 2efc75d8f8a..f5849a9b99e 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12379.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12379.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12379",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-26T20:29:00.613",
"lastModified": "2024-11-21T03:09:25.253",
"vulnStatus": "Modified",
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
@@ -120,7 +120,7 @@
},
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=11944",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Issue Tracking",
@@ -129,7 +129,7 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -137,11 +137,11 @@
},
{
"url": "https://usn.ubuntu.com/3550-1/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://usn.ubuntu.com/3550-2/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html",
diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12380.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12380.json
index 52b1bc2b26d..3eb23b790ca 100644
--- a/CVE-2017/CVE-2017-123xx/CVE-2017-12380.json
+++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12380.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-12380",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-26T20:29:00.690",
"lastModified": "2024-11-21T03:09:25.377",
"vulnStatus": "Modified",
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
@@ -120,7 +120,7 @@
},
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=11945",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Issue Tracking",
@@ -129,7 +129,7 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -137,11 +137,11 @@
},
{
"url": "https://usn.ubuntu.com/3550-1/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://usn.ubuntu.com/3550-2/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html",
diff --git a/CVE-2017/CVE-2017-37xx/CVE-2017-3790.json b/CVE-2017/CVE-2017-37xx/CVE-2017-3790.json
index a469d8d11a5..31db9dc6402 100644
--- a/CVE-2017/CVE-2017-37xx/CVE-2017-3790.json
+++ b/CVE-2017/CVE-2017-37xx/CVE-2017-3790.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3790",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-01T19:59:00.190",
"lastModified": "2024-11-21T03:26:07.160",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -265,7 +265,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95786",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -273,11 +273,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037697",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170125-expressway",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-37xx/CVE-2017-3791.json b/CVE-2017/CVE-2017-37xx/CVE-2017-3791.json
index 4144055ec55..ca6eaed3898 100644
--- a/CVE-2017/CVE-2017-37xx/CVE-2017-3791.json
+++ b/CVE-2017/CVE-2017-37xx/CVE-2017-3791.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3791",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-01T19:59:00.220",
"lastModified": "2024-11-21T03:26:07.290",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95933",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-prime-home",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-37xx/CVE-2017-3792.json b/CVE-2017/CVE-2017-37xx/CVE-2017-3792.json
index 6d0ed440358..5cc91e777a9 100644
--- a/CVE-2017/CVE-2017-37xx/CVE-2017-3792.json
+++ b/CVE-2017/CVE-2017-37xx/CVE-2017-3792.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3792",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-01T19:59:00.267",
"lastModified": "2024-11-21T03:26:07.423",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -213,7 +213,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95787",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -221,11 +221,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037698",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170125-telepresence",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-37xx/CVE-2017-3793.json b/CVE-2017/CVE-2017-37xx/CVE-2017-3793.json
index a90b1561027..acf6b1bf682 100644
--- a/CVE-2017/CVE-2017-37xx/CVE-2017-3793.json
+++ b/CVE-2017/CVE-2017-37xx/CVE-2017-3793.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3793",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.230",
"lastModified": "2024-11-21T03:26:07.557",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1366,7 +1366,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97923",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1374,11 +1374,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038329",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-norm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-37xx/CVE-2017-3794.json b/CVE-2017/CVE-2017-37xx/CVE-2017-3794.json
index 7b1ebe16ebd..a9901216b15 100644
--- a/CVE-2017/CVE-2017-37xx/CVE-2017-3794.json
+++ b/CVE-2017/CVE-2017-37xx/CVE-2017-3794.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3794",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.310",
"lastModified": "2024-11-21T03:26:07.733",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95635",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037649",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-wms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-37xx/CVE-2017-3795.json b/CVE-2017/CVE-2017-37xx/CVE-2017-3795.json
index 71516512081..9a5c929e824 100644
--- a/CVE-2017/CVE-2017-37xx/CVE-2017-3795.json
+++ b/CVE-2017/CVE-2017-37xx/CVE-2017-3795.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3795",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.343",
"lastModified": "2024-11-21T03:26:07.857",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95643",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037650",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-wms1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-37xx/CVE-2017-3796.json b/CVE-2017/CVE-2017-37xx/CVE-2017-3796.json
index 56b62febfa9..3b2f91c025c 100644
--- a/CVE-2017/CVE-2017-37xx/CVE-2017-3796.json
+++ b/CVE-2017/CVE-2017-37xx/CVE-2017-3796.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3796",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.373",
"lastModified": "2024-11-21T03:26:07.973",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95641",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037651",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-wms2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-37xx/CVE-2017-3797.json b/CVE-2017/CVE-2017-37xx/CVE-2017-3797.json
index 69eb9a179de..79aab301870 100644
--- a/CVE-2017/CVE-2017-37xx/CVE-2017-3797.json
+++ b/CVE-2017/CVE-2017-37xx/CVE-2017-3797.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3797",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.403",
"lastModified": "2024-11-21T03:26:08.093",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95639",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,11 +109,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037648",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-wms3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-37xx/CVE-2017-3798.json b/CVE-2017/CVE-2017-37xx/CVE-2017-3798.json
index c35f42411e6..4b0d21b4c1d 100644
--- a/CVE-2017/CVE-2017-37xx/CVE-2017-3798.json
+++ b/CVE-2017/CVE-2017-37xx/CVE-2017-3798.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3798",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.437",
"lastModified": "2024-11-21T03:26:08.210",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95872",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037653",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-37xx/CVE-2017-3799.json b/CVE-2017/CVE-2017-37xx/CVE-2017-3799.json
index 0e5446ef393..ce12dce8de2 100644
--- a/CVE-2017/CVE-2017-37xx/CVE-2017-3799.json
+++ b/CVE-2017/CVE-2017-37xx/CVE-2017-3799.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3799",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.483",
"lastModified": "2024-11-21T03:26:08.323",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95642",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037647",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-wms4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3800.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3800.json
index 804791e0c8c..15487023852 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3800.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3800.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3800",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.513",
"lastModified": "2024-11-21T03:26:08.437",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95637",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,11 +114,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037656",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-esa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3801.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3801.json
index a770862fed5..17a8ac4e9f7 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3801.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3801.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3801",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-15T20:59:00.147",
"lastModified": "2024-11-21T03:26:08.550",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,15 +111,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96235",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037830",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-ucs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3802.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3802.json
index 8540485ae7a..7c03361d52d 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3802.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3802.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3802",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.560",
"lastModified": "2024-11-21T03:26:08.670",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95636",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037655",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-cucm1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3803.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3803.json
index 279518a40cf..e9037e5aa89 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3803.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3803.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3803",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.577",
"lastModified": "2024-11-21T03:26:08.790",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95632",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,11 +109,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037657",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-catalyst",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3804.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3804.json
index faf5aeb49db..f25d49f5107 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3804.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3804.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3804",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.623",
"lastModified": "2024-11-21T03:26:08.910",
"vulnStatus": "Modified",
@@ -138,7 +138,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95638",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -146,11 +146,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037658",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-nexus",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3805.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3805.json
index 9c273602fb8..9740c65f83b 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3805.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3805.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3805",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-01-26T07:59:00.653",
"lastModified": "2024-11-21T03:26:09.023",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95644",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037654",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-ios",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3806.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3806.json
index 78029ef3b02..644c48e8817 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3806.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3806.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3806",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-03T07:59:00.657",
"lastModified": "2024-11-21T03:26:09.137",
"vulnStatus": "Modified",
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95943",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fpw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3807.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3807.json
index 2ae5959ac14..d9c8d20b37b 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3807.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3807.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3807",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-09T17:59:00.137",
"lastModified": "2024-11-21T03:26:09.250",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1721,15 +1721,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96161",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037797",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
@@ -1737,7 +1737,7 @@
},
{
"url": "https://www.exploit-db.com/exploits/41369/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/96161",
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3808.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3808.json
index 6e47656616f..471a7d66e0f 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3808.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3808.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3808",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.277",
"lastModified": "2024-11-21T03:26:09.430",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -201,7 +201,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97922",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -209,11 +209,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038318",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3809.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3809.json
index e6f7ff22382..d7c2ef19541 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3809.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3809.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3809",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-03T07:59:00.687",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95941",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,11 +109,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037776",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3810.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3810.json
index bf3d9f0b75b..844e61012fd 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3810.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3810.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3810",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-03T07:59:00.733",
"lastModified": "2024-11-21T03:26:09.680",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95947",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037772",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-psc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3811.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3811.json
index 3f47232d7bc..6bec4a2266b 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3811.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3811.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3811",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.157",
"lastModified": "2024-11-21T03:26:09.790",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96912",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038042",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-wms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3812.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3812.json
index 656d4b21ac7..0081ae2656b 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3812.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3812.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3812",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-03T07:59:00.763",
"lastModified": "2024-11-21T03:26:09.900",
"vulnStatus": "Modified",
@@ -249,7 +249,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95946",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -257,11 +257,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037771",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-psc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3813.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3813.json
index 6e5b9af2b9a..ddee9afee49 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3813.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3813.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3813",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-09T17:59:00.187",
"lastModified": "2024-11-21T03:26:10.020",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -226,22 +226,22 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96145",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037796",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-anyconnect",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/41476/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/96145",
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3814.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3814.json
index 364225aec25..5edddb6768f 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3814.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3814.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3814",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-03T07:59:00.780",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95942",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fpw1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3815.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3815.json
index f4d1990aeab..09983918132 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3815.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3815.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3815",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.203",
"lastModified": "2024-11-21T03:26:10.327",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96922",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,11 +114,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038035",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-tps",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3817.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3817.json
index 3fee6ea3467..e0c22949485 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3817.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3817.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3817",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.293",
"lastModified": "2024-11-21T03:26:10.440",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97430",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,11 +109,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038194",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-ucs-director",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3818.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3818.json
index 7fe47a36161..3c0cbf1a680 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3818.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3818.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3818",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-03T07:59:00.810",
"lastModified": "2024-11-21T03:26:10.553",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95939",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037773",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-esa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3819.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3819.json
index e439f2452c7..86f8727940e 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3819.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3819.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3819",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-15T20:59:00.147",
"lastModified": "2024-11-21T03:26:10.663",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -221,7 +221,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96913",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -229,11 +229,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038050",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3820.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3820.json
index 540c3e371b2..2b9d82099a3 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3820.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3820.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3820",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-03T07:59:00.857",
"lastModified": "2024-11-21T03:26:10.800",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95934",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,11 +114,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037770",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-asrsnmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3821.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3821.json
index 8225b94e674..8ca962fda52 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3821.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3821.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3821",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.200",
"lastModified": "2024-11-21T03:26:10.920",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96241",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037839",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3822.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3822.json
index 58537761277..21e500a404e 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3822.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3822.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3822",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-03T07:59:00.890",
"lastModified": "2024-11-21T03:26:11.033",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95944",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037775",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-fpw2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3823.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3823.json
index 9d3e8e19046..057d56f1d0c 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3823.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3823.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3823",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-01T11:59:00.133",
"lastModified": "2024-11-21T03:26:11.147",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -393,7 +393,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -401,19 +401,19 @@
},
{
"url": "http://www.securitytracker.com/id/1037680",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://0patch.blogspot.com/2017/01/micropatching-remote-code-execution-in.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://blog.filippo.io/webex-extension-vulnerability/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1096",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Technical Description",
"Third Party Advisory"
@@ -421,18 +421,18 @@
},
{
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1100",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170124-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.kb.cert.org/vuls/id/909240",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/95737",
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3824.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3824.json
index d1448b17c47..98952c71008 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3824.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3824.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3824",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-03T07:59:00.920",
"lastModified": "2024-11-21T03:26:11.287",
"vulnStatus": "Modified",
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/95937",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,11 +126,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037774",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-cbr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3825.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3825.json
index ac5f5e7f133..e11465b8ec0 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3825.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3825.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3825",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-16T17:29:00.183",
"lastModified": "2024-11-21T03:26:11.413",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -231,7 +231,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98293",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -239,11 +239,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038392",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-ctp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3826.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3826.json
index 9759e8316f8..172798825ac 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3826.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3826.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3826",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-01T21:59:00.367",
"lastModified": "2024-11-21T03:26:11.540",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,15 +143,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96509",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037938",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170301-nga",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3827.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3827.json
index 255ae852077..59b2a84644a 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3827.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3827.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3827",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.230",
"lastModified": "2024-11-21T03:26:11.663",
"vulnStatus": "Modified",
@@ -151,19 +151,19 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96239",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037831",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037832",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-asyncos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3828.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3828.json
index aa13f525fc5..b4256f90c0b 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3828.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3828.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3828",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.263",
"lastModified": "2024-11-21T03:26:11.787",
"vulnStatus": "Modified",
@@ -101,15 +101,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96240",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037839",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cucm1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3829.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3829.json
index 0b4787cfd39..17dcaabfee8 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3829.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3829.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3829",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.293",
"lastModified": "2024-11-21T03:26:11.910",
"vulnStatus": "Modified",
@@ -101,15 +101,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96250",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037839",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cucm2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3830.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3830.json
index 41b0501efbc..4b6b84a7173 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3830.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3830.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3830",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.323",
"lastModified": "2024-11-21T03:26:12.023",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96242",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037833",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3831.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3831.json
index 0a8625d9e53..dcde9abb0d2 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3831.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3831.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3831",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-15T20:59:00.193",
"lastModified": "2024-11-21T03:26:12.140",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -163,7 +163,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96909",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -171,7 +171,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3832.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3832.json
index dc2acceeb90..fc684875290 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3832.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3832.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3832",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-06T18:59:00.293",
"lastModified": "2024-11-21T03:26:12.270",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97421",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038184",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-wlc3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3833.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3833.json
index 26719ab1777..9218456b0fa 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3833.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3833.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3833",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.357",
"lastModified": "2024-11-21T03:26:12.400",
"vulnStatus": "Modified",
@@ -96,11 +96,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96246",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3834.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3834.json
index ff439146a1f..8f589bf7594 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3834.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3834.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3834",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-06T18:59:00.323",
"lastModified": "2024-11-21T03:26:12.523",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -163,7 +163,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97422",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -171,7 +171,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038181",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -179,7 +179,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-ame",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3835.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3835.json
index d28ee22b329..3228ac0307a 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3835.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3835.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3835",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.387",
"lastModified": "2024-11-21T03:26:12.650",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96249",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037841",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3836.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3836.json
index 90ee2b18aff..77f9a3d8dc4 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3836.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3836.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3836",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.417",
"lastModified": "2024-11-21T03:26:12.763",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96251",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037840",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cucm3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3837.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3837.json
index 8ccb67d3374..65121c3b35a 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3837.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3837.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3837",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.450",
"lastModified": "2024-11-21T03:26:12.880",
"vulnStatus": "Modified",
@@ -146,15 +146,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96243",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037834",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cms1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3838.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3838.json
index bf4628d2d0d..a66df4feda7 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3838.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3838.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3838",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.480",
"lastModified": "2024-11-21T03:26:12.993",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96234",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037835",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-acs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3839.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3839.json
index 9f6f86412ce..30279467e25 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3839.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3839.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3839",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.513",
"lastModified": "2024-11-21T03:26:13.113",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96236",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037836",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-acs1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3840.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3840.json
index 5e500788053..3f6b3c7e551 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3840.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3840.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3840",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.543",
"lastModified": "2024-11-21T03:26:13.223",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96238",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037837",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-acs2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3841.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3841.json
index 7656169b9ba..42ee4658008 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3841.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3841.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3841",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.573",
"lastModified": "2024-11-21T03:26:13.333",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96237",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037838",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-acs3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3842.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3842.json
index 5185a1f9056..4906bdafbe4 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3842.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3842.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3842",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.607",
"lastModified": "2024-11-21T03:26:13.447",
"vulnStatus": "Modified",
@@ -96,15 +96,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96256",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037842",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-idm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3843.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3843.json
index 8fed8b4bcaa..a120d879582 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3843.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3843.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3843",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.620",
"lastModified": "2024-11-21T03:26:13.567",
"vulnStatus": "Modified",
@@ -106,15 +106,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96248",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037843",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-pcp1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3844.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3844.json
index 1bec3a15724..95bf0040a98 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3844.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3844.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3844",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.653",
"lastModified": "2024-11-21T03:26:13.693",
"vulnStatus": "Modified",
@@ -106,15 +106,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96247",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037843",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-pcp2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3845.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3845.json
index efd4fedcfde..0640554c6e9 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3845.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3845.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3845",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.700",
"lastModified": "2024-11-21T03:26:13.803",
"vulnStatus": "Modified",
@@ -106,15 +106,15 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96245",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1037844",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-pcp3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3846.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3846.json
index ffa354e5d83..164938f9802 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3846.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3846.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3846",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-15T20:59:00.227",
"lastModified": "2024-11-21T03:26:13.937",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96910",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,11 +129,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038044",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-tes",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3847.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3847.json
index 251d866df6f..7e41228ebc2 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3847.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3847.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3847",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-02-22T02:59:00.717",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -96,11 +96,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96253",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-fpmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3848.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3848.json
index 524f08709bb..17d3687ebcd 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3848.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3848.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3848",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.327",
"lastModified": "2024-11-21T03:26:14.170",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96505",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,11 +109,11 @@
},
{
"url": "http://www.securitytracker.com/id/1037947",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170301-cpi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3849.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3849.json
index fc78d4c5887..2094afb8873 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3849.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3849.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3849",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-21T16:59:00.227",
"lastModified": "2024-11-21T03:26:14.290",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -906,7 +906,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96972",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -914,11 +914,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038064",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170320-ani",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3850.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3850.json
index e92158425e0..0fcd0a45081 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3850.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3850.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3850",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-21T16:59:00.257",
"lastModified": "2024-11-21T03:26:14.433",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -816,7 +816,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96971",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -824,7 +824,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038065",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -832,7 +832,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170320-aniipv6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3851.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3851.json
index e5426cc677c..3b98529f616 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3851.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3851.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3851",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-22T19:59:00.167",
"lastModified": "2024-11-21T03:26:14.587",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97013",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,15 +119,15 @@
},
{
"url": "http://www.securitytracker.com/id/1038106",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1038107",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-caf1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3852.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3852.json
index fd3ac27b379..8da506d0197 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3852.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3852.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3852",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-22T19:59:00.197",
"lastModified": "2024-11-21T03:26:14.693",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97014",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,15 +119,15 @@
},
{
"url": "http://www.securitytracker.com/id/1038108",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1038109",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-caf2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3853.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3853.json
index c0f119c4b28..9e537b0758b 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3853.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3853.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3853",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-22T19:59:00.247",
"lastModified": "2024-11-21T03:26:14.820",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97011",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,11 +119,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038105",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-iox",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3854.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3854.json
index 54d99e9b9c9..190a8e5165b 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3854.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3854.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3854",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-15T20:59:00.257",
"lastModified": "2024-11-21T03:26:14.933",
"vulnStatus": "Modified",
@@ -178,7 +178,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96911",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -186,7 +186,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038041",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -194,7 +194,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-wlc-mesh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3856.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3856.json
index 0f2919b73c2..1a7773ded59 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3856.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3856.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3856",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-22T19:59:00.277",
"lastModified": "2024-11-21T03:26:15.063",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1091,7 +1091,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97007",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1099,11 +1099,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038101",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-webui",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3857.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3857.json
index 1fac5d8c60b..96c1ac2d5cd 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3857.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3857.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3857",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-22T19:59:00.307",
"lastModified": "2024-11-21T03:26:15.210",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -122,7 +122,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97010",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -130,7 +130,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038100",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -138,7 +138,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-l2tp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"VDB Entry"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3858.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3858.json
index f8dee6b96fa..5edc0f17ccb 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3858.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3858.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3858",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-22T19:59:00.337",
"lastModified": "2024-11-21T03:26:15.390",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97009",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,11 +119,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038102",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-xeci",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3859.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3859.json
index 753835af804..aa1788c6e75 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3859.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3859.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3859",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-22T19:59:00.370",
"lastModified": "2024-11-21T03:26:15.523",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -313,7 +313,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97008",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -321,11 +321,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038104",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-ztp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3860.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3860.json
index 9ddc9d09339..78bbac3e6bc 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3860.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3860.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3860",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.323",
"lastModified": "2024-11-21T03:26:15.660",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1981,7 +1981,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1989,11 +1989,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038313",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3861.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3861.json
index 370175e268f..b44f676f3b9 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3861.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3861.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3861",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.353",
"lastModified": "2024-11-21T03:26:15.823",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1981,7 +1981,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1989,11 +1989,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038313",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3862.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3862.json
index 3b750c33ef3..e10dcbd08bc 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3862.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3862.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3862",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.387",
"lastModified": "2024-11-21T03:26:15.983",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1981,7 +1981,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1989,11 +1989,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038313",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3863.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3863.json
index fdee02af9b2..8b85c7727fc 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3863.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3863.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3863",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.433",
"lastModified": "2024-11-21T03:26:16.147",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1981,7 +1981,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1989,11 +1989,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038313",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3864.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3864.json
index 253434933a1..f63e5fe5ddc 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3864.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3864.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3864",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-22T19:59:00.400",
"lastModified": "2024-11-21T03:26:16.307",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -125,7 +125,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97012",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -133,7 +133,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038103",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -141,7 +141,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-dhcpc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3865.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3865.json
index 32586347e8c..bbc97032c85 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3865.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3865.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3865",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.180",
"lastModified": "2024-11-21T03:26:16.433",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99218",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038748",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3866.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3866.json
index 1c1f583281e..cc560af8db0 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3866.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3866.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3866",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.220",
"lastModified": "2024-11-21T03:26:16.550",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96917",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,11 +109,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038045",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-psc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3867.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3867.json
index 6d5450a2cdb..32c6a919f2c 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3867.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3867.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3867",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.267",
"lastModified": "2024-11-21T03:26:16.670",
"vulnStatus": "Modified",
@@ -148,7 +148,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96926",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -156,11 +156,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038051",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3868.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3868.json
index e58cc78d86f..d10c07bc435 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3868.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3868.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3868",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.297",
"lastModified": "2024-11-21T03:26:16.790",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96921",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038039",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ucs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3869.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3869.json
index 437772c14d5..d2e7087cc42 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3869.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3869.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3869",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.313",
"lastModified": "2024-11-21T03:26:16.903",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96931",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038048",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cpi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3870.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3870.json
index 2cdb98433ee..d6e7c7cb1a7 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3870.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3870.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3870",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.343",
"lastModified": "2024-11-21T03:26:17.017",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96907",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,11 +114,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038043",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-wsa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3871.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3871.json
index e0663752f4e..91350973f7a 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3871.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3871.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3871",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.377",
"lastModified": "2024-11-21T03:26:17.140",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96928",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cpo",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3872.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3872.json
index c9a5b6d8ef3..9221cb14e09 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3872.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3872.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3872",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.407",
"lastModified": "2024-11-21T03:26:17.250",
"vulnStatus": "Modified",
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96916",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038036",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3873.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3873.json
index f2c17c4ad26..de82c912f84 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3873.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3873.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3873",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-16T17:29:00.213",
"lastModified": "2024-11-21T03:26:17.363",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -158,7 +158,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98296",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -166,11 +166,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038394",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-cme",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3874.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3874.json
index c55d015569d..15827fc61e9 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3874.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3874.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3874",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.453",
"lastModified": "2024-11-21T03:26:17.490",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96914",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038037",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ucm1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3875.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3875.json
index 2f5cda3b0e9..f69b8f2941d 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3875.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3875.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3875",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.470",
"lastModified": "2024-11-21T03:26:17.600",
"vulnStatus": "Modified",
@@ -173,7 +173,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96930",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -181,11 +181,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038049",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cns",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3876.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3876.json
index 34fe0847ea4..0b5a2863445 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3876.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3876.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3876",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-16T17:29:00.247",
"lastModified": "2024-11-21T03:26:17.723",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98284",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,11 +119,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038393",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-ios-xr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3877.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3877.json
index 8951738bcf0..fc31ebfa4c3 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3877.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3877.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3877",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.517",
"lastModified": "2024-11-21T03:26:17.850",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96915",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038038",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ucm2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"VDB Entry"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3878.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3878.json
index 83c8c610238..c240b6c3b84 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3878.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3878.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3878",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.547",
"lastModified": "2024-11-21T03:26:17.967",
"vulnStatus": "Modified",
@@ -198,7 +198,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96927",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -206,11 +206,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038047",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-nss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3879.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3879.json
index a58845bea75..ecbd3765129 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3879.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3879.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3879",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.577",
"lastModified": "2024-11-21T03:26:18.090",
"vulnStatus": "Modified",
@@ -208,7 +208,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96920",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -216,11 +216,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038046",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-nss1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3880.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3880.json
index 74b98022272..8818387a6d5 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3880.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3880.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3880",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.610",
"lastModified": "2024-11-21T03:26:18.213",
"vulnStatus": "Modified",
@@ -246,7 +246,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96918",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -254,11 +254,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038040",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3881.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3881.json
index cb1af650e0f..33d054d2a4c 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3881.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3881.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3881",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-03-17T22:59:00.640",
"lastModified": "2024-11-21T03:26:18.337",
"vulnStatus": "Undergoing Analysis",
@@ -1721,7 +1721,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/96960",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1729,7 +1729,7 @@
},
{
"url": "http://www.securityfocus.com/bid/97391",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1737,7 +1737,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038059",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1745,14 +1745,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/41872/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -1761,7 +1761,7 @@
},
{
"url": "https://www.exploit-db.com/exploits/41874/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3882.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3882.json
index dfcfccf5144..116affffed9 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3882.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3882.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3882",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-16T17:29:00.293",
"lastModified": "2024-11-21T03:26:18.513",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -258,7 +258,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98287",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -266,11 +266,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038391",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-cvr100w1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3883.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3883.json
index 4da8649aff9..f21213a3001 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3883.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3883.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3883",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-10-19T08:29:00.950",
"lastModified": "2024-11-21T03:26:18.640",
"vulnStatus": "Modified",
@@ -608,7 +608,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101493",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -616,7 +616,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039614",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -624,11 +624,11 @@
},
{
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03846en_us",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-aaavty",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3884.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3884.json
index a4a2e987cdf..527116a13cc 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3884.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3884.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3884",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.357",
"lastModified": "2024-11-21T03:26:18.793",
"vulnStatus": "Modified",
@@ -136,7 +136,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97470",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,11 +144,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038189",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cpi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3885.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3885.json
index 85b22124dc3..7f1c75a2ea3 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3885.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3885.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3885",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.387",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97451",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3886.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3886.json
index 34fb5935a01..3216910f8f9 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3886.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3886.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3886",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.420",
"lastModified": "2024-11-21T03:26:19.030",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97432",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,11 +109,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038192",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3887.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3887.json
index cc0397c90a2..fd813869a62 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3887.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3887.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3887",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.450",
"lastModified": "2024-11-21T03:26:19.157",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97453",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cfpw1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3888.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3888.json
index 3cfdb32a621..2a40472919b 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3888.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3888.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3888",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.480",
"lastModified": "2024-11-21T03:26:19.277",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97431",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038193",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-ucm1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3889.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3889.json
index 0eaac0f435b..690b7f452f5 100644
--- a/CVE-2017/CVE-2017-38xx/CVE-2017-3889.json
+++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3889.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-3889",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.513",
"lastModified": "2024-11-21T03:26:19.393",
"vulnStatus": "Modified",
@@ -100,7 +100,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97433",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -108,7 +108,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-res",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-65xx/CVE-2017-6597.json b/CVE-2017/CVE-2017-65xx/CVE-2017-6597.json
index fa68ad92c62..2f0cae675bc 100644
--- a/CVE-2017/CVE-2017-65xx/CVE-2017-6597.json
+++ b/CVE-2017/CVE-2017-65xx/CVE-2017-6597.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6597",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.543",
"lastModified": "2024-11-21T03:30:05.190",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97476",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,11 +109,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038195",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cli",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-65xx/CVE-2017-6598.json b/CVE-2017/CVE-2017-65xx/CVE-2017-6598.json
index 294fc73e59a..cd69219b591 100644
--- a/CVE-2017/CVE-2017-65xx/CVE-2017-6598.json
+++ b/CVE-2017/CVE-2017-65xx/CVE-2017-6598.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6598",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.577",
"lastModified": "2024-11-21T03:30:05.317",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97429",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,11 +109,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038198",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-ucs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-65xx/CVE-2017-6599.json b/CVE-2017/CVE-2017-65xx/CVE-2017-6599.json
index f4945f55c65..bc90ead5ee9 100644
--- a/CVE-2017/CVE-2017-65xx/CVE-2017-6599.json
+++ b/CVE-2017/CVE-2017-65xx/CVE-2017-6599.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6599",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.607",
"lastModified": "2024-11-21T03:30:05.440",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97464",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,11 +109,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038191",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-ios",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6600.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6600.json
index 51e6b22590e..b3066dccd5d 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6600.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6600.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6600",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.637",
"lastModified": "2024-11-21T03:30:05.563",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97439",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,11 +109,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038199",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-ucs1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6601.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6601.json
index e56b7993da9..74e9f36fbec 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6601.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6601.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6601",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.670",
"lastModified": "2024-11-21T03:30:05.687",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97477",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,11 +109,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038196",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cli1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6602.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6602.json
index c01494b9559..a6718d1f75b 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6602.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6602.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6602",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.700",
"lastModified": "2024-11-21T03:30:05.810",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97472",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,11 +109,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038197",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cli2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6603.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6603.json
index 7331326aa27..20e15f2304f 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6603.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6603.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6603",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.730",
"lastModified": "2024-11-21T03:30:05.930",
"vulnStatus": "Modified",
@@ -148,7 +148,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97450",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -156,11 +156,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038185",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6604.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6604.json
index b855d16920f..f1621c5ff53 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6604.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6604.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6604",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.763",
"lastModified": "2024-11-21T03:30:06.070",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97457",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,11 +114,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038186",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cimc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6605.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6605.json
index f3198bee14b..af083448ec5 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6605.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6605.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6605",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.227",
"lastModified": "2024-11-21T03:30:06.230",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99207",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038740",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-ise1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6606.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6606.json
index 2f2c3bba4a7..7dc148307db 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6606.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6606.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6606",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-07T17:59:00.777",
"lastModified": "2024-11-21T03:30:06.363",
"vulnStatus": "Modified",
@@ -911,7 +911,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97434",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -919,11 +919,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038190",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-iosxe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6607.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6607.json
index 616b7a54ccd..afd7ef836da 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6607.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6607.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6607",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.510",
"lastModified": "2024-11-21T03:30:06.503",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -646,7 +646,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97933",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -654,11 +654,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038319",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6608.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6608.json
index e289068bb1a..536c6ea83e6 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6608.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6608.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6608",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.543",
"lastModified": "2024-11-21T03:30:06.670",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -456,7 +456,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97937",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -464,11 +464,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038315",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-tls",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6609.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6609.json
index 7491f70e8fd..158cae00151 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6609.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6609.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6609",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.573",
"lastModified": "2024-11-21T03:30:06.840",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -631,7 +631,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97936",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -639,11 +639,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038316",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-ipsec",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6610.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6610.json
index a46d9ca7ffb..a7630419f47 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6610.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6610.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6610",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.603",
"lastModified": "2024-11-21T03:30:07.023",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -586,7 +586,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97934",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -594,11 +594,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038314",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-xauth",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6611.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6611.json
index 62c1e81da88..71124c7ed35 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6611.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6611.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6611",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.637",
"lastModified": "2024-11-21T03:30:07.207",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97931",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,11 +114,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038330",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cpi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6612.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6612.json
index 9cab27c988d..96105a420f1 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6612.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6612.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6612",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-25T19:29:00.177",
"lastModified": "2024-11-21T03:30:07.367",
"vulnStatus": "Modified",
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99920",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038961",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6613.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6613.json
index 1492a79b02d..e306cabc308 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6613.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6613.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6613",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.683",
"lastModified": "2024-11-21T03:30:07.547",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97924",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,11 +134,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038331",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-prime-dns",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6614.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6614.json
index e29a9528b2c..796066fe198 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6614.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6614.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6614",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.730",
"lastModified": "2024-11-21T03:30:07.703",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97926",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-findit",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6615.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6615.json
index 9abd549e768..92449423d29 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6615.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6615.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6615",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.760",
"lastModified": "2024-11-21T03:30:07.900",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -130,7 +130,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97930",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -138,11 +138,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038328",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-ios-xe-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6616.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6616.json
index 3d6b335a75d..89f24e41a10 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6616.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6616.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6616",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.793",
"lastModified": "2024-11-21T03:30:08.060",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97928",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cimc3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6617.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6617.json
index f24ff7135ba..56eb298e614 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6617.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6617.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6617",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.823",
"lastModified": "2024-11-21T03:30:08.213",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97929",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cimc2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6618.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6618.json
index 403da2c004d..350fa286f59 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6618.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6618.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6618",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.853",
"lastModified": "2024-11-21T03:30:08.360",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97927",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cimc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6619.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6619.json
index 5c7d20df57f..c2e361c89e7 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6619.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6619.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6619",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-04-20T22:59:00.887",
"lastModified": "2024-11-21T03:30:08.530",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/97925",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cimc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6620.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6620.json
index f918917a02c..ec30f9f4585 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6620.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6620.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6620",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-03T21:59:00.167",
"lastModified": "2024-11-21T03:30:08.667",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98289",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,11 +126,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038395",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-cvr100w2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6621.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6621.json
index 882c11f44ba..f887b42fe7c 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6621.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6621.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6621",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-18T19:29:00.203",
"lastModified": "2024-11-21T03:30:08.817",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98522",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -159,11 +159,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038508",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"VDB Entry"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6622.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6622.json
index 57be2733890..cc33b389112 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6622.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6622.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6622",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-18T19:29:00.237",
"lastModified": "2024-11-21T03:30:08.967",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -159,18 +159,18 @@
},
{
"url": "http://www.securitytracker.com/id/1038507",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/42888/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/98520",
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6623.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6623.json
index f6171143f0c..139ee11fff5 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6623.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6623.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6623",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-18T19:29:00.283",
"lastModified": "2024-11-21T03:30:09.113",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98521",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-cps",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6624.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6624.json
index 4220c5e1751..054ba239658 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6624.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6624.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6624",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-03T21:59:00.200",
"lastModified": "2024-11-21T03:30:09.277",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98283",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,11 +114,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038398",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-cme1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6625.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6625.json
index 0b03be95980..6097f1d03c8 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6625.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6625.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6625",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-03T21:59:00.230",
"lastModified": "2024-11-21T03:30:09.410",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98292",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038397",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -152,7 +152,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-ftd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6626.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6626.json
index 606f1632328..e0c22c70282 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6626.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6626.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6626",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-03T21:59:00.263",
"lastModified": "2024-11-21T03:30:09.563",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98291",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,11 +119,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038396",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-finesse-ucce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6627.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6627.json
index fb8b0d0094a..d5f286c1fe0 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6627.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6627.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6627",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.660",
"lastModified": "2024-11-21T03:30:09.710",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS Software and Cisco IOS XE Software UDP Packet Processing Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -460,7 +460,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100644",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -468,7 +468,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039289",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -476,7 +476,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6628.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6628.json
index 3dad8681766..376b4179a44 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6628.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6628.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6628",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-03T21:59:00.293",
"lastModified": "2024-11-21T03:30:09.880",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98294",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,11 +124,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038399",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-waas",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6629.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6629.json
index 2d263eaa2a3..af75a406c7f 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6629.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6629.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6629",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-03T21:59:00.323",
"lastModified": "2024-11-21T03:30:10.017",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,18 +106,18 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98286",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securitytracker.com/id/1038400",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-cuc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6630.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6630.json
index 7458dbeebc1..1bc031a1be8 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6630.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6630.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6630",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.180",
"lastModified": "2024-11-21T03:30:10.177",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98533",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,11 +126,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038511",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-sip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6631.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6631.json
index 553bcebed9c..540109b478a 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6631.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6631.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6631",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.693",
"lastModified": "2024-11-21T03:30:10.333",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -172,7 +172,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100672",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -180,7 +180,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-stb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6632.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6632.json
index 34f869daf18..f8622e1e7a8 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6632.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6632.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6632",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.243",
"lastModified": "2024-11-21T03:30:10.513",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -156,7 +156,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98523",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -164,7 +164,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-fpwr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6633.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6633.json
index ba85aa0a536..6a14d1f3499 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6633.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6633.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6633",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.273",
"lastModified": "2024-11-21T03:30:10.683",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98525",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -141,11 +141,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038513",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-ucsc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6634.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6634.json
index 032df007454..02efcef9c72 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6634.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6634.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6634",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.320",
"lastModified": "2024-11-21T03:30:10.867",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98524",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -141,11 +141,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038517",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-ie1000csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6635.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6635.json
index 3cda34e4886..eb5768eeaf8 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6635.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6635.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6635",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.367",
"lastModified": "2024-11-21T03:30:11.010",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98535",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
@@ -159,11 +159,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038514",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6636.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6636.json
index 7364e8aed61..4a600dc508b 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6636.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6636.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6636",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.400",
"lastModified": "2024-11-21T03:30:11.163",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98526",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,11 +149,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038515",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6637.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6637.json
index 8c6af1046a8..a32478ff7df 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6637.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6637.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6637",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.447",
"lastModified": "2024-11-21T03:30:11.313",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98530",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,11 +149,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038515",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6638.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6638.json
index 66f6a04f953..8ea26d6b65a 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6638.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6638.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6638",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-08T13:29:00.423",
"lastModified": "2024-11-21T03:30:11.473",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98938",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,11 +115,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038627",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-anyconnect",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6639.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6639.json
index b40f09e9302..ec49a61343d 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6639.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6639.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6639",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-08T13:29:00.453",
"lastModified": "2024-11-21T03:30:11.633",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,15 +124,15 @@
},
{
"url": "http://www.securitytracker.com/id/1038626",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesb3p03762en_us",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6640.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6640.json
index 91e7c7177a4..f1ee31b4360 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6640.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6640.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6640",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-08T13:29:00.483",
"lastModified": "2024-11-21T03:30:11.793",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98937",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,11 +124,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038625",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6641.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6641.json
index d526ddbd5c0..2bec0422045 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6641.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6641.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6641",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.477",
"lastModified": "2024-11-21T03:30:11.943",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98532",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6642.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6642.json
index d449bd7303a..c1b18353f19 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6642.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6642.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6642",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.527",
"lastModified": "2024-11-21T03:30:12.093",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98534",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6643.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6643.json
index ed4d87abfea..14610e78bda 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6643.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6643.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6643",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.570",
"lastModified": "2024-11-21T03:30:12.247",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98542",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6644.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6644.json
index 4f265dd75a4..13e57976761 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6644.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6644.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6644",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.603",
"lastModified": "2024-11-21T03:30:12.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98539",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6645.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6645.json
index 6e33627f6ad..6362c37b8cf 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6645.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6645.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6645",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.650",
"lastModified": "2024-11-21T03:30:12.543",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98537",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6646.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6646.json
index 2bbf90b26c8..6422e8ccbd1 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6646.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6646.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6646",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.680",
"lastModified": "2024-11-21T03:30:12.713",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98529",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6647.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6647.json
index 1cb7a757ef4..dbf4c464d50 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6647.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6647.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6647",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.727",
"lastModified": "2024-11-21T03:30:12.857",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98538",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6648.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6648.json
index da1e12e6acb..54b817bd38c 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6648.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6648.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6648",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-08T13:29:00.517",
"lastModified": "2024-11-21T03:30:13.017",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -436,7 +436,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98934",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -444,11 +444,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038624",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-tele",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6649.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6649.json
index afb7214a508..6028023d732 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6649.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6649.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6649",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.760",
"lastModified": "2024-11-21T03:30:13.183",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -217,7 +217,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98531",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -225,11 +225,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038518",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6650.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6650.json
index 13aad103fe8..5d1439d294d 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6650.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6650.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6650",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.790",
"lastModified": "2024-11-21T03:30:13.337",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -217,7 +217,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98528",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
@@ -225,11 +225,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038518",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6651.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6651.json
index c88e217188b..d82e71b6a4a 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6651.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6651.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6651",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-16T17:29:00.357",
"lastModified": "2024-11-21T03:30:13.517",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -261,7 +261,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98387",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -269,11 +269,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038459",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170510-cwms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6652.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6652.json
index 1ee9079d1e3..db68971b676 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6652.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6652.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6652",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-18T19:29:00.313",
"lastModified": "2024-11-21T03:30:13.680",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -110,18 +110,18 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98519",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1038509",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-telepresence-ix5000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6653.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6653.json
index f9fe9ec9f4c..f705d2ebd9c 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6653.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6653.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6653",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.837",
"lastModified": "2024-11-21T03:30:13.827",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98536",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,11 +114,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038516",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6654.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6654.json
index 26b994cb192..d5192f3aa3c 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6654.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6654.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6654",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-22T01:29:00.867",
"lastModified": "2024-11-21T03:30:13.980",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98527",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,11 +124,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038512",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6655.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6655.json
index e7c543470cf..ef66a302b98 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6655.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6655.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6655",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:00.830",
"lastModified": "2024-11-21T03:30:14.127",
"vulnStatus": "Modified",
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98991",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038628",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-nxos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6656.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6656.json
index 1c63fc79fed..3ffbec07725 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6656.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6656.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6656",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:00.863",
"lastModified": "2024-11-21T03:30:14.260",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98996",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038636",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-sip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6657.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6657.json
index 04a636c6ad5..1739704686d 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6657.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6657.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6657",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-16T17:29:00.403",
"lastModified": "2024-11-21T03:30:14.403",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://blog.snort.org/2017/05/snort-vulnerabilities-found.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1038483",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170515-snort",
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6658.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6658.json
index 878457aa9e9..078b9c5a842 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6658.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6658.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6658",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-05-16T17:29:00.417",
"lastModified": "2024-11-21T03:30:14.547",
"vulnStatus": "Modified",
@@ -96,14 +96,14 @@
"references": [
{
"url": "http://blog.snort.org/2017/05/snort-vulnerabilities-found.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1038483",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170515-snort",
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6659.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6659.json
index 9f3c1d2f87f..95917350366 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6659.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6659.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6659",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:00.910",
"lastModified": "2024-11-21T03:30:14.680",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98970",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,11 +109,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038633",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-pca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6661.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6661.json
index d1702c71a74..3be0724a645 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6661.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6661.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6661",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:00.940",
"lastModified": "2024-11-21T03:30:14.820",
"vulnStatus": "Modified",
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98950",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,15 +119,15 @@
},
{
"url": "http://www.securitytracker.com/id/1038637",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1038638",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6662.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6662.json
index 54ab3056663..a073f1557f6 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6662.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6662.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6662",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-26T07:29:00.170",
"lastModified": "2024-11-21T03:30:14.960",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99194",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -259,11 +259,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038750",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-piepnm1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6663.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6663.json
index 6df4616d12c..84629090bc2 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6663.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6663.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6663",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.230",
"lastModified": "2024-11-21T03:30:15.107",
"vulnStatus": "Undergoing Analysis",
@@ -1025,7 +1025,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99973",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1033,7 +1033,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038999",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1041,7 +1041,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anidos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6664.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6664.json
index f7b82347b30..7dea095c484 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6664.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6664.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6664",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.263",
"lastModified": "2024-11-21T03:30:15.293",
"vulnStatus": "Modified",
@@ -236,7 +236,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99986",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -244,7 +244,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038997",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -252,7 +252,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anicrl",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6665.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6665.json
index 1b76270adf1..eb3099615f2 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6665.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6665.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6665",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.293",
"lastModified": "2024-11-21T03:30:15.440",
"vulnStatus": "Modified",
@@ -1026,7 +1026,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99969",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1034,7 +1034,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038998",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1042,7 +1042,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-aniacp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6666.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6666.json
index 15c4486b8c5..8aeff693fec 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6666.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6666.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6666",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:00.973",
"lastModified": "2024-11-21T03:30:15.650",
"vulnStatus": "Modified",
@@ -136,7 +136,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98987",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,11 +144,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038630",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-ncs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6667.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6667.json
index 7b899f55d01..39c5eec636f 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6667.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6667.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6667",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.003",
"lastModified": "2024-11-21T03:30:15.833",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98978",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-ccs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6668.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6668.json
index c40daeda67f..56870a7d528 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6668.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6668.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6668",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.037",
"lastModified": "2024-11-21T03:30:15.983",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98947",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038632",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-cucm2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6669.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6669.json
index 8ad3e4215b4..e22a36d4f99 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6669.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6669.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6669",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-26T07:29:00.230",
"lastModified": "2024-11-21T03:30:16.123",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99196",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-wnrp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6670.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6670.json
index 3754abb08e7..e3b6ec5c64a 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6670.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6670.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6670",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.067",
"lastModified": "2024-11-21T03:30:16.277",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98946",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,11 +104,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038631",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-cucm1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6671.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6671.json
index 52c859c0706..a6641f03cac 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6671.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6671.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6671",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.097",
"lastModified": "2024-11-21T03:30:16.420",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98969",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038635",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -117,7 +117,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6672.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6672.json
index 09665e1d01f..00a778d5735 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6672.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6672.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6672",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-25T19:29:00.207",
"lastModified": "2024-11-21T03:30:16.560",
"vulnStatus": "Modified",
@@ -206,7 +206,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99921",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -214,7 +214,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038962",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -222,7 +222,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-asr1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6673.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6673.json
index 1abd6ded67e..ff01e0a05ea 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6673.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6673.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6673",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.127",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-fmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6674.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6674.json
index 09bde276da5..0644f59b3bd 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6674.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6674.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6674",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.160",
"lastModified": "2024-11-21T03:30:16.863",
"vulnStatus": "Modified",
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98654",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170524-fmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6675.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6675.json
index 114f0161dee..2f844f54102 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6675.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6675.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6675",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.190",
"lastModified": "2024-11-21T03:30:17.003",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98962",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-ind",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6678.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6678.json
index 34ea709d224..9ce459a51a6 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6678.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6678.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6678",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-26T07:29:00.247",
"lastModified": "2024-11-21T03:30:17.157",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99195",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-vpc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6679.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6679.json
index bfb59f708d2..e46ebbc1286 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6679.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6679.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6679",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-12-01T17:29:00.667",
"lastModified": "2024-11-21T03:30:17.310",
"vulnStatus": "Modified",
@@ -97,7 +97,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/101567",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -105,25 +105,25 @@
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-tunnel-gJw5thgE",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://support.umbrella.com/hc/en-us/articles/115004154423",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.umbrella.com/hc/en-us/articles/115004752143-Virtual-Appliance-Vulnerability-due-to-always-on-SSH-Tunnel-RESOLVED-2017-09-15",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.info-sec.ca/advisories/Cisco-Umbrella.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6680.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6680.json
index a2507168e5a..9308fc4e113 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6680.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6680.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6680",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.223",
"lastModified": "2024-11-21T03:30:17.463",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99001",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-usf1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6681.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6681.json
index 84503bb79a3..7e2744ac4f9 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6681.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6681.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6681",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.253",
"lastModified": "2024-11-21T03:30:17.593",
"vulnStatus": "Modified",
@@ -100,7 +100,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98977",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -108,7 +108,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-usf2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6682.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6682.json
index d67e682581e..7af941e39c1 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6682.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6682.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6682",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.270",
"lastModified": "2024-11-21T03:30:17.743",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98951",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6683.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6683.json
index f6aaebac5b9..08a41677415 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6683.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6683.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6683",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.300",
"lastModified": "2024-11-21T03:30:17.900",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98982",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6684.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6684.json
index ee4506d016a..d902f715d9d 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6684.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6684.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6684",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.330",
"lastModified": "2024-11-21T03:30:18.030",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98979",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6685.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6685.json
index 22283ecbdab..f953bf2b1be 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6685.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6685.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6685",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.363",
"lastModified": "2024-11-21T03:30:18.170",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-usf3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6686.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6686.json
index 5bf2f866f08..6c2f57dd911 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6686.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6686.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6686",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.410",
"lastModified": "2024-11-21T03:30:18.310",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98988",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-usf4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6687.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6687.json
index 11c04c6ad38..c97800dab90 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6687.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6687.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6687",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.440",
"lastModified": "2024-11-21T03:30:18.453",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98981",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-usf5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6688.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6688.json
index 62affe4d957..600cd118c0a 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6688.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6688.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6688",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.473",
"lastModified": "2024-11-21T03:30:18.590",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98973",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6689.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6689.json
index 5963752ae4f..958e563d925 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6689.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6689.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6689",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.520",
"lastModified": "2024-11-21T03:30:18.710",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98983",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6690.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6690.json
index cdec61fedab..1f8195c8e7f 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6690.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6690.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6690",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.550",
"lastModified": "2024-11-21T03:30:18.840",
"vulnStatus": "Modified",
@@ -113,7 +113,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98998",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -121,11 +121,11 @@
},
{
"url": "http://www.securitytracker.com/id/1038634",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-staros",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6691.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6691.json
index 567d245b361..37698522c2b 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6691.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6691.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6691",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.567",
"lastModified": "2024-11-21T03:30:18.977",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98948",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6692.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6692.json
index a68dbd200d0..fa54d005770 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6692.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6692.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6692",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.597",
"lastModified": "2024-11-21T03:30:19.100",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98980",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-usf6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6693.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6693.json
index 6a3c9083219..2cc26a98acf 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6693.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6693.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6693",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.627",
"lastModified": "2024-11-21T03:30:19.230",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98985",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6694.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6694.json
index 051dc79764d..3ab639960b1 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6694.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6694.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6694",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.660",
"lastModified": "2024-11-21T03:30:19.347",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98972",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-usp1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6695.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6695.json
index 629f6f800be..6918cf74239 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6695.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6695.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6695",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.690",
"lastModified": "2024-11-21T03:30:19.460",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98963",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-usp2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6696.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6696.json
index f09a7546988..6cacf26909a 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6696.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6696.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6696",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.723",
"lastModified": "2024-11-21T03:30:19.593",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98952",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6697.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6697.json
index 1350acaa8e5..91451656516 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6697.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6697.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6697",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-06-13T06:29:01.753",
"lastModified": "2024-11-21T03:30:19.710",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/98959",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6698.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6698.json
index ed012507fc1..eef83e9b86c 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6698.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6698.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6698",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.243",
"lastModified": "2024-11-21T03:30:19.840",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99214",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038751",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -117,7 +117,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-piepnm2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6699.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6699.json
index 3ef76636ce1..964d3f04aaa 100644
--- a/CVE-2017/CVE-2017-66xx/CVE-2017-6699.json
+++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6699.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6699",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.290",
"lastModified": "2024-11-21T03:30:19.957",
"vulnStatus": "Modified",
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99221",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038751",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-piepnm3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6700.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6700.json
index fdf16fa9c77..10e8d39edd6 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6700.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6700.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6700",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.307",
"lastModified": "2024-11-21T03:30:20.077",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99216",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038751",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -117,7 +117,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-piepnm4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6701.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6701.json
index a35ad15528a..02424d7d4ff 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6701.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6701.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6701",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.337",
"lastModified": "2024-11-21T03:30:20.223",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99208",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038740",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6702.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6702.json
index ed941f7069f..253ae04090d 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6702.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6702.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6702",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.367",
"lastModified": "2024-11-21T03:30:20.340",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99205",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038738",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-csm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6703.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6703.json
index 7bf7becbf5f..e388c9060eb 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6703.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6703.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6703",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.400",
"lastModified": "2024-11-21T03:30:20.457",
"vulnStatus": "Modified",
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99224",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038744",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-pcp1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6704.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6704.json
index d54d2aa1cd8..b6f168fd301 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6704.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6704.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6704",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.430",
"lastModified": "2024-11-21T03:30:20.583",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99223",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038744",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-pcp2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6705.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6705.json
index 13b1d8aab09..f1301392708 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6705.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6705.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6705",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.460",
"lastModified": "2024-11-21T03:30:20.700",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99206",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038744",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-pcp3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6706.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6706.json
index 06d4de58222..8a2122ac78c 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6706.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6706.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6706",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.493",
"lastModified": "2024-11-21T03:30:20.813",
"vulnStatus": "Modified",
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99204",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038744",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-pcp4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6707.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6707.json
index 73a773b1a15..32cb311ab46 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6707.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6707.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6707",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-06T00:29:00.177",
"lastModified": "2024-11-21T03:30:20.943",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -391,11 +391,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99462",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securitytracker.com/id/1038818",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -403,7 +403,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-asrcmd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6708.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6708.json
index 96ec73a2480..9284030eb07 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6708.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6708.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6708",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-06T00:29:00.397",
"lastModified": "2024-11-21T03:30:21.080",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,11 +107,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99512",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6709.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6709.json
index e80945cd39a..710ca94907c 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6709.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6709.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6709",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-06T00:29:00.427",
"lastModified": "2024-11-21T03:30:21.213",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6710.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6710.json
index c674a32296c..d141ee930ca 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6710.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6710.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6710",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.370",
"lastModified": "2024-11-21T03:30:21.340",
"vulnStatus": "Modified",
@@ -113,7 +113,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100362",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -121,7 +121,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-em",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6711.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6711.json
index 5f9e7f95443..12536a34132 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6711.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6711.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6711",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-06T00:29:00.457",
"lastModified": "2024-11-21T03:30:21.473",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99440",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-uas",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6712.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6712.json
index d4db5c7a44b..9a1b3d53292 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6712.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6712.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6712",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-06T00:29:00.490",
"lastModified": "2024-11-21T03:30:21.613",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,11 +131,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99461",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-esc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6713.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6713.json
index e0e12cc9a78..85533131a48 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6713.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6713.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6713",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-06T00:29:00.520",
"lastModified": "2024-11-21T03:30:21.733",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99437",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-esc2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6714.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6714.json
index 43fda44b99c..ab0b51a18b6 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6714.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6714.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6714",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-06T00:29:00.553",
"lastModified": "2024-11-21T03:30:21.860",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99436",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6715.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6715.json
index a1dde07892a..ad9a4ab24bd 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6715.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6715.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6715",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.523",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -136,7 +136,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99209",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6716.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6716.json
index 40ac49ffc66..678331e4537 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6716.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6716.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6716",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.557",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -146,7 +146,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99220",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -154,7 +154,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fmc2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6717.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6717.json
index 4aed5d13cc1..42c8a80fae3 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6717.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6717.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6717",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.587",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -201,7 +201,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99217",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -209,7 +209,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-fpmc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6718.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6718.json
index f8c632b381d..9a05cf2b2e8 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6718.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6718.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6718",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.617",
"lastModified": "2024-11-21T03:30:22.363",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99226",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038741",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -117,7 +117,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-ios1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6719.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6719.json
index b3613ea740f..cdc40b1e8c3 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6719.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6719.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6719",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.650",
"lastModified": "2024-11-21T03:30:22.487",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99213",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038741",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -117,7 +117,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-ios",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6720.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6720.json
index 3c94d9073e7..ef6f932af8b 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6720.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6720.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6720",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-21T05:29:01.043",
"lastModified": "2024-11-21T03:30:22.600",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -2471,7 +2471,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100933",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -2479,7 +2479,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6721.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6721.json
index ebb8b7c2812..a57fd2443a3 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6721.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6721.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6721",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.680",
"lastModified": "2024-11-21T03:30:22.797",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99200",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038747",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-waas",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6722.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6722.json
index 2cf98b02129..476560fa5fe 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6722.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6722.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6722",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.697",
"lastModified": "2024-11-21T03:30:22.930",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99201",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038749",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-ucce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6724.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6724.json
index dcaded9fcdd..bf8b35f19ca 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6724.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6724.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6724",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.727",
"lastModified": "2024-11-21T03:30:23.057",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99203",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038751",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-piwf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6725.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6725.json
index 10723d48416..1cf91a41fcc 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6725.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6725.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6725",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-04T00:29:00.757",
"lastModified": "2024-11-21T03:30:23.187",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99202",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038751",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-piwf1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6726.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6726.json
index 5de737feb84..56bb146b996 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6726.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6726.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6726",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-10T20:29:00.423",
"lastModified": "2024-11-21T03:30:23.307",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-cpn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6727.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6727.json
index 0fa18e0ef36..d910d8d6f8b 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6727.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6727.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6727",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-10T20:29:00.453",
"lastModified": "2024-11-21T03:30:23.420",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99483",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038824",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-waas",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6728.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6728.json
index d45b4122e3a..88608b5c73b 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6728.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6728.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6728",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-10T20:29:00.517",
"lastModified": "2024-11-21T03:30:23.547",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99464",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038821",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-ios",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6729.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6729.json
index de86d820530..1e56a9f4f61 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6729.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6729.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6729",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-10T20:29:00.547",
"lastModified": "2024-11-21T03:30:23.670",
"vulnStatus": "Modified",
@@ -363,7 +363,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100015",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -371,7 +371,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038819",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -379,7 +379,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-staros",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6730.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6730.json
index ef17e9b6d29..66c5be9bc60 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6730.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6730.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6730",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-10T20:29:00.593",
"lastModified": "2024-11-21T03:30:23.830",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99481",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038825",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-waas1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6731.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6731.json
index 5cd639f7e77..9581b171c8b 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6731.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6731.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6731",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-10T20:29:00.627",
"lastModified": "2024-11-21T03:30:23.963",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1038820",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-iosxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6732.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6732.json
index 8448e583ca9..9f9bb43721e 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6732.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6732.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6732",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-10T20:29:00.673",
"lastModified": "2024-11-21T03:30:24.080",
"vulnStatus": "Modified",
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99457",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-prime",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6733.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6733.json
index c5dc6beea3b..163d04875e7 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6733.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6733.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6733",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-10T20:29:00.703",
"lastModified": "2024-11-21T03:30:24.193",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99458",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038822",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-ise1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6734.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6734.json
index 10fdae8d391..88e7850fac3 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6734.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6734.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6734",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-10T20:29:00.750",
"lastModified": "2024-11-21T03:30:24.307",
"vulnStatus": "Modified",
@@ -136,7 +136,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99459",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038823",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -152,7 +152,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-ise2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6735.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6735.json
index 0d7b569927f..26c3c9d4b30 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6735.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6735.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6735",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-10T20:29:00.783",
"lastModified": "2024-11-21T03:30:24.450",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99460",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038826",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -117,7 +117,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-FireSIGHT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6736.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6736.json
index 766a0656fa0..c4b63a7fc62 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6736.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6736.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6736",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-17T21:29:00.213",
"lastModified": "2024-11-21T03:30:24.567",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -135,7 +135,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038808",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -144,21 +144,21 @@
},
{
"url": "https://github.com/artkond/cisco-snmp-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/43450/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6737.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6737.json
index 33ee91a9bc9..c51eb07c67c 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6737.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6737.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6737",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-17T21:29:00.243",
"lastModified": "2024-11-21T03:30:24.723",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -135,7 +135,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038808",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6738.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6738.json
index 43b188f739e..9ef464364c3 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6738.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6738.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6738",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-17T21:29:00.290",
"lastModified": "2024-11-21T03:30:24.867",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -135,7 +135,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038808",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6739.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6739.json
index ec18ff7cfe2..ceb5774f8ae 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6739.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6739.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6739",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-17T21:29:00.337",
"lastModified": "2024-11-21T03:30:25.010",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -135,7 +135,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038808",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6740.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6740.json
index a0587e168d1..c469e9f4537 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6740.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6740.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6740",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-17T21:29:00.370",
"lastModified": "2024-11-21T03:30:25.140",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -135,7 +135,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038808",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6741.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6741.json
index dd5483b072d..251fa0e1df4 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6741.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6741.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6741",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-17T21:29:00.417",
"lastModified": "2024-11-21T03:30:25.280",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -661,7 +661,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -669,7 +669,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038808",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -677,7 +677,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6742.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6742.json
index d65a04def83..cbc46b64a84 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6742.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6742.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6742",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-17T21:29:00.447",
"lastModified": "2024-11-21T03:30:25.427",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -135,7 +135,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038808",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6743.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6743.json
index 2270f735806..a96b6c406f0 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6743.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6743.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6743",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-17T21:29:00.477",
"lastModified": "2024-11-21T03:30:25.573",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038808",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6744.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6744.json
index 2406b10a182..74c3c20246d 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6744.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6744.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6744",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-17T21:29:00.510",
"lastModified": "2024-11-21T03:30:25.710",
"vulnStatus": "Undergoing Analysis",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -92,7 +92,7 @@
"cisaVulnerabilityName": "Cisco IOS Software SNMP Remote Code Execution Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1862,7 +1862,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6745.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6745.json
index 471efe826f5..c78ae86161f 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6745.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6745.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6745",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.323",
"lastModified": "2024-11-21T03:30:26.103",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -186,7 +186,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100106",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -194,7 +194,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-vds",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6746.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6746.json
index 2d94b3777b9..8bb26e662ad 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6746.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6746.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6746",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-25T19:29:00.240",
"lastModified": "2024-11-21T03:30:26.230",
"vulnStatus": "Modified",
@@ -146,7 +146,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99877",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -154,7 +154,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038948",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -162,7 +162,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-wsa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6747.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6747.json
index 9d3105e8260..0fe088c3e44 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6747.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6747.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6747",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.357",
"lastModified": "2024-11-21T03:30:26.350",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -191,7 +191,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1039054",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -199,7 +199,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6748.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6748.json
index bb3047100b4..f166ea5afd3 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6748.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6748.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6748",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-25T19:29:00.270",
"lastModified": "2024-11-21T03:30:26.477",
"vulnStatus": "Modified",
@@ -186,7 +186,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99918",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -194,7 +194,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038956",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -202,7 +202,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-wsa2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6749.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6749.json
index 519757032d0..2938cbef510 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6749.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6749.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6749",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-25T19:29:00.300",
"lastModified": "2024-11-21T03:30:26.600",
"vulnStatus": "Modified",
@@ -181,7 +181,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99875",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -189,7 +189,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038957",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -197,7 +197,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-wsa3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6750.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6750.json
index 50cbdaee71e..091d734de84 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6750.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6750.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6750",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-25T19:29:00.333",
"lastModified": "2024-11-21T03:30:26.727",
"vulnStatus": "Modified",
@@ -176,7 +176,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99924",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -184,7 +184,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038958",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -192,7 +192,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-wsa4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6751.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6751.json
index 8fce8e2d053..0f45e6b1e76 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6751.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6751.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6751",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-25T19:29:00.363",
"lastModified": "2024-11-21T03:30:26.850",
"vulnStatus": "Modified",
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99967",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038959",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -157,7 +157,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-wsa5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6752.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6752.json
index a056a3fa011..996075429fa 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6752.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6752.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6752",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.387",
"lastModified": "2024-11-21T03:30:26.980",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100113",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039057",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,14 +127,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvd47888",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-asa2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6753.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6753.json
index 042d27db47d..ac09a0b2ae0 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6753.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6753.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6753",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-25T19:29:00.397",
"lastModified": "2024-11-21T03:30:27.107",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -416,7 +416,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99614",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -424,7 +424,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038909",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -432,7 +432,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038910",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -440,7 +440,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038911",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -448,7 +448,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170717-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6754.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6754.json
index 8c09813f5e7..41e859ef8f2 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6754.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6754.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6754",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.417",
"lastModified": "2024-11-21T03:30:27.253",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100126",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,14 +114,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf07617",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-sntc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6755.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6755.json
index 893fb8f670a..c3ad9cde2ae 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6755.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6755.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6755",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-07-25T19:29:00.427",
"lastModified": "2024-11-21T03:30:27.377",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99878",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038960",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-pcpt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6756.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6756.json
index 4a7d2fabb85..535ace75806 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6756.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6756.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6756",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.450",
"lastModified": "2024-11-21T03:30:27.487",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100112",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039061",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-pcpt1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6757.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6757.json
index 1779f0df717..27b3080f96b 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6757.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6757.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6757",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.480",
"lastModified": "2024-11-21T03:30:27.600",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100121",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039063",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,14 +132,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCve13786",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6758.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6758.json
index 76d58d4b9ad..17c901effe9 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6758.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6758.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6758",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.510",
"lastModified": "2024-11-21T03:30:27.733",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100119",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039064",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,14 +122,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCve13796",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-ucm1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6759.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6759.json
index dea3848e0c6..8d47a6b0d02 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6759.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6759.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6759",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.543",
"lastModified": "2024-11-21T03:30:27.860",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1039062",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,14 +114,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvc90304",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-pcpt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6761.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6761.json
index cd32d9c773a..78c76a5555f 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6761.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6761.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6761",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.573",
"lastModified": "2024-11-21T03:30:27.993",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100110",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039059",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,14 +127,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvd96744",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-cf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6762.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6762.json
index 986a1380e88..381cc5e278f 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6762.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6762.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6762",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.607",
"lastModified": "2024-11-21T03:30:28.133",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100108",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039060",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,14 +142,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCve09718",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-cj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6763.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6763.json
index d8e2a3afd88..b0d706b215b 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6763.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6763.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6763",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.637",
"lastModified": "2024-11-21T03:30:28.253",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100111",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039058",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,14 +122,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCve10131",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-ms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6764.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6764.json
index 0fe0776f27d..6cdb34fcf64 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6764.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6764.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6764",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.667",
"lastModified": "2024-11-21T03:30:28.387",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100107",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039055",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,14 +122,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvd82064",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-asa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6765.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6765.json
index 916d84c6597..ace6f08a6ff 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6765.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6765.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6765",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.700",
"lastModified": "2024-11-21T03:30:28.507",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100150",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039056",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -117,14 +117,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCve19179",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-asa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6766.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6766.json
index 50eb446c5a7..90325647bcf 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6766.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6766.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6766",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.730",
"lastModified": "2024-11-21T03:30:28.630",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,14 +136,14 @@
"references": [
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCve12652",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-fpw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6767.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6767.json
index 5f4fc871f7b..7719dd326a9 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6767.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6767.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6767",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.400",
"lastModified": "2024-11-21T03:30:28.760",
"vulnStatus": "Modified",
@@ -211,7 +211,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100400",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -219,7 +219,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039180",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -227,7 +227,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-apic1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6768.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6768.json
index aa95bf6b8fc..b71c9ad17f1 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6768.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6768.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6768",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.433",
"lastModified": "2024-11-21T03:30:28.883",
"vulnStatus": "Modified",
@@ -151,7 +151,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100363",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -159,7 +159,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039179",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -167,7 +167,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-apic2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6769.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6769.json
index 68447516857..f3b7d41118d 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6769.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6769.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6769",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.760",
"lastModified": "2024-11-21T03:30:29.007",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/99985",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "http://www.securitytracker.com/id/1038996",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -117,7 +117,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-acs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6770.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6770.json
index 39bf13aa448..fd2b20d5553 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6770.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6770.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6770",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-07T06:29:00.793",
"lastModified": "2024-11-21T03:30:29.117",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -19041,7 +19041,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100005",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -19049,7 +19049,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039005",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -19057,7 +19057,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039006",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -19065,7 +19065,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039007",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -19073,7 +19073,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170727-ospf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6771.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6771.json
index f8a2f12859d..58ac2ce7604 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6771.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6771.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6771",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.463",
"lastModified": "2024-11-21T03:30:29.710",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100385",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-usf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6772.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6772.json
index 67cd2d23da7..618c8f1afb5 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6772.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6772.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6772",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.497",
"lastModified": "2024-11-21T03:30:29.830",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100388",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-esc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6773.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6773.json
index 43c05119ed2..63b107c4fdc 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6773.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6773.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6773",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.527",
"lastModified": "2024-11-21T03:30:29.947",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100376",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039181",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-staros1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6774.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6774.json
index 6f8edd112bc..219484bb51f 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6774.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6774.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6774",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.557",
"lastModified": "2024-11-21T03:30:30.070",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100386",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039182",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-staros2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6775.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6775.json
index 715d1e6a876..b486e68f5df 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6775.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6775.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6775",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.590",
"lastModified": "2024-11-21T03:30:30.197",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100381",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039183",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-staros3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6776.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6776.json
index 2617e25acac..fbaae775c1d 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6776.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6776.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6776",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.620",
"lastModified": "2024-11-21T03:30:30.323",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100370",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-esc2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6777.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6777.json
index ca08feebe71..1cef66efadb 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6777.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6777.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6777",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.650",
"lastModified": "2024-11-21T03:30:30.443",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100390",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-esc3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6778.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6778.json
index 7b65be18aaa..b0b9c2a99eb 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6778.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6778.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6778",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.683",
"lastModified": "2024-11-21T03:30:30.567",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100380",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-usp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6779.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6779.json
index 41ddb0cfbe4..fac45934d5d 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6779.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6779.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6779",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T12:29:00.260",
"lastModified": "2024-11-21T03:30:30.690",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -419,7 +419,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-diskdos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6780.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6780.json
index 696271d35a3..6ccd9ddeace 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6780.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6780.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6780",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.740",
"lastModified": "2024-11-21T03:30:30.833",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -113,7 +113,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100641",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -121,7 +121,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-fnd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6781.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6781.json
index 54a38ed9ff3..572c5d230db 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6781.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6781.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6781",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.713",
"lastModified": "2024-11-21T03:30:30.970",
"vulnStatus": "Modified",
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100365",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-cps",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6782.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6782.json
index 88bddb3f037..476e13e800c 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6782.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6782.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6782",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.760",
"lastModified": "2024-11-21T03:30:31.100",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100366",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039189",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -112,7 +112,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-cpi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6783.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6783.json
index 300d2c743fa..4a4a1907445 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6783.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6783.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6783",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.793",
"lastModified": "2024-11-21T03:30:31.243",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100387",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039186",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039187",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -130,7 +130,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039188",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -138,7 +138,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-csa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6784.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6784.json
index f26f7d8c899..77b79dab079 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6784.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6784.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6784",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.823",
"lastModified": "2024-11-21T03:30:31.393",
"vulnStatus": "Modified",
@@ -207,7 +207,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100402",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -215,7 +215,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039191",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -223,7 +223,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-crr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6785.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6785.json
index 1c2970fc006..b0be9f7511f 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6785.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6785.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6785",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.853",
"lastModified": "2024-11-21T03:30:31.527",
"vulnStatus": "Modified",
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100375",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039184",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6786.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6786.json
index 49f0b7ade30..00990234df9 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6786.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6786.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6786",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.887",
"lastModified": "2024-11-21T03:30:31.647",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100391",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,7 +104,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-esc4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6788.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6788.json
index b27d037c5e8..f4e59a5ea4f 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6788.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6788.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6788",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.917",
"lastModified": "2024-11-21T03:30:31.787",
"vulnStatus": "Modified",
@@ -101,7 +101,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100364",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -109,7 +109,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039190",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -117,7 +117,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-caw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6789.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6789.json
index 495327eda28..8397841bffa 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6789.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6789.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6789",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.770",
"lastModified": "2024-11-21T03:30:31.913",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100646",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039278",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,14 +122,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf18325",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-cuic",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6790.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6790.json
index ee2c5e056c9..5b6b6b7de8a 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6790.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6790.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6790",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-08-17T20:29:00.947",
"lastModified": "2024-11-21T03:30:32.043",
"vulnStatus": "Modified",
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100369",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039185",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6791.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6791.json
index f3a5ea32892..38cd57f072b 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6791.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6791.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6791",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.800",
"lastModified": "2024-11-21T03:30:32.170",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100662",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039286",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,14 +137,14 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCux21905",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6792.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6792.json
index d8658448733..c967daadfc1 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6792.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6792.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6792",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.847",
"lastModified": "2024-11-21T03:30:32.303",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100666",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039279",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-pcpt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6793.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6793.json
index 36c86a9646f..3b976e5732f 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6793.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6793.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6793",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.880",
"lastModified": "2024-11-21T03:30:32.427",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1039280",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-pcpt1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6794.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6794.json
index 707ce79d829..e400fb86bdb 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6794.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6794.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6794",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.910",
"lastModified": "2024-11-21T03:30:32.560",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -255,7 +255,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100464",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -263,7 +263,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039245",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -271,7 +271,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170823-cms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6795.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6795.json
index 66d84499514..f54fd849c43 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6795.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6795.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6795",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:00.957",
"lastModified": "2024-11-21T03:30:32.697",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -158,7 +158,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100656",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -166,7 +166,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039282",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -174,7 +174,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-asr920-2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6796.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6796.json
index 68a354aa985..0e76b03be12 100644
--- a/CVE-2017/CVE-2017-67xx/CVE-2017-6796.json
+++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6796.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2017-6796",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2017-09-07T21:29:01.007",
"lastModified": "2024-11-21T03:30:32.827",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/100647",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1039281",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-asr920-1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-00xx/CVE-2018-0086.json b/CVE-2018/CVE-2018-00xx/CVE-2018-0086.json
index 6662a719acb..7606a92d70c 100644
--- a/CVE-2018/CVE-2018-00xx/CVE-2018-0086.json
+++ b/CVE-2018/CVE-2018-00xx/CVE-2018-0086.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0086",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:00.317",
"lastModified": "2024-11-21T03:37:29.657",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102745",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040220",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -123,7 +123,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-cvp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-00xx/CVE-2018-0087.json b/CVE-2018/CVE-2018-00xx/CVE-2018-0087.json
index 6966fe0878a..3cee3c30464 100644
--- a/CVE-2018/CVE-2018-00xx/CVE-2018-0087.json
+++ b/CVE-2018/CVE-2018-00xx/CVE-2018-0087.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0087",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.223",
"lastModified": "2024-11-21T03:37:29.773",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103407",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040464",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-wsa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-00xx/CVE-2018-0088.json b/CVE-2018/CVE-2018-00xx/CVE-2018-0088.json
index 3e1e88da044..7821fa87928 100644
--- a/CVE-2018/CVE-2018-00xx/CVE-2018-0088.json
+++ b/CVE-2018/CVE-2018-00xx/CVE-2018-0088.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0088",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:00.377",
"lastModified": "2024-11-21T03:37:29.883",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -123,7 +123,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1040240",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -131,7 +131,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-iess",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-00xx/CVE-2018-0089.json b/CVE-2018/CVE-2018-00xx/CVE-2018-0089.json
index 040aae1e03a..b4b97da811c 100644
--- a/CVE-2018/CVE-2018-00xx/CVE-2018-0089.json
+++ b/CVE-2018/CVE-2018-00xx/CVE-2018-0089.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0089",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:00.440",
"lastModified": "2024-11-21T03:37:29.990",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -120,7 +120,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102758",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -128,7 +128,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-cps",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-00xx/CVE-2018-0090.json b/CVE-2018/CVE-2018-00xx/CVE-2018-0090.json
index 7317b261f40..0063329e391 100644
--- a/CVE-2018/CVE-2018-00xx/CVE-2018-0090.json
+++ b/CVE-2018/CVE-2018-00xx/CVE-2018-0090.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0090",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:00.470",
"lastModified": "2024-11-21T03:37:30.100",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102753",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040247",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-nxos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-00xx/CVE-2018-0091.json b/CVE-2018/CVE-2018-00xx/CVE-2018-0091.json
index b0f62c8bd1b..40a8dd3d4d1 100644
--- a/CVE-2018/CVE-2018-00xx/CVE-2018-0091.json
+++ b/CVE-2018/CVE-2018-00xx/CVE-2018-0091.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0091",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:00.533",
"lastModified": "2024-11-21T03:37:30.213",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102756",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040241",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-00xx/CVE-2018-0092.json b/CVE-2018/CVE-2018-00xx/CVE-2018-0092.json
index b601e023557..a81efe4345b 100644
--- a/CVE-2018/CVE-2018-00xx/CVE-2018-0092.json
+++ b/CVE-2018/CVE-2018-00xx/CVE-2018-0092.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0092",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:00.597",
"lastModified": "2024-11-21T03:37:30.323",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -218,7 +218,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102750",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -226,7 +226,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040248",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -234,7 +234,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-nxos1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-00xx/CVE-2018-0093.json b/CVE-2018/CVE-2018-00xx/CVE-2018-0093.json
index a597b50c77e..a887d4bef12 100644
--- a/CVE-2018/CVE-2018-00xx/CVE-2018-0093.json
+++ b/CVE-2018/CVE-2018-00xx/CVE-2018-0093.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0093",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:00.660",
"lastModified": "2024-11-21T03:37:30.440",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102735",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040250",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-wsa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-00xx/CVE-2018-0094.json b/CVE-2018/CVE-2018-00xx/CVE-2018-0094.json
index 97ad0736762..7bca859498d 100644
--- a/CVE-2018/CVE-2018-00xx/CVE-2018-0094.json
+++ b/CVE-2018/CVE-2018-00xx/CVE-2018-0094.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0094",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:00.707",
"lastModified": "2024-11-21T03:37:30.540",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102787",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040249",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-ucs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-00xx/CVE-2018-0095.json b/CVE-2018/CVE-2018-00xx/CVE-2018-0095.json
index 809cb8633dc..378196d6fc7 100644
--- a/CVE-2018/CVE-2018-00xx/CVE-2018-0095.json
+++ b/CVE-2018/CVE-2018-00xx/CVE-2018-0095.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0095",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:00.753",
"lastModified": "2024-11-21T03:37:30.650",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102729",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040221",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040222",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-00xx/CVE-2018-0096.json b/CVE-2018/CVE-2018-00xx/CVE-2018-0096.json
index f882d21f9eb..73280d3a7ad 100644
--- a/CVE-2018/CVE-2018-00xx/CVE-2018-0096.json
+++ b/CVE-2018/CVE-2018-00xx/CVE-2018-0096.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0096",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:00.817",
"lastModified": "2024-11-21T03:37:30.763",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102727",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040242",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-cpi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-00xx/CVE-2018-0097.json b/CVE-2018/CVE-2018-00xx/CVE-2018-0097.json
index 83ebf23eb24..e789898f2f5 100644
--- a/CVE-2018/CVE-2018-00xx/CVE-2018-0097.json
+++ b/CVE-2018/CVE-2018-00xx/CVE-2018-0097.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0097",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:00.877",
"lastModified": "2024-11-21T03:37:30.880",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102724",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040243",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-prime-infrastructure",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-00xx/CVE-2018-0098.json b/CVE-2018/CVE-2018-00xx/CVE-2018-0098.json
index 703e952a0cd..cfe331d05ea 100644
--- a/CVE-2018/CVE-2018-00xx/CVE-2018-0098.json
+++ b/CVE-2018/CVE-2018-00xx/CVE-2018-0098.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0098",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:00.940",
"lastModified": "2024-11-21T03:37:30.993",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102763",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -153,7 +153,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-wap",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-00xx/CVE-2018-0099.json b/CVE-2018/CVE-2018-00xx/CVE-2018-0099.json
index 21de2609913..5726959a255 100644
--- a/CVE-2018/CVE-2018-00xx/CVE-2018-0099.json
+++ b/CVE-2018/CVE-2018-00xx/CVE-2018-0099.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0099",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:01.003",
"lastModified": "2024-11-21T03:37:31.117",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102731",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-ntr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0100.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0100.json
index ce88fddacf2..5b762b9b6a9 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0100.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0100.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0100",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:01.050",
"lastModified": "2024-11-21T03:37:31.230",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102738",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040246",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-acpe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0101.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0101.json
index 1131b168741..c18ca15080c 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0101.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0101.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0101",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-29T20:29:00.280",
"lastModified": "2024-11-21T03:37:31.353",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -189,7 +189,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102845",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -197,7 +197,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040292",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -205,14 +205,14 @@
},
{
"url": "https://icanthackit.wordpress.com/2018/01/30/thoughts-on-the-handling-cve-2018-0101-cisco-bug-cscvg35618/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://pastebin.com/YrBcG2Ln",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -220,14 +220,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/43986/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0102.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0102.json
index ecdcd65ac47..bb9e814798d 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0102.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0102.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0102",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:01.097",
"lastModified": "2024-11-21T03:37:31.487",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102728",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040219",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-nx-os",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0103.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0103.json
index 908ccc1b556..ece345b1fb0 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0103.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0103.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0103",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-04T06:29:00.340",
"lastModified": "2024-11-21T03:37:31.613",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102369",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180103-wnrp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0104.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0104.json
index 39ea9425840..891c4ce320c 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0104.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0104.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0104",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-04T06:29:00.387",
"lastModified": "2024-11-21T03:37:31.737",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102382",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180103-warfp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0105.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0105.json
index 5295ed9c2d1..70ab8ce6c1c 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0105.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0105.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0105",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:01.143",
"lastModified": "2024-11-21T03:37:31.860",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102725",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040245",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0106.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0106.json
index a40995a76d8..6490aa22e1c 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0106.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0106.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0106",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:01.207",
"lastModified": "2024-11-21T03:37:31.983",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102757",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0107.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0107.json
index 56e147909cb..0f64190411c 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0107.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0107.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0107",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:01.267",
"lastModified": "2024-11-21T03:37:32.113",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102719",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040244",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-psc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0108.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0108.json
index 3706fb510e2..9795834eec3 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0108.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0108.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0108",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:01.330",
"lastModified": "2024-11-21T03:37:32.230",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102720",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040238",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-wms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0109.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0109.json
index 2368d3bbc24..5fac923609a 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0109.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0109.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0109",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:01.393",
"lastModified": "2024-11-21T03:37:32.353",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102722",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040235",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-wms1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0110.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0110.json
index bcb8a85b8f8..be66b1c8df2 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0110.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0110.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0110",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:01.423",
"lastModified": "2024-11-21T03:37:32.470",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102773",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040236",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-wms2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0111.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0111.json
index 71883f05112..9356b6a9ea0 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0111.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0111.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0111",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:01.487",
"lastModified": "2024-11-21T03:37:32.597",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102723",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040237",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-wms3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0112.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0112.json
index 19a0e56ac70..b1a90874b9c 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0112.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0112.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0112",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:00.253",
"lastModified": "2024-11-21T03:37:32.720",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -158,7 +158,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103920",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -166,7 +166,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040709",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -174,7 +174,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wbs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0113.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0113.json
index 46097e25cc2..524288e98cb 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0113.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0113.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0113",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.210",
"lastModified": "2024-11-21T03:37:32.857",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102966",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040337",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ucsc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0114.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0114.json
index 74ad481f2d3..d315ea1ec34 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0114.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0114.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0114",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-04T06:29:00.417",
"lastModified": "2024-11-21T03:37:32.987",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102445",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://github.com/cisco/node-jose/blob/master/CHANGELOG.md",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Third Party Advisory"
@@ -123,7 +123,7 @@
},
{
"url": "https://github.com/zi0Black/POC-CVE-2018-0114",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -131,7 +131,7 @@
},
{
"url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=56326",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -139,7 +139,7 @@
},
{
"url": "https://www.exploit-db.com/exploits/44324/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0115.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0115.json
index 8729504d53f..5dea3fe9175 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0115.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0115.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0115",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-18T06:29:01.533",
"lastModified": "2024-11-21T03:37:33.120",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102788",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040239",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-staros",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0116.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0116.json
index b30102da3b8..b191f78c514 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0116.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0116.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0116",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.257",
"lastModified": "2024-11-21T03:37:33.250",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102968",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-cps",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0117.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0117.json
index 0d9b8339a23..460e734d237 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0117.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0117.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0117",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.320",
"lastModified": "2024-11-21T03:37:33.370",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -175,7 +175,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102970",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -183,7 +183,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-vpcdi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0118.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0118.json
index 3678f8bfa26..364f44dac3c 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0118.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0118.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0118",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-11T09:29:00.213",
"lastModified": "2024-11-21T03:37:33.513",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102478",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040193",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180110-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0119.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0119.json
index 0677f09a9dc..ce29057ec3b 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0119.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0119.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0119",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.367",
"lastModified": "2024-11-21T03:37:33.643",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102961",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-spark",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0120.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0120.json
index eb60da40c57..391126b837b 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0120.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0120.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0120",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.413",
"lastModified": "2024-11-21T03:37:33.757",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102958",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040341",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-cucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0121.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0121.json
index f68e8047a62..f6a8b540e4e 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0121.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0121.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0121",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-22T00:29:00.203",
"lastModified": "2024-11-21T03:37:33.873",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103113",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0122.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0122.json
index 183ae8b370a..6b8773a4c4f 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0122.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0122.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0122",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.477",
"lastModified": "2024-11-21T03:37:33.990",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103028",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040340",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-asr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0123.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0123.json
index ee3410d70e0..426b4043ca3 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0123.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0123.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0123",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.523",
"lastModified": "2024-11-21T03:37:34.120",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102967",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040346",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ios",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0124.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0124.json
index 6eaec905e9d..670b7dbf1fc 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0124.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0124.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0124",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-22T00:29:00.267",
"lastModified": "2024-11-21T03:37:34.243",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103114",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040405",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -123,7 +123,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-ucdm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0125.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0125.json
index 3dd25bfd80f..284c153f5c5 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0125.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0125.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0125",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.570",
"lastModified": "2024-11-21T03:37:34.360",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco VPN Routers Remote Code Execution Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -149,7 +149,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103140",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -158,7 +158,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040336",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -167,7 +167,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-rv13x",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0127.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0127.json
index 78bafdf282b..2bed091f669 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0127.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0127.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0127",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.633",
"lastModified": "2024-11-21T03:37:34.500",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -155,7 +155,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102969",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -163,7 +163,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -171,7 +171,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-rv13x_2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0128.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0128.json
index 81949331cdf..fa731818212 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0128.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0128.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0128",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.680",
"lastModified": "2024-11-21T03:37:34.633",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102960",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-dcaf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0129.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0129.json
index 1806c04d419..2c8cf02542f 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0129.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0129.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0129",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.743",
"lastModified": "2024-11-21T03:37:34.750",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102959",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-dcaf1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0130.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0130.json
index c7140d490cf..76aedaa61ed 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0130.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0130.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0130",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-22T00:29:00.313",
"lastModified": "2024-11-21T03:37:34.870",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103116",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0131.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0131.json
index d0d2f1d1128..15369103a90 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0131.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0131.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0131",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-14T16:29:00.223",
"lastModified": "2024-11-21T03:37:34.990",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105074",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041539",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180813-rsa-nonce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0132.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0132.json
index fd23fab1a2b..cac6aadb113 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0132.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0132.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0132",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.790",
"lastModified": "2024-11-21T03:37:35.120",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102975",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040344",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-iosxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0134.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0134.json
index f01224f3b9c..f1e86d1a7dd 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0134.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0134.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0134",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.837",
"lastModified": "2024-11-21T03:37:35.240",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102954",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-cps1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0135.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0135.json
index 65033a139b6..a4a8b92de80 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0135.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0135.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0135",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.897",
"lastModified": "2024-11-21T03:37:35.357",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102964",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040343",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0136.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0136.json
index c604a9619fb..aa852a525f8 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0136.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0136.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0136",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-01-31T20:29:00.663",
"lastModified": "2024-11-21T03:37:35.470",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -153,7 +153,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102905",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -161,7 +161,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040315",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -169,7 +169,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180131-ipv6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0137.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0137.json
index b4452f5c403..063d329f723 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0137.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0137.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0137",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.947",
"lastModified": "2024-11-21T03:37:35.600",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102955",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-cpn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0138.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0138.json
index 1e277517a8b..231b843b021 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0138.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0138.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0138",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:00.977",
"lastModified": "2024-11-21T03:37:35.717",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102978",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-fss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0139.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0139.json
index 2fa8e5c3bb5..1e58c57f641 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0139.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0139.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0139",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-22T00:29:00.377",
"lastModified": "2024-11-21T03:37:35.830",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103124",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040414",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-cvp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0140.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0140.json
index 6dc93bfa59f..e8f8697c9a1 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0140.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0140.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0140",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-08T07:29:01.053",
"lastModified": "2024-11-21T03:37:35.953",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -245,7 +245,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103090",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -253,7 +253,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040338",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -261,7 +261,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040339",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -269,7 +269,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-esacsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0141.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0141.json
index f65a2c2baa5..c920293769a 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0141.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0141.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0141",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.283",
"lastModified": "2024-11-21T03:37:36.077",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103329",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040462",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-cpcp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0143.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0143.json
index 567ac9f4fca..2b804226ad4 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0143.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0143.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0143",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-21T15:28:19.963",
"lastModified": "2023-11-07T02:50:58.707",
"vulnStatus": "Rejected",
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0144.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0144.json
index e5c5d95e05d..6091bf1cf40 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0144.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0144.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0144",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.330",
"lastModified": "2024-11-21T03:37:36.217",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103327",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040469",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-pdcnm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0145.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0145.json
index 102f34dc00b..39add6744d5 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0145.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0145.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0145",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-22T00:29:00.423",
"lastModified": "2024-11-21T03:37:36.333",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103131",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-dcaf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0146.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0146.json
index 2659471276a..ba99408b8bb 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0146.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0146.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0146",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-22T00:29:00.470",
"lastModified": "2024-11-21T03:37:36.450",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103122",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-dcaf1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0147.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0147.json
index 0a0eb08f0b8..8f80ad65723 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0147.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0147.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0147",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.377",
"lastModified": "2024-11-21T03:37:36.570",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco Secure Access Control System Java Deserialization Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -110,7 +110,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103328",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -118,7 +118,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040463",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0148.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0148.json
index ec4888fec5b..4896e94db88 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0148.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0148.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0148",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-22T00:29:00.533",
"lastModified": "2024-11-21T03:37:36.690",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103141",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040412",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-ucsd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0149.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0149.json
index eb36632f8f8..4688351fd0e 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0149.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0149.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0149",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.307",
"lastModified": "2024-11-21T03:37:36.807",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104444",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041072",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ucsdimcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0150.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0150.json
index a7738ab34b4..bcc2e2b4e93 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0150.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0150.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0150",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.217",
"lastModified": "2024-11-21T03:37:36.930",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -123,7 +123,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103539",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -131,7 +131,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040579",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Third Party Advisory",
@@ -140,7 +140,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0151.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0151.json
index 32e68be22f0..cca8983231a 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0151.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0151.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0151",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.297",
"lastModified": "2024-11-21T03:37:37.053",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS Software and Cisco IOS XE Software Quality of Service Remote Code Execution Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -125,7 +125,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103540",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -133,7 +133,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040582",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -141,7 +141,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -149,7 +149,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-qos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0152.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0152.json
index 8c145ee94ec..a1ce8c8c22f 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0152.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0152.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0152",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.343",
"lastModified": "2024-11-21T03:37:37.193",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103558",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040597",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xepriv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0153.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0153.json
index f0ef7109e07..f73e29a94e3 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0153.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0153.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0153",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-21T15:28:19.980",
"lastModified": "2023-11-07T02:50:58.977",
"vulnStatus": "Rejected",
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0154.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0154.json
index 4d6b2374fca..7fe3481dcc8 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0154.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0154.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0154",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.373",
"lastModified": "2024-11-21T03:37:37.330",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS Software Integrated Services Module for VPN Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1292,7 +1292,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103559",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -1301,7 +1301,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040585",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -1310,7 +1310,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0155.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0155.json
index 9df71b53bce..c16e87d0f0d 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0155.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0155.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0155",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.420",
"lastModified": "2024-11-21T03:37:37.483",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco Catalyst Bidirectional Forwarding Detection Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -204,7 +204,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103565",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -212,7 +212,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040587",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -220,7 +220,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -228,7 +228,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-bfd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0156.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0156.json
index f0a46c2c1f3..e2eacf73662 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0156.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0156.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0156",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.467",
"lastModified": "2024-11-21T03:37:37.627",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS Software and Cisco IOS XE Software Smart Install Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1619,7 +1619,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103569",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1627,7 +1627,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040596",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1635,7 +1635,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -1643,7 +1643,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -1651,7 +1651,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0157.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0157.json
index 4ccfb4258b1..afafacbb958 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0157.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0157.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0157",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.500",
"lastModified": "2024-11-21T03:37:37.793",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103561",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040593",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -147,7 +147,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-fwip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0158.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0158.json
index 2c5f971ad0c..2651e9c4031 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0158.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0158.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0158",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.547",
"lastModified": "2024-11-21T03:37:37.910",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS and XE Software Internet Key Exchange Memory Leak Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -441,7 +441,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103566",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -450,7 +450,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040595",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -459,7 +459,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource",
@@ -468,7 +468,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource",
@@ -477,7 +477,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0159.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0159.json
index 2a2bddd1504..a8745c454e7 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0159.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0159.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0159",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.593",
"lastModified": "2024-11-21T03:37:38.063",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS and XE Software Internet Key Exchange Version 1 Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -259,7 +259,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103562",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -268,7 +268,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040595",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -277,7 +277,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0160.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0160.json
index ca59d6b49cf..4054970bbe4 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0160.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0160.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0160",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.657",
"lastModified": "2024-11-21T03:37:38.200",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -208,7 +208,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103575",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -216,7 +216,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040584",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -224,7 +224,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0161.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0161.json
index a19c0195850..11a4d799c0b 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0161.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0161.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0161",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.703",
"lastModified": "2024-11-21T03:37:38.320",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS Software Resource Management Errors Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -187,7 +187,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103573",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -196,7 +196,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040589",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -205,7 +205,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0163.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0163.json
index ccb0a32d886..d92b7f39dc1 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0163.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0163.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0163",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.750",
"lastModified": "2024-11-21T03:37:38.443",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -748,7 +748,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103571",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -756,7 +756,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dot1x",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0164.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0164.json
index 8dbaa712da6..fe71e37f3c9 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0164.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0164.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0164",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.797",
"lastModified": "2024-11-21T03:37:38.590",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103553",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-sisf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0165.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0165.json
index 692d6e5350b..8a0c06026f4 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0165.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0165.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0165",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.860",
"lastModified": "2024-11-21T03:37:38.727",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -365,7 +365,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103568",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -373,7 +373,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040592",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -381,7 +381,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-igmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0167.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0167.json
index 483ef5e478a..4608e46d469 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0167.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0167.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0167",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.907",
"lastModified": "2024-11-21T03:37:38.867",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS, XR, and XE Software Buffer Overflow Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -291,7 +291,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103564",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -300,7 +300,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040586",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -309,7 +309,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -317,7 +317,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -325,7 +325,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -333,7 +333,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-lldp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0169.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0169.json
index 29a042da570..d36c1d79d54 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0169.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0169.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0169",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:00.967",
"lastModified": "2024-11-21T03:37:39.020",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103567",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040583",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0170.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0170.json
index 77550035950..2435435b183 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0170.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0170.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0170",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.017",
"lastModified": "2024-11-21T03:37:39.147",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103560",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040590",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-opendns-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0171.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0171.json
index 1d98d5c4769..850673fb78c 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0171.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0171.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0171",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.063",
"lastModified": "2024-11-21T03:37:39.277",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -110,7 +110,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103538",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -118,7 +118,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040580",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -134,7 +134,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -142,14 +142,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Press/Media Coverage"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0172.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0172.json
index 690a7c35552..c8a5dcba0af 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0172.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0172.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0172",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.110",
"lastModified": "2024-11-21T03:37:39.413",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS and IOS XE Software Improper Input Validation Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -172,7 +172,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103552",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -180,7 +180,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040591",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -188,7 +188,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -196,7 +196,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -204,14 +204,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2018-06",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0173.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0173.json
index 45887015c4e..6eede2f7077 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0173.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0173.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0173",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.170",
"lastModified": "2024-11-21T03:37:39.563",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS and IOS XE Software Improper Input Validation Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -270,7 +270,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103545",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -279,7 +279,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040591",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -288,7 +288,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -296,7 +296,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -304,14 +304,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2018-06",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0174.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0174.json
index fe8fbdbd1f1..42d8650e518 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0174.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0174.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0174",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.233",
"lastModified": "2024-11-21T03:37:39.727",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS Software and Cisco IOS XE Software Improper Input Validation Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -225,7 +225,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103554",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -234,7 +234,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040591",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -243,7 +243,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -251,7 +251,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -259,14 +259,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2018-06",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0175.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0175.json
index 1cf084765bc..bcb934b628e 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0175.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0175.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0175",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.280",
"lastModified": "2024-11-21T03:37:39.897",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS, XR, and XE Software Buffer Overflow Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -262,7 +262,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103564",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -271,7 +271,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040586",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -280,7 +280,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -288,7 +288,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -296,7 +296,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -304,7 +304,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-lldp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0176.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0176.json
index 4fa5d93dfd0..4802d72c829 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0176.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0176.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0176",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.343",
"lastModified": "2024-11-21T03:37:40.057",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103567",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040583",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0177.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0177.json
index 37928bdd932..032fe538861 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0177.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0177.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0177",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.407",
"lastModified": "2024-11-21T03:37:40.253",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -698,7 +698,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103563",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -706,7 +706,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040588",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -714,7 +714,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0178.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0178.json
index cd684b13f05..47f47e785fe 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0178.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0178.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0178",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-05T18:15:10.207",
"lastModified": "2023-11-07T02:50:59.347",
"vulnStatus": "Rejected",
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0179.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0179.json
index 553cba8edda..dedc966f43b 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0179.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0179.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0179",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.467",
"lastModified": "2024-11-21T03:37:40.420",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS Software Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1669,7 +1669,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103556",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -1678,7 +1678,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json
index 37b938ecb4c..c6adaf8fae9 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0180",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.547",
"lastModified": "2024-11-21T03:37:40.587",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco IOS Software Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1669,7 +1669,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103556",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -1678,7 +1678,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0181.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0181.json
index 655126a0320..929837caad1 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0181.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0181.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0181",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-10T00:29:00.250",
"lastModified": "2024-11-21T03:37:40.750",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106547",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-cps-redis",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0182.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0182.json
index c033cdfc384..8c565c79e63 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0182.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0182.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0182",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.640",
"lastModified": "2024-11-21T03:37:40.887",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103547",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0183.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0183.json
index fac7e329fe2..43f7cd74c4a 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0183.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0183.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0183",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.703",
"lastModified": "2024-11-21T03:37:41.013",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -267,7 +267,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103555",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -275,7 +275,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0184.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0184.json
index 6211bdf754a..35e651946eb 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0184.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0184.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0184",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.767",
"lastModified": "2024-11-21T03:37:41.147",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -163,7 +163,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103550",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -171,7 +171,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0185.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0185.json
index f85c501668e..189453d532c 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0185.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0185.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0185",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.813",
"lastModified": "2024-11-21T03:37:41.270",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103547",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0186.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0186.json
index 6b2b7b8e075..f0b9e01ae24 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0186.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0186.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0186",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.873",
"lastModified": "2024-11-21T03:37:41.397",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103551",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0187.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0187.json
index dd8875006ec..6d785e229e6 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0187.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0187.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0187",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-23T22:29:00.290",
"lastModified": "2024-11-21T03:37:41.510",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,14 +131,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106717",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-ise-info-disclosure",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0188.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0188.json
index d00dc030de5..e61b104e94b 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0188.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0188.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0188",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:01.953",
"lastModified": "2024-11-21T03:37:41.640",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103551",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0189.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0189.json
index 9ae61fca117..027928c8831 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0189.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0189.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0189",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:02.000",
"lastModified": "2024-11-21T03:37:41.763",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103548",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -259,7 +259,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-FIB-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0190.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0190.json
index 788f824b86a..f97004a62c1 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0190.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0190.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0190",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:02.047",
"lastModified": "2024-11-21T03:37:41.890",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103551",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0191.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0191.json
index 2a5efca6f60..9c72f4ee443 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0191.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0191.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0191",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-21T15:28:19.980",
"lastModified": "2023-11-07T02:50:59.650",
"vulnStatus": "Rejected",
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0193.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0193.json
index 803c1ab181d..1deca4ce64e 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0193.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0193.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0193",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:02.110",
"lastModified": "2024-11-21T03:37:42.023",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103547",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0194.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0194.json
index 3a1a2dac16a..ff62d8cff2e 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0194.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0194.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0194",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-02T14:29:00.207",
"lastModified": "2024-11-21T03:37:42.147",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103547",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0195.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0195.json
index e647e1e4653..30f96aa9cdb 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0195.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0195.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0195",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:02.157",
"lastModified": "2024-11-21T03:37:42.277",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103557",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-rest",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0196.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0196.json
index 7d972a97257..9b3c1ff1a01 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0196.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0196.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0196",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-28T22:29:02.217",
"lastModified": "2024-11-21T03:37:42.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103570",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-wfw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0197.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0197.json
index 9d80ae70191..369788e1640 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0197.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0197.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0197",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:00.387",
"lastModified": "2024-11-21T03:37:42.523",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -6076,7 +6076,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105424",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -6084,7 +6084,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-vtp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0198.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0198.json
index a7511e8f6e0..040acc1240e 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0198.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0198.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0198",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-27T09:29:00.343",
"lastModified": "2024-11-21T03:37:42.773",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/102965",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040342",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ucm1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0199.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0199.json
index 3261ec2d8c3..9fbaff939b2 100644
--- a/CVE-2018/CVE-2018-01xx/CVE-2018-0199.json
+++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0199.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0199",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-22T00:29:00.597",
"lastModified": "2024-11-21T03:37:42.903",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103143",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040407",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-jcf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0200.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0200.json
index acef4846c64..a8f6f5a9691 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0200.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0200.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0200",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-22T00:29:00.640",
"lastModified": "2024-11-21T03:37:43.030",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103128",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040408",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-psc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0201.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0201.json
index 5b3737ba385..000c23153d9 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0201.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0201.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0201",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-22T00:29:00.687",
"lastModified": "2024-11-21T03:37:43.163",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103133",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040406",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-jcf1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0202.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0202.json
index 1c35d80884d..57bf5d62b28 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0202.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0202.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0202",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-27T09:29:00.387",
"lastModified": "2024-11-21T03:37:43.290",
"vulnStatus": "Modified",
@@ -142,7 +142,7 @@
"references": [
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=11973",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Patch",
@@ -151,7 +151,7 @@
},
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=11980",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
@@ -159,7 +159,7 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00011.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -167,21 +167,21 @@
},
{
"url": "https://security.gentoo.org/glsa/201804-16",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3592-1/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3592-2/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0203.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0203.json
index 70030c49894..aebf58fc35f 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0203.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0203.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0203",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-22T00:29:00.737",
"lastModified": "2024-11-21T03:37:43.427",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103142",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040413",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-cuc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0204.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0204.json
index 9a454eb6494..83066916b05 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0204.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0204.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0204",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-22T00:29:00.797",
"lastModified": "2024-11-21T03:37:43.560",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103150",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040410",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-pcpt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0205.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0205.json
index b5e0e1a7877..d0861685c46 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0205.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0205.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0205",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-22T00:29:00.877",
"lastModified": "2024-11-21T03:37:43.697",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103145",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040409",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-pcpt1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0206.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0206.json
index 634190e4fab..5c67c41b73e 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0206.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0206.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0206",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-02-22T00:29:00.937",
"lastModified": "2024-11-21T03:37:43.860",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103146",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040411",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0207.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0207.json
index 16d948df9c4..0d969b5ba28 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0207.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0207.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0207",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.427",
"lastModified": "2024-11-21T03:37:43.990",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103343",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040470",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0208.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0208.json
index e8146fe6604..cf6c14308a5 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0208.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0208.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0208",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.487",
"lastModified": "2024-11-21T03:37:44.113",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103337",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-res",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0209.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0209.json
index 5ca719819c5..167d7dda7b7 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0209.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0209.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0209",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.533",
"lastModified": "2024-11-21T03:37:44.227",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -213,7 +213,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103406",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -221,7 +221,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-550x",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0210.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0210.json
index cee56825c17..a5448cb7fdf 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0210.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0210.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0210",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.597",
"lastModified": "2024-11-21T03:37:44.350",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103335",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040465",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-dcnm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0211.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0211.json
index 1f68585aff7..d72d7ad30b0 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0211.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0211.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0211",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.643",
"lastModified": "2024-11-21T03:37:44.483",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103334",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040471",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0212.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0212.json
index c9ce81acc5d..78df9d99b16 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0212.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0212.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0212",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.677",
"lastModified": "2024-11-21T03:37:44.637",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103333",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040471",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0213.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0213.json
index a8897853983..091d44453bf 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0213.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0213.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0213",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.753",
"lastModified": "2024-11-21T03:37:44.770",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103332",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040471",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0214.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0214.json
index aee60703e37..c845ae95043 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0214.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0214.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0214",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.800",
"lastModified": "2024-11-21T03:37:44.910",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103331",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040471",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0215.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0215.json
index c99d83acc92..be2c080a065 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0215.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0215.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0215",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.847",
"lastModified": "2024-11-21T03:37:45.030",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103324",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040471",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0216.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0216.json
index c9356d314d8..89f73fee1b5 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0216.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0216.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0216",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.910",
"lastModified": "2024-11-21T03:37:45.153",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103336",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040471",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0217.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0217.json
index e33b4cd63bd..c36f399b787 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0217.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0217.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0217",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:00.957",
"lastModified": "2024-11-21T03:37:45.277",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -187,7 +187,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103346",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -195,7 +195,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040466",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -203,7 +203,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-staros",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0218.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0218.json
index 55f5ed0baed..9162ce4ba6c 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0218.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0218.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0218",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:01.003",
"lastModified": "2024-11-21T03:37:45.400",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040470",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0219.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0219.json
index b7eda97a50a..d0e0a48105d 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0219.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0219.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0219",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:01.050",
"lastModified": "2024-11-21T03:37:45.520",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103326",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040467",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ucs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0220.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0220.json
index 3c4f7b8dde7..2caa9d04f46 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0220.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0220.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0220",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:01.097",
"lastModified": "2024-11-21T03:37:45.640",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103342",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-val",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0221.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0221.json
index c93d4e4c336..2dfbb2a0f42 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0221.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0221.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0221",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:01.160",
"lastModified": "2024-11-21T03:37:45.760",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103347",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040471",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -147,7 +147,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0222.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0222.json
index 4cff7b9e1a0..939d2259208 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0222.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0222.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0222",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.217",
"lastModified": "2024-11-21T03:37:45.883",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104193",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dnac",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0223.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0223.json
index 49d6d920942..ce266cab3ec 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0223.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0223.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0223",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:01.207",
"lastModified": "2024-11-21T03:37:46.007",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103341",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040468",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-sm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0224.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0224.json
index 275546d7b33..f6143524d44 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0224.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0224.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0224",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-03-08T07:29:01.283",
"lastModified": "2024-11-21T03:37:46.123",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103344",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -141,7 +141,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040466",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-staros1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0225.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0225.json
index f52fe2889a9..766c1747587 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0225.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0225.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0225",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-08T20:29:00.220",
"lastModified": "2024-11-21T03:37:46.243",
"vulnStatus": "Modified",
@@ -112,7 +112,7 @@
"references": [
{
"url": "https://docs.appdynamics.com/display/PRO44/Release+Notes#ReleaseNotes-4.4.3.10598%28HF4%29Updates",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://docs.appdynamics.com/display/PRO44/Release+Notes#ReleaseNotes-4.4.3.10598%28HF4%29Updates",
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0226.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0226.json
index f5401faf528..1daca91f2cb 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0226.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0226.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0226",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:00.247",
"lastModified": "2024-11-21T03:37:46.360",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104124",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040817",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-aironet-ssh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0227.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0227.json
index 5a8e4efa287..92703690dc6 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0227.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0227.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0227",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:00.300",
"lastModified": "2024-11-21T03:37:46.490",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -173,7 +173,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104018",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -181,7 +181,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040723",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -189,7 +189,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -197,7 +197,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0228.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0228.json
index 3bee7b3db75..751498ec7d2 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0228.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0228.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0228",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:00.363",
"lastModified": "2024-11-21T03:37:46.627",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -186,7 +186,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104220",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -194,7 +194,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040724",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -202,7 +202,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -210,7 +210,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0229.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0229.json
index 29ee00261df..04d691325e5 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0229.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0229.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0229",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:00.410",
"lastModified": "2024-11-21T03:37:46.770",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103939",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040711",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040712",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -145,7 +145,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asaanyconnect",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0230.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0230.json
index f2d864fe4a1..8275e731f51 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0230.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0230.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0230",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:00.473",
"lastModified": "2024-11-21T03:37:46.897",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103931",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fp2100",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0231.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0231.json
index 2fef25dcaaf..e7d982a3b23 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0231.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0231.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0231",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:00.533",
"lastModified": "2024-11-21T03:37:47.010",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1040725",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -143,7 +143,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -151,7 +151,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0233.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0233.json
index 4d5a94db5c2..aec5267ceb8 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0233.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0233.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0233",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:00.580",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103930",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fpsnort",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0234.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0234.json
index c6c6eb8997f..e655855e425 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0234.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0234.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0234",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:00.323",
"lastModified": "2024-11-21T03:37:47.230",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104081",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040820",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,14 +132,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-ap-ptp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-airo-pptp-dos",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/104081",
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0235.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0235.json
index 8d709c0cf2c..256f20cbfb4 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0235.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0235.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0235",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:00.387",
"lastModified": "2024-11-21T03:37:47.350",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104080",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-wlc-mfdos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0236.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0236.json
index 0a5b0f1818f..fa008929655 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0236.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0236.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0236",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-21T15:28:19.997",
"lastModified": "2023-11-07T02:51:00.233",
"vulnStatus": "Rejected",
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0237.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0237.json
index 45d41d2e0a7..54f33116c94 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0237.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0237.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0237",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:00.643",
"lastModified": "2024-11-21T03:37:47.473",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,14 +106,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-amp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://wwws.nightwatchcybersecurity.com/2018/02/25/research-compressed-files-auto-detection-on-macos/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0238.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0238.json
index a46bacb56d5..807a36abbee 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0238.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0238.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0238",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:00.707",
"lastModified": "2024-11-21T03:37:47.577",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103919",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040708",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-uscd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0239.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0239.json
index 9aa86fabc25..5cf41f1b1a3 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0239.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0239.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0239",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:00.770",
"lastModified": "2024-11-21T03:37:47.690",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103923",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -146,7 +146,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040720",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -154,7 +154,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-staros",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0240.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0240.json
index ec1c4cd3387..620d98c2387 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0240.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0240.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0240",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:00.817",
"lastModified": "2024-11-21T03:37:47.810",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -382,7 +382,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103934",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -390,7 +390,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040722",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -399,7 +399,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -407,7 +407,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa_inspect",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0241.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0241.json
index e027c499fe8..8a06f7dc158 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0241.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0241.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0241",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:00.877",
"lastModified": "2024-11-21T03:37:47.947",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -213,7 +213,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103929",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -221,7 +221,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040710",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -229,7 +229,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-iosxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0242.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0242.json
index f15352e1898..8b3ba49bffe 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0242.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0242.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0242",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:00.927",
"lastModified": "2024-11-21T03:37:48.067",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -178,7 +178,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103932",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -186,7 +186,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040713",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -194,7 +194,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asawvpn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0243.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0243.json
index 6127ffc84da..4d944db7b3f 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0243.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0243.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0243",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:00.973",
"lastModified": "2024-11-21T03:37:48.183",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103943",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0244.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0244.json
index 60171abcc49..ce563c2e060 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0244.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0244.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0244",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.020",
"lastModified": "2024-11-21T03:37:48.303",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103945",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0245.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0245.json
index 0aa8298e813..57f3d062bc0 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0245.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0245.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0245",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:00.450",
"lastModified": "2024-11-21T03:37:48.420",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104123",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040823",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-wlc-id",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0246.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0246.json
index ac74af4943a..5d8e963c97b 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0246.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0246.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0246",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-21T15:28:20.010",
"lastModified": "2023-11-07T02:51:00.523",
"vulnStatus": "Rejected",
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0247.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0247.json
index f82b58fd712..cb6e0902d9b 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0247.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0247.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0247",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:00.513",
"lastModified": "2024-11-21T03:37:48.563",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104087",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040814",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040815",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -150,7 +150,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-aironet-auth",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0248.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0248.json
index edd123d88d2..2886d97e048 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0248.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0248.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0248",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-17T22:29:00.217",
"lastModified": "2024-11-21T03:37:48.687",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108009",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlc-gui",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0249.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0249.json
index 68f8cf965fe..2bfe8b21acd 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0249.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0249.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0249",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:00.573",
"lastModified": "2024-11-21T03:37:48.820",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1040816",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-aironet-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0250.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0250.json
index b73d80c05ab..ea0430f6f1d 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0250.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0250.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0250",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:00.637",
"lastModified": "2024-11-21T03:37:48.950",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1040818",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-ap-acl",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0251.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0251.json
index 7ecae6e15c4..974a36ce4e2 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0251.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0251.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0251",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.080",
"lastModified": "2024-11-21T03:37:49.093",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103926",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040714",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asawvpn2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0252.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0252.json
index 68c430c09ea..53f08adca27 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0252.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0252.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0252",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:00.683",
"lastModified": "2024-11-21T03:37:49.220",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1040822",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-wlc-ip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0253.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0253.json
index 4b013f0b82f..ae09d9a62ce 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0253.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0253.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0253",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:00.747",
"lastModified": "2024-11-21T03:37:49.340",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -142,7 +142,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104075",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -150,7 +150,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040808",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -158,7 +158,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-acs1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0254.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0254.json
index 133e406c56d..85249f2771e 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0254.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0254.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0254",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.127",
"lastModified": "2024-11-21T03:37:49.460",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -278,7 +278,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103940",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -286,7 +286,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0255.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0255.json
index 17f85f929e8..274fc7ce22d 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0255.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0255.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0255",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.177",
"lastModified": "2024-11-21T03:37:49.590",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1040715",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-iess",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0256.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0256.json
index 0f2fc28660d..acd369a11c2 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0256.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0256.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0256",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.253",
"lastModified": "2024-11-21T03:37:49.710",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103951",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-pdng",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0257.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0257.json
index 46b5d0ac11b..16074b427d5 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0257.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0257.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0257",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.317",
"lastModified": "2024-11-21T03:37:49.840",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -137,7 +137,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103948",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -145,7 +145,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040716",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -153,7 +153,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-cbr8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0258.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0258.json
index 856280beeeb..189bcdc7191 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0258.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0258.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0258",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:00.793",
"lastModified": "2024-11-21T03:37:49.960",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -130,7 +130,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104074",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -138,14 +138,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-prime-upload",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2018-11",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0259.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0259.json
index 8f6a7d84abd..f2dccf40e0a 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0259.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0259.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0259",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.377",
"lastModified": "2024-11-21T03:37:50.083",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103928",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-MATE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0260.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0260.json
index 57eabb68aaf..0c7ba715f5a 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0260.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0260.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0260",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.427",
"lastModified": "2024-11-21T03:37:50.203",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103946",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-MATE1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0262.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0262.json
index b26e8eca863..30a94bbf83c 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0262.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0262.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0262",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:00.857",
"lastModified": "2024-11-21T03:37:50.317",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104079",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040819",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -147,7 +147,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-cms-cx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0263.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0263.json
index 51f4c3ed317..368dccbc212 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0263.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0263.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0263",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T12:29:00.307",
"lastModified": "2024-11-21T03:37:50.433",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -123,7 +123,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104419",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -131,7 +131,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041065",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-cms-id",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0264.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0264.json
index 147b1b76a2e..cf94fe260c3 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0264.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0264.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0264",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:00.903",
"lastModified": "2024-11-21T03:37:50.560",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104073",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -143,7 +143,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-war",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0265.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0265.json
index 1406543a55b..0823c9d9916 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0265.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0265.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0265",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-21T15:28:20.027",
"lastModified": "2023-11-07T02:51:00.943",
"vulnStatus": "Rejected",
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0266.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0266.json
index 00ce6a5b768..9a122b81960 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0266.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0266.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0266",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.487",
"lastModified": "2024-11-21T03:37:50.693",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103933",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040718",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ucm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0267.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0267.json
index c629f54a8e6..a3c971e0b41 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0267.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0267.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0267",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.533",
"lastModified": "2024-11-21T03:37:50.813",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103937",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040719",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ucm1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0268.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0268.json
index 17af4bdbd06..05218a456dd 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0268.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0268.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0268",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.263",
"lastModified": "2024-11-21T03:37:50.930",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104192",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dna",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0269.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0269.json
index 81d564d0443..06c5ae9f66c 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0269.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0269.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0269",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.580",
"lastModified": "2024-11-21T03:37:51.050",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103950",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-dna1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0270.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0270.json
index 38f953e3d6d..9cc57168dc9 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0270.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0270.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0270",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.310",
"lastModified": "2024-11-21T03:37:51.163",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104242",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-fnd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0271.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0271.json
index 1df79a8f2fb..796af85d5d0 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0271.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0271.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0271",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.357",
"lastModified": "2024-11-21T03:37:51.283",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104191",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dna2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0272.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0272.json
index 9f0e974d6c7..85425e13a0f 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0272.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0272.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0272",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.643",
"lastModified": "2024-11-21T03:37:51.427",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103925",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-firepower",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0273.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0273.json
index 6b7faaf6d73..80e955b418c 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0273.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0273.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0273",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.707",
"lastModified": "2024-11-21T03:37:52.257",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103935",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -156,7 +156,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040721",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -164,7 +164,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-starosasr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0274.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0274.json
index 001c7957ae1..5edf6944874 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0274.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0274.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0274",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T12:29:00.340",
"lastModified": "2024-11-21T03:37:52.380",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104449",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-nso",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0275.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0275.json
index 83479e0d38c..2234c2c8233 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0275.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0275.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0275",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.783",
"lastModified": "2024-11-21T03:37:52.507",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1040717",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ise",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0276.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0276.json
index 43e1411a98f..d0917766ea5 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0276.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0276.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0276",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-04-19T20:29:01.830",
"lastModified": "2024-11-21T03:37:52.623",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103921",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-webcon",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0277.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0277.json
index ee554df1e0e..a1ad70e18c0 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0277.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0277.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0277",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.433",
"lastModified": "2024-11-21T03:37:52.747",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104212",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040922",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-iseeap",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0278.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0278.json
index ac70cc813a7..a39761f8c27 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0278.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0278.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0278",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:00.967",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104122",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0279.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0279.json
index 28e96051f37..8e165a7d284 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0279.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0279.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0279",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.467",
"lastModified": "2024-11-21T03:37:52.987",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104243",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -120,7 +120,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-nfvis",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0280.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0280.json
index 88006d7d62f..6beaf35897a 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0280.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0280.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0280",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.527",
"lastModified": "2024-11-21T03:37:53.103",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104209",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040923",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -147,7 +147,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-msms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0281.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0281.json
index 2a579a3dbc5..b28950c07f0 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0281.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0281.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0281",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:01.027",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104096",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-txdos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0282.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0282.json
index 1b7f71d2eb0..46af4b49d7c 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0282.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0282.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0282",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-10T00:29:00.297",
"lastModified": "2024-11-21T03:37:53.353",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -875,7 +875,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106510",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -883,7 +883,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-tcp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0283.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0283.json
index 7ea8b03050f..07d88fa4262 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0283.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0283.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0283",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:01.120",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104121",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-fpwr-codp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0284.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0284.json
index 1d1eb3b1b2b..311bc85897a 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0284.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0284.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0284",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T16:29:00.227",
"lastModified": "2024-11-21T03:37:53.637",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -279,7 +279,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105878",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -287,7 +287,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-meraki",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0285.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0285.json
index 34926ad5fd5..8bc70b729a5 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0285.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0285.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0285",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:01.200",
"lastModified": "2024-11-21T03:37:53.773",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104082",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040826",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-psc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0286.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0286.json
index 4e79c5858cb..31b76d047cb 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0286.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0286.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0286",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:01.263",
"lastModified": "2024-11-21T03:37:53.890",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104083",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040827",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-iosxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0287.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0287.json
index 59252b57627..aa9daccf14e 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0287.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0287.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0287",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:01.323",
"lastModified": "2024-11-21T03:37:54.010",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104128",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040824",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0288.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0288.json
index 180e0924ff6..84d5326bb8c 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0288.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0288.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0288",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-02T22:29:01.387",
"lastModified": "2024-11-21T03:37:54.153",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104091",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040825",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-webex-id",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0289.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0289.json
index 4ad9be72650..4f0a435ea70 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0289.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0289.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0289",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.573",
"lastModified": "2024-11-21T03:37:54.280",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104196",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040925",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-ise-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0290.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0290.json
index fddc394d48c..1780809ced7 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0290.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0290.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0290",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.620",
"lastModified": "2024-11-21T03:37:54.400",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104201",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-socmin-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0291.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0291.json
index 0d40ae843b6..8c35eb6d7fa 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0291.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0291.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0291",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-20T21:29:00.217",
"lastModified": "2024-11-21T03:37:54.503",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -625,7 +625,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -633,7 +633,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxossnmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0292.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0292.json
index f07cd1a443a..fa5ec92280b 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0292.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0292.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0292",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-20T21:29:00.297",
"lastModified": "2024-11-21T03:37:54.670",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -596,7 +596,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -604,7 +604,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxosigmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0293.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0293.json
index b20255502a7..11bcbbaff1a 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0293.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0293.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0293",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-20T21:29:00.343",
"lastModified": "2024-11-21T03:37:54.813",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -558,7 +558,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -566,7 +566,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -574,7 +574,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxosrbac",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0294.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0294.json
index bea3e087ab5..40c2698474a 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0294.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0294.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0294",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-20T21:29:00.390",
"lastModified": "2024-11-21T03:37:54.957",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -659,7 +659,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -667,7 +667,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxosadmin",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0295.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0295.json
index f62ac21c101..9370337aa65 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0295.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0295.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0295",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-20T21:29:00.437",
"lastModified": "2024-11-21T03:37:55.090",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -570,7 +570,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -578,7 +578,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxosbgp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0296.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0296.json
index e75cc178951..6fdcd2c4a18 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0296.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0296.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0296",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T12:29:00.403",
"lastModified": "2024-11-21T03:37:55.227",
"vulnStatus": "Undergoing Analysis",
@@ -70,7 +70,7 @@
"cisaVulnerabilityName": "Cisco Adaptive Security Appliance (ASA) Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -203,7 +203,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/154017/Cisco-Adaptive-Security-Appliance-Path-Traversal.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -212,7 +212,7 @@
},
{
"url": "http://www.securityfocus.com/bid/104612",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -220,7 +220,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041076",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -228,7 +228,7 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -236,14 +236,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-asaftd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/44956/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0297.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0297.json
index a57be9b7454..92bf253a7c8 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0297.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0297.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0297",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.667",
"lastModified": "2024-11-21T03:37:55.373",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104197",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-firepwr-pb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0298.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0298.json
index ddbcc3b47b1..5eea0f92ecd 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0298.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0298.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0298",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.240",
"lastModified": "2024-11-21T03:37:55.500",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -232,7 +232,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fxos-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0299.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0299.json
index cd2cdfef5e1..942eb87aa7f 100644
--- a/CVE-2018/CVE-2018-02xx/CVE-2018-0299.json
+++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0299.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0299",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.287",
"lastModified": "2024-11-21T03:37:55.623",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-n4k-snmp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0300.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0300.json
index c32fc0e53fa..d3b5e91c92f 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0300.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0300.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0300",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.337",
"lastModified": "2024-11-21T03:37:55.740",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -160,7 +160,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -168,7 +168,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-firepwr-pt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0301.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0301.json
index 247d36457fa..e57676ecf29 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0301.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0301.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0301",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-20T21:29:00.483",
"lastModified": "2024-11-21T03:37:55.867",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -661,7 +661,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104512",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -669,7 +669,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -677,7 +677,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxos-bo",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0302.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0302.json
index 93fb3aadd95..06fec5c5254 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0302.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0302.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0302",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.367",
"lastModified": "2024-11-21T03:37:56.007",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -230,7 +230,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fxos-ace",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0303.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0303.json
index 7ce1a0df55b..2ccefa03442 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0303.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0303.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0303",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.413",
"lastModified": "2024-11-21T03:37:56.127",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -794,7 +794,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -802,7 +802,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fxnxos-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0304.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0304.json
index 25c7d2f8f21..27617afbc89 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0304.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0304.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0304",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-20T21:29:00.530",
"lastModified": "2024-11-21T03:37:56.273",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -261,7 +261,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104513",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -269,7 +269,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -277,7 +277,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fxnxos-ace",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0305.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0305.json
index e7fd92ad3ff..3322fc8fd5d 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0305.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0305.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0305",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.477",
"lastModified": "2024-11-21T03:37:56.417",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -259,7 +259,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fx-os-fabric-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0306.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0306.json
index aff4c028231..3e4c92dae74 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0306.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0306.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0306",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.523",
"lastModified": "2024-11-21T03:37:56.550",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -722,7 +722,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -730,7 +730,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nx-os-cli-execution",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0307.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0307.json
index a5bb73e7f2a..0a47c2231d1 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0307.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0307.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0307",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-20T21:29:00.577",
"lastModified": "2024-11-21T03:37:56.687",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -570,7 +570,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -578,7 +578,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nx-os-cli-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0308.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0308.json
index a76e5c8e755..4e8711527ec 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0308.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0308.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0308",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-20T21:29:00.623",
"lastModified": "2024-11-21T03:37:56.830",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -261,7 +261,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104514",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -269,7 +269,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -277,7 +277,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fxnxos-fab-ace",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0309.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0309.json
index ffd4eff98fe..07ba6005d07 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0309.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0309.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0309",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.570",
"lastModified": "2024-11-21T03:37:56.957",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -313,7 +313,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -321,7 +321,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-n3k-n9k-clisnmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0310.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0310.json
index be0e6934e6f..9a15881a3d0 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0310.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0310.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0310",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.617",
"lastModified": "2024-11-21T03:37:57.080",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -799,7 +799,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -807,7 +807,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nx-os-fabric-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0311.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0311.json
index d721187b29c..d87904ad57e 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0311.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0311.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0311",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.663",
"lastModified": "2024-11-21T03:37:57.213",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -791,7 +791,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -799,7 +799,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nx-os-fabric-services-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0312.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0312.json
index f5800938ae0..fa280720451 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0312.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0312.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0312",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-20T21:29:00.670",
"lastModified": "2024-11-21T03:37:57.353",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -246,7 +246,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104515",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -254,7 +254,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -262,7 +262,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fx-os-cli-execution",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0313.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0313.json
index 5946da6e292..07b87a12ed5 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0313.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0313.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0313",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.727",
"lastModified": "2024-11-21T03:37:57.480",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -593,7 +593,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -601,7 +601,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nx-os-api-execution",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0314.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0314.json
index 6853d0e0576..25bfcc0cc5a 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0314.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0314.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0314",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-20T21:29:00.717",
"lastModified": "2024-11-21T03:37:57.607",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -256,7 +256,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104516",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -264,7 +264,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -272,7 +272,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fx-os-fabric-execution",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0315.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0315.json
index c07f0be308e..9903d42f68e 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0315.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0315.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0315",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T12:29:00.433",
"lastModified": "2024-11-21T03:37:57.733",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104410",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041086",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -128,7 +128,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-aaa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0316.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0316.json
index f41df1a22b6..4ea766d9f50 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0316.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0316.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0316",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T12:29:00.480",
"lastModified": "2024-11-21T03:37:57.850",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -173,7 +173,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041073",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -181,7 +181,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-multiplatform-sip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0317.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0317.json
index 8e22026e1cf..6c008f5cd3d 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0317.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0317.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0317",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T12:29:00.527",
"lastModified": "2024-11-21T03:37:57.983",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -113,7 +113,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104432",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -121,7 +121,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041080",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0318.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0318.json
index 88d694b47ff..24073243996 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0318.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0318.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0318",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T12:29:00.573",
"lastModified": "2024-11-21T03:37:58.107",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -113,7 +113,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104434",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -121,7 +121,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041082",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-password-reset",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0319.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0319.json
index 523abef4724..0327f9f332d 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0319.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0319.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0319",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T12:29:00.607",
"lastModified": "2024-11-21T03:37:58.220",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -113,7 +113,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104431",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -121,7 +121,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041079",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-password-recovery",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0320.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0320.json
index f7908169bfc..01fad8eac13 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0320.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0320.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0320",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T12:29:00.653",
"lastModified": "2024-11-21T03:37:58.337",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -113,7 +113,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104416",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -121,7 +121,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041084",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-sql",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0321.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0321.json
index 4216f3e6a80..182a0804a3d 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0321.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0321.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0321",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T12:29:00.683",
"lastModified": "2024-11-21T03:37:58.453",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -119,7 +119,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104409",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041085",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-rmi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0322.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0322.json
index 62503c321f3..9e3868ae5e5 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0322.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0322.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0322",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T12:29:00.730",
"lastModified": "2024-11-21T03:37:58.580",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -113,7 +113,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104443",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -121,7 +121,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041064",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-access",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0323.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0323.json
index 61aa16bdb6a..6ee81780e76 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0323.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0323.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0323",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.717",
"lastModified": "2024-11-21T03:37:58.690",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104206",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-nfvis-path-traversal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0324.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0324.json
index 5641a241d2b..e79fab5d85a 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0324.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0324.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0324",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.763",
"lastModified": "2024-11-21T03:37:58.800",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104208",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-nfvis-cli-command-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0325.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0325.json
index 02ba357c742..87f240bbc1e 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0325.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0325.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0325",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.810",
"lastModified": "2024-11-21T03:37:58.917",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -179,7 +179,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104202",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -187,7 +187,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040927",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -195,7 +195,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-ip-phone-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0326.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0326.json
index 644d47f1001..26853393121 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0326.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0326.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0326",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.857",
"lastModified": "2024-11-21T03:37:59.040",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104204",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040930",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-telepres-xfs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0327.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0327.json
index 7c2733632c2..f06f5cd1b5d 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0327.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0327.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0327",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.903",
"lastModified": "2024-11-21T03:37:59.183",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104194",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040926",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-ident-se-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0328.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0328.json
index c35b01a2164..f4c59d696ab 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0328.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0328.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0328",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-05-17T03:29:00.950",
"lastModified": "2024-11-21T03:37:59.330",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104200",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040928",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "http://www.securitytracker.com/id/1040929",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -145,7 +145,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-cucm-cup-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0329.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0329.json
index 7997a179f77..4f5db471c7e 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0329.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0329.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0329",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.353",
"lastModified": "2024-11-21T03:37:59.460",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104590",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041078",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-waas-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0330.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0330.json
index 37a200904f8..f3eb11ddf36 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0330.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0330.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0330",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-20T21:29:00.767",
"lastModified": "2024-11-21T03:37:59.583",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -636,7 +636,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -644,7 +644,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxos-nxapi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0331.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0331.json
index 278fa19db5a..64f9b24c680 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0331.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0331.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0331",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.773",
"lastModified": "2024-11-21T03:37:59.720",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -790,7 +790,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041169",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -798,7 +798,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxos-cdp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0332.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0332.json
index 316b28aee59..8fb6f737768 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0332.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0332.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0332",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.400",
"lastModified": "2024-11-21T03:37:59.870",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -356,7 +356,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104445",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -364,7 +364,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041074",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -372,7 +372,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ip-phone-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0333.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0333.json
index 202ea1a24d2..e1269a809b3 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0333.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0333.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0333",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.463",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104422",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-FireSIGHT-vpn-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0334.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0334.json
index dab1af9ad10..309ac094e10 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0334.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0334.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0334",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.493",
"lastModified": "2024-11-21T03:38:00.140",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104430",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041075",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-AnyConnect-cert-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0335.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0335.json
index dbcfefeb395..5e7e0d5da16 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0335.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0335.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0335",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.540",
"lastModified": "2024-11-21T03:38:00.277",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -110,7 +110,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104473",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -118,7 +118,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041069",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-cpcp-id",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0336.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0336.json
index a24bf01cde3..a1e58d2c0c0 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0336.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0336.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0336",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.587",
"lastModified": "2024-11-21T03:38:00.430",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104429",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041083",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-escalation",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0337.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0337.json
index 77409c3e7b3..4564709a825 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0337.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0337.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0337",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.837",
"lastModified": "2024-11-21T03:38:00.557",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -255,7 +255,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxos-rbaccess",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0338.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0338.json
index 5ab7384d916..694a1b870b1 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0338.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0338.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0338",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.637",
"lastModified": "2024-11-21T03:38:00.680",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104456",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041071",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ucs-access",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0339.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0339.json
index 0f550c0f89e..e5e54652efa 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0339.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0339.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0339",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.667",
"lastModified": "2024-11-21T03:38:00.810",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104424",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041066",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ise-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0340.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0340.json
index c398247452b..89cb417ec50 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0340.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0340.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0340",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.713",
"lastModified": "2024-11-21T03:38:00.933",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104448",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041070",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ucm-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0341.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0341.json
index e3c1dbc6757..c019a733224 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0341.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0341.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0341",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-16T17:29:00.237",
"lastModified": "2024-11-21T03:38:01.043",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -173,7 +173,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104731",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -181,7 +181,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041285",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -189,7 +189,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0342.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0342.json
index dae71ec90d6..28183275742 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0342.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0342.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0342",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.243",
"lastModified": "2024-11-21T03:38:01.167",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -322,7 +322,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104877",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -330,7 +330,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0343.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0343.json
index a1471c51c35..2121b56e208 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0343.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0343.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0343",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.290",
"lastModified": "2024-11-21T03:38:01.300",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -322,7 +322,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104861",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -330,7 +330,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0344.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0344.json
index 536c329a1e6..1a97278bddd 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0344.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0344.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0344",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.337",
"lastModified": "2024-11-21T03:38:01.440",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -322,7 +322,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104868",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -330,7 +330,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0345.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0345.json
index 3c85db58191..01eb76e1046 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0345.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0345.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0345",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.383",
"lastModified": "2024-11-21T03:38:01.573",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -322,7 +322,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104859",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -330,7 +330,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0346.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0346.json
index 66fd2481e09..d7d3ff97f3a 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0346.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0346.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0346",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.447",
"lastModified": "2024-11-21T03:38:01.710",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -322,7 +322,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104855",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -330,7 +330,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0347.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0347.json
index 6b4240315ee..6b8f55761fd 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0347.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0347.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0347",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.493",
"lastModified": "2024-11-21T03:38:01.850",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -322,7 +322,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104862",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -330,7 +330,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0348.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0348.json
index b28975fb1cb..021337b9eb2 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0348.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0348.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0348",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.527",
"lastModified": "2024-11-21T03:38:01.997",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -322,7 +322,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104875",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -330,7 +330,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0349.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0349.json
index 8ce9939f1f8..8414a4e8535 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0349.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0349.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0349",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.587",
"lastModified": "2024-11-21T03:38:02.130",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -322,7 +322,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104854",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -330,7 +330,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0350.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0350.json
index 3c5da9e8e2f..f418e5522b0 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0350.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0350.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0350",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.633",
"lastModified": "2024-11-21T03:38:02.270",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -322,7 +322,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104874",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -330,7 +330,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0351.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0351.json
index 68fe196f46f..b425e507b0c 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0351.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0351.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0351",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.680",
"lastModified": "2024-11-21T03:38:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -322,7 +322,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104860",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -330,7 +330,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0352.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0352.json
index f9e054fef75..dcee168e9b3 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0352.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0352.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0352",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.760",
"lastModified": "2024-11-21T03:38:02.547",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104464",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041077",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-waas-priv-escalation",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0353.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0353.json
index 17b8fbbed71..ff7115ae262 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0353.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0353.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0353",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T12:29:00.777",
"lastModified": "2024-11-21T03:38:02.680",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104417",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041081",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-wsa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0354.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0354.json
index f57a54defc5..f24a5d0db33 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0354.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0354.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0354",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.790",
"lastModified": "2024-11-21T03:38:02.817",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104426",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041067",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-cuc-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0355.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0355.json
index 4a141117dd9..8a5a3400749 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0355.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0355.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0355",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.837",
"lastModified": "2024-11-21T03:38:02.950",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104425",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041068",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-cucm-xfs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0356.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0356.json
index baa3bbca28f..dee743775ae 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0356.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0356.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0356",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.887",
"lastModified": "2024-11-21T03:38:03.090",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104421",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041062",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-webex-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0357.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0357.json
index 1d154999110..9b28dac13f9 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0357.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0357.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0357",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-07T21:29:00.917",
"lastModified": "2024-11-21T03:38:03.233",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104420",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041063",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-webex-xss1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0358.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0358.json
index 1a6f7256288..c6a16a4d2f2 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0358.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0358.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0358",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.883",
"lastModified": "2024-11-21T03:38:03.377",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104521",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041172",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-vcse-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0359.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0359.json
index a5948bb2858..058d7bfc4c3 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0359.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0359.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0359",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.930",
"lastModified": "2024-11-21T03:38:03.513",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104583",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041174",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-cms-sf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0360.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0360.json
index 41fa06dc4e5..39ebe238c55 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0360.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0360.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0360",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-16T17:29:00.283",
"lastModified": "2024-11-21T03:38:03.643",
"vulnStatus": "Modified",
@@ -142,7 +142,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041367",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -150,14 +150,14 @@
},
{
"url": "https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00020.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -165,28 +165,28 @@
},
{
"url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-12/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/201904-12",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3722-1/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3722-2/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0361.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0361.json
index 82acb32f817..0fbcd1a090b 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0361.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0361.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0361",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-16T17:29:00.330",
"lastModified": "2024-11-21T03:38:03.790",
"vulnStatus": "Modified",
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041367",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -120,14 +120,14 @@
},
{
"url": "https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00020.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -135,7 +135,7 @@
},
{
"url": "https://security.gentoo.org/glsa/201904-12",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0362.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0362.json
index 26fa0c11165..2f8f0b6683a 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0362.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0362.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0362",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:00.977",
"lastModified": "2024-11-21T03:38:03.917",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -739,7 +739,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041173",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -747,7 +747,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-encs-ucs-bios-auth-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0363.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0363.json
index 8a2d071f7e3..539e248445a 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0363.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0363.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0363",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:01.023",
"lastModified": "2024-11-21T03:38:04.077",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104523",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041170",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-ucmim-ps-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0364.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0364.json
index 57f774ffb05..b968bd6e17b 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0364.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0364.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0364",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:01.087",
"lastModified": "2024-11-21T03:38:04.213",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041171",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-ucdm-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0365.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0365.json
index e08da30e598..7b8f8f08843 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0365.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0365.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0365",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:01.133",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1719,7 +1719,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104519",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1727,7 +1727,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-firepower-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0366.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0366.json
index 796b9433753..c94285a8e65 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0366.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0366.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0366",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-16T17:29:00.377",
"lastModified": "2024-11-21T03:38:04.557",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104724",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041282",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-wsa-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0367.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0367.json
index 61e3695f43c..59ff581dfba 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0367.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0367.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0367",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-15T20:29:00.300",
"lastModified": "2024-11-21T03:38:04.677",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105109",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-res-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0368.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0368.json
index 48f418a6c73..cfe4e4ddcf7 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0368.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0368.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0368",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-16T17:29:00.423",
"lastModified": "2024-11-21T03:38:04.810",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104729",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-dnac-id",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0369.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0369.json
index a76d1a2de25..cd22cdb2eda 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0369.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0369.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0369",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-16T17:29:00.487",
"lastModified": "2024-11-21T03:38:04.933",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -144,7 +144,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104723",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -152,7 +152,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-staros-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0370.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0370.json
index 27202e81fc0..648040d1a6b 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0370.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0370.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0370",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-16T17:29:00.533",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104728",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepower-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0371.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0371.json
index ede623ec89d..f71e6eb0f7e 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0371.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0371.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0371",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:01.180",
"lastModified": "2024-11-21T03:38:05.180",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104582",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041175",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-meeting-server-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0372.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0372.json
index 44b4925801a..a0053fbf086 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0372.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0372.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0372",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.727",
"lastModified": "2024-11-21T03:38:05.300",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -208,7 +208,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041348",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -216,7 +216,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-20180718-nexus-9000-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0373.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0373.json
index 2ce91841703..31921a4ad1f 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0373.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0373.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0373",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-06-21T11:29:01.227",
"lastModified": "2024-11-21T03:38:05.420",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -158,7 +158,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104548",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -166,7 +166,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041176",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -174,7 +174,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-anyconnect-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0374.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0374.json
index c7946d46685..528fd307cb5 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0374.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0374.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0374",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.777",
"lastModified": "2024-11-21T03:38:05.553",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104851",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-policy-unauth-access",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0375.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0375.json
index 99c38ab63d4..3f45643d620 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0375.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0375.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0375",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.807",
"lastModified": "2024-11-21T03:38:05.670",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104852",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -120,7 +120,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-policy-cm-default-psswrd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0376.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0376.json
index cad6ca50572..853b2472aaa 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0376.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0376.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0376",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.867",
"lastModified": "2024-11-21T03:38:05.797",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104849",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -120,7 +120,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-pspb-unauth-access",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0377.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0377.json
index 41b78a370e4..a365ae5c728 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0377.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0377.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0377",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.900",
"lastModified": "2024-11-21T03:38:05.917",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104850",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -120,7 +120,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-ps-osgi-unauth-access",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0378.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0378.json
index 3f5f71e8abf..3bc58d1ba66 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0378.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0378.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0378",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T21:49:52.787",
"lastModified": "2024-11-21T03:38:06.057",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -193,7 +193,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105669",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -201,7 +201,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041920",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -209,7 +209,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-nexus-ptp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0379.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0379.json
index ccfbc404854..6a1e39a6f41 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0379.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0379.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0379",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:00.963",
"lastModified": "2024-11-21T03:38:06.213",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -183,7 +183,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104853",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -191,7 +191,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041347",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -199,7 +199,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0380.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0380.json
index 6a552ca209d..efc20f87a65 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0380.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0380.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0380",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:01.010",
"lastModified": "2024-11-21T03:38:06.417",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104880",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041351",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0381.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0381.json
index 250d9e445e6..e008c98227e 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0381.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0381.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0381",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T22:29:00.253",
"lastModified": "2024-11-21T03:38:06.543",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -163,7 +163,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105685",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -171,7 +171,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041929",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -179,7 +179,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-aironet-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0382.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0382.json
index 05597ad9aa7..8c23585f6ce 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0382.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0382.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0382",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-17T22:29:00.280",
"lastModified": "2024-11-21T03:38:06.693",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108005",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlan-hijack",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0383.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0383.json
index 7feddbefabf..23d93e8c4cd 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0383.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0383.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0383",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-16T17:29:00.597",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104726",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041283",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-file-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0384.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0384.json
index b3a8188a5aa..e62c48f941c 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0384.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0384.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0384",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-16T17:29:00.643",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104725",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041284",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firesight-url-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0385.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0385.json
index 63ab3b1a12f..845d4fd6da0 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0385.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0385.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0385",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-16T17:29:00.690",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104727",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-firepwr-ssl-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0386.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0386.json
index e67d9e5cb51..fb08fc503c0 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0386.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0386.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0386",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-15T20:29:00.407",
"lastModified": "2024-11-21T03:38:07.213",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105113",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041537",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-cucdm-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0387.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0387.json
index b4d4432a217..377b45361b7 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0387.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0387.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0387",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:01.040",
"lastModified": "2024-11-21T03:38:07.337",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -123,14 +123,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104873",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-teams-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0388.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0388.json
index a32b4b31bbe..12155bad105 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0388.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0388.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0388",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T19:29:00.227",
"lastModified": "2024-11-21T03:38:07.467",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105665",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -147,7 +147,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041927",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -156,7 +156,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlan-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0389.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0389.json
index 1eef1a74a58..b7fb6dc6fd4 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0389.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0389.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0389",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-13T21:29:00.260",
"lastModified": "2024-11-21T03:38:07.617",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -139,7 +139,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107402",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -147,7 +147,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190313-sip",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0390.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0390.json
index 97e4ab67bb7..0856167ea77 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0390.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0390.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0390",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:01.103",
"lastModified": "2024-11-21T03:38:07.763",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104865",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-DOM-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0391.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0391.json
index c2a7ebdc76c..6e26e94bf33 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0391.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0391.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0391",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-01T20:29:00.263",
"lastModified": "2024-11-21T03:38:07.887",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -112,7 +112,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104942",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -120,7 +120,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041409",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -128,7 +128,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-pcp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0392.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0392.json
index 00822909e17..d81ead2a7ad 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0392.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0392.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0392",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:01.150",
"lastModified": "2024-11-21T03:38:08.013",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -172,7 +172,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104866",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -180,7 +180,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-policy-suite-data",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0393.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0393.json
index c1e45c4ddb5..03f03698a76 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0393.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0393.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0393",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:01.180",
"lastModified": "2024-11-21T03:38:08.140",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -172,7 +172,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104867",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -180,7 +180,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-policy-suite-change",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0394.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0394.json
index 4b0c2beaeda..625c3a23e9f 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0394.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0394.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0394",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:01.243",
"lastModified": "2024-11-21T03:38:08.260",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104881",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-csp2100-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0395.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0395.json
index 8c309eb1dc7..0760b788506 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0395.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0395.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0395",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T19:29:00.303",
"lastModified": "2024-11-21T03:38:08.380",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -264,7 +264,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105674",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -272,7 +272,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041919",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -280,7 +280,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-fxnx-os-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0396.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0396.json
index 6f0a872d270..1497ace6d6d 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0396.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0396.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0396",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:01.290",
"lastModified": "2024-11-21T03:38:08.507",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104872",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041349",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041350",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-ucmim-ps-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0397.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0397.json
index 28819b7b698..0472b9fc430 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0397.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0397.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0397",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-01T20:29:00.310",
"lastModified": "2024-11-21T03:38:08.630",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104946",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-fampmac",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0398.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0398.json
index 057d493b702..5c6ef615a70 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0398.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0398.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0398",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:01.320",
"lastModified": "2024-11-21T03:38:08.743",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104886",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-finesse",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-03xx/CVE-2018-0399.json b/CVE-2018/CVE-2018-03xx/CVE-2018-0399.json
index abf8b680427..a71cf1d3843 100644
--- a/CVE-2018/CVE-2018-03xx/CVE-2018-0399.json
+++ b/CVE-2018/CVE-2018-03xx/CVE-2018-0399.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0399",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:01.367",
"lastModified": "2024-11-21T03:38:08.860",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104886",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-finesse",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0400.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0400.json
index e9e11035a70..0f16f1575a6 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0400.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0400.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0400",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:01.400",
"lastModified": "2024-11-21T03:38:08.977",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041352",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-uccx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0401.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0401.json
index a49881c463c..7b1dec865d2 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0401.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0401.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0401",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:01.447",
"lastModified": "2024-11-21T03:38:09.093",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041352",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Third Party Advisory",
@@ -120,7 +120,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-uccx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0402.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0402.json
index 272d7a2c2c5..204bc186c03 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0402.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0402.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0402",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:01.493",
"lastModified": "2024-11-21T03:38:09.210",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041352",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-uccx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0403.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0403.json
index b014ea678b4..b595b4f475b 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0403.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0403.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0403",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-07-18T23:29:01.540",
"lastModified": "2024-11-21T03:38:09.330",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041352",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-uccx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0404.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0404.json
index 704bce3a505..e88778f2d4e 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0404.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0404.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0404",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T16:29:00.300",
"lastModified": "2024-11-21T03:38:09.447",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk27179",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0405.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0405.json
index 16e45579e7a..fab33203443 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0405.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0405.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0405",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T17:29:00.277",
"lastModified": "2024-11-21T03:38:09.590",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk28019",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0406.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0406.json
index 6d243382c1c..e68ff6a5d85 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0406.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0406.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0406",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-01T20:29:00.357",
"lastModified": "2024-11-21T03:38:09.703",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104945",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041406",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-wsa-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0407.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0407.json
index 29397cbf811..86e755be9ea 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0407.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0407.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0407",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-01T20:29:00.387",
"lastModified": "2024-11-21T03:38:09.830",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -903,7 +903,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104947",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -911,7 +911,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-pxss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0408.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0408.json
index 69644bb62ea..b6052d546f6 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0408.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0408.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0408",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-01T20:29:00.433",
"lastModified": "2024-11-21T03:38:09.980",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -903,7 +903,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104948",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -911,7 +911,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-rxss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0409.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0409.json
index 664ab297617..8b1863b6888 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0409.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0409.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0409",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-15T20:29:00.533",
"lastModified": "2024-11-21T03:38:10.117",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -176,7 +176,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105102",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -184,7 +184,7 @@
},
{
"url": "http://www.securityfocus.com/bid/105104",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -192,7 +192,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041533",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -200,7 +200,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041534",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -208,7 +208,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-ucmimps-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0410.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0410.json
index f55c0d8b27d..9890b5cf50a 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0410.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0410.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0410",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-15T20:29:00.657",
"lastModified": "2024-11-21T03:38:10.247",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105098",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -159,7 +159,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041535",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -167,7 +167,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-wsa-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0411.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0411.json
index d58e4d11de9..417589ab625 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0411.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0411.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0411",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-01T20:29:00.480",
"lastModified": "2024-11-21T03:38:10.393",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104949",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041407",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-ucm-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0412.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0412.json
index 4aa95ad4aef..587bc175ed6 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0412.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0412.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0412",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-15T20:29:00.767",
"lastModified": "2024-11-21T03:38:10.520",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -315,7 +315,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-sb-wap-encrypt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0413.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0413.json
index 47b7e996f89..e980c5b4a9d 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0413.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0413.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0413",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-01T20:29:00.513",
"lastModified": "2024-11-21T03:38:10.640",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/104950",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041408",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-ise-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0414.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0414.json
index ed812f04329..9bbe0a78dc1 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0414.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0414.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0414",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:00.497",
"lastModified": "2024-11-21T03:38:10.757",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -157,7 +157,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105289",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -165,7 +165,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041688",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -173,7 +173,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-acsxxe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0415.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0415.json
index 83850f822a7..06b120c0523 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0415.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0415.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0415",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-15T20:29:00.893",
"lastModified": "2024-11-21T03:38:10.883",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -315,7 +315,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105116",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -323,7 +323,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-csb-wap-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0416.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0416.json
index ebab8a666c4..1b0ba00213e 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0416.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0416.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0416",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T19:29:00.380",
"lastModified": "2024-11-21T03:38:11.010",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105675",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041928",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -147,7 +147,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-id",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0417.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0417.json
index a14cadc7113..35785b76b9d 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0417.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0417.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0417",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T22:29:00.363",
"lastModified": "2024-11-21T03:38:11.130",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -158,7 +158,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105667",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -166,7 +166,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041924",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -174,7 +174,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-gui-privesc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0418.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0418.json
index 6151974faa0..0b4b1b96ef8 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0418.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0418.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0418",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-15T20:29:01.017",
"lastModified": "2024-11-21T03:38:11.260",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -164,7 +164,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105185",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -172,7 +172,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041538",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -180,7 +180,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-asr-ptp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0419.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0419.json
index 26780974491..2be4a2aea81 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0419.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0419.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0419",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-15T20:29:01.143",
"lastModified": "2024-11-21T03:38:11.390",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105112",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041531",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-esa-file-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0420.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0420.json
index fb178648bb0..d57c979ab4d 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0420.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0420.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0420",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T22:29:00.457",
"lastModified": "2024-11-21T03:38:11.510",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105671",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -137,7 +137,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041926",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -146,7 +146,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-traversal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0421.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0421.json
index 28ecc4c55d2..636ad36a1c8 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0421.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0421.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0421",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:00.623",
"lastModified": "2024-11-21T03:38:11.630",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105282",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041684",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -145,7 +145,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cpar-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0422.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0422.json
index a9139bb4b15..019713df57e 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0422.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0422.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0422",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:00.730",
"lastModified": "2024-11-21T03:38:11.760",
"vulnStatus": "Modified",
@@ -235,7 +235,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105281",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -243,7 +243,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041681",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -251,7 +251,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-webex-pe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0423.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0423.json
index 6744de0bc04..6d0350e5d55 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0423.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0423.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0423",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:00.857",
"lastModified": "2024-11-21T03:38:11.887",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -172,7 +172,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105285",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -180,7 +180,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041675",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -188,7 +188,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-overflow",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0424.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0424.json
index 2c117d98ad6..ff24f909ab0 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0424.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0424.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0424",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:00.967",
"lastModified": "2024-11-21T03:38:12.013",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -175,7 +175,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041677",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -183,7 +183,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0425.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0425.json
index 40c1cd7b908..398bd6a3d26 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0425.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0425.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0425",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:01.060",
"lastModified": "2024-11-21T03:38:12.153",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -175,7 +175,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041676",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -183,7 +183,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-disclosure",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0426.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0426.json
index 33e001deab2..2153420d0bd 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0426.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0426.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0426",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:01.170",
"lastModified": "2024-11-21T03:38:12.290",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -175,7 +175,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041678",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -183,7 +183,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-traversal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0427.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0427.json
index 67a6fb5056e..4797df64f68 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0427.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0427.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0427",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-15T20:29:01.253",
"lastModified": "2024-11-21T03:38:12.417",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105106",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-dna-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0428.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0428.json
index 6620efdfe0f..6f9af3a7afd 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0428.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0428.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0428",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-15T20:29:01.360",
"lastModified": "2024-11-21T03:38:12.540",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105104",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041536",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-wsa-escalation",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0429.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0429.json
index 1df030d52ee..5b3088b09cd 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0429.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0429.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0429",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-08-09T20:29:00.143",
"lastModified": "2024-11-21T03:38:12.670",
"vulnStatus": "Modified",
@@ -97,7 +97,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105059",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -105,7 +105,7 @@
},
{
"url": "https://github.com/cisco/thor/commit/18de8f9f0762c3a542b1122589edb8af859d9813",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0430.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0430.json
index 310bcee87e7..7313bb83456 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0430.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0430.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0430",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:01.277",
"lastModified": "2024-11-21T03:38:12.793",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041686",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cimc-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0431.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0431.json
index ba3812e9333..0add4252876 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0431.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0431.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0431",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:01.387",
"lastModified": "2024-11-21T03:38:12.927",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041686",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cimc-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0432.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0432.json
index c8ef9f3373c..73940a8af8c 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0432.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0432.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0432",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:01.497",
"lastModified": "2024-11-21T03:38:13.060",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -218,7 +218,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105296",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -226,7 +226,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-escalation",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0433.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0433.json
index 604da50a097..2c6b3b2332a 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0433.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0433.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0433",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:01.607",
"lastModified": "2024-11-21T03:38:13.203",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -233,7 +233,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105295",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -241,7 +241,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0434.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0434.json
index 36ae4c64f7d..ad832c98de4 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0434.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0434.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0434",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:01.700",
"lastModified": "2024-11-21T03:38:13.330",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -218,7 +218,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105294",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -226,7 +226,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-validation",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0435.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0435.json
index e411d610456..e8ed562d967 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0435.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0435.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0435",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:01.840",
"lastModified": "2024-11-21T03:38:13.453",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105283",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-api",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0436.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0436.json
index 27216e21284..10cc1decd2a 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0436.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0436.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0436",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:01.933",
"lastModified": "2024-11-21T03:38:13.580",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105301",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-webex-id-mod",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0437.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0437.json
index 66fd3aa1412..ba3ab46c720 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0437.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0437.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0437",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:02.043",
"lastModified": "2024-11-21T03:38:13.710",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -140,7 +140,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105292",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -148,14 +148,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-priv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/45339/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0438.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0438.json
index 35b1429b773..182ec6858f3 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0438.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0438.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0438",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:02.137",
"lastModified": "2024-11-21T03:38:13.830",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -119,7 +119,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105286",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,14 +127,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-file-read",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/45339/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0439.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0439.json
index c96b9822290..dd48e47a802 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0439.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0439.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0439",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:02.247",
"lastModified": "2024-11-21T03:38:13.957",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105287",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041680",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-meeting-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0440.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0440.json
index 90be0f2c70a..8269fe4327c 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0440.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0440.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0440",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:02.357",
"lastModified": "2024-11-21T03:38:14.083",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041682",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cdcnm-escalation",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0441.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0441.json
index eac41f331d9..7595f9a162a 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0441.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0441.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0441",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T22:29:00.550",
"lastModified": "2024-11-21T03:38:14.210",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -179,7 +179,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105680",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -187,7 +187,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041918",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -195,7 +195,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-ap-ft-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0442.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0442.json
index e403c00b12b..a33effd9635 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0442.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0442.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0442",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T22:29:00.647",
"lastModified": "2024-11-21T03:38:14.347",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105664",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -175,7 +175,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041923",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -183,7 +183,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-capwap-memory-leak",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0443.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0443.json
index 5818ace34b5..29649fafe10 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0443.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0443.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0443",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T22:29:00.723",
"lastModified": "2024-11-21T03:38:14.483",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105686",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041922",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-capwap-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0444.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0444.json
index 1c3e5c93c95..df5ddd24588 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0444.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0444.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0444",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:02.467",
"lastModified": "2024-11-21T03:38:14.627",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-pcce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0445.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0445.json
index a54976be089..f5a38730392 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0445.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0445.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0445",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:02.577",
"lastModified": "2024-11-21T03:38:14.763",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-pcce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0446.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0446.json
index 4969f5048b6..59f7e918fbb 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0446.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0446.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0446",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:02.700",
"lastModified": "2024-11-21T03:38:14.890",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ind-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0447.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0447.json
index ad7a08a6c55..fd51ad63638 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0447.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0447.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0447",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:02.810",
"lastModified": "2024-11-21T03:38:15.010",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105300",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041687",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-esa-url-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0448.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0448.json
index cc05abb0f22..8bc1087cb39 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0448.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0448.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0448",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:02.920",
"lastModified": "2024-11-21T03:38:15.140",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105502",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -115,7 +115,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-dna-auth-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0449.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0449.json
index 39cb8229758..1af7713cc96 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0449.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0449.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0449",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-10T16:29:00.240",
"lastModified": "2024-11-21T03:38:15.270",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-jabr-mac-permissions",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0450.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0450.json
index 7abda971764..d4ed8826878 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0450.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0450.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0450",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:03.027",
"lastModified": "2024-11-21T03:38:15.400",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105288",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-dcnm-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0451.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0451.json
index 924ce563a85..3a1c1c19792 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0451.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0451.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0451",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:03.137",
"lastModified": "2024-11-21T03:38:15.523",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105270",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-tetration-vulns",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0452.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0452.json
index 0a602ed0063..92efbf2dd24 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0452.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0452.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0452",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:03.230",
"lastModified": "2024-11-21T03:38:15.650",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105278",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-tetration-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0453.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0453.json
index 55a499b862a..86e327447d6 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0453.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0453.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0453",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:03.340",
"lastModified": "2024-11-21T03:38:15.773",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-fp-cmd-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0454.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0454.json
index dfa46ffb746..567d3d2a555 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0454.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0454.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0454",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:03.450",
"lastModified": "2024-11-21T03:38:15.900",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041683",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-csp2100-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0455.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0455.json
index d4a78187710..001c1527db3 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0455.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0455.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0455",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:03.560",
"lastModified": "2024-11-21T03:38:16.027",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-fp-smb-snort",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0456.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0456.json
index 129cd0d5b64..c09fec14968 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0456.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0456.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0456",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T20:29:00.253",
"lastModified": "2024-11-21T03:38:16.167",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105668",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041921",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-nxos-snmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0457.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0457.json
index a57dc041c46..a4de3362445 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0457.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0457.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0457",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:03.670",
"lastModified": "2024-11-21T03:38:16.297",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105279",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041679",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-webex-player-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0458.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0458.json
index c83a1c64cc9..9830a617c92 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0458.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0458.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0458",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:03.777",
"lastModified": "2024-11-21T03:38:16.453",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105293",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041685",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-pca-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0459.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0459.json
index ba4c24ed906..079e894a1e6 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0459.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0459.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0459",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:03.920",
"lastModified": "2024-11-21T03:38:16.580",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105290",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-nfvis-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0460.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0460.json
index 0e3d1d22d0a..4a94209611d 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0460.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0460.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0460",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:04.043",
"lastModified": "2024-11-21T03:38:16.703",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105299",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-nfvis-infodis",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0461.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0461.json
index 42b201fcf71..0f8e9a51e6d 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0461.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0461.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0461",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-10T16:29:00.287",
"lastModified": "2024-11-21T03:38:16.827",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -163,7 +163,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106515",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -171,7 +171,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-phone-script-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0462.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0462.json
index 3cc7b06f48e..6c05ad25283 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0462.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0462.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0462",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:04.137",
"lastModified": "2024-11-21T03:38:16.963",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105291",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-nfvis-dos1",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0463.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0463.json
index 661c3fecfd8..b5a8f6e4107 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0463.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0463.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0463",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:04.247",
"lastModified": "2024-11-21T03:38:17.087",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-nso-infodis",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0464.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0464.json
index c06e5d087c2..5071d5ef628 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0464.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0464.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0464",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T16:29:00.440",
"lastModified": "2024-11-21T03:38:17.203",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -146,7 +146,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105159",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -154,7 +154,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041585",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -162,14 +162,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180828-dcnm-traversal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2018-20",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0465.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0465.json
index 358f0a7ce0d..bcceeb96617 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0465.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0465.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0465",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:04.357",
"lastModified": "2024-11-21T03:38:17.337",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -820,7 +820,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-300-switch-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0466.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0466.json
index 88fbb5ecdfb..24518bdb461 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0466.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0466.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0466",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:04.467",
"lastModified": "2024-11-21T03:38:17.497",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105403",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,11 +127,11 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-094-03",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ospfv3-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0467.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0467.json
index 4c7e31e5e1a..7a8a8caaafa 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0467.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0467.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0467",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:04.590",
"lastModified": "2024-11-21T03:38:17.637",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,11 +124,11 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-094-03",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ipv6hbh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0468.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0468.json
index c75e0917458..ba6623c7dd0 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0468.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0468.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0468",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-12-04T18:29:00.280",
"lastModified": "2024-11-21T03:38:17.777",
"vulnStatus": "Modified",
@@ -96,7 +96,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106124",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -104,14 +104,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181204-ems-sql-passwrd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2018-42",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory"
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0469.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0469.json
index 9d79c7d628c..916b969f08f 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0469.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0469.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0469",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:04.683",
"lastModified": "2024-11-21T03:38:17.913",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105423",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-webuidos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0470.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0470.json
index fa9d2c5999e..cbccf6d81e5 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0470.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0470.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0470",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:04.810",
"lastModified": "2024-11-21T03:38:18.050",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105397",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,11 +127,11 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-094-03",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-webdos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0471.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0471.json
index 033ccca5181..790e84bf05b 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0471.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0471.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0471",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:04.920",
"lastModified": "2024-11-21T03:38:18.187",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105398",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-cdp-memleak",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0472.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0472.json
index 7a56d1050b9..ad16d0959b3 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0472.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0472.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0472",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:05.013",
"lastModified": "2024-11-21T03:38:18.313",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105418",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041735",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,11 +135,11 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-094-04",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ipsec",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0473.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0473.json
index 22a614dedb9..6179f3434b3 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0473.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0473.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0473",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:05.137",
"lastModified": "2024-11-21T03:38:18.440",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105427",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,11 +127,11 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-094-03",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ptp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0474.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0474.json
index d0fb0332541..7099bcbc05d 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0474.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0474.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0474",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-10T16:29:00.333",
"lastModified": "2024-11-21T03:38:18.573",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106538",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-cucm-creds-disclosr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0475.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0475.json
index 8dc8d35ff16..a6168f396ee 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0475.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0475.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0475",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:05.247",
"lastModified": "2024-11-21T03:38:18.710",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105404",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-cmp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0476.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0476.json
index c64f6518553..ccef70319de 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0476.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0476.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0476",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:05.357",
"lastModified": "2024-11-21T03:38:18.833",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105419",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041734",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -140,7 +140,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-sip-alg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0477.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0477.json
index d3c48eb4ee9..910330b2a65 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0477.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0477.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0477",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:05.450",
"lastModified": "2024-11-21T03:38:18.967",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-iosxe-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0480.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0480.json
index 34820ec55a2..0af393a8c83 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0480.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0480.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0480",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:05.560",
"lastModified": "2024-11-21T03:38:19.090",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105400",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -122,7 +122,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-errdisable",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0481.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0481.json
index fdef5278524..1e9100eb64f 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0481.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0481.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0481",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:05.670",
"lastModified": "2024-11-21T03:38:19.223",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-iosxe-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0482.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0482.json
index 19b0a386f60..383e0593321 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0482.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0482.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0482",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-10T16:29:00.380",
"lastModified": "2024-11-21T03:38:19.347",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106514",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-pnc-stored-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0483.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0483.json
index 615b5ebb52d..d42c6fb06cb 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0483.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0483.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0483",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-10T17:29:00.287",
"lastModified": "2024-11-21T03:38:19.483",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106506",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-jcf-im-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0484.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0484.json
index 71ce682849c..fe0b39acb55 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0484.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0484.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0484",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-10T18:29:00.377",
"lastModified": "2024-11-21T03:38:19.630",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106560",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-ios-ssh-vrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-04xx/CVE-2018-0485.json b/CVE-2018/CVE-2018-04xx/CVE-2018-0485.json
index 6334943ae44..ff438f05799 100644
--- a/CVE-2018/CVE-2018-04xx/CVE-2018-0485.json
+++ b/CVE-2018/CVE-2018-04xx/CVE-2018-0485.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-0485",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:05.777",
"lastModified": "2024-11-21T03:38:19.810",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105433",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041736",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -127,7 +127,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041737",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-sm1t3e3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15368.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15368.json
index 8ec51111dcb..cf9d492b9ff 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15368.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15368.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15368",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:05.873",
"lastModified": "2024-11-21T03:50:38.310",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-privesc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15369.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15369.json
index 20267ef47d1..ad8f7c2df0d 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15369.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15369.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15369",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:05.997",
"lastModified": "2024-11-21T03:50:38.440",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105426",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-tacplus",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15370.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15370.json
index e1722d0d1b6..0f9b438c076 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15370.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15370.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15370",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:06.107",
"lastModified": "2024-11-21T03:50:38.570",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105412",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-catalyst6800",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15371.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15371.json
index 418905a077c..ac01df46f25 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15371.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15371.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15371",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:06.217",
"lastModified": "2024-11-21T03:50:38.700",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-shell-access",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15372.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15372.json
index 6ef64ab9ed7..9ad0aa159d3 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15372.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15372.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15372",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:06.327",
"lastModified": "2024-11-21T03:50:38.827",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105416",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-macsec",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15373.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15373.json
index 8db4bffbc92..9609703a593 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15373.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15373.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15373",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:06.420",
"lastModified": "2024-11-21T03:50:38.963",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105413",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,11 +119,11 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-094-03",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-cdp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15374.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15374.json
index c5ac8e6bcc9..c6795c3b70c 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15374.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15374.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15374",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:06.543",
"lastModified": "2024-11-21T03:50:39.100",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105415",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-digsig",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15375.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15375.json
index 7ae6f28bc2f..2e10f0bb1de 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15375.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15375.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15375",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:06.653",
"lastModified": "2024-11-21T03:50:39.233",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ir800-memwrite",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15376.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15376.json
index 68a37866908..6b7d46b26d0 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15376.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15376.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15376",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:06.777",
"lastModified": "2024-11-21T03:50:39.360",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ir800-memwrite",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15377.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15377.json
index 36488e3e38f..c05429c66e7 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15377.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15377.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15377",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:06.887",
"lastModified": "2024-11-21T03:50:39.487",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-094-02",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-pnp-memleak",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15378.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15378.json
index a7b111063d5..9e1e38c719d 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15378.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15378.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15378",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-15T17:29:00.677",
"lastModified": "2024-11-21T03:50:39.617",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -152,7 +152,7 @@
"references": [
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=12170",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Patch",
@@ -161,7 +161,7 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00014.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -169,7 +169,7 @@
},
{
"url": "https://secuniaresearch.flexerasoftware.com/advisories/83000/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
@@ -177,28 +177,28 @@
},
{
"url": "https://security.gentoo.org/glsa/201904-12",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3789-1/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3789-2/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.flexera.com/company/secunia-research/advisories/SR-2018-23.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15379.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15379.json
index e6dfb48b715..23c6e9e8814 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15379.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15379.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15379",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:07.013",
"lastModified": "2024-11-21T03:50:39.770",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105506",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -159,7 +159,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041816",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -167,14 +167,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-pi-tftp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/45555/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15380.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15380.json
index 926f57a4bc1..3eb14625023 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15380.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15380.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15380",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-20T23:29:00.193",
"lastModified": "2024-11-21T03:50:39.917",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107095",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-hyperflex-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15381.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15381.json
index fb81316c5e9..5fcff390cb8 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15381.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15381.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15381",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T16:29:00.277",
"lastModified": "2024-11-21T03:50:40.100",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105876",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "http://www.securitytracker.com/id/1042130",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -143,7 +143,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-cue",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15382.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15382.json
index a3ad70b5424..2363087e1ae 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15382.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15382.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15382",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:07.123",
"lastModified": "2024-11-21T03:50:40.233",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105518",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-hyperflex-secret",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15383.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15383.json
index 2832613e95f..41fb708f867 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15383.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15383.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15383",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:07.230",
"lastModified": "2024-11-21T03:50:40.370",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -176,7 +176,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041787",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -184,7 +184,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-dma-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15386.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15386.json
index bfe85a28272..023c963de00 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15386.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15386.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15386",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:07.340",
"lastModified": "2024-11-21T03:50:40.500",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105504",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -129,7 +129,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-dna-unauth-access",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15387.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15387.json
index 718b7d51cbe..f8440576d65 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15387.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15387.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15387",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:07.450",
"lastModified": "2024-11-21T03:50:40.633",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -113,7 +113,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105509",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -121,7 +121,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-sd-wan-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15388.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15388.json
index d3cedccbe08..d5927d83694 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15388.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15388.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15388",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:00.227",
"lastModified": "2024-11-21T03:50:40.767",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -231,7 +231,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-sd-cpu-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15389.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15389.json
index 99ac0440449..35f29ddb993 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15389.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15389.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15389",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:07.560",
"lastModified": "2024-11-21T03:50:40.977",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-cpcp-password",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15390.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15390.json
index 8213a0fc89a..18f8eabf5e6 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15390.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15390.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15390",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:07.670",
"lastModified": "2024-11-21T03:50:41.110",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -108,7 +108,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105519",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -116,7 +116,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ftd-inspect-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15391.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15391.json
index e044e448588..d0ee38f38d6 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15391.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15391.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15391",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:07.793",
"lastModified": "2024-11-21T03:50:41.243",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-phy-ipv4-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15392.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15392.json
index 36b0dbb1639..665ef60b5bc 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15392.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15392.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15392",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:07.903",
"lastModified": "2024-11-21T03:50:41.367",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ind-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15393.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15393.json
index 4892f056c02..440d327d23d 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15393.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15393.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15393",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T17:29:00.437",
"lastModified": "2024-11-21T03:50:41.503",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105858",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sma-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15394.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15394.json
index 2f6b9afa583..c6a328598e1 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15394.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15394.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15394",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T17:29:00.497",
"lastModified": "2024-11-21T03:50:41.640",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105853",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-smc-auth-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15395.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15395.json
index b0376a672b3..adb5a48e8a7 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15395.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15395.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15395",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T20:29:00.363",
"lastModified": "2024-11-21T03:50:41.773",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105676",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041925",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlan-escalation",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15396.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15396.json
index 7b85efc9f35..37c31517e5d 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15396.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15396.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15396",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:08.013",
"lastModified": "2024-11-21T03:50:41.920",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041782",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-unity-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15397.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15397.json
index e9343fdc89e..56b26119916 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15397.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15397.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15397",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:08.107",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041786",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-ipsec-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15398.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15398.json
index 0c467b1c09a..7e072a7e807 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15398.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15398.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15398",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:08.230",
"lastModified": "2024-11-21T03:50:42.197",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105517",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041788",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -147,7 +147,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-acl-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-153xx/CVE-2018-15399.json b/CVE-2018/CVE-2018-153xx/CVE-2018-15399.json
index 90c308db9fe..b53a5076c87 100644
--- a/CVE-2018/CVE-2018-153xx/CVE-2018-15399.json
+++ b/CVE-2018/CVE-2018-153xx/CVE-2018-15399.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15399",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:08.327",
"lastModified": "2024-11-21T03:50:42.333",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041785",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-syslog-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15400.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15400.json
index 85c24c67883..00390783f6a 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15400.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15400.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15400",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:08.437",
"lastModified": "2024-11-21T03:50:42.480",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105560",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -126,7 +126,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-csp-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15401.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15401.json
index 1f7f039cfea..48233a0d531 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15401.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15401.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15401",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:08.543",
"lastModified": "2024-11-21T03:50:42.623",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-hcmf-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15402.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15402.json
index a501860d006..aa101f18fc8 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15402.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15402.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15402",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T20:29:00.457",
"lastModified": "2024-11-21T03:50:42.760",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105662",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-nfvis-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15403.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15403.json
index cd910d70e7e..8d3938bcdf8 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15403.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15403.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15403",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:08.687",
"lastModified": "2024-11-21T03:50:42.907",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -191,7 +191,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041780",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -199,7 +199,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041789",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -207,7 +207,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-er-ucm-redirect",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15404.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15404.json
index 2024cdf055d..1f7412c6a3c 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15404.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15404.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15404",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:08.793",
"lastModified": "2024-11-21T03:50:43.043",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-imcs-ucsd-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15405.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15405.json
index c1cddfe063b..8b0bad8152e 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15405.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15405.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15405",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:08.903",
"lastModified": "2024-11-21T03:50:43.180",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041779",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -119,7 +119,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-imcs-ucsd-id",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15406.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15406.json
index cca68f08111..de17945c284 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15406.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15406.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15406",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:09.013",
"lastModified": "2024-11-21T03:50:43.313",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041783",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ucsd-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15407.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15407.json
index e5e664b32ed..e5a314c778d 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15407.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15407.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15407",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:09.137",
"lastModified": "2024-11-21T03:50:43.440",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-hyperflex-info",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15408.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15408.json
index a312790aed0..f8eaa66c97e 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15408.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15408.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15408",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:09.247",
"lastModified": "2024-11-21T03:50:43.570",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -239,7 +239,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -247,7 +247,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -255,7 +255,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15409.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15409.json
index c1884aa2716..304406fcf74 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15409.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15409.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15409",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:09.373",
"lastModified": "2024-11-21T03:50:43.710",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -234,7 +234,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -242,7 +242,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -250,7 +250,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15410.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15410.json
index d76d7ec9113..040115a44a3 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15410.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15410.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15410",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:09.483",
"lastModified": "2024-11-21T03:50:43.853",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -255,7 +255,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -263,7 +263,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -271,7 +271,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15411.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15411.json
index 674ec0a1183..1a1648bc2f9 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15411.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15411.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15411",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:09.607",
"lastModified": "2024-11-21T03:50:43.997",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -239,7 +239,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -247,7 +247,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -255,7 +255,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15412.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15412.json
index 92b81960950..e7876ad962e 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15412.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15412.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15412",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:09.733",
"lastModified": "2024-11-21T03:50:44.143",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -239,7 +239,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -247,7 +247,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -255,7 +255,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15413.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15413.json
index 217442d40c0..dba0b8d2ddc 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15413.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15413.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15413",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:09.840",
"lastModified": "2024-11-21T03:50:44.300",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -239,7 +239,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -247,7 +247,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -255,7 +255,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15414.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15414.json
index 94f020f7bf9..89c764db269 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15414.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15414.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15414",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:09.950",
"lastModified": "2024-11-21T03:50:44.447",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -239,7 +239,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105374",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -247,7 +247,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041689",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -255,7 +255,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180919-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15415.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15415.json
index 27dcee22850..2d2c5d3d22a 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15415.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15415.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15415",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:10.060",
"lastModified": "2024-11-21T03:50:44.600",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -239,7 +239,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -247,7 +247,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -255,7 +255,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15416.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15416.json
index 070457d959f..0d15a96a96b 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15416.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15416.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15416",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:10.187",
"lastModified": "2024-11-21T03:50:44.753",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -239,7 +239,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -247,7 +247,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -255,7 +255,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15417.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15417.json
index f4eeb3271b3..1ec74e92c09 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15417.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15417.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15417",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:10.293",
"lastModified": "2024-11-21T03:50:44.900",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -239,7 +239,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -247,7 +247,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -255,7 +255,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15418.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15418.json
index 40f5bcad900..536d096f515 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15418.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15418.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15418",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:10.403",
"lastModified": "2024-11-21T03:50:45.070",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -255,7 +255,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -263,7 +263,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -271,7 +271,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15419.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15419.json
index 645959e6827..06339c88b67 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15419.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15419.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15419",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:10.513",
"lastModified": "2024-11-21T03:50:45.217",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -239,7 +239,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -247,7 +247,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -255,7 +255,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15420.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15420.json
index d2411ac9edb..686143776cc 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15420.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15420.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15420",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:10.637",
"lastModified": "2024-11-21T03:50:45.360",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -239,7 +239,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -247,7 +247,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -255,7 +255,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15421.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15421.json
index 05418924065..eebb125e089 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15421.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15421.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15421",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:10.747",
"lastModified": "2024-11-21T03:50:45.517",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -239,7 +239,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105374",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -247,7 +247,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041689",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -255,7 +255,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180919-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15422.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15422.json
index d034f377b72..9816a6f4723 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15422.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15422.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15422",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:10.857",
"lastModified": "2024-11-21T03:50:45.667",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -239,7 +239,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105374",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -247,7 +247,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041689",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -255,7 +255,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180919-webex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15423.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15423.json
index 66bad9c1868..1872230c487 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15423.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15423.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15423",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:10.967",
"lastModified": "2024-11-21T03:50:45.813",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-hyperflex-clickjacking",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15424.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15424.json
index d1fa3c23f31..e9f979264d1 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15424.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15424.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15424",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:11.077",
"lastModified": "2024-11-21T03:50:45.950",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041792",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ise-mult-vulns",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15425.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15425.json
index babc38ee569..d10fd169915 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15425.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15425.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15425",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:11.187",
"lastModified": "2024-11-21T03:50:46.090",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041792",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ise-mult-vulns",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15426.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15426.json
index 7b5e0a0d874..7add9818508 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15426.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15426.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15426",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:11.310",
"lastModified": "2024-11-21T03:50:46.233",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041781",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uc-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15427.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15427.json
index a2d19b8638c..9087b654c4a 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15427.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15427.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15427",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:11.420",
"lastModified": "2024-11-21T03:50:46.373",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105381",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -151,7 +151,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041733",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -159,7 +159,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180921-vsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15428.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15428.json
index 38078eff523..731b6d655f8 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15428.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15428.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15428",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:11.543",
"lastModified": "2024-11-21T03:50:46.520",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -203,7 +203,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041790",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -211,7 +211,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-iosxr-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15429.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15429.json
index 4badc67c1e6..48bf6fe67e8 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15429.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15429.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15429",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:11.670",
"lastModified": "2024-11-21T03:50:46.663",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-hyperflex-uda",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15430.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15430.json
index a9d20825f4e..76ac03cff35 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15430.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15430.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15430",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:11.793",
"lastModified": "2024-11-21T03:50:46.800",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041784",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-express-vcs-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15431.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15431.json
index 5f105f4122e..9497550d151 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15431.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15431.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15431",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:11.903",
"lastModified": "2024-11-21T03:50:46.947",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105520",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -156,7 +156,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -164,7 +164,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15432.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15432.json
index 233706e4c97..cc2f19368ef 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15432.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15432.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15432",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:12.013",
"lastModified": "2024-11-21T03:50:47.103",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105563",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-pi-id",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15433.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15433.json
index 8319d8592f4..5d64935b149 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15433.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15433.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15433",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:12.137",
"lastModified": "2024-11-21T03:50:47.250",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105562",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -114,7 +114,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-prime-id",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15434.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15434.json
index 1781b90c840..7bef0b34779 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15434.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15434.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15434",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:12.233",
"lastModified": "2024-11-21T03:50:47.400",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1041791",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -231,7 +231,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15435.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15435.json
index 1c03de73235..18a703d8c75 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15435.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15435.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15435",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T21:49:52.977",
"lastModified": "2024-11-21T03:50:47.560",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105663",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-sm-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15436.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15436.json
index ea0b30adf59..f5c0da64e49 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15436.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15436.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15436",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-05T14:29:12.373",
"lastModified": "2024-11-21T03:50:47.703",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -124,7 +124,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105557",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -132,7 +132,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041793",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -140,7 +140,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041794",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -148,7 +148,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15437.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15437.json
index c47cbbf0cca..70b94877624 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15437.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15437.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15437",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T17:29:00.560",
"lastModified": "2024-11-21T03:50:47.860",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105867",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -153,14 +153,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-imm-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/45829/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15438.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15438.json
index ac410f4205d..a6a343e50b6 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15438.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15438.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15438",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-17T22:29:00.833",
"lastModified": "2024-11-21T03:50:48.027",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105670",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041930",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-cpca-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15439.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15439.json
index 6ce1a19f5ea..cd83d5e697a 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15439.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15439.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15439",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T17:29:00.607",
"lastModified": "2024-11-21T03:50:48.200",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3191,7 +3191,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105873",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -3199,7 +3199,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15440.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15440.json
index af52f64e748..fd225960450 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15440.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15440.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15440",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-15T19:29:00.343",
"lastModified": "2024-11-21T03:50:48.457",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106513",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-ise-multi-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15441.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15441.json
index 635623c1233..0d06cff2401 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15441.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15441.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15441",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-28T18:29:00.540",
"lastModified": "2024-11-21T03:50:48.593",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106039",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -141,7 +141,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181128-plm-sql-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15442.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15442.json
index 9a476d5f1a4..4b1c4ddbabc 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15442.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15442.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15442",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-10-24T19:29:00.290",
"lastModified": "2024-11-21T03:50:48.723",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105734",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "http://www.securitytracker.com/id/1041942",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -150,14 +150,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181024-webex-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/45695/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -166,7 +166,7 @@
},
{
"url": "https://www.exploit-db.com/exploits/45696/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15443.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15443.json
index b96b3de56ad..23102c31ce8 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15443.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15443.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15443",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T17:29:00.653",
"lastModified": "2024-11-21T03:50:48.860",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105870",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-fde-tcp-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15444.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15444.json
index daa38494c79..3cc8f36f98c 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15444.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15444.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15444",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T18:29:00.303",
"lastModified": "2024-11-21T03:50:48.980",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105860",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-ems-xml-xxe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Vendor Advisory"
@@ -142,7 +142,7 @@
},
{
"url": "https://www.tenable.com/security/research/tra-2018-36",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Mitigation",
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15445.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15445.json
index 215df354b0b..6c6f66425be 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15445.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15445.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15445",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T18:29:00.367",
"lastModified": "2024-11-21T03:50:49.113",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105859",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,14 +134,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-ems-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2018-36",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15446.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15446.json
index 28708082ec3..d70c1ee1d08 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15446.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15446.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15446",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T18:29:00.413",
"lastModified": "2024-11-21T03:50:49.273",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105856",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-meeting-server",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15447.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15447.json
index 61ad976527f..033951d91eb 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15447.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15447.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15447",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T19:29:00.597",
"lastModified": "2024-11-21T03:50:49.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105855",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-cimc-sql-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15448.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15448.json
index b664d303af4..6e74cb0e647 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15448.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15448.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15448",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T19:29:01.113",
"lastModified": "2024-11-21T03:50:49.547",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105862",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-res-info-disc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15449.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15449.json
index 14a497e1808..0f777bfe97c 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15449.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15449.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15449",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T19:29:01.723",
"lastModified": "2024-11-21T03:50:49.670",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105863",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vsms-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15450.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15450.json
index 46723fc54e0..a4ceb60dd99 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15450.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15450.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15450",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T20:29:00.230",
"lastModified": "2024-11-21T03:50:49.800",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105864",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-pca-overwrite",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15451.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15451.json
index 39a4fd94c24..179587f97f1 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15451.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15451.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15451",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-08T20:29:00.290",
"lastModified": "2024-11-21T03:50:49.933",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105857",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-psc-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15452.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15452.json
index db85656eae2..244b8c1660c 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15452.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15452.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15452",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-13T14:29:00.230",
"lastModified": "2024-11-21T03:50:50.077",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105759",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -146,7 +146,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181029-amp-dll",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15453.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15453.json
index 192f6fabc18..d866d8bcefc 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15453.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15453.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15453",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-10T18:29:00.500",
"lastModified": "2024-11-21T03:50:50.217",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106511",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -141,7 +141,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15454.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15454.json
index b42afc17594..fb3d220539d 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15454.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15454.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15454",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-11-01T12:29:00.190",
"lastModified": "2024-11-21T03:50:50.363",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/105768",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -202,7 +202,7 @@
},
{
"url": "http://www.securitytracker.com/id/1042129",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -210,7 +210,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181031-asaftd-sip-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15455.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15455.json
index d85d0abaf15..6a2718d7508 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15455.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15455.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15455",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-23T22:29:00.400",
"lastModified": "2024-11-21T03:50:50.500",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,14 +136,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106708",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-isel-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15456.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15456.json
index 6318aa81370..5135abee50b 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15456.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15456.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15456",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-10T18:29:00.577",
"lastModified": "2024-11-21T03:50:50.640",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106512",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-ise-passwd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15457.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15457.json
index 1cf048290f7..d5c87614870 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15457.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15457.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15457",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-10T19:29:00.457",
"lastModified": "2024-11-21T03:50:50.777",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106509",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-cpi-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15458.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15458.json
index 7f2dadc3730..0514bf9e5e9 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15458.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15458.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15458",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-10T19:29:00.517",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106516",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-fpwr-mc-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15459.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15459.json
index 91558d8916f..1c4f00e643a 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15459.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15459.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15459",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-23T22:29:00.447",
"lastModified": "2024-11-21T03:50:51.083",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,14 +131,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106707",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-ise-privilege",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15460.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15460.json
index 2ba470d1d49..d032aec6af0 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15460.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15460.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15460",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-10T22:29:00.237",
"lastModified": "2024-11-21T03:50:51.233",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106507",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -156,7 +156,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15461.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15461.json
index fa5796fa214..71d444b103b 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15461.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15461.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15461",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-10T23:29:00.247",
"lastModified": "2024-11-21T03:50:51.383",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106505",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-webex-bs-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15462.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15462.json
index 57ea9091292..5c53bcdad87 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15462.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15462.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15462",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:00.290",
"lastModified": "2024-11-21T03:50:51.507",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,11 +134,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108178",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-firepower-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15463.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15463.json
index a30641f2bb6..7a3966a3ba9 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15463.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15463.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15463",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-15T20:29:00.287",
"lastModified": "2024-11-21T03:50:51.647",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106513",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-ise-multi-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15464.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15464.json
index a62a4337c5b..b57ab6b9436 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15464.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15464.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15464",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-11T15:29:00.247",
"lastModified": "2024-11-21T03:50:51.773",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106550",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-asr900-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15465.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15465.json
index 772e6016026..88738229175 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15465.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15465.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15465",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2018-12-24T14:29:00.723",
"lastModified": "2024-11-21T03:50:51.913",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -155,7 +155,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106256",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -163,14 +163,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181219-asa-privesc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2018-46",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15466.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15466.json
index 61c61fd6370..c7ec39b3420 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15466.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15466.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15466",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-11T15:29:00.297",
"lastModified": "2024-11-21T03:50:52.070",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106517",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-cps-graphite-access",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15467.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15467.json
index 1780fc6fde6..0022b7bfdf4 100644
--- a/CVE-2018/CVE-2018-154xx/CVE-2018-15467.json
+++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15467.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2018-15467",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-11T15:29:00.327",
"lastModified": "2024-11-21T03:50:52.207",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106508",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-tms-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9375.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9375.json
index baec8b38950..2e73d0894db 100644
--- a/CVE-2018/CVE-2018-93xx/CVE-2018-9375.json
+++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9375.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@android.com",
"published": "2025-01-17T23:15:11.500",
"lastModified": "2025-01-21T17:15:11.717",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9379.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9379.json
index b04ebdd8914..7e85d4c4518 100644
--- a/CVE-2018/CVE-2018-93xx/CVE-2018-9379.json
+++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9379.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@android.com",
"published": "2025-01-17T23:15:11.810",
"lastModified": "2025-01-21T17:15:11.873",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9382.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9382.json
index 03c7c8cee1c..84c821d949d 100644
--- a/CVE-2018/CVE-2018-93xx/CVE-2018-9382.json
+++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9382.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@android.com",
"published": "2025-01-17T23:15:11.913",
"lastModified": "2025-01-21T17:15:12.020",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9383.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9383.json
index 719ce058125..b9eb5c1150f 100644
--- a/CVE-2018/CVE-2018-93xx/CVE-2018-9383.json
+++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9383.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@android.com",
"published": "2025-01-17T23:15:12.020",
"lastModified": "2025-01-21T17:15:12.167",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9384.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9384.json
index eb998329d76..1b8ac5b53c7 100644
--- a/CVE-2018/CVE-2018-93xx/CVE-2018-9384.json
+++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9384.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@android.com",
"published": "2025-01-17T23:15:12.120",
"lastModified": "2025-01-21T17:15:12.330",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9387.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9387.json
index 99a43acc49c..f5fa6ba1532 100644
--- a/CVE-2018/CVE-2018-93xx/CVE-2018-9387.json
+++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9387.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@android.com",
"published": "2025-01-18T00:15:23.930",
"lastModified": "2025-01-21T16:15:11.453",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9401.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9401.json
index 15e3831db7b..2282ef51862 100644
--- a/CVE-2018/CVE-2018-94xx/CVE-2018-9401.json
+++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9401.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@android.com",
"published": "2025-01-18T00:15:24.707",
"lastModified": "2025-01-21T16:15:11.637",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9405.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9405.json
index 91028882e27..9d27210f25e 100644
--- a/CVE-2018/CVE-2018-94xx/CVE-2018-9405.json
+++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9405.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@android.com",
"published": "2025-01-18T00:15:24.807",
"lastModified": "2025-01-21T16:15:11.810",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9434.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9434.json
index 714b62c78ad..0cd81fc4cfc 100644
--- a/CVE-2018/CVE-2018-94xx/CVE-2018-9434.json
+++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9434.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@android.com",
"published": "2025-01-17T23:15:12.230",
"lastModified": "2025-01-21T17:15:12.493",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9447.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9447.json
index c32497ffccd..65794775ae1 100644
--- a/CVE-2018/CVE-2018-94xx/CVE-2018-9447.json
+++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9447.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@android.com",
"published": "2025-01-17T23:15:12.327",
"lastModified": "2025-01-21T17:15:12.650",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9461.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9461.json
index aaaa0adc258..4f0bdf7702d 100644
--- a/CVE-2018/CVE-2018-94xx/CVE-2018-9461.json
+++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9461.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@android.com",
"published": "2025-01-18T00:15:25.043",
"lastModified": "2025-01-21T16:15:11.970",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9464.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9464.json
index 9242a87d9ef..85e9c096e68 100644
--- a/CVE-2018/CVE-2018-94xx/CVE-2018-9464.json
+++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9464.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@android.com",
"published": "2025-01-18T00:15:25.163",
"lastModified": "2025-01-21T16:15:12.133",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12619.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12619.json
index 5c5e6d50535..c9c5252e77a 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12619.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12619.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12619",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:10.817",
"lastModified": "2024-11-21T04:23:12.100",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -171,7 +171,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-sqlinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12620.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12620.json
index edeb698cd5a..d47e70df911 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12620.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12620.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12620",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-18T17:15:15.880",
"lastModified": "2024-11-21T04:23:12.247",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -298,7 +298,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190918-hyperflex-valinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12621.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12621.json
index 410ebfb112d..cd15abdb807 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12621.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12621.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12621",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T18:15:13.353",
"lastModified": "2024-11-21T04:23:12.397",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -273,7 +273,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-hyperflex-sslkey",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12622.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12622.json
index 339a14303db..8e1cb78cdf1 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12622.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12622.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12622",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T18:15:13.430",
"lastModified": "2024-11-21T04:23:12.533",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -217,7 +217,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-roomos-privesc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12623.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12623.json
index 89613722bc4..f8c677d00a5 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12623.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12623.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12623",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T18:15:13.493",
"lastModified": "2024-11-21T04:23:12.670",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-nfv-enumeration",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12624.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12624.json
index bcb32dbacf7..45fc8cea8a9 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12624.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12624.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12624",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:13.123",
"lastModified": "2024-11-21T04:23:12.800",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -225,7 +225,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-iosxe-ngwc-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12625.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12625.json
index 1e824c598fd..e62078f4375 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12625.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12625.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12625",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-05T19:15:10.477",
"lastModified": "2024-11-21T04:23:12.933",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,15 +127,15 @@
"references": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12626.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12626.json
index 345f857277e..674480184cb 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12626.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12626.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12626",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:13.217",
"lastModified": "2024-11-21T04:23:13.073",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-ccx-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12627.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12627.json
index fce39d63be6..eeefe575b9f 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12627.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12627.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12627",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:13.293",
"lastModified": "2024-11-21T04:23:13.203",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -276,7 +276,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-frpwr-td-info",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12629.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12629.json
index d5bc8e4cb88..ad41f4e356b 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12629.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12629.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12629",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:11.083",
"lastModified": "2024-11-21T04:23:13.343",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -171,7 +171,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-cmd-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12630.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12630.json
index d06a985deda..25f91a8ff98 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12630.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12630.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12630",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:11.953",
"lastModified": "2024-11-21T04:23:13.470",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-sm-java-deserial",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12631.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12631.json
index 046aab97b61..b6065ab1f5d 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12631.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12631.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12631",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.000",
"lastModified": "2024-11-21T04:23:13.600",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ise-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12632.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12632.json
index d3915c5e36d..636e443a244 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12632.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12632.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12632",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-05T02:15:12.527",
"lastModified": "2024-11-21T04:23:13.730",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-finesse-ssrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12633.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12633.json
index 602e27027fd..3b75c432c32 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12633.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12633.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12633",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-05T02:15:12.620",
"lastModified": "2024-11-21T04:23:13.857",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-unified-ccx-ssrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12634.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12634.json
index 492312db21c..58986139b4a 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12634.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12634.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12634",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:13.387",
"lastModified": "2024-11-21T04:23:13.987",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -164,7 +164,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-ucs-imc-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12635.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12635.json
index 78d109a0e3c..913c97f7f82 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12635.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12635.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12635",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-05T02:15:12.683",
"lastModified": "2024-11-21T04:23:14.110",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-sma-info-dis",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12636.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12636.json
index 9077b047a10..a2dbf2d8b53 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12636.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12636.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12636",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:10.987",
"lastModified": "2024-11-21T04:23:14.233",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3137,7 +3137,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12637.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12637.json
index 1cb2b1e4571..a9708f004c1 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12637.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12637.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12637",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:11.190",
"lastModified": "2024-11-21T04:23:14.463",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -214,7 +214,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-ise-stored-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12638.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12638.json
index 6d61cf85fa0..ada62173a94 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12638.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12638.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12638",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:11.320",
"lastModified": "2024-11-21T04:23:14.620",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -229,7 +229,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-ise-store-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12643.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12643.json
index 70ea3de2752..ba5ce1029bc 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12643.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12643.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12643",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-28T19:15:10.757",
"lastModified": "2024-11-21T04:23:14.753",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -173,7 +173,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-iosxe-rest-auth-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12644.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12644.json
index 0a2f20f95fb..94be93ca1bf 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12644.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12644.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12644",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-05T02:15:12.760",
"lastModified": "2024-11-21T04:23:14.910",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,7 +132,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-ise-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12645.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12645.json
index 9da178697ff..f495e3cda85 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12645.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12645.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12645",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-05T02:15:12.807",
"lastModified": "2024-11-21T04:23:15.040",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-jcf-codex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12646.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12646.json
index 78c2e2966d6..819af757918 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12646.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12646.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12646",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T20:15:10.353",
"lastModified": "2024-11-21T04:23:15.173",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -255,7 +255,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-sip-alg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12647.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12647.json
index 0ad4ecefdb0..88d459a4335 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12647.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12647.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12647",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T20:15:10.417",
"lastModified": "2024-11-21T04:23:15.310",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -275,7 +275,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-identd-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12648.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12648.json
index 72006d3a43b..e476da5bdaa 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12648.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12648.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12648",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T20:15:10.477",
"lastModified": "2024-11-21T04:23:15.463",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -160,7 +160,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-ios-gos-auth",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12649.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12649.json
index c26b1408c21..e3778f8e7af 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12649.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12649.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12649",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T20:15:10.557",
"lastModified": "2024-11-21T04:23:15.607",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -575,7 +575,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-digsig-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12650.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12650.json
index 6530fa82d46..9269a4e1731 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12650.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12650.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12650",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T20:15:10.650",
"lastModified": "2024-11-21T04:23:15.763",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -852,7 +852,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-webui-cmd-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12651.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12651.json
index f8aebcd32b7..c4ea74fa8b5 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12651.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12651.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12651",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T20:15:10.713",
"lastModified": "2024-11-21T04:23:15.917",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -182,7 +182,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-webui-cmd-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12652.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12652.json
index 5814f29c5ac..fa81845a78b 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12652.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12652.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12652",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:10.593",
"lastModified": "2024-11-21T04:23:16.060",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -165,7 +165,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-cat4000-tcp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12653.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12653.json
index c25c4dbf1cd..02dd3bc2a72 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12653.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12653.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12653",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:10.657",
"lastModified": "2024-11-21T04:23:16.193",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -165,7 +165,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-rawtcp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12654.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12654.json
index 79422854b30..e17ad03a0cc 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12654.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12654.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12654",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:10.717",
"lastModified": "2024-11-21T04:23:16.343",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -225,7 +225,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-sip-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12655.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12655.json
index bea31faa3d6..c83752776b0 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12655.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12655.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12655",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:10.780",
"lastModified": "2024-11-21T04:23:16.480",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -157,7 +157,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-ftp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12656.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12656.json
index bab8e39e8db..79b966646c5 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12656.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12656.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12656",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:10.827",
"lastModified": "2024-11-21T04:23:16.617",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -363,7 +363,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iox",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12657.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12657.json
index 98dd5698e7e..2162b3272df 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12657.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12657.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12657",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:10.890",
"lastModified": "2024-11-21T04:23:16.767",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -720,7 +720,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-utd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12658.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12658.json
index 0ca76685caa..1dda879fa99 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12658.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12658.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12658",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:10.953",
"lastModified": "2024-11-21T04:23:17.553",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -890,7 +890,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-fsdos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12659.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12659.json
index 5c8aa721e82..59240f47e6d 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12659.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12659.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12659",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.030",
"lastModified": "2024-11-21T04:23:17.700",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -140,7 +140,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-httpserv-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12660.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12660.json
index f9be8bf774b..ab7189731f1 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12660.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12660.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12660",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.077",
"lastModified": "2024-11-21T04:23:17.837",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-awr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12661.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12661.json
index dface6fdaf2..794a99bcb3f 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12661.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12661.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12661",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.157",
"lastModified": "2024-11-21T04:23:17.970",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -158,7 +158,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-vman-cmd-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12662.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12662.json
index d5a88888fb7..2f5b0c8035d 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12662.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12662.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12662",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.203",
"lastModified": "2024-11-21T04:23:18.110",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1697,7 +1697,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-vman",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12663.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12663.json
index 29f08bccff6..978dca2586c 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12663.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12663.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12663",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.267",
"lastModified": "2024-11-21T04:23:18.320",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -380,7 +380,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-ctspac-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12664.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12664.json
index 8246b57acb0..ca7d64a275d 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12664.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12664.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12664",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.343",
"lastModified": "2024-11-21T04:23:18.470",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -150,7 +150,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-isdn-data-leak",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12665.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12665.json
index 7df61cdabcf..3db7c03d186 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12665.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12665.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12665",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.390",
"lastModified": "2024-11-21T04:23:18.620",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-http-client",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12666.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12666.json
index 4397a86b8a3..ef60e911d45 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12666.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12666.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12666",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.453",
"lastModified": "2024-11-21T04:23:18.757",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -142,7 +142,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-dt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12667.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12667.json
index 593e2d7915e..c5c23ae1a08 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12667.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12667.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12667",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.517",
"lastModified": "2024-11-21T04:23:18.900",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -137,7 +137,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12668.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12668.json
index da2e85ea655..fd88bf6fd78 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12668.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12668.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12668",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.577",
"lastModified": "2024-11-21T04:23:19.040",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -241,7 +241,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-sbxss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12669.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12669.json
index 8b8ef2afa5b..a6f520ddc04 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12669.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12669.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12669",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.623",
"lastModified": "2024-11-21T04:23:19.187",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -160,7 +160,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-tsec",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12670.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12670.json
index aa8c1612e66..9d8458c5f7b 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12670.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12670.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12670",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.687",
"lastModified": "2024-11-21T04:23:19.320",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iox-gs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12671.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12671.json
index 001ded2eaa3..d67577c5017 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12671.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12671.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12671",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.750",
"lastModified": "2024-11-21T04:23:19.470",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -285,7 +285,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-ctbypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12672.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12672.json
index 45f4a08c363..a1696c07bc2 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12672.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12672.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12672",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.827",
"lastModified": "2024-11-21T04:23:19.617",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-codeexec",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12673.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12673.json
index ea336f1ac2f..5ea908e9e50 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12673.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12673.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12673",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.077",
"lastModified": "2024-11-21T04:23:19.777",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -237,7 +237,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12674.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12674.json
index 60e103eb0be..e148f5b0661 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12674.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12674.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12674",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.123",
"lastModified": "2024-11-21T04:23:19.917",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -345,7 +345,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ftd-container-esc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12675.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12675.json
index e9019849f4d..f1c69dab5e5 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12675.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12675.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12675",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.203",
"lastModified": "2024-11-21T04:23:20.060",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -345,7 +345,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ftd-container-esc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12676.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12676.json
index bbcfc477e7e..beae1089d08 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12676.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12676.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12676",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.263",
"lastModified": "2024-11-21T04:23:20.210",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -237,7 +237,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ospf-lsa-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12677.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12677.json
index 17f445f9998..e3f626520fd 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12677.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12677.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12677",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.327",
"lastModified": "2024-11-21T04:23:20.353",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -221,7 +221,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ssl-vpn-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12678.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12678.json
index 91343b650b6..0176343d5d7 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12678.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12678.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12678",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.390",
"lastModified": "2024-11-21T04:23:20.490",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ftd-sip-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12679.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12679.json
index 6399814e559..015a9403070 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12679.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12679.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12679",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.453",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12680.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12680.json
index c6df2e11f8e..674d23f2703 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12680.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12680.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12680",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.500",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12681.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12681.json
index 2555c1cf4ac..c530be02ac9 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12681.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12681.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12681",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.577",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12682.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12682.json
index b53da3a25cf..c5cc1aa549f 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12682.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12682.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12682",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.703",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12683.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12683.json
index 38d3b9dd222..66324ad4115 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12683.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12683.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12683",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.780",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12684.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12684.json
index ed40a65dadd..c33bb3f91bf 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12684.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12684.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12684",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.827",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12685.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12685.json
index 9c6e26cae0c..290d747720e 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12685.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12685.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12685",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.890",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12686.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12686.json
index 21c24ec7528..bd00061e65e 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12686.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12686.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12686",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:12.953",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-sql-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12687.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12687.json
index b8afefa1ba3..724d526428f 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12687.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12687.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12687",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.017",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12688.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12688.json
index 3ef962e4065..761748bd04e 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12688.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12688.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12688",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.077",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12689.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12689.json
index 2b761728999..937cb99c949 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12689.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12689.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12689",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.140",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-rce-12689",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12690.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12690.json
index f0c4fc49f2f..61c21f3283a 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12690.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12690.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12690",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.203",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-com-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12691.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12691.json
index 66cfd124750..6179079c833 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12691.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12691.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12691",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.263",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fmc-dir-trav",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12693.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12693.json
index 1448ea65f92..e50173b5dbd 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12693.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12693.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12693",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.327",
"lastModified": "2024-11-21T04:23:22.473",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -218,7 +218,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-scp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12694.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12694.json
index d211585fc91..3d2ceeb77a2 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12694.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12694.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12694",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.390",
"lastModified": "2024-11-21T04:23:22.610",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ftd-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12695.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12695.json
index 1ab95a79fc6..6caf2646c8b 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12695.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12695.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12695",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.467",
"lastModified": "2024-11-21T04:23:22.757",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12696.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12696.json
index bbbdfd5be9b..88d078de91d 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12696.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12696.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12696",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.547",
"lastModified": "2024-11-21T04:23:22.890",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -260,7 +260,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-firepwr-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12697.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12697.json
index fd23991cf9b..5abf871420d 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12697.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12697.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12697",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.593",
"lastModified": "2024-11-21T04:23:23.040",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -260,7 +260,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-firepwr-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12698.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12698.json
index aa477dc5c7a..f23570845fc 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12698.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12698.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12698",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.657",
"lastModified": "2024-11-21T04:23:23.187",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ftd-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12699.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12699.json
index a78b40bb411..2cbd80de4ac 100644
--- a/CVE-2019/CVE-2019-126xx/CVE-2019-12699.json
+++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12699.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12699",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.733",
"lastModified": "2024-11-21T04:23:23.350",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -250,7 +250,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fxos-cmd-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12700.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12700.json
index aa59c4a685c..cf6458a3b10 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12700.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12700.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12700",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.810",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -278,7 +278,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ftd-fpmc-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12701.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12701.json
index dffc003cfce..21bd92edb2e 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12701.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12701.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12701",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.890",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-fire-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12702.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12702.json
index 83fcc0e99ba..c55058a78da 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12702.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12702.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12702",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:11.427",
"lastModified": "2024-11-21T04:23:23.773",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-reflected-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12703.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12703.json
index 782d95db51c..c8c619debbe 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12703.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12703.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12703",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:11.550",
"lastModified": "2024-11-21T04:23:23.900",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -161,7 +161,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-dhcp-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12704.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12704.json
index 8b49a5664ed..6763ad1bd02 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12704.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12704.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12704",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:11.643",
"lastModified": "2024-11-21T04:23:24.040",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-ui-disclosure",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12705.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12705.json
index 0eca92af77d..96b72be6bf2 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12705.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12705.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12705",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:11.737",
"lastModified": "2024-11-21T04:23:24.170",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-vcs-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12706.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12706.json
index 905ca58f7be..4af4cee4656 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12706.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12706.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12706",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:13.967",
"lastModified": "2024-11-21T04:23:24.300",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-esa-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12707.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12707.json
index 415b87d8000..a4205f48793 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12707.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12707.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12707",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:14.030",
"lastModified": "2024-11-21T04:23:24.437",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -183,7 +183,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-cuc-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12708.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12708.json
index 57c05e9d311..1dac8965ce0 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12708.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12708.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12708",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:11.847",
"lastModified": "2024-11-21T04:23:24.573",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,14 +209,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-credentials",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2019-44",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12709.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12709.json
index 593e4d83ca2..c7d57918d3c 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12709.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12709.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12709",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.873",
"lastModified": "2024-11-21T04:23:24.713",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-xr-asr9k-privesc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12710.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12710.json
index 822d5d3818e..3fb1221eebb 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12710.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12710.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12710",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:14.093",
"lastModified": "2024-11-21T04:23:24.877",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-cuc-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12711.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12711.json
index 1448442a384..d0d4627ece9 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12711.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12711.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12711",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:14.187",
"lastModified": "2024-11-21T04:23:25.020",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-cucm-xxe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12712.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12712.json
index 4e153c238ae..b8df65292d5 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12712.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12712.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12712",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:14.250",
"lastModified": "2024-11-21T04:23:25.137",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-pi-xss-12712",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12713.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12713.json
index 1500d21dd40..cb89f8576c4 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12713.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12713.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12713",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:14.310",
"lastModified": "2024-11-21T04:23:25.253",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-pi-xss-12713",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12714.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12714.json
index 77f538fdeb6..97b3fda2fa1 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12714.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12714.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12714",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:14.420",
"lastModified": "2024-11-21T04:23:25.383",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ic3000-icg-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12715.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12715.json
index a77585db571..c5a0f377aaf 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12715.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12715.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12715",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:14.483",
"lastModified": "2024-11-21T04:23:25.507",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-cucm-xss-12715",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12716.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12716.json
index 50e8c5d7dc4..334772ca66a 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12716.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12716.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12716",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:14.560",
"lastModified": "2024-11-21T04:23:25.627",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-cucm-xss-12716",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12717.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12717.json
index f732b8d230d..c245c18f82d 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12717.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12717.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12717",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-25T21:15:11.937",
"lastModified": "2024-11-21T04:23:25.750",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -651,7 +651,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-nxos-vman-cmd-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-127xx/CVE-2019-12718.json b/CVE-2019/CVE-2019-127xx/CVE-2019-12718.json
index b1964bb52e5..a62d11b9a51 100644
--- a/CVE-2019/CVE-2019-127xx/CVE-2019-12718.json
+++ b/CVE-2019/CVE-2019-127xx/CVE-2019-12718.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-12718",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:11.973",
"lastModified": "2024-11-21T04:23:25.923",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3137,7 +3137,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15240.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15240.json
index 07a94c08911..4524dae1542 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15240.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15240.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15240",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:12.083",
"lastModified": "2024-11-21T04:28:16.327",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15241.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15241.json
index 65bf79f88c5..bbd27a60af9 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15241.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15241.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15241",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:12.190",
"lastModified": "2024-11-21T04:28:16.467",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15242.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15242.json
index e7d15161797..23b44c68a6e 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15242.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15242.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15242",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:12.317",
"lastModified": "2024-11-21T04:28:16.597",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15243.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15243.json
index d7cd4db1e00..701558fd9f7 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15243.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15243.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15243",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:12.427",
"lastModified": "2024-11-21T04:28:16.730",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15244.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15244.json
index 188c5c24357..36833fae819 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15244.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15244.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15244",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:12.550",
"lastModified": "2024-11-21T04:28:16.850",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15245.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15245.json
index e4c3758c18e..acad45b6599 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15245.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15245.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15245",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:12.660",
"lastModified": "2024-11-21T04:28:16.980",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15246.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15246.json
index 2cd743fda81..73c3b65cec4 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15246.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15246.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15246",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:12.770",
"lastModified": "2024-11-21T04:28:17.113",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15247.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15247.json
index feb8f45f695..8be381f8068 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15247.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15247.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15247",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:12.880",
"lastModified": "2024-11-21T04:28:17.257",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15248.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15248.json
index 563040056d7..573bb6d94a4 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15248.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15248.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15248",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:12.973",
"lastModified": "2024-11-21T04:28:17.400",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15249.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15249.json
index 2526d0fee06..2419f671179 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15249.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15249.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15249",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:13.113",
"lastModified": "2024-11-21T04:28:17.537",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15250.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15250.json
index c442f96383d..6c0f8ed18f0 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15250.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15250.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15250",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:13.237",
"lastModified": "2024-11-21T04:28:17.670",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15251.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15251.json
index 091eb781657..1784e2749b0 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15251.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15251.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15251",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:13.333",
"lastModified": "2024-11-21T04:28:17.827",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15252.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15252.json
index 26631a33df5..abbcd684835 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15252.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15252.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15252",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:13.440",
"lastModified": "2024-11-21T04:28:17.967",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15253.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15253.json
index 1a2ffeb27bd..48f52d81ff7 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15253.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15253.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15253",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-05T18:15:10.533",
"lastModified": "2024-11-21T04:28:18.113",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/157668/Cisco-Digital-Network-Architecture-Center-1.3.1.4-Cross-Site-Scripting.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -145,7 +145,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190205-dnac-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15255.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15255.json
index d705d3b1b66..2ddde8eef54 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15255.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15255.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15255",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:11.567",
"lastModified": "2024-11-21T04:28:18.257",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-ise-auth-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15256.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15256.json
index 9e0b38e0206..20382cbbda0 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15256.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15256.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15256",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:15.217",
"lastModified": "2024-11-21T04:28:18.393",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -527,7 +527,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ftd-ikev1-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15257.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15257.json
index b68e9ba55da..0e41bc18b0c 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15257.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15257.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15257",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:13.537",
"lastModified": "2024-11-21T04:28:18.550",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,14 +209,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-running-config",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2019-44",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15258.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15258.json
index b3247b508a8..a15d3281260 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15258.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15258.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15258",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:13.630",
"lastModified": "2024-11-21T04:28:18.680",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,14 +209,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-webui-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2019-44",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15259.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15259.json
index a71893c7123..0014051e1dd 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15259.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15259.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15259",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:15.297",
"lastModified": "2024-11-21T04:28:18.810",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-uccx-http",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15260.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15260.json
index d6e86db1e3f..6c1708806b9 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15260.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15260.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15260",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:13.723",
"lastModified": "2024-11-21T04:28:18.930",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -329,7 +329,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-airo-unauth-access",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15261.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15261.json
index 33f4df29fb2..959307cc5de 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15261.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15261.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15261",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:13.847",
"lastModified": "2024-11-21T04:28:19.067",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -242,7 +242,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-airo-pptp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15262.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15262.json
index 2cd81bdcd95..bf28c179771 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15262.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15262.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15262",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:13.940",
"lastModified": "2024-11-21T04:28:19.203",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -169,7 +169,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-wlc-ssh-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15264.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15264.json
index a18f3f80c95..6194ed57a9f 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15264.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15264.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15264",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:14.050",
"lastModified": "2024-11-21T04:28:19.327",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -352,7 +352,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-airo-capwap-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15265.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15265.json
index 184b296d3a4..f62cfa10655 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15265.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15265.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15265",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:14.147",
"lastModified": "2024-11-21T04:28:19.460",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -323,7 +323,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-airo-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15266.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15266.json
index ecfcc821b97..2e2f120a57b 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15266.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15266.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15266",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:14.253",
"lastModified": "2024-11-21T04:28:19.597",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-wlc-pathtrav",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15268.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15268.json
index 3dc41621ee1..40534f512b3 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15268.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15268.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15268",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:14.347",
"lastModified": "2024-11-21T04:28:19.720",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1711,7 +1711,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-firepwr-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15269.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15269.json
index 73bf43673c5..b95caf2dd35 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15269.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15269.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15269",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:14.440",
"lastModified": "2024-11-21T04:28:19.893",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1711,7 +1711,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-firepwr-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15270.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15270.json
index 6faeee8d022..dcdbad399ea 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15270.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15270.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15270",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:14.537",
"lastModified": "2024-11-21T04:28:20.103",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -191,7 +191,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-firepwr-stored-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15271.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15271.json
index 2ae27068dfd..19e9a6f75c9 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15271.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15271.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15271",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T03:15:11.050",
"lastModified": "2024-11-21T04:28:20.240",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -92,7 +92,7 @@
"cisaVulnerabilityName": "Cisco RV Series Routers Deserialization of Untrusted Data Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -229,7 +229,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbrv-cmd-x",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15272.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15272.json
index 59be6de1adb..353f2a8c4ed 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15272.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15272.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15272",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:15.343",
"lastModified": "2024-11-21T04:28:21.120",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ucm-secbypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15273.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15273.json
index ee0ed6faca4..401c6d1d1b5 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15273.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15273.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15273",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:14.630",
"lastModified": "2024-11-21T04:28:21.247",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-tele-ce-file-ovrwrt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15274.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15274.json
index b60eaf8162b..11105b35343 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15274.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15274.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15274",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:14.817",
"lastModified": "2024-11-21T04:28:21.370",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-tele-ce-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15275.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15275.json
index f02a5c315ca..0b9ce3ba527 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15275.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15275.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15275",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:14.940",
"lastModified": "2024-11-21T04:28:21.500",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-tele-ce-privescal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15276.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15276.json
index 91347452d75..591f2f82f28 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15276.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15276.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15276",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T03:15:11.130",
"lastModified": "2024-11-21T04:28:21.630",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -130,7 +130,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/155554/Cisco-WLC-2504-8.9-Denial-Of-Service.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -139,7 +139,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wlc-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15277.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15277.json
index 871ade86c91..dfccdcc35de 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15277.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15277.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15277",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:15.130",
"lastModified": "2024-11-21T04:28:21.760",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-telepres-escalation",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15278.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15278.json
index d00b0706a22..6ff5d4723a0 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15278.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15278.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15278",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:11.647",
"lastModified": "2024-11-21T04:28:21.890",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-finesse-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15280.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15280.json
index 7aa854a36ef..74c6c408cd0 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15280.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15280.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15280",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:15.253",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-fpwr-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15281.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15281.json
index ce70211f305..fd84751a83c 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15281.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15281.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15281",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:15.347",
"lastModified": "2024-11-21T04:28:22.150",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -179,7 +179,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-ise-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15282.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15282.json
index 9b63bf843ae..56e11d08239 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15282.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15282.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15282",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:15.583",
"lastModified": "2024-11-21T04:28:22.273",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -179,7 +179,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-ise-infodis",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15283.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15283.json
index d81b335abed..d4f21bd2c14 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15283.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15283.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15283",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:12.457",
"lastModified": "2024-11-21T04:28:22.403",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -183,7 +183,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15284.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15284.json
index cc556e83f62..a4d6a2fea0d 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15284.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15284.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15284",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T03:15:11.223",
"lastModified": "2024-11-21T04:28:22.547",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -162,7 +162,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15285.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15285.json
index a78a39fb6ec..b87c81c0274 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15285.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15285.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15285",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:12.580",
"lastModified": "2024-11-21T04:28:22.700",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -183,7 +183,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15286.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15286.json
index 64d92e2b51c..b686d96def8 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15286.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15286.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15286",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T03:15:11.287",
"lastModified": "2024-11-21T04:28:22.830",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -162,7 +162,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15287.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15287.json
index f6fb08ca6be..744eda0ffcd 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15287.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15287.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15287",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:12.660",
"lastModified": "2024-11-21T04:28:22.967",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -183,7 +183,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15288.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15288.json
index 2abdebd3a4b..21a5eb3e632 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15288.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15288.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15288",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T03:15:11.363",
"lastModified": "2024-11-21T04:28:23.090",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telepres-roomos-privesc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15289.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15289.json
index 964cb84e74c..4f5ba2edf8a 100644
--- a/CVE-2019/CVE-2019-152xx/CVE-2019-15289.json
+++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15289.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15289",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:12.723",
"lastModified": "2024-11-21T04:28:23.220",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -166,7 +166,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telepres-roomos-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15956.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15956.json
index a50b4780fdd..01e6631f5db 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15956.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15956.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15956",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T03:15:11.440",
"lastModified": "2024-11-21T04:29:49.077",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -169,7 +169,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15957.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15957.json
index 8a8fba5787e..a08e96c67a0 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15957.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15957.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15957",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:12.787",
"lastModified": "2024-11-21T04:29:49.210",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbr-cominj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15958.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15958.json
index 7ddaab86122..03d1dac15e1 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15958.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15958.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15958",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T03:15:11.503",
"lastModified": "2024-11-21T04:29:49.350",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -157,7 +157,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-pi-epn-codex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15959.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15959.json
index f46d9b36ffa..57c56347d0b 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15959.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15959.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15959",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:12.863",
"lastModified": "2024-11-21T04:29:49.480",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -181,7 +181,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-spa500-script",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15960.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15960.json
index 5fa1a6b79e4..ec944f66d81 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15960.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15960.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15960",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T03:15:11.583",
"lastModified": "2024-11-21T04:29:49.620",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wbs-privilege",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15961.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15961.json
index 452aaf6fe9f..cef14ba59ec 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15961.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15961.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15961",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-15T19:15:13.317",
"lastModified": "2024-11-21T04:29:49.740",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -177,7 +177,7 @@
"references": [
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=12380",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Issue Tracking",
@@ -186,7 +186,7 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00016.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -194,21 +194,21 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvr56010",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202003-46",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4230-2/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15962.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15962.json
index 4454bb63e28..ca5814ad219 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15962.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15962.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15962",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-16T19:15:15.660",
"lastModified": "2024-11-21T04:29:49.890",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -220,7 +220,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-tele-ce-filewrite",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15963.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15963.json
index 808d240feb6..ed10646ef6d 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15963.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15963.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15963",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:12.957",
"lastModified": "2024-11-21T04:29:50.013",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-cuc-info-disclosure",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15966.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15966.json
index 90cbc9e0a3e..e24e61c98ce 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15966.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15966.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15966",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-05T19:15:10.633",
"lastModified": "2024-11-21T04:29:50.143",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvr69362",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15967.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15967.json
index 20b83d423ae..f03f246d265 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15967.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15967.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15967",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T03:15:11.660",
"lastModified": "2024-11-21T04:29:50.267",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telece-ros-eve",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15968.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15968.json
index e7b1447b2d6..d939355d53d 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15968.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15968.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15968",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T04:15:11.577",
"lastModified": "2024-11-21T04:29:50.433",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-ucdm-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15969.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15969.json
index 94f2c5112ed..4b67bd1ef84 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15969.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15969.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15969",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:13.113",
"lastModified": "2024-11-21T04:29:50.560",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15971.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15971.json
index df1f19ff3fa..f7c55e8abf8 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15971.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15971.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15971",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T04:15:11.653",
"lastModified": "2024-11-21T04:29:50.683",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-esa-mp3-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15972.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15972.json
index 78d1e73b130..b4dfab88a87 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15972.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15972.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15972",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T04:15:11.717",
"lastModified": "2024-11-21T04:29:50.810",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-cucm-sql",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15973.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15973.json
index 476cec58413..e7a4ab7215e 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15973.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15973.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15973",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T03:15:11.770",
"lastModified": "2024-11-21T04:29:50.933",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-idn-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15974.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15974.json
index 150e5fe3a07..98de97c0180 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15974.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15974.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15974",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:13.253",
"lastModified": "2024-11-21T04:29:51.053",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-msa-open-redirect",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15975.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15975.json
index 1434d21d88e..126cb9ed86e 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15975.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15975.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15975",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-06T08:15:10.723",
"lastModified": "2024-11-21T04:29:51.183",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/156238/Cisco-Data-Center-Network-Manager-11.2-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -138,7 +138,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-auth-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15976.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15976.json
index 9f06aa32eb0..d5f10be10bb 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15976.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15976.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15976",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-06T08:15:10.800",
"lastModified": "2024-11-21T04:29:51.320",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/156239/Cisco-Data-Center-Network-Manager-11.2.1-SQL-Injection.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -138,7 +138,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-auth-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15977.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15977.json
index d07e975661e..af47468938f 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15977.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15977.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15977",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-06T08:15:10.893",
"lastModified": "2024-11-21T04:29:51.440",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/156242/Cisco-Data-Center-Network-Manager-11.2.1-Command-Injection.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -138,7 +138,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-auth-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15978.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15978.json
index 42e12169ae8..d737443f2ed 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15978.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15978.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15978",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-06T08:15:10.973",
"lastModified": "2024-11-21T04:29:51.560",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/156242/Cisco-Data-Center-Network-Manager-11.2.1-Command-Injection.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -138,7 +138,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-comm-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15979.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15979.json
index f9bc925e707..1967123d900 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15979.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15979.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15979",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-06T08:15:11.067",
"lastModified": "2024-11-21T04:29:51.683",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-comm-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15980.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15980.json
index 1ab9e07c196..7c58a71f345 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15980.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15980.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15980",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-06T08:15:11.143",
"lastModified": "2024-11-21T04:29:51.803",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-path-trav",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15981.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15981.json
index 2c015f44fdb..fb277e205ea 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15981.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15981.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15981",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-06T08:15:11.223",
"lastModified": "2024-11-21T04:29:51.917",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-path-trav",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15982.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15982.json
index c7ded49de13..9ea7f08bfe3 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15982.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15982.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15982",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-06T08:15:11.283",
"lastModified": "2024-11-21T04:29:52.033",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-path-trav",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15983.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15983.json
index 89038d9446a..fdce1650f18 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15983.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15983.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15983",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-06T08:15:11.363",
"lastModified": "2024-11-21T04:29:52.150",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-xml-ext-entity",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15984.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15984.json
index 9a4212c96e4..de3aa164f71 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15984.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15984.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15984",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-06T08:15:11.440",
"lastModified": "2024-11-21T04:29:52.267",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/156239/Cisco-Data-Center-Network-Manager-11.2.1-SQL-Injection.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -138,7 +138,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-sql-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15985.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15985.json
index 74e866cb695..ca9bc0f656d 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15985.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15985.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15985",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-06T08:15:11.503",
"lastModified": "2024-11-21T04:29:52.390",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-sql-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15986.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15986.json
index 08187557b96..6d6f1709a42 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15986.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15986.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15986",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T04:15:11.827",
"lastModified": "2024-11-21T04:29:52.503",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-unity-exp-comm-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15987.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15987.json
index cec4dd4883f..f4a672b7585 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15987.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15987.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15987",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T04:15:11.903",
"lastModified": "2024-11-21T04:29:52.630",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -163,7 +163,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-webex-centers-infodis",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15988.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15988.json
index 0fcd7dc6879..4f42767ae65 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15988.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15988.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15988",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T04:15:11.983",
"lastModified": "2024-11-21T04:29:52.810",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-esa-url-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15989.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15989.json
index 38745ac870f..56ba16e2785 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15989.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15989.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15989",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:13.567",
"lastModified": "2024-11-21T04:29:52.940",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -611,7 +611,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-bgp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15990.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15990.json
index 3d62df35505..7258f650ee2 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15990.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15990.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15990",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T04:15:12.077",
"lastModified": "2024-11-21T04:29:53.083",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -225,7 +225,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-sbr-rv-infodis",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15992.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15992.json
index 592db237fc7..67df4c90e33 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15992.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15992.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15992",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:13.333",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -230,7 +230,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191112-asa-ftd-lua-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15993.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15993.json
index b098a2d3ea5..6c654f53cc8 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15993.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15993.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15993",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:13.410",
"lastModified": "2024-11-21T04:29:53.367",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3725,11 +3725,11 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15994.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15994.json
index 661d41673dc..3131d760473 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15994.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15994.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15994",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T04:15:12.153",
"lastModified": "2024-11-21T04:29:53.603",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-stealth-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15995.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15995.json
index ee06916461a..75ad326b99a 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15995.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15995.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15995",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T04:15:12.247",
"lastModified": "2024-11-21T04:29:53.730",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-dna-sqlinjection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15996.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15996.json
index 664a29696e1..e2c9bf013cd 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15996.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15996.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15996",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T04:15:12.357",
"lastModified": "2024-11-21T04:29:53.853",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-dna-priv-esca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15997.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15997.json
index f984d9e2943..d55dae985d0 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15997.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15997.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15997",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T04:15:12.467",
"lastModified": "2024-11-21T04:29:53.977",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-dna-cmd-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15998.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15998.json
index a186d930a04..939ec9cbc65 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15998.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15998.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15998",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T04:15:12.547",
"lastModified": "2024-11-21T04:29:54.100",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-iosxr-ssh-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-159xx/CVE-2019-15999.json b/CVE-2019/CVE-2019-159xx/CVE-2019-15999.json
index b06a5bc8033..f5d9c56e223 100644
--- a/CVE-2019/CVE-2019-159xx/CVE-2019-15999.json
+++ b/CVE-2019/CVE-2019-159xx/CVE-2019-15999.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-15999",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-06T08:15:11.580",
"lastModified": "2024-11-21T04:29:54.227",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/155870/Cisco-DCNM-JBoss-10.4-Credential-Leakage.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-unauth-access",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1585.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1585.json
index a93339e077b..03319b51978 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1585.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1585.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1585",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-06T21:29:00.323",
"lastModified": "2024-11-21T04:36:51.620",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -336,7 +336,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107312",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -344,7 +344,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-aci-controller-privsec",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1586.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1586.json
index 018b87c0626..05349bb85a3 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1586.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1586.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1586",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:00.367",
"lastModified": "2024-11-21T04:36:51.763",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108158",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-encrypt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1587.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1587.json
index d7ae6356d66..5256f104165 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1587.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1587.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1587",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:00.430",
"lastModified": "2024-11-21T04:36:51.910",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -270,7 +270,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-filter-query",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1588.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1588.json
index cbfa533ae5f..3766293fee8 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1588.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1588.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1588",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-06T21:29:00.357",
"lastModified": "2024-11-21T04:36:52.040",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107316",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-aci-file-read",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1589.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1589.json
index 4ddc5702a70..b526ee8dfc7 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1589.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1589.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1589",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:00.510",
"lastModified": "2024-11-21T04:36:52.180",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -270,7 +270,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108175",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -278,7 +278,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-unmeasured-boot",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1590.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1590.json
index 1f7253aa3fc..aa329c2d03c 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1590.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1590.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1590",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:00.587",
"lastModified": "2024-11-21T04:36:52.313",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -273,7 +273,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-insecure-fabric",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1591.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1591.json
index d97f3b11891..49e2da82ce5 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1591.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1591.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1591",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-06T22:29:00.247",
"lastModified": "2024-11-21T04:36:52.440",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107311",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-aci-shell-escape",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1592.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1592.json
index 98286ee1703..80906011224 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1592.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1592.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1592",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:00.650",
"lastModified": "2024-11-21T04:36:52.580",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -270,7 +270,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-hw-clock-util",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1593.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1593.json
index 84c0c238858..b5de88f1d38 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1593.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1593.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1593",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-06T22:29:00.293",
"lastModified": "2024-11-21T04:36:52.720",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -370,7 +370,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107324",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -378,7 +378,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nx-os-bash-escal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1594.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1594.json
index 19b8754d626..15d3f080fc3 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1594.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1594.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1594",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-06T22:29:00.340",
"lastModified": "2024-11-21T04:36:52.873",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -453,7 +453,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107325",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -461,7 +461,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nx-os-lan-auth",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1595.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1595.json
index abefec96da1..fb1086ad004 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1595.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1595.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1595",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-06T22:29:00.387",
"lastModified": "2024-11-21T04:36:53.020",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -144,7 +144,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107320",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -152,7 +152,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nexus-fbr-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1596.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1596.json
index 11786b9353f..60651ffdf0f 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1596.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1596.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1596",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-07T19:29:00.223",
"lastModified": "2024-11-21T04:36:53.150",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -270,7 +270,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107340",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -278,7 +278,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-pe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1597.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1597.json
index 3a80c356611..a4f710149bb 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1597.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1597.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1597",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-07T19:29:00.270",
"lastModified": "2024-11-21T04:36:53.300",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -458,7 +458,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107394",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -466,7 +466,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxosldap",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1598.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1598.json
index a04f2482634..f3a606d486f 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1598.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1598.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1598",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-07T19:29:00.303",
"lastModified": "2024-11-21T04:36:53.470",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -575,7 +575,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107394",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -583,7 +583,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxosldap",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-15xx/CVE-2019-1599.json b/CVE-2019/CVE-2019-15xx/CVE-2019-1599.json
index da6cbf7682d..f861275612c 100644
--- a/CVE-2019/CVE-2019-15xx/CVE-2019-1599.json
+++ b/CVE-2019/CVE-2019-15xx/CVE-2019-1599.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1599",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-07T20:29:00.297",
"lastModified": "2024-11-21T04:36:53.637",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -779,7 +779,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107342",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -787,7 +787,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-netstack",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16000.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16000.json
index bb84a050f9a..6e3cfc051c1 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16000.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16000.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16000",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:13.473",
"lastModified": "2024-11-21T04:29:54.357",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-umbrella-msi-install",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16001.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16001.json
index fb08b02e1ec..ce236d5425c 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16001.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16001.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16001",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T04:15:12.623",
"lastModified": "2024-11-21T04:29:54.470",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-webex-teams-dll",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16002.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16002.json
index 6a9423d4c1c..556ae24e8eb 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16002.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16002.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16002",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-26T04:15:12.700",
"lastModified": "2024-11-21T04:29:54.593",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-vman-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16003.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16003.json
index d8fbd794fad..0f7027be69e 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16003.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16003.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16003",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:13.867",
"lastModified": "2024-11-21T04:29:54.723",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-ucs-dir-infodis",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16004.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16004.json
index 98a17635d85..5374bf7f401 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16004.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16004.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16004",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:13.537",
"lastModified": "2024-11-21T04:29:54.840",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -139,7 +139,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-vdsd-auth-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16005.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16005.json
index 40234dc8b62..68250a0f68c 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16005.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16005.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16005",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:13.943",
"lastModified": "2024-11-21T04:29:54.957",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-webex-video",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16007.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16007.json
index 012a87c3aec..300a149a782 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16007.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16007.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16007",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:13.627",
"lastModified": "2024-11-21T04:29:55.077",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-anyconnect-hijack",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16008.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16008.json
index 3593d53211c..32963ccf0c6 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16008.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16008.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16008",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:14.130",
"lastModified": "2024-11-21T04:29:55.193",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -645,7 +645,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-iphone-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16009.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16009.json
index d3bc2ef7ce8..2b6db4f9107 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16009.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16009.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16009",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:13.707",
"lastModified": "2024-11-21T04:29:55.320",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-ios-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16010.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16010.json
index 8d0b729f1f8..115498a9e51 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16010.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16010.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16010",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-19T16:15:14.517",
"lastModified": "2024-11-21T04:29:55.447",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -191,7 +191,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200318-vmanage-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16011.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16011.json
index eb950e00fc5..847b10083a1 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16011.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16011.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16011",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-29T21:15:11.663",
"lastModified": "2024-11-21T04:29:55.577",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -237,7 +237,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xesdwcinj-AcQ5MxCn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16012.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16012.json
index 62a7d20b143..1f295396eb2 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16012.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16012.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16012",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-19T16:15:14.627",
"lastModified": "2024-11-21T04:29:55.720",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -191,7 +191,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200318-vmanage-cypher-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16015.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16015.json
index 527cef9c7ca..2bd5f6bce61 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16015.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16015.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16015",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:14.287",
"lastModified": "2024-11-21T04:29:55.847",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-dcaf-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16017.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16017.json
index 0922ed7222a..69ef8872c1b 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16017.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16017.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16017",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:13.770",
"lastModified": "2024-11-21T04:29:55.977",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-cvp-direct-obj-ref",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16018.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16018.json
index 007cb524cd6..d20d8e7e985 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16018.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16018.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16018",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:14.413",
"lastModified": "2024-11-21T04:29:56.110",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -611,7 +611,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-routes",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16019.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16019.json
index ce371d18fab..dfd39e0820d 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16019.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16019.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16019",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:13.847",
"lastModified": "2024-11-21T04:29:56.263",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -456,7 +456,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-evpn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16020.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16020.json
index 99c3d9fe3f3..2e3cb2a58c8 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16020.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16020.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16020",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:16.053",
"lastModified": "2024-11-21T04:29:56.430",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -611,7 +611,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-evpn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16021.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16021.json
index 28feef420c9..03b3351cf7d 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16021.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16021.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16021",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:13.940",
"lastModified": "2024-11-21T04:29:56.580",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -456,7 +456,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-evpn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16022.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16022.json
index ae498e088e6..503800fec8a 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16022.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16022.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16022",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:16.193",
"lastModified": "2024-11-21T04:29:56.730",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -611,7 +611,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-evpn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16023.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16023.json
index 8b4d9083ff9..ec90d169437 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16023.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16023.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16023",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:14.037",
"lastModified": "2024-11-21T04:29:56.880",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -456,7 +456,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-evpn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16024.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16024.json
index a683f5c90e2..50acbef0847 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16024.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16024.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16024",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:16.287",
"lastModified": "2024-11-21T04:29:57.027",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -139,7 +139,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-cnca-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16025.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16025.json
index b7a69c36af1..c71bcca1e3e 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16025.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16025.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16025",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:14.127",
"lastModified": "2024-11-21T04:29:57.160",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-er-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16026.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16026.json
index c2a053f58f7..7de7b3e5b7e 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16026.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16026.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16026",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:16.380",
"lastModified": "2024-11-21T04:29:57.277",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-mme-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16027.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16027.json
index bab8ae23932..872c4425393 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16027.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16027.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16027",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:16.677",
"lastModified": "2024-11-21T04:29:57.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -656,7 +656,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16028.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16028.json
index e48c7cd6f11..4f7aa8531ae 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16028.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16028.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16028",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:14.207",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -150,7 +150,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-fmc-auth",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16029.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16029.json
index f8120191d1d..05947a88aeb 100644
--- a/CVE-2019/CVE-2019-160xx/CVE-2019-16029.json
+++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16029.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-16029",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:17.083",
"lastModified": "2024-11-21T04:29:57.700",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-on-prem-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1600.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1600.json
index 3249941c219..9786822d127 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1600.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1600.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1600",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-07T20:29:00.343",
"lastModified": "2024-11-21T04:36:53.833",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -658,7 +658,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107399",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -666,7 +666,7 @@
},
{
"url": "http://www.securityfocus.com/bid/107404",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -674,7 +674,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-directory",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1601.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1601.json
index 3cfd3132c6a..85f6e689d66 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1601.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1601.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1601",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-08T18:29:00.367",
"lastModified": "2024-11-21T04:36:54.010",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -650,7 +650,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107404",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -658,7 +658,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-file-access",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1602.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1602.json
index 033cb938014..de32ae93a63 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1602.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1602.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1602",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-08T19:29:00.327",
"lastModified": "2024-11-21T04:36:54.187",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -234,7 +234,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107332",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -242,7 +242,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-escalation",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1603.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1603.json
index 5e1c131a704..4ea490801a7 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1603.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1603.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1603",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-08T19:29:00.360",
"lastModified": "2024-11-21T04:36:54.327",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -184,7 +184,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107328",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -192,7 +192,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1604.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1604.json
index 022e7dedc65..62ee93713d8 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1604.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1604.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1604",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-08T19:29:00.407",
"lastModified": "2024-11-21T04:36:54.460",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -285,7 +285,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107323",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -293,7 +293,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1605.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1605.json
index 18b1b0d959f..d26e667aa59 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1605.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1605.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1605",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-08T20:29:00.340",
"lastModified": "2024-11-21T04:36:54.603",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -426,7 +426,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107313",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -434,7 +434,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-api-ex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1606.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1606.json
index 9b22dbdeb71..0b5b65bda6f 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1606.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1606.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1606",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-08T20:29:00.370",
"lastModified": "2024-11-21T04:36:54.757",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -176,7 +176,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -184,7 +184,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1606",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1607.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1607.json
index eff855f93b8..04babd111b6 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1607.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1607.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1607",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-08T20:29:00.417",
"lastModified": "2024-11-21T04:36:54.900",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -215,7 +215,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107393",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -223,7 +223,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1607",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1608.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1608.json
index 242c1a66e47..9cdaa165820 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1608.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1608.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1608",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-08T20:29:00.450",
"lastModified": "2024-11-21T04:36:55.030",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -301,7 +301,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107386",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -309,7 +309,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1608",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1609.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1609.json
index e7aaf28cb81..efc6f54d6a9 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1609.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1609.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1609",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-08T20:29:00.480",
"lastModified": "2024-11-21T04:36:55.173",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -536,7 +536,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107341",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -544,7 +544,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1609",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1610.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1610.json
index ce149bf6efd..7ff83fff9e7 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1610.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1610.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1610",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-11T21:29:00.717",
"lastModified": "2024-11-21T04:36:55.350",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -170,7 +170,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107338",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -178,7 +178,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1610",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1611.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1611.json
index 09f5d6d3457..51cbdea61a5 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1611.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1611.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1611",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-11T21:29:00.763",
"lastModified": "2024-11-21T04:36:55.483",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -633,7 +633,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107381",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -641,7 +641,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1611",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1612.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1612.json
index ce2d79cb934..77d961f453a 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1612.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1612.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1612",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-11T21:29:00.793",
"lastModified": "2024-11-21T04:36:55.640",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -255,7 +255,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107388",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -263,7 +263,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1612",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1613.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1613.json
index f6b00cc3f77..587aeba258d 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1613.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1613.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1613",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-11T21:29:00.840",
"lastModified": "2024-11-21T04:36:55.777",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -484,7 +484,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107392",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -492,7 +492,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1613",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1614.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1614.json
index 11b86b0be5c..a2ea53670a0 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1614.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1614.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1614",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-11T21:29:00.873",
"lastModified": "2024-11-21T04:36:55.920",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -431,7 +431,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107339",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -439,7 +439,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-NXAPI-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1615.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1615.json
index 884da9f849f..d0beccba95f 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1615.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1615.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1615",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-11T21:29:00.920",
"lastModified": "2024-11-21T04:36:56.073",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -380,7 +380,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107397",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -388,7 +388,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-sig-verif",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1616.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1616.json
index 146e3912da9..0a048709341 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1616.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1616.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1616",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-11T21:29:00.967",
"lastModified": "2024-11-21T04:36:56.223",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -663,7 +663,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107395",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -671,7 +671,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-fabric-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1617.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1617.json
index dc210508533..8a98f85f887 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1617.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1617.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1617",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-11T21:29:01.027",
"lastModified": "2024-11-21T04:36:56.387",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -239,7 +239,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107336",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -247,7 +247,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-npv-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1618.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1618.json
index 525eb93eab0..8ad1dea19cf 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1618.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1618.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1618",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-11T21:29:01.060",
"lastModified": "2024-11-21T04:36:56.520",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -142,7 +142,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107322",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -150,7 +150,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-tetra-ace",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1619.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1619.json
index ea2e1b288aa..f91f16f1e2b 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1619.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1619.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1619",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-27T03:15:09.433",
"lastModified": "2024-11-21T04:36:56.657",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "http://packetstormsecurity.com/files/154304/Cisco-Data-Center-Network-Manager-Unauthenticated-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2019/Jul/7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -152,7 +152,7 @@
},
{
"url": "http://www.securityfocus.com/bid/108902",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -160,7 +160,7 @@
},
{
"url": "https://seclists.org/bugtraq/2019/Jul/11",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -168,7 +168,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1620.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1620.json
index 122c599ce3b..fb4ad371eca 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1620.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1620.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1620",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-27T03:15:09.480",
"lastModified": "2024-11-21T04:36:56.807",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "http://packetstormsecurity.com/files/154304/Cisco-Data-Center-Network-Manager-Unauthenticated-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2019/Jul/7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -152,7 +152,7 @@
},
{
"url": "http://www.securityfocus.com/bid/108906",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -160,7 +160,7 @@
},
{
"url": "https://seclists.org/bugtraq/2019/Jul/11",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -168,7 +168,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-codex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1621.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1621.json
index 3c3361393b2..a8bd76f9588 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1621.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1621.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1621",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-27T03:15:09.510",
"lastModified": "2024-11-21T04:36:56.967",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2019/Jul/7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -144,7 +144,7 @@
},
{
"url": "http://www.securityfocus.com/bid/108904",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -152,7 +152,7 @@
},
{
"url": "https://seclists.org/bugtraq/2019/Jul/11",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -160,7 +160,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-file-dwnld",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1622.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1622.json
index 1423a4fe137..df0ea89e91e 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1622.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1622.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1622",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-27T03:15:09.557",
"lastModified": "2024-11-21T04:36:57.120",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "http://packetstormsecurity.com/files/154304/Cisco-Data-Center-Network-Manager-Unauthenticated-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2019/Jul/7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -152,7 +152,7 @@
},
{
"url": "http://www.securityfocus.com/bid/108908",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -160,7 +160,7 @@
},
{
"url": "https://seclists.org/bugtraq/2019/Jul/11",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -168,7 +168,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-infodiscl",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1623.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1623.json
index 800f4ed9177..b93486a290f 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1623.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1623.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1623",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:11.213",
"lastModified": "2024-11-21T04:36:57.260",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -137,7 +137,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108840",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -145,7 +145,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-cms-codex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1624.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1624.json
index aa0272fa178..bc5dba8b85c 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1624.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1624.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1624",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:11.307",
"lastModified": "2024-11-21T04:36:57.397",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108845",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1625.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1625.json
index 84d9a3c4e21..56705edbcfe 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1625.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1625.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1625",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:11.370",
"lastModified": "2024-11-21T04:36:57.527",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -176,7 +176,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108844",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -184,7 +184,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privesca",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1626.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1626.json
index 7b8950c8587..00cbc5a5b8e 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1626.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1626.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1626",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:11.433",
"lastModified": "2024-11-21T04:36:57.660",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -171,7 +171,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108838",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -179,7 +179,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privilescal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1627.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1627.json
index 6c440e1d236..b58b3f57885 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1627.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1627.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1627",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:11.480",
"lastModified": "2024-11-21T04:36:57.790",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108847",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -151,7 +151,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-infodiscl",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1628.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1628.json
index 49c35ea00ad..02c6f00dde2 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1628.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1628.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1628",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:11.557",
"lastModified": "2024-11-21T04:36:57.933",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108851",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -151,7 +151,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1629.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1629.json
index f88561f5d9e..97e35f9e543 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1629.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1629.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1629",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:11.603",
"lastModified": "2024-11-21T04:36:58.060",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108852",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-filewrite",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1630.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1630.json
index 9e23c4d4c85..7cb74d591db 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1630.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1630.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1630",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:11.667",
"lastModified": "2024-11-21T04:36:58.193",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108846",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-frmwr-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1631.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1631.json
index 577c868c051..256134cefd2 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1631.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1631.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1631",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:11.743",
"lastModified": "2024-11-21T04:36:58.317",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108849",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-infodisclos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1632.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1632.json
index e86daf3717f..973013bb067 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1632.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1632.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1632",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:11.790",
"lastModified": "2024-11-21T04:36:58.450",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108858",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1634.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1634.json
index d669472a093..80e3d5142af 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1634.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1634.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1634",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:14.043",
"lastModified": "2024-11-21T04:36:58.597",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -307,7 +307,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1634",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1635.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1635.json
index 6be4873560f..369e5862ba8 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1635.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1635.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1635",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:00.713",
"lastModified": "2024-11-21T04:36:58.740",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -785,7 +785,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-phone-sip-xml-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1636.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1636.json
index 04d2224f32d..ff847bb91b3 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1636.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1636.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1636",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-23T22:29:00.493",
"lastModified": "2024-11-21T04:36:58.893",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,14 +126,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106718",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-webex-teams",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1637.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1637.json
index e526fb3181b..c0395dc3801 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1637.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1637.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1637",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-23T23:29:00.247",
"lastModified": "2024-11-21T04:36:59.030",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -156,14 +156,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106704",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1638.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1638.json
index 461b694f28b..4794f5960e3 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1638.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1638.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1638",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-23T23:29:00.277",
"lastModified": "2024-11-21T04:36:59.170",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -156,14 +156,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106704",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1639.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1639.json
index 32e00c8d563..ccd07ff25e4 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1639.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1639.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1639",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-23T23:29:00.327",
"lastModified": "2024-11-21T04:36:59.300",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -156,14 +156,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106704",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1640.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1640.json
index 6130b0a35b5..1a210ef8e49 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1640.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1640.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1640",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-23T23:29:00.403",
"lastModified": "2024-11-21T04:36:59.433",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -156,14 +156,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106704",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1641.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1641.json
index b8654d06a96..252d7df7099 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1641.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1641.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1641",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-23T23:29:00.480",
"lastModified": "2024-11-21T04:36:59.567",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -156,14 +156,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106704",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-webex-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1642.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1642.json
index 5f80060a86b..e66b26ac530 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1642.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1642.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1642",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-23T23:29:00.527",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106714",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,14 +139,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-frpwr-mc-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/46263/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1643.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1643.json
index 0f1fd361ecc..aea2a781c84 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1643.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1643.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1643",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-23T23:29:00.577",
"lastModified": "2024-11-21T04:36:59.823",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106702",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-cpi-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1644.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1644.json
index 148ce5593b2..4a01af7cf71 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1644.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1644.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1644",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-23T23:29:00.620",
"lastModified": "2024-11-21T04:36:59.957",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106709",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-iot-fnd-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1645.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1645.json
index abe0e248b5a..b2ab2b89798 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1645.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1645.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1645",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-24T15:29:00.453",
"lastModified": "2024-11-21T04:37:00.100",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,14 +126,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106701",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-cmx-info-discl",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1646.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1646.json
index d63233e1763..efc2881a09e 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1646.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1646.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1646",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-24T15:29:00.643",
"lastModified": "2024-11-21T04:37:00.230",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -252,7 +252,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106723",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -260,7 +260,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-sdwan-escal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1647.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1647.json
index 29cfe0a2ed7..8b248405405 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1647.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1647.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1647",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-24T15:29:00.703",
"lastModified": "2024-11-21T04:37:00.367",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,7 +132,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106705",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -140,7 +140,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-sdwan-unaccess",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1648.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1648.json
index 705d6852f43..01338ca46e5 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1648.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1648.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1648",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-24T15:29:00.767",
"lastModified": "2024-11-21T04:37:00.493",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -252,7 +252,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106719",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -260,7 +260,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-sdwan-sol-escal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1649.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1649.json
index 79c138bfc9c..f70b8bc9221 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1649.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1649.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1649",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-13T19:29:01.520",
"lastModified": "2024-11-21T04:37:00.627",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1803,7 +1803,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108350",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1811,14 +1811,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.kb.cert.org/vuls/id/400865",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
@@ -1826,7 +1826,7 @@
},
{
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1650.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1650.json
index 6bcd645985b..78e98ab7fbf 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1650.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1650.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1650",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-24T15:29:00.830",
"lastModified": "2024-11-21T04:37:00.823",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -252,7 +252,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106716",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -260,7 +260,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-sdwan-file-write",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1651.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1651.json
index 1e65c26f957..b16b3abc3ba 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1651.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1651.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1651",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-24T15:29:00.893",
"lastModified": "2024-11-21T04:37:00.943",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106703",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-sdwan-bo",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1652.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1652.json
index 4e2a33c1fb4..91148ba21eb 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1652.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1652.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1652",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-24T15:29:00.953",
"lastModified": "2024-11-21T04:37:01.077",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -92,7 +92,7 @@
"cisaVulnerabilityName": "Cisco Small Business Routers Improper Input Validation Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -171,7 +171,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/152262/Cisco-RV320-Command-Injection.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -180,7 +180,7 @@
},
{
"url": "http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -188,7 +188,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2019/Mar/61",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Mailing List",
@@ -197,7 +197,7 @@
},
{
"url": "http://www.securityfocus.com/bid/106728",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -205,7 +205,7 @@
},
{
"url": "https://seclists.org/bugtraq/2019/Mar/55",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Mailing List",
@@ -214,14 +214,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/46243/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -230,7 +230,7 @@
},
{
"url": "https://www.exploit-db.com/exploits/46655/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1653.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1653.json
index d4464670011..ae8faa7c742 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1653.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1653.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1653",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-24T16:29:00.317",
"lastModified": "2024-11-21T04:37:01.223",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -92,7 +92,7 @@
"cisaVulnerabilityName": "Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -181,7 +181,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/152260/Cisco-RV320-Unauthenticated-Configuration-Export.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -190,7 +190,7 @@
},
{
"url": "http://packetstormsecurity.com/files/152261/Cisco-RV320-Unauthenticated-Diagnostic-Data-Retrieval.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -199,7 +199,7 @@
},
{
"url": "http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -207,7 +207,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2019/Mar/59",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Mailing List",
@@ -216,7 +216,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2019/Mar/60",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Mailing List",
@@ -225,7 +225,7 @@
},
{
"url": "http://www.securityfocus.com/bid/106732",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -233,14 +233,14 @@
},
{
"url": "https://badpackets.net/over-9000-cisco-rv320-rv325-routers-vulnerable-to-cve-2019-1653/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://seclists.org/bugtraq/2019/Mar/53",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -248,7 +248,7 @@
},
{
"url": "https://seclists.org/bugtraq/2019/Mar/54",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -256,21 +256,21 @@
},
{
"url": "https://threatpost.com/scans-cisco-routers-code-execution/141218/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-info",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/46262/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -279,7 +279,7 @@
},
{
"url": "https://www.exploit-db.com/exploits/46655/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -287,14 +287,14 @@
},
{
"url": "https://www.youtube.com/watch?v=bx0RQJDlGbY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zdnet.com/article/hackers-are-going-after-cisco-rv320rv325-routers-using-a-new-exploit/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1654.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1654.json
index 42330d9cfa4..7b06a312bd4 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1654.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1654.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1654",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-17T22:29:00.327",
"lastModified": "2024-11-21T04:37:01.390",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -175,7 +175,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107991",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -183,7 +183,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-aironet-shell",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1655.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1655.json
index ec11979fe88..a477c9c5b34 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1655.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1655.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1655",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-24T16:29:00.363",
"lastModified": "2024-11-21T04:37:01.567",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106710",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-meetings-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1656.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1656.json
index 2b41205e98f..48e52ed0c62 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1656.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1656.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1656",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-24T16:29:00.410",
"lastModified": "2024-11-21T04:37:01.707",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,14 +126,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106715",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-nfvis-shell-access",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1657.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1657.json
index 6c655a23512..b2a0418f90d 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1657.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1657.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1657",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-24T16:29:00.457",
"lastModified": "2024-11-21T04:37:01.840",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106711",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -143,7 +143,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-threat-grid",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1658.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1658.json
index 237a6c60a71..27fb2e91e6c 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1658.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1658.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1658",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-24T16:29:00.503",
"lastModified": "2024-11-21T04:37:01.980",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,14 +126,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106713",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-uic-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1659.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1659.json
index ab95e2141c9..26a9c524326 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1659.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1659.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1659",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-21T15:29:00.237",
"lastModified": "2024-11-21T04:37:02.113",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,14 +128,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107092",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-prime-validation",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1660.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1660.json
index ff3517fa933..64b917efde7 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1660.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1660.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1660",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-07T21:29:00.187",
"lastModified": "2024-11-21T04:37:02.263",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -161,7 +161,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106918",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -169,7 +169,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-tms-soap",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1661.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1661.json
index d26f5990cef..940758f3cbe 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1661.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1661.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1661",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-07T22:29:00.337",
"lastModified": "2024-11-21T04:37:02.400",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106920",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-tms-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1662.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1662.json
index d9023812ec2..f095860d46a 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1662.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1662.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1662",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-21T17:29:00.773",
"lastModified": "2024-11-21T04:37:02.537",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -137,14 +137,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107096",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-pca-access",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1663.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1663.json
index d798f2cb4ee..9bf2a4b03ad 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1663.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1663.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1663",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-28T18:29:02.040",
"lastModified": "2024-11-21T04:37:02.680",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -197,7 +197,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/152507/Cisco-RV130W-Routers-Management-Interface-Remote-Command-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -205,7 +205,7 @@
},
{
"url": "http://packetstormsecurity.com/files/153163/Cisco-RV130W-1.0.3.44-Remote-Stack-Overflow.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -213,7 +213,7 @@
},
{
"url": "http://packetstormsecurity.com/files/154310/Cisco-RV110W-RV130-W-RV215W-Remote-Command-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -221,7 +221,7 @@
},
{
"url": "http://www.rapid7.com/db/modules/exploit/linux/http/cisco_rv130_rmi_rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -229,7 +229,7 @@
},
{
"url": "http://www.securityfocus.com/bid/107185",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -237,14 +237,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-rmi-cmd-ex",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/46705/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1664.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1664.json
index 6508ed39f1a..7fddad08e7e 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1664.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1664.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1664",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-21T19:29:00.367",
"lastModified": "2024-11-21T04:37:02.840",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -183,7 +183,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107103",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -191,7 +191,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-chn-root-access",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1665.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1665.json
index ccabf85957e..8b748f7a4a1 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1665.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1665.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1665",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-21T19:29:00.413",
"lastModified": "2024-11-21T04:37:02.987",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -176,7 +176,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107097",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -184,7 +184,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-hyper-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1666.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1666.json
index b6d7992e97b..69636ef6bd3 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1666.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1666.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1666",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-21T19:29:00.460",
"lastModified": "2024-11-21T04:37:03.137",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -183,7 +183,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107108",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -191,7 +191,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-hyper-retrieve",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1667.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1667.json
index 62437c1d259..d53c819dcf0 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1667.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1667.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1667",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-21T19:29:00.507",
"lastModified": "2024-11-21T04:37:03.273",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -183,7 +183,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107100",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -191,7 +191,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-hyper-write",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1668.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1668.json
index 3d9f8dff3a6..bbfdc1b76a2 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1668.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1668.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1668",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-24T16:29:00.550",
"lastModified": "2024-11-21T04:37:03.410",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106720",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -147,7 +147,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-miner-chat-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1669.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1669.json
index 8a7037539f6..b7c01243fd5 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1669.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1669.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1669",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-01-24T16:29:00.597",
"lastModified": "2024-11-21T04:37:03.550",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,14 +131,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106721",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-firepowertds-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1670.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1670.json
index e9ddea5700a..24ef1694991 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1670.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1670.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1670",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-07T22:29:00.383",
"lastModified": "2024-11-21T04:37:03.687",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106919",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-cuic-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1671.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1671.json
index 41b63ac8649..8355007b72e 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1671.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1671.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1671",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-07T22:29:00.413",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -156,7 +156,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106927",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -164,7 +164,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-fmc-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1672.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1672.json
index af198a8b20c..9516983864a 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1672.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1672.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1672",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-08T18:29:00.283",
"lastModified": "2024-11-21T04:37:03.967",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,14 +136,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106904",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-wsa-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1673.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1673.json
index f65edb0abdf..5ad6e407724 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1673.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1673.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1673",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-08T17:29:00.380",
"lastModified": "2024-11-21T04:37:04.107",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,14 +126,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106915",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-ise-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1674.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1674.json
index b949cff24d4..d4b3ec67e5e 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1674.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1674.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1674",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-28T18:29:02.087",
"lastModified": "2024-11-21T04:37:04.233",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -166,21 +166,21 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107184",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-wmda-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/46479/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1675.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1675.json
index 883bb171dc7..5c31209e330 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1675.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1675.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1675",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-07T20:29:00.277",
"lastModified": "2024-11-21T04:37:04.377",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -142,7 +142,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106944",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -150,7 +150,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-aas-creds",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1676.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1676.json
index 8d3f1dc3f2a..2fe06ab6174 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1676.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1676.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1676",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-08T18:29:00.347",
"lastModified": "2024-11-21T04:37:04.513",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,14 +128,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106909",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-meeting-sipdos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1677.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1677.json
index ad9ffcaaef4..2ee85f978ce 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1677.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1677.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1677",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-07T19:29:00.223",
"lastModified": "2024-11-21T04:37:04.643",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106933",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -138,7 +138,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-webex-andro-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1678.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1678.json
index 9744874e3b1..8daec7381c8 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1678.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1678.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1678",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-07T20:29:00.323",
"lastModified": "2024-11-21T04:37:04.770",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106943",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-cms-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1679.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1679.json
index ab89c24ed4c..7bdf9157f68 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1679.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1679.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1679",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-07T21:29:00.217",
"lastModified": "2024-11-21T04:37:04.907",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106940",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -154,7 +154,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-rest-api-ssrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1680.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1680.json
index 1e881159bd0..3e5679125ae 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1680.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1680.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1680",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-07T21:29:00.250",
"lastModified": "2024-11-21T04:37:05.040",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/106939",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-webex-injection",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1681.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1681.json
index e7fe3b2ff35..70ad063ab32 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1681.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1681.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1681",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-21T20:29:00.290",
"lastModified": "2024-11-21T04:37:05.170",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107107",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -138,7 +138,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-ncs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1682.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1682.json
index 8d37dc0292c..a84db7450ae 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1682.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1682.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1682",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:00.777",
"lastModified": "2024-11-21T04:37:05.300",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-priv-escalation",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1683.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1683.json
index 024661c2c6e..c6b6e08ea30 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1683.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1683.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1683",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-25T17:29:00.280",
"lastModified": "2024-11-21T04:37:05.440",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -491,7 +491,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107111",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -500,7 +500,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-ipphone-certs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1684.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1684.json
index c2bbaa07e57..290ab094d9a 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1684.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1684.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1684",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-21T20:29:00.337",
"lastModified": "2024-11-21T04:37:05.597",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -505,7 +505,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107104",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -513,7 +513,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-cdp-lldp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1685.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1685.json
index 2ba66e5abe3..5a76d3c6618 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1685.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1685.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1685",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-21T20:29:00.367",
"lastModified": "2024-11-21T04:37:05.767",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107102",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-cuc-rxss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1686.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1686.json
index 41b19aaaad7..b27728441c9 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1686.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1686.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1686",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-17T22:29:00.360",
"lastModified": "2024-11-21T04:37:05.900",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108026",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -202,7 +202,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-iosxracl",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1687.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1687.json
index c507102697c..15fd8d22500 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1687.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1687.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1687",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:00.837",
"lastModified": "2024-11-21T04:37:06.050",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -248,7 +248,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108176",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -257,7 +257,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftdtcp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1688.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1688.json
index 2777e4bbba6..acaf67d7c23 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1688.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1688.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1688",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-12T19:29:00.247",
"lastModified": "2024-11-21T04:37:06.197",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107010",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1689.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1689.json
index 1b16131370a..d87ca0da171 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1689.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1689.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1689",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-25T17:29:00.340",
"lastModified": "2024-11-21T04:37:06.340",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107101",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -138,7 +138,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-webx-ios-file",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1690.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1690.json
index a544f987bf0..53c7ba64452 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1690.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1690.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1690",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-11T21:29:01.090",
"lastModified": "2024-11-21T04:37:06.480",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -631,7 +631,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107317",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -639,7 +639,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-apic-ipv6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1691.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1691.json
index a60b4473faa..2683a7b15d1 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1691.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1691.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1691",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-21T20:29:00.417",
"lastModified": "2024-11-21T04:37:06.627",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107099",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-fpwr-ssltls-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1692.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1692.json
index 69f73755275..129d3d99d1e 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1692.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1692.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1692",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:00.900",
"lastModified": "2024-11-21T04:37:06.760",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108155",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-info-disc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1693.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1693.json
index 42e33a43e3c..54fa6bb2f79 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1693.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1693.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1693",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:00.977",
"lastModified": "2024-11-21T04:37:06.883",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -248,7 +248,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108157",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -256,7 +256,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1694.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1694.json
index 7d6bdc99898..637ff1bf7c8 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1694.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1694.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1694",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:01.040",
"lastModified": "2024-11-21T04:37:07.030",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -247,7 +247,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108160",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -255,7 +255,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-frpwrtd-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1695.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1695.json
index bcd0d9f99f0..240eca5b20b 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1695.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1695.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1695",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:01.103",
"lastModified": "2024-11-21T04:37:07.167",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -184,7 +184,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108173",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -192,7 +192,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1696.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1696.json
index f96a22ec034..833e0e781d7 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1696.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1696.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1696",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T15:29:01.167",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -168,11 +168,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108171",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-smb-snort",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1697.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1697.json
index db37c52da5b..8ea32709a06 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1697.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1697.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1697",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T16:29:00.240",
"lastModified": "2024-11-21T04:37:07.460",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -238,11 +238,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108182",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftds-ldapdos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1698.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1698.json
index 559b66b3120..b7e60bbb5f7 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1698.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1698.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1698",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-21T21:29:00.267",
"lastModified": "2024-11-21T04:37:07.587",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107093",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-iot-fnd-xml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1699.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1699.json
index 92f4e5cb770..6dfdd3f54af 100644
--- a/CVE-2019/CVE-2019-16xx/CVE-2019-1699.json
+++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1699.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1699",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T16:29:00.303",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-ftd-cmd-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1700.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1700.json
index 25fd51cbe7d..2fe50ca0a08 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1700.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1700.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1700",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-02-21T21:29:00.313",
"lastModified": "2024-11-21T04:37:07.837",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107105",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -146,7 +146,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-firpwr-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1701.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1701.json
index ec95d49adf1..2bb4cc9363f 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1701.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1701.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1701",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T16:29:00.367",
"lastModified": "2024-11-21T04:37:07.973",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -246,7 +246,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108152",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -254,7 +254,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1702.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1702.json
index e1d7db0c5d5..475663b6932 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1702.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1702.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1702",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-11T21:29:01.137",
"lastModified": "2024-11-21T04:37:08.110",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107314",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-chatmail-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1703.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1703.json
index 9f5f3771d0d..c80bbbecfe6 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1703.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1703.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1703",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T16:29:00.430",
"lastModified": "2024-11-21T04:37:08.240",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -157,7 +157,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108170",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -165,7 +165,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1704.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1704.json
index f49be122a12..3be0815e9e6 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1704.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1704.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1704",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T16:29:00.490",
"lastModified": "2024-11-21T04:37:08.370",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108171",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-smb-snort",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1705.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1705.json
index 59b16811691..5be7e84f07c 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1705.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1705.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1705",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T16:29:00.553",
"lastModified": "2024-11-21T04:37:08.510",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -203,7 +203,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108151",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -211,7 +211,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-vpn-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1706.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1706.json
index e622dcef913..537153d2a93 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1706.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1706.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1706",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T16:29:00.617",
"lastModified": "2024-11-21T04:37:08.653",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -177,7 +177,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ipsec-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1707.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1707.json
index 08e36bbc6e5..02a0176dd3e 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1707.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1707.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1707",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-11T21:29:01.170",
"lastModified": "2024-11-21T04:37:08.783",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107315",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-dna-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1708.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1708.json
index 6ba1ef80115..7fc93a867ec 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1708.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1708.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1708",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T16:29:00.680",
"lastModified": "2024-11-21T04:37:08.910",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -205,7 +205,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108166",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -213,7 +213,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-ike-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1709.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1709.json
index dde73545c76..37f88a7e808 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1709.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1709.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1709",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T16:29:00.740",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -161,7 +161,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108156",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -169,7 +169,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-cmd-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1710.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1710.json
index b593e74365b..e289f986278 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1710.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1710.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1710",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-17T22:29:00.390",
"lastModified": "2024-11-21T04:37:09.177",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -146,7 +146,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108007",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -154,7 +154,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-asr9k-exr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1711.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1711.json
index 0225fe76356..0611c7b0dd0 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1711.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1711.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1711",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-17T22:29:00.437",
"lastModified": "2024-11-21T04:37:09.303",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108017",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-ios-xr-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1712.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1712.json
index 651f1efe553..1e3150aca2a 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1712.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1712.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1712",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-17T22:29:00.483",
"lastModified": "2024-11-21T04:37:09.430",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108025",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -156,7 +156,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-iosxr-pim-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1713.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1713.json
index 2a86aa387d1..0742bcd4a38 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1713.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1713.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1713",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:00.453",
"lastModified": "2024-11-21T04:37:09.560",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -222,7 +222,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1714.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1714.json
index e0edaaac683..739806b4ced 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1714.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1714.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1714",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:00.533",
"lastModified": "2024-11-21T04:37:09.697",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -245,7 +245,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108185",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -253,7 +253,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asaftd-saml-vpn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1715.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1715.json
index 4010ab35252..eda38c3b203 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1715.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1715.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1715",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:00.593",
"lastModified": "2024-11-21T04:37:09.840",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -201,7 +201,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-entropy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1716.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1716.json
index 960f54d8135..642d9abed21 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1716.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1716.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1716",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-22T20:29:00.353",
"lastModified": "2024-11-21T04:37:09.980",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1717.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1717.json
index 82cae75c619..8bdfaf82278 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1717.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1717.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1717",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T17:29:01.407",
"lastModified": "2024-11-21T04:37:10.113",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108336",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-cvsm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1718.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1718.json
index 2348e3ca0d3..7a596036850 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1718.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1718.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1718",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-17T22:29:00.530",
"lastModified": "2024-11-21T04:37:10.243",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108030",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-ise-ssl-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1719.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1719.json
index 1ac082c794d..0081f777f0a 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1719.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1719.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1719",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T01:29:01.360",
"lastModified": "2024-11-21T04:37:10.370",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107993",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-ise-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1720.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1720.json
index af5f6650d68..f2475d488bb 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1720.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1720.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1720",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T01:29:01.827",
"lastModified": "2024-11-21T04:37:10.500",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,14 +127,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108002",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-ces-tvcs-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1721.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1721.json
index b3801c052ab..3d14ae8632d 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1721.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1721.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1721",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T01:29:01.967",
"lastModified": "2024-11-21T04:37:10.620",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108016",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-es-tvcs-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1722.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1722.json
index a313a16e99c..b0b5aa52fab 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1722.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1722.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1722",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T01:29:02.063",
"lastModified": "2024-11-21T04:37:10.750",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,14 +132,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108006",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-ex-vcs-xsrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1723.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1723.json
index daffad6d888..91038cbe945 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1723.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1723.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1723",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-13T21:29:00.307",
"lastModified": "2024-11-21T04:37:10.867",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -137,7 +137,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107405",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -145,7 +145,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190313-cspcscv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -153,7 +153,7 @@
},
{
"url": "https://www.info-sec.ca/advisories/Cisco-Collector.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1724.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1724.json
index 2bf947d92a6..f8d301b50c7 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1724.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1724.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1724",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:00.673",
"lastModified": "2024-11-21T04:37:10.997",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-sbr-hijack",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1725.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1725.json
index 7ea73ed8087..e7f57c10159 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1725.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1725.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1725",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T01:29:02.173",
"lastModified": "2024-11-21T04:37:11.130",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108082",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-ucs-cli-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1726.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1726.json
index d1ece00a2f9..94da99eaf87 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1726.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1726.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1726",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T17:29:01.467",
"lastModified": "2024-11-21T04:37:11.267",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -421,7 +421,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108409",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -429,7 +429,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cli-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1727.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1727.json
index 49bf27cc209..4d77cfacd1c 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1727.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1727.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1727",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T17:29:01.530",
"lastModified": "2024-11-21T04:37:11.413",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -360,7 +360,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108341",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -368,7 +368,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-pyth-escal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1728.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1728.json
index 8058b2d4aa6..b673ecc7be0 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1728.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1728.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1728",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T17:29:01.593",
"lastModified": "2024-11-21T04:37:11.550",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -502,11 +502,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108391",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-conf-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1729.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1729.json
index 94cdb82e1d4..5d528068f38 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1729.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1729.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1729",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T17:29:01.657",
"lastModified": "2024-11-21T04:37:11.700",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -262,7 +262,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108378",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -270,7 +270,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-file-write",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1730.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1730.json
index 10a418a63c2..19c922bf2b4 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1730.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1730.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1730",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T17:29:01.717",
"lastModified": "2024-11-21T04:37:11.850",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -427,7 +427,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108397",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -435,7 +435,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-bash-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1731.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1731.json
index 66aab895d69..e0f7de9b64f 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1731.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1731.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1731",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T17:29:01.780",
"lastModified": "2024-11-21T04:37:12.010",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -595,7 +595,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108353",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -603,7 +603,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-ssh-info",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1732.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1732.json
index a6efbda03f9..370297dc490 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1732.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1732.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1732",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T17:29:01.843",
"lastModified": "2024-11-21T04:37:12.157",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -241,7 +241,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108361",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -249,7 +249,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-rpm-injec",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1733.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1733.json
index 1b31f89d0cf..6dec65ae070 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1733.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1733.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1733",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T17:29:01.907",
"lastModified": "2024-11-21T04:37:12.297",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -215,7 +215,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108348",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -223,7 +223,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-nxapi-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1734.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1734.json
index 5ced5739a53..344b890e521 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1734.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1734.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1734",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-05T20:15:11.297",
"lastModified": "2024-11-21T04:37:12.463",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -800,7 +800,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-fxos-info",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1735.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1735.json
index c996d186468..7f2308a48fa 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1735.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1735.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1735",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T19:29:00.633",
"lastModified": "2024-11-21T04:37:12.613",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -793,7 +793,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108365",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -801,7 +801,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cmdinj-1735",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1736.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1736.json
index 20325217e7f..86ab63e1119 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1736.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1736.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1736",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:14.300",
"lastModified": "2024-11-21T04:37:12.767",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -358,7 +358,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-ucs-boot-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1737.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1737.json
index 3e4312c19a4..3ef1ceed8b8 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1737.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1737.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1737",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-27T23:29:01.337",
"lastModified": "2024-11-21T04:37:12.900",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3208,7 +3208,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107604",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -3216,7 +3216,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-ipsla-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1738.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1738.json
index e56ef87c826..fead6eab7d8 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1738.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1738.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1738",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.310",
"lastModified": "2024-11-21T04:37:14.727",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -943,7 +943,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107597",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -952,7 +952,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nbar",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1739.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1739.json
index 3fd3304e3b9..13cd62b3e95 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1739.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1739.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1739",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.340",
"lastModified": "2024-11-21T04:37:14.907",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -943,7 +943,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107597",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -952,7 +952,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nbar",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1740.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1740.json
index d738d78c0c0..b4cf909b3d0 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1740.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1740.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1740",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.373",
"lastModified": "2024-11-21T04:37:15.070",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -878,7 +878,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107597",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -886,7 +886,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nbar",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1741.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1741.json
index e4cd1d6afc8..0366205167c 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1741.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1741.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1741",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.420",
"lastModified": "2024-11-21T04:37:15.240",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -193,7 +193,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107614",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -201,7 +201,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-eta-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1742.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1742.json
index 993a7a51ee9..3aacca123c7 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1742.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1742.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1742",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.450",
"lastModified": "2024-11-21T04:37:15.377",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -238,7 +238,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107600",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -246,7 +246,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-xeid",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1743.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1743.json
index e0b3cbb67d1..b1bfd5e8958 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1743.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1743.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1743",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.483",
"lastModified": "2024-11-21T04:37:15.510",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -278,7 +278,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107591",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -286,7 +286,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-afu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1745.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1745.json
index 68fd6cdbfef..74c1fe3eae2 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1745.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1745.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1745",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.530",
"lastModified": "2024-11-21T04:37:15.650",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -898,7 +898,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107588",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -906,7 +906,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-xecmd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1746.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1746.json
index e543aa67b69..84cc87fe130 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1746.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1746.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1746",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.590",
"lastModified": "2024-11-21T04:37:15.843",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -2956,7 +2956,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107612",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -2964,7 +2964,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1747.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1747.json
index 175a6b5acb9..a5bb651b96a 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1747.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1747.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1747",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.623",
"lastModified": "2024-11-21T04:37:16.173",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107599",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -141,7 +141,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-sms-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1748.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1748.json
index 0d77e5cdbdc..e9abc0a132f 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1748.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1748.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1748",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.670",
"lastModified": "2024-11-21T04:37:16.300",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -4773,7 +4773,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107619",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -4781,7 +4781,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-pnp-cert",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1749.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1749.json
index 595dee7205e..61f57b702f7 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1749.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1749.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1749",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.717",
"lastModified": "2024-11-21T04:37:16.703",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -363,7 +363,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107615",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -371,7 +371,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-rsp3-ospf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1750.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1750.json
index 5fb6413c252..287cd56d781 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1750.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1750.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1750",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.747",
"lastModified": "2024-11-21T04:37:16.857",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -331,7 +331,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107607",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -339,7 +339,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-evss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1751.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1751.json
index fab7b435017..d77afb38fa8 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1751.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1751.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1751",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.780",
"lastModified": "2024-11-21T04:37:16.983",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -521,7 +521,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107601",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -529,7 +529,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1752.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1752.json
index 6eff5e888c9..506b02e55cc 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1752.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1752.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1752",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.810",
"lastModified": "2024-11-21T04:37:17.130",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1733,7 +1733,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107589",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1741,7 +1741,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-isdn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1753.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1753.json
index fb03a869eaf..32d49c6ca71 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1753.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1753.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1753",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T00:29:00.840",
"lastModified": "2024-11-21T04:37:17.363",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -196,7 +196,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107602",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -204,7 +204,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-pe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1754.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1754.json
index f994f303106..80fe714fd1d 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1754.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1754.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1754",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T01:29:00.283",
"lastModified": "2024-11-21T04:37:17.537",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -203,7 +203,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107590",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -211,7 +211,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-privesc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1755.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1755.json
index 9de1b783e51..6a8f50134dd 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1755.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1755.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1755",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T01:29:00.330",
"lastModified": "2024-11-21T04:37:17.687",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -311,7 +311,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107380",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -319,7 +319,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1756.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1756.json
index 0ea5ecb271e..f86fdf3e8df 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1756.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1756.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1756",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T01:29:00.377",
"lastModified": "2024-11-21T04:37:17.833",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -211,7 +211,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107598",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -219,7 +219,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-cmdinject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1757.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1757.json
index 07a7a5bcb5a..68d095b623c 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1757.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1757.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1757",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T01:29:00.423",
"lastModified": "2024-11-21T04:37:17.977",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1296,7 +1296,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107617",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1304,7 +1304,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-call-home-cert",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1758.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1758.json
index 79eefbe34ab..4edbcf00b9d 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1758.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1758.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1758",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T01:29:00.453",
"lastModified": "2024-11-21T04:37:18.167",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -481,7 +481,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107616",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -489,7 +489,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-c6500",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1759.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1759.json
index c8678671272..43863560737 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1759.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1759.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1759",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T01:29:00.487",
"lastModified": "2024-11-21T04:37:18.313",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -348,7 +348,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107660",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -356,7 +356,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-mgmtacl",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1760.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1760.json
index cb67b358dae..97be1a8db8d 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1760.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1760.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1760",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T01:29:00.533",
"lastModified": "2024-11-21T04:37:18.470",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -326,7 +326,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107611",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -334,7 +334,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-pfrv3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1761.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1761.json
index 888f0145c43..ccf179f7d87 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1761.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1761.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1761",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T01:29:00.580",
"lastModified": "2024-11-21T04:37:18.623",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -8933,7 +8933,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107620",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -8941,7 +8941,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-ios-infoleak",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1762.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1762.json
index dee70391453..893446a22be 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1762.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1762.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1762",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-28T01:29:00.610",
"lastModified": "2024-11-21T04:37:19.220",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -416,7 +416,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107594",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -424,7 +424,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-info",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1763.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1763.json
index 66a5209650c..cddb958687e 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1763.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1763.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1763",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-22T20:29:00.400",
"lastModified": "2024-11-21T04:37:19.370",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -225,7 +225,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipab",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1764.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1764.json
index 9f857c9aa4d..ed47a91c36e 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1764.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1764.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1764",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-22T20:29:00.447",
"lastModified": "2024-11-21T04:37:19.503",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1765.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1765.json
index f87748e3633..bcc71071c1d 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1765.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1765.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1765",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-22T20:29:00.477",
"lastModified": "2024-11-21T04:37:19.630",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipptv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1766.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1766.json
index d9b563408c6..d8b44f79763 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1766.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1766.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1766",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-03-22T20:29:00.510",
"lastModified": "2024-11-21T04:37:19.770",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipfudos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1767.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1767.json
index 31892aa737b..ec20c6edcf6 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1767.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1767.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1767",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T19:29:00.697",
"lastModified": "2024-11-21T04:37:19.900",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -456,7 +456,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108386",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -464,7 +464,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-overflow-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1768.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1768.json
index c44f50631cb..f809d7334da 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1768.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1768.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1768",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T02:29:00.247",
"lastModified": "2024-11-21T04:37:20.043",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -456,7 +456,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108386",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -464,7 +464,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-overflow-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1769.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1769.json
index fd3036967bd..7e10c4ee538 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1769.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1769.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1769",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:00.760",
"lastModified": "2024-11-21T04:37:20.180",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -500,7 +500,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108393",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -509,7 +509,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-linecardinj-1769",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1770.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1770.json
index 424bcb39d2a..357e05bb972 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1770.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1770.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1770",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:00.820",
"lastModified": "2024-11-21T04:37:20.330",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -845,7 +845,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108376",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -854,7 +854,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cmdinj-1770",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1771.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1771.json
index 3fc4a4bec48..a04854ef0cf 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1771.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1771.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1771",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:00.883",
"lastModified": "2024-11-21T04:37:20.483",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108373",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -160,7 +160,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1772.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1772.json
index 7c2b376b67e..cb2d4fdcf68 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1772.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1772.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1772",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:00.930",
"lastModified": "2024-11-21T04:37:20.607",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108373",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -160,7 +160,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1773.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1773.json
index 7c4c13cb71b..4314c830acf 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1773.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1773.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1773",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:00.993",
"lastModified": "2024-11-21T04:37:20.730",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -147,7 +147,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108373",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -155,7 +155,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1774.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1774.json
index 52302c90418..b8f981d41bd 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1774.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1774.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1774",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:01.057",
"lastModified": "2024-11-21T04:37:20.850",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -977,7 +977,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108371",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -985,7 +985,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cmdinj-1774-1775",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1775.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1775.json
index 296ad6ea5a8..ce50b06b3ac 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1775.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1775.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1775",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:01.133",
"lastModified": "2024-11-21T04:37:20.987",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -977,7 +977,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108371",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -985,7 +985,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cmdinj-1774-1775",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1776.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1776.json
index 77f5277702c..5ae67ceaa49 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1776.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1776.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1776",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:01.197",
"lastModified": "2024-11-21T04:37:21.137",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1017,7 +1017,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108377",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1025,7 +1025,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cmdinj-1776",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1777.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1777.json
index f6a4ef7c6eb..2c429797858 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1777.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1777.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1777",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T01:29:02.267",
"lastModified": "2024-11-21T04:37:21.293",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108015",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-res-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1778.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1778.json
index 2ac4f681069..067f25bddd1 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1778.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1778.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1778",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:01.243",
"lastModified": "2024-11-21T04:37:21.427",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -507,7 +507,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108362",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -515,7 +515,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cmdinj-1778",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1779.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1779.json
index 4ba73449432..171c1df74e2 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1779.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1779.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1779",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:01.320",
"lastModified": "2024-11-21T04:37:21.570",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -728,7 +728,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108394",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -736,7 +736,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-fxos-cmdinj-1779",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1780.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1780.json
index ed2b8243526..ec27e24be7c 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1780.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1780.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1780",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T17:29:01.277",
"lastModified": "2024-11-21T04:37:21.717",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -789,7 +789,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108392",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -797,7 +797,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-fxos-cmdinj-1780",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1781.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1781.json
index 240aa171f60..2438e977b06 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1781.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1781.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1781",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:01.400",
"lastModified": "2024-11-21T04:37:21.873",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -837,7 +837,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108407",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -845,7 +845,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-fxos-nxos-cmdinj-1781-1782",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1782.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1782.json
index 5f3d6ef9d60..e6a12cd08ae 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1782.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1782.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1782",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:01.463",
"lastModified": "2024-11-21T04:37:22.043",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -837,7 +837,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108407",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -845,7 +845,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-fxos-nxos-cmdinj-1781-1782",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1783.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1783.json
index 6611b31b78d..8596ee47564 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1783.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1783.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1783",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:01.510",
"lastModified": "2024-11-21T04:37:22.200",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -232,7 +232,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108370",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -240,7 +240,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cmdinj-1783",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1784.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1784.json
index bf273a469ba..1023098dca6 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1784.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1784.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1784",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:01.587",
"lastModified": "2024-11-21T04:37:22.350",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -287,7 +287,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108369",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -295,7 +295,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cmd-inject-1784",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1785.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1785.json
index 329d854acd2..f458326484e 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1785.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1785.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1785",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-08T19:29:05.433",
"lastModified": "2024-11-21T04:37:22.487",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=12284",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
@@ -141,7 +141,7 @@
},
{
"url": "https://security.gentoo.org/glsa/201904-12",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1786.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1786.json
index 040e3526251..a07e37a1670 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1786.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1786.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1786",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-08T19:29:05.480",
"lastModified": "2024-11-21T04:37:22.640",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12149",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Mailing List",
@@ -142,7 +142,7 @@
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12168",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Mailing List",
@@ -151,7 +151,7 @@
},
{
"url": "https://security.gentoo.org/glsa/201904-12",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1787.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1787.json
index 95d2c00b671..e710d9e8fb9 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1787.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1787.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1787",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-08T19:29:05.540",
"lastModified": "2024-11-21T04:37:22.823",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -164,7 +164,7 @@
"references": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -172,7 +172,7 @@
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -180,7 +180,7 @@
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12181",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Issue Tracking",
@@ -190,7 +190,7 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00019.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -198,7 +198,7 @@
},
{
"url": "https://security.gentoo.org/glsa/201904-12",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1788.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1788.json
index 8ba45565b30..13cf52eef5d 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1788.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1788.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1788",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-08T20:29:11.063",
"lastModified": "2024-11-21T04:37:22.993",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -164,7 +164,7 @@
"references": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -172,7 +172,7 @@
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -180,7 +180,7 @@
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12166",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Issue Tracking",
@@ -190,7 +190,7 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00019.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -198,7 +198,7 @@
},
{
"url": "https://security.gentoo.org/glsa/201904-12",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1789.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1789.json
index e1fb495372f..bb517d3adf8 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1789.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1789.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1789",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-05T19:15:11.323",
"lastModified": "2024-11-21T04:37:23.153",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://blog.clamav.net/2019/03/clamav-01012-and-01003-patches-have.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1790.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1790.json
index dc001fed3fc..b14d064ee3d 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1790.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1790.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1790",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T20:29:01.650",
"lastModified": "2024-11-21T04:37:23.283",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -992,7 +992,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108383",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1000,7 +1000,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cmdinj-1790",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1791.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1791.json
index f8af8ff54b1..c6eb11d9717 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1791.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1791.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1791",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T21:29:03.303",
"lastModified": "2024-11-21T04:37:23.437",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -984,7 +984,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108390",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -992,7 +992,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cmdinj-1791",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1792.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1792.json
index 110d81f69d4..ff85c0a07f5 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1792.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1792.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1792",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T01:29:02.343",
"lastModified": "2024-11-21T04:37:23.590",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108014",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-umbrella-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1794.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1794.json
index f9488d79d56..740e1e29d22 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1794.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1794.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1794",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T01:29:02.423",
"lastModified": "2024-11-21T04:37:23.720",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108032",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-cdc-hijack",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1795.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1795.json
index ff4c36f7799..f38037e374a 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1795.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1795.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1795",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T21:29:03.367",
"lastModified": "2024-11-21T04:37:23.847",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1171,7 +1171,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108479",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1179,7 +1179,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cmdinj-1795",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1796.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1796.json
index 0f74aec0f86..9f7e25bfbba 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1796.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1796.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1796",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T01:29:02.470",
"lastModified": "2024-11-21T04:37:24.000",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108008",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -151,7 +151,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlc-iapp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1797.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1797.json
index ff2d9aa069a..52c312803f0 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1797.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1797.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1797",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T01:29:02.563",
"lastModified": "2024-11-21T04:37:24.127",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107998",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -151,7 +151,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlc-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1798.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1798.json
index a6e007b7bb3..6830e27471e 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1798.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1798.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1798",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-08T20:29:11.097",
"lastModified": "2024-11-21T04:37:24.253",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://bugzilla.clamav.net/show_bug.cgi?id=12262",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Issue Tracking",
@@ -139,7 +139,7 @@
},
{
"url": "https://security.gentoo.org/glsa/201904-12",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2019/CVE-2019-17xx/CVE-2019-1799.json b/CVE-2019/CVE-2019-17xx/CVE-2019-1799.json
index 1b610039158..bdd5b8cc532 100644
--- a/CVE-2019/CVE-2019-17xx/CVE-2019-1799.json
+++ b/CVE-2019/CVE-2019-17xx/CVE-2019-1799.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1799",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T01:29:02.640",
"lastModified": "2024-11-21T04:37:24.380",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -150,7 +150,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108008",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -158,7 +158,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlc-iapp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1800.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1800.json
index f4f01953a1f..76518e0c516 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1800.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1800.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1800",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T01:29:02.733",
"lastModified": "2024-11-21T04:37:24.497",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108008",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -151,7 +151,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlc-iapp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1802.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1802.json
index c41591fb116..f54110f37b4 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1802.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1802.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1802",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T01:29:02.797",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107995",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -124,7 +124,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-cfmc-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1803.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1803.json
index 7885f245a02..a3130bbb804 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1803.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1803.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1803",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:00.737",
"lastModified": "2024-11-21T04:37:24.733",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -240,7 +240,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-nexus9k-rpe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1804.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1804.json
index 24a270ed045..f9d0454effd 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1804.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1804.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1804",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:00.813",
"lastModified": "2024-11-21T04:37:24.863",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -464,7 +464,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-nexus9k-sshkey",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1805.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1805.json
index 820f4caa3c9..e8020d21758 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1805.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1805.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1805",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T01:29:02.890",
"lastModified": "2024-11-21T04:37:25.007",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108003",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlc-ssh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1806.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1806.json
index 9b9d2168557..c4989d90a9b 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1806.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1806.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1806",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T22:29:00.247",
"lastModified": "2024-11-21T04:37:25.137",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3053,7 +3053,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108335",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -3061,7 +3061,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1807.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1807.json
index f222a37dbab..44be017a882 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1807.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1807.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1807",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:00.877",
"lastModified": "2024-11-21T04:37:25.353",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-udb-sm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1808.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1808.json
index b04e1cfe1eb..b0e48833c47 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1808.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1808.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1808",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T23:29:01.010",
"lastModified": "2024-11-21T04:37:25.483",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -330,7 +330,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108367",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -339,7 +339,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-spsv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1809.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1809.json
index e85dd7b3c9b..ef0199d1442 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1809.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1809.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1809",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T23:29:01.073",
"lastModified": "2024-11-21T04:37:25.623",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -379,7 +379,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108375",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -388,7 +388,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-psvb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1810.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1810.json
index 85cdbaa55b8..96f18ca668d 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1810.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1810.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1810",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T23:29:01.153",
"lastModified": "2024-11-21T04:37:25.773",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -257,7 +257,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108431",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -266,7 +266,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-sisv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1811.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1811.json
index 44397772d4c..45aad3dc2a8 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1811.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1811.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1811",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T23:29:01.230",
"lastModified": "2024-11-21T04:37:25.917",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -540,7 +540,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108425",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -549,7 +549,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-sisv2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1812.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1812.json
index b80edc3c6eb..8add6951043 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1812.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1812.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1812",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T23:29:01.277",
"lastModified": "2024-11-21T04:37:26.070",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -540,7 +540,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108425",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -549,7 +549,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-sisv2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1813.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1813.json
index 8d87306615c..bc0f702acea 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1813.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1813.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1813",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-15T23:29:01.357",
"lastModified": "2024-11-21T04:37:26.217",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -540,7 +540,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108425",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -549,7 +549,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-sisv2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1814.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1814.json
index 865b354128c..eb5badf09c9 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1814.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1814.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1814",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T00:29:00.260",
"lastModified": "2024-11-21T04:37:26.363",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -869,7 +869,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108344",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -877,7 +877,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb300sms-dhcp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1816.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1816.json
index dbb4648be1c..fbe843d2262 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1816.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1816.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1816",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:00.937",
"lastModified": "2024-11-21T04:37:26.523",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-wsa-privesc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1817.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1817.json
index af1b1ee10ac..e2f50626176 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1817.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1817.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1817",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:01.000",
"lastModified": "2024-11-21T04:37:26.647",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-wsa-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1818.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1818.json
index 99f591e57d3..5a1c158db89 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1818.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1818.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1818",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T01:29:00.297",
"lastModified": "2024-11-21T04:37:26.773",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108352",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-pathtrav-1818",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1819.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1819.json
index c112d424a68..819d570068b 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1819.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1819.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1819",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T01:29:00.360",
"lastModified": "2024-11-21T04:37:27.780",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108351",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-pathtrav-1819",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1820.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1820.json
index 865f26bb6e4..00e6fdd39e2 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1820.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1820.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1820",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T01:29:00.420",
"lastModified": "2024-11-21T04:37:27.933",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108345",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-pathtrav-1820",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1821.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1821.json
index 9bdcde87f4f..a9a7430f39f 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1821.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1821.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1821",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T01:29:00.483",
"lastModified": "2024-11-21T04:37:28.080",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,11 +138,11 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/153350/Cisco-Prime-Infrastructure-Health-Monitor-TarArchive-Directory-Traversal.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/108339",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -150,7 +150,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1822.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1822.json
index c2a0797f4ef..40c730dd9da 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1822.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1822.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1822",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T01:29:00.530",
"lastModified": "2024-11-21T04:37:28.217",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108339",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1823.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1823.json
index e79021f8156..e9595266eda 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1823.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1823.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1823",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T01:29:00.593",
"lastModified": "2024-11-21T04:37:28.357",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108339",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -146,7 +146,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1824.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1824.json
index 0bb88a51f34..e4681aa0018 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1824.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1824.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1824",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T01:29:00.670",
"lastModified": "2024-11-21T04:37:28.487",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108337",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -141,7 +141,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-sqlinject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1825.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1825.json
index 646ca6f2743..3834ab9a1a0 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1825.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1825.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1825",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T01:29:00.750",
"lastModified": "2024-11-21T04:37:28.623",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108337",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -146,7 +146,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-sqlinject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1826.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1826.json
index ecedd7416d2..52d3f6f4851 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1826.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1826.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1826",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T02:29:05.467",
"lastModified": "2024-11-21T04:37:28.750",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -200,7 +200,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107988",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -208,7 +208,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-aap-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1827.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1827.json
index 5a9cfe0cd79..58c676889c3 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1827.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1827.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1827",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-04T16:29:03.337",
"lastModified": "2024-11-21T04:37:28.887",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107776",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -175,7 +175,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1828.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1828.json
index 361bba1b064..44e7923b01f 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1828.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1828.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1828",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-04T16:29:03.383",
"lastModified": "2024-11-21T04:37:29.007",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107774",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -175,7 +175,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-weak-encrypt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1829.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1829.json
index c4598bea0af..6a13324fdcc 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1829.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1829.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1829",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T02:29:05.577",
"lastModified": "2024-11-21T04:37:29.127",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -237,7 +237,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/107990",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -245,7 +245,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-air-ap-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1830.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1830.json
index 80e514fdee3..b9ca119345d 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1830.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1830.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1830",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T02:29:05.653",
"lastModified": "2024-11-21T04:37:29.260",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108028",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlc-cert-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1831.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1831.json
index 7453b586735..477396b9e29 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1831.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1831.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1831",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T02:29:05.747",
"lastModified": "2024-11-21T04:37:29.390",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108021",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-esa-filter-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1832.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1832.json
index 9a51328c51f..eefe8517acc 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1832.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1832.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1832",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T02:29:00.327",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108340",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -159,7 +159,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftdde-poly-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1833.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1833.json
index d55d7c207ab..2e0f4746ee5 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1833.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1833.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1833",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T02:29:00.373",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -146,7 +146,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108338",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -154,7 +154,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftd-ssltls-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1834.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1834.json
index 6eaa3a87855..bbb7b028cb6 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1834.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1834.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1834",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T02:29:05.843",
"lastModified": "2024-11-21T04:37:29.763",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -236,7 +236,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108000",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -244,7 +244,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-air-ap-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1835.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1835.json
index dddac437a02..b7f1ca82640 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1835.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1835.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1835",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T02:29:05.903",
"lastModified": "2024-11-21T04:37:29.893",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -203,7 +203,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108001",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -211,7 +211,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-air-ap-traversal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1836.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1836.json
index 8cb31ad10b5..39bdf1431f7 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1836.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1836.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1836",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:01.047",
"lastModified": "2024-11-21T04:37:30.010",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108150",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -153,7 +153,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-fabric-traversal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1837.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1837.json
index 947e9e8df75..3366107fc39 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1837.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1837.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1837",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T02:29:05.997",
"lastModified": "2024-11-21T04:37:30.133",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108019",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-ucm-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1838.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1838.json
index a9030691cc1..631fe878a12 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1838.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1838.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1838",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:01.110",
"lastModified": "2024-11-21T04:37:30.260",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,11 +131,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108169",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1839.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1839.json
index 02531da0e0a..dc858698c39 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1839.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1839.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1839",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:14.153",
"lastModified": "2024-11-21T04:37:30.377",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -234,7 +234,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-rphy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1840.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1840.json
index 10db91d6ead..ff84d2488e8 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1840.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1840.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1840",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T02:29:06.060",
"lastModified": "2024-11-21T04:37:30.500",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108033",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -142,7 +142,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-pnr-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1841.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1841.json
index 967ee1fb6ac..6f647fdef73 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1841.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1841.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1841",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-04-18T02:29:06.123",
"lastModified": "2024-11-21T04:37:30.627",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108084",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-swim-proxy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1842.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1842.json
index 1e7da850027..5efc44c28eb 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1842.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1842.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1842",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-05T17:29:00.430",
"lastModified": "2024-11-21T04:37:30.750",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -290,7 +290,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108687",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -298,7 +298,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-iosxr-ssh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1843.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1843.json
index 03f1b23dfc5..a0f49e6d6c1 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1843.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1843.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1843",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:11.853",
"lastModified": "2024-11-21T04:37:30.880",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -195,7 +195,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108864",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -203,7 +203,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-rvrouters-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1844.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1844.json
index 3ba9f26d3db..6d06e1de0ae 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1844.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1844.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1844",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:01.173",
"lastModified": "2024-11-21T04:37:31.013",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108149",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-esa-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1845.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1845.json
index 2b39ca851c8..e25289061c3 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1845.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1845.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1845",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-05T17:29:00.460",
"lastModified": "2024-11-21T04:37:31.140",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108615",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -141,7 +141,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-cucm-imp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1846.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1846.json
index b06d29550ac..668a6950502 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1846.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1846.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1846",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T02:29:00.437",
"lastModified": "2024-11-21T04:37:31.273",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -183,7 +183,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108363",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -191,7 +191,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-asr9k-mpls-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1848.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1848.json
index fd5ac9ae0f9..1fe6450896f 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1848.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1848.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1848",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:11.917",
"lastModified": "2024-11-21T04:37:31.410",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108837",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-dnac-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1849.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1849.json
index a5982563383..55dc24990a2 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1849.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1849.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1849",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T02:29:00.497",
"lastModified": "2024-11-21T04:37:31.553",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -149,7 +149,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108342",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -157,7 +157,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-iosxr-evpn-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1850.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1850.json
index abc3b8d7fe8..c88a7862047 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1850.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1850.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1850",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:14.217",
"lastModified": "2024-11-21T04:37:31.670",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -291,7 +291,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1850",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1851.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1851.json
index a5a5e7ec146..efa181c61c7 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1851.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1851.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1851",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T02:29:00.543",
"lastModified": "2024-11-21T04:37:31.803",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108356",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -146,7 +146,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ise-certcreation",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1852.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1852.json
index cc30c511d51..67752a01f71 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1852.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1852.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1852",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:01.250",
"lastModified": "2024-11-21T04:37:31.930",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-pnr-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1853.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1853.json
index 259a118ba42..947b3f7e273 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1853.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1853.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1853",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T02:29:00.607",
"lastModified": "2024-11-21T04:37:32.053",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108364",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-anyconnectclient-oob-read",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1854.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1854.json
index be2ddbd7851..5d1edd9aaae 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1854.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1854.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1854",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:01.297",
"lastModified": "2024-11-21T04:37:32.190",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,23 +126,23 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/152963/Cisco-Expressway-Gateway-11.5.1-Directory-Traversal.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://seclists.org/fulldisclosure/2019/May/28",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/108154",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://seclists.org/bugtraq/2019/May/49",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-expressway-traversal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1855.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1855.json
index dc85f92c0f6..e83fd75581c 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1855.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1855.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1855",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-04T20:15:10.873",
"lastModified": "2024-11-21T04:37:32.313",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/109038",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-jabber-dll",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1856.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1856.json
index 4e76f592641..5d6020fce00 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1856.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1856.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1856",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:01.360",
"lastModified": "2024-11-21T04:37:32.457",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,11 +126,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108148",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-pca-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1857.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1857.json
index e84ed387fac..ca6df2a8fea 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1857.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1857.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1857",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:01.437",
"lastModified": "2024-11-21T04:37:32.597",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -489,11 +489,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108163",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-hyperflex-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1858.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1858.json
index 68f1ba2104a..1fd6abf1d1c 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1858.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1858.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1858",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T02:29:00.670",
"lastModified": "2024-11-21T04:37:32.763",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1319,7 +1319,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108358",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1327,7 +1327,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-snmp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1859.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1859.json
index f711f155af6..989bc2e0e71 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1859.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1859.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1859",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-03T17:29:01.500",
"lastModified": "2024-11-21T04:37:32.957",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3305,7 +3305,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1860.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1860.json
index 2c7094c3295..564170ade93 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1860.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1860.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1860",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-16T02:29:00.717",
"lastModified": "2024-11-21T04:37:33.260",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,11 +126,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108354",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-cuic-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1861.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1861.json
index e0a0f7b8c85..9bb42406ce6 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1861.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1861.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1861",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-05T17:29:00.490",
"lastModified": "2024-11-21T04:37:33.463",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108622",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ind-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1862.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1862.json
index 60eb3ca773d..1db8baeff4d 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1862.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1862.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1862",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-13T20:29:03.007",
"lastModified": "2024-11-21T04:37:33.600",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,18 +126,18 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108331",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-webui",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.kb.cert.org/vuls/id/400865",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://www.securityfocus.com/bid/108331",
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1863.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1863.json
index 80298b3df9a..ee022991ece 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1863.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1863.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1863",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:14.277",
"lastModified": "2024-11-21T04:37:33.743",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -386,7 +386,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-privilege",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1864.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1864.json
index 0e59758dd0d..8dc5d9c4d8e 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1864.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1864.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1864",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:14.357",
"lastModified": "2024-11-21T04:37:33.893",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -386,7 +386,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1864",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1865.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1865.json
index 865afd30ace..0c24d43ada3 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1865.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1865.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1865",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:14.420",
"lastModified": "2024-11-21T04:37:34.050",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -386,7 +386,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1865",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1866.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1866.json
index 49c2ca963b6..0671a17db1a 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1866.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1866.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1866",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-13T17:15:10.937",
"lastModified": "2024-11-21T04:37:34.197",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvm98833",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1867.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1867.json
index 57066bc41cb..58f2a0387be 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1867.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1867.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1867",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-05-10T12:29:00.387",
"lastModified": "2024-11-21T04:37:34.337",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190507-esc-authbypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1868.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1868.json
index 700d6739a2d..236439e157f 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1868.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1868.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1868",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-05T17:29:00.537",
"lastModified": "2024-11-21T04:37:34.527",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108625",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-webexmeetings-id",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1869.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1869.json
index 168b959b472..197e17dc125 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1869.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1869.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1869",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:11.993",
"lastModified": "2024-11-21T04:37:34.670",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -192,7 +192,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108853",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -200,7 +200,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-staros-asr-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1870.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1870.json
index 86118d118d1..c75121a1aaf 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1870.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1870.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1870",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-05T17:29:00.570",
"lastModified": "2024-11-21T04:37:34.820",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108645",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ece-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1871.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1871.json
index 3a83f2ac5df..b3a095a1838 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1871.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1871.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1871",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:14.480",
"lastModified": "2024-11-21T04:37:34.953",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -212,7 +212,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-bo",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1872.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1872.json
index 31e3a195a29..9ec5f4192c8 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1872.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1872.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1872",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-05T17:29:00.600",
"lastModified": "2024-11-21T04:37:35.100",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108677",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-vcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1873.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1873.json
index af66d9a2ce8..32b6e697313 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1873.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1873.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1873",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-10T18:15:11.003",
"lastModified": "2024-11-21T04:37:35.247",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -273,7 +273,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/109123",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -281,7 +281,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190710-asa-ftd-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1874.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1874.json
index 297e6e9987f..253a21e190e 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1874.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1874.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1874",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:12.057",
"lastModified": "2024-11-21T04:37:35.403",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,11 +141,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108861",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-psc-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1875.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1875.json
index ef05f1e90cf..55db347d9f2 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1875.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1875.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1875",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:12.103",
"lastModified": "2024-11-21T04:37:35.540",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -146,7 +146,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108836",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -154,7 +154,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-psc-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1876.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1876.json
index b47320c7a3e..72b439e6775 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1876.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1876.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1876",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:12.167",
"lastModified": "2024-11-21T04:37:35.670",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108863",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -144,7 +144,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-waas-authbypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1877.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1877.json
index 2410307e240..899e6beba97 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1877.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1877.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1877",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-05T20:15:11.407",
"lastModified": "2024-11-21T04:37:35.787",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-ecea-dwnload",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1878.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1878.json
index 44bdb881ba3..b26d5a8e1fc 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1878.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1878.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1878",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:12.230",
"lastModified": "2024-11-21T04:37:35.903",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -149,7 +149,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108883",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -157,7 +157,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-tele-shell-inj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1879.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1879.json
index 2b5906cbf78..3f1dd4d0523 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1879.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1879.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1879",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:12.290",
"lastModified": "2024-11-21T04:37:36.020",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108850",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -149,7 +149,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-cimc-cli-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1880.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1880.json
index 9c5524e7cd4..8be04f1c828 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1880.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1880.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1880",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-05T17:29:00.647",
"lastModified": "2024-11-21T04:37:36.150",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -328,11 +328,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108680",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ucs-biossig-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1881.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1881.json
index feb395fe693..1d8658f5707 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1881.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1881.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1881",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-05T17:29:00.680",
"lastModified": "2024-11-21T04:37:36.277",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108678",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ind-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1882.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1882.json
index 8210baf7da9..ba02436d3ff 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1882.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1882.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1882",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-05T17:29:00.710",
"lastModified": "2024-11-21T04:37:36.403",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108629",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ind-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1883.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1883.json
index f1ce82f8896..6a2d359267c 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1883.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1883.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1883",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:14.637",
"lastModified": "2024-11-21T04:37:36.547",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -293,7 +293,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-cimc-cli-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1884.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1884.json
index a1827a5c459..c57bf3c8eef 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1884.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1884.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1884",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-04T20:15:10.937",
"lastModified": "2024-11-21T04:37:36.687",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -172,7 +172,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-asyncos-wsa",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1885.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1885.json
index e95c2a23218..450869831b0 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1885.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1885.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1885",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:14.840",
"lastModified": "2024-11-21T04:37:36.810",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -213,7 +213,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-ucs-cimc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1886.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1886.json
index d92bbd0082c..2cf930f2e86 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1886.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1886.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1886",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-04T20:15:11.000",
"lastModified": "2024-11-21T04:37:36.930",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -162,7 +162,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/109049",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -170,7 +170,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-wsa-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1887.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1887.json
index 9fa943c5936..72b4bc484b1 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1887.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1887.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1887",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-06T02:15:11.090",
"lastModified": "2024-11-21T04:37:37.050",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-cucm-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1888.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1888.json
index 414eb69dc21..3d76f4843b4 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1888.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1888.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1888",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:14.410",
"lastModified": "2024-11-21T04:37:37.177",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-privesc-Zd7bvwyf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1889.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1889.json
index 08e994f4788..6979eb2d078 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1889.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1889.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1889",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-04T20:15:11.063",
"lastModified": "2024-11-21T04:37:37.310",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-ccapic-restapi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1890.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1890.json
index 4510ea56546..386cda7ab31 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1890.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1890.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1890",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-04T20:15:11.123",
"lastModified": "2024-11-21T04:37:37.437",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -300,7 +300,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/109052",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -308,7 +308,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-n9kaci-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1891.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1891.json
index d3dd1c8a6ce..2b533845bac 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1891.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1891.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1891",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-06T02:15:11.183",
"lastModified": "2024-11-21T04:37:37.573",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1707,7 +1707,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1892.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1892.json
index d8fb813a122..bc937e424c6 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1892.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1892.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1892",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-06T02:15:11.293",
"lastModified": "2024-11-21T04:37:37.757",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1707,7 +1707,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1893.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1893.json
index 9ac06441284..bfeb05c200c 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1893.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1893.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1893",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-06T02:15:11.370",
"lastModified": "2024-11-21T04:37:37.933",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-nfvis-commandinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1894.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1894.json
index 267fe3461f3..98e7bd83ff1 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1894.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1894.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1894",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-06T02:15:11.450",
"lastModified": "2024-11-21T04:37:38.060",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-nfvis-file-readwrite",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1895.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1895.json
index 88ab7eeff96..8691d718b56 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1895.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1895.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1895",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T21:15:11.283",
"lastModified": "2024-11-21T04:37:38.183",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfvis-vnc-authbypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1896.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1896.json
index e12d113136f..fc457da01f2 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1896.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1896.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1896",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:15.013",
"lastModified": "2024-11-21T04:37:38.333",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -300,7 +300,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1897.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1897.json
index f8c16a79602..ba04efe7ed3 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1897.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1897.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1897",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:12.353",
"lastModified": "2024-11-21T04:37:38.470",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108848",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -202,14 +202,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-rv-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2019-29",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1898.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1898.json
index f021365ef6c..90899c78773 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1898.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1898.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1898",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:12.433",
"lastModified": "2024-11-21T04:37:38.620",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108865",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -202,14 +202,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-rv-fileaccess",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2019-29",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1899.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1899.json
index e78be5ee928..d56959b1262 100644
--- a/CVE-2019/CVE-2019-18xx/CVE-2019-1899.json
+++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1899.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1899",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:12.480",
"lastModified": "2024-11-21T04:37:38.757",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108867",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -202,14 +202,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-rv-infodis",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2019-29",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1900.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1900.json
index e1cb7feb3ce..46945edce3a 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1900.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1900.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1900",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:15.090",
"lastModified": "2024-11-21T04:37:38.900",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1901.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1901.json
index 8063a3d9232..bc897fd0c2a 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1901.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1901.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1901",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-31T18:15:11.050",
"lastModified": "2024-11-21T04:37:39.023",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -282,7 +282,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190731-nxos-bo",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1903.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1903.json
index 3ab171bef3d..93a7ac12aa1 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1903.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1903.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1903",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:12.540",
"lastModified": "2024-11-21T04:37:39.163",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108857",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -134,7 +134,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-csm-xml",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1904.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1904.json
index 84921205ae8..b693cca521e 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1904.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1904.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1904",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-21T03:15:09.513",
"lastModified": "2024-11-21T04:37:39.300",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -483,7 +483,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190612-iosxe-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1905.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1905.json
index 39875edc149..607c413c506 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1905.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1905.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1905",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:12.603",
"lastModified": "2024-11-21T04:37:39.443",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108856",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -139,7 +139,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-esa-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1906.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1906.json
index bf0957eac6d..a2450e94414 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1906.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1906.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1906",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:12.650",
"lastModified": "2024-11-21T04:37:39.573",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/108855",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -136,7 +136,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-prime-privescal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1907.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1907.json
index def1a4604c0..f7e869a3201 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1907.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1907.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1907",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:15.170",
"lastModified": "2024-11-21T04:37:39.700",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -204,7 +204,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-privescal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1908.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1908.json
index 926d819bdbe..b186588cb2f 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1908.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1908.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1908",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:15.230",
"lastModified": "2024-11-21T04:37:39.833",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -220,7 +220,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-infodisc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1909.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1909.json
index 51afedfdd1d..e9f6c5b5f65 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1909.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1909.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1909",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-06T02:15:11.527",
"lastModified": "2024-11-21T04:37:39.967",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-iosxr-bgp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1910.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1910.json
index bf79df0471f..1b87a1ad9eb 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1910.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1910.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1910",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T21:15:11.363",
"lastModified": "2024-11-21T04:37:40.087",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -144,7 +144,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-iosxr-isis-dos-1910",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1911.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1911.json
index cb907005b03..0c6feeed531 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1911.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1911.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1911",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-06T02:15:11.620",
"lastModified": "2024-11-21T04:37:40.217",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-cucdm-rsh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1912.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1912.json
index 7bd450c5830..26dadc906d1 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1912.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1912.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1912",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T06:15:11.337",
"lastModified": "2024-11-21T04:37:40.340",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -421,7 +421,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -429,7 +429,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-auth_bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1913.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1913.json
index de8a174e975..7de027cd707 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1913.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1913.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1913",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T06:15:11.933",
"lastModified": "2024-11-21T04:37:40.477",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -419,11 +419,11 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1914.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1914.json
index 1b8ef99fa2a..17d1ade274f 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1914.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1914.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1914",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T06:15:12.027",
"lastModified": "2024-11-21T04:37:40.633",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -419,11 +419,11 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1915.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1915.json
index 8e835983b14..0e4675f32d3 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1915.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1915.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1915",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-10-02T19:15:15.547",
"lastModified": "2024-11-21T04:37:40.783",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -188,7 +188,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-cucm-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1917.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1917.json
index b885306421c..006335e9e11 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1917.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1917.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1917",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-17T21:15:11.937",
"lastModified": "2024-11-21T04:37:40.923",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -184,7 +184,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/109301",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -192,7 +192,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-cvdsd-wmauth",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1918.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1918.json
index 91e29a75e5a..19d94677ad9 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1918.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1918.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1918",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T22:15:15.447",
"lastModified": "2024-11-21T04:37:41.070",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -150,7 +150,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-iosxr-isis-dos-1918",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1919.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1919.json
index 03eca4d593e..90d9072b3fa 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1919.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1919.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1919",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-17T21:15:12.030",
"lastModified": "2024-11-21T04:37:41.190",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,14 +131,14 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/109305",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-cfnm-statcred",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1920.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1920.json
index 6ea70cdd2b2..61f2f966ddc 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1920.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1920.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1920",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-17T21:15:12.093",
"lastModified": "2024-11-21T04:37:41.320",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -246,7 +246,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/109312",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -254,7 +254,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-aironet-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1921.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1921.json
index f6af922b2e4..070575ebb94 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1921.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1921.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1921",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-06T02:15:11.713",
"lastModified": "2024-11-21T04:37:41.443",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-esa-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1922.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1922.json
index 67a728179f0..b52116d6622 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1922.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1922.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1922",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-06T02:15:11.793",
"lastModified": "2024-11-21T04:37:41.573",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -470,7 +470,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-ip-phone-sip-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1923.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1923.json
index c0208f71eee..038f600f31f 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1923.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1923.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1923",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-17T21:15:12.170",
"lastModified": "2024-11-21T04:37:41.697",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -393,7 +393,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/109294",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -401,7 +401,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-spa500-command",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1924.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1924.json
index e993949e902..08ba9fb56ae 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1924.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1924.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1924",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T22:15:15.507",
"lastModified": "2024-11-21T04:37:41.843",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -155,7 +155,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1925.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1925.json
index 1d3d1ca02f1..d88498538a1 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1925.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1925.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1925",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T21:15:11.423",
"lastModified": "2024-11-21T04:37:41.960",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -155,7 +155,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1926.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1926.json
index ab1f4ed2c17..966e6c6e391 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1926.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1926.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1926",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T22:15:15.587",
"lastModified": "2024-11-21T04:37:42.080",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -155,7 +155,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1927.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1927.json
index c9f8e36030a..94e3c184de3 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1927.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1927.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1927",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T22:15:15.650",
"lastModified": "2024-11-21T04:37:42.203",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -155,7 +155,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1928.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1928.json
index 4bd2a790781..cfa95827b0b 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1928.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1928.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1928",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T22:15:15.713",
"lastModified": "2024-11-21T04:37:42.327",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -155,7 +155,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1929.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1929.json
index 10203d3661d..f978923ac06 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1929.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1929.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1929",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T22:15:15.790",
"lastModified": "2024-11-21T04:37:42.450",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -155,7 +155,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1930.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1930.json
index e4ed417ebaf..b5478fdee02 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1930.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1930.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1930",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-06T02:15:11.870",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-fmc-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1931.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1931.json
index 29c81e54e33..916e6985324 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1931.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1931.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1931",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-06T02:15:11.950",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-fmc-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1932.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1932.json
index ef1007c1d27..5dea4b4d059 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1932.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1932.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1932",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-06T02:15:12.090",
"lastModified": "2024-11-21T04:37:42.820",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-amp-commandinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1933.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1933.json
index 6dddfe41035..b025dda36a8 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1933.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1933.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1933",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-06T02:15:12.183",
"lastModified": "2024-11-21T04:37:42.943",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-esa-filterpass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1934.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1934.json
index 9f0a8a4aaf0..b5a7065cea4 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1934.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1934.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1934",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T22:15:15.837",
"lastModified": "2024-11-21T04:37:43.053",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-asa-privescala",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1935.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1935.json
index 0b7760b3199..7355d8fc6c7 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1935.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1935.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1935",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:15.277",
"lastModified": "2024-11-21T04:37:43.173",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -215,7 +215,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -224,7 +224,7 @@
},
{
"url": "http://packetstormsecurity.com/files/154305/Cisco-UCS-Director-Default-scpuser-Password.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -232,7 +232,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2019/Aug/36",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -240,7 +240,7 @@
},
{
"url": "https://seclists.org/bugtraq/2019/Aug/49",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Mailing List",
@@ -249,7 +249,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-usercred",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1936.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1936.json
index cbcdb18bead..86c3a35f868 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1936.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1936.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1936",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:15.357",
"lastModified": "2024-11-21T04:37:43.317",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -215,7 +215,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -224,7 +224,7 @@
},
{
"url": "http://packetstormsecurity.com/files/154308/Cisco-UCS-Director-Unauthenticated-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -233,7 +233,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2019/Aug/36",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -241,7 +241,7 @@
},
{
"url": "https://seclists.org/bugtraq/2019/Aug/49",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Exploit",
@@ -251,7 +251,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1937.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1937.json
index e4b134a072b..1bacd1e7a73 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1937.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1937.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1937",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:15.403",
"lastModified": "2024-11-21T04:37:43.487",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -179,7 +179,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -187,26 +187,26 @@
},
{
"url": "http://packetstormsecurity.com/files/154308/Cisco-UCS-Director-Unauthenticated-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://packetstormsecurity.com/files/173531/Cisco-UCS-IMC-Supervisor-2.2.0.0-Authentication-Bypass.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "http://seclists.org/fulldisclosure/2019/Aug/36",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://seclists.org/bugtraq/2019/Aug/49",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-authby",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1938.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1938.json
index 7634ed6449e..f7376743b96 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1938.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1938.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1938",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:15.467",
"lastModified": "2024-11-21T04:37:43.613",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-ucsd-authbypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1939.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1939.json
index e0d4b20ff33..e1b9a42e4a2 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1939.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1939.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1939",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-05T02:15:13.307",
"lastModified": "2024-11-21T04:37:43.740",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-webex-teams",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1940.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1940.json
index 3784d9a264f..af7cf3c023f 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1940.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1940.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1940",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-17T21:15:12.250",
"lastModified": "2024-11-21T04:37:43.857",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/109296",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -137,7 +137,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-wsma-info",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1941.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1941.json
index 92c34e613da..cfbac9daac9 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1941.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1941.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1941",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-17T21:15:12.310",
"lastModified": "2024-11-21T04:37:43.967",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -172,7 +172,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/109297",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -180,7 +180,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-ise-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1942.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1942.json
index 38ced85d5f0..9b07068a30b 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1942.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1942.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1942",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-17T21:15:12.390",
"lastModified": "2024-11-21T04:37:44.093",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/109283",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-ise-sql-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1943.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1943.json
index 711bf9043a2..065e2d4a368 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1943.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1943.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1943",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-07-17T21:15:12.453",
"lastModified": "2024-11-21T04:37:44.213",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1650,7 +1650,7 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/109288",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1658,7 +1658,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-sbss-redirect",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1944.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1944.json
index 70cc67d177a..3d107ec621e 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1944.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1944.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1944",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T22:15:15.900",
"lastModified": "2024-11-21T04:37:44.380",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-asa-multi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1945.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1945.json
index e5fb66c7ac8..a4a7bd2dbcb 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1945.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1945.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1945",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-07T22:15:15.993",
"lastModified": "2024-11-21T04:37:44.503",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-asa-multi",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1946.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1946.json
index 1e9022475d4..8ba8b8d6496 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1946.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1946.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1946",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:12.147",
"lastModified": "2024-11-21T04:37:44.627",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfvis-authbypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1947.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1947.json
index 48c7da758df..56e9b898566 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1947.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1947.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1947",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:14.520",
"lastModified": "2024-11-21T04:37:44.757",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1948.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1948.json
index aadab2445cc..19c1283f8d7 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1948.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1948.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1948",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:15.543",
"lastModified": "2024-11-21T04:37:44.890",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-webex-ssl-cert",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1949.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1949.json
index 33e31bdc278..906bac559b5 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1949.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1949.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1949",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:12.210",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -153,7 +153,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-fmc-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1950.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1950.json
index 11a1b59aeb7..cc1ccd94308 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1950.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1950.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1950",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T20:15:14.410",
"lastModified": "2024-11-21T04:37:45.133",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -299,7 +299,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-cred-EVGSF259",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1951.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1951.json
index bcfba9bfcbc..c950535a265 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1951.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1951.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1951",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:12.273",
"lastModified": "2024-11-21T04:37:45.270",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-sd-wan-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1952.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1952.json
index 1dfbf694aaf..7417ad2c020 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1952.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1952.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1952",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:12.333",
"lastModified": "2024-11-21T04:37:45.400",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-cli-path",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1953.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1953.json
index efc29699353..31414f25951 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1953.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1953.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1953",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:12.413",
"lastModified": "2024-11-21T04:37:45.523",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-pwrecov",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1954.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1954.json
index d42598ad009..141dc790c22 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1954.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1954.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1954",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:12.477",
"lastModified": "2024-11-21T04:37:45.640",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-wms-oredirect",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1955.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1955.json
index 207e51d6bbe..d36e5fcb808 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1955.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1955.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1955",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:12.537",
"lastModified": "2024-11-21T04:37:45.750",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-esm-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1956.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1956.json
index c9ffae8f6c2..61d163b745c 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1956.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1956.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1956",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:12.583",
"lastModified": "2024-11-21T04:37:45.870",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-spa112-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1957.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1957.json
index aee72c5fcdf..cc1e3c2e59a 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1957.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1957.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1957",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:12.647",
"lastModified": "2024-11-21T04:37:45.990",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-fnd-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1958.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1958.json
index ae5d08c10b5..54dc8a3f171 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1958.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1958.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1958",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:12.727",
"lastModified": "2024-11-21T04:37:46.110",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-hypflex-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1959.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1959.json
index 17c07e88f62..6adb89f68bb 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1959.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1959.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1959",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:12.787",
"lastModified": "2024-11-21T04:37:46.233",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-read",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1960.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1960.json
index d62b81d1911..324d7f6357b 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1960.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1960.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1960",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:12.833",
"lastModified": "2024-11-21T04:37:46.363",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-read",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1961.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1961.json
index 12aacc7a439..fb442eaa12d 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1961.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1961.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1961",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:12.897",
"lastModified": "2024-11-21T04:37:46.490",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-fileread",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1962.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1962.json
index 58c138c1dec..94baa4d8d61 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1962.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1962.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1962",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-28T19:15:10.867",
"lastModified": "2024-11-21T04:37:46.613",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -746,7 +746,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-fsip-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1963.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1963.json
index 18d75b21f1c..6c288486503 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1963.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1963.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1963",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-28T19:15:10.913",
"lastModified": "2024-11-21T04:37:46.770",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1280,7 +1280,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-fxnxos-snmp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1964.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1964.json
index ab6559b906b..23be7c04899 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1964.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1964.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1964",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-28T19:15:10.973",
"lastModified": "2024-11-21T04:37:46.927",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -282,7 +282,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ipv6-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1965.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1965.json
index 5662b122b9e..cf87fa3d5dd 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1965.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1965.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1965",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-28T19:15:11.053",
"lastModified": "2024-11-21T04:37:47.067",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -763,7 +763,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-memleak-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1966.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1966.json
index 3176361292a..13534bf6a8f 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1966.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1966.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1966",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-30T09:15:20.193",
"lastModified": "2024-11-21T04:37:47.227",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -191,7 +191,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-ucs-privescalation",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1967.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1967.json
index 928591dfbb4..95c1ad7a98f 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1967.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1967.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1967",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-30T09:15:20.287",
"lastModified": "2024-11-21T04:37:47.367",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -830,7 +830,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ntp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1968.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1968.json
index d7e923db392..99b3e05ae4d 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1968.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1968.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1968",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-30T09:15:20.380",
"lastModified": "2024-11-21T04:37:47.520",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -785,7 +785,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-api-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1969.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1969.json
index 0741c594441..04a7b04031b 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1969.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1969.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1969",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-30T09:15:20.443",
"lastModified": "2024-11-21T04:37:47.670",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -492,7 +492,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-snmp-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1970.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1970.json
index 7374ad4eee8..3959d949af6 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1970.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1970.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1970",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:12.960",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -137,7 +137,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-ftd-bypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1971.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1971.json
index ca07d5d10bd..d61df859201 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1971.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1971.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1971",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:13.023",
"lastModified": "2024-11-21T04:37:47.957",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -130,7 +130,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-commandinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1972.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1972.json
index 1b3e836cde7..ca31d8a2934 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1972.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1972.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1972",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:13.070",
"lastModified": "2024-11-21T04:37:48.090",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -130,7 +130,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-privescal",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1973.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1973.json
index e4bc5c75639..a1fd585a7aa 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1973.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1973.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1973",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-08T08:15:13.147",
"lastModified": "2024-11-21T04:37:48.213",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1974.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1974.json
index 7a2ac78eaa3..358036a37d8 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1974.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1974.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1974",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:15.607",
"lastModified": "2024-11-21T04:37:48.333",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -236,7 +236,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-authbypass",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1975.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1975.json
index 1cebaf5d6f9..88c568ea4e5 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1975.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1975.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1975",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-18T17:15:16.240",
"lastModified": "2024-11-21T04:37:48.460",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -278,7 +278,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190918-hyperflex-xfs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1976.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1976.json
index d192d78dc76..1d6f5bb93c7 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1976.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1976.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1976",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-09-05T02:15:13.387",
"lastModified": "2024-11-21T04:37:48.620",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-ind",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1977.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1977.json
index 0535c2c18af..337e473c33e 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1977.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1977.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1977",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-30T09:15:20.553",
"lastModified": "2024-11-21T04:37:48.753",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -258,7 +258,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nexus-aci-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1978.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1978.json
index 38fbb95fec5..de387114f98 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1978.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1978.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1978",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-05T20:15:11.500",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -164,7 +164,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-srb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1980.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1980.json
index a2f42a6809a..7f0ca9de8a9 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1980.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1980.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1980",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-05T20:15:11.690",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -164,7 +164,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-nspd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1981.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1981.json
index f0a61648e3a..35705e50cb7 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1981.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1981.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1981",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-05T20:15:11.783",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -164,7 +164,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-null",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1982.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1982.json
index e2daaadf690..549bb46b508 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1982.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1982.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1982",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-11-05T20:15:11.907",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-http",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1983.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1983.json
index 8f9d8bca0ab..419a91dc1c3 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1983.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1983.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1983",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:14.613",
"lastModified": "2024-11-21T04:37:49.387",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -174,7 +174,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-sma-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2019/CVE-2019-19xx/CVE-2019-1984.json b/CVE-2019/CVE-2019-19xx/CVE-2019-1984.json
index 60b1cb2155e..829d31c0993 100644
--- a/CVE-2019/CVE-2019-19xx/CVE-2019-1984.json
+++ b/CVE-2019/CVE-2019-19xx/CVE-2019-1984.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2019-1984",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2019-08-21T19:15:15.670",
"lastModified": "2024-11-21T04:37:49.523",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-nfv-filewrite",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26062.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26062.json
index f8ff28dd31e..e342e571320 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26062.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26062.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26062",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:05.170",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,23 +54,23 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-zWkppJxL",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-enum-CyheP3B7",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanx3-vrZbOqqD",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vsoln-arbfile-gtsEYxns",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-xss-zLW9tD3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26063.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26063.json
index 651f3b7fbf1..8600d6addb2 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26063.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26063.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26063",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:05.460",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,19 +54,19 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-zWkppJxL",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanx3-vrZbOqqD",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vsoln-arbfile-gtsEYxns",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-xss-zLW9tD3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26064.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26064.json
index 1cdbe408075..58041506f7f 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26064.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26064.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26064",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-04T21:15:09.580",
"lastModified": "2024-11-21T05:19:07.480",
"vulnStatus": "Modified",
@@ -36,7 +36,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -59,7 +59,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -294,7 +294,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanx2-KpFVSUc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26065.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26065.json
index 58c335b9c94..2af93f486be 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26065.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26065.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26065",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-04T21:15:10.640",
"lastModified": "2024-11-21T05:19:08.080",
"vulnStatus": "Modified",
@@ -36,7 +36,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -59,7 +59,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -294,7 +294,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanpt2-FqLuefsS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26066.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26066.json
index 786be415f37..a8f2c0424b5 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26066.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26066.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26066",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T17:15:09.437",
"lastModified": "2024-11-19T21:57:56.293",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanx3-vrZbOqqD",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26067.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26067.json
index 87938d89ed6..b2bdd871fb1 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26067.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26067.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26067",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T17:15:09.757",
"lastModified": "2024-11-19T21:57:56.293",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-xss-zLW9tD3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26068.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26068.json
index 91e746939f9..8b9b35f2fc7 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26068.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26068.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26068",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T18:15:11.403",
"lastModified": "2024-11-21T05:19:09.690",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -140,7 +140,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-uathracc-jWNESUfM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26070.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26070.json
index a962306eee9..18e893c884c 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26070.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26070.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26070",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-12T02:15:11.057",
"lastModified": "2024-11-21T05:19:10.127",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -196,7 +196,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr-cp-dos-ej8VB9QY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26071.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26071.json
index 45f6c630ba1..f76cae56af7 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26071.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26071.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26071",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:05.710",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vsoln-arbfile-gtsEYxns",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26072.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26072.json
index 5eb5b4322a9..f1b104dca39 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26072.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26072.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26072",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T18:15:11.543",
"lastModified": "2024-11-21T05:19:10.397",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-AUTH-vEypBmmR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26073.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26073.json
index 149bbc030b9..33e71193211 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26073.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26073.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26073",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:05.947",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-traversal-hQh24tmk",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-escalation-Jhqs5Skf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26074.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26074.json
index b4dfe56310a..3f4c330ca09 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26074.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26074.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26074",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:06.170",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-escalation-Jhqs5Skf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26075.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26075.json
index ea5503c8ab4..52c4b2f3d70 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26075.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26075.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26075",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T18:15:11.637",
"lastModified": "2024-11-21T05:19:10.853",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-SQL-zEkBnL2h",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26076.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26076.json
index 2f0d3a3babb..71ee133d9f4 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26076.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26076.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26076",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T18:15:11.730",
"lastModified": "2024-11-21T05:19:11.020",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-SSI-V2myWX9y",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26077.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26077.json
index 74539a62188..b990008dccd 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26077.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26077.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26077",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T18:15:11.810",
"lastModified": "2024-11-21T05:19:11.197",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-LV-hE4Rntet",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26078.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26078.json
index 91bd9dcb26e..24ea864857b 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26078.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26078.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26078",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T18:15:11.903",
"lastModified": "2024-11-21T05:19:11.363",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-OVW-SHzOE3Pd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26079.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26079.json
index 070008d81a8..48dc365f131 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26079.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26079.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26079",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T18:15:11.997",
"lastModified": "2024-11-21T05:19:11.533",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-PWH-yCA6M7p",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26080.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26080.json
index f34c062552a..b823a3d87a7 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26080.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26080.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26080",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T18:15:12.077",
"lastModified": "2024-11-21T05:19:11.697",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-UPWD-dCRPuQ78",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26081.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26081.json
index d30c8e09b98..55c776d7ff0 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26081.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26081.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26081",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T18:15:12.167",
"lastModified": "2024-11-21T05:19:11.853",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-XSS-NzOPCGEc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26082.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26082.json
index 3d7145cd15d..45896259b93 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26082.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26082.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26082",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-04T21:15:10.787",
"lastModified": "2024-11-21T05:19:12.007",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -140,7 +140,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-zip-bypass-gbU4gtTg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26083.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26083.json
index 62a610c4b19..0c738095984 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26083.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26083.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26083",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:13.017",
"lastModified": "2024-11-21T05:19:12.180",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxs-pkjCmq9d",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26084.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26084.json
index 856b96d5146..f648e4957db 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26084.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26084.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26084",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:13.143",
"lastModified": "2024-11-21T05:19:12.340",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-eff-incperm-9E6h4yBz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26085.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26085.json
index ef7715991ac..7b4152127ac 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26085.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26085.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26085",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-07T00:15:14.663",
"lastModified": "2024-11-21T05:19:12.493",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -187,7 +187,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-ZktzjpgO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26086.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26086.json
index 3e6e7abe4de..0a77a05e31a 100644
--- a/CVE-2020/CVE-2020-260xx/CVE-2020-26086.json
+++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26086.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-26086",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:13.250",
"lastModified": "2024-11-21T05:19:12.650",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tele-info-DrEGLpDQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-271xx/CVE-2020-27121.json b/CVE-2020/CVE-2020-271xx/CVE-2020-27121.json
index 9e7ef33f9fc..5f85d82989e 100644
--- a/CVE-2020/CVE-2020-271xx/CVE-2020-27121.json
+++ b/CVE-2020/CVE-2020-271xx/CVE-2020-27121.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-27121",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:13.360",
"lastModified": "2024-11-21T05:20:45.200",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-dos-uTx2dqu2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-271xx/CVE-2020-27122.json b/CVE-2020/CVE-2020-271xx/CVE-2020-27122.json
index b3a0faa80af..aae12c04276 100644
--- a/CVE-2020/CVE-2020-271xx/CVE-2020-27122.json
+++ b/CVE-2020/CVE-2020-271xx/CVE-2020-27122.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-27122",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:13.487",
"lastModified": "2024-11-21T05:20:45.307",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-fNZX8hHj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-271xx/CVE-2020-27123.json b/CVE-2020/CVE-2020-271xx/CVE-2020-27123.json
index 69e21fa3781..999848a2214 100644
--- a/CVE-2020/CVE-2020-271xx/CVE-2020-27123.json
+++ b/CVE-2020/CVE-2020-271xx/CVE-2020-27123.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-27123",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:13.580",
"lastModified": "2024-11-21T05:20:45.417",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-file-read-LsvDD6Uh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-271xx/CVE-2020-27124.json b/CVE-2020/CVE-2020-271xx/CVE-2020-27124.json
index 0a2f6ec0e4f..6adb88dd2bc 100644
--- a/CVE-2020/CVE-2020-271xx/CVE-2020-27124.json
+++ b/CVE-2020/CVE-2020-271xx/CVE-2020-27124.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-27124",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:06.397",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-bLZw4Ctq",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sa-rv-routers-xss-K7Z5U6q3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-271xx/CVE-2020-27125.json b/CVE-2020/CVE-2020-271xx/CVE-2020-27125.json
index 187befa2b85..1f6e3c6bef4 100644
--- a/CVE-2020/CVE-2020-271xx/CVE-2020-27125.json
+++ b/CVE-2020/CVE-2020-271xx/CVE-2020-27125.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-27125",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-17T03:15:12.577",
"lastModified": "2024-11-21T05:20:45.610",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-rce-8gjUz9fW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-271xx/CVE-2020-27126.json b/CVE-2020/CVE-2020-271xx/CVE-2020-27126.json
index 588268344ad..683dca24725 100644
--- a/CVE-2020/CVE-2020-271xx/CVE-2020-27126.json
+++ b/CVE-2020/CVE-2020-271xx/CVE-2020-27126.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-27126",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T18:15:12.387",
"lastModified": "2024-11-21T05:20:45.723",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-meetings-xss-MX56prER",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-271xx/CVE-2020-27127.json b/CVE-2020/CVE-2020-271xx/CVE-2020-27127.json
index 275ac5239c2..ca87b4a8d7b 100644
--- a/CVE-2020/CVE-2020-271xx/CVE-2020-27127.json
+++ b/CVE-2020/CVE-2020-271xx/CVE-2020-27127.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-27127",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-12-11T17:15:12.980",
"lastModified": "2024-11-21T05:20:45.827",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -181,7 +181,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-ZktzjpgO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-271xx/CVE-2020-27128.json b/CVE-2020/CVE-2020-271xx/CVE-2020-27128.json
index 354ca1b6a48..895583e745b 100644
--- a/CVE-2020/CVE-2020-271xx/CVE-2020-27128.json
+++ b/CVE-2020/CVE-2020-271xx/CVE-2020-27128.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-27128",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:13.690",
"lastModified": "2024-11-21T05:20:45.927",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-file-Y2JSRNRb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-271xx/CVE-2020-27129.json b/CVE-2020/CVE-2020-271xx/CVE-2020-27129.json
index a1088665eb7..ae235dac9c7 100644
--- a/CVE-2020/CVE-2020-271xx/CVE-2020-27129.json
+++ b/CVE-2020/CVE-2020-271xx/CVE-2020-27129.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-27129",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:13.783",
"lastModified": "2024-11-21T05:20:46.033",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-privilege-zPmMf73k",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-271xx/CVE-2020-27130.json b/CVE-2020/CVE-2020-271xx/CVE-2020-27130.json
index eb3ff59e3ce..9a1daeb43e3 100644
--- a/CVE-2020/CVE-2020-271xx/CVE-2020-27130.json
+++ b/CVE-2020/CVE-2020-271xx/CVE-2020-27130.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-27130",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-17T04:15:12.053",
"lastModified": "2024-11-21T05:20:46.133",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-path-trav-NgeRnqgR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-271xx/CVE-2020-27131.json b/CVE-2020/CVE-2020-271xx/CVE-2020-27131.json
index 71bfdb47cb3..6cf742cca27 100644
--- a/CVE-2020/CVE-2020-271xx/CVE-2020-27131.json
+++ b/CVE-2020/CVE-2020-271xx/CVE-2020-27131.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-27131",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-17T04:15:12.133",
"lastModified": "2024-11-21T05:20:46.233",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-java-rce-mWJEedcD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-271xx/CVE-2020-27132.json b/CVE-2020/CVE-2020-271xx/CVE-2020-27132.json
index 43362ba6038..e19a5799511 100644
--- a/CVE-2020/CVE-2020-271xx/CVE-2020-27132.json
+++ b/CVE-2020/CVE-2020-271xx/CVE-2020-27132.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-27132",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-12-11T17:15:13.120",
"lastModified": "2024-11-21T05:20:46.337",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -181,7 +181,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-ZktzjpgO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-271xx/CVE-2020-27133.json b/CVE-2020/CVE-2020-271xx/CVE-2020-27133.json
index 350e343fc6c..a2eb4905fdc 100644
--- a/CVE-2020/CVE-2020-271xx/CVE-2020-27133.json
+++ b/CVE-2020/CVE-2020-271xx/CVE-2020-27133.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-27133",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-12-11T17:15:13.197",
"lastModified": "2024-11-21T05:20:46.447",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -181,7 +181,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-ZktzjpgO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-271xx/CVE-2020-27134.json b/CVE-2020/CVE-2020-271xx/CVE-2020-27134.json
index 6dfc0b6dbb4..b9e0d4b8b87 100644
--- a/CVE-2020/CVE-2020-271xx/CVE-2020-27134.json
+++ b/CVE-2020/CVE-2020-271xx/CVE-2020-27134.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-27134",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-12-11T17:15:13.277",
"lastModified": "2024-11-21T05:20:46.550",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -181,7 +181,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-ZktzjpgO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3110.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3110.json
index 0d33b7f22ba..d47b81c17de 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3110.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3110.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3110",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-05T18:15:10.673",
"lastModified": "2024-11-21T05:30:20.743",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -421,7 +421,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -429,7 +429,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-ipcameras-rce-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3111.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3111.json
index 7414aeac1bf..2d93e801424 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3111.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3111.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3111",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-05T18:15:10.783",
"lastModified": "2024-11-21T05:30:20.897",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -772,7 +772,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -780,7 +780,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3112.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3112.json
index b60b3021ca7..dfc0a1cc51e 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3112.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3112.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3112",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T20:15:14.690",
"lastModified": "2024-11-21T05:30:21.033",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-dcnm-priv-esc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3113.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3113.json
index 9ba63bc5537..0b8bee2d27a 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3113.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3113.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3113",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T20:15:14.783",
"lastModified": "2024-11-21T05:30:21.160",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-dcnm-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3114.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3114.json
index 39a25d10d31..78490a9f3cf 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3114.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3114.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3114",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T20:15:14.847",
"lastModified": "2024-11-21T05:30:21.277",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-dcnm-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3115.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3115.json
index 9cadf7519fd..0601cfe3d31 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3115.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3115.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3115",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:17.193",
"lastModified": "2024-11-21T05:30:21.387",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -175,7 +175,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-priv-esc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3116.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3116.json
index 06a8477c506..f5d22032c74 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3116.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3116.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3116",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:14.737",
"lastModified": "2024-11-21T05:30:21.520",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-webex-centers-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3117.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3117.json
index c0a06f60975..fd7c1ee40eb 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3117.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3117.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3117",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:14.833",
"lastModified": "2024-11-21T05:30:21.650",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -139,7 +139,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-wsa-sma-header-inject",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3118.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3118.json
index cdcb99452d1..893afeb0dd1 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3118.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3118.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3118",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-05T18:15:10.907",
"lastModified": "2024-11-21T05:30:21.770",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -92,7 +92,7 @@
"cisaVulnerabilityName": "Cisco IOS XR Software Discovery Protocol Format String Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -481,7 +481,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -489,7 +489,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-iosxr-cdp-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3119.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3119.json
index 216db253fd5..827e2ba4f80 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3119.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3119.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3119",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-05T18:15:10.987",
"lastModified": "2024-11-21T05:30:21.903",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -793,7 +793,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -801,7 +801,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-nxos-cdp-rce",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3120.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3120.json
index ef39f58f1bd..4b12e772c64 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3120.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3120.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3120",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-05T18:15:11.063",
"lastModified": "2024-11-21T05:30:22.057",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1439,7 +1439,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -1447,7 +1447,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-fxnxos-iosxr-cdp-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3121.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3121.json
index 22cc1ec70aa..422a2caee45 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3121.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3121.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3121",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:17.397",
"lastModified": "2024-11-21T05:30:22.217",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1401,7 +1401,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sbsms-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3123.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3123.json
index 503ff155ec5..7bc778503a8 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3123.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3123.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3123",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-05T18:15:11.203",
"lastModified": "2024-11-21T05:30:22.373",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -166,7 +166,7 @@
"references": [
{
"url": "https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
@@ -174,28 +174,28 @@
},
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs59062",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202003-46",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4280-1/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4280-2/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3124.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3124.json
index e6b38eaa0ca..cfe770381a2 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3124.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3124.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3124",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:14.973",
"lastModified": "2024-11-21T05:30:22.513",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-hcm-f-csrf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3125.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3125.json
index a2191a8a32c..78bf5cd5187 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3125.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3125.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3125",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:11.807",
"lastModified": "2024-11-21T05:30:22.623",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -482,7 +482,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-asa-kerberos-bypass-96Gghe2sS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3126.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3126.json
index f47dc54ac34..4974a382332 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3126.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3126.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3126",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-13T17:15:11.093",
"lastModified": "2024-11-21T05:30:22.777",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs24436",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3127.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3127.json
index ce2bbf9f22a..13ff3f7c8c7 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3127.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3127.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3127",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-04T19:15:12.353",
"lastModified": "2024-11-21T05:30:22.907",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -199,14 +199,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200304-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-269/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200304-webex-player",
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3128.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3128.json
index 52cb0add259..9f468d4c442 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3128.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3128.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3128",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-04T19:15:12.477",
"lastModified": "2024-11-21T05:30:23.040",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -199,7 +199,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200304-webex-player",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3129.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3129.json
index 9777d4edaff..5bfd36c9037 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3129.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3129.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3129",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:17.477",
"lastModified": "2024-11-21T05:30:23.160",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-uc-xss",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3130.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3130.json
index 9c6f7ec9480..2e21ac87a0a 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3130.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3130.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3130",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:15.067",
"lastModified": "2024-11-21T05:30:23.280",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -137,7 +137,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuc-dirtrv-M9HpnME4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3131.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3131.json
index 6d53329f13e..66bd872b205 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3131.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3131.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3131",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:17.570",
"lastModified": "2024-11-21T05:30:23.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cards-dos-FWzNcXPq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3132.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3132.json
index d952cabc9f2..0b7c1b49f21 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3132.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3132.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3132",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T20:15:14.957",
"lastModified": "2024-11-21T05:30:23.547",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -157,7 +157,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-shrt-dos-wM54R8qA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3133.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3133.json
index 9e5b10652f9..9c489aed783 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3133.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3133.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3133",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:15.160",
"lastModified": "2024-11-21T05:30:23.663",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-bypass-5Cdv2HMA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3134.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3134.json
index aa2c9bbc00c..b5401bdf959 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3134.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3134.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3134",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:17.647",
"lastModified": "2024-11-21T05:30:23.777",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-87mBkc8n",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3135.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3135.json
index bc5e255fa02..49a4ba0a1c5 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3135.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3135.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3135",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:15.237",
"lastModified": "2024-11-21T05:30:23.893",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-csrf-NbhZTxL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3136.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3136.json
index 6b8a27dd3cd..0cd0da4e0e2 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3136.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3136.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3136",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:17.757",
"lastModified": "2024-11-21T05:30:24.007",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-guest-xss-6urXhkqv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3137.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3137.json
index 9379e9b8c28..7cb0b1461de 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3137.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3137.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3137",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:15.333",
"lastModified": "2024-11-21T05:30:24.120",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-email-sec-xss-EbjXuXwP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3138.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3138.json
index a054f4f511f..a915e7309c3 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3138.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3138.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3138",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T20:15:15.050",
"lastModified": "2024-11-21T05:30:24.233",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-codex-shs4NhvS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3139.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3139.json
index 70901b4645c..ed2b43ed0b2 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3139.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3139.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3139",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:17.850",
"lastModified": "2024-11-21T05:30:24.350",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iptable-bypass-GxW88XjL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3140.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3140.json
index 3c6d57820dc..1aef61f3b49 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3140.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3140.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3140",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:16.347",
"lastModified": "2024-11-21T05:30:24.467",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-prime-priv-esc-HyhwdzBA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3141.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3141.json
index ce321ebbc80..322302007dd 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3141.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3141.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3141",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:17.323",
"lastModified": "2024-11-21T05:30:24.590",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -783,7 +783,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3142.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3142.json
index 541bb0d440c..054847abfb2 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3142.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3142.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3142",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-26T05:15:17.990",
"lastModified": "2024-11-21T05:30:24.740",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200124-webex-unauthjoin",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3143.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3143.json
index f4fa713ce80..6967202622b 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3143.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3143.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3143",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:15.410",
"lastModified": "2024-11-21T05:30:24.860",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -680,7 +680,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-telepresence-path-tr-wdrnYEZZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3144.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3144.json
index b1243c2d12d..a1fd6d4a6a9 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3144.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3144.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3144",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:16.487",
"lastModified": "2024-11-21T05:30:25.007",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -225,7 +225,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-auth-bypass-cGv9EruZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3145.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3145.json
index bc5958dd915..cf7f0d35c6b 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3145.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3145.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3145",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:16.580",
"lastModified": "2024-11-21T05:30:25.127",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -225,7 +225,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-m4FEEGWX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3146.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3146.json
index ed30ddb5c60..aa8e6f5c6fa 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3146.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3146.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3146",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:16.690",
"lastModified": "2024-11-21T05:30:25.247",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -225,7 +225,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-m4FEEGWX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3147.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3147.json
index cb76307d76a..bbf639b6eb8 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3147.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3147.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3147",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-01-30T19:15:11.790",
"lastModified": "2024-11-21T05:30:25.373",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1709,7 +1709,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smlbus-switch-dos-R6VquS2u",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3148.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3148.json
index f2e7cb9a79d..bb89918e486 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3148.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3148.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3148",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-04T19:15:12.587",
"lastModified": "2024-11-21T05:30:25.577",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpnr-csrf-WWTrDkyL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3149.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3149.json
index b3513e88589..b922f92c25d 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3149.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3149.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3149",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-05T18:15:11.313",
"lastModified": "2024-11-21T05:30:25.700",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-DxJsRWRx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3150.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3150.json
index 47a63105a33..91322664848 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3150.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3150.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3150",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:16.817",
"lastModified": "2024-11-21T05:30:25.813",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -169,7 +169,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-info-dis-FEWBWgsD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3151.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3151.json
index 4cb901dde49..70cac21cfe0 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3151.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3151.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3151",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:13.083",
"lastModified": "2024-11-21T05:30:25.937",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmx-rshell-esc-L6hBwjbg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3152.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3152.json
index a2ae39542ff..89cbee4c484 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3152.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3152.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3152",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:13.193",
"lastModified": "2024-11-21T05:30:26.070",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmx-prvesc-6g37hjAL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3153.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3153.json
index 3c0c9b7a050..0e8237a4be9 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3153.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3153.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3153",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T20:15:15.113",
"lastModified": "2024-11-21T05:30:26.193",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -92,7 +92,7 @@
"cisaVulnerabilityName": "Cisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/157340/Cisco-AnyConnect-Secure-Mobility-Client-4.8.01090-Privilege-Escalation.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -142,7 +142,7 @@
},
{
"url": "http://packetstormsecurity.com/files/158219/Cisco-AnyConnect-Path-Traversal-Privilege-Escalation.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -151,7 +151,7 @@
},
{
"url": "http://packetstormsecurity.com/files/159420/Cisco-AnyConnect-Privilege-Escalation.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -160,7 +160,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2020/Apr/43",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Mailing List",
@@ -169,7 +169,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-win-path-traverse-qO4HWBsj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3154.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3154.json
index fac4c41b66d..25615dd9d16 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3154.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3154.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3154",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T20:15:15.220",
"lastModified": "2024-11-21T05:30:26.333",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cws-inject-6YTdx7AO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3155.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3155.json
index b5ff982845b..1ac52ac931d 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3155.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3155.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3155",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-04T19:15:12.697",
"lastModified": "2024-11-21T05:30:26.457",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -229,7 +229,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-proximity-ssl-cert-gBBu3RB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3156.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3156.json
index 4b2ec14487b..8db4d91f585 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3156.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3156.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3156",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T20:15:15.300",
"lastModified": "2024-11-21T05:30:26.580",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-s3ekcKch",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3157.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3157.json
index f885b6e42ca..87c9e5ad1e2 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3157.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3157.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3157",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-04T19:15:12.837",
"lastModified": "2024-11-21T05:30:26.703",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-BR7nEDjG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3158.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3158.json
index 894e436a7ff..55f0ece3f59 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3158.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3158.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3158",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T20:15:15.393",
"lastModified": "2024-11-21T05:30:26.837",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-on-prem-static-cred-sL8rDs8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3159.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3159.json
index c269450dbb7..88ba0bf5898 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3159.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3159.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3159",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T20:15:15.487",
"lastModified": "2024-11-21T05:30:26.970",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-finesse-xss-6OgfQkUT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3160.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3160.json
index 55481d993e4..2a82df1356a 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3160.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3160.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3160",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T20:15:15.567",
"lastModified": "2024-11-21T05:30:27.080",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cms-xmpp-dos-ptfGUsBx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3161.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3161.json
index f2aa02d9419..ecb795f540c 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3161.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3161.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3161",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T20:15:15.097",
"lastModified": "2024-11-21T05:30:27.190",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -92,7 +92,7 @@
"cisaVulnerabilityName": "Cisco IP Phones Web Server Remote Code Execution and Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -558,7 +558,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -567,7 +567,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3162.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3162.json
index 35cb01e3a7d..cbe87370692 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3162.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3162.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3162",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:35.200",
"lastModified": "2024-11-21T05:30:27.343",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iot-coap-dos-WTBu6YTq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3163.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3163.json
index 47fceb1b64c..4048643abc5 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3163.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3163.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3163",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-19T20:15:15.660",
"lastModified": "2024-11-21T05:30:27.467",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucce-tip-dos-7cdLUASb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3164.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3164.json
index 54d13c60dda..e4911fd095f 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3164.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3164.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3164",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-04T19:15:12.930",
"lastModified": "2024-11-21T05:30:27.597",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -147,7 +147,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cont-sec-gui-dos-nJ625dXb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3165.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3165.json
index 7c57d63f391..a285de3925c 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3165.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3165.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3165",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-26T17:15:12.673",
"lastModified": "2024-11-21T05:30:27.747",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -470,7 +470,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-nxos-bgpmd5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3166.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3166.json
index 10caac56955..2f8c5b230f0 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3166.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3166.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3166",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-26T17:15:12.767",
"lastModified": "2024-11-21T05:30:27.887",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -282,7 +282,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fxos-cli-file",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3167.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3167.json
index 85371f7095e..6ffd47694f3 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3167.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3167.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3167",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-26T17:15:12.843",
"lastModified": "2024-11-21T05:30:28.020",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -340,7 +340,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fxos-ucs-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3168.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3168.json
index fa1716cdbaf..97be1c42f6f 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3168.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3168.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3168",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-26T17:15:12.937",
"lastModified": "2024-11-21T05:30:28.170",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -140,7 +140,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-nexus-1000v-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3169.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3169.json
index 9559a237e47..a479486503a 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3169.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3169.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3169",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-26T17:15:13.047",
"lastModified": "2024-11-21T05:30:28.293",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -226,7 +226,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fpwr-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3170.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3170.json
index b81dfedfe2b..b1a1966676e 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3170.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3170.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3170",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-26T17:15:13.140",
"lastModified": "2024-11-21T05:30:28.420",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -234,7 +234,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-nxos-api-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3171.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3171.json
index cae5c41b31e..f0dcb6c3d06 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3171.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3171.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3171",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-26T17:15:13.250",
"lastModified": "2024-11-21T05:30:28.543",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -257,7 +257,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fxos-ucs-cli-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3172.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3172.json
index 020a2742058..d0a91f0ca36 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3172.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3172.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3172",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-26T17:15:13.343",
"lastModified": "2024-11-21T05:30:28.670",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -867,7 +867,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fxos-nxos-cdp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3173.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3173.json
index ccd37852339..60ecf281fcd 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3173.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3173.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3173",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-26T17:15:13.483",
"lastModified": "2024-11-21T05:30:28.820",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -178,7 +178,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-ucs-cli-cmdinj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3174.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3174.json
index 563e103ccb9..0eb2a7a23f7 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3174.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3174.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3174",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-26T17:15:13.563",
"lastModified": "2024-11-21T05:30:28.930",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -540,7 +540,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-nxos-arp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3175.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3175.json
index e28153f8efe..e1b7702f302 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3175.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3175.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3175",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-02-26T17:15:13.657",
"lastModified": "2024-11-21T05:30:29.070",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -200,7 +200,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-mds-ovrld-dos",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3176.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3176.json
index cda5c55c14c..ffbbbe811f5 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3176.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3176.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3176",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-04T19:15:13.040",
"lastModified": "2024-11-21T05:30:29.177",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -195,7 +195,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rphy-cmdinject-DpEjeTgF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3177.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3177.json
index 063ca9fc228..2caa9b0da21 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3177.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3177.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3177",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:35.263",
"lastModified": "2024-11-21T05:30:29.297",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-taps-path-trav-pfsFO93r",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3178.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3178.json
index 5270a0fe597..fafde21cafe 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3178.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3178.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3178",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:11.853",
"lastModified": "2024-11-21T05:30:29.420",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-opn-rdrct-yPPMdsMQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3179.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3179.json
index fb8b9f458cf..6eb8cd851b3 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3179.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3179.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3179",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:11.917",
"lastModified": "2024-11-21T05:30:29.540",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -521,7 +521,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-2-sS2h7aWe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3180.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3180.json
index a9d50fe214f..6063095bd81 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3180.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3180.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3180",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:16.940",
"lastModified": "2024-11-21T05:30:29.670",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -221,7 +221,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdscred-HfWWfqBj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3181.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3181.json
index d29868e0518..0b5b46c0d1e 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3181.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3181.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3181",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-04T19:15:13.167",
"lastModified": "2024-11-21T05:30:29.790",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-resource-exhaust-D7RQAhnD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3182.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3182.json
index 4a85a4c6f60..4a7b9614ac6 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3182.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3182.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3182",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-04T19:15:13.307",
"lastModified": "2024-11-21T05:30:29.903",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-info-disc-OHqg982",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3184.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3184.json
index 0313dec6237..68d5a63aadb 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3184.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3184.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3184",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-22T06:15:10.213",
"lastModified": "2024-11-21T05:30:30.023",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -139,7 +139,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pcp-sql-inj-22Auwt66",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3185.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3185.json
index 40c067b3944..6bf95896474 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3185.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3185.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3185",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-04T19:15:13.383",
"lastModified": "2024-11-21T05:30:30.163",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-xss-4VXKdLO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3186.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3186.json
index f3706c2affe..cf35d39d6f8 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3186.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3186.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3186",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.010",
"lastModified": "2024-11-21T05:30:30.277",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -528,7 +528,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-accesslist-bypass-5dZs5qZp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3187.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3187.json
index c17ea7d7185..3a8808fc8da 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3187.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3187.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3187",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.087",
"lastModified": "2024-11-21T05:30:30.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -527,7 +527,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/158648/Cisco-Adaptive-Security-Appliance-Software-9.7-Arbitrary-File-Deletion.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -536,7 +536,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-path-JE3azWw43",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3188.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3188.json
index 8ce2ce42369..dd4a4591bb2 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3188.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3188.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3188",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.150",
"lastModified": "2024-11-21T05:30:30.560",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -521,7 +521,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-interface-dos-FkG4MuTU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3189.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3189.json
index 6707bfa3805..52fca90e79e 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3189.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3189.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3189",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.230",
"lastModified": "2024-11-21T05:30:30.713",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -647,7 +647,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-Rdpe34sd8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3190.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3190.json
index 544036f2885..5723c343b9a 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3190.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3190.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3190",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-04T19:15:13.493",
"lastModified": "2024-11-21T05:30:30.857",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -150,7 +150,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ipsec-dos-q8UPX6m",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3191.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3191.json
index 11c012005a7..f1ba2be7259 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3191.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3191.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3191",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.290",
"lastModified": "2024-11-21T05:30:30.980",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -573,7 +573,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ipv6-67pA658k",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3192.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3192.json
index be4473416ae..4bf92482c51 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3192.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3192.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3192",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-04T19:15:13.620",
"lastModified": "2024-11-21T05:30:31.123",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -139,7 +139,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-prime-collab-xss-RjRCe9n7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3193.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3193.json
index 2b4f350978c..2beb8b06f8b 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3193.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3193.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3193",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-04T19:15:13.727",
"lastModified": "2024-11-21T05:30:31.247",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -139,7 +139,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-prim-collab-disclo-FAnX4DKB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3194.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3194.json
index 6ae437f187f..cd68af85695 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3194.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3194.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3194",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:35.340",
"lastModified": "2024-11-21T05:30:31.370",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -179,7 +179,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-Q7Rtgvby",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3195.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3195.json
index a9fe9ba0170..078c1791945 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3195.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3195.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3195",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.353",
"lastModified": "2024-11-21T05:30:31.500",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -485,7 +485,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ospf-memleak-DHpsgfnv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3196.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3196.json
index 6c73f575672..4fac42ddf40 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3196.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3196.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3196",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.417",
"lastModified": "2024-11-21T05:30:31.633",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -647,7 +647,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-vpn-dos-qY7BHpjN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3197.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3197.json
index 7e12c7880f0..9a0d72b9c05 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3197.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3197.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3197",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:17.050",
"lastModified": "2024-11-21T05:30:31.797",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cma-turn-crdls-RHjSzKXn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3198.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3198.json
index a68055b0c81..2068f48286b 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3198.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3198.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3198",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:16.917",
"lastModified": "2024-11-21T05:30:31.917",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -565,7 +565,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-rce-xYRSeMNH",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3199.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3199.json
index b12ee102f6b..f2ace0b6881 100644
--- a/CVE-2020/CVE-2020-31xx/CVE-2020-3199.json
+++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3199.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3199",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:17.027",
"lastModified": "2024-11-21T05:30:32.070",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -595,7 +595,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-gos-vuln-s9qS8kYL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3200.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3200.json
index 4de583659eb..0809eb8d2b4 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3200.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3200.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3200",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:17.353",
"lastModified": "2024-11-21T05:30:32.197",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -6113,7 +6113,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssh-dos-Un22sd2A",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3201.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3201.json
index e2afb463d85..7fbd8655a60 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3201.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3201.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3201",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:17.747",
"lastModified": "2024-11-21T05:30:32.503",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -9708,7 +9708,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tcl-dos-MAZQUnMF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3203.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3203.json
index 514f4568640..538bdb55cf8 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3203.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3203.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3203",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:17.853",
"lastModified": "2024-11-21T05:30:32.917",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -430,7 +430,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewlc-dos-TkuPVmZN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3204.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3204.json
index 3682ba0c7be..7585780badd 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3204.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3204.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3204",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:18.197",
"lastModified": "2024-11-21T05:30:33.050",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -6538,7 +6538,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tcl-ace-C9KuVKmm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3205.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3205.json
index d8304ee6e82..5b428148a7d 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3205.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3205.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3205",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:18.573",
"lastModified": "2024-11-21T05:30:33.330",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -605,7 +605,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-udp-vds-inj-f2D5Jzrt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3206.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3206.json
index 7b709037006..83923273730 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3206.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3206.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3206",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:18.667",
"lastModified": "2024-11-21T05:30:33.470",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-dos-AnvKvMxR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3207.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3207.json
index 063859bb766..43e86c084e4 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3207.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3207.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3207",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:18.747",
"lastModified": "2024-11-21T05:30:33.603",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -500,7 +500,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ngwc-cmdinj-KEwWVWR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3208.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3208.json
index 1a27ab34dfd..e5edb3549c8 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3208.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3208.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3208",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:18.870",
"lastModified": "2024-11-21T05:30:33.767",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -435,7 +435,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-ir800-img-verif-wHhLYHjK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3209.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3209.json
index 123898f6774..33afc02f124 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3209.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3209.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3209",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:18.933",
"lastModified": "2024-11-21T05:30:33.897",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1693,7 +1693,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-digsig-bypass-FYQ3bmVq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3210.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3210.json
index e1e16363279..aa9a45aa9a6 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3210.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3210.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3210",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:19.073",
"lastModified": "2024-11-21T05:30:34.053",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-vds-cmd-inj-VfJtqGhE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3211.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3211.json
index e5816d72794..47d658d4fd0 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3211.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3211.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3211",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:19.167",
"lastModified": "2024-11-21T05:30:34.170",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -203,7 +203,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj4-S2TmH7GA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3212.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3212.json
index 7323f51d58f..b95baabe600 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3212.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3212.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3212",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:19.277",
"lastModified": "2024-11-21T05:30:34.293",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -153,7 +153,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj3-44st5CcA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3213.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3213.json
index f978123cbbb..872d45b3ae6 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3213.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3213.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3213",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:19.370",
"lastModified": "2024-11-21T05:30:34.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1083,7 +1083,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-priv-esc3-GMgnGCHx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3214.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3214.json
index 98695b5cb33..5bdbb5e277f 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3214.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3214.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3214",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:19.463",
"lastModified": "2024-11-21T05:30:34.543",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -720,7 +720,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-priv-esc2-A6jVRu7C",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3215.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3215.json
index 7934969bac4..b8cb6f4701b 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3215.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3215.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3215",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:19.557",
"lastModified": "2024-11-21T05:30:34.680",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1243,7 +1243,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-priv-esc1-OKMKFRhV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3216.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3216.json
index 0dae7037207..95de0c1ff4e 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3216.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3216.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3216",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:19.650",
"lastModified": "2024-11-21T05:30:34.830",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -158,7 +158,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-auth-b-NzwhJHH7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3217.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3217.json
index 1833ffc82bd..43a6823b8c7 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3217.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3217.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3217",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:19.730",
"lastModified": "2024-11-21T05:30:34.947",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3586,7 +3586,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-onepk-rce-6Hhyt4dC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3218.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3218.json
index 51027785c8a..32d703ea1f6 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3218.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3218.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3218",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:19.807",
"lastModified": "2024-11-21T05:30:35.163",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -413,7 +413,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-rce-uk8BXcUD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3219.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3219.json
index 91edc5ac097..c8e178b1514 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3219.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3219.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3219",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:19.917",
"lastModified": "2024-11-21T05:30:35.290",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -583,7 +583,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj2-fOnjk2LD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3220.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3220.json
index 4c14d6eb16b..c69386fb0e5 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3220.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3220.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3220",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:19.997",
"lastModified": "2024-11-21T05:30:35.417",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -463,7 +463,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-vpn-dos-edOmW28Z",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3221.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3221.json
index 6a36a1469e4..c523955cd64 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3221.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3221.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3221",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:20.103",
"lastModified": "2024-11-21T05:30:35.537",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -240,7 +240,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-fnfv9-dos-HND6Fc9u",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3222.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3222.json
index d96f0373082..c97130ed198 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3222.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3222.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3222",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:20.183",
"lastModified": "2024-11-21T05:30:35.660",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -233,7 +233,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-unauthprxy-KXXsbWh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3223.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3223.json
index ec179684c45..90ab865f5de 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3223.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3223.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3223",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:20.357",
"lastModified": "2024-11-21T05:30:35.800",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -198,7 +198,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-filerd-HngnDYGk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3224.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3224.json
index bf4140de6a5..51967d3b662 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3224.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3224.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3224",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:20.463",
"lastModified": "2024-11-21T05:30:35.970",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -153,7 +153,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdinj-zM283Zdw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3225.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3225.json
index 664fa45d414..d7e204e190a 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3225.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3225.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3225",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:20.543",
"lastModified": "2024-11-21T05:30:36.133",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1513,7 +1513,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3226.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3226.json
index f126ba1a2ef..6bc219f324c 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3226.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3226.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3226",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:20.637",
"lastModified": "2024-11-21T05:30:36.280",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1423,7 +1423,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sip-Cv28sQw2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3227.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3227.json
index 076f6b05642..e96a57b9d0b 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3227.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3227.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3227",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:20.730",
"lastModified": "2024-11-21T05:30:36.417",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -473,7 +473,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxPE-KgGvCAf9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3228.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3228.json
index ec39d692a5e..fb527c69f82 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3228.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3228.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3228",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:20.827",
"lastModified": "2024-11-21T05:30:36.550",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -2607,7 +2607,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxp-68TEVzR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3229.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3229.json
index 38d85a8ac41..7173ca2e4bc 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3229.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3229.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3229",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:20.900",
"lastModified": "2024-11-21T05:30:36.727",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -538,7 +538,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-PZgQxjfG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3230.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3230.json
index ee900fb8fdc..29030c2f248 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3230.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3230.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3230",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:20.997",
"lastModified": "2024-11-21T05:30:36.857",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -4083,7 +4083,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-9p23Jj2a",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3231.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3231.json
index 462635c4a68..e9553074fb0 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3231.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3231.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3231",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:21.090",
"lastModified": "2024-11-21T05:30:37.060",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -233,7 +233,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960L-DpWA9Re4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3232.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3232.json
index 0701a8a2dbb..8d71327c217 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3232.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3232.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3232",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:21.183",
"lastModified": "2024-11-21T05:30:37.187",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -420,7 +420,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr920-ABjcLmef",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3233.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3233.json
index 43964341e63..194b20d950b 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3233.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3233.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3233",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:21.277",
"lastModified": "2024-11-21T05:30:37.330",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxxss-wc6CqUws",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3234.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3234.json
index 41961c8bb00..4c9540b3562 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3234.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3234.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3234",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:21.370",
"lastModified": "2024-11-21T05:30:37.450",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -585,7 +585,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-vds-cred-uPMp9zbY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3235.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3235.json
index 3378feb7817..037a7861b1d 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3235.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3235.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3235",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:21.463",
"lastModified": "2024-11-21T05:30:37.590",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -915,14 +915,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-USxSyTk5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Third Party Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3236.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3236.json
index dbb0b11e6f0..997d2ec3de1 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3236.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3236.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3236",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:11.103",
"lastModified": "2024-11-21T05:30:37.743",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-ptrav-SHMzzwVR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3237.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3237.json
index 720627e4b9a..7f1fb26a16f 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3237.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3237.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3237",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:21.573",
"lastModified": "2024-11-21T05:30:37.880",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-caf-file-mVnPqKW9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3238.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3238.json
index 4ddd9608671..fefb88d300a 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3238.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3238.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3238",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:21.650",
"lastModified": "2024-11-21T05:30:37.990",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-caf-3dXM8exv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3239.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3239.json
index 2f7c7e76c49..e2b298b5f9e 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3239.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3239.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3239",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:35.403",
"lastModified": "2024-11-21T05:30:38.113",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,14 +219,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-539/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3240.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3240.json
index 4f40802e305..7564feae416 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3240.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3240.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3240",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:35.467",
"lastModified": "2024-11-21T05:30:38.240",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,14 +219,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-542/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3241.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3241.json
index 0ca8f0dc730..bed51709b35 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3241.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3241.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3241",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:11.183",
"lastModified": "2024-11-21T05:30:38.357",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-task-path-trav-d67ZuAk7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3242.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3242.json
index f12b1c03bb0..8fc9c05c18d 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3242.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3242.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3242",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:11.277",
"lastModified": "2024-11-21T05:30:38.477",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-info-disclosure-gSMU8EKT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3243.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3243.json
index 8de92314b34..bc69b1de4a6 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3243.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3243.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3243",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:35.527",
"lastModified": "2024-11-21T05:30:38.597",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,18 +219,18 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/157955/Cisco-UCS-Director-Cloupia-Script-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-540/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3244.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3244.json
index 734a079df69..0eacf1e7c7f 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3244.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3244.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3244",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:11.370",
"lastModified": "2024-11-21T05:30:38.713",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr5k-ecs-bypass-2LqfPCL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3245.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3245.json
index 09ab273ae04..364db4e6143 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3245.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3245.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3245",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:11.760",
"lastModified": "2024-11-21T05:30:38.840",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-on-prem-access-ctrl-fpQRfdpf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3246.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3246.json
index 99eae3205f5..e0ea7651201 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3246.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3246.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3246",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.480",
"lastModified": "2024-11-21T05:30:38.950",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-head-inject-n4QArJH",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3247.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3247.json
index 1e34056faf1..223c3049cd0 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3247.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3247.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3247",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:35.590",
"lastModified": "2024-11-21T05:30:39.070",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,14 +219,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-541/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3248.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3248.json
index 11a3ca6c76d..df0f99457ef 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3248.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3248.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3248",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:35.653",
"lastModified": "2024-11-21T05:30:39.183",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,14 +219,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-543/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3249.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3249.json
index d6743d06d4e..507aa0ea0ad 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3249.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3249.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3249",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:35.717",
"lastModified": "2024-11-21T05:30:39.300",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,14 +219,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-544/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3250.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3250.json
index 62c3d0fac20..ff80008600f 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3250.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3250.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3250",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:35.777",
"lastModified": "2024-11-21T05:30:39.420",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,18 +219,18 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/157955/Cisco-UCS-Director-Cloupia-Script-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-538/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3251.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3251.json
index 453236e5ec5..32d4c2927f9 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3251.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3251.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3251",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:35.873",
"lastModified": "2024-11-21T05:30:39.540",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3252.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3252.json
index 9b9fdf4336b..6cb7ff8ca2d 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3252.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3252.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3252",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:35.933",
"lastModified": "2024-11-21T05:30:39.657",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3253.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3253.json
index db6c37451a9..d13fff2bd26 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3253.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3253.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3253",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.540",
"lastModified": "2024-11-21T05:30:39.773",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-shell-9rhJF68K",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3254.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3254.json
index 346a544279e..948cec452e7 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3254.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3254.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3254",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.603",
"lastModified": "2024-11-21T05:30:39.887",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -513,7 +513,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-mgcp-SUqB8VKH",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3255.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3255.json
index 10f490c1298..a034f6740f2 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3255.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3255.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3255",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.667",
"lastModified": "2024-11-21T05:30:40.023",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -468,7 +468,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-N2vQZASR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3256.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3256.json
index ca908d5db43..6b98185022c 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3256.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3256.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3256",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.713",
"lastModified": "2024-11-21T05:30:40.163",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hcmf-xxe-qqCMAUJ2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3257.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3257.json
index 0fb8eb09fba..a895b9798ca 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3257.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3257.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3257",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:21.840",
"lastModified": "2024-11-21T05:30:40.277",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -215,7 +215,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-gos-vuln-s9qS8kYL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3258.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3258.json
index a7a4056b1e8..994598cc47f 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3258.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3258.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3258",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:21.997",
"lastModified": "2024-11-21T05:30:40.403",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -220,7 +220,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-rce-xYRSeMNH",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3259.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3259.json
index ab0888b1c3b..8d1d83e4460 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3259.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3259.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3259",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.777",
"lastModified": "2024-11-21T05:30:40.517",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -92,7 +92,7 @@
"cisaVulnerabilityName": "Cisco ASA and FTD Information Disclosure Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -190,7 +190,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-info-disclose-9eJtycMB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3260.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3260.json
index bc6522eadc4..99f5beba767 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3260.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3260.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3260",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:35.997",
"lastModified": "2024-11-21T05:30:40.647",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -275,7 +275,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-wpa-dos-5ZLs6ESz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3261.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3261.json
index 2ef66ce82c6..261035e642a 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3261.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3261.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3261",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:36.060",
"lastModified": "2024-11-21T05:30:40.760",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -691,7 +691,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mob-exp-csrf-b8tFec24",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3262.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3262.json
index d7fbb0f204c..8477f2e04cf 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3262.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3262.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3262",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:36.123",
"lastModified": "2024-11-21T05:30:40.903",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-capwap-dos-Y2sD9uEw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3263.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3263.json
index 2ae0f8f7ef6..682f19c1710 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3263.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3263.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3263",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:11.853",
"lastModified": "2024-11-21T05:30:41.030",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-client-url-fcmpdfVY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3264.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3264.json
index 0b5ab68525d..c014015a368 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3264.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3264.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3264",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-19T16:15:15.487",
"lastModified": "2024-11-21T05:30:41.157",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-wwq2-pxrj-v62r",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -231,7 +231,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwanbo-QKcABnS2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3265.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3265.json
index f1ee14dfc6b..2870a7c5473 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3265.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3265.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3265",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-19T16:15:15.613",
"lastModified": "2024-11-21T05:30:41.343",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -218,7 +218,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwpresc-ySJGvE9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3266.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3266.json
index a0cf8df38a3..1b005a13252 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3266.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3266.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3266",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-03-19T16:15:15.690",
"lastModified": "2024-11-21T05:30:41.470",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -191,7 +191,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwclici-cvrQpH9v",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3267.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3267.json
index af82784dc8e..5289b82750a 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3267.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3267.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3267",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:22.090",
"lastModified": "2024-11-21T05:30:41.593",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-api-auth-WSx4v7sB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3268.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3268.json
index f2e87980245..431740d50b8 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3268.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3268.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3268",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:11.963",
"lastModified": "2024-11-21T05:30:41.707",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -225,7 +225,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-injection-tWC7krKQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3269.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3269.json
index a24f5f3f364..53535ff86bd 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3269.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3269.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3269",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:12.073",
"lastModified": "2024-11-21T05:30:41.823",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -225,7 +225,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-injection-tWC7krKQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3272.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3272.json
index 9a3bad6be02..68646cbd2f2 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3272.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3272.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3272",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-22T06:15:10.353",
"lastModified": "2024-11-21T05:30:41.940",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -144,7 +144,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpnr-dhcp-dos-BkEZfhLP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3273.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3273.json
index f4fb22fd2b0..c6f3aa84cee 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3273.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3273.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3273",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-04-15T21:15:36.183",
"lastModified": "2024-11-21T05:30:42.057",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -177,7 +177,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-gas-dos-8FsE3AWH",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3274.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3274.json
index dc3dfb9c27c..6dd98020241 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3274.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3274.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3274",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:12.167",
"lastModified": "2024-11-21T05:30:42.173",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3275.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3275.json
index c37a539fe0a..3bbbb268b9a 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3275.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3275.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3275",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:12.260",
"lastModified": "2024-11-21T05:30:42.297",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3276.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3276.json
index 464ce66dc72..a736ee018d8 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3276.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3276.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3276",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:12.340",
"lastModified": "2024-11-21T05:30:42.420",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3277.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3277.json
index 4b6c9cd63cb..ce6181da4e0 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3277.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3277.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3277",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:12.417",
"lastModified": "2024-11-21T05:30:42.540",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3278.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3278.json
index 43d15c10c01..57f821c50c6 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3278.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3278.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3278",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:12.497",
"lastModified": "2024-11-21T05:30:42.657",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3279.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3279.json
index c4cac682ce1..60af7e1c7da 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3279.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3279.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3279",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:12.637",
"lastModified": "2024-11-21T05:30:42.780",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3280.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3280.json
index 0a3bd8ee6b4..e84991e82ce 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3280.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3280.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3280",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-22T06:15:10.430",
"lastModified": "2024-11-21T05:30:42.907",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -130,7 +130,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-rce-GMSC6RKN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3281.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3281.json
index 53924538cae..f87ecd5fd5c 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3281.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3281.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3281",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:22.167",
"lastModified": "2024-11-21T05:30:43.013",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-audit-log-59RBdwb6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3282.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3282.json
index beda2c2408b..0844c1bd91e 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3282.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3282.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3282",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-02T13:15:10.220",
"lastModified": "2024-11-21T05:30:43.133",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-cuc-imp-xss-OWuSYAp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3283.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3283.json
index 5b071da11ee..50f53370bca 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3283.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3283.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3283",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.837",
"lastModified": "2024-11-21T05:30:43.263",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -541,7 +541,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-dos-4v5nmWtZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3284.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3284.json
index e7bcf3c4752..dc23597d963 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3284.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3284.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3284",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:14.267",
"lastModified": "2024-11-21T05:30:43.397",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1915,7 +1915,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-pxe-unsign-code-exec-qAa78fD2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3285.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3285.json
index d59ec8ebf42..2deed5cd76a 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3285.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3285.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3285",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.887",
"lastModified": "2024-11-21T05:30:43.573",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -130,7 +130,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssl-bypass-O5tGum2n",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3286.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3286.json
index c40f49aee4b..c17f00bde24 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3286.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3286.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3286",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:12.730",
"lastModified": "2024-11-21T05:30:43.687",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3287.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3287.json
index 09775223b03..57798fc8412 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3287.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3287.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3287",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:12.823",
"lastModified": "2024-11-21T05:30:43.827",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3288.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3288.json
index b3c33010f9d..44a6f9ab7c4 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3288.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3288.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3288",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:12.900",
"lastModified": "2024-11-21T05:30:43.960",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3289.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3289.json
index b8dbdead8fa..8815e060a9f 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3289.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3289.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3289",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:12.997",
"lastModified": "2024-11-21T05:30:44.080",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3290.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3290.json
index 50bc803b270..2e90156a03f 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3290.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3290.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3290",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:13.073",
"lastModified": "2024-11-21T05:30:44.200",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3291.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3291.json
index 00e0be7caa1..87d5a677f8d 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3291.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3291.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3291",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:13.167",
"lastModified": "2024-11-21T05:30:44.317",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3292.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3292.json
index a011450f513..d618e6665da 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3292.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3292.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3292",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:13.247",
"lastModified": "2024-11-21T05:30:44.440",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3293.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3293.json
index eb1156bb08c..ad165b9b7b7 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3293.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3293.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3293",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:13.323",
"lastModified": "2024-11-21T05:30:44.930",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3294.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3294.json
index 6a8bfbeb301..e95b7bd5c41 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3294.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3294.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3294",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:13.417",
"lastModified": "2024-11-21T05:30:45.057",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3295.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3295.json
index ed0d98adaa7..e2071ec2e96 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3295.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3295.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3295",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:13.497",
"lastModified": "2024-11-21T05:30:45.183",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3296.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3296.json
index a23db0911f1..4a052e51294 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3296.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3296.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3296",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:13.573",
"lastModified": "2024-11-21T05:30:45.303",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -281,7 +281,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3297.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3297.json
index 73a90275a8e..bd5884b37b6 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3297.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3297.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3297",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-02T05:15:11.260",
"lastModified": "2024-11-21T05:30:45.430",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3356,7 +3356,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3298.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3298.json
index c9f6c2c3369..68042f9358d 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3298.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3298.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3298",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:12.963",
"lastModified": "2024-11-21T05:30:45.660",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -240,7 +240,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ospf-dos-RhMQY8qx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3299.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3299.json
index 07cd16985c3..5955cb9996b 100644
--- a/CVE-2020/CVE-2020-32xx/CVE-2020-3299.json
+++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3299.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3299",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:15.513",
"lastModified": "2024-11-21T05:30:45.790",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,18 +223,18 @@
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-bypass-3eCfd24j",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5354",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3301.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3301.json
index a3b1a3bef39..d15910d3eac 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3301.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3301.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3301",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.010",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -188,7 +188,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcua-statcred-weeCcZct",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3302.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3302.json
index af0205fc12b..f9ed37646c8 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3302.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3302.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3302",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.073",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcai-z5dQObVN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3303.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3303.json
index c8ed3dc858e..145f90b1bb7 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3303.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3303.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3303",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.137",
"lastModified": "2024-11-21T05:30:46.210",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -230,7 +230,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-dos-BqYFRJt9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3304.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3304.json
index 7d3b2c9689d..06a11ffa4f8 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3304.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3304.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3304",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:15.623",
"lastModified": "2024-11-21T05:30:46.330",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -198,7 +198,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webdos-fBzM5Ynw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3305.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3305.json
index 67edd72cc41..b8b8f301bdb 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3305.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3305.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3305",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.197",
"lastModified": "2024-11-21T05:30:46.487",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -230,7 +230,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-dos-P43GCE5j",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3306.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3306.json
index e09bf14ad0f..2f54540e8ca 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3306.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3306.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3306",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.260",
"lastModified": "2024-11-21T05:30:46.620",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -230,7 +230,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dos-qk8cTGLz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3307.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3307.json
index 98effaa3ce9..99e04230979 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3307.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3307.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3307",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.323",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-alfo-tHwFDmTE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3308.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3308.json
index 9b4f704c6c2..00cd073ef72 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3308.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3308.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3308",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.387",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -149,7 +149,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sigbypass-FcvPPCeP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3309.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3309.json
index c8caf945ba1..1a310857e24 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3309.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3309.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3309",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.463",
"lastModified": "2024-11-21T05:30:46.980",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fdmfo-HvPWKxDe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3310.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3310.json
index 2ebf48c5055..d2a9eb8a0d0 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3310.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3310.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3310",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.540",
"lastModified": "2024-11-21T05:30:47.093",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xpftd-gYDXyN8H",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3311.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3311.json
index 888165ea861..1bad67f49eb 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3311.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3311.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3311",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.603",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-webredirect-TcFgd42y",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3312.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3312.json
index d4c7f1878a1..7660094b6ab 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3312.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3312.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3312",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.667",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-infodis-kZxGtUJD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3313.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3313.json
index 2f46d7b16df..502e42503d4 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3313.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3313.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3313",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.743",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcxss-UT3bMx9k",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3314.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3314.json
index 52085d63b2d..9bb766d422a 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3314.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3314.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3314",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-22T06:15:10.540",
"lastModified": "2024-11-21T05:30:47.533",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp4emac-dos-kfKjUGtM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3315.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3315.json
index 600110f3298..5966a1e8ac8 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3315.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3315.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3315",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.823",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -256,18 +256,18 @@
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort_filepolbypass-m4X5DgOP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5354",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3317.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3317.json
index 382c531359f..1a9222a5697 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3317.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3317.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3317",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:15.717",
"lastModified": "2024-11-21T05:30:47.783",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-ssl-mf3822Z",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3318.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3318.json
index de9d91d1173..54ee3d1a491 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3318.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3318.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3318",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.887",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -188,7 +188,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcua-statcred-weeCcZct",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3319.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3319.json
index 27a0314ff3e..6bbdaf36d44 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3319.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3319.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3319",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T17:15:25.733",
"lastModified": "2024-11-21T05:30:48.023",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs98254",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3320.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3320.json
index b62a8c0b7b4..7be75ba0e93 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3320.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3320.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3320",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-08T05:15:14.367",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -149,7 +149,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yLrjqqU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3321.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3321.json
index 249ed72febf..8eb1b4b3a15 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3321.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3321.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3321",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T17:15:25.890",
"lastModified": "2024-11-21T05:30:48.280",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -203,7 +203,7 @@
"references": [
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs98259",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3322.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3322.json
index 845a6b30373..09665d0e490 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3322.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3322.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3322",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T17:15:25.997",
"lastModified": "2024-11-21T05:30:48.403",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs98269",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3323.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3323.json
index 32a32d6e348..f946c494995 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3323.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3323.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3323",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:17.157",
"lastModified": "2024-11-21T05:30:48.520",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -225,7 +225,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-AQKREqp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3327.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3327.json
index 786d154cf6c..b86ec57cc1a 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3327.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3327.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3327",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-13T03:15:11.140",
"lastModified": "2024-11-21T05:30:48.643",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -212,14 +212,14 @@
"references": [
{
"url": "https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00018.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -227,7 +227,7 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00010.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -235,55 +235,55 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://security.gentoo.org/glsa/202007-23",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4370-1/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4370-2/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4435-1/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4435-2/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3329.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3329.json
index 6c8184a6f23..2b4864daae8 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3329.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3329.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3329",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:13.963",
"lastModified": "2024-11-21T05:30:48.813",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -144,7 +144,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-Ar6BAguz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3330.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3330.json
index 5c7837f2bda..c8444c41e39 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3330.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3330.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3330",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:17.267",
"lastModified": "2024-11-21T05:30:48.930",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv110w-static-cred-BMTWBWTy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3331.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3331.json
index 7a1196e0e3c..75bf1184d90 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3331.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3331.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3331",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:17.377",
"lastModified": "2024-11-21T05:30:49.053",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -169,7 +169,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-code-exec-wH3BNFb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3332.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3332.json
index cd61ef7191f..411964ad1af 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3332.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3332.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3332",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:17.457",
"lastModified": "2024-11-21T05:30:49.170",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -225,7 +225,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmd-shell-injection-9jOQn9Dy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3333.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3333.json
index 2c1509d5cb8..85557fcb0da 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3333.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3333.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3333",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:22.370",
"lastModified": "2024-11-21T05:30:49.283",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-EPU-F8y5kUOP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3334.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3334.json
index bf15b217f45..184f3e24352 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3334.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3334.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3334",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-06T17:15:14.010",
"lastModified": "2024-11-21T05:30:49.400",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -187,7 +187,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fp2100-arp-dos-kLdCK8ks",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3335.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3335.json
index 2bfb3a14a5a..eaff2ea139d 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3335.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3335.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3335",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T18:15:22.447",
"lastModified": "2024-11-21T05:30:49.523",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-KSV-3wzbHYT4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3336.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3336.json
index 17a75b16a5e..8e1867da0e4 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3336.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3336.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3336",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:13.667",
"lastModified": "2024-11-21T05:30:49.650",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-cmd-inj-7ZpWhvZb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3337.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3337.json
index d5e5dd5e374..ed1d4d01b1c 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3337.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3337.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3337",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:13.747",
"lastModified": "2024-11-21T05:30:49.767",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-open-redire-UgK9dWK4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3338.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3338.json
index fa3e52da971..9fa23121fd3 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3338.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3338.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3338",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-27T16:15:11.940",
"lastModified": "2024-11-21T05:30:49.880",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -465,7 +465,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-pim-memleak-dos-tC8eP7uw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3339.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3339.json
index 1fce14d5680..99762ce7adb 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3339.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3339.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3339",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T19:15:11.753",
"lastModified": "2024-11-21T05:30:50.023",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-sql-inj-KGLLsFw8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3340.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3340.json
index 2bb18b5c14a..65d85e3ab66 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3340.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3340.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3340",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-02T05:15:11.447",
"lastModified": "2024-11-21T05:30:50.143",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -159,7 +159,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlt-ise-strd-xss-nqFhTtx7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3341.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3341.json
index 08d12bc3fe1..9b720deb625 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3341.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3341.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3341",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-13T03:15:11.200",
"lastModified": "2024-11-21T05:30:50.270",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -208,14 +208,14 @@
"references": [
{
"url": "https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00018.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -223,26 +223,26 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://usn.ubuntu.com/4370-1/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4370-2/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3342.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3342.json
index 0c91ea6c8ca..ea5a95549de 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3342.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3342.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3342",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:13.840",
"lastModified": "2024-11-21T05:30:50.390",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-client-mac-X7vp65BL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3343.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3343.json
index 7ea67e9178c..f88bb990fcb 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3343.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3343.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3343",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-22T06:15:10.667",
"lastModified": "2024-11-21T05:30:50.510",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp4elinux-h33dkrvb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3344.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3344.json
index 87757aa0614..5a7e812118b 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3344.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3344.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3344",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-05-22T06:15:10.790",
"lastModified": "2024-11-21T05:30:50.633",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp4elinux-h33dkrvb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3345.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3345.json
index ae62a69d16c..fb751e2bbc6 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3345.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3345.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3345",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:17.580",
"lastModified": "2024-11-21T05:30:50.750",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -150,7 +150,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-html-BJ4Y9tX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3346.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3346.json
index 5a7127d6873..33ab20013ce 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3346.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3346.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3346",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:12.477",
"lastModified": "2024-11-21T05:30:50.863",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -169,7 +169,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-selfcare-drASc7sr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3347.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3347.json
index 2a9f69a490d..230edf43642 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3347.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3347.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3347",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:13.933",
"lastModified": "2024-11-21T05:30:50.997",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-client-NBmqM9vt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3348.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3348.json
index 0db7b374ca5..04032f0f807 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3348.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3348.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3348",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:17.720",
"lastModified": "2024-11-21T05:30:51.110",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dncm-xss-AvMyAwd2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3349.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3349.json
index c890f79738d..343d76fb2af 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3349.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3349.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3349",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:17.817",
"lastModified": "2024-11-21T05:30:51.230",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dncm-xss-AvMyAwd2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3350.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3350.json
index fcd18461ba5..d6f25831067 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3350.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3350.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3350",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:14.027",
"lastModified": "2024-11-21T05:30:51.347",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00010.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -217,36 +217,36 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://security.gentoo.org/glsa/202007-23",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-famp-ZEpdXy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4435-1/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4435-2/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3351.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3351.json
index 1481ca54eb7..cdc756ad06e 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3351.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3351.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3351",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:17.907",
"lastModified": "2024-11-21T05:30:51.480",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -198,7 +198,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-dos-KWOdyHnB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3352.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3352.json
index ddccee6a314..e48c219e698 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3352.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3352.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3352",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:15.810",
"lastModified": "2024-11-21T05:30:51.623",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -150,7 +150,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-hidcmd-pFDeWVBd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3353.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3353.json
index 9b636247713..66a0fca011c 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3353.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3353.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3353",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-03T19:15:11.847",
"lastModified": "2024-11-21T05:30:51.743",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -226,7 +226,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-dos-qNzq39K7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3354.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3354.json
index 0c441528a99..54509471202 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3354.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3354.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3354",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:14.120",
"lastModified": "2024-11-21T05:30:51.870",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-stored-xss-VyE4bNAh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3355.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3355.json
index 88358cb241f..da8a41c3a87 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3355.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3355.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3355",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:14.213",
"lastModified": "2024-11-21T05:30:51.987",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-stored-xss-yJyqBJGU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3356.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3356.json
index 749c2f7965e..f29e56fd797 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3356.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3356.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3356",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:14.307",
"lastModified": "2024-11-21T05:30:52.107",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-stored-xss-eUyGPqxm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3357.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3357.json
index 46da8c41dd7..2ff79e7391f 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3357.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3357.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3357",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:18.050",
"lastModified": "2024-11-21T05:30:52.210",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rce-dos-9ZAjkx4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3358.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3358.json
index 48a78a818f5..ec619c3890d 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3358.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3358.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3358",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:18.173",
"lastModified": "2024-11-21T05:30:52.327",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-dos-ZN5GvNH7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3359.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3359.json
index 7b9782d4a85..5b3f85ff39f 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3359.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3359.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3359",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:17.417",
"lastModified": "2024-12-19T13:52:35.190",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -205,7 +205,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mdns-dos-3tH6cA9J",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3360.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3360.json
index abca45baac5..35181e8ba6c 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3360.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3360.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3360",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:14.403",
"lastModified": "2024-11-21T05:30:52.567",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1149,7 +1149,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-logs-2O7f7ExM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3361.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3361.json
index 3007a79a5d8..4d3fb955f1b 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3361.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3361.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3361",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:14.497",
"lastModified": "2024-11-21T05:30:52.717",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -165,7 +165,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-token-zPvEjKN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3362.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3362.json
index 52bcb5d0b61..dfcdca0874f 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3362.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3362.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3362",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:14.607",
"lastModified": "2024-11-21T05:30:52.837",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-info-disclosure-WdNvBTNq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3363.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3363.json
index 15aa769840b..6f2835d348c 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3363.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3363.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3363",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:12.587",
"lastModified": "2024-11-21T05:30:52.957",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3191,7 +3191,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3364.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3364.json
index 97e9ec97f6b..59c87eae3c9 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3364.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3364.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3364",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:14.697",
"lastModified": "2024-11-21T05:30:53.177",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -153,7 +153,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xracl-zbWSWREt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3365.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3365.json
index daedbc73201..336273f674e 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3365.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3365.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3365",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:09.917",
"lastModified": "2024-11-21T05:30:53.297",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-path-emy79OC2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3367.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3367.json
index 57682c07609..0c1b4784b5a 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3367.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3367.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3367",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T18:15:12.480",
"lastModified": "2024-11-21T05:30:53.427",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -150,7 +150,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-nPzWZrQj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3368.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3368.json
index fc851b2b620..4f834f8e243 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3368.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3368.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3368",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-06-18T03:15:14.793",
"lastModified": "2024-11-21T05:30:53.557",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WO4BZ75s",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3369.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3369.json
index 3c5fe07f226..14e54ddb8e1 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3369.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3369.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3369",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:18.267",
"lastModified": "2024-11-21T05:30:53.670",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -170,7 +170,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fpdos-hORBfd9f",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3370.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3370.json
index ca1f95fa514..044ea366ee7 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3370.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3370.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3370",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:18.363",
"lastModified": "2024-11-21T05:30:53.797",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-filt-39jXvMfM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3371.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3371.json
index 8599483c2cb..febd1af25d3 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3371.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3371.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3371",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:14.347",
"lastModified": "2024-11-21T05:30:53.920",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CIMC-CIV-pKDBe9x5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3372.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3372.json
index 922e6e4cee0..d7a5224992e 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3372.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3372.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3372",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:18.487",
"lastModified": "2024-11-21T05:30:54.057",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -196,7 +196,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-emvman-3y6LuTcZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3373.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3373.json
index da992cfb8c5..a347338dcf2 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3373.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3373.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3373",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:15.903",
"lastModified": "2024-11-21T05:30:54.193",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -156,7 +156,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-frag-memleak-mCtqdP9n",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3374.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3374.json
index e0a401262c0..1ee517351e3 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3374.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3374.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3374",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-31T00:15:12.710",
"lastModified": "2024-11-21T05:30:54.320",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -150,7 +150,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uabvman-SYGzt8Bv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3375.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3375.json
index c404c377417..51922647148 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3375.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3375.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3375",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-31T00:15:12.850",
"lastModified": "2024-11-21T05:30:54.447",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdbufof-h5f5VSeL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3376.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3376.json
index 3c4feb15c17..3ff7527d43f 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3376.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3376.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3376",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-31T00:15:12.913",
"lastModified": "2024-11-21T05:30:54.563",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-auth-bypass-JkubGpu3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3377.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3377.json
index 8c77c4bf8fc..ca15acb2495 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3377.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3377.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3377",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-31T00:15:13.053",
"lastModified": "2024-11-21T05:30:54.687",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-devmgr-cmd-inj-Umc8RHNh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3378.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3378.json
index 11895174e05..5288e689631 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3378.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3378.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3378",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:18.597",
"lastModified": "2024-11-21T05:30:54.797",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -198,7 +198,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sivm-M8wugR9O",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3379.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3379.json
index 43cf68c1708..ee4206ab0b6 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3379.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3379.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3379",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:18.690",
"lastModified": "2024-11-21T05:30:54.907",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -191,7 +191,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmpresc-SyzcS4kC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3380.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3380.json
index 31db6d879b9..b28bb4f72a1 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3380.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3380.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3380",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:18.800",
"lastModified": "2024-11-21T05:30:55.027",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-privescal-zxfCH7Dg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3381.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3381.json
index 8a3cf96a263..4dd2a46ca87 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3381.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3381.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3381",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:18.907",
"lastModified": "2024-11-21T05:30:55.140",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -170,7 +170,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmdirtrav-eFdAxsJg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3382.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3382.json
index 4a3a63f8312..00b4f5defe0 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3382.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3382.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3382",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-31T00:15:13.147",
"lastModified": "2024-11-21T05:30:55.257",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-bypass-dyEejUMs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3383.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3383.json
index 86f1f927920..b50942a871e 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3383.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3383.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3383",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-31T00:15:13.227",
"lastModified": "2024-11-21T05:30:55.363",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-path-trav-2xZOnJdR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3384.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3384.json
index 0133227e210..172db964f16 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3384.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3384.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3384",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-31T00:15:13.303",
"lastModified": "2024-11-21T05:30:55.473",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-rest-inj-BCt8pwAJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3385.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3385.json
index 7389707a499..499c9a284aa 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3385.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3385.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3385",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:19.003",
"lastModified": "2024-11-21T05:30:55.590",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -177,7 +177,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vedgfpdos-PkqQrnwV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3386.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3386.json
index fbbd89e7ae0..41a677d994c 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3386.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3386.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3386",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-31T00:15:13.383",
"lastModified": "2024-11-21T05:30:55.707",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-improper-auth-7Krd9TDT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3387.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3387.json
index c47e26c716b..c5163216a11 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3387.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3387.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3387",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:19.127",
"lastModified": "2024-11-21T05:30:55.833",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -170,7 +170,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/162958/Cisco-SD-WAN-vManage-19.2.2-Remote-Root.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -179,7 +179,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanrce-4jtWT28P",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3388.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3388.json
index 7d24762e9b1..81edb2d15fc 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3388.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3388.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3388",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:19.220",
"lastModified": "2024-11-21T05:30:55.963",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -170,7 +170,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clibypvman-sKcLf2L",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3389.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3389.json
index b3015090f4b..30e30c077c8 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3389.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3389.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3389",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:13.287",
"lastModified": "2024-11-21T05:30:56.097",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-HYP-WSV-yT3j5hSB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3390.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3390.json
index 09ae94a69ef..1cf7647ecbb 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3390.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3390.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3390",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:17.510",
"lastModified": "2024-12-19T13:52:35.190",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -165,7 +165,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewlc-snmp-dos-wNkedg9K",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3391.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3391.json
index a274445cba2..5b46789ef9e 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3391.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3391.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3391",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-02T05:15:11.557",
"lastModified": "2024-11-21T05:30:56.340",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-info-disc-6xsCyDYy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3392.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3392.json
index 0a7fbbde0b8..f6133495ae5 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3392.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3392.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3392",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T18:15:12.623",
"lastModified": "2024-11-21T05:30:56.453",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-APIA-xZntFS2V",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3393.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3393.json
index 016ad9a5e0d..f1980d71e93 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3393.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3393.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3393",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:17.587",
"lastModified": "2024-12-19T13:52:35.190",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -768,7 +768,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-iox-app-host-mcZcnsBt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3394.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3394.json
index ca0b2108b39..548d56e3c40 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3394.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3394.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3394",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-27T16:15:12.037",
"lastModified": "2024-11-21T05:30:56.723",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -455,7 +455,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n3n9k-priv-escal-3QhXJBC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3396.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3396.json
index e64af93e475..42393095d7e 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3396.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3396.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3396",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:17.683",
"lastModified": "2024-11-21T05:30:56.857",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -408,7 +408,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-usb-guestshell-WmevScDj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3397.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3397.json
index 2b4d6c99165..99d31a78256 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3397.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3397.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3397",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-27T16:15:12.143",
"lastModified": "2024-11-21T05:30:57.000",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -450,7 +450,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxosbgp-nlri-dos-458rG2OQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3398.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3398.json
index 1bfd947213f..db6592e0a17 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3398.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3398.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3398",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-27T16:15:12.253",
"lastModified": "2024-11-21T05:30:57.133",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -465,7 +465,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxosbgp-mvpn-dos-K8kbCrJp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3399.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3399.json
index fefae3c7e6c..577fb3c6286 100644
--- a/CVE-2020/CVE-2020-33xx/CVE-2020-3399.json
+++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3399.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3399",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:17.790",
"lastModified": "2024-11-21T05:30:57.277",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -173,7 +173,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-ShFzXf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3400.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3400.json
index d2af475a17c..5c52409817f 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3400.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3400.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3400",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:17.887",
"lastModified": "2024-11-21T05:30:57.403",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -198,7 +198,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-auth-bypass-6j2BYUc7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3401.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3401.json
index 07fb37f377e..128d3226e3e 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3401.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3401.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3401",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:19.300",
"lastModified": "2024-11-21T05:30:57.523",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -191,7 +191,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmandowndir-CVGvdKM3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3402.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3402.json
index e6ed2318633..d1436bce9cc 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3402.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3402.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3402",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-02T05:15:11.697",
"lastModified": "2024-11-21T05:30:57.643",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvp-info-dislosure-NZBEwj9V",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3403.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3403.json
index 948e11a11f2..f854a883b01 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3403.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3403.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3403",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:17.963",
"lastModified": "2024-11-21T05:30:57.760",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -165,7 +165,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cmdinj-2MzhjM6K",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3404.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3404.json
index a42e3c8dc79..936e4bfe2c9 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3404.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3404.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3404",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:18.073",
"lastModified": "2024-11-21T05:30:57.877",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -770,7 +770,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ctbypass-7QHAfHkK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3405.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3405.json
index 5cfcfff745b..a7400de6c48 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3405.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3405.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3405",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:19.407",
"lastModified": "2024-11-21T05:30:58.017",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanxml-Aj4GFEKd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3406.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3406.json
index 8dcbb029148..64dd19acf3d 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3406.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3406.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3406",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:19.550",
"lastModified": "2024-11-21T05:30:58.130",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanxss-z7bhvHpy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3407.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3407.json
index fdd48171a6c..81f79861107 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3407.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3407.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3407",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:18.183",
"lastModified": "2024-11-21T05:30:58.237",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -770,7 +770,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confacl-HbPtfSuO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3408.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3408.json
index 1afc9382208..f316885d023 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3408.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3408.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3408",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:18.260",
"lastModified": "2024-11-21T05:30:58.377",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -775,7 +775,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-splitdns-SPWqpdGW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3409.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3409.json
index 0d0225d7dee..ac099d6643d 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3409.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3409.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3409",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:18.353",
"lastModified": "2024-11-21T05:30:58.503",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -332,7 +332,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-profinet-J9QMCHPB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3410.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3410.json
index 104889b214f..2c800c555a2 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3410.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3410.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3410",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:15.997",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cacauthbyp-NCLGZm3Q",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3411.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3411.json
index 466e61a6a7f..d29472ae309 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3411.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3411.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3411",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:12.680",
"lastModified": "2024-11-21T05:30:58.750",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -130,7 +130,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dna-info-disc-3bz8BCgR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3412.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3412.json
index eaed43a425b..3bb0c082a40 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3412.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3412.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3412",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:12.760",
"lastModified": "2024-11-21T05:30:58.883",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-smtcreate-YmuD5Sk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3413.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3413.json
index 82f1c480e4f..a6989cc7cf7 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3413.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3413.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3413",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:12.867",
"lastModified": "2024-11-21T05:30:59.000",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-smtdelete-gJDurOgR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3414.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3414.json
index a882caf3453..ab3f286a185 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3414.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3414.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3414",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:18.463",
"lastModified": "2024-11-21T05:30:59.130",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -160,7 +160,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ISR4461-gKKUROhx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3415.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3415.json
index 19da03aa3a2..e199e9d3dec 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3415.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3415.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3415",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-27T16:15:12.317",
"lastModified": "2024-11-21T05:30:59.257",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -484,7 +484,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dme-rce-cbE3nhZS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3416.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3416.json
index 4b342fa29f8..d158feed1cc 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3416.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3416.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3416",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:18.587",
"lastModified": "2024-11-21T05:31:00.303",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -153,7 +153,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-rsp3-rce-jVHg8Z7c",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3417.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3417.json
index 6edecf1154c..5b47f16c471 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3417.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3417.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3417",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:18.730",
"lastModified": "2024-11-21T05:31:00.430",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -611,7 +611,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xbace-OnCEbyS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3418.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3418.json
index 244b3089acb..b4351f72858 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3418.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3418.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3418",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:18.823",
"lastModified": "2024-11-21T05:31:00.653",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -165,7 +165,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-icmpv6-qb9eYyCR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3419.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3419.json
index 0a88541dc3a..4bc4622c25d 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3419.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3419.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3419",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T19:15:12.350",
"lastModified": "2024-11-21T05:31:00.900",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -157,7 +157,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-auth-token-3vg57A5r",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3420.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3420.json
index 2882fe93029..fc403645d43 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3420.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3420.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3420",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:06.630",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-bLZw4Ctq",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sa-rv-routers-xss-K7Z5U6q3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3421.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3421.json
index 28a7138bb90..21c6d776c50 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3421.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3421.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3421",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:18.917",
"lastModified": "2024-11-21T05:31:01.467",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -335,7 +335,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-94ckG4G",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3422.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3422.json
index 584ad155ce3..80183a37d4b 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3422.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3422.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3422",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:19.040",
"lastModified": "2024-11-21T05:31:01.960",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -280,7 +280,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-jw2DJmSv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3423.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3423.json
index c2665605911..7bfe58ad77b 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3423.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3423.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3423",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:19.120",
"lastModified": "2024-11-21T05:31:02.420",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -258,7 +258,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lua-rce-7VeJX4f",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3425.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3425.json
index 5ba3ba21b2c..cfc9708e40e 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3425.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3425.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3425",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:19.213",
"lastModified": "2024-11-21T05:31:02.570",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1208,7 +1208,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3426.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3426.json
index 01d8b138df4..a8ff1a6aa7a 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3426.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3426.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3426",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:19.290",
"lastModified": "2024-11-21T05:31:02.753",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -158,7 +158,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lpwa-access-cXsD7PRA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3427.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3427.json
index 3c0efd8bcd3..c1df9063ef9 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3427.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3427.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3427",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-14T19:15:13.977",
"lastModified": "2024-11-21T05:31:02.883",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://duo.com/docs/rdp-notes",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3428.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3428.json
index 14cb879feb5..7adf0201205 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3428.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3428.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3428",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:19.387",
"lastModified": "2024-11-21T05:31:03.023",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -500,7 +500,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dclass-dos-VKh9D8k3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3429.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3429.json
index 35321c4c20b..0ba33a36ead 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3429.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3429.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3429",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:19.463",
"lastModified": "2024-11-21T05:31:03.167",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -170,7 +170,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wpa-dos-cXshjerc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3430.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3430.json
index ea0286bf0cb..3cf51277023 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3430.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3430.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3430",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:10.013",
"lastModified": "2024-11-21T05:31:03.293",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -163,7 +163,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-vY8M4KGB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3431.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3431.json
index d560378acad..cb669afe14d 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3431.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3431.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3431",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:06.897",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sa-rv-routers-xss-K7Z5U6q3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3433.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3433.json
index 7fa26ab30d3..ffba4885cf4 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3433.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3433.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3433",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:12.947",
"lastModified": "2024-11-21T05:31:03.480",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -90,7 +90,7 @@
"cisaVulnerabilityName": "Cisco AnyConnect Secure Mobility Client for Windows DLL Hijacking Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/159420/Cisco-AnyConnect-Privilege-Escalation.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -140,7 +140,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-F26WwJW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3434.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3434.json
index 999bd725499..bf4fec74cb6 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3434.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3434.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3434",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:13.073",
"lastModified": "2024-11-21T05:31:03.617",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dos-feXq4tAV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3435.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3435.json
index d94a1320d38..4a003403a79 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3435.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3435.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3435",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:13.197",
"lastModified": "2024-11-21T05:31:03.753",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-profile-7u3PERKF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3436.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3436.json
index 83aced8f74e..0140f204f99 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3436.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3436.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3436",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:16.077",
"lastModified": "2024-11-21T05:31:03.880",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -203,7 +203,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-fileup-dos-zvC7wtys",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3437.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3437.json
index 341337f2e50..618a41bec23 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3437.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3437.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3437",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:19.643",
"lastModified": "2024-11-21T05:31:04.013",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/162958/Cisco-SD-WAN-vManage-19.2.2-Remote-Root.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -138,7 +138,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanwebid-5QWMcCvt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3439.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3439.json
index 04b426dc5cc..11807891b18 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3439.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3439.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3439",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:13.380",
"lastModified": "2024-11-21T05:31:04.143",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-stored-w4rJZJtO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3440.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3440.json
index ad43e196a39..e145049a218 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3440.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3440.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3440",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:13.490",
"lastModified": "2024-11-21T05:31:04.303",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-desktop-app-OVSfpVMj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3441.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3441.json
index 0fdd4ba24ed..c42b9c59c18 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3441.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3441.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3441",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T19:15:12.447",
"lastModified": "2024-11-21T05:31:04.437",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -164,7 +164,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-infodisc-4tvQzn4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3442.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3442.json
index 6921121c119..b95949d2c5a 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3442.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3442.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3442",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-20T21:15:12.657",
"lastModified": "2024-11-21T05:31:04.563",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://duo.com/labs/psa/duo-psa-2020-003",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3443.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3443.json
index 6ae0641e047..5f2c827add4 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3443.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3443.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3443",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:13.583",
"lastModified": "2024-11-21T05:31:04.710",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smart-priv-esca-nqwxXWBu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3444.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3444.json
index aefbe94c372..7a88ec75418 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3444.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3444.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3444",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:14.440",
"lastModified": "2024-11-21T05:31:04.840",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cedge-filt-bypass-Y6wZMqm4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3446.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3446.json
index 16687282685..a017f1d2919 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3446.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3446.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3446",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:13.677",
"lastModified": "2024-11-21T05:31:04.973",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -273,7 +273,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-waas-encsw-cspw-cred-hZzL29A7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3447.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3447.json
index e826a5ee3b0..7ca5fe5f90d 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3447.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3447.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3447",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:13.290",
"lastModified": "2024-11-21T05:31:05.113",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-log-YxQ6g2kG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3448.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3448.json
index 83d3a87267e..77f7fc143c9 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3448.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3448.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3448",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:13.383",
"lastModified": "2024-11-21T05:31:05.247",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvc-bypass-K99Cb2ff",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3449.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3449.json
index 6b2d04808c2..0d72d745a6b 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3449.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3449.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3449",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:13.477",
"lastModified": "2024-11-21T05:31:05.380",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bgp-ErKEqAer",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3450.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3450.json
index c6cdf22e142..e9d254daa64 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3450.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3450.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3450",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:19.753",
"lastModified": "2024-11-21T05:31:05.513",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -152,7 +152,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-visio-dir-sql-inj-fPm3MPfT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3451.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3451.json
index 7a1f0363147..f3d26d8d980 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3451.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3451.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3451",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:10.120",
"lastModified": "2024-11-21T05:31:05.643",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,14 +223,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-osinj-rce-pwTkPCJv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1100/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3452.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3452.json
index ddb3503c611..d1d1e6848ac 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3452.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3452.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3452",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-22T20:15:11.970",
"lastModified": "2024-11-21T05:31:05.770",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -90,7 +90,7 @@
"cisaVulnerabilityName": "Cisco ASA and FTD Read-Only Path Traversal Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -286,7 +286,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/158646/Cisco-ASA-FTD-Remote-File-Disclosure.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -294,7 +294,7 @@
},
{
"url": "http://packetstormsecurity.com/files/158647/Cisco-Adaptive-Security-Appliance-Software-9.11-Local-File-Inclusion.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -303,7 +303,7 @@
},
{
"url": "http://packetstormsecurity.com/files/159523/Cisco-ASA-FTD-9.6.4.42-Path-Traversal.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -312,7 +312,7 @@
},
{
"url": "http://packetstormsecurity.com/files/160497/Cisco-ASA-9.14.1.10-FTD-6.6.0.1-Path-Traversal.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -321,7 +321,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3453.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3453.json
index 154f9d9f659..0473ceca1ab 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3453.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3453.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3453",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:10.200",
"lastModified": "2024-11-21T05:31:05.933",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,14 +223,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-osinj-rce-pwTkPCJv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1101/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3454.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3454.json
index 0bf6e9ca783..865aeaa43d5 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3454.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3454.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3454",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-27T16:15:12.410",
"lastModified": "2024-11-21T05:31:06.053",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -545,7 +545,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-callhome-cmdinj-zkxzSCY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3455.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3455.json
index 73a74ce91ce..9afa43306c3 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3455.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3455.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3455",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:16.170",
"lastModified": "2024-11-21T05:31:06.197",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -230,7 +230,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3456.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3456.json
index 7caec9f607c..607e2c6bb66 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3456.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3456.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3456",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:16.263",
"lastModified": "2024-11-21T05:31:06.343",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -213,7 +213,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxosfcm-csrf-uhO4e5BZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3457.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3457.json
index 99eaf32c15a..03803589438 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3457.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3457.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3457",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:16.357",
"lastModified": "2024-11-21T05:31:06.517",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -428,7 +428,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-cmdinj-pqZvmXCr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3458.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3458.json
index 03c556eed7f..c287a895a07 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3458.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3458.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3458",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:16.450",
"lastModified": "2024-11-21T05:31:06.670",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -306,7 +306,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbyp-KqP6NgrE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3459.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3459.json
index 2ac11e8c6bb..6325c4aac0c 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3459.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3459.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3459",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:16.543",
"lastModified": "2024-11-21T05:31:06.810",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -237,7 +237,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-cmdinj-b63rwKPm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3460.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3460.json
index fca4898776a..2a95dc655dc 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3460.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3460.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3460",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-31T00:15:13.443",
"lastModified": "2024-11-21T05:31:06.953",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-3jkDLsLV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3461.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3461.json
index 6e151a51d2f..bcc17f42276 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3461.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3461.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3461",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-31T00:15:13.523",
"lastModified": "2024-11-21T05:31:07.097",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disclosure-tFX3KerC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3462.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3462.json
index f1695042500..0bbb13265b5 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3462.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3462.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3462",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-31T00:15:13.587",
"lastModified": "2024-11-21T05:31:07.210",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inject-8hk6PwmF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3463.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3463.json
index 28a3b07591d..e943096ed22 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3463.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3463.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3463",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:13.587",
"lastModified": "2024-11-21T05:31:07.323",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-mttngs-xss-3VbdxDuF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3464.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3464.json
index f4537155747..98d3bd5651d 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3464.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3464.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3464",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:13.680",
"lastModified": "2024-11-21T05:31:07.440",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-director-xss-O7T8ORYR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3465.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3465.json
index 3a72b57c184..441ef60bd86 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3465.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3465.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3465",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:19.557",
"lastModified": "2024-11-21T05:31:07.557",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -228,7 +228,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-le-drTOB625",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3466.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3466.json
index 7e23979458e..c4dcf946b11 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3466.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3466.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3466",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:13.757",
"lastModified": "2024-11-21T05:31:07.690",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-mlt-xss-zUzbcdEV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3467.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3467.json
index 9b8f98263fc..26dccb3ed81 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3467.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3467.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3467",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-08T05:15:14.663",
"lastModified": "2024-11-21T05:31:07.800",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -249,7 +249,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-uJWqLTZM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3468.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3468.json
index 5e334b5c515..9b34a5a49bf 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3468.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3468.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3468",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-16T18:15:19.847",
"lastModified": "2024-11-21T05:31:07.937",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-v78FubGV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3470.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3470.json
index 4316e73160e..252d385d79d 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3470.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3470.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3470",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T19:15:12.540",
"lastModified": "2024-11-21T05:31:08.060",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -393,7 +393,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-api-rce-UXwpeDHd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3471.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3471.json
index 1a39ca43fbc..b1c1c9aca1c 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3471.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3471.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3471",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T19:15:12.633",
"lastModified": "2024-11-21T05:31:08.197",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -152,7 +152,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-info-leak-PhpzB3sG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3472.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3472.json
index 078f2d52696..005dfc65058 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3472.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3472.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3472",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:13.790",
"lastModified": "2024-11-21T05:31:08.320",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-mAkmV4qc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3473.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3473.json
index 3861a4100c2..0382f41790f 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3473.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3473.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3473",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:10.277",
"lastModified": "2024-11-21T05:31:08.433",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -296,7 +296,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-LJtNFjeN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3474.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3474.json
index de5f3233e73..0494c771984 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3474.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3474.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3474",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:19.637",
"lastModified": "2024-11-21T05:31:08.583",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -628,7 +628,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-webui-multi-vfTkk7yr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3475.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3475.json
index e2b1f19edfb..3499267ea4d 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3475.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3475.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3475",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:19.713",
"lastModified": "2024-11-21T05:31:08.717",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -628,7 +628,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-webui-multi-vfTkk7yr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3476.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3476.json
index 4a0a3b0d4dd..b7f06889e77 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3476.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3476.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3476",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:19.790",
"lastModified": "2024-11-21T05:31:08.867",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-file-overwrite-Ynu5PrJD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3477.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3477.json
index 3c212c94c81..35d25ea1198 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3477.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3477.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3477",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:19.917",
"lastModified": "2024-11-21T05:31:08.990",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -175,7 +175,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-info-disclosure-V4BmJBNF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3478.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3478.json
index 9325339850e..d1ea00052c1 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3478.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3478.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3478",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:10.387",
"lastModified": "2024-11-21T05:31:09.113",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-file-overwrite-UONzPMkr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3479.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3479.json
index 16d553638e0..df1dbb1d650 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3479.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3479.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3479",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:20.010",
"lastModified": "2024-11-21T05:31:09.220",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -258,7 +258,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-bgp-evpn-dos-LNfYJxfF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3480.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3480.json
index d68b13c77cd..1d4fddab03d 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3480.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3480.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3480",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:20.120",
"lastModified": "2024-11-21T05:31:09.360",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -258,7 +258,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-94ckG4G",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3481.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3481.json
index 3f017fe8658..e8e03736bae 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3481.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3481.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3481",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-07-20T18:15:12.420",
"lastModified": "2024-11-21T05:31:09.490",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -178,14 +178,14 @@
"references": [
{
"url": "https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00010.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -193,29 +193,29 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://security.gentoo.org/glsa/202007-23",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4435-1/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4435-2/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3482.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3482.json
index 952cfb08322..b05630e720c 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3482.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3482.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3482",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T19:15:12.697",
"lastModified": "2024-11-21T05:31:09.640",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-Expressway-8J3yZ7hV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3483.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3483.json
index b1fd4aa6df6..6379fc954c3 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3483.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3483.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3483",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-14T19:15:14.087",
"lastModified": "2024-11-21T05:31:09.763",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://duo.com/labs/psa/duo-psa-2020-004",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3484.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3484.json
index 33c59ca4258..f606738d7ec 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3484.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3484.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3484",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:13.867",
"lastModified": "2024-11-21T05:31:09.877",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vdsd-W7mnkwj7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3485.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3485.json
index 1c6c477824a..befa219c2ef 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3485.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3485.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3485",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:13.943",
"lastModified": "2024-11-21T05:31:09.987",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvdsd-rbac-y9LM5jw4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3486.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3486.json
index c3780d9e882..9d27c487920 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3486.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3486.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3486",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:20.197",
"lastModified": "2024-11-21T05:31:10.100",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -185,7 +185,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-TPdNTdyq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3487.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3487.json
index e72bb2cad67..ae9cf037c1a 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3487.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3487.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3487",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:20.290",
"lastModified": "2024-11-21T05:31:10.223",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-TPdNTdyq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3488.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3488.json
index 7bb56c75fa9..fe7bc278bca 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3488.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3488.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3488",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:20.370",
"lastModified": "2024-11-21T05:31:10.350",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -165,7 +165,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-TPdNTdyq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3489.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3489.json
index 97ac194e864..e031f55813b 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3489.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3489.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3489",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:20.447",
"lastModified": "2024-11-21T05:31:10.473",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -165,7 +165,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-TPdNTdyq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3490.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3490.json
index 91ee458ed2b..c5a286a3acc 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3490.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3490.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3490",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:14.037",
"lastModified": "2024-11-21T05:31:10.593",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvdsd-pathtrv-5tLJRrFn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3491.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3491.json
index bbfc8351308..aefc8615a12 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3491.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3491.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3491",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:14.117",
"lastModified": "2024-11-21T05:31:10.737",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvdsd-xss-teMmLyUr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3492.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3492.json
index 01ba70eb74b..c8819887b30 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3492.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3492.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3492",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:20.540",
"lastModified": "2024-11-21T05:31:10.867",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -165,7 +165,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-fnfv9-EvrAQpNX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3493.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3493.json
index 7c0d8d4fb23..7c96faed867 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3493.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3493.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3493",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:20.620",
"lastModified": "2024-11-21T05:31:10.993",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -165,7 +165,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-TPdNTdyq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3494.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3494.json
index beffc56dcfd..4146f2f1d92 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3494.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3494.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3494",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:20.697",
"lastModified": "2024-11-21T05:31:11.110",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -165,7 +165,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-TPdNTdyq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3495.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3495.json
index 39a6edb0152..0241cf815d9 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3495.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3495.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3495",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:10.450",
"lastModified": "2024-11-21T05:31:11.240",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -163,7 +163,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-UyTKCPGg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3496.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3496.json
index c43864a2cf2..fa88d848384 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3496.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3496.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3496",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:14.210",
"lastModified": "2024-11-21T05:31:11.363",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3305,7 +3305,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3497.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3497.json
index 4fa2e27b606..278208ca757 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3497.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3497.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3497",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:20.790",
"lastModified": "2024-11-21T05:31:11.577",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -155,7 +155,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-TPdNTdyq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3498.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3498.json
index 3fa4cd26bc8..fcf1d1ed994 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3498.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3498.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3498",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:10.527",
"lastModified": "2024-11-21T05:31:11.687",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -163,7 +163,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-ttcgB9R3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3499.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3499.json
index 15d6c68eb30..a638822887b 100644
--- a/CVE-2020/CVE-2020-34xx/CVE-2020-3499.json
+++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3499.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3499",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:16.623",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dos-NjYvDcLA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3500.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3500.json
index 1af7b43573e..5d80b09306a 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3500.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3500.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3500",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:13.883",
"lastModified": "2024-11-21T05:31:11.927",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -149,7 +149,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr5k-ipv6-dos-ce3zhF8m",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3501.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3501.json
index 208b6a01beb..211d67d5de8 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3501.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3501.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3501",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:13.993",
"lastModified": "2024-11-21T05:31:12.060",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -181,7 +181,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-client-g3zevBcp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3502.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3502.json
index 4e7b9d49fe5..b3eca67b23b 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3502.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3502.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3502",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-17T18:15:14.103",
"lastModified": "2024-11-21T05:31:12.200",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -181,7 +181,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-client-g3zevBcp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3503.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3503.json
index 558f1e3a899..ddb3c32641b 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3503.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3503.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3503",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:20.887",
"lastModified": "2024-12-19T13:52:35.190",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -768,7 +768,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-unauth-file-access-eBTWkKVW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3504.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3504.json
index db6a6cf29ee..edbf1e8c75f 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3504.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3504.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3504",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-27T16:15:12.487",
"lastModified": "2024-11-21T05:31:12.453",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -709,7 +709,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-cli-dos-GQUxCnTe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3505.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3505.json
index 70180c8ce79..3e5c67df3f3 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3505.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3505.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3505",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:14.287",
"lastModified": "2024-11-21T05:31:12.597",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -327,7 +327,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdp-memleak-k5Z7m55t",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3506.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3506.json
index 837e7f2f0bc..4979cadf1a1 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3506.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3506.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3506",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:14.380",
"lastModified": "2024-11-21T05:31:12.723",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -327,7 +327,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcameras-rce-dos-uPyJYxN3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3507.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3507.json
index 5d6be1f0476..e4570a1e65b 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3507.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3507.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3507",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:14.490",
"lastModified": "2024-11-21T05:31:12.853",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -327,7 +327,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcameras-rce-dos-uPyJYxN3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3508.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3508.json
index 4f9630db251..ea248359696 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3508.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3508.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3508",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:20.963",
"lastModified": "2024-11-21T05:31:12.983",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -890,7 +890,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esp20-arp-dos-GvHVggqJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3509.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3509.json
index f37d064caf0..9feb3910fae 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3509.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3509.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3509",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:21.073",
"lastModified": "2024-11-21T05:31:13.133",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -140,7 +140,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-dhcp-dos-JSCKX43h",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3510.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3510.json
index 7a500f99c4e..590f18e7853 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3510.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3510.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3510",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:21.150",
"lastModified": "2024-11-21T05:31:13.250",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -395,7 +395,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-umbrella-dos-t2QMUX37",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3511.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3511.json
index 9516bef2bb4..b9dd76af43a 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3511.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3511.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3511",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:21.230",
"lastModified": "2024-11-21T05:31:13.380",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -385,7 +385,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-isdn-q931-dos-67eUZBTf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3512.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3512.json
index 423add3d413..4e0e23e3abb 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3512.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3512.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3512",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:21.323",
"lastModified": "2024-11-21T05:31:13.510",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -790,7 +790,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-profinet-dos-65qYG3W5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3513.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3513.json
index 20bf2914571..88652f5d635 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3513.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3513.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3513",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:21.417",
"lastModified": "2024-11-21T05:31:13.650",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -168,7 +168,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-rsp3-rce-jVHg8Z7c",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3514.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3514.json
index f15688e0144..2592b2b2050 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3514.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3514.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3514",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:16.717",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -153,7 +153,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-container-esc-FmYqFBQV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3515.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3515.json
index bab717a6fef..3af38576390 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3515.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3515.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3515",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:16.793",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3516.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3516.json
index 895c2740360..ad2eeece1cc 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3516.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3516.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3516",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:21.527",
"lastModified": "2024-11-21T05:31:13.990",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-WEB-UI-exNFmcPO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3517.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3517.json
index 4cd219f0675..658984f8edd 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3517.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3517.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3517",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-27T16:15:12.550",
"lastModified": "2024-11-21T05:31:14.100",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -2107,7 +2107,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-nxos-cfs-dos-dAmnymbd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3518.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3518.json
index 0270fbb05ff..8e6927efeaf 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3518.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3518.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3518",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:14.567",
"lastModified": "2024-11-21T05:31:14.277",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-JnHSWG5C",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3519.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3519.json
index b4b109d1858..08965e9b011 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3519.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3519.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3519",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:14.647",
"lastModified": "2024-11-21T05:31:14.390",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-patrav-pW9RkhyW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3520.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3520.json
index cec94acff76..761d1459eca 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3520.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3520.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3520",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:14.740",
"lastModified": "2024-11-21T05:31:14.530",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-infordisc-DOAXVvFV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3521.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3521.json
index 8e391f318d0..98cc5015d03 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3521.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3521.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3521",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:14.833",
"lastModified": "2024-11-21T05:31:14.643",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-file-path-6PKONjHe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3522.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3522.json
index 6284569bce3..62ca0f64883 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3522.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3522.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3522",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:14.927",
"lastModified": "2024-11-21T05:31:14.750",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-auth-bypass-MYeFpFcF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3523.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3523.json
index 7fc7fb22c0c..ee4030cd353 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3523.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3523.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3523",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-26T17:15:15.020",
"lastModified": "2024-11-21T05:31:14.860",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-5TdMJRB3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3524.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3524.json
index e12bdac383e..4968ce25cb2 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3524.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3524.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3524",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:21.620",
"lastModified": "2024-11-21T05:31:14.970",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -330,7 +330,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rommon-secboot-7JgVLVYC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3525.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3525.json
index 5b26a7f86d0..b9166e368d3 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3525.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3525.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3525",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:07.127",
"lastModified": "2024-11-18T17:35:05.240",
"vulnStatus": "Awaiting Analysis",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -63,7 +63,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -76,23 +76,23 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-cuc-imp-xss-XtpzfM5e",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-YVJzqgk2",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-pa-trav-bMdfSTTq",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-tls-dos-xW53TBhb",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-pass-disclosure-K8p2Nsgg",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3526.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3526.json
index ec2fc006a0a..e88154f35ea 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3526.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3526.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3526",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:21.730",
"lastModified": "2024-11-21T05:31:15.200",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -140,7 +140,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-COPS-VLD-MpbTvGEW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3527.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3527.json
index 33fd840f790..5f5bfe86184 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3527.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3527.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3527",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:21.807",
"lastModified": "2024-11-21T05:31:15.313",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -204,7 +204,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-JP-DOS-g5FfGm8y",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3528.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3528.json
index bae5a3d6b9c..4b4ce4419c2 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3528.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3528.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3528",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:16.887",
"lastModified": "2024-11-21T05:31:15.430",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -196,7 +196,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ospflls-37Xy2q6r",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3529.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3529.json
index efde15d94c9..c68f4647649 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3529.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3529.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3529",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:16.967",
"lastModified": "2024-11-21T05:31:15.557",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -196,7 +196,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-sslvpndma-dos-HRrqB9Yx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3530.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3530.json
index c6cc55134db..9eb0b4b5880 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3530.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3530.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3530",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:10.620",
"lastModified": "2024-11-21T05:31:15.670",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-cli-privescl-sDVEmhqv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3531.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3531.json
index 0035a25e92c..ee97418e3ec 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3531.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3531.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3531",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T19:15:12.773",
"lastModified": "2024-11-21T05:31:15.800",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-BCK-GHkPNZ5F",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3532.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3532.json
index 5b2e998c477..86e9f3ad089 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3532.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3532.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3532",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:07.367",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,19 +54,19 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-cuc-imp-xss-XtpzfM5e",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-YVJzqgk2",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-pa-trav-bMdfSTTq",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-tls-dos-xW53TBhb",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3533.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3533.json
index 39a5f43697b..8995d7b093c 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3533.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3533.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3533",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:17.043",
"lastModified": "2024-11-21T05:31:15.980",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-snmp-dos-R8ENPbOs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3535.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3535.json
index 600ab5f93b8..34702f1260d 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3535.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3535.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3535",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-08T05:15:14.773",
"lastModified": "2024-11-21T05:31:16.103",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-dll-drsnH5AN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3536.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3536.json
index 414cda3e400..d88e84db2e6 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3536.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3536.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3536",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-08T05:15:14.977",
"lastModified": "2024-11-21T05:31:16.230",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-xss-xXeLFpC3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3537.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3537.json
index d54e30ab812..fc5c23c9ba7 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3537.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3537.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3537",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:10.730",
"lastModified": "2024-11-21T05:31:16.370",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -163,7 +163,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-G3NSjPn7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3538.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3538.json
index eee0e14f6cd..26979fefbfc 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3538.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3538.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3538",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:07.660",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-YVJzqgk2",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-pa-trav-bMdfSTTq",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-tls-dos-xW53TBhb",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3539.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3539.json
index 7c1a31a1f34..8ef35682b79 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3539.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3539.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3539",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:07.880",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-YVJzqgk2",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-tls-dos-xW53TBhb",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3541.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3541.json
index f3c44b11a70..1a71f7f8c62 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3541.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3541.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3541",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:10.857",
"lastModified": "2024-11-21T05:31:16.600",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -153,7 +153,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-media-znjfwHD6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3542.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3542.json
index fb1c4ce8a85..2825904a196 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3542.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3542.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3542",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:10.950",
"lastModified": "2024-11-21T05:31:16.720",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-meetings-UtbwOR4Q",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3543.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3543.json
index ef6575a9cb1..63a346e676a 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3543.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3543.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3543",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-08T05:15:15.070",
"lastModified": "2024-11-21T05:31:16.837",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -327,7 +327,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdp-memleak-heyebx9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3544.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3544.json
index a755d96328f..af804ef9d1a 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3544.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3544.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3544",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-08T05:15:15.163",
"lastModified": "2024-11-21T05:31:16.967",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -327,7 +327,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdp-rcedos-mAHR8vNx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3545.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3545.json
index 315540c190a..a98b7d5e1cc 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3545.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3545.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3545",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:11.043",
"lastModified": "2024-11-21T05:31:17.093",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -179,7 +179,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-buffer-cSdmfWUt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3546.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3546.json
index 07b87b9dda3..812fe09d325 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3546.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3546.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3546",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:11.120",
"lastModified": "2024-11-21T05:31:17.230",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-info-disclosure-vMJMMgJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3547.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3547.json
index 3d8a7b4527e..4f659554a49 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3547.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3547.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3547",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-04T03:15:11.200",
"lastModified": "2024-11-21T05:31:17.363",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -195,7 +195,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3548.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3548.json
index abee1e147be..baaa95e3a4e 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3548.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3548.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3548",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:08.100",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-tls-dos-xW53TBhb",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3549.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3549.json
index af9e5af1f49..2a084830b5a 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3549.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3549.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3549",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:17.123",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-sft-mitm-tc8AzFs2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3550.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3550.json
index d5573941978..87a6c44d28c 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3550.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3550.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3550",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:17.217",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -183,7 +183,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-dirtrav-NW8XcuSB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3551.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3551.json
index 9ae8dfa745f..bea42417f86 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3551.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3551.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3551",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:14.547",
"lastModified": "2024-11-21T05:31:17.880",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-euRCwX9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3552.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3552.json
index 6a6ae8f176d..40848fc5da7 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3552.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3552.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3552",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:21.900",
"lastModified": "2024-11-21T05:31:18.000",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -329,7 +329,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ethport-dos-xtjTt8pY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3553.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3553.json
index 7d9c9ba3e61..49adb370660 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3553.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3553.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3553",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:17.327",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-6VqH4rpZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3554.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3554.json
index 3825c740d7b..fd03821b581 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3554.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3554.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3554",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:17.420",
"lastModified": "2024-11-21T05:31:18.257",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -168,7 +168,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dos-QFcNEPfx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3555.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3555.json
index c93edd923cd..e5b4a1be17f 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3555.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3555.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3555",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:17.513",
"lastModified": "2024-11-21T05:31:18.387",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -201,7 +201,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-sipdos-3DGvdjvg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3556.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3556.json
index 0147d6224de..49662e78c18 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3556.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3556.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3556",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:14.657",
"lastModified": "2024-11-21T05:31:18.510",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3557.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3557.json
index ed47e812a1d..36724ac78d6 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3557.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3557.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3557",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:17.607",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-3WymYWKh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3558.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3558.json
index f595ec3b39c..177ecf31b60 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3558.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3558.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3558",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:17.700",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -149,7 +149,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-redirect-NYDuSEQn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3559.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3559.json
index b34ac07d3b5..d1206995430 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3559.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3559.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3559",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:21.997",
"lastModified": "2024-11-21T05:31:18.883",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -344,7 +344,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-h3DCuLXw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3560.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3560.json
index a11042e415a..3779cacc496 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3560.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3560.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3560",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-24T18:15:22.137",
"lastModified": "2024-11-21T05:31:19.017",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -472,7 +472,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-VHr2zG9y",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3561.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3561.json
index c3f626ca929..ef17fd2df52 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3561.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3561.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3561",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:17.793",
"lastModified": "2024-11-21T05:31:19.147",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -198,7 +198,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-crlf-inj-BX9uRwSn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3562.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3562.json
index 8c43b520a2c..bf13f89e596 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3562.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3562.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3562",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:17.887",
"lastModified": "2024-11-21T05:31:19.267",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -165,7 +165,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-ssl-dcrpt-dos-RYEkX4yy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3563.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3563.json
index a741cc2d01b..49b5e17258f 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3563.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3563.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3563",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:17.967",
"lastModified": "2024-11-21T05:31:19.380",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -144,7 +144,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tcp-dos-GDcZDqAf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3564.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3564.json
index 1194bfe356a..f3c2d8747ef 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3564.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3564.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3564",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:18.060",
"lastModified": "2024-11-21T05:31:19.510",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -198,7 +198,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ftpbypass-HY3UTxYu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3565.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3565.json
index b00543e39f0..73de8f58fb0 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3565.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3565.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3565",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:18.137",
"lastModified": "2024-11-21T05:31:19.623",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tcp-intercept-bypass-xG9M3PbY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3566.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3566.json
index 37c4673aee7..7db6de663da 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3566.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3566.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3566",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-08-29T16:15:09.797",
"lastModified": "2024-11-21T05:31:19.740",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -90,7 +90,7 @@
"cisaVulnerabilityName": "Cisco IOS XR Software DVMRP Memory Exhaustion Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -182,7 +182,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dvmrp-memexh-dSmpdvfz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3567.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3567.json
index 39f6896221c..082ee72bda7 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3567.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3567.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3567",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-08T05:15:15.273",
"lastModified": "2024-11-21T05:31:19.877",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -137,7 +137,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-dos-BwG634zn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3568.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3568.json
index fa2db568b38..ede142bf967 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3568.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3568.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3568",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-08T05:15:15.383",
"lastModified": "2024-11-21T05:31:19.997",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-zZtugtg3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3569.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3569.json
index b793a7b931e..5f72d8cccdf 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3569.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3569.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3569",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-09-23T01:15:15.503",
"lastModified": "2024-11-21T05:31:20.100",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -90,7 +90,7 @@
"cisaVulnerabilityName": "Cisco IOS XR Software DVMRP Memory Exhaustion Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -522,7 +522,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dvmrp-memexh-dSmpdvfz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3571.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3571.json
index fe092c5e474..2c1b1b48332 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3571.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3571.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3571",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:18.230",
"lastModified": "2024-11-21T05:31:20.243",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -191,7 +191,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-icmp-dos-hxxcycM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3572.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3572.json
index 9291a34913e..8dc2b6d5604 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3572.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3572.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3572",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:18.327",
"lastModified": "2024-11-21T05:31:20.360",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -189,7 +189,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-tcp-dos-N3DMnU4T",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3573.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3573.json
index bc652eb9e15..edc1f023da7 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3573.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3573.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3573",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:14.750",
"lastModified": "2024-11-21T05:31:20.473",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -175,14 +175,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-nbr-NOS6FQ24",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1362/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3574.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3574.json
index 707d9c9395c..d7b663aa84f 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3574.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3574.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3574",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:14.847",
"lastModified": "2024-11-21T05:31:20.600",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -334,7 +334,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-flood-dos-YnU9EXOv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3577.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3577.json
index 3fcec538cd7..5969dc8b5fa 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3577.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3577.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3577",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:18.420",
"lastModified": "2024-11-21T05:31:20.723",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -150,7 +150,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-inline-dos-nXqUyEqM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3578.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3578.json
index b43d6c9fb36..d7dcb1ff7de 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3578.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3578.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3578",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:18.513",
"lastModified": "2024-11-21T05:31:20.837",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -206,7 +206,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-rule-bypass-P73ABNWQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3579.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3579.json
index 5a40564e065..75a03346be5 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3579.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3579.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3579",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:14.923",
"lastModified": "2024-11-21T05:31:20.967",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmxss2-NL4KSSVR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3580.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3580.json
index 96e1f42e470..5fff2626e42 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3580.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3580.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3580",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:18.607",
"lastModified": "2024-11-21T05:31:21.103",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -90,7 +90,7 @@
"cisaVulnerabilityName": "Cisco ASA and FTD Cross-Site Scripting (XSS) Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -196,7 +196,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-multiple-FCB3vPZe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3581.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3581.json
index 7d5e652ca41..e348473ca47 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3581.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3581.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3581",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:18.700",
"lastModified": "2024-11-21T05:31:21.237",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -199,7 +199,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-multiple-FCB3vPZe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3582.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3582.json
index 25b45f65a2b..6fa16a85400 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3582.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3582.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3582",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:18.793",
"lastModified": "2024-11-21T05:31:21.367",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -199,7 +199,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-multiple-FCB3vPZe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3583.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3583.json
index c19dad788ae..87cc0f0edd0 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3583.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3583.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3583",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:18.887",
"lastModified": "2024-11-21T05:31:21.503",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -200,7 +200,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-multiple-FCB3vPZe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3585.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3585.json
index fa9699e29e2..7dffea1422f 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3585.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3585.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3585",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:18.967",
"lastModified": "2024-11-21T05:31:21.627",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -228,7 +228,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-tls-bb-2g9uWkP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3586.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3586.json
index d7a822e9b22..22318bde26c 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3586.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3586.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3586",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-18T19:15:12.837",
"lastModified": "2024-11-21T05:31:21.747",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dna-cmd-injection-rrAYzOwc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3587.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3587.json
index 5d37ddc8a39..205b1418638 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3587.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3587.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3587",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:15.017",
"lastModified": "2024-11-21T05:31:21.863",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,7 +132,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanxss2-ugJyqxWF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3588.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3588.json
index 6e7cab7e36a..c9b1a3fccb0 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3588.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3588.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3588",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:15.110",
"lastModified": "2024-11-21T05:31:21.987",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-vdi-qQrpBwuJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3589.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3589.json
index 82632562aca..4a324969875 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3589.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3589.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3589",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-08T05:15:15.477",
"lastModified": "2024-11-21T05:31:22.103",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -381,7 +381,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxs-mf5cbYx5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3590.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3590.json
index 79d77809943..412cc73c09a 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3590.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3590.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3590",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:15.173",
"lastModified": "2024-11-21T05:31:22.247",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,7 +132,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanxss1-XhJCymBt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3591.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3591.json
index e27cd77babd..880876f678b 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3591.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3591.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3591",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:15.250",
"lastModified": "2024-11-21T05:31:22.370",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,7 +132,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanxsshi-9KHEqRpM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3592.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3592.json
index e785b31f0ae..e18554fbf49 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3592.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3592.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3592",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:15.330",
"lastModified": "2024-11-21T05:31:22.510",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,7 +132,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanuafw-ZHkdGGEy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3593.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3593.json
index 382b322bf36..b14b73ae35d 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3593.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3593.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3593",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:15.407",
"lastModified": "2024-11-21T05:31:22.627",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vepescm-BjgQm4vJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3594.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3594.json
index ac18a2f4cdd..a6b799c4a69 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3594.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3594.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3594",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:15.487",
"lastModified": "2024-11-21T05:31:22.753",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vepestd-8C3J9Vc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3595.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3595.json
index c3b0b72820d..88af698b5ca 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3595.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3595.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3595",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:15.563",
"lastModified": "2024-11-21T05:31:22.877",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vepegr-4xynYLUj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3596.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3596.json
index d8d023e42b6..37f0bb7396b 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3596.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3596.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3596",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-08T05:15:15.557",
"lastModified": "2024-11-21T05:31:22.993",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-vcs-dos-n6xxTMZB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3597.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3597.json
index 86be2fbbdb3..5424e46c650 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3597.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3597.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3597",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-08T05:15:15.647",
"lastModified": "2024-11-21T05:31:23.110",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-path-traversal-wVDyXZPy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3598.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3598.json
index c464d60720e..681a0391e28 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3598.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3598.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3598",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-08T05:15:15.757",
"lastModified": "2024-11-21T05:31:23.233",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -157,7 +157,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvdsd-missing-auth-rQO88rnj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3599.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3599.json
index 04688cff394..f501c013247 100644
--- a/CVE-2020/CVE-2020-35xx/CVE-2020-3599.json
+++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3599.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3599",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-21T19:15:19.060",
"lastModified": "2024-11-21T05:31:23.350",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -169,7 +169,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-rxss-L54Htxp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-36xx/CVE-2020-3600.json b/CVE-2020/CVE-2020-36xx/CVE-2020-3600.json
index 1591cf1aec9..4800f3b8112 100644
--- a/CVE-2020/CVE-2020-36xx/CVE-2020-3600.json
+++ b/CVE-2020/CVE-2020-36xx/CVE-2020-3600.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3600",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:15.627",
"lastModified": "2024-11-21T05:31:23.467",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vepeshlg-tJghOQcA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2020/CVE-2020-36xx/CVE-2020-3601.json b/CVE-2020/CVE-2020-36xx/CVE-2020-3601.json
index 572908ca5cc..a9de0331380 100644
--- a/CVE-2020/CVE-2020-36xx/CVE-2020-3601.json
+++ b/CVE-2020/CVE-2020-36xx/CVE-2020-3601.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3601",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-08T05:15:15.867",
"lastModified": "2024-11-21T05:31:23.590",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -144,7 +144,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-priv-esc-gGCUMFxv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-36xx/CVE-2020-3602.json b/CVE-2020/CVE-2020-36xx/CVE-2020-3602.json
index 6916c86e5fb..7e8651e8068 100644
--- a/CVE-2020/CVE-2020-36xx/CVE-2020-3602.json
+++ b/CVE-2020/CVE-2020-36xx/CVE-2020-3602.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3602",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-10-08T05:15:15.993",
"lastModified": "2024-11-21T05:31:23.700",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -144,7 +144,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-privilege-esc-pyb7YTd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2020/CVE-2020-36xx/CVE-2020-3603.json b/CVE-2020/CVE-2020-36xx/CVE-2020-3603.json
index 3f40e35203c..ce9188a3e3f 100644
--- a/CVE-2020/CVE-2020-36xx/CVE-2020-3603.json
+++ b/CVE-2020/CVE-2020-36xx/CVE-2020-3603.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3603",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:15.707",
"lastModified": "2024-11-21T05:31:23.817",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -174,14 +174,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-nbr-NOS6FQ24",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1361/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2020/CVE-2020-36xx/CVE-2020-3604.json b/CVE-2020/CVE-2020-36xx/CVE-2020-3604.json
index a05ea14a198..eb334b06216 100644
--- a/CVE-2020/CVE-2020-36xx/CVE-2020-3604.json
+++ b/CVE-2020/CVE-2020-36xx/CVE-2020-3604.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2020-3604",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2020-11-06T19:15:15.767",
"lastModified": "2024-11-21T05:31:23.940",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,14 +134,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-nbr-NOS6FQ24",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1363/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1126.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1126.json
index 00684510db4..79561e67310 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1126.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1126.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1126",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:14.303",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-RJdktM6f",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1127.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1127.json
index 8df33efb253..e8f2d3adddb 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1127.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1127.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1127",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:14.410",
"lastModified": "2024-11-21T05:43:38.920",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-xss-smsz5Vhb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1128.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1128.json
index 457975b8d38..3a376f34c84 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1128.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1128.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1128",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:14.310",
"lastModified": "2024-11-21T05:43:39.040",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-infodisc-4mtm9Gyt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1129.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1129.json
index 99a81d30fc4..19d5ecfbb96 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1129.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1129.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1129",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:13.050",
"lastModified": "2024-11-21T05:43:39.177",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-RHp44vAC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1130.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1130.json
index ae2ac36bdfc..f5f33e59e83 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1130.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1130.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1130",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:14.473",
"lastModified": "2024-11-21T05:43:39.290",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-xss-HfV73cS3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1131.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1131.json
index e60138ef58d..bef9c7e91f8 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1131.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1131.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1131",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:14.583",
"lastModified": "2024-11-21T05:43:39.420",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -335,7 +335,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcameras-dos-9zdZcUfq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1132.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1132.json
index 02a13d5798d..aad280a7f29 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1132.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1132.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1132",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:08.343",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,27 +54,27 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-rce-dos-U2PsSkz3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-path-trvsl-dZRQE8Lc",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmaninfdis3-OvdR6uu8",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwanvman-infodis1-YuQScHB",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-ethernet-dos-HGXgJH8n",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1133.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1133.json
index 2b0beb0edf0..fae288f77ba 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1133.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1133.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1133",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:13.313",
"lastModified": "2024-11-21T05:43:39.700",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1134.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1134.json
index 620e7a18dbb..53a83070693 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1134.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1134.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1134",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-29T03:15:06.890",
"lastModified": "2024-11-21T05:43:39.847",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-certvalid-USEj2CZk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1135.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1135.json
index 9d8a114308d..ee479bb0af0 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1135.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1135.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1135",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:11.130",
"lastModified": "2024-11-21T05:43:39.990",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1136.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1136.json
index c46c2a06c29..d1617913c01 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1136.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1136.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1136",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:14.467",
"lastModified": "2024-11-21T05:43:40.120",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -184,7 +184,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxr-l-zNhcGCBt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1137.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1137.json
index 2a8501f2e8e..4e4a2bb0510 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1137.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1137.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1137",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:11.717",
"lastModified": "2024-11-21T05:43:40.260",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1138.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1138.json
index 650e7d7180e..262cf1703f3 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1138.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1138.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1138",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:11.210",
"lastModified": "2024-11-21T05:43:40.390",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-multici-pgG5WM5A",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1139.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1139.json
index 7b2fc63cbb6..1c1629644c8 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1139.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1139.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1139",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:11.287",
"lastModified": "2024-11-21T05:43:40.520",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-multici-pgG5WM5A",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1140.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1140.json
index 282f39ece96..a4d593bc7b7 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1140.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1140.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1140",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:11.367",
"lastModified": "2024-11-21T05:43:40.650",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-multici-pgG5WM5A",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1141.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1141.json
index 180ce37da0f..74cb6693b90 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1141.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1141.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1141",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:11.443",
"lastModified": "2024-11-21T05:43:40.783",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-multici-pgG5WM5A",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1142.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1142.json
index 3d160d00af0..d0c2328492c 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1142.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1142.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1142",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:11.520",
"lastModified": "2024-11-21T05:43:40.903",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-multici-pgG5WM5A",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1143.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1143.json
index 975fbc1c757..52c3905f898 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1143.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1143.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1143",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:14.660",
"lastModified": "2024-11-21T05:43:41.030",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmxapi-KsKwCmfp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1144.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1144.json
index cc71ac08f2f..f68b29c4b0e 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1144.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1144.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1144",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:14.723",
"lastModified": "2024-11-21T05:43:41.157",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmxpe-75Asy9k",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1145.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1145.json
index ced57ee61cd..61695f5b890 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1145.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1145.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1145",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:14.803",
"lastModified": "2024-11-21T05:43:41.293",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -149,7 +149,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-file-read-L3RDvtey",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1146.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1146.json
index c19809f2651..314b3fe37e2 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1146.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1146.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1146",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:14.863",
"lastModified": "2024-11-21T05:43:41.413",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-LBdQ2KRN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1147.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1147.json
index eabf6f0058d..bdaa8776575 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1147.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1147.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1147",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:14.943",
"lastModified": "2024-11-21T05:43:41.543",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-LBdQ2KRN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1148.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1148.json
index e63d4bcf96f..fd70451df51 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1148.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1148.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1148",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:15.007",
"lastModified": "2024-11-21T05:43:41.677",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-LBdQ2KRN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1149.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1149.json
index 9f706746e5a..eab27a60bc9 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1149.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1149.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1149",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:15.083",
"lastModified": "2024-11-21T05:43:41.807",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-LBdQ2KRN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1150.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1150.json
index ee682b97d68..b3a771917a1 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1150.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1150.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1150",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:15.160",
"lastModified": "2024-11-21T05:43:41.937",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-LBdQ2KRN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1151.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1151.json
index a97d8d53cc7..9e4e55c96c7 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1151.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1151.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1151",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:15.223",
"lastModified": "2024-11-21T05:43:42.070",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-LPTQ3EQC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1152.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1152.json
index 9b5791a92f8..68c7a75f6a9 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1152.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1152.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1152",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:15.303",
"lastModified": "2024-11-21T05:43:42.203",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-LPTQ3EQC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1153.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1153.json
index 3d71bd142eb..96f13741090 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1153.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1153.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1153",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:15.397",
"lastModified": "2024-11-21T05:43:42.323",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-LPTQ3EQC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1154.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1154.json
index 4a78d6070a7..011b5267421 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1154.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1154.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1154",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:15.473",
"lastModified": "2024-11-21T05:43:42.453",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-LPTQ3EQC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1155.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1155.json
index ecba5bf0235..2fb68ddd17c 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1155.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1155.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1155",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:15.553",
"lastModified": "2024-11-21T05:43:42.597",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-LPTQ3EQC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1156.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1156.json
index a8133623a13..59eacb96daa 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1156.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1156.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1156",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:15.630",
"lastModified": "2024-11-21T05:43:42.727",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-LPTQ3EQC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1157.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1157.json
index 26ceaeaae97..0b7a7b389ae 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1157.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1157.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1157",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:15.707",
"lastModified": "2024-11-21T05:43:42.860",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-LPTQ3EQC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1158.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1158.json
index 0755fe12e44..47165cefcfc 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1158.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1158.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1158",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:15.803",
"lastModified": "2024-11-21T05:43:42.997",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-LPTQ3EQC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1159.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1159.json
index 982e8939773..187a46077bc 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1159.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1159.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1159",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:15.880",
"lastModified": "2024-11-21T05:43:43.140",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1160.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1160.json
index 78d3bca5583..8e210a462ca 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1160.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1160.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1160",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:15.957",
"lastModified": "2024-11-21T05:43:43.300",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1161.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1161.json
index 6ef798b1a74..cc44837adc3 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1161.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1161.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1161",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:16.037",
"lastModified": "2024-11-21T05:43:43.440",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1162.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1162.json
index 8ebec43bac0..48b5854ebf4 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1162.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1162.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1162",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:16.113",
"lastModified": "2024-11-21T05:43:43.587",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1163.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1163.json
index f973a98866f..ec587f28f0f 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1163.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1163.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1163",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:16.193",
"lastModified": "2024-11-21T05:43:43.727",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1164.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1164.json
index d4416a4ccae..27b901400fd 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1164.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1164.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1164",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:16.270",
"lastModified": "2024-11-21T05:43:43.873",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1165.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1165.json
index 59a8e51ced3..8c662856224 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1165.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1165.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1165",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:16.380",
"lastModified": "2024-11-21T05:43:44.020",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1166.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1166.json
index 758bc27024c..37a841519af 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1166.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1166.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1166",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:16.473",
"lastModified": "2024-11-21T05:43:44.160",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1167.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1167.json
index d4393aa5c77..ce5038a9f6a 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1167.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1167.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1167",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:16.537",
"lastModified": "2024-11-21T05:43:44.310",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -259,7 +259,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/160953/Cisco-RV110W-1.2.1.7-Denial-Of-Service.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -268,7 +268,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1168.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1168.json
index dc996e7447f..1fc2caa54f8 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1168.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1168.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1168",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:16.630",
"lastModified": "2024-11-21T05:43:44.453",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1169.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1169.json
index 209dd777b40..b60fb1e972e 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1169.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1169.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1169",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:16.693",
"lastModified": "2024-11-21T05:43:44.597",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1170.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1170.json
index 570650d7096..541a56aed2b 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1170.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1170.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1170",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:16.770",
"lastModified": "2024-11-21T05:43:44.757",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1171.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1171.json
index 70751f030f2..5ee0daf95b7 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1171.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1171.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1171",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:16.850",
"lastModified": "2024-11-21T05:43:44.933",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1172.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1172.json
index d541aa19e8d..87035e4cd1d 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1172.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1172.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1172",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:16.910",
"lastModified": "2024-11-21T05:43:45.073",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1173.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1173.json
index 1d44271eb87..5522718efc6 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1173.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1173.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1173",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:16.990",
"lastModified": "2024-11-21T05:43:45.203",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1174.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1174.json
index c6c76834611..2e1b14ae4fb 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1174.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1174.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1174",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:17.053",
"lastModified": "2024-11-21T05:43:45.330",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1175.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1175.json
index 81cbb6af90d..d75b5dc0d76 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1175.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1175.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1175",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:17.130",
"lastModified": "2024-11-21T05:43:45.460",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1176.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1176.json
index 0a62443ebbf..411d5e582c5 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1176.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1176.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1176",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:17.207",
"lastModified": "2024-11-21T05:43:45.580",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1177.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1177.json
index 786a6bf157c..81c4d21e5fe 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1177.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1177.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1177",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:17.270",
"lastModified": "2024-11-21T05:43:45.700",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1178.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1178.json
index 84f59c90ffb..719e763e512 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1178.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1178.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1178",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:17.350",
"lastModified": "2024-11-21T05:43:45.813",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1179.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1179.json
index 5a5730e3df5..1149e8205e2 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1179.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1179.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1179",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:17.410",
"lastModified": "2024-11-21T05:43:45.940",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1180.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1180.json
index 115255fbf0e..802ad10be1a 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1180.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1180.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1180",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:17.473",
"lastModified": "2024-11-21T05:43:46.057",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1181.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1181.json
index 2d3114cc0c8..5c674a5e1e8 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1181.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1181.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1181",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:17.553",
"lastModified": "2024-11-21T05:43:46.193",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1182.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1182.json
index e9a342cc809..9d4db4995ef 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1182.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1182.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1182",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:17.613",
"lastModified": "2024-11-21T05:43:46.307",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1183.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1183.json
index f76ea709e82..8706e66c9f7 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1183.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1183.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1183",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:17.693",
"lastModified": "2024-11-21T05:43:46.433",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1184.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1184.json
index 83bb12d9701..a2a1e4633c8 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1184.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1184.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1184",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:17.757",
"lastModified": "2024-11-21T05:43:46.557",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1185.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1185.json
index 589bd7b733c..92bac883f36 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1185.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1185.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1185",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:17.833",
"lastModified": "2024-11-21T05:43:46.697",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1186.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1186.json
index d9851f3af11..8086a8ac117 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1186.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1186.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1186",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:17.897",
"lastModified": "2024-11-21T05:43:46.830",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1187.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1187.json
index 30ff28edd7b..7a199d6d425 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1187.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1187.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1187",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:17.973",
"lastModified": "2024-11-21T05:43:46.967",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1188.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1188.json
index 252eae9c01c..3d980ccf784 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1188.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1188.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1188",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:18.037",
"lastModified": "2024-11-21T05:43:47.107",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1189.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1189.json
index 549b61e5d74..add1e867ad7 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1189.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1189.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1189",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T21:15:12.723",
"lastModified": "2024-11-21T05:43:47.233",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1190.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1190.json
index 7f350e46c56..15f01e8b65e 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1190.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1190.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1190",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:18.207",
"lastModified": "2024-11-21T05:43:47.363",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1191.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1191.json
index 2e94d9c0b22..53f5b6d5ee7 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1191.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1191.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1191",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:18.270",
"lastModified": "2024-11-21T05:43:47.490",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1192.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1192.json
index b6caded2c38..abb94d46c6e 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1192.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1192.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1192",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:18.350",
"lastModified": "2024-11-21T05:43:47.617",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1193.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1193.json
index 0548e4ac578..8400aed6857 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1193.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1193.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1193",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:18.410",
"lastModified": "2024-11-21T05:43:47.743",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1194.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1194.json
index 4912ea31879..cee2947bdb0 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1194.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1194.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1194",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:18.490",
"lastModified": "2024-11-21T05:43:47.873",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1195.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1195.json
index d22fea24f51..4da93117cdd 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1195.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1195.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1195",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:18.553",
"lastModified": "2024-11-21T05:43:48.007",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1196.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1196.json
index c913feadd55..234753defc4 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1196.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1196.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1196",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:18.613",
"lastModified": "2024-11-21T05:43:48.140",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1197.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1197.json
index 67e591bcdc9..8906c4f0521 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1197.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1197.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1197",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:18.693",
"lastModified": "2024-11-21T05:43:48.287",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1198.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1198.json
index 59441732424..f811e64498d 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1198.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1198.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1198",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:18.770",
"lastModified": "2024-11-21T05:43:48.420",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-11xx/CVE-2021-1199.json b/CVE-2021/CVE-2021-11xx/CVE-2021-1199.json
index b5baafea860..7cffe55ce24 100644
--- a/CVE-2021/CVE-2021-11xx/CVE-2021-1199.json
+++ b/CVE-2021/CVE-2021-11xx/CVE-2021-1199.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1199",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:18.850",
"lastModified": "2024-11-21T05:43:48.560",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1200.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1200.json
index 07e1804f67d..a1cd5b02ed0 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1200.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1200.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1200",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:18.927",
"lastModified": "2024-11-21T05:43:48.717",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1201.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1201.json
index ad9df066d36..2215ef7df36 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1201.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1201.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1201",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:19.007",
"lastModified": "2024-11-21T05:43:48.873",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1202.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1202.json
index ec09cd30694..152d2c7f41b 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1202.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1202.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1202",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:19.083",
"lastModified": "2024-11-21T05:43:49.007",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1203.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1203.json
index aad0c8df582..1417e25dd5c 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1203.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1203.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1203",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:19.160",
"lastModified": "2024-11-21T05:43:49.140",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1204.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1204.json
index 93902f66d61..6cedee5bd7d 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1204.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1204.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1204",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:19.223",
"lastModified": "2024-11-21T05:43:49.283",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1205.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1205.json
index 8021f75707d..9106062c686 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1205.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1205.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1205",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:19.303",
"lastModified": "2024-11-21T05:43:49.420",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -239,7 +239,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1206.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1206.json
index 9d4422f9012..d173af97c83 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1206.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1206.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1206",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:19.380",
"lastModified": "2024-11-21T05:43:49.560",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1207.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1207.json
index 2f71808c955..7843ce333c8 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1207.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1207.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1207",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:19.457",
"lastModified": "2024-11-21T05:43:49.703",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1208.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1208.json
index 6a6a1b803c4..dde0686c4a2 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1208.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1208.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1208",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:19.553",
"lastModified": "2024-11-21T05:43:49.847",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1209.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1209.json
index cfc134a4681..db8a7aa626b 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1209.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1209.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1209",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:19.630",
"lastModified": "2024-11-21T05:43:50.000",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1210.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1210.json
index ac75a10f5a5..a21eab6db99 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1210.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1210.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1210",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:19.707",
"lastModified": "2024-11-21T05:43:50.147",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1211.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1211.json
index 02368802238..cd4369720af 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1211.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1211.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1211",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:19.787",
"lastModified": "2024-11-21T05:43:50.293",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1212.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1212.json
index 922fdf744fb..205a959edfe 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1212.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1212.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1212",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:19.863",
"lastModified": "2024-11-21T05:43:50.433",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1213.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1213.json
index 39a25b2e236..d5125b25182 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1213.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1213.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1213",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:19.927",
"lastModified": "2024-11-21T05:43:50.577",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1214.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1214.json
index 8f559763181..a8ddf7e2b37 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1214.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1214.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1214",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:20.007",
"lastModified": "2024-11-21T05:43:50.717",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1215.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1215.json
index de0d21e1e45..dba0ceee6ab 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1215.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1215.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1215",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:20.083",
"lastModified": "2024-11-21T05:43:50.857",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1216.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1216.json
index 2bd5ca5279e..bc4f77420d5 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1216.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1216.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1216",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:20.177",
"lastModified": "2024-11-21T05:43:50.997",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -254,7 +254,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1217.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1217.json
index 028a5335f28..5407a8d9734 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1217.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1217.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1217",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:20.257",
"lastModified": "2024-11-21T05:43:51.143",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1218.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1218.json
index 5c91945b838..93ec2f37d8c 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1218.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1218.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1218",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:11.617",
"lastModified": "2024-11-21T05:43:51.283",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -119,7 +119,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssmor-MDCWkT2x",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1219.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1219.json
index 96c095cf339..a84f697ebc1 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1219.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1219.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1219",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:11.693",
"lastModified": "2024-11-21T05:43:51.410",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -119,7 +119,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-sc-Jd42D4Tq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1220.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1220.json
index 5de48b8190f..efe885da130 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1220.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1220.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1220",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T21:15:11.350",
"lastModified": "2024-11-21T05:43:51.540",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -296,7 +296,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xe-webui-dos-z9yqYQAn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1221.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1221.json
index 1de4bfdf66c..c210efa4b2d 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1221.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1221.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1221",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:14.560",
"lastModified": "2024-11-21T05:43:51.673",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -153,7 +153,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wbx-linkinj-WWZpVqu9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1222.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1222.json
index 38867a93845..a68dcda5325 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1222.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1222.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1222",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:11.770",
"lastModified": "2024-11-21T05:43:51.810",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -119,7 +119,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-sqi-h5fDvZWp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1223.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1223.json
index 90bbc001d99..0dd845aff1a 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1223.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1223.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1223",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:20.317",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -258,18 +258,18 @@
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-filepolbypass-67DEwMe2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5354",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1224.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1224.json
index 85ccb5a2b44..b6952c6e34b 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1224.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1224.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1224",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:20.410",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -595,18 +595,18 @@
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-tfo-bypass-MmzZrtes",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5354",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1225.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1225.json
index 05cb53d1d42..c813563dcf4 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1225.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1225.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1225",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:11.867",
"lastModified": "2024-11-21T05:43:52.253",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -119,7 +119,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-sqlinjm-xV8dsjq5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1226.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1226.json
index 5b1cc4459e0..20cf4d51484 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1226.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1226.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1226",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:20.490",
"lastModified": "2024-11-21T05:43:52.397",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -229,7 +229,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-logging-6QSWKRYz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1227.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1227.json
index b9b34e77605..a19a346294f 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1227.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1227.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1227",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-24T20:15:12.410",
"lastModified": "2024-11-21T05:43:52.533",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -404,7 +404,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-csrf-wRMzWL9z",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1228.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1228.json
index e536ead3f68..76d00f132b7 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1228.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1228.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1228",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-24T20:15:12.613",
"lastModified": "2024-11-21T05:43:52.683",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1138,7 +1138,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-unauth-access-5PWzDx2w",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1229.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1229.json
index 43a903849d4..6761dc9e5be 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1229.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1229.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1229",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-24T20:15:12.707",
"lastModified": "2024-11-21T05:43:52.847",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -792,7 +792,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-nxos-icmpv6-dos-YD55jVCq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1230.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1230.json
index e600641afb4..a84ff98c0d6 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1230.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1230.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1230",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-24T20:15:12.817",
"lastModified": "2024-11-21T05:43:53.000",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -843,7 +843,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-bgp-De9dPKSK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1231.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1231.json
index 4623bdbf080..ee7e7be9a75 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1231.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1231.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1231",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-24T20:15:13.193",
"lastModified": "2024-11-21T05:43:53.150",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1148,7 +1148,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1232.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1232.json
index baf028f8402..4485c7aa42a 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1232.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1232.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1232",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:08.567",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,19 +54,19 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-rce-dos-U2PsSkz3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwanvman-infodis1-YuQScHB",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-ethernet-dos-HGXgJH8n",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1233.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1233.json
index d31398b997b..26085a2a50a 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1233.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1233.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1233",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:11.943",
"lastModified": "2024-11-21T05:43:53.390",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -196,7 +196,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-infodis-2-UPO232DG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1234.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1234.json
index a198660f783..7258440f874 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1234.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1234.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1234",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:08.813",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmaninfdis3-OvdR6uu8",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1235.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1235.json
index 07b721bdee1..a58d5b7e366 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1235.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1235.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1235",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:12.020",
"lastModified": "2024-11-21T05:43:53.643",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -119,7 +119,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vinfdis-MC8L58dj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1236.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1236.json
index 5f95d326b47..8d08e73d528 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1236.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1236.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1236",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:20.583",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -268,18 +268,18 @@
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5354",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1237.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1237.json
index 836a59dd83f..65c5ed5d7b0 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1237.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1237.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1237",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:20.677",
"lastModified": "2024-11-21T05:43:53.910",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-injec-pQnryXLf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1238.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1238.json
index 06eff17d105..55ae5c126ee 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1238.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1238.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1238",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:20.757",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-stored-xss-djKfCzf2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1239.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1239.json
index 114f224f7f2..cc01fad51d2 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1239.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1239.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1239",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:20.817",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-stored-xss-djKfCzf2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1240.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1240.json
index 22c241e3cf8..4a1caf02a8a 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1240.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1240.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1240",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:20.897",
"lastModified": "2024-11-21T05:43:54.273",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-proximity-dll-UvW4VHPM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1241.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1241.json
index b6ffea6c257..7dd4ced051a 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1241.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1241.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1241",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:12.100",
"lastModified": "2024-11-21T05:43:54.397",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -238,7 +238,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dosmulti-48jJuEUP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1242.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1242.json
index 2a682314b7c..0311aa88ec3 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1242.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1242.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1242",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:20.990",
"lastModified": "2024-11-21T05:43:54.527",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1243.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1243.json
index 618b5ba3a74..c7a784db4d1 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1243.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1243.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1243",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:14.700",
"lastModified": "2024-11-21T05:43:54.650",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -155,7 +155,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-7MKrW7Nq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1244.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1244.json
index 9a026d2ff6c..e24d78e2169 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1244.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1244.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1244",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:14.777",
"lastModified": "2024-11-21T05:43:54.780",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -184,7 +184,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxr-l-zNhcGCBt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1245.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1245.json
index fc141bfe676..a6ea7723677 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1245.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1245.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1245",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:21.083",
"lastModified": "2024-11-21T05:43:54.910",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -182,7 +182,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multi-vuln-finesse-qp6gbUO2",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multi-vuln-finesse-qp6gbUO2",
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1246.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1246.json
index 16ce14ceb1a..47a84d0be38 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1246.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1246.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1246",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:21.193",
"lastModified": "2024-11-21T05:43:55.060",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -182,7 +182,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multi-vuln-finesse-qp6gbUO2",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multi-vuln-finesse-qp6gbUO2",
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1247.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1247.json
index b4f83bfcda6..3b28cf8500f 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1247.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1247.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1247",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:12.177",
"lastModified": "2024-11-21T05:43:55.220",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1248.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1248.json
index 7cbb1da7a31..0dcbe885866 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1248.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1248.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1248",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:12.257",
"lastModified": "2024-11-21T05:43:55.383",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1249.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1249.json
index f304dcc8b73..d8164cdf0a9 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1249.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1249.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1249",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:12.317",
"lastModified": "2024-11-21T05:43:55.517",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1250.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1250.json
index a5e37049fcd..973e2a59b7c 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1250.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1250.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1250",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T21:15:12.397",
"lastModified": "2024-11-21T05:43:55.643",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1251.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1251.json
index c721bd9a5ed..6a795822739 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1251.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1251.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1251",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:11.860",
"lastModified": "2024-11-21T05:43:55.783",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -463,7 +463,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1252.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1252.json
index 93980bbeaa6..c1d954c7d1a 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1252.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1252.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1252",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T05:15:12.237",
"lastModified": "2024-11-21T05:43:55.940",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1253.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1253.json
index c6d30b3c984..83fba0b6101 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1253.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1253.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1253",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:13.580",
"lastModified": "2024-11-21T05:43:56.070",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1254.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1254.json
index bf129ec176e..9f56ddd0c75 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1254.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1254.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1254",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.017",
"lastModified": "2024-11-21T05:43:56.193",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-finesse-strd-xss-bUKqffFW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1255.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1255.json
index 90b811d83c3..4736d33ca0b 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1255.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1255.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1255",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:13.987",
"lastModified": "2024-11-21T05:43:56.320",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1256.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1256.json
index c41499e0015..346573e2947 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1256.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1256.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1256",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:08.840",
"lastModified": "2024-11-21T05:43:56.447",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10382",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Not Applicable",
"Third Party Advisory"
@@ -146,7 +146,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-file-overwrite-XknRjGdB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1257.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1257.json
index 7c3fcf92aec..cd886ed52a5 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1257.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1257.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1257",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:14.207",
"lastModified": "2024-11-21T05:43:56.587",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -179,14 +179,14 @@
"references": [
{
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10382",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-csrf-dC83cMcV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1258.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1258.json
index ff27f05b1a5..1bbfdf95d1c 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1258.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1258.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1258",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:21.287",
"lastModified": "2024-11-21T05:43:56.737",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,14 +167,14 @@
"references": [
{
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10382",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-fileread-PbHbgHMj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1259.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1259.json
index 5466b23cabf..5ea69fbc1bf 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1259.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1259.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1259",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:14.503",
"lastModified": "2024-11-21T05:43:56.873",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -119,7 +119,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-pathtrav-Z5mCVsjf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1260.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1260.json
index 8822dbe8256..adfecbb59a5 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1260.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1260.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1260",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:14.643",
"lastModified": "2024-11-21T05:43:56.993",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -230,7 +230,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1261.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1261.json
index e5008b20709..f7c05d575e8 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1261.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1261.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1261",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:14.800",
"lastModified": "2024-11-21T05:43:57.127",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -230,7 +230,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1262.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1262.json
index 019e48e3bda..3b88138cdf0 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1262.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1262.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1262",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:14.970",
"lastModified": "2024-11-21T05:43:57.260",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -220,7 +220,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1263.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1263.json
index 197a2fdfc33..640de894c9d 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1263.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1263.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1263",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:15.127",
"lastModified": "2024-11-21T05:43:57.417",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -230,7 +230,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1264.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1264.json
index 3c67d5fa63f..305993d08f1 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1264.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1264.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1264",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:15.267",
"lastModified": "2024-11-21T05:43:57.560",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-cmdinj-erumsWh9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1265.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1265.json
index a3cd64ba1f9..6845aa2f4fb 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1265.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1265.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1265",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:15.407",
"lastModified": "2024-11-21T05:43:57.693",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -119,7 +119,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnacid-OfeeRjcn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1266.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1266.json
index bb94ce7ce12..5ed06e0c947 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1266.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1266.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1266",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:14.857",
"lastModified": "2024-11-21T05:43:57.827",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-msx-dos-4j7sytvU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1267.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1267.json
index d6005790796..d43a15df83c 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1267.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1267.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1267",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:21.380",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xee-DFzARDcs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1268.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1268.json
index 4e07cb4bd48..43d79bb6044 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1268.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1268.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1268",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:14.967",
"lastModified": "2024-11-21T05:43:58.110",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -153,7 +153,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xripv6-spJem78K",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1269.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1269.json
index 2d07fe7e244..2a8069f8300 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1269.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1269.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1269",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:15.657",
"lastModified": "2024-11-21T05:43:58.260",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -121,7 +121,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1270.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1270.json
index 6297aed6072..f92a7e24df6 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1270.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1270.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1270",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:15.737",
"lastModified": "2024-11-21T05:43:58.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1271.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1271.json
index 481c43e416d..82892293c0b 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1271.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1271.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1271",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:15.783",
"lastModified": "2024-11-21T05:43:58.540",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-xss-RuB5WGqL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1272.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1272.json
index f0179d28c8f..99b9b8d3deb 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1272.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1272.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1272",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:15.830",
"lastModified": "2024-11-21T05:43:58.670",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1273.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1273.json
index 9e3697cb4e1..db15bcfd3a2 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1273.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1273.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1273",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:15.923",
"lastModified": "2024-11-21T05:43:58.800",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -238,7 +238,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dosmulti-48jJuEUP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1274.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1274.json
index 074bf76e4f3..efd232e218a 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1274.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1274.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1274",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:15.970",
"lastModified": "2024-11-21T05:43:58.963",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -248,7 +248,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dosmulti-48jJuEUP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1275.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1275.json
index 22cb639cb61..11adfc06fec 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1275.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1275.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1275",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:09.817",
"lastModified": "2024-11-21T05:43:59.107",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1276.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1276.json
index 00096183058..0d1b12a1ed9 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1276.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1276.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1276",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:16.050",
"lastModified": "2024-11-21T05:43:59.230",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1277.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1277.json
index fd065e47cf2..b6f1b2fcca9 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1277.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1277.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1277",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:16.110",
"lastModified": "2024-11-21T05:43:59.347",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1278.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1278.json
index a7c613e4371..885a018b1b8 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1278.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1278.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1278",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:16.173",
"lastModified": "2024-11-21T05:43:59.477",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -248,7 +248,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dosmulti-48jJuEUP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1279.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1279.json
index 77c368a6833..3786a4bed9b 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1279.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1279.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1279",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:16.253",
"lastModified": "2024-11-21T05:43:59.593",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -248,7 +248,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dosmulti-48jJuEUP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1280.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1280.json
index 8f0f6ae61ea..7b552dc49a3 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1280.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1280.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1280",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:16.330",
"lastModified": "2024-11-21T05:43:59.720",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -123,7 +123,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-5PAZ3hRV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1281.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1281.json
index db6c4394f5c..9fff4ad1dec 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1281.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1281.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1281",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T21:15:11.443",
"lastModified": "2024-11-21T05:43:59.830",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -416,7 +416,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-clipriv-9TO2QGVp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1282.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1282.json
index 981b98c943f..ea624a8491e 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1282.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1282.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1282",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:16.407",
"lastModified": "2024-11-21T05:43:59.963",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -174,7 +174,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-trav-inj-dM687ZD6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1283.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1283.json
index 625eb5455da..6552410660e 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1283.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1283.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1283",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:16.503",
"lastModified": "2024-11-21T05:44:00.107",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1284.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1284.json
index 516a07a8d55..1b08d63c17c 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1284.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1284.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1284",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:09.857",
"lastModified": "2024-11-21T05:44:00.237",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-auth-bypass-65aYqcS2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1285.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1285.json
index cd945ec7fd4..dcbc41d64b5 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1285.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1285.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1285",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:09.087",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-ethernet-dos-HGXgJH8n",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1286.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1286.json
index dc645bff06d..3757a7dbd4a 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1286.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1286.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1286",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:16.563",
"lastModified": "2024-11-21T05:44:00.453",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1287.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1287.json
index 20f2927f646..465bf20c9e3 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1287.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1287.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1287",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-18T19:15:13.323",
"lastModified": "2024-11-21T05:44:00.573",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -157,7 +157,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-132w134w-overflow-Pptt4H2p",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1288.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1288.json
index 4a4c8668039..d5d1545cec1 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1288.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1288.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1288",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:15.077",
"lastModified": "2024-11-21T05:44:00.707",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -142,7 +142,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dos-WwDdghs2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1289.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1289.json
index 25017d457d5..cff2d5e2610 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1289.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1289.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1289",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:15.170",
"lastModified": "2024-11-21T05:44:00.833",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -241,7 +241,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-rce-XZeFkNHf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1290.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1290.json
index 6b662557db6..c00b46a3124 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1290.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1290.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1290",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:15.277",
"lastModified": "2024-11-21T05:44:00.967",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-rce-XZeFkNHf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1291.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1291.json
index 322abf57056..75758ee3643 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1291.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1291.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1291",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:15.340",
"lastModified": "2024-11-21T05:44:01.103",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -241,7 +241,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-rce-XZeFkNHf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1292.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1292.json
index 647d308c960..01fdbe8a682 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1292.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1292.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1292",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:15.420",
"lastModified": "2024-11-21T05:44:01.240",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -241,7 +241,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-rce-XZeFkNHf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1293.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1293.json
index 9c501efde74..f9ea4004135 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1293.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1293.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1293",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:15.483",
"lastModified": "2024-11-21T05:44:01.383",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -241,7 +241,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-rce-XZeFkNHf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1294.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1294.json
index e4f285647d8..62f1fe1b522 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1294.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1294.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1294",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:15.560",
"lastModified": "2024-11-21T05:44:01.537",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-rce-XZeFkNHf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1295.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1295.json
index fe97dca9f97..2dbdf1b6e88 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1295.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1295.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1295",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:15.637",
"lastModified": "2024-11-21T05:44:01.687",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -241,7 +241,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-rce-XZeFkNHf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1296.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1296.json
index 2108b4d5a05..26e18ae4767 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1296.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1296.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1296",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:15.700",
"lastModified": "2024-11-21T05:44:01.833",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-filewrite-7x9mnKjn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1297.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1297.json
index d5f8b96657b..6e9424b03e0 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1297.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1297.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1297",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:15.777",
"lastModified": "2024-11-21T05:44:01.977",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-filewrite-7x9mnKjn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1298.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1298.json
index c92e67943b7..2401668f917 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1298.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1298.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1298",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:16.643",
"lastModified": "2024-11-21T05:44:02.117",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -230,7 +230,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1299.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1299.json
index 150261e3bf8..cc7d4d60c12 100644
--- a/CVE-2021/CVE-2021-12xx/CVE-2021-1299.json
+++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1299.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1299",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:16.720",
"lastModified": "2024-11-21T05:44:02.263",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -230,7 +230,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1300.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1300.json
index cd42dbd9615..bebca4904ce 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1300.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1300.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1300",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:16.800",
"lastModified": "2024-11-21T05:44:02.410",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -220,7 +220,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-bufovulns-B5NrSHbj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1301.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1301.json
index d84846a05a6..ed0e8a9ff2e 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1301.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1301.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1301",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:16.877",
"lastModified": "2024-11-21T05:44:02.557",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -220,7 +220,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-bufovulns-B5NrSHbj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1302.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1302.json
index aaf2d4dd60d..15861210517 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1302.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1302.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1302",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:16.970",
"lastModified": "2024-11-21T05:44:02.693",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-abyp-TnGFHrS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1303.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1303.json
index 1d2aca09b1a..bdc5c5b940b 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1303.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1303.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1303",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:17.033",
"lastModified": "2024-11-21T05:44:02.830",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -119,7 +119,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-privesc-6qjA3hVh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1304.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1304.json
index 7904ea6b4e9..d72e776858d 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1304.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1304.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1304",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:17.127",
"lastModified": "2024-11-21T05:44:02.973",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-abyp-TnGFHrS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1305.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1305.json
index 273455c5e8a..80bf2496474 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1305.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1305.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1305",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:17.207",
"lastModified": "2024-11-21T05:44:03.123",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -204,7 +204,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-abyp-TnGFHrS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1306.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1306.json
index ff7c1cda596..50a2d0a68b9 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1306.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1306.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1306",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.197",
"lastModified": "2024-11-21T05:44:03.263",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -164,7 +164,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ade-xcvAQEOZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1307.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1307.json
index 14c1a2b56b1..2b29c87a283 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1307.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1307.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1307",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:21.473",
"lastModified": "2024-11-21T05:44:03.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1308.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1308.json
index fe864ea5d63..382c35d1401 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1308.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1308.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1308",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:11.983",
"lastModified": "2024-11-21T05:44:03.550",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -518,7 +518,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1309.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1309.json
index 07059672c90..792dca48d2a 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1309.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1309.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1309",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:12.063",
"lastModified": "2024-11-21T05:44:03.693",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -518,7 +518,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1310.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1310.json
index 368c03f2741..c5ac9c9f380 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1310.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1310.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1310",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:21.553",
"lastModified": "2024-11-21T05:44:03.853",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-open-redirect-PWvBQ2q",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1311.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1311.json
index 68a078a2268..9b7104e05f5 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1311.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1311.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1311",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:21.630",
"lastModified": "2024-11-21T05:44:03.993",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -178,7 +178,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-brutef-hostkey-FWRMxVF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1312.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1312.json
index 42626e5b64d..e367fef878d 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1312.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1312.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1312",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:17.283",
"lastModified": "2024-11-21T05:44:04.120",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esc-dos-4Gw6D527",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1313.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1313.json
index 966dcfa0505..6147969a762 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1313.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1313.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1313",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:15.857",
"lastModified": "2024-11-21T05:44:04.250",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dos-WwDdghs2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1314.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1314.json
index fea7fce7b95..57b14bebbc4 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1314.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1314.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1314",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:15.937",
"lastModified": "2024-11-21T05:44:04.380",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -279,7 +279,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-BY4c5zd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1315.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1315.json
index 21c59eab76c..69e71e302ac 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1315.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1315.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1315",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:16.027",
"lastModified": "2024-11-21T05:44:04.517",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -279,7 +279,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-BY4c5zd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1316.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1316.json
index e01cc7e8ea1..acde8c797a2 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1316.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1316.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1316",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:16.090",
"lastModified": "2024-11-21T05:44:04.650",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -279,7 +279,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-BY4c5zd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1317.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1317.json
index 3eba364f4b3..e2ff78b3d92 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1317.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1317.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1317",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:16.170",
"lastModified": "2024-11-21T05:44:04.787",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -279,7 +279,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-BY4c5zd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1318.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1318.json
index 5638d3a58e3..d17397e16ec 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1318.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1318.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1318",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:16.247",
"lastModified": "2024-11-21T05:44:04.920",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -279,7 +279,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-BY4c5zd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1319.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1319.json
index ef0bd22d7f6..18d5406d9ba 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1319.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1319.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1319",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:16.310",
"lastModified": "2024-11-21T05:44:05.050",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1320.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1320.json
index 7de493770ef..d415b001d73 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1320.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1320.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1320",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:16.437",
"lastModified": "2024-11-21T05:44:05.193",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1321.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1321.json
index 2ef2e45ee15..7b6bfd79a3c 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1321.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1321.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1321",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:16.513",
"lastModified": "2024-11-21T05:44:05.350",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1322.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1322.json
index a3a10ff4e10..b8f9754046c 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1322.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1322.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1322",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:16.590",
"lastModified": "2024-11-21T05:44:05.510",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1323.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1323.json
index 85f0142fec6..5ebd564cede 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1323.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1323.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1323",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:16.687",
"lastModified": "2024-11-21T05:44:05.660",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -279,7 +279,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1324.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1324.json
index 21df47de7a8..ecd44438d48 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1324.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1324.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1324",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:16.763",
"lastModified": "2024-11-21T05:44:05.807",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1325.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1325.json
index f085f8f267e..24b09b57e8d 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1325.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1325.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1325",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:16.840",
"lastModified": "2024-11-21T05:44:05.943",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1326.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1326.json
index 55122322940..20ab83ce72d 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1326.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1326.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1326",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:16.920",
"lastModified": "2024-11-21T05:44:06.140",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1327.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1327.json
index f89b64a93f6..f9ecd48b41e 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1327.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1327.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1327",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:16.997",
"lastModified": "2024-11-21T05:44:06.277",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1328.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1328.json
index 5a657c76f79..5129171f769 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1328.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1328.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1328",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:17.077",
"lastModified": "2024-11-21T05:44:06.410",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1329.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1329.json
index c4611d62931..b7cc93041df 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1329.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1329.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1329",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:17.153",
"lastModified": "2024-11-21T05:44:06.567",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1330.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1330.json
index 042b747cba1..f2e61b72840 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1330.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1330.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1330",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:17.247",
"lastModified": "2024-11-21T05:44:06.713",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1331.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1331.json
index a498332fa70..46d88124e37 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1331.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1331.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1331",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:17.327",
"lastModified": "2024-11-21T05:44:06.840",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1332.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1332.json
index b2307b9a31d..94a149782d8 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1332.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1332.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1332",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:17.403",
"lastModified": "2024-11-21T05:44:06.970",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1333.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1333.json
index 725f039a220..88aefff5f20 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1333.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1333.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1333",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:17.483",
"lastModified": "2024-11-21T05:44:07.103",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1334.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1334.json
index 63461495a47..04cd2e1236a 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1334.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1334.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1334",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:17.560",
"lastModified": "2024-11-21T05:44:07.240",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1335.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1335.json
index a2ea01ba22f..13a896eb75b 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1335.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1335.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1335",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:17.637",
"lastModified": "2024-11-21T05:44:07.367",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -279,7 +279,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1336.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1336.json
index 34de02c9317..935bc03f9cf 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1336.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1336.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1336",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:17.717",
"lastModified": "2024-11-21T05:44:07.493",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1337.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1337.json
index 343408a5f58..8f2f1d4245d 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1337.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1337.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1337",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:17.793",
"lastModified": "2024-11-21T05:44:07.620",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -279,7 +279,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1338.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1338.json
index fc51063474b..1c6dfa42fcc 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1338.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1338.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1338",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:17.873",
"lastModified": "2024-11-21T05:44:07.760",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1339.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1339.json
index 00e3cf662b5..0d453d0382d 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1339.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1339.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1339",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:17.937",
"lastModified": "2024-11-21T05:44:07.887",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1340.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1340.json
index e73d6ed7750..bdf85b85eee 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1340.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1340.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1340",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:18.013",
"lastModified": "2024-11-21T05:44:08.013",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1341.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1341.json
index c7c36eae8d7..fa6f1a14d9c 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1341.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1341.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1341",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:18.077",
"lastModified": "2024-11-21T05:44:08.140",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1342.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1342.json
index b7edca328d3..b52fe82504a 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1342.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1342.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1342",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:18.187",
"lastModified": "2024-11-21T05:44:08.267",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1343.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1343.json
index 6d103e7074b..705aecebc70 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1343.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1343.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1343",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:18.293",
"lastModified": "2024-11-21T05:44:08.393",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1344.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1344.json
index 90c1ed9a853..a3bed851251 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1344.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1344.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1344",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:18.357",
"lastModified": "2024-11-21T05:44:08.523",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1345.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1345.json
index 4848070e97b..eddd8ec7948 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1345.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1345.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1345",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:18.437",
"lastModified": "2024-11-21T05:44:08.650",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1346.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1346.json
index bdbb8267f9b..cca00f59ec1 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1346.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1346.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1346",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:18.527",
"lastModified": "2024-11-21T05:44:08.777",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1347.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1347.json
index ed5f6db786c..8d2d0ce0fcc 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1347.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1347.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1347",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:18.607",
"lastModified": "2024-11-21T05:44:08.907",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1348.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1348.json
index e5ac5112490..e65b142e49b 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1348.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1348.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1348",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:18.687",
"lastModified": "2024-11-21T05:44:09.050",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1349.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1349.json
index 9f4c70d4c0a..c195f49e70d 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1349.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1349.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1349",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:17.377",
"lastModified": "2024-11-21T05:44:09.207",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-72EhnUc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1350.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1350.json
index f92aa83f1d9..ace227523cf 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1350.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1350.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1350",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:17.457",
"lastModified": "2024-11-21T05:44:09.337",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umb-dos-dgKzDEBP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1351.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1351.json
index ec0ff22e885..696ef92fac6 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1351.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1351.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1351",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-17T17:15:11.863",
"lastModified": "2024-11-21T05:44:09.457",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-Lz6HbGCt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1352.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1352.json
index 5d3b3b63777..c527123febd 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1352.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1352.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1352",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T21:15:11.507",
"lastModified": "2024-11-21T05:44:09.593",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -566,7 +566,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-decnet-dos-cuPWDkyL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1353.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1353.json
index b7660645096..70ef16ae775 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1353.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1353.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1353",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:17.533",
"lastModified": "2024-11-21T05:44:09.737",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -154,7 +154,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr-mem-leak-dos-MTWGHKk3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1354.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1354.json
index 7b393af1d78..9b8fc963b51 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1354.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1354.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1354",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:18.763",
"lastModified": "2024-11-21T05:44:09.857",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-invcert-eOpRvCKH",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1355.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1355.json
index a364ecd362d..8ec0540db08 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1355.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1355.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1355",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:17.610",
"lastModified": "2024-11-21T05:44:09.980",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -174,7 +174,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-trav-inj-dM687ZD6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1356.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1356.json
index c3336ca975d..d23ef81de4a 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1356.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1356.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1356",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T21:15:11.647",
"lastModified": "2024-11-21T05:44:10.107",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -186,7 +186,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xe-webui-dos-z9yqYQAn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1357.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1357.json
index 946236729c9..38a339a506e 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1357.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1357.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1357",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:17.690",
"lastModified": "2024-11-21T05:44:10.233",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -174,7 +174,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-trav-inj-dM687ZD6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1358.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1358.json
index 84530d55c0a..914d53dd11e 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1358.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1358.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1358",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.250",
"lastModified": "2024-11-21T05:44:10.357",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-finesse-opn-rdrct-epDeh7R",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1359.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1359.json
index 908b397b3d3..974af08f466 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1359.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1359.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1359",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:08.287",
"lastModified": "2024-11-21T05:44:10.503",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-scr-web-priv-esc-k3HCGJZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1360.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1360.json
index 6332e22e679..6f03c11623d 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1360.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1360.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1360",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-13T22:15:21.723",
"lastModified": "2024-11-21T05:44:10.660",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1361.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1361.json
index 77064f9b9ef..63504a843db 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1361.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1361.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1361",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-24T20:15:13.287",
"lastModified": "2024-11-21T05:44:10.800",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -368,7 +368,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3000-9000-fileaction-QtLzDRy2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1362.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1362.json
index 3bd735f6ae6..5fa170b796b 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1362.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1362.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1362",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:12.140",
"lastModified": "2024-11-21T05:44:10.950",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -174,7 +174,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-rce-pqVYwyb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1363.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1363.json
index ee328e98e68..cd3879957d6 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1363.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1363.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1363",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:09.890",
"lastModified": "2024-11-21T05:44:11.093",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -125,7 +125,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-inj-ereCOKjR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1364.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1364.json
index 20422467129..48c1c2961c6 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1364.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1364.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1364",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-01-20T20:15:17.753",
"lastModified": "2024-11-21T05:44:11.220",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -174,7 +174,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-trav-inj-dM687ZD6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1365.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1365.json
index f37a0425880..f5f4b1b745a 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1365.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1365.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1365",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:09.920",
"lastModified": "2024-11-21T05:44:11.357",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-inj-ereCOKjR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1366.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1366.json
index bd3f42ebf0a..19c03f8e47c 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1366.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1366.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1366",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-17T17:15:12.643",
"lastModified": "2024-11-21T05:44:11.470",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-hijac-JrcTOQMC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1367.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1367.json
index 239891c5633..9cce2122bb5 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1367.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1367.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1367",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-24T20:15:13.363",
"lastModified": "2024-11-21T05:44:11.587",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -333,7 +333,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-pim-dos-Y8SjMz4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1368.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1368.json
index 18abcc4d719..19963d63989 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1368.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1368.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1368",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-24T20:15:13.473",
"lastModified": "2024-11-21T05:44:11.723",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -729,7 +729,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-udld-rce-xetH6w35",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1369.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1369.json
index cae29e57f55..3174fe5a9d7 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1369.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1369.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1369",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:08.887",
"lastModified": "2024-11-21T05:44:11.867",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -124,7 +124,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fdm-xxe-zR7sxPfs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1370.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1370.json
index 79dbbce881e..154d4c216b0 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1370.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1370.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1370",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:18.857",
"lastModified": "2024-11-21T05:44:11.983",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -186,7 +186,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-pe-QpzCAePe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1371.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1371.json
index 7354be4946d..028a0cebcda 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1371.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1371.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1371",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T21:15:11.833",
"lastModified": "2024-11-21T05:44:12.110",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -203,7 +203,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-esc-rSNVvTf9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1372.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1372.json
index 2d571dad44c..fd4d8efe815 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1372.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1372.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1372",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-17T17:15:13.020",
"lastModified": "2024-11-21T05:44:12.240",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -154,7 +154,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wda-pt-msh-6LWOcZ5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1373.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1373.json
index c6caa2bd1c7..fed0ca2705b 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1373.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1373.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1373",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T21:15:11.960",
"lastModified": "2024-11-21T05:44:12.353",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -278,7 +278,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-capwap-dos-2OA3JgKS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1374.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1374.json
index 18baac966af..af17b58ce12 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1374.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1374.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1374",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T21:15:12.023",
"lastModified": "2024-11-21T05:44:12.487",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-xss-cAfMtCzv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1375.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1375.json
index e7ef5950638..1655c80967e 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1375.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1375.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1375",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T21:15:12.100",
"lastModified": "2024-11-21T05:44:12.623",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -308,7 +308,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1376.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1376.json
index 0ebbfb54804..15290bac145 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1376.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1376.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1376",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T21:15:12.177",
"lastModified": "2024-11-21T05:44:12.747",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -363,7 +363,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1377.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1377.json
index fa04b368184..87ce6940f00 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1377.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1377.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1377",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:13.150",
"lastModified": "2024-11-21T05:44:12.877",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1631,7 +1631,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arp-mtfhBfjE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1378.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1378.json
index f27a78bb930..86fe5b829f7 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1378.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1378.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1378",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-17T17:15:13.583",
"lastModified": "2024-11-21T05:44:13.047",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-StarOS-DoS-RLLvGFJj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1379.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1379.json
index 419bc31fc83..fbfaef4b3f1 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1379.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1379.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1379",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:09.310",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-rce-dos-U2PsSkz3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1380.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1380.json
index 33edd671887..00a7af8bf69 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1380.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1380.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1380",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:12.233",
"lastModified": "2024-11-21T05:44:13.247",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-Q4PZcNzJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1381.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1381.json
index 186a50c3caf..f884339fd53 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1381.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1381.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1381",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T21:15:12.320",
"lastModified": "2024-11-21T05:44:13.377",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -291,7 +291,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-BLKH-Ouvrnf2s",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1382.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1382.json
index 3368d832c0d..031df61df9c 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1382.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1382.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1382",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:13.353",
"lastModified": "2024-11-21T05:44:13.500",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-7xfm-92p7-qc57",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -156,7 +156,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xesdwcinj-t68PPW7m",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1383.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1383.json
index 499fa3ae2ff..a2a1551d116 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1383.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1383.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1383",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:13.667",
"lastModified": "2024-11-21T05:44:13.630",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -436,7 +436,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-vw54-f9mw-g46r",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -444,7 +444,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xesdwpinj-V4weeqzU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1384.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1384.json
index b0ec2150b22..bf140ab0513 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1384.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1384.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1384",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:13.743",
"lastModified": "2024-11-21T05:44:13.780",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -153,7 +153,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-h332-fj6p-2232",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -161,7 +161,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-cmdinj-RkSURGHG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1385.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1385.json
index be4313d8683..a92176e48b3 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1385.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1385.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1385",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:13.837",
"lastModified": "2024-11-21T05:44:13.917",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -406,7 +406,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-hhfw-6cm2-v3w5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -414,7 +414,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-pt-hWGcPf7g",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1386.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1386.json
index 1211cede0c3..3f0a2e7ef70 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1386.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1386.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1386",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:12.343",
"lastModified": "2024-11-21T05:44:14.060",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-tu79hvkO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1387.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1387.json
index b9dcaad27c0..28babdd3dd3 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1387.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1387.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1387",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-24T20:15:13.567",
"lastModified": "2024-11-21T05:44:14.203",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -2557,7 +2557,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipv6-netstack-edXPGV7K",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1388.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1388.json
index 2e829a29738..769787c8915 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1388.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1388.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1388",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-24T20:15:13.660",
"lastModified": "2024-11-21T05:44:14.400",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mso-authbyp-bb5GmBQv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1389.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1389.json
index 8175c371fc0..c6d3c7aea5e 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1389.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1389.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1389",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-04T17:15:18.937",
"lastModified": "2024-11-21T05:44:14.533",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -216,7 +216,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipv6-acl-CHgdYk8j",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1390.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1390.json
index 5c3e4e500fe..826486f9384 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1390.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1390.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1390",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:13.917",
"lastModified": "2024-11-21T05:44:14.663",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -481,7 +481,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-OFP-6Nezgn7b",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1391.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1391.json
index 63a1a77dcc1..85de304dd2a 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1391.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1391.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1391",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:13.993",
"lastModified": "2024-11-21T05:44:14.797",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -781,7 +781,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-FSM-Yj8qJbJc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1392.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1392.json
index 3bf044306f2..8393fd586ca 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1392.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1392.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1392",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:14.057",
"lastModified": "2024-11-21T05:44:14.933",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1191,7 +1191,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-SAP-OPLbze68",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1393.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1393.json
index b8b3e0aaadd..ad697c22f1a 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1393.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1393.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1393",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-24T20:15:13.753",
"lastModified": "2024-11-21T05:44:15.090",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-case-mvuln-dYrDPC6w",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1394.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1394.json
index 4d49f4d63d0..bdfc87136d5 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1394.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1394.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1394",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:14.133",
"lastModified": "2024-11-21T05:44:15.220",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -171,7 +171,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ncs520-tcp-ZpzzOxB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1395.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1395.json
index d140b1e341d..cd850a7c9f5 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1395.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1395.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1395",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-16T18:15:07.927",
"lastModified": "2024-11-21T05:44:15.360",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-xss-csHUdtrL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1396.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1396.json
index 70852f13759..0cd38021f00 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1396.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1396.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1396",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-24T20:15:13.847",
"lastModified": "2024-11-21T05:44:15.490",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-case-mvuln-dYrDPC6w",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1397.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1397.json
index b63d5958af8..3fcfb68e8b3 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1397.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1397.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1397",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:09.950",
"lastModified": "2024-11-21T05:44:15.633",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -851,7 +851,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imc-openred-zAYrU6d2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1398.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1398.json
index ab21d8e26cf..abeb04f791c 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1398.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1398.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1398",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:14.213",
"lastModified": "2024-11-21T05:44:15.817",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -1396,7 +1396,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-ACE-75K3bRWe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-13xx/CVE-2021-1399.json b/CVE-2021/CVE-2021-13xx/CVE-2021-1399.json
index e37a071aa9a..aa33694662f 100644
--- a/CVE-2021/CVE-2021-13xx/CVE-2021-1399.json
+++ b/CVE-2021/CVE-2021-13xx/CVE-2021-1399.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1399",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:12.500",
"lastModified": "2024-11-21T05:44:15.987",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -125,7 +125,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-selfcare-VRWWWHgE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1400.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1400.json
index d99390e6951..a1603e13bf5 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1400.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1400.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1400",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:09.983",
"lastModified": "2024-11-21T05:44:16.120",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,14 +269,14 @@
"references": [
{
"url": "http://jvn.jp/en/jp/JVN71263107/index.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-ZAfKGXhF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1401.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1401.json
index 89ef5d92b7e..60c689f1efc 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1401.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1401.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1401",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.017",
"lastModified": "2024-11-21T05:44:16.263",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -279,14 +279,14 @@
"references": [
{
"url": "http://jvn.jp/en/jp/JVN71263107/index.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-ZAfKGXhF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1402.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1402.json
index 19c61199f86..ae1137f3a04 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1402.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1402.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1402",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:08.923",
"lastModified": "2024-11-21T05:44:16.410",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-ssl-decrypt-dos-DdyLuK6c",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1403.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1403.json
index 862887409c1..f37a8d8784c 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1403.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1403.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1403",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:14.320",
"lastModified": "2024-11-21T05:44:16.550",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -736,7 +736,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cswsh-FKk9AzT5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1404.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1404.json
index 34a46ce6983..a11ebf90aea 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1404.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1404.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1404",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T05:15:13.267",
"lastModified": "2024-11-21T05:44:16.710",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1405.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1405.json
index f6e14f28ba0..a48ce9deba7 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1405.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1405.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1405",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T05:15:13.347",
"lastModified": "2024-11-21T05:44:16.853",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -142,7 +142,7 @@
"references": [
{
"url": "https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
@@ -150,7 +150,7 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00012.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -158,7 +158,7 @@
},
{
"url": "https://security.gentoo.org/glsa/202104-07",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1406.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1406.json
index 08559699782..feefeacab7d 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1406.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1406.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1406",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:12.593",
"lastModified": "2024-11-21T05:44:16.997",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -426,7 +426,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-inf-disc-wCxZNjL2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1407.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1407.json
index 0bdecfbd70d..14bb74c4711 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1407.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1407.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1407",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:12.733",
"lastModified": "2024-11-21T05:44:17.157",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-Q4PZcNzJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1408.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1408.json
index 685dded66f9..c6702525aa0 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1408.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1408.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1408",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:12.797",
"lastModified": "2024-11-21T05:44:17.287",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-Q4PZcNzJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1409.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1409.json
index 6baa1df65d3..9976c508632 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1409.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1409.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1409",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:12.907",
"lastModified": "2024-11-21T05:44:17.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-Q4PZcNzJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1410.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1410.json
index 72af5bb4501..2be339885b1 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1410.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1410.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1410",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:09.553",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1411.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1411.json
index eea3ceabf42..bba6e234724 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1411.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1411.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1411",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T21:15:13.210",
"lastModified": "2024-11-21T05:44:17.583",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -152,7 +152,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-jabber-PWrTATTC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1412.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1412.json
index 1a69de33c2d..65cba6704c5 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1412.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1412.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1412",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-17T17:15:13.987",
"lastModified": "2024-11-21T05:44:17.707",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -287,7 +287,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-exp-8RsuEu8S",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1413.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1413.json
index 61617c9749c..8f9284e42d6 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1413.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1413.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1413",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:13.063",
"lastModified": "2024-11-21T05:44:17.840",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -213,14 +213,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv34x-rce-8bfG2h6b",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-558/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1414.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1414.json
index ffdc6e1208e..04a7eef3259 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1414.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1414.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1414",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:13.187",
"lastModified": "2024-11-21T05:44:18.567",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -213,14 +213,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv34x-rce-8bfG2h6b",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-559/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1415.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1415.json
index c97535114f7..85adacbd528 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1415.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1415.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1415",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:13.267",
"lastModified": "2024-11-21T05:44:18.690",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -213,14 +213,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv34x-rce-8bfG2h6b",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-560/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1416.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1416.json
index e78edf6aec1..cd3b0960230 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1416.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1416.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1416",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-17T17:15:14.550",
"lastModified": "2024-11-21T05:44:18.817",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -297,7 +297,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-exp-8RsuEu8S",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1417.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1417.json
index d33cd7a86ed..fef1a4193f1 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1417.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1417.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1417",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T21:15:13.287",
"lastModified": "2024-11-21T05:44:18.937",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -162,7 +162,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-jabber-PWrTATTC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1418.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1418.json
index dad6d86cf19..ab5ebfa0c24 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1418.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1418.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1418",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T21:15:13.367",
"lastModified": "2024-11-21T05:44:19.057",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -177,7 +177,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-jabber-PWrTATTC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1419.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1419.json
index 17a83051e92..3e6d7a64c5f 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1419.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1419.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1419",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:07.697",
"lastModified": "2024-11-21T05:44:19.193",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1345,7 +1345,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-ap-LLjsGxv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1420.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1420.json
index b9f898a811c..fde7b56b77d 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1420.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1420.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1420",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:13.327",
"lastModified": "2024-11-21T05:44:19.410",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-VObwRKWV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1421.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1421.json
index 7818ab23584..338a08a59c4 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1421.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1421.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1421",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.047",
"lastModified": "2024-11-21T05:44:19.547",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-cmdinj-DkFjqg2j",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1422.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1422.json
index 763364b3b04..22b3d95afaa 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1422.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1422.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1422",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-16T13:15:08.783",
"lastModified": "2024-11-21T05:44:19.693",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -173,7 +173,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ipsec-dos-TFKQbgWC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1423.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1423.json
index 592173b7679..d2f88ca6081 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1423.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1423.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1423",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T21:15:13.443",
"lastModified": "2024-11-21T05:44:19.837",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -241,7 +241,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-foverwrt-HyVXvrtb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1424.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1424.json
index 2f4419b35b3..b9585f95993 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1424.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1424.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1424",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:09.823",
"lastModified": "2024-11-21T05:44:19.980",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,23 +54,23 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ipsecmgr-dos-3gkHXwvS",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrbgp-rpki-dos-gvmjqxbk",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1425.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1425.json
index 1a91729a0c5..eba1e713f44 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1425.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1425.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1425",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:10.180",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1426.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1426.json
index 9d8760d77ea..c93f845a5a1 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1426.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1426.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1426",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.083",
"lastModified": "2024-11-21T05:44:20.260",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1427.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1427.json
index 0b0b50161ce..d778927e996 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1427.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1427.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1427",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.117",
"lastModified": "2024-11-21T05:44:20.373",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1428.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1428.json
index ae22b8e3308..bd4e01547c1 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1428.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1428.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1428",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.153",
"lastModified": "2024-11-21T05:44:20.490",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1429.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1429.json
index 07d48689e44..9abd4a26f8f 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1429.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1429.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1429",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.190",
"lastModified": "2024-11-21T05:44:20.610",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1430.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1430.json
index 091d1e80eda..a645771d772 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1430.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1430.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1430",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.223",
"lastModified": "2024-11-21T05:44:20.760",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1431.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1431.json
index b6b05c58ca3..9efbf9ce4be 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1431.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1431.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1431",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:14.430",
"lastModified": "2024-11-21T05:44:20.893",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -271,7 +271,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwdos-4zeEeC9w",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1432.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1432.json
index c46e8a18bc2..24f5f206c43 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1432.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1432.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1432",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:14.510",
"lastModified": "2024-11-21T05:44:21.037",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1433.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1433.json
index 91d5f771d91..5df61af3952 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1433.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1433.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1433",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:14.603",
"lastModified": "2024-11-21T05:44:21.170",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -226,7 +226,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-buffover-CqdRWLc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1434.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1434.json
index 86705b098ce..64a2cd09339 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1434.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1434.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1434",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:14.667",
"lastModified": "2024-11-21T05:44:21.310",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -246,7 +246,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-arbfile-FUxskKDE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1435.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1435.json
index bc042cacd02..3190ba66d4a 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1435.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1435.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1435",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:14.760",
"lastModified": "2024-11-21T05:44:21.453",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -293,7 +293,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webcmdinjsh-UFJxTgZD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1436.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1436.json
index cc73368145c..26c04f36316 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1436.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1436.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1436",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:14.820",
"lastModified": "2024-11-21T05:44:21.590",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -296,7 +296,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwpathtrav-nsrue2Mt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1437.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1437.json
index 033fcbaf6b6..92b57e3432e 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1437.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1437.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1437",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:14.900",
"lastModified": "2024-11-21T05:44:21.730",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -229,7 +229,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-info-disc-BfWqghj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1438.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1438.json
index 01b52b6494c..cdd8a4a9f29 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1438.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1438.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1438",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.257",
"lastModified": "2024-11-21T05:44:21.870",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-waas-infdisc-Twb4EypK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1439.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1439.json
index 647d413334a..b0822b8ed44 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1439.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1439.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1439",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:14.977",
"lastModified": "2024-11-21T05:44:22.010",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -202,7 +202,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-mdns-dos-E6KwYuMx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1440.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1440.json
index 726228b4116..8544725b254 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1440.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1440.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1440",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:10.400",
"lastModified": "2024-11-21T05:44:22.147",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,19 +54,19 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrbgp-rpki-dos-gvmjqxbk",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1441.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1441.json
index 252925533bf..d1a63406fec 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1441.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1441.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1441",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:15.040",
"lastModified": "2024-11-21T05:44:22.270",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -273,7 +273,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-iot-codexec-k46EFF6q",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1442.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1442.json
index 4a66556ebc6..5cf31234478 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1442.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1442.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1442",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:15.133",
"lastModified": "2024-11-21T05:44:22.433",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -1233,7 +1233,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-pnp-priv-esc-AmG3kuVL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1443.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1443.json
index 22d20ee995e..a6b383fc35f 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1443.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1443.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1443",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:15.227",
"lastModified": "2024-11-21T05:44:22.597",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -426,7 +426,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-os-cmd-inj-Ef6TV5e9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1444.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1444.json
index f9442a19099..454aa07bfe2 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1444.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1444.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1444",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:10.627",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1445.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1445.json
index a22ab035ac1..a7c404b2cac 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1445.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1445.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1445",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:08.967",
"lastModified": "2024-11-21T05:44:22.823",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-vpn-dos-fpBcpEcD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1446.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1446.json
index c2ab057e296..996473af432 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1446.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1446.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1446",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:15.307",
"lastModified": "2024-11-21T05:44:22.957",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -1436,7 +1436,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-alg-dos-hbBS7SZE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1447.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1447.json
index 608c7e6b26d..5530f8d41a6 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1447.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1447.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1447",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.293",
"lastModified": "2024-11-21T05:44:23.117",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -124,7 +124,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-priv-esc-JJ8zxQsC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1448.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1448.json
index 2cfd76e1311..b1dbadf63cf 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1448.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1448.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1448",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:09.007",
"lastModified": "2024-11-21T05:44:23.240",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -196,7 +196,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-cmdinj-vWY5wqZT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1449.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1449.json
index 053a8c145db..e7c889fe425 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1449.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1449.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1449",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:15.400",
"lastModified": "2024-11-21T05:44:23.367",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -248,7 +248,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-privesc-wEVfp8Ud",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1450.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1450.json
index 7381987f4ce..2d3415d7bee 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1450.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1450.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1450",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-02-24T20:15:13.957",
"lastModified": "2024-11-21T05:44:23.497",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dos-55AYyxYr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1451.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1451.json
index 314fe5e663f..ceffe964ddb 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1451.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1451.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1451",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:15.477",
"lastModified": "2024-11-21T05:44:23.623",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -393,7 +393,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-evss-code-exe-8cw5VSvw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1452.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1452.json
index d434c10ffd5..d59fb0442ca 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1452.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1452.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1452",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:15.540",
"lastModified": "2024-11-21T05:44:23.770",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -149,7 +149,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-romvar-cmd-inj-N56fYbrw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1453.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1453.json
index 19fbca45c28..a0bf3112cc1 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1453.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1453.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1453",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:15.623",
"lastModified": "2024-11-21T05:44:23.893",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -386,7 +386,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cat-verify-BQ5hrXgH",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1454.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1454.json
index a2dfaf144bb..ba42923eaba 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1454.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1454.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1454",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:15.697",
"lastModified": "2024-11-21T05:44:24.023",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xesdwpinj-V4weeqzU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1455.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1455.json
index f9d6cf92330..436d9b9c6c2 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1455.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1455.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1455",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:09.043",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -66,7 +66,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1456.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1456.json
index 308280401cd..cc81ca71b17 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1456.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1456.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1456",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:09.080",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1457.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1457.json
index 9fc109397e4..9b0913012f7 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1457.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1457.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1457",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:09.117",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1458.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1458.json
index 7d024b3f6ba..b908282c3bc 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1458.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1458.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1458",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:09.157",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1459.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1459.json
index 8e5d776a850..f84fdb33928 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1459.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1459.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1459",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:13.437",
"lastModified": "2024-11-21T05:44:24.603",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-q3rxHnvm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1460.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1460.json
index 2dfb256ef71..53c204b35c2 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1460.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1460.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1460",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:15.777",
"lastModified": "2024-11-21T05:44:24.730",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -190,7 +190,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-dos-4Fgcjh6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1461.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1461.json
index 964ea682c27..4e065ef3422 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1461.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1461.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1461",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:10.850",
"lastModified": "2024-11-21T05:44:24.867",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1462.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1462.json
index c319f306c63..fcff39c3ff0 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1462.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1462.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1462",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:11.087",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-vman-kth3c82B",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1463.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1463.json
index 2d2b191ef5c..a2e4951959d 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1463.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1463.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1463",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:13.530",
"lastModified": "2024-11-21T05:44:25.047",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -144,7 +144,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-xss-U2WTsUg6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1464.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1464.json
index 69bd8e2554f..bee1cfd6ba8 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1464.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1464.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1464",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:07.350",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,39 +54,39 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-sqlinj-HDJUeEAX",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vdaemon-bo-RuzzEA2",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-authorization-b-GUEpSLK",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-dir-trav-Bpwc5gtm",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-xml-ext-entity-q6Z7uVUg",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-c7z9QqyB",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1465.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1465.json
index 09459e3ccba..c7d9f14739f 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1465.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1465.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1465",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-18T16:15:11.350",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-dir-trav-Bpwc5gtm",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1466.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1466.json
index 018bc15a0da..e8342607975 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1466.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1466.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1466",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:07.670",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vdaemon-bo-RuzzEA2",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1467.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1467.json
index a2a3a9e59af..dff2687f707 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1467.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1467.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1467",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:13.593",
"lastModified": "2024-11-21T05:44:25.383",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-andro-iac-f3UR8frB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1468.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1468.json
index 05bc344194b..26869b29a51 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1468.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1468.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1468",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.327",
"lastModified": "2024-11-21T05:44:25.520",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1469.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1469.json
index b16a460dc28..ec047d9098b 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1469.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1469.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1469",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:15.900",
"lastModified": "2024-11-21T05:44:25.653",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -162,7 +162,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-jabber-PWrTATTC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1470.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1470.json
index b6b339e5974..b65dc36b31b 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1470.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1470.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1470",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:07.977",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -64,15 +64,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-sqlinj-HDJUeEAX",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-c7z9QqyB",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1471.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1471.json
index 61c25a574a6..43ecf83ada8 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1471.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1471.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1471",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-24T20:15:15.977",
"lastModified": "2024-11-21T05:44:25.900",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -187,7 +187,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-jabber-PWrTATTC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1472.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1472.json
index 3e06bcb2269..f8d9fca1c13 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1472.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1472.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1472",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:13.687",
"lastModified": "2024-11-21T05:44:26.040",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -363,7 +363,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -372,7 +372,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2021/Apr/39",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -380,7 +380,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1473.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1473.json
index 2657d4aa27a..f0de9c43055 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1473.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1473.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1473",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:13.780",
"lastModified": "2024-11-21T05:44:26.183",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -232,7 +232,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2021/Apr/39",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -240,7 +240,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1474.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1474.json
index ceb8bbc6292..8cfada9d4a1 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1474.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1474.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1474",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:13.843",
"lastModified": "2024-11-21T05:44:26.340",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-inject-gbZGHP5T",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1475.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1475.json
index 264d02bbe3b..9e145f41920 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1475.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1475.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1475",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:13.967",
"lastModified": "2024-11-21T05:44:26.473",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-inject-gbZGHP5T",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1476.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1476.json
index 41579cce2c6..05dffba7a15 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1476.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1476.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1476",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:09.197",
"lastModified": "2024-11-21T05:44:26.607",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -146,7 +146,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1477.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1477.json
index 1763245d067..35858492cfc 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1477.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1477.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1477",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:09.233",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-iac-pZDMQ4wC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1478.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1478.json
index ab160609896..3eeba975fbe 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1478.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1478.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1478",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.360",
"lastModified": "2024-11-21T05:44:26.880",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -139,7 +139,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-dos-OO4SRYEf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1479.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1479.json
index 2cbfa725206..76f31a3ba26 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1479.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1479.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1479",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:14.047",
"lastModified": "2024-11-21T05:44:27.010",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1480.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1480.json
index 69747a66150..4dd2eff1670 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1480.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1480.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1480",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:14.123",
"lastModified": "2024-11-21T05:44:27.147",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1481.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1481.json
index 9dd80526d8f..728858a72c8 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1481.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1481.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1481",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:08.277",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-c7z9QqyB",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1482.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1482.json
index ddb33dd19b9..087f2e9b429 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1482.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1482.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1482",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:08.530",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1483.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1483.json
index d2a8c220174..67cc9a6a0f3 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1483.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1483.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1483",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:08.760",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-xml-ext-entity-q6Z7uVUg",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1484.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1484.json
index 2df59ef0c47..8ec22d5d1ff 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1484.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1484.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1484",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:08.983",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1485.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1485.json
index 70533359b7e..231f4816552 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1485.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1485.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1485",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-08T04:15:14.203",
"lastModified": "2024-11-21T05:44:27.663",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr-cmdinj-vsKGherc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1486.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1486.json
index 00f47727230..af9a7548724 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1486.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1486.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1486",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.397",
"lastModified": "2024-11-21T05:44:27.800",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -124,7 +124,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-enumeration-64eNnDKy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1487.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1487.json
index 0d9214b8d3f..9e25d54eb00 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1487.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1487.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1487",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.300",
"lastModified": "2024-11-21T05:44:27.920",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -123,7 +123,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-cmd-inj-YU5e6tB3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1488.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1488.json
index ee7ec3d8d66..63e02fdcc6b 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1488.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1488.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1488",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:09.273",
"lastModified": "2024-11-21T05:44:28.050",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -203,7 +203,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-cmdinj-TKyQfDcU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1489.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1489.json
index 610f2d53155..a6aeee8d5f8 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1489.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1489.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1489",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:09.347",
"lastModified": "2024-11-21T05:44:28.167",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -226,7 +226,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fdm-dos-nFES8xTN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1490.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1490.json
index 969eb30e977..3ba7c1a76b8 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1490.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1490.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1490",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.430",
"lastModified": "2024-11-21T05:44:28.290",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-xss-mVjOWchB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1491.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1491.json
index 0bfb02e232f..816fd7ae269 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1491.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1491.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1491",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:09.220",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1492.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1492.json
index 13809b9fc23..fa90477dd74 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1492.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1492.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1492",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-03-25T15:15:12.950",
"lastModified": "2024-11-21T05:44:28.467",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://help.duo.com/s/article/6789",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1493.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1493.json
index bffb4fdfba4..fa871d9bf5d 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1493.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1493.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1493",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:09.387",
"lastModified": "2024-11-21T05:44:28.583",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -173,7 +173,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-memc-dos-fncTyYKG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1494.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1494.json
index 253c92d5495..5ea01830981 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1494.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1494.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1494",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:09.423",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-fp-bp-KfDdcQhc",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1495.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1495.json
index 9a094e80f1b..d4c69982d1c 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1495.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1495.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1495",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:09.430",
"lastModified": "2024-11-21T05:44:28.830",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -270,18 +270,18 @@
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-fp-bp-KfDdcQhc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5354",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1496.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1496.json
index 7bf30026b71..0ea5b4ea732 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1496.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1496.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1496",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.467",
"lastModified": "2024-11-21T05:44:28.950",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1497.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1497.json
index 6bca9bc68c8..3cbc3b3da5a 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1497.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1497.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1497",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.500",
"lastModified": "2024-11-21T05:44:29.070",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -90,7 +90,7 @@
"cisaVulnerabilityName": "Cisco HyperFlex HX Installer Virtual Machine Command Injection Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -189,7 +189,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-rce-TjjNrkpR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1498.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1498.json
index 27f844c3bf6..c336998d588 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1498.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1498.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1498",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.537",
"lastModified": "2024-11-21T05:44:29.210",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -90,7 +90,7 @@
"cisaVulnerabilityName": "Cisco HyperFlex HX Data Platform Command Injection Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -189,7 +189,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-rce-TjjNrkpR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1499.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1499.json
index 4849e907640..4ba6c5f6efd 100644
--- a/CVE-2021/CVE-2021-14xx/CVE-2021-1499.json
+++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1499.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1499",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.567",
"lastModified": "2024-11-21T05:44:29.350",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -166,7 +166,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/163203/Cisco-HyperFlex-HX-Data-Platform-File-Upload-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -175,7 +175,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-upload-KtCK8Ugz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1500.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1500.json
index 9495d07e6c2..d2cf10dc605 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1500.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1500.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1500",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:08.297",
"lastModified": "2024-11-21T05:44:29.503",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,7 +132,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmesh-openred-AGNRmf5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1501.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1501.json
index d1deb42c4e6..a58238f6736 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1501.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1501.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1501",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:09.463",
"lastModified": "2024-11-21T05:44:29.640",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -184,7 +184,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-sipdos-GGwmMerC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1502.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1502.json
index ac3aeb612c0..08139c31e17 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1502.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1502.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1502",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:08.097",
"lastModified": "2024-11-21T05:44:29.780",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -158,7 +158,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-dOJ2jOJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1503.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1503.json
index 652890866e1..fa01f472a8f 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1503.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1503.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1503",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:08.277",
"lastModified": "2024-11-21T05:44:29.907",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-rCFDeVj2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1504.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1504.json
index 6c18ef808af..70e8eb04c9e 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1504.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1504.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1504",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-04-29T18:15:09.500",
"lastModified": "2024-11-21T05:44:30.027",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-vpn-dos-fpBcpEcD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1505.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1505.json
index 35a875e3af2..5e9d2ae4d0f 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1505.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1505.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1505",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.603",
"lastModified": "2024-11-21T05:44:30.143",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1506.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1506.json
index 9d6cf3d5085..d36e6fc1452 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1506.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1506.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1506",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.633",
"lastModified": "2024-11-21T05:44:30.267",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1507.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1507.json
index 372fd4bbf63..b84f7c398bb 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1507.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1507.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1507",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.663",
"lastModified": "2024-11-21T05:44:30.383",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-xss-eN75jxtW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1508.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1508.json
index e0c6ee9d04d..9144cf72a98 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1508.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1508.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1508",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.693",
"lastModified": "2024-11-21T05:44:30.507",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1509.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1509.json
index ce61b41894a..59dbc05964c 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1509.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1509.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1509",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.723",
"lastModified": "2024-11-21T05:44:30.627",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -470,7 +470,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1510.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1510.json
index 3228c18a636..5d5f8f45f6b 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1510.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1510.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1510",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.753",
"lastModified": "2024-11-21T05:44:30.783",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -470,7 +470,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1511.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1511.json
index 45d5f4eb092..a0bd77c06ae 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1511.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1511.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1511",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.783",
"lastModified": "2024-11-21T05:44:30.937",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -470,7 +470,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1512.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1512.json
index b3fbfaed17a..adee5f827ef 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1512.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1512.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1512",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.817",
"lastModified": "2024-11-21T05:44:31.073",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -429,7 +429,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-arbfile-7Qhd9mCn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1513.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1513.json
index c669ae2a1ff..c2c1f2be7a1 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1513.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1513.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1513",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.850",
"lastModified": "2024-11-21T05:44:31.207",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -416,7 +416,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dos-Ckn5cVqW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1514.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1514.json
index 6d6481952e0..d792f7e198c 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1514.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1514.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1514",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.887",
"lastModified": "2024-11-21T05:44:31.353",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -751,7 +751,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-QVszVUPy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1515.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1515.json
index 227cca670b7..3dd5b87a9c3 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1515.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1515.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1515",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.920",
"lastModified": "2024-11-21T05:44:31.510",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-9VZO4gfU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1516.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1516.json
index e00c1416b7a..964082e9223 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1516.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1516.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1516",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.953",
"lastModified": "2024-11-21T05:44:31.637",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -174,7 +174,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-gY2AEz2H",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1517.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1517.json
index 0d8f725d9fe..563375640f6 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1517.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1517.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1517",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:08.410",
"lastModified": "2024-11-21T05:44:31.767",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -172,7 +172,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-multimedia-26DpqVRO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1518.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1518.json
index 7c382288225..b87ca78032c 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1518.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1518.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1518",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-22T16:15:07.897",
"lastModified": "2024-11-21T05:44:31.900",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fdm-rce-Rx6vVurq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1519.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1519.json
index b277f1f3635..a9b5aefc520 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1519.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1519.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1519",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:10.987",
"lastModified": "2024-11-21T05:44:32.030",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-profile-AggMUCDg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1520.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1520.json
index c3207130365..2500b5d2b31 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1520.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1520.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1520",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:11.027",
"lastModified": "2024-11-21T05:44:32.147",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -213,7 +213,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-34x-privesc-GLN8ZAQE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1521.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1521.json
index b6888564a5f..fd9d61e3e33 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1521.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1521.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1521",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:11.063",
"lastModified": "2024-11-21T05:44:32.287",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -325,7 +325,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcameras-dos-fc3F6LzT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1522.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1522.json
index 251501baa81..4ae6718160e 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1522.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1522.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1522",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-04T18:15:08.287",
"lastModified": "2024-11-21T05:44:32.447",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmx-GkCvfd4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1523.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1523.json
index 847a5a56400..5ec9f7df017 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1523.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1523.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1523",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T19:15:07.217",
"lastModified": "2024-11-21T05:44:32.577",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -183,7 +183,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-queue-wedge-cLDDEfKF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1524.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1524.json
index 5dc66d01154..de8a0412311 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1524.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1524.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1524",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-16T18:15:08.217",
"lastModified": "2024-11-21T05:44:32.730",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meetingserver-dos-NzVWMMQT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1525.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1525.json
index 9a5fb255d57..d387fd254d0 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1525.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1525.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1525",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:08.533",
"lastModified": "2024-11-21T05:44:32.863",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -172,7 +172,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-redirect-XuZFU3PH",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1526.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1526.json
index 24f14523d00..87c160853b8 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1526.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1526.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1526",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:08.660",
"lastModified": "2024-11-21T05:44:32.997",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-kOf8zVT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1527.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1527.json
index dd699e73b1b..a202444b5f0 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1527.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1527.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1527",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:08.903",
"lastModified": "2024-11-21T05:44:33.143",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-kxtkFbnR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1528.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1528.json
index 24a84f02907..a2f5bf51af4 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1528.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1528.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1528",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:09.020",
"lastModified": "2024-11-21T05:44:33.277",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -487,7 +487,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-fuErCWwF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1529.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1529.json
index 0e8c04a6473..c9041d7f0bb 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1529.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1529.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1529",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-21T03:15:06.830",
"lastModified": "2024-11-21T05:44:33.437",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -731,7 +731,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-rhpbE34A",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1530.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1530.json
index d941241f039..02091b47730 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1530.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1530.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1530",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:11.097",
"lastModified": "2024-11-21T05:44:33.597",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bwms-xxe-uSLrZgKs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1531.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1531.json
index a5dcdc64445..ad2eb46e22a 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1531.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1531.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1531",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.350",
"lastModified": "2024-11-21T05:44:33.730",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/163265/Cisco-Modeling-Labs-2.1.1-b19-Remote-Command-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -150,7 +150,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cml-cmd-inject-N4VYeQXB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1532.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1532.json
index 5239f62f5f7..42fcff02bb1 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1532.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1532.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1532",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:11.130",
"lastModified": "2024-11-21T05:44:33.877",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -130,7 +130,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-rmos-fileread-pE9sL3g",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1534.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1534.json
index 1bbc2ec7003..e5eb39d9b65 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1534.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1534.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1534",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:07.657",
"lastModified": "2024-11-21T05:44:34.010",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -169,7 +169,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1535.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1535.json
index e64fb561f2b..f8c92454d7e 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1535.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1535.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1535",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-06T13:15:11.167",
"lastModified": "2024-11-21T05:44:34.160",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanageinfdis-LKrFpbv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1536.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1536.json
index 195cc1d3efd..ffcdbf06902 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1536.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1536.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1536",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:09.150",
"lastModified": "2024-11-21T05:44:34.297",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-dll-inject-XNmcSGTU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1537.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1537.json
index b6eb36b6ddc..097127e2c5d 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1537.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1537.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1537",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:09.310",
"lastModified": "2024-11-21T05:44:34.423",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-te-recorder-infodis-mx3ETTBM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1538.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1538.json
index 4c00a6d0d98..17708844380 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1538.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1538.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1538",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:09.550",
"lastModified": "2024-11-21T05:44:34.560",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CSPC-CIV-kDuBfNfu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1539.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1539.json
index 840454419e8..d38e8417b6f 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1539.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1539.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1539",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:09.757",
"lastModified": "2024-11-21T05:44:34.693",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -189,7 +189,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr5k-autho-bypass-mJDF5S7n",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1540.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1540.json
index 92f53287f49..b771a09d709 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1540.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1540.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1540",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:09.917",
"lastModified": "2024-11-21T05:44:34.820",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -189,7 +189,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr5k-autho-bypass-mJDF5S7n",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1541.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1541.json
index 17ca1bad636..ba3c28c6ce9 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1541.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1541.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1541",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-16T18:15:08.347",
"lastModified": "2024-11-21T05:44:34.950",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -353,7 +353,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ciscosb-multivulns-Wwyb7s5E",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1542.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1542.json
index 72af40aa679..4f183eff12f 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1542.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1542.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1542",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-16T18:15:08.473",
"lastModified": "2024-11-21T05:44:35.087",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -363,7 +363,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ciscosb-multivulns-Wwyb7s5E",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1543.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1543.json
index 86d0d4cacad..2aaf3ba123e 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1543.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1543.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1543",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-16T18:15:08.590",
"lastModified": "2024-11-21T05:44:35.237",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -363,7 +363,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ciscosb-multivulns-Wwyb7s5E",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1544.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1544.json
index 9fc05dd4993..c49f41d5542 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1544.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1544.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1544",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:10.050",
"lastModified": "2024-11-21T05:44:35.397",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-8fpBnKOz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1546.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1546.json
index e9b8e22307e..9a1a94dd3a8 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1546.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1546.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1546",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:11.183",
"lastModified": "2024-11-21T05:44:35.523",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -550,7 +550,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-Fhqh8pKX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1547.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1547.json
index 804dfa83224..16c08a282a3 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1547.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1547.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1547",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.400",
"lastModified": "2024-11-21T05:44:35.670",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-Mp9FSdG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1548.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1548.json
index d906b596c83..b02a9be7811 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1548.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1548.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1548",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.453",
"lastModified": "2024-11-21T05:44:35.817",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-Mp9FSdG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1549.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1549.json
index b2013b91c4f..63c4f765244 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1549.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1549.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1549",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.503",
"lastModified": "2024-11-21T05:44:35.967",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-Mp9FSdG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1550.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1550.json
index 173bc5a5aa6..11c1f8c69fb 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1550.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1550.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1550",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.553",
"lastModified": "2024-11-21T05:44:36.127",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-Mp9FSdG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1551.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1551.json
index 99d9dfb2094..296f9cfea40 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1551.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1551.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1551",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.607",
"lastModified": "2024-11-21T05:44:36.267",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-Mp9FSdG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1552.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1552.json
index 8156d92f277..b2fab1ec2e1 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1552.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1552.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1552",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.653",
"lastModified": "2024-11-21T05:44:36.410",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-Mp9FSdG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1553.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1553.json
index b54a016e80a..700da6de0d3 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1553.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1553.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1553",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.700",
"lastModified": "2024-11-21T05:44:36.563",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-Mp9FSdG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1554.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1554.json
index ed51081afa5..ef070e8f129 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1554.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1554.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1554",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.747",
"lastModified": "2024-11-21T05:44:36.707",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-Mp9FSdG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1555.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1555.json
index 5a48b45f23e..9e801c364e3 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1555.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1555.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1555",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.787",
"lastModified": "2024-11-21T05:44:36.857",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -279,7 +279,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-Mp9FSdG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1557.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1557.json
index 32a625e7ae7..aeb11a59b4d 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1557.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1557.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1557",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.830",
"lastModified": "2024-11-21T05:44:37.003",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnasp-conn-prvesc-q6T6BzW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1558.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1558.json
index 980501f685c..7e8caea6d7a 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1558.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1558.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1558",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.880",
"lastModified": "2024-11-21T05:44:37.147",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnasp-conn-prvesc-q6T6BzW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1559.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1559.json
index bae08bb5102..a2cf014a974 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1559.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1559.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1559",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.927",
"lastModified": "2024-11-21T05:44:37.280",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnasp-conn-cmdinj-HOj4YV5n",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1560.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1560.json
index fe23577fe70..630a935abb7 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1560.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1560.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1560",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-05-22T07:15:07.967",
"lastModified": "2024-11-21T05:44:37.410",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnasp-conn-cmdinj-HOj4YV5n",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1561.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1561.json
index 6666d422c19..756371d2c09 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1561.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1561.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1561",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-18T20:15:06.970",
"lastModified": "2024-11-21T05:44:37.543",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -139,7 +139,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-spam-jPxUXMk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1562.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1562.json
index 6afa1b890af..e92c3c1ef1e 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1562.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1562.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1562",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:08.457",
"lastModified": "2024-11-21T05:44:37.687",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -142,7 +142,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broad-as-inf-disc-ZUXGFFXQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1563.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1563.json
index bb9b59b00c0..b5765569baa 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1563.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1563.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1563",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:10.297",
"lastModified": "2024-11-21T05:44:37.820",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldpcdp-mem-yTQDmjRO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1564.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1564.json
index 1f1abde7605..20a23cfd035 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1564.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1564.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1564",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-04T17:15:10.543",
"lastModified": "2024-11-21T05:44:37.953",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldpcdp-mem-yTQDmjRO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1565.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1565.json
index 8fc720722af..eeb6dd8d817 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1565.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1565.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1565",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:11.407",
"lastModified": "2024-11-21T05:44:38.083",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -487,7 +487,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-capwap-dos-gmNjdKOY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1566.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1566.json
index 0eb575a158f..90c2c0ccfc1 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1566.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1566.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1566",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-16T18:15:08.710",
"lastModified": "2024-11-21T05:44:38.237",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -241,7 +241,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1567.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1567.json
index 271b955a37f..8a7a2448ef1 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1567.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1567.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1567",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-16T18:15:08.830",
"lastModified": "2024-11-21T05:44:38.390",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-pos-dll-ff8j6dFv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1568.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1568.json
index 67b28c88ab1..0b0bde64c02 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1568.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1568.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1568",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-16T18:15:08.943",
"lastModified": "2024-11-21T05:44:38.517",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dos-hMhyDfb8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1569.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1569.json
index f7bb065ef3c..a6e71afeaad 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1569.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1569.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1569",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-16T18:15:09.077",
"lastModified": "2024-11-21T05:44:38.637",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-GuC5mLwG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1570.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1570.json
index 533989ba3ea..ebd201f8862 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1570.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1570.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1570",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-16T18:15:09.217",
"lastModified": "2024-11-21T05:44:38.757",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-GuC5mLwG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1571.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1571.json
index 3fd0342635b..e1d3b83e44d 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1571.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1571.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1571",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-06-16T18:15:09.450",
"lastModified": "2024-11-21T05:44:38.893",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -363,7 +363,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ciscosb-multivulns-Wwyb7s5E",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1572.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1572.json
index 4dd0f62eee6..fe283e6a6ea 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1572.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1572.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1572",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-04T18:15:08.470",
"lastModified": "2024-11-21T05:44:39.023",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -149,14 +149,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confd-priv-esc-LsGtCRx4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-priv-esc-XXqRtTfT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1573.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1573.json
index 0efea4107d8..f189d387809 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1573.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1573.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1573",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-11T19:15:07.743",
"lastModified": "2024-11-21T05:44:39.157",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -198,7 +198,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asafdt-webvpn-dos-KSqJAKPA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1574.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1574.json
index 1d80d017cd9..6870a7ca003 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1574.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1574.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1574",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:08.700",
"lastModified": "2024-11-21T05:44:39.297",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bpa-priv-esc-dgubwbH4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1575.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1575.json
index 10f1276474e..f003eefde5d 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1575.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1575.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1575",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:08.853",
"lastModified": "2024-11-21T05:44:39.423",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vvb-xss-wG4zXRp3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1576.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1576.json
index 2cef91d41bf..dcd7ba66220 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1576.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1576.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1576",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:09.040",
"lastModified": "2024-11-21T05:44:39.557",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bpa-priv-esc-dgubwbH4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1577.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1577.json
index c8d7ce98ca4..6a00cfb5724 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1577.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1577.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1577",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T20:15:09.883",
"lastModified": "2024-11-21T05:44:39.720",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -161,7 +161,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-frw-Nt3RYxR2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1578.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1578.json
index 979f699e3ce..cf81641e746 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1578.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1578.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1578",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T20:15:10.080",
"lastModified": "2024-11-21T05:44:39.860",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-pesc-pkmGK4J",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1579.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1579.json
index 245cbeb9fa8..53d27257036 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1579.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1579.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1579",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T20:15:10.303",
"lastModified": "2024-11-21T05:44:39.990",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -161,7 +161,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1580.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1580.json
index 617d55614b1..8072f233b94 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1580.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1580.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1580",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T20:15:10.493",
"lastModified": "2024-11-21T05:44:40.123",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -161,7 +161,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-mdvul-HBsJBuvW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1581.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1581.json
index 936a8a7260f..1bf1d92e959 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1581.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1581.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1581",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T20:15:10.640",
"lastModified": "2024-11-21T05:44:40.260",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -161,7 +161,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-mdvul-HBsJBuvW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1582.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1582.json
index a7ef701c4a4..fafe26e2255 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1582.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1582.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1582",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T20:15:10.697",
"lastModified": "2024-11-21T05:44:40.390",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -161,7 +161,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-scss-bFT75YrM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1583.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1583.json
index f8eb8683ff7..07c1847d72e 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1583.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1583.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1583",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T20:15:10.997",
"lastModified": "2024-11-21T05:44:40.523",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -338,7 +338,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-naci-afr-UtjfO2D7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1584.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1584.json
index 2708e5d818c..3bde0cf538e 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1584.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1584.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1584",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T20:15:11.177",
"lastModified": "2024-11-21T05:44:40.663",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -338,7 +338,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-naci-mdvul-vrKVgNU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1585.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1585.json
index 64fe41c09b1..ace88bd188f 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1585.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1585.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1585",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:09.207",
"lastModified": "2024-11-21T05:44:40.813",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://github.com/jbaines-r7/staystaystay",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -135,14 +135,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asdm-rce-gqjShXW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.rapid7.com/blog/post/2022/08/11/rapid7-discovered-vulnerabilities-in-cisco-asa-asdm-and-firepower-services-software/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1586.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1586.json
index cd17e83ccd9..7a12eb63945 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1586.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1586.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1586",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T20:15:11.237",
"lastModified": "2024-11-21T05:44:40.963",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -338,7 +338,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-tcp-dos-YXukt6gM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1587.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1587.json
index 81e8ae27915..ea6ebe71115 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1587.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1587.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1587",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T20:15:11.417",
"lastModified": "2024-11-21T05:44:41.113",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -443,7 +443,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ngoam-dos-LTDb9Hv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1588.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1588.json
index 69cd07de416..05a2da69aee 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1588.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1588.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1588",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T20:15:11.537",
"lastModified": "2024-11-21T05:44:41.290",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -477,7 +477,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-mpls-oam-dos-sGO9x5GM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1589.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1589.json
index 77ccceb39b8..05afa88d2c8 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1589.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1589.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1589",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:11.717",
"lastModified": "2024-11-21T05:44:41.450",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -149,7 +149,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-credentials-ydYfskzZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1590.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1590.json
index 987ead5214d..a94273ef38e 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1590.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1590.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1590",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T20:15:11.657",
"lastModified": "2024-11-21T05:44:41.597",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -673,7 +673,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-login-blockfor-RwjGVEcu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1591.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1591.json
index 99a220192ef..7d44ca60c31 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1591.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1591.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1591",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T20:15:11.863",
"lastModified": "2024-11-21T05:44:41.757",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -163,7 +163,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nexus-acl-vrvQYPVe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1592.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1592.json
index 17607d6f6c1..b2ed39f3d11 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1592.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1592.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1592",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-25T20:15:12.070",
"lastModified": "2024-11-21T05:44:41.907",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -152,7 +152,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-ssh-dos-MgvmyrQy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1593.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1593.json
index 6c686115739..41c7ff6963d 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1593.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1593.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1593",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-04T18:15:08.633",
"lastModified": "2024-11-21T05:44:42.037",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-packettracer-dll-inj-Qv8Mk5Jx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1594.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1594.json
index 13d5014da1a..5f42483522b 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1594.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1594.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1594",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:08.060",
"lastModified": "2024-11-21T05:44:42.170",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -243,7 +243,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-UwqPrBM3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1595.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1595.json
index 0c147369499..2424289a78c 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1595.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1595.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1595",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:09.360",
"lastModified": "2024-11-21T05:44:42.323",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-mem-wGqundTq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1596.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1596.json
index 17be5227279..b0d80808b62 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1596.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1596.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1596",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:09.507",
"lastModified": "2024-11-21T05:44:42.463",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-mem-wGqundTq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1597.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1597.json
index a54f0101458..983d90c758f 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1597.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1597.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1597",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:09.737",
"lastModified": "2024-11-21T05:44:42.600",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-mem-wGqundTq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1598.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1598.json
index 2f8e5875d6f..ab59272a492 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1598.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1598.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1598",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:10.057",
"lastModified": "2024-11-21T05:44:42.737",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-mem-wGqundTq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1599.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1599.json
index a7ab09c40a4..cdbfa15e215 100644
--- a/CVE-2021/CVE-2021-15xx/CVE-2021-1599.json
+++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1599.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1599",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-22T16:15:08.117",
"lastModified": "2024-11-21T05:44:42.873",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvp-xss-yvE6L8Zq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1600.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1600.json
index 55e53bec989..0a0624db7e0 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1600.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1600.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1600",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-22T16:15:08.330",
"lastModified": "2024-11-21T05:44:42.990",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsi2-iptaclbp-L8Dzs8m8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1601.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1601.json
index c7832c930ff..b80f7e9a2bd 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1601.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1601.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1601",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-22T16:15:08.487",
"lastModified": "2024-11-21T05:44:43.103",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsi2-iptaclbp-L8Dzs8m8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1602.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1602.json
index 8bd3f8cf3b3..95572e08d34 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1602.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1602.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1602",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-04T18:15:08.787",
"lastModified": "2024-11-21T05:44:43.223",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -163,7 +163,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-code-execution-9UVJr7k4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1603.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1603.json
index 9c8526aef48..86b98fe4b48 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1603.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1603.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1603",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:10.387",
"lastModified": "2024-11-21T05:44:43.360",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -207,7 +207,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-stored-xss-TWwjVPdL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1604.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1604.json
index 09c5318b4d7..174b5601065 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1604.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1604.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1604",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:10.703",
"lastModified": "2024-11-21T05:44:43.490",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -207,7 +207,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-stored-xss-TWwjVPdL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1605.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1605.json
index f61d1136d1b..aef437eaf05 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1605.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1605.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1605",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:11.020",
"lastModified": "2024-11-21T05:44:43.623",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -207,7 +207,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-stored-xss-TWwjVPdL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1606.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1606.json
index 9a9141f9d21..32ba8aa706d 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1606.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1606.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1606",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:11.343",
"lastModified": "2024-11-21T05:44:43.753",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -207,7 +207,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-stored-xss-TWwjVPdL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1607.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1607.json
index 01e8ca411ab..987628b797c 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1607.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1607.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1607",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-08T19:15:11.660",
"lastModified": "2024-11-21T05:44:43.883",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -207,7 +207,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-stored-xss-TWwjVPdL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1609.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1609.json
index 50cb87509cd..f0b7e959a12 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1609.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1609.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1609",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-04T18:15:08.977",
"lastModified": "2024-11-21T05:44:44.017",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -154,7 +154,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv340-cmdinj-rcedos-pY8J3qfy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1610.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1610.json
index 3e8aff88a2b..b2894d3cd83 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1610.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1610.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1610",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-04T18:15:09.143",
"lastModified": "2024-11-21T05:44:44.150",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -154,7 +154,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv340-cmdinj-rcedos-pY8J3qfy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1611.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1611.json
index 0d7f3216949..1ad8b652d55 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1611.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1611.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1611",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:11.997",
"lastModified": "2024-11-21T05:44:44.283",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -169,7 +169,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-gre-6u4ELzAT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1612.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1612.json
index d0dd50e79cf..82b5b7078ea 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1612.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1612.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1612",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:12.270",
"lastModified": "2024-11-21T05:44:44.417",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-GjR5pGOm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1614.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1614.json
index 0995f430609..9e76a22afcb 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1614.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1614.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1614",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-22T16:15:08.667",
"lastModified": "2024-11-21T05:44:44.550",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -156,7 +156,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-mpls-infodisclos-MSSRFkZq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1615.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1615.json
index d7a0d3d3da8..3adc5abd9fa 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1615.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1615.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1615",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:12.470",
"lastModified": "2024-11-21T05:44:44.683",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -164,7 +164,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewc-dos-g6JruHRT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1616.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1616.json
index a23bfb5ea8f..6e22f61f635 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1616.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1616.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1616",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:12.627",
"lastModified": "2024-11-21T05:44:44.827",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-h323alg-bypass-4vy2MP2Q",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1617.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1617.json
index 03dd2826c2b..e9872f0a6dc 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1617.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1617.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1617",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-22T16:15:08.827",
"lastModified": "2024-11-21T05:44:44.957",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsi2-dtcinj-yH5U4RSx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1618.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1618.json
index a4ea38eebb9..d695768411f 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1618.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1618.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1618",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-22T16:15:08.980",
"lastModified": "2024-11-21T05:44:45.087",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsi2-dtcinj-yH5U4RSx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1619.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1619.json
index a5636850d9a..68a3b924e5d 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1619.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1619.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1619",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:12.820",
"lastModified": "2024-11-21T05:44:45.213",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1441,7 +1441,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaa-Yx47ZT8Q",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1620.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1620.json
index e1de6062b8c..ff355e31c0c 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1620.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1620.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1620",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:13.030",
"lastModified": "2024-11-21T05:44:45.400",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -4953,7 +4953,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1621.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1621.json
index 9bbe9ce1050..397e8c4692b 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1621.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1621.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1621",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:13.210",
"lastModified": "2024-11-21T05:44:45.667",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -446,7 +446,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-quewedge-69BsHUBW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1622.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1622.json
index ac37faec897..1cbef47ac49 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1622.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1622.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1622",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:13.353",
"lastModified": "2024-11-21T05:44:45.800",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -199,7 +199,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbr8-cops-Vc2ZsJSx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1623.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1623.json
index acc9619e144..36a5a3e319d 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1623.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1623.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1623",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:13.517",
"lastModified": "2024-11-21T05:44:45.930",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -139,7 +139,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbr8snmp-zGjkZ9Fc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1624.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1624.json
index b17e89f6420..a9a953d2119 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1624.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1624.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1624",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:13.610",
"lastModified": "2024-11-21T05:44:46.050",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -229,7 +229,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ratenat-pYVLA7wM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1625.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1625.json
index 9e2ad2cfabf..7347ab82f56 100644
--- a/CVE-2021/CVE-2021-16xx/CVE-2021-1625.json
+++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1625.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-1625",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:13.733",
"lastModified": "2024-11-21T05:44:46.170",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-pP9jfzwL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-346xx/CVE-2021-34696.json b/CVE-2021/CVE-2021-346xx/CVE-2021-34696.json
index 2b942bd0f20..2452b24eeeb 100644
--- a/CVE-2021/CVE-2021-346xx/CVE-2021-34696.json
+++ b/CVE-2021/CVE-2021-346xx/CVE-2021-34696.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34696",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:15.633",
"lastModified": "2024-11-21T06:10:58.117",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr900acl-UeEyCxkv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-346xx/CVE-2021-34697.json b/CVE-2021/CVE-2021-346xx/CVE-2021-34697.json
index 2d41f359b61..02b5f641a15 100644
--- a/CVE-2021/CVE-2021-346xx/CVE-2021-34697.json
+++ b/CVE-2021/CVE-2021-346xx/CVE-2021-34697.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34697",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:16.107",
"lastModified": "2024-11-21T06:10:58.283",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-tguGuYq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-346xx/CVE-2021-34698.json b/CVE-2021/CVE-2021-346xx/CVE-2021-34698.json
index 48efec198eb..73b7e5486c7 100644
--- a/CVE-2021/CVE-2021-346xx/CVE-2021-34698.json
+++ b/CVE-2021/CVE-2021-346xx/CVE-2021-34698.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34698",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:08.490",
"lastModified": "2024-11-21T06:10:58.427",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -184,7 +184,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-346xx/CVE-2021-34699.json b/CVE-2021/CVE-2021-346xx/CVE-2021-34699.json
index 42bc2bfb179..7ae4aeb3955 100644
--- a/CVE-2021/CVE-2021-346xx/CVE-2021-34699.json
+++ b/CVE-2021/CVE-2021-346xx/CVE-2021-34699.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34699",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:16.647",
"lastModified": "2024-11-21T06:10:58.563",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -4291,7 +4291,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-trustsec-dos-7fuXDR2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34700.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34700.json
index fcd5176d7a5..b6644a98126 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34700.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34700.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34700",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-07-22T16:15:09.300",
"lastModified": "2024-11-21T06:10:59.067",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-infdis-LggOP9sE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34701.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34701.json
index 6e40aa56292..1d7075dca84 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34701.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34701.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34701",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:08.427",
"lastModified": "2024-11-21T06:10:59.190",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-path-trav-dKCvktvO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34702.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34702.json
index 4005af72996..6bf7e28025b 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34702.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34702.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34702",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:08.777",
"lastModified": "2024-11-21T06:10:59.317",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-disc-pNXtLhdp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34703.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34703.json
index 49f77506989..e170e94944f 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34703.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34703.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34703",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:16.970",
"lastModified": "2024-11-21T06:10:59.470",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1145,7 +1145,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lldp-dos-sBnuHSjT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34704.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34704.json
index a943e2ddb9f..057c351d0cc 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34704.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34704.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34704",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-11T19:15:07.827",
"lastModified": "2024-11-21T06:10:59.650",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asafdt-webvpn-dos-KSqJAKPA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34705.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34705.json
index 400030ece2c..faaf952dfd1 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34705.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34705.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34705",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:17.240",
"lastModified": "2024-11-21T06:10:59.810",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -8726,7 +8726,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxo-pattern-bypass-jUXgygYv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34706.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34706.json
index 9f00f025b50..633d61fe0f3 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34706.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34706.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34706",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:09.047",
"lastModified": "2024-11-21T06:11:00.600",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -137,7 +137,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-inj-V4VSjEsX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34707.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34707.json
index f6ec5c6abc9..a4be1be230b 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34707.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34707.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34707",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-04T18:15:09.947",
"lastModified": "2024-11-21T06:11:00.730",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34708.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34708.json
index b02a2221522..e060fe0ce74 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34708.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34708.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34708",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-09T05:15:07.207",
"lastModified": "2024-11-21T06:11:00.860",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -274,7 +274,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lnt-QN9mCzwn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34709.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34709.json
index 6bfb3527570..35fb0831a1f 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34709.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34709.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34709",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-09T05:15:10.633",
"lastModified": "2024-11-21T06:11:01.007",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -274,7 +274,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lnt-QN9mCzwn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34710.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34710.json
index 14edd04f692..86ac20da0dd 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34710.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34710.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34710",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:09.313",
"lastModified": "2024-11-21T06:11:01.147",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -192,7 +192,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-A4J57F3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34711.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34711.json
index 859aa55b83b..1145b7b5d83 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34711.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34711.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34711",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:09.587",
"lastModified": "2024-11-21T06:11:01.283",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -559,7 +559,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-arbfileread-NPdtE2Ow",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34712.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34712.json
index 4c314d8294c..abc5705264e 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34712.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34712.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34712",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:17.687",
"lastModified": "2024-11-21T06:11:01.440",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-jOsuRJCc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34713.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34713.json
index a834942269b..a344751137a 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34713.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34713.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34713",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-09T05:15:10.810",
"lastModified": "2024-11-21T06:11:01.577",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -221,7 +221,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-npspin-QYpwdhFD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34714.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34714.json
index 1bb43bb2ec1..5985894f8ff 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34714.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34714.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34714",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:18.153",
"lastModified": "2024-11-21T06:11:01.790",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1507,7 +1507,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34715.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34715.json
index d495e4172a9..82773067624 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34715.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34715.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34715",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-18T20:15:07.150",
"lastModified": "2024-11-21T06:11:02.033",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewver-c6WZPXRx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34716.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34716.json
index 88b584423d8..e2af04a02ab 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34716.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34716.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34716",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-18T20:15:07.300",
"lastModified": "2024-11-21T06:11:02.183",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewrce-QPynNCjh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34718.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34718.json
index 03a140b6b50..bf67cd46ddb 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34718.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34718.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34718",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-09T05:15:11.103",
"lastModified": "2024-11-21T06:11:02.320",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -526,7 +526,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-scp-inject-QwZOCv2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34719.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34719.json
index a8286bb9eb7..68dd6d0a9b3 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34719.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34719.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34719",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-09T05:15:11.310",
"lastModified": "2024-11-21T06:11:02.477",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -606,7 +606,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-privescal-dZYMrKf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34720.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34720.json
index 3f980666b33..1f3965f615c 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34720.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34720.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34720",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-09T05:15:11.463",
"lastModified": "2024-11-21T06:11:02.663",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -669,7 +669,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-ZA3SRrpP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34721.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34721.json
index b98b98a1044..54a008e2189 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34721.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34721.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34721",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-09T05:15:11.677",
"lastModified": "2024-11-21T06:11:02.840",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -566,7 +566,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-cmd-inj-wbZKvPxc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34722.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34722.json
index c887e634d47..543d6f7717b 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34722.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34722.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34722",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-09T05:15:11.770",
"lastModified": "2024-11-21T06:11:02.993",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -574,7 +574,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-cmd-inj-wbZKvPxc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34723.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34723.json
index 988fddf30e6..415b182b18f 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34723.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34723.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34723",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:18.427",
"lastModified": "2024-11-21T06:11:03.147",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -299,7 +299,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxesdwan-arbfileov-MVOF3ZZn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34724.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34724.json
index 14c28e7ee3a..7a413f0c27f 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34724.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34724.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34724",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:18.813",
"lastModified": "2024-11-21T06:11:03.303",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -374,7 +374,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxesdwan-privesc-VP4FG3jD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34725.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34725.json
index 6277ab80c62..a0b62475097 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34725.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34725.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34725",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:19.093",
"lastModified": "2024-11-21T06:11:03.450",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -374,7 +374,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-maapi-privesc-KSUg7QSS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34726.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34726.json
index 5a83b2648c0..e5ca9292466 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34726.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34726.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34726",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:19.320",
"lastModified": "2024-11-21T06:11:03.590",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -164,7 +164,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-maapi-cmdinjec-znUYTuC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34727.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34727.json
index d7adb1f1c1b..7e08c46e366 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34727.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34727.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34727",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:19.500",
"lastModified": "2024-11-21T06:11:03.730",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -373,7 +373,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxesdwan-rbuffover-vE2OB6tp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34728.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34728.json
index 5f8d4f16455..f40f13cfcef 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34728.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34728.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34728",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-09T05:15:11.870",
"lastModified": "2024-11-21T06:11:03.867",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -606,7 +606,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-privescal-dZYMrKf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34729.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34729.json
index 66b16a9a773..725342b7644 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34729.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34729.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34729",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:19.837",
"lastModified": "2024-11-21T06:11:04.023",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxesdwan-clicmdinj-7bYX5k3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34730.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34730.json
index f16b1ce78bd..62261c6bf88 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34730.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34730.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34730",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-18T20:15:07.447",
"lastModified": "2024-11-21T06:11:04.170",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -234,7 +234,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-sb-rv-overflow-htpymMB5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34731.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34731.json
index 366634abf66..afc1f386c9d 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34731.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34731.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34731",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:08.500",
"lastModified": "2024-11-21T06:11:04.317",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpar-strd-xss-A4DCVETG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34732.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34732.json
index 6cbf6daf643..8e690bb7c80 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34732.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34732.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34732",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-02T03:15:06.580",
"lastModified": "2024-11-21T06:11:04.443",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-prime-collab-xss-fQMDE5GO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34733.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34733.json
index d4b1f13c2b3..6493abc39b7 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34733.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34733.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34733",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-02T03:15:06.637",
"lastModified": "2024-11-21T06:11:04.580",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-prime-info-disc-nTU9FJ2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34734.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34734.json
index 52bc09b17e9..6854165d090 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34734.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34734.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34734",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-18T20:15:07.597",
"lastModified": "2024-11-21T06:11:04.717",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-dos-OFP7j9j",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34735.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34735.json
index 75c8e4025df..4a99fdb194f 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34735.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34735.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34735",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:09.863",
"lastModified": "2024-11-21T06:11:04.843",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -192,7 +192,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-A4J57F3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34736.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34736.json
index 52b62217c59..73d87200b93 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34736.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34736.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34736",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-21T03:15:06.890",
"lastModified": "2024-11-21T06:11:04.973",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -274,7 +274,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imc-gui-dos-TZjrFyZh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34737.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34737.json
index ee2a781a662..d74bb66f346 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34737.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34737.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34737",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-09T05:15:11.963",
"lastModified": "2024-11-21T06:11:05.107",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -471,7 +471,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dhcp-dos-pjPVReLU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34738.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34738.json
index d3b4ea02ea4..5c46e6fa68d 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34738.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34738.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34738",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-21T03:15:06.940",
"lastModified": "2024-11-21T06:11:05.257",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -247,7 +247,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss1-rgxYry2V",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34739.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34739.json
index be77c4994c1..65775b1b61e 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34739.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34739.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34739",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:08.577",
"lastModified": "2024-11-21T06:11:05.400",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -5939,7 +5939,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34740.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34740.json
index 1c54c495c69..3ac3cc11100 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34740.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34740.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34740",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:19.947",
"lastModified": "2024-11-21T06:11:05.760",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -495,7 +495,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-wpa-pktleak-dos-uSTyGrL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34741.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34741.json
index 359f48bc638..1aedfab25b1 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34741.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34741.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34741",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:08.660",
"lastModified": "2024-11-21T06:11:05.927",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -199,7 +199,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-JOm9ETfO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34742.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34742.json
index 8e6ebf77e63..f47117328f8 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34742.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34742.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34742",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:10.130",
"lastModified": "2024-11-21T06:11:06.070",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvdsd-xss-fvdj6HK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34743.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34743.json
index 10c638022d3..6319969eac9 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34743.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34743.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34743",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-21T03:15:06.987",
"lastModified": "2024-11-21T06:11:06.200",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-2FmKd7T",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34744.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34744.json
index 6f9ed6b7ff7..6eabeb59245 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34744.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34744.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34744",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:10.393",
"lastModified": "2024-11-21T06:11:06.340",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -559,7 +559,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-hardcoded-cred-MJCEXvX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34745.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34745.json
index a7e0b98a5dc..8c19e064edb 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34745.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34745.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34745",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-18T20:15:07.747",
"lastModified": "2024-11-21T06:11:06.493",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+AppDynamics+.NET+Agent+Privilege+Escalation+Vulnerability",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34746.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34746.json
index d60f92c20d4..798252fc536 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34746.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34746.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34746",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-02T03:15:06.687",
"lastModified": "2024-11-21T06:11:06.627",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-gqx8-c4xr-c664",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-g2DMVVh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34748.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34748.json
index 101cc7f0e2a..2a008216055 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34748.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34748.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34748",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:10.670",
"lastModified": "2024-11-21T06:11:06.760",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsi2-command-inject-CGyC8y2R",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34749.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34749.json
index 6d17a18c0f1..752c8457034 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34749.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34749.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34749",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-08-18T20:15:07.930",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,11 +151,11 @@
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sni-data-exfil-mFgzXqLN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
@@ -163,7 +163,7 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5354",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34750.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34750.json
index b6054422d13..5d0033bc6c7 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34750.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34750.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34750",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:09.657",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-Ft2WVmNU",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34751.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34751.json
index f12da81230f..e1b1fa35aca 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34751.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34751.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34751",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:09.883",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-Ft2WVmNU",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34752.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34752.json
index 5c2523dd91b..0f2b045251d 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34752.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34752.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34752",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:10.097",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-cmdinject-FmzsLN8",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34753.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34753.json
index bdd811e01c5..3a91fe109a2 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34753.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34753.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34753",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:10.303",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-enip-bypass-eFsxd8KP",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34754.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34754.json
index 94f22413aa7..754f397883f 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34754.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34754.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34754",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:07.820",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -174,7 +174,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-enip-bypass-eFsxd8KP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34755.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34755.json
index 41760ae8988..cde3f098c52 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34755.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34755.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34755",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:07.883",
"lastModified": "2024-11-21T06:11:07.580",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-cmdinject-FmzsLN8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34756.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34756.json
index fd9206acddb..46c916f49e3 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34756.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34756.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34756",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:07.940",
"lastModified": "2024-11-21T06:11:07.717",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -269,7 +269,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-cmdinject-FmzsLN8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34757.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34757.json
index c3b3b2a8b43..9e07b796d72 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34757.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34757.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34757",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:10.947",
"lastModified": "2024-11-21T06:11:07.857",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -559,7 +559,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-hardcoded-cred-MJCEXvX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34758.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34758.json
index 6194e99032c..ef06b5dc344 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34758.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34758.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34758",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:12.590",
"lastModified": "2024-11-21T06:11:08.020",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tpce-rmos-mem-dos-rck56tT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34759.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34759.json
index 12088a9e99b..2ec1ec59ae4 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34759.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34759.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34759",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-02T03:15:06.743",
"lastModified": "2024-11-21T06:11:08.153",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -407,7 +407,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-4HnZFewr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34760.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34760.json
index 24132287cd9..7106b9a36a4 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34760.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34760.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34760",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-21T03:15:07.037",
"lastModified": "2024-11-21T06:11:08.317",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-xss-CwjZJSQc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34761.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34761.json
index d2bcafa1598..09b99207db4 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34761.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34761.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34761",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.003",
"lastModified": "2024-11-21T06:11:08.453",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-file-write-SHVcmQVc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34762.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34762.json
index 11e911e3eb5..9d7946d9e11 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34762.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34762.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34762",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.060",
"lastModified": "2024-11-21T06:11:08.593",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -238,7 +238,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dir-traversal-95UyW5tk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34763.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34763.json
index 390fa1581d4..4c66df67300 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34763.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34763.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34763",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.120",
"lastModified": "2024-11-21T06:11:08.737",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-openredir-TVPMWJyg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34764.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34764.json
index c50e8a06dbe..3cd3745a96c 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34764.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34764.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34764",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.177",
"lastModified": "2024-11-21T06:11:08.880",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -255,7 +255,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-openredir-TVPMWJyg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34765.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34765.json
index 068bc6eae5f..7722ee63a66 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34765.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34765.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34765",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-02T03:15:06.793",
"lastModified": "2024-11-21T06:11:09.010",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-insight-infodis-2By2ZpBB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34766.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34766.json
index 85256b046b9..68b906ef123 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34766.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34766.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34766",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:13.287",
"lastModified": "2024-11-21T06:11:09.140",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssm-priv-esc-5g35cdDJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34767.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34767.json
index f43bc2bc465..5e4e8f14448 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34767.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34767.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34767",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:20.180",
"lastModified": "2024-11-21T06:11:09.273",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -633,7 +633,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-ipv6-dos-NMYeCnZv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34768.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34768.json
index 93976f86468..dca260e58d0 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34768.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34768.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34768",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:20.380",
"lastModified": "2024-11-21T06:11:09.420",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -213,7 +213,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-capwap-dos-gmNjdKOY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34769.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34769.json
index f473d713f71..b5f175d2c34 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34769.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34769.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34769",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:20.597",
"lastModified": "2024-11-21T06:11:09.563",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -213,7 +213,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-capwap-dos-gmNjdKOY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34770.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34770.json
index 23715e47b67..778a7e279b0 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34770.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34770.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34770",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-23T03:15:20.713",
"lastModified": "2024-11-21T06:11:09.703",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -323,7 +323,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-capwap-rce-LYgj8Kf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34771.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34771.json
index ca452515eac..0243cc44caa 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34771.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34771.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34771",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-09T05:15:12.113",
"lastModified": "2024-11-21T06:11:09.843",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-infodisc-CjLdGMc5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34772.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34772.json
index c743da24dad..1ac40eaae05 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34772.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34772.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34772",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:13.757",
"lastModified": "2024-11-21T06:11:09.973",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-redirect-rQ2Bu7dU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34773.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34773.json
index d7efe0448b2..51afa9ca4f7 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34773.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34773.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34773",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:08.730",
"lastModified": "2024-11-21T06:11:10.097",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-csrf-xrTkDu3H",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34774.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34774.json
index 93209ac2066..0c53e8794e2 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34774.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34774.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34774",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:08.810",
"lastModified": "2024-11-21T06:11:10.223",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-info-disc-KM3bGVL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34775.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34775.json
index 840e3f3f099..49f0a0e40a3 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34775.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34775.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34775",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:14.447",
"lastModified": "2024-11-21T06:11:10.350",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -559,7 +559,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34776.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34776.json
index dbceec0680b..e5f781c954f 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34776.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34776.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34776",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:14.733",
"lastModified": "2024-11-21T06:11:10.490",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -559,7 +559,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34777.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34777.json
index 2062deb31b7..0a81c2248f7 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34777.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34777.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34777",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:15.090",
"lastModified": "2024-11-21T06:11:10.650",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -559,7 +559,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34778.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34778.json
index 1ee75c9dc86..24791876b36 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34778.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34778.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34778",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:15.833",
"lastModified": "2024-11-21T06:11:10.847",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -559,7 +559,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34779.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34779.json
index 366a83f0057..80ed554b713 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34779.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34779.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34779",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:16.710",
"lastModified": "2024-11-21T06:11:10.997",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -559,7 +559,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34780.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34780.json
index 4af30d358a8..805bff09c01 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34780.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34780.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34780",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:17.950",
"lastModified": "2024-11-21T06:11:11.140",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -559,7 +559,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34781.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34781.json
index 0f882d2951c..9fb96d11c1f 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34781.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34781.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34781",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.233",
"lastModified": "2024-11-21T06:11:11.290",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -229,7 +229,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-rUDseW3r",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34782.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34782.json
index ec4e1e5a0e0..90c821a962a 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34782.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34782.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34782",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:18.677",
"lastModified": "2024-11-21T06:11:11.420",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-infodisc-KyC6YncS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34783.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34783.json
index 8a10a9a3c3d..ad94c092759 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34783.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34783.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34783",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.290",
"lastModified": "2024-11-21T06:11:11.547",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -440,7 +440,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-decrypt-dos-BMxYjm8M",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34784.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34784.json
index 273a8ad0fce..401d877d6fd 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34784.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34784.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34784",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:08.977",
"lastModified": "2024-11-21T06:11:11.693",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-xss-U2JK537j",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34785.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34785.json
index 33861a6420c..30f4d4ca235 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34785.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34785.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34785",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-09T05:15:12.277",
"lastModified": "2024-11-21T06:11:11.833",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -142,7 +142,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-dJ9JT67N",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34786.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34786.json
index c4619ba4fa8..9420f96df47 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34786.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34786.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34786",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-09-09T05:15:12.477",
"lastModified": "2024-11-21T06:11:11.963",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -142,7 +142,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-dJ9JT67N",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34787.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34787.json
index 801969d8066..1cf321fdab9 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34787.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34787.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34787",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.347",
"lastModified": "2024-11-21T06:11:12.123",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -438,7 +438,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-rule-bypass-ejjOgQEY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34788.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34788.json
index 4fffd5d9d91..f381f7c5524 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34788.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34788.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34788",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-06T20:15:19.173",
"lastModified": "2024-11-21T06:11:12.287",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -144,7 +144,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-lib-hija-cAFB7x4q",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34789.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34789.json
index ff87a3b94f2..5814e8a2066 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34789.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34789.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34789",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-21T03:15:07.083",
"lastModified": "2024-11-21T06:11:12.430",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sec-work-xss-t6SYtu8Q",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34790.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34790.json
index 27c5cd59e22..e25b141331b 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34790.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34790.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34790",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.400",
"lastModified": "2024-11-21T06:11:12.577",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -424,7 +424,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-natalg-bypass-cpKGqkng",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34791.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34791.json
index 67316aa7f19..407f4451d43 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34791.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34791.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34791",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.457",
"lastModified": "2024-11-21T06:11:12.753",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -424,7 +424,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-natalg-bypass-cpKGqkng",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34792.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34792.json
index c4c50b2fbf7..a09cd14e7c4 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34792.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34792.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34792",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.510",
"lastModified": "2024-11-21T06:11:12.907",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -520,7 +520,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dos-Unk689XY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34793.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34793.json
index bb0d55b9dd2..0425270afe9 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34793.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34793.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34793",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.563",
"lastModified": "2024-11-21T06:11:13.063",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -391,7 +391,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dos-JxYWMJyL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34794.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34794.json
index 123765c5deb..57dff3efb5a 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34794.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34794.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34794",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.613",
"lastModified": "2024-11-21T06:11:13.217",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -452,7 +452,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-snmpaccess-M6yOweq3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34795.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34795.json
index 140c821a9af..d42be7e72ea 100644
--- a/CVE-2021/CVE-2021-347xx/CVE-2021-34795.json
+++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34795.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-34795",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:09.053",
"lastModified": "2024-11-21T06:11:13.380",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catpon-multivulns-CE3DSYGr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40112.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40112.json
index 360344db761..c98dc129500 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40112.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40112.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40112",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:09.140",
"lastModified": "2024-11-21T06:23:35.620",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catpon-multivulns-CE3DSYGr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40113.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40113.json
index ec589576ae9..545f619bc07 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40113.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40113.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40113",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:09.217",
"lastModified": "2024-11-21T06:23:35.777",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catpon-multivulns-CE3DSYGr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40114.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40114.json
index 9ea0a7c9e4c..987987e72d4 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40114.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40114.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40114",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.667",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -199,18 +199,18 @@
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-s2R7W9UU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5354",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html",
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40115.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40115.json
index f53f3024982..09d80e5befb 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40115.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40115.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40115",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:09.287",
"lastModified": "2024-11-21T06:23:36.070",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,7 +132,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-videomesh-xss-qjm2BDQf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40116.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40116.json
index 1390d1ee4e9..61b292cf294 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40116.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40116.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40116",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.717",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -171,7 +171,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-RywH7ezM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40117.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40117.json
index 094080c4639..21b950364ad 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40117.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40117.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40117",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.770",
"lastModified": "2024-11-21T06:23:36.370",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -445,7 +445,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dos-4ygzLKU9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40118.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40118.json
index bc1366d1057..2763351dcd8 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40118.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40118.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40118",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.823",
"lastModified": "2024-11-21T06:23:36.533",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -558,7 +558,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asafdt-webvpn-dos-KSqJAKPA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40119.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40119.json
index addfd816078..65bdec655ac 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40119.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40119.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40119",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:09.360",
"lastModified": "2024-11-21T06:23:36.720",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cps-static-key-JmS92hNv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40120.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40120.json
index d620c18e0f7..31bf269a83d 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40120.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40120.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40120",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:09.430",
"lastModified": "2024-11-21T06:23:36.870",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -178,7 +178,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbrv-cmdinjection-Z5cWFdK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40121.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40121.json
index d1e732751fc..76632a55759 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40121.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40121.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40121",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-21T03:15:07.223",
"lastModified": "2024-11-21T06:23:37.020",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -252,7 +252,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss1-rgxYry2V",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40122.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40122.json
index 30a1b134019..0ca66cb92d2 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40122.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40122.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40122",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-21T03:15:07.270",
"lastModified": "2024-11-21T06:23:37.180",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -134,7 +134,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cms-LAHe8z5v",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40123.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40123.json
index e5139f58860..f3249e25595 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40123.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40123.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40123",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-21T03:15:07.317",
"lastModified": "2024-11-21T06:23:37.337",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -247,7 +247,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-download-B3BR5KQA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40124.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40124.json
index 5c88be2b339..efbe9796c1b 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40124.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40124.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40124",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:09.503",
"lastModified": "2024-11-21T06:23:37.490",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-nam-priv-yCsRNUGT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40125.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40125.json
index f97671db980..4ec0fe52fa6 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40125.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40125.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40125",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-10-27T19:15:08.877",
"lastModified": "2024-11-21T06:23:37.697",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -399,7 +399,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-g4cmrr7C",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40126.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40126.json
index 5fc5db9868d..0fdccff6ca1 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40126.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40126.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40126",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:09.577",
"lastModified": "2024-11-21T06:23:37.870",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-user-enum-S7XfJwDE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40127.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40127.json
index d63a7b4b090..69792f625de 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40127.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40127.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40127",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:09.643",
"lastModified": "2024-11-21T06:23:38.027",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1893,7 +1893,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-web-dos-xMyFFkt8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40128.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40128.json
index 38ee39be7c3..e0493ca8adb 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40128.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40128.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40128",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-04T16:15:09.717",
"lastModified": "2024-11-21T06:23:38.237",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-activation-3sdNFxcy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40129.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40129.json
index 90a347acec0..d6021ffad74 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40129.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40129.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40129",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-19T00:15:07.673",
"lastModified": "2024-11-21T06:23:38.390",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CSPC-SQLI-unVPTn5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40130.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40130.json
index fbb22980f8a..555ca60c6dc 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40130.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40130.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40130",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-19T00:15:07.883",
"lastModified": "2024-11-21T06:23:38.547",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CSPC-ILR-8qmW8y8X",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-401xx/CVE-2021-40131.json b/CVE-2021/CVE-2021-401xx/CVE-2021-40131.json
index f16a3c98e91..4be2658d3cd 100644
--- a/CVE-2021/CVE-2021-401xx/CVE-2021-40131.json
+++ b/CVE-2021/CVE-2021-401xx/CVE-2021-40131.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2021-40131",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2021-11-19T00:15:07.950",
"lastModified": "2024-11-21T06:23:38.703",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CSPC-XSS-KjrNbM3p",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47183.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47183.json
index 93336186e99..9859fc0ef3b 100644
--- a/CVE-2021/CVE-2021-471xx/CVE-2021-47183.json
+++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47183.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-10T19:15:47.287",
"lastModified": "2024-11-21T06:35:34.553",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20622.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20622.json
index 2177534810e..aa9562f852a 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20622.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20622.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20622",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.247",
"lastModified": "2024-11-21T06:43:10.777",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ip-flood-dos-6hxxENVQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20623.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20623.json
index 1dcc0c6863a..5f890892960 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20623.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20623.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20623",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-23T18:15:18.507",
"lastModified": "2024-11-21T06:43:10.913",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -316,7 +316,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bfd-dos-wGQXrzxn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20624.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20624.json
index c55dd934d13..bfcd9fcbf25 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20624.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20624.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20624",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-23T18:15:18.577",
"lastModified": "2024-11-21T06:43:11.060",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -385,7 +385,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cfsoip-dos-tpykyDr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20625.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20625.json
index e1fdd1b8f02..65a01034fd6 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20625.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20625.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20625",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-23T18:15:18.637",
"lastModified": "2024-11-21T06:43:11.237",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -808,7 +808,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdp-dos-G8DPLWYG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20626.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20626.json
index d1d101b8ba6..cef932fc1fd 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20626.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20626.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20626",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:19.287",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-prime-reg-xss-zLOz8PfB",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20627.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20627.json
index 57e7575d645..7177418717d 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20627.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20627.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20627",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:08.753",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20628.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20628.json
index 9af020db5a6..f10ab1f216f 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20628.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20628.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20628",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:08.860",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20629.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20629.json
index 6d0a4f3c5c5..64d42c57933 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20629.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20629.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20629",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:08.933",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20630.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20630.json
index 70b8b0855ca..196574a80c8 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20630.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20630.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20630",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:08.860",
"lastModified": "2024-11-21T06:43:11.887",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-info-disc-8QEynKEj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20631.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20631.json
index ef1b9bdcea5..92f253e5155 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20631.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20631.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20631",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:19.527",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20632.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20632.json
index 06ad95231fe..38f3a665f37 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20632.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20632.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20632",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:10.583",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20633.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20633.json
index 3599479517c..1ef662fe362 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20633.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20633.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20633",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:10.820",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20634.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20634.json
index 357462b9a55..e60917acd1f 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20634.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20634.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20634",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:19.747",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20635.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20635.json
index 74fe96aaff4..02427d87c53 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20635.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20635.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20635",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:10.123",
"lastModified": "2024-11-21T06:43:12.353",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20636.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20636.json
index 48a2aa9d46d..375bdf0627b 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20636.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20636.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20636",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:10.227",
"lastModified": "2024-11-21T06:43:12.483",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20637.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20637.json
index f462322dfe2..f7142e79d37 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20637.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20637.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20637",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:10.297",
"lastModified": "2024-11-21T06:43:12.610",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20638.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20638.json
index 0e44c10ae84..bdd145a05fb 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20638.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20638.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20638",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:10.360",
"lastModified": "2024-11-21T06:43:12.737",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20639.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20639.json
index ad5cdd23c6a..fb8f36bbc4e 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20639.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20639.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20639",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:10.430",
"lastModified": "2024-11-21T06:43:12.867",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20640.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20640.json
index c18b9653859..d26a8ad0fc7 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20640.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20640.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20640",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:10.493",
"lastModified": "2024-11-21T06:43:13.000",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20641.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20641.json
index 63a67646c9d..e3142bcf5d6 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20641.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20641.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20641",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:10.560",
"lastModified": "2024-11-21T06:43:13.130",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20642.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20642.json
index 2eae47613dd..915f23c62c1 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20642.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20642.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20642",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:10.623",
"lastModified": "2024-11-21T06:43:13.267",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20643.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20643.json
index 8827f787501..afbee46dbaf 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20643.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20643.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20643",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:10.687",
"lastModified": "2024-11-21T06:43:13.390",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20644.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20644.json
index ea30fcd75ce..4b4193421b7 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20644.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20644.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20644",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:10.747",
"lastModified": "2024-11-21T06:43:13.517",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20645.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20645.json
index 9032ac6d0a1..f5591e52e7d 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20645.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20645.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20645",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:10.813",
"lastModified": "2024-11-21T06:43:13.650",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20646.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20646.json
index 2463099d698..d4068e47a26 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20646.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20646.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20646",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:10.877",
"lastModified": "2024-11-21T06:43:13.790",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20647.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20647.json
index a04cccb737a..02bbccf9c9d 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20647.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20647.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20647",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:10.940",
"lastModified": "2024-11-21T06:43:13.933",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20648.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20648.json
index a24984b20b1..a130b4dbcc9 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20648.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20648.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20648",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:19.983",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-vuls-7cS3Nuq",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tetr-cmd-injc-skrwGO",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-FmbPu2pe",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20649.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20649.json
index c471df04c26..ac124882504 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20649.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20649.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20649",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:20.247",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-vuls-7cS3Nuq",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tetr-cmd-injc-skrwGO",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-FmbPu2pe",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20650.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20650.json
index ce023cf6795..f3e3ecf3842 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20650.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20650.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20650",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-23T18:15:18.690",
"lastModified": "2024-11-21T06:43:14.530",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -480,7 +480,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-cmdinject-ULukNMZ2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20651.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20651.json
index 654467f899c..b054530b21a 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20651.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20651.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20651",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-06-22T14:15:07.877",
"lastModified": "2024-11-21T06:43:14.690",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,14 +128,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asdm-logging-jnLOY422",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.rapid7.com/blog/post/2022/08/11/rapid7-discovered-vulnerabilities-in-cisco-asa-asdm-and-firepower-services-software/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20652.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20652.json
index 72f3966b081..24c1a1f252b 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20652.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20652.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20652",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:20.520",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tetr-cmd-injc-skrwGO",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-FmbPu2pe",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20653.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20653.json
index 2260cb5ebb4..3988ea8e715 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20653.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20653.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20653",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-17T15:15:09.377",
"lastModified": "2024-11-21T06:43:14.950",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-MxZvGtgU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20654.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20654.json
index 8118e3c8f5f..5120207c592 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20654.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20654.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20654",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:20.767",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-FmbPu2pe",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20655.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20655.json
index de797769a49..adc3fe501d3 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20655.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20655.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20655",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:20.987",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20656.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20656.json
index 64aef0b70cf..47181e8c6d6 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20656.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20656.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20656",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:21.237",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-path-trav-zws324yn",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-xss-NXOxDhRQ",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20657.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20657.json
index 5449603c41c..1d781efc3a4 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20657.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20657.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20657",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:21.473",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-path-trav-zws324yn",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20658.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20658.json
index 67864826e3d..807f5efcb1c 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20658.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20658.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20658",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:11.003",
"lastModified": "2024-11-21T06:43:15.440",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -137,7 +137,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccmp-priv-esc-JzhTFLm4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20659.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20659.json
index 416f1b8a70d..93bfdc32dfd 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20659.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20659.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20659",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-17T15:15:09.453",
"lastModified": "2024-11-21T06:43:15.567",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-xss-P8fBz2FW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20660.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20660.json
index 1992fef5ee8..5469bc7124b 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20660.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20660.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20660",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T05:15:11.083",
"lastModified": "2024-11-21T06:43:15.693",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -666,7 +666,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -675,7 +675,7 @@
},
{
"url": "http://seclists.org/fulldisclosure/2022/Jan/34",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -683,7 +683,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-info-disc-fRdJfOxA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20661.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20661.json
index 0ca4eea4c5a..8f19375b01d 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20661.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20661.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20661",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.300",
"lastModified": "2024-11-21T06:43:15.880",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -189,7 +189,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdb-cmicr-vulns-KJjFtNb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20662.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20662.json
index 311b05c6daa..8e72e0add80 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20662.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20662.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20662",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:10.437",
"lastModified": "2024-11-21T06:43:16.010",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-macOS-bypass-uKZNpXE6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20663.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20663.json
index 86ac0cb38dd..d1f9608f769 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20663.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20663.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20663",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:21.693",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-xss-NXOxDhRQ",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20664.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20664.json
index aabedcefb3a..d79e627383e 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20664.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20664.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20664",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-06-15T18:15:08.690",
"lastModified": "2024-11-21T06:43:16.190",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -140,7 +140,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasma-info-dsc-Q9tLuOvM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20665.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20665.json
index b88fdb0200a..b5c8342fa8f 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20665.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20665.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20665",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-06T19:15:07.947",
"lastModified": "2024-11-21T06:43:16.323",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -156,7 +156,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-cmdinj-759mNT4n",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20666.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20666.json
index 9858f7e9647..c01e346f7ef 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20666.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20666.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20666",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-27T14:15:08.137",
"lastModified": "2024-11-21T06:43:16.457",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20667.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20667.json
index e1a2fd47f65..26d52588244 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20667.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20667.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20667",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-27T14:15:08.207",
"lastModified": "2024-11-21T06:43:16.583",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20668.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20668.json
index 40f83fcd473..390b07634ca 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20668.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20668.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20668",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-27T14:15:08.260",
"lastModified": "2024-11-21T06:43:16.710",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20669.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20669.json
index e3276bfac4e..4aabc51bd2d 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20669.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20669.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20669",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-27T14:15:08.317",
"lastModified": "2024-11-21T06:43:16.840",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20670.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20670.json
index a4fb5b7e4ae..e234500a96e 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20670.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20670.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20670",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-27T14:15:08.370",
"lastModified": "2024-11-21T06:43:16.970",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20671.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20671.json
index 4f458a45586..04fc3d2bf4a 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20671.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20671.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20671",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-27T14:15:08.417",
"lastModified": "2024-11-21T06:43:17.100",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20672.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20672.json
index 3cff1e281c7..6827b53cf5c 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20672.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20672.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20672",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-27T14:15:08.467",
"lastModified": "2024-11-21T06:43:17.227",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20673.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20673.json
index fdc854a6010..1234d55a137 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20673.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20673.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20673",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-27T14:15:08.517",
"lastModified": "2024-11-21T06:43:17.370",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20674.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20674.json
index 124ef2dc2a0..d46cedc9b87 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20674.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20674.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20674",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-27T14:15:08.567",
"lastModified": "2024-11-21T06:43:17.503",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20675.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20675.json
index 0c5396e11f9..42cafbda2c8 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20675.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20675.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20675",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-06T19:15:08.007",
"lastModified": "2024-11-21T06:43:17.637",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -198,7 +198,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-SNMP-JLAJksWK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20676.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20676.json
index fa48f5ebf73..6a0d7cd4fe3 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20676.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20676.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20676",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.353",
"lastModified": "2024-11-21T06:43:17.770",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -266,7 +266,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-grbtubU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20677.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20677.json
index d676770e3fb..fa62d08e2bc 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20677.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20677.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20677",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.413",
"lastModified": "2024-11-21T06:43:17.923",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -438,7 +438,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20678.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20678.json
index e58fc23918a..eeaa6ae1aa3 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20678.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20678.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20678",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.467",
"lastModified": "2024-11-21T06:43:18.097",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -268,7 +268,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appnav-xe-dos-j5MXTR4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20679.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20679.json
index 2030c71f5f0..e3551654e0a 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20679.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20679.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20679",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.513",
"lastModified": "2024-11-21T06:43:18.257",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -666,7 +666,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qfp-ipsec-GQmqvtqV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20680.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20680.json
index e20dceeb8d8..050408d8267 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20680.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20680.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20680",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:08.927",
"lastModified": "2024-11-21T06:43:18.450",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -207,7 +207,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpsc-info-disc-zkJBDJ9F",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20681.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20681.json
index 5d689d64b6c..044aebb0b40 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20681.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20681.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20681",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.567",
"lastModified": "2024-11-21T06:43:18.603",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -456,7 +456,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-priv-esc-ybvHKO5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20682.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20682.json
index cc057d97fe5..0880a46c61a 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20682.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20682.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20682",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.617",
"lastModified": "2024-11-21T06:43:18.730",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -431,7 +431,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9800-capwap-mdns-6PSn7gKU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20683.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20683.json
index ced0e82077f..4156ba26860 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20683.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20683.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20683",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.667",
"lastModified": "2024-11-21T06:43:18.867",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -626,7 +626,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9800-fnf-dos-bOL5vLge",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20684.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20684.json
index 7e10cce1858..4101827f389 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20684.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20684.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20684",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.720",
"lastModified": "2024-11-21T06:43:19.027",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -571,7 +571,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9800-snmp-trap-dos-mjent3Ey",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json
index 19a7242963d..d421e32a647 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20685",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:21.910",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-xss-NXOxDhRQ",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20686.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20686.json
index dd9b02136d6..f8a8873c361 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20686.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20686.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20686",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-12-12T09:15:12.197",
"lastModified": "2024-11-21T06:43:19.270",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -222,7 +222,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs",
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20687.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20687.json
index 1b3ed959831..3e38b218247 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20687.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20687.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20687",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-12-12T09:15:12.280",
"lastModified": "2024-11-21T06:43:19.417",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -222,7 +222,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs",
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20688.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20688.json
index 7b8d2648ac6..ad087c3999c 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20688.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20688.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20688",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-12-12T09:15:12.347",
"lastModified": "2024-11-21T06:43:19.557",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -222,7 +222,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs",
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20689.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20689.json
index e21692cfc6b..c39811560f6 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20689.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20689.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20689",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-12-12T09:15:12.410",
"lastModified": "2024-11-21T06:43:19.697",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -222,7 +222,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs",
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20690.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20690.json
index 8d83f19991b..140c80945f9 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20690.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20690.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20690",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-12-12T09:15:12.477",
"lastModified": "2024-11-21T06:43:19.847",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -222,7 +222,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs",
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20691.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20691.json
index 8880d5c87b5..53dd34ba952 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20691.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20691.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20691",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-12-12T09:15:12.543",
"lastModified": "2024-11-21T06:43:20.013",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -222,7 +222,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs",
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20692.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20692.json
index 5b80f82e8e1..0a441a1aba2 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20692.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20692.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20692",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.770",
"lastModified": "2024-11-21T06:43:20.157",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -756,7 +756,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ncossh-dos-ZAkfOdq8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20693.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20693.json
index f1eb49bf4a8..ecc8c283a5e 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20693.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20693.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20693",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.823",
"lastModified": "2024-11-21T06:43:20.317",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -436,7 +436,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webuiapi-inj-Nyrq92Od",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20694.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20694.json
index 671ae7cdf3f..a37ac45117f 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20694.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20694.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20694",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.870",
"lastModified": "2024-11-21T06:43:20.463",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1291,7 +1291,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-rpki-dos-2EgCNeKE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20695.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20695.json
index 2d2944eb033..92d7e7afb33 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20695.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20695.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20695",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.917",
"lastModified": "2024-11-21T06:43:20.707",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -298,7 +298,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-auth-bypass-JRNhV4fF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20696.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20696.json
index e4ddb23c349..a5adb37b5ce 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20696.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20696.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20696",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-08T13:15:08.867",
"lastModified": "2024-11-21T06:43:20.890",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -109,7 +109,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-msg-serv-AqTup7vs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20697.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20697.json
index 7a8f209ee6e..71b9ff732d8 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20697.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20697.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20697",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:12.967",
"lastModified": "2024-11-21T06:43:21.053",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -266,7 +266,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-dos-svOdkdBS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20698.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20698.json
index 2a9f9d68dd5..f092185806c 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20698.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20698.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20698",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-01-14T06:15:09.570",
"lastModified": "2024-11-21T06:43:21.197",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -199,7 +199,7 @@
"references": [
{
"url": "https://blog.clamav.net/2022/01/clamav-01035-and-01042-security-patch.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Vendor Advisory"
@@ -207,7 +207,7 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-01",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://blog.clamav.net/2022/01/clamav-01035-and-01042-security-patch.html",
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20699.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20699.json
index 36c82cd7810..e603bdddef1 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20699.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20699.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20699",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:08.980",
"lastModified": "2024-11-21T06:43:21.340",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -90,7 +90,7 @@
"cisaVulnerabilityName": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -227,7 +227,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/167113/Cisco-RV340-SSL-VPN-Unauthenticated-Remote-Code-Execution.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
@@ -236,14 +236,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-414/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20700.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20700.json
index fbbcd1e6258..5f7efb8e66c 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20700.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20700.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20700",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.033",
"lastModified": "2024-11-21T06:43:21.503",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -90,7 +90,7 @@
"cisaVulnerabilityName": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -367,7 +367,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20701.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20701.json
index cbf6a3e246c..e66bdd08ada 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20701.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20701.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20701",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.087",
"lastModified": "2024-11-21T06:43:21.653",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -90,7 +90,7 @@
"cisaVulnerabilityName": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -227,14 +227,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-412/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20702.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20702.json
index e4071e64a97..ab89b96bbba 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20702.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20702.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20702",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.137",
"lastModified": "2024-11-21T06:43:21.797",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -363,14 +363,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-420/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20703.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20703.json
index ec53886a486..f4f61e1473d 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20703.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20703.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20703",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.197",
"lastModified": "2024-11-21T06:43:21.950",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -90,7 +90,7 @@
"cisaVulnerabilityName": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -367,14 +367,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-408/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -382,7 +382,7 @@
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-413/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20704.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20704.json
index c5bec010665..40ba90e0355 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20704.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20704.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20704",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.253",
"lastModified": "2024-11-21T06:43:22.110",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -363,14 +363,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-413/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20705.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20705.json
index fa6d04f1bc8..0121cc131ab 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20705.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20705.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20705",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.307",
"lastModified": "2024-11-21T06:43:22.260",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -363,18 +363,18 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-409/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -382,7 +382,7 @@
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-410/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -390,7 +390,7 @@
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-415/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20706.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20706.json
index 64022293b96..d92cbf2e30a 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20706.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20706.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20706",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.360",
"lastModified": "2024-11-21T06:43:22.427",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -363,14 +363,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-418/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20707.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20707.json
index 8062e505b75..9f373b965ae 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20707.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20707.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20707",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.413",
"lastModified": "2024-11-21T06:43:22.573",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,18 +223,18 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-409/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -242,7 +242,7 @@
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-411/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
@@ -250,7 +250,7 @@
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-419/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20708.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20708.json
index 66be911d402..1ebb4adba5e 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20708.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20708.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20708",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.467",
"lastModified": "2024-11-21T06:43:22.717",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -90,7 +90,7 @@
"cisaVulnerabilityName": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -227,14 +227,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-417/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20709.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20709.json
index 0f26b16353d..452c44e00ae 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20709.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20709.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20709",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.527",
"lastModified": "2024-11-21T06:43:22.863",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,14 +223,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-416/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20710.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20710.json
index de045708da7..a2c11f0d4bd 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20710.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20710.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20710",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.583",
"lastModified": "2024-11-21T06:43:23.000",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20711.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20711.json
index 3ea2638655d..9b80d76a628 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20711.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20711.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20711",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.637",
"lastModified": "2024-11-21T06:43:23.127",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,14 +223,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-416/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20712.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20712.json
index 92bf6cfa333..a2a2b431e1c 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20712.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20712.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20712",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.693",
"lastModified": "2024-11-21T06:43:23.267",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20713.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20713.json
index 3453f14fd15..207c7d4a314 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20713.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20713.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20713",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-10T17:15:08.423",
"lastModified": "2024-11-21T06:43:23.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1201,7 +1201,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-LOeKsNmO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20714.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20714.json
index 7cd015e5481..4b6650b4a0c 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20714.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20714.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20714",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.013",
"lastModified": "2024-11-21T06:43:23.640",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lsplus-Z6AQEOjk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20715.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20715.json
index a87bfac39d3..12fba2e80eb 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20715.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20715.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20715",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.000",
"lastModified": "2024-11-21T06:43:23.783",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -187,7 +187,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-dos-tL4uA4AA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20716.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20716.json
index bb6b151e1dd..986daac416a 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20716.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20716.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20716",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.063",
"lastModified": "2024-11-21T06:43:23.910",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -175,7 +175,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-file-access-VW36d28P",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20717.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20717.json
index 4533e6620ea..af343e9d111 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20717.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20717.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20717",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.113",
"lastModified": "2024-11-21T06:43:24.040",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -181,7 +181,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vedge-dos-jerVm4bB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20718.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20718.json
index 38887060644..32e2ad5233c 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20718.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20718.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20718",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.163",
"lastModified": "2024-11-21T06:43:24.177",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -816,7 +816,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-px2c-q384-5wxc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -824,7 +824,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20719.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20719.json
index 9b999985c83..6a24c0d5a09 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20719.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20719.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20719",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.213",
"lastModified": "2024-11-21T06:43:24.317",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -831,7 +831,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-8v5w-4fhm-gqxj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -839,7 +839,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20720.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20720.json
index 103c0f4a73d..3c436c88467 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20720.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20720.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20720",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.263",
"lastModified": "2024-11-21T06:43:24.490",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -831,14 +831,14 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-4qmq-rfw6-f2x2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20721.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20721.json
index c095a821c53..166d653d9ed 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20721.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20721.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20721",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.310",
"lastModified": "2024-11-21T06:43:24.647",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -831,14 +831,14 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-p3w5-w45c-c34x",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20722.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20722.json
index 187583f8250..7773f88d88e 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20722.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20722.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20722",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.360",
"lastModified": "2024-11-21T06:43:24.790",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -831,7 +831,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-2qx4-9cr7-gg38",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Third Party Advisory"
@@ -839,7 +839,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20723.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20723.json
index 86cff78e309..8ed164a932c 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20723.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20723.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20723",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.410",
"lastModified": "2024-11-21T06:43:24.940",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -831,7 +831,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-cq9c-3cwm-7j7q",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -839,7 +839,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20724.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20724.json
index cdd9b3d8ba7..abb60ee50a3 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20724.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20724.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20724",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.460",
"lastModified": "2024-11-21T06:43:25.090",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1191,7 +1191,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-xr7h-wjgg-h3rp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -1199,7 +1199,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20725.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20725.json
index 9416f0553cd..c2aa2a5b852 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20725.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20725.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20725",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.510",
"lastModified": "2024-11-21T06:43:25.270",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1518,14 +1518,14 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-q2v9-qpmg-4qc4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20726.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20726.json
index eac19a6fd9f..39b925af1fa 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20726.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20726.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20726",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.560",
"lastModified": "2024-11-21T06:43:25.447",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -416,7 +416,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20727.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20727.json
index 3a9f36a6d78..2b290d0fa1e 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20727.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20727.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20727",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.613",
"lastModified": "2024-11-21T06:43:25.583",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1194,7 +1194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20728.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20728.json
index f0670321639..2a40e4c3946 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20728.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20728.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20728",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:10.903",
"lastModified": "2024-11-21T06:43:25.730",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -788,7 +788,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apvlan-TDTtb4FY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20729.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20729.json
index 24897e6a098..58e540b700b 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20729.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20729.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20729",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.063",
"lastModified": "2024-11-21T06:43:25.883",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-xmlinj-8GWjGzKe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20730.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20730.json
index 776dd91b887..6e2a55613f4 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20730.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20730.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20730",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.120",
"lastModified": "2024-11-21T06:43:26.033",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-sidns-bypass-3PzA5pO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20731.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20731.json
index e83135d2c4e..eea52c04692 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20731.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20731.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20731",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.667",
"lastModified": "2024-11-21T06:43:26.173",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -144,7 +144,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdb-cmicr-vulns-KJjFtNb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20732.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20732.json
index 8dcb981f460..31982daaf74 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20732.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20732.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20732",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-21T19:15:08.230",
"lastModified": "2024-11-21T06:43:26.300",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vim-privesc-T2tsFUf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20733.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20733.json
index ffa0d8e33bd..789acd8f4f7 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20733.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20733.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20733",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-06-15T18:15:08.773",
"lastModified": "2024-11-21T06:43:26.423",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ISE-SAML-nuukMPf9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20734.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20734.json
index 2dc73bda885..3167cf16c9c 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20734.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20734.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20734",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-04T17:15:08.180",
"lastModified": "2024-11-21T06:43:26.540",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmge-infodc-WPSkAMhp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20735.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20735.json
index 76f022fb1ae..b76004ccb59 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20735.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20735.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20735",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.723",
"lastModified": "2024-11-21T06:43:26.663",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,7 +132,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-csrf-rxQL4tXR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20736.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20736.json
index c9f8bd44c50..417c3ab9d0b 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20736.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20736.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20736",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-06-15T18:15:08.857",
"lastModified": "2024-11-21T06:43:26.780",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-contrl-athzn-bp-BLypgsbu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20737.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20737.json
index 39b145869ec..8b6e2442aec 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20737.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20737.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20737",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.183",
"lastModified": "2024-11-21T06:43:26.900",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -155,7 +155,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-vpn-heap-zLX3FdX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20738.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20738.json
index f2ba35c4476..3307fa1a9cf 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20738.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20738.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20738",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.747",
"lastModified": "2024-11-21T06:43:27.023",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swg-fbyps-3z4qT7p",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20739.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20739.json
index 39d684f9a3e..b25a408a85f 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20739.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20739.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20739",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.777",
"lastModified": "2024-11-21T06:43:27.147",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,7 +132,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-vman-tEJFpBSL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20740.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20740.json
index 031125ef9b4..1f236f0536b 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20740.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20740.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20740",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.250",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-SfpEcvGT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20741.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20741.json
index 0f7fd058199..55c082c6998 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20741.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20741.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20741",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-06T19:15:08.063",
"lastModified": "2024-11-21T06:43:27.400",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-xss-mCA9tQnJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20742.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20742.json
index 89e264f733a..023859817a4 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20742.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20742.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20742",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.317",
"lastModified": "2024-11-21T06:43:27.517",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ipsec-mitm-CKnLr4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20743.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20743.json
index e8b380fd043..c96c7ce213a 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20743.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20743.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20743",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.377",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -148,7 +148,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-security-bypass-JhOd29Gg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20744.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20744.json
index 26b4394cd14..13428b9fa0e 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20744.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20744.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20744",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.437",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -88,7 +88,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infdisc-guJWRwQu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20745.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20745.json
index f9556fa268a..e2fd629d131 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20745.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20745.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20745",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.500",
"lastModified": "2024-11-21T06:43:27.910",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asafdt-webvpn-dos-tzPSYern",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20746.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20746.json
index c564bb003f5..da3924604c5 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20746.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20746.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20746",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.563",
"lastModified": "2024-11-21T06:43:28.040",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -146,7 +146,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tcp-dos-kM9SHhOu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20747.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20747.json
index 200d509dacb..e22b347035b 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20747.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20747.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20747",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.827",
"lastModified": "2024-11-21T06:43:28.160",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,7 +132,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-infodis-73sHJNEq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20748.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20748.json
index 853c2ee2ff7..a8611dc2241 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20748.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20748.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20748",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.627",
"lastModified": "2024-11-21T06:43:28.290",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-amp-local-dos-CUfwRJXT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20749.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20749.json
index 5c9300abcf1..20537366d18 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20749.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20749.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20749",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-10T18:15:09.807",
"lastModified": "2024-11-21T06:43:28.417",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20750.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20750.json
index cdeedc326e3..46db6ef79b5 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20750.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20750.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20750",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-02-17T15:15:09.517",
"lastModified": "2024-11-21T06:43:28.550",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-tcp-dos-2Wh8XjAQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20751.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20751.json
index fd62766f964..7fc41774296 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20751.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20751.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20751",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.700",
"lastModified": "2024-11-21T06:43:28.677",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -263,7 +263,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-snort-dos-hd2hFgM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20752.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20752.json
index e1cc660099b..c3c2f1aa59e 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20752.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20752.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20752",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-06T21:15:11.387",
"lastModified": "2024-11-21T06:43:28.820",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -163,7 +163,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-timing-JVbHECOK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20753.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20753.json
index cb8f55a3854..22cdb4bacf8 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20753.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20753.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20753",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-04T17:15:08.247",
"lastModified": "2024-11-21T06:43:28.957",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbrv-rce-OYLQbL9u",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20754.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20754.json
index 9554a45bf5e..a658c789247 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20754.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20754.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20754",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-06T19:15:08.120",
"lastModified": "2024-11-21T06:43:29.093",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20755.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20755.json
index e63fad01d6a..a69388df88d 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20755.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20755.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20755",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-06T19:15:08.173",
"lastModified": "2024-11-21T06:43:29.223",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20756.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20756.json
index 591e03e94f9..3bfd41e2b44 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20756.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20756.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20756",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-06T19:15:08.220",
"lastModified": "2024-11-21T06:43:29.350",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -201,7 +201,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-dos-JLh9TxBp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20757.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20757.json
index 9a38dc64379..d4a888bdf22 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20757.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20757.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20757",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.763",
"lastModified": "2024-11-21T06:43:29.483",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -146,7 +146,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-JnnJm4wB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20758.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20758.json
index 5bf16503a56..6c14402eda7 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20758.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20758.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20758",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.883",
"lastModified": "2024-11-21T06:43:29.620",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bgpevpn-zWTRtPBb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20759.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20759.json
index 321cd58501c..f763d02b261 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20759.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20759.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20759",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.827",
"lastModified": "2024-11-21T06:43:29.757",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-gq88-gqmj-7v24",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -188,7 +188,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-mgmt-privesc-BMFMUvye",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20760.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20760.json
index a54651c0642..d9f3e98eba4 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20760.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20760.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20760",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.893",
"lastModified": "2024-11-21T06:43:29.897",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dos-nJVAwOeq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20761.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20761.json
index 274e06c57c8..b5564e88cb4 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20761.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20761.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20761",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-15T15:15:13.933",
"lastModified": "2024-11-21T06:43:30.027",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -551,7 +551,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cgr1k-ap-dos-mSZR4QVh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20762.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20762.json
index 9f83e00add0..536fa645bb4 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20762.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20762.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20762",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-06T19:15:08.273",
"lastModified": "2024-11-21T06:43:30.183",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,7 +135,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccsmi-prvesc-BQHGe4cm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20763.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20763.json
index 715ae012810..0b7041dd185 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20763.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20763.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20763",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-06T19:15:08.327",
"lastModified": "2024-11-21T06:43:30.317",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-java-MVX6crH9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20764.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20764.json
index 2f1bee38663..94147256365 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20764.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20764.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20764",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-04T17:15:08.320",
"lastModified": "2024-11-21T06:43:30.457",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ROS-DOS-X7H7XhkK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20765.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20765.json
index 5f61161b5c3..69822bd5d14 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20765.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20765.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20765",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-27T14:15:08.620",
"lastModified": "2024-11-21T06:43:30.600",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-UCS-XSS-uQSME3L7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20766.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20766.json
index d15629b62ca..ed523727e9e 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20766.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20766.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20766",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:22.133",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20767.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20767.json
index 44d10a6cbb7..35dfedf1a6d 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20767.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20767.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20767",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-03T04:15:09.963",
"lastModified": "2024-11-21T06:43:30.843",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,7 +132,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FTD-snort3-DOS-Aq38LVdM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20768.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20768.json
index 7ee45fddb1e..c6612bfd297 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20768.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20768.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20768",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-06T21:15:11.447",
"lastModified": "2024-11-21T06:43:30.967",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-infodisc-YOTz9Ct7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20769.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20769.json
index bdfc7142313..5a2d193ca21 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20769.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20769.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20769",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:11.217",
"lastModified": "2024-11-21T06:43:31.107",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -144,7 +144,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-dos-mKGRrsCB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20770.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20770.json
index 1e6a00dff43..107900759c1 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20770.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20770.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20770",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-04T17:15:08.377",
"lastModified": "2024-11-21T06:43:31.263",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -216,7 +216,7 @@
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -224,23 +224,23 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://security.gentoo.org/glsa/202310-01",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-prVGcHLd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20771.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20771.json
index ab2c53102c0..d913b977d1d 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20771.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20771.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20771",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-04T17:15:08.440",
"lastModified": "2024-11-21T06:43:31.423",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -216,7 +216,7 @@
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -224,23 +224,23 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://security.gentoo.org/glsa/202310-01",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-ZAZBwRVG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20772.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20772.json
index 856328ba543..49bb2f9d563 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20772.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20772.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20772",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-04T18:15:10.843",
"lastModified": "2024-11-21T06:43:31.557",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -165,7 +165,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-HTTP-Inject-nvsycUmR",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-HTTP-Inject-nvsycUmR",
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20773.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20773.json
index e0bbb4b983c..239426d5340 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20773.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20773.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20773",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-21T19:15:08.290",
"lastModified": "2024-11-21T06:43:31.690",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uva-static-key-6RQTRs4c",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20774.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20774.json
index 63bdd7ddc06..f19b6da9c9f 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20774.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20774.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20774",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-06T19:15:08.377",
"lastModified": "2024-11-21T06:43:31.800",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -587,7 +587,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-csrf-K56vXvVx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20775.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20775.json
index 830ac1d66ca..497036b37d5 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20775.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20775.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20775",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:11.467",
"lastModified": "2024-11-21T06:43:31.933",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -584,7 +584,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -592,14 +592,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20776.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20776.json
index 96ee66a01c0..c07df295b4c 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20776.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20776.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20776",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-26T15:15:14.353",
"lastModified": "2024-11-21T06:43:32.110",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -108,7 +108,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-trav-beFvCcyu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20777.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20777.json
index b4cee8ffef4..98d3cd31be0 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20777.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20777.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20777",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-04T17:15:08.497",
"lastModified": "2024-11-21T06:43:32.237",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-v56f-9gq3-rx3g",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Mitigation",
@@ -136,7 +136,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-NFVIS-MUL-7DySRX9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20778.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20778.json
index 3e8e3b68fa8..980dce00750 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20778.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20778.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20778",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-21T19:15:08.350",
"lastModified": "2024-11-21T06:43:32.347",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-w47AMqAk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20779.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20779.json
index 2033d9f5a37..438f5cd8367 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20779.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20779.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20779",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-04T17:15:08.557",
"lastModified": "2024-11-21T06:43:32.460",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-77vw-2pmg-q492",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-NFVIS-MUL-7DySRX9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20780.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20780.json
index ae03136a33a..4228b29ee5a 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20780.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20780.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20780",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-04T17:15:08.620",
"lastModified": "2024-11-21T06:43:32.570",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-hrpq-384f-vrpg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -135,7 +135,7 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-NFVIS-MUL-7DySRX9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20781.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20781.json
index 2b6bc3e5928..781233e3b1f 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20781.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20781.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20781",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-06T19:15:08.430",
"lastModified": "2024-11-21T06:43:32.677",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -139,7 +139,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-stored-xss-XPsJghMY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20782.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20782.json
index 57aff69c47c..bf080606e6c 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20782.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20782.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20782",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-06T19:15:08.477",
"lastModified": "2024-11-21T06:43:32.787",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -236,7 +236,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-info-exp-YXAWYP3s",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20783.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20783.json
index bff6b72dd7e..ecd18de1fa1 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20783.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20783.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20783",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-21T19:15:08.410",
"lastModified": "2024-11-21T06:43:32.900",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -140,7 +140,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ce-roomos-dos-c65x2Qf2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20784.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20784.json
index 4e10e4cb71b..2f104cdd010 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20784.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20784.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20784",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-06T18:15:08.783",
"lastModified": "2024-11-21T06:43:33.007",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -140,7 +140,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-filter-bypass-XXXTU3X",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20785.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20785.json
index 9c9d106058e..329c42f684e 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20785.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20785.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20785",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-04T17:15:08.680",
"lastModified": "2024-11-21T06:43:33.120",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -222,7 +222,7 @@
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -230,23 +230,23 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://security.gentoo.org/glsa/202310-01",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-html-XAuOK8mR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20786.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20786.json
index 34269599911..5d59b64e34c 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20786.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20786.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20786",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-21T19:15:08.470",
"lastModified": "2024-11-21T06:43:33.240",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -142,7 +142,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-sqlinj-GrpUuQEJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20787.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20787.json
index fd9398a00e7..bbad6e21226 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20787.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20787.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20787",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-21T19:15:08.523",
"lastModified": "2024-11-21T06:43:33.353",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -149,7 +149,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-csrf-jrKP4eNT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20788.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20788.json
index d3104873181..3d99944562f 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20788.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20788.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20788",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-21T19:15:08.577",
"lastModified": "2024-11-21T06:43:33.470",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -177,7 +177,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-6MCe4kPF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20789.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20789.json
index fd860daab42..b2146c2fabc 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20789.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20789.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20789",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-21T19:15:08.630",
"lastModified": "2024-11-21T06:43:33.593",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-arb-write-74QzruUU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20790.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20790.json
index c221f671afc..b0f205eea19 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20790.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20790.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20790",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-21T19:15:08.687",
"lastModified": "2024-11-21T06:43:33.717",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-file-read-h8h4HEJ3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20791.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20791.json
index fdf152db2d3..d62f1d8db10 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20791.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20791.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20791",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-06T21:15:11.497",
"lastModified": "2024-11-21T06:43:33.833",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -174,7 +174,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imp-afr-YBFLNyzd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20792.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20792.json
index bc784276183..7b181b85c52 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20792.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20792.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20792",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-10T09:15:08.197",
"lastModified": "2024-11-21T06:43:33.957",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -109,7 +109,7 @@
"references": [
{
"url": "https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
@@ -117,7 +117,7 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-01",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html",
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20793.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20793.json
index f3990c3e913..265a0d803d1 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20793.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20793.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20793",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:22.370",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-IVV-4A66Dsfj",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20794.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20794.json
index 7b25013eee3..08cde7b6763 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20794.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20794.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20794",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-04T17:15:08.740",
"lastModified": "2024-11-21T06:43:34.173",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -140,7 +140,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ROS-DOS-X7H7XhkK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20795.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20795.json
index 7a242e83f2a..acca08fc07b 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20795.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20795.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20795",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-21T19:15:08.740",
"lastModified": "2024-11-21T06:43:34.283",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -301,7 +301,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vpndtls-dos-TunzLEV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20796.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20796.json
index 1cbcaf0831c..463b0592405 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20796.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20796.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20796",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-04T17:15:08.797",
"lastModified": "2024-11-21T06:43:34.413",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
@@ -231,23 +231,23 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://security.gentoo.org/glsa/202310-01",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-vL9x58p4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20797.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20797.json
index f25de6bd7a2..3e2f47b8336 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20797.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20797.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20797",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-27T14:15:08.673",
"lastModified": "2024-11-21T06:43:34.530",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealth-rce-2hYb9KFK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20798.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20798.json
index 00ec9f8201d..93786a5324b 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20798.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20798.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20798",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-06-15T18:15:08.927",
"lastModified": "2024-11-21T06:43:34.657",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -168,7 +168,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-esa-auth-bypass-66kEcxQD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20799.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20799.json
index adb0bbb198d..24c5a350018 100644
--- a/CVE-2022/CVE-2022-207xx/CVE-2022-20799.json
+++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20799.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20799",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-04T17:15:08.857",
"lastModified": "2024-11-21T06:43:34.800",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-rv-cmd-inj-8Pv9JMJD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20800.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20800.json
index 285d17caed8..4cd180c52d9 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20800.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20800.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20800",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-06T21:15:11.543",
"lastModified": "2024-11-21T06:43:34.917",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -149,7 +149,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-RgH7MpKA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20801.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20801.json
index 692be10d8bd..b852fe56e23 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20801.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20801.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20801",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-04T17:15:08.913",
"lastModified": "2024-11-21T06:43:35.020",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -223,7 +223,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-rv-cmd-inj-8Pv9JMJD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20802.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20802.json
index 121f69fa414..a803dcd3b03 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20802.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20802.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20802",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-27T14:15:08.730",
"lastModified": "2024-11-21T06:43:35.137",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-strd-xss-BqFXO9D2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20803.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20803.json
index 45110e6e648..2328dc894fd 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20803.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20803.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20803",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-02-17T18:15:11.740",
"lastModified": "2024-11-21T06:43:35.247",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -99,14 +99,14 @@
"references": [
{
"url": "https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-01",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20804.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20804.json
index 4377be8a892..a5c447e4ee7 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20804.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20804.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20804",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-21T19:15:08.793",
"lastModified": "2024-11-21T06:43:35.360",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-dos-zHS9X9kD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20805.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20805.json
index 52212f9b08a..18ef61b0aed 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20805.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20805.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20805",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-04-21T19:15:08.847",
"lastModified": "2024-11-21T06:43:35.473",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uswg-fdbps-xtTRKpp6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20806.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20806.json
index 1f2d7d7839f..dfce5c90261 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20806.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20806.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20806",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-27T14:15:08.780",
"lastModified": "2024-11-21T06:43:35.573",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-bsFVwueV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20807.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20807.json
index 021e7ef6f9e..64bac5fdd2f 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20807.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20807.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20807",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-27T14:15:08.833",
"lastModified": "2024-11-21T06:43:35.680",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-bsFVwueV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20808.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20808.json
index 917b33d2d68..c49a06d0d82 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20808.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20808.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20808",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-06T21:15:11.593",
"lastModified": "2024-11-21T06:43:35.780",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-onprem-privesc-tP6uNZOS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20809.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20809.json
index bc2d3b46e49..945f9036b85 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20809.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20809.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20809",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-26T14:15:08.067",
"lastModified": "2024-11-21T06:43:35.887",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-bsFVwueV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20810.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20810.json
index 65b55a2c80e..759ee5d2680 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20810.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20810.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20810",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:11.703",
"lastModified": "2024-11-21T06:43:36.007",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -158,7 +158,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cwlc-snmpidv-rnyyQzUZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20811.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20811.json
index 6e4ff938bce..4004322cfbf 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20811.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20811.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20811",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-26T15:15:14.493",
"lastModified": "2024-11-21T06:43:36.110",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-trav-beFvCcyu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20812.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20812.json
index 373c1ca10ab..0238a144695 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20812.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20812.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20812",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-06T21:15:11.643",
"lastModified": "2024-11-21T06:43:36.213",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,14 +133,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-csrf-sqpsSfY6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-overwrite-3buqW8LH",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20813.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20813.json
index 8c17c9158c2..d61434ea582 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20813.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20813.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20813",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-06T21:15:11.693",
"lastModified": "2024-11-21T06:43:36.340",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -133,7 +133,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-overwrite-3buqW8LH",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20814.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20814.json
index 4a56eed80a1..f71e97088ab 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20814.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20814.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20814",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:22.670",
"lastModified": "2024-11-21T06:43:36.460",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,19 +54,19 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-csrf-sqpsSfY6",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bng-Gmg5Gxt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ncs4k-tl1-GNnLwC6",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr-cdp-wnALzvT2",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20815.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20815.json
index 47635559951..39e8c0f389c 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20815.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20815.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20815",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-06T21:15:11.740",
"lastModified": "2024-11-21T06:43:36.570",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -156,7 +156,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-ksKd5yfA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20816.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20816.json
index 3f77e8fd725..d1bc43f4be2 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20816.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20816.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20816",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-10T09:15:08.410",
"lastModified": "2024-11-21T06:43:36.677",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -110,7 +110,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-file-delete-N2VPmOnE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20817.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20817.json
index 994d740dfb2..6e7a31c2a33 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20817.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20817.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20817",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-06-15T18:15:08.997",
"lastModified": "2024-11-21T06:43:36.787",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -408,7 +408,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cp6901-dup-cert-82jdJGe4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20818.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20818.json
index 808dfb31548..b1dd4581b79 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20818.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20818.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20818",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:11.867",
"lastModified": "2024-11-21T06:43:36.913",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -532,7 +532,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20819.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20819.json
index 7ad40ee8d2f..43d35eff4d6 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20819.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20819.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20819",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-06-15T18:15:09.080",
"lastModified": "2024-11-21T06:43:37.030",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -211,7 +211,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-disclosure-Os6fSd6N",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20820.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20820.json
index e756b785b07..5e1d2683b28 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20820.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20820.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20820",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-10T09:15:08.477",
"lastModified": "2024-11-21T06:43:37.143",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -101,7 +101,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-frmhijck-kO3wmkuS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20821.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20821.json
index b3028ead764..ae29342a290 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20821.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20821.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20821",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-05-26T14:15:08.123",
"lastModified": "2024-11-21T06:43:37.250",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -90,7 +90,7 @@
"cisaVulnerabilityName": "Cisco IOS XR Open Port Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -272,7 +272,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-redis-ABJyE5xK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20822.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20822.json
index 29f353321cc..c6e5250efde 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20822.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20822.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20822",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-26T15:15:14.607",
"lastModified": "2024-11-21T06:43:37.377",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,14 +116,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-Dz5dpzyM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-path-traversal/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-Dz5dpzyM",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20823.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20823.json
index 9b668ad4282..48cff4460e4 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20823.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20823.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20823",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-25T19:15:08.147",
"lastModified": "2024-11-21T06:43:37.493",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -4055,7 +4055,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ospfv3-dos-48qutcu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20824.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20824.json
index d2c19b7dd44..77122e8bb37 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20824.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20824.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20824",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-25T19:15:08.217",
"lastModified": "2024-11-21T06:43:37.750",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3974,14 +3974,14 @@
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20220923-0001/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cdp-dos-ce-wWvPucC9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20825.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20825.json
index 772508059ae..27e4a5cef6d 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20825.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20825.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20825",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-06-15T18:15:09.173",
"lastModified": "2024-11-21T06:43:37.997",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -219,7 +219,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-overflow-s2r82P9v",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20826.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20826.json
index d22349b4c4f..edb3ce01f4e 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20826.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20826.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20826",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:22.930",
"lastModified": "2024-11-21T06:43:38.120",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -215,7 +215,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fw3100-secure-boot-5M8mUh26",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fw3100-secure-boot-5M8mUh26",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20827.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20827.json
index c9c74079c5b..50c2c3f851c 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20827.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20827.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20827",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-10T09:15:08.537",
"lastModified": "2024-11-21T06:43:38.243",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -338,7 +338,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20828.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20828.json
index 52fe4a898f3..2f1658e51d5 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20828.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20828.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20828",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-06-24T16:15:08.523",
"lastModified": "2024-11-21T06:43:38.367",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -250,7 +250,7 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/168256/Cisco-ASA-X-With-FirePOWER-Services-Authenticated-Command-Injection.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -258,14 +258,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asasfr-cmd-inject-PE4GfdG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.rapid7.com/blog/post/2022/08/11/rapid7-discovered-vulnerabilities-in-cisco-asa-asdm-and-firepower-services-software/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20829.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20829.json
index aeffb025f89..9b69357ab88 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20829.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20829.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20829",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-06-24T16:15:08.580",
"lastModified": "2024-11-21T06:43:38.500",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -326,7 +326,7 @@
"references": [
{
"url": "https://github.com/jbaines-r7/theway",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
@@ -334,14 +334,14 @@
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-asdm-sig-NPKvwDjm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.rapid7.com/blog/post/2022/08/11/rapid7-discovered-vulnerabilities-in-cisco-asa-asdm-and-firepower-services-software/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20830.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20830.json
index 041fb1ec2ca..206980e9db7 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20830.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20830.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20830",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-10T21:15:10.063",
"lastModified": "2024-11-21T06:43:38.623",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -115,7 +115,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-avc-NddSGB8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20831.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20831.json
index 165eda3ce8c..69a5016181d 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20831.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20831.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20831",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:23.537",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20832.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20832.json
index 312b4560a7d..8223538d30b 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20832.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20832.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20832",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:23.777",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20833.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20833.json
index 8f317c0e7ac..cd19531f5d7 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20833.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20833.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20833",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:23.973",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20834.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20834.json
index d55a311c869..16cd358bd15 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20834.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20834.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20834",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:24.270",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20835.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20835.json
index a42018b78e5..2654c3f7951 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20835.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20835.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20835",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:24.533",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20836.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20836.json
index 2f7e3565117..b14bdc84549 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20836.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20836.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20836",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:24.860",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20837.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20837.json
index 38c4ffc96b3..a01731c7418 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20837.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20837.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20837",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-10T21:15:10.137",
"lastModified": "2024-11-21T06:43:39.510",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-alg-dos-KU9Z8kFX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20838.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20838.json
index 0ac9975f754..508529986b4 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20838.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20838.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20838",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:25.250",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20839.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20839.json
index cb495028557..45d935fb178 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20839.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20839.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20839",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:25.727",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20840.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20840.json
index fdc40640659..c73719ebb83 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20840.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20840.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20840",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:26.993",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20841.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20841.json
index 59dfc0b73c7..e6685bcff68 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20841.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20841.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20841",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-10T08:15:07.317",
"lastModified": "2024-11-21T06:43:39.987",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -338,7 +338,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20842.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20842.json
index ec184128db2..f8aa9ec545f 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20842.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20842.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20842",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-10T09:15:08.590",
"lastModified": "2024-11-21T06:43:40.107",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -198,7 +198,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20843.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20843.json
index 6ab283f62bf..08ff9f7d2eb 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20843.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20843.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20843",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:27.437",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20844.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20844.json
index 2adefb793ee..70d530fba50 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20844.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20844.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20844",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:11.987",
"lastModified": "2024-11-21T06:43:40.347",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -123,7 +123,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdavc-ZA5fpXX2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20845.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20845.json
index e3a45d5564b..ede61b46ef2 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20845.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20845.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20845",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:22.913",
"lastModified": "2024-11-21T06:43:40.460",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bng-Gmg5Gxt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ncs4k-tl1-GNnLwC6",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20846.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20846.json
index f311af6a114..d48b888062f 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20846.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20846.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20846",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:23.120",
"lastModified": "2024-11-21T06:43:40.553",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bng-Gmg5Gxt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ncs4k-tl1-GNnLwC6",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr-cdp-wnALzvT2",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20847.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20847.json
index 8e3d3dcdb75..3f905349942 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20847.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20847.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20847",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:12.247",
"lastModified": "2024-11-21T06:43:40.660",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-dhcp-dos-76pCjPxK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20848.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20848.json
index cacfc3019aa..f8019a8b751 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20848.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20848.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20848",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:12.430",
"lastModified": "2024-11-21T06:43:40.767",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1923,7 +1923,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-udp-dos-XDyEwhNz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20849.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20849.json
index 1635fcee80d..5923699936a 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20849.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20849.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20849",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:23.327",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bng-Gmg5Gxt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20850.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20850.json
index 829df9eaa01..dd7897e7573 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20850.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20850.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20850",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:12.543",
"lastModified": "2024-11-21T06:43:41.000",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -188,7 +188,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arb-file-delete-VB2rVcQv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20851.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20851.json
index a6aedf0ae8b..ad1ac54df26 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20851.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20851.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20851",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:12.727",
"lastModified": "2024-11-21T06:43:41.110",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1398,7 +1398,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdinj-Gje47EMn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20852.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20852.json
index a4e81c0686d..ce10d5a2286 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20852.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20852.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20852",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-10T09:15:08.647",
"lastModified": "2024-11-21T06:43:41.247",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -101,7 +101,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-frmhijck-kO3wmkuS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20853.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20853.json
index 5301383788e..ef22f26e261 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20853.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20853.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20853",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:23.540",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,19 +54,19 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-csrf-sqpsSfY6",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-8PdRU8t8",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20854.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20854.json
index 2099a81b7d4..cd5575b41b2 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20854.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20854.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20854",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:27.867",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -388,7 +388,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-OwEunWJN",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-OwEunWJN",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20855.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20855.json
index 9cb24d744d5..8a1f7f85a89 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20855.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20855.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20855",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:12.963",
"lastModified": "2024-11-21T06:43:41.627",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -253,7 +253,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewc-priv-esc-nderYLtK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20856.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20856.json
index 6de66f46b41..c7c293cbd3d 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20856.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20856.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20856",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:13.223",
"lastModified": "2024-11-21T06:43:41.747",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -143,7 +143,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9800-mob-dos-342YAc6J",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20857.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20857.json
index fc98a13ebf0..5da4436c8e5 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20857.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20857.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20857",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T04:15:10.180",
"lastModified": "2024-11-21T06:43:41.860",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mhcvuln-vpsBPJ9y",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20858.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20858.json
index 8afdf38db30..8939757034d 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20858.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20858.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20858",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T04:15:10.357",
"lastModified": "2024-11-21T06:43:41.967",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mhcvuln-vpsBPJ9y",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20859.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20859.json
index 9d47cd0ec31..5d954558577 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20859.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20859.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20859",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-06T21:15:11.797",
"lastModified": "2024-11-21T06:43:42.080",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -142,7 +142,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-access-dMKvV2DY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20860.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20860.json
index 66a1c53075c..f593ec736bf 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20860.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20860.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20860",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T04:15:10.417",
"lastModified": "2024-11-21T06:43:42.190",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-tlsvld-TbAQLp3N",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20861.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20861.json
index f1cbd6a90c4..e10589d9086 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20861.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20861.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20861",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T04:15:10.483",
"lastModified": "2024-11-21T06:43:42.300",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mhcvuln-vpsBPJ9y",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20862.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20862.json
index a2772b498d4..f26985100de 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20862.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20862.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20862",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-06T21:15:11.847",
"lastModified": "2024-11-21T06:43:42.403",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -86,7 +86,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -147,7 +147,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-file-read-qgjhEc3A",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20863.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20863.json
index 424fe4e45ae..6f19f666d28 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20863.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20863.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20863",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-08T13:15:08.930",
"lastModified": "2024-11-21T06:43:42.510",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-qrtO6YC2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20864.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20864.json
index c48e75fe7e7..f34143c7587 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20864.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20864.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20864",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-10T21:15:10.207",
"lastModified": "2024-11-21T06:43:42.610",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1303,7 +1303,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-info-disc-nrORXjO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20865.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20865.json
index c6e9326072f..8b00f952db9 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20865.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20865.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20865",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-25T19:15:08.273",
"lastModified": "2024-11-21T06:43:42.747",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -410,7 +410,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-cmdinj-TxcLNZNH",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20866.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20866.json
index 7fc5070f096..e98d4a10214 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20866.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20866.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20866",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-10T17:15:08.487",
"lastModified": "2024-11-21T06:43:42.867",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -298,7 +298,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-rsa-key-leak-Ms7UEfZz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20867.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20867.json
index b6733bbbe51..a99101fd6ae 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20867.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20867.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20867",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-04T18:15:10.923",
"lastModified": "2024-11-21T06:43:43.000",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -144,7 +144,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20868.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20868.json
index 1accb5492c7..a2968ddc1cc 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20868.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20868.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20868",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-04T18:15:10.983",
"lastModified": "2024-11-21T06:43:43.140",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -185,7 +185,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esasmawsa-vulns-YRuSW5mD",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20869.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20869.json
index 4bc4aa54043..2b10382eb25 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20869.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20869.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20869",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-10T09:15:08.703",
"lastModified": "2024-11-21T06:43:43.247",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -117,7 +117,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-xbhfr4cD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20870.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20870.json
index 671b469c468..d4f4fe51993 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20870.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20870.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20870",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-10T21:15:10.273",
"lastModified": "2024-11-21T06:43:43.347",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1068,7 +1068,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-mpls-dos-Ab4OUL3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20871.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20871.json
index 2254fd142d5..26589c6b7f6 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20871.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20871.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20871",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:23.757",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-8PdRU8t8",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20872.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20872.json
index dc2f45ddc7d..cb65305394a 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20872.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20872.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20872",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:28.720",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20873.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20873.json
index b95f791b665..e660807f4ce 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20873.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20873.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20873",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T04:15:10.543",
"lastModified": "2024-11-21T06:43:43.653",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20874.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20874.json
index 06499137051..770b1652193 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20874.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20874.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20874",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T04:15:10.607",
"lastModified": "2024-11-21T06:43:43.773",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20875.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20875.json
index 93ac85528dc..fb312be2dda 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20875.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20875.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20875",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T04:15:10.667",
"lastModified": "2024-11-21T06:43:43.880",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20876.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20876.json
index 3a43bd60255..c7761288542 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20876.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20876.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20876",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T04:15:10.727",
"lastModified": "2024-11-21T06:43:43.973",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20877.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20877.json
index fdc3e6c6963..5fc9733dd56 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20877.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20877.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20877",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T04:15:10.857",
"lastModified": "2024-11-21T06:43:44.080",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20878.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20878.json
index 7e01292b6cf..679b61a237d 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20878.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20878.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20878",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T04:15:11.023",
"lastModified": "2024-11-21T06:43:44.197",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20879.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20879.json
index 5e24775f9a5..8a46399cdec 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20879.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20879.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20879",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T04:15:11.200",
"lastModified": "2024-11-21T06:43:44.310",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20880.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20880.json
index d26b388d718..8575cb602af 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20880.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20880.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20880",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T04:15:11.433",
"lastModified": "2024-11-21T06:43:44.427",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20881.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20881.json
index 03d79f418a9..8210733d63c 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20881.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20881.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20881",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T05:15:07.067",
"lastModified": "2024-11-21T06:43:44.543",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20882.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20882.json
index 48f4fc5a516..0de2444cc10 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20882.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20882.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20882",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T05:15:07.283",
"lastModified": "2024-11-21T06:43:44.653",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20883.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20883.json
index 10f8ab3075d..f9e2c65d6f5 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20883.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20883.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20883",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T05:15:07.337",
"lastModified": "2024-11-21T06:43:44.780",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20884.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20884.json
index bc2ecc995a4..8e92d2690b4 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20884.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20884.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20884",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T12:15:08.147",
"lastModified": "2024-11-21T06:43:44.917",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20885.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20885.json
index 63d8eb7063d..3897d166d0c 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20885.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20885.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20885",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T14:15:08.397",
"lastModified": "2024-11-21T06:43:45.037",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20886.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20886.json
index 9df1467744f..63fc93f8fb3 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20886.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20886.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20886",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T14:15:08.543",
"lastModified": "2024-11-21T06:43:45.147",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20887.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20887.json
index 38ff3bcb6e5..29aa3703940 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20887.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20887.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20887",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T14:15:08.597",
"lastModified": "2024-11-21T06:43:45.257",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20888.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20888.json
index caf70774693..b8f99f46147 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20888.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20888.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20888",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T14:15:08.657",
"lastModified": "2024-11-21T06:43:45.370",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20889.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20889.json
index 3421a7a763c..7fe14d40931 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20889.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20889.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20889",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T14:15:08.720",
"lastModified": "2024-11-21T06:43:45.480",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -249,7 +249,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20890.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20890.json
index 12feefb8437..55244aabf7d 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20890.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20890.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20890",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T14:15:08.773",
"lastModified": "2024-11-21T06:43:45.603",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -249,7 +249,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20891.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20891.json
index 1a74aea6da3..22eda421e1f 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20891.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20891.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20891",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-21T22:15:08.463",
"lastModified": "2024-11-21T06:43:45.713",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20892.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20892.json
index 891ba4dcb62..f00c85eac23 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20892.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20892.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20892",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:11.887",
"lastModified": "2024-11-21T06:43:45.827",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20893.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20893.json
index 7487880362a..878de157ab8 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20893.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20893.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20893",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:12.280",
"lastModified": "2024-11-21T06:43:45.937",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20894.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20894.json
index 8159ab4b572..71004eba04f 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20894.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20894.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20894",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:12.367",
"lastModified": "2024-11-21T06:43:46.043",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20895.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20895.json
index d7d76a64484..277b39f2945 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20895.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20895.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20895",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:12.447",
"lastModified": "2024-11-21T06:43:46.160",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20896.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20896.json
index ac9e077375c..26aac7f42ed 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20896.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20896.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20896",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:12.527",
"lastModified": "2024-11-21T06:43:46.277",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20897.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20897.json
index edc26c083dd..77c81c0d7c5 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20897.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20897.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20897",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:12.600",
"lastModified": "2024-11-21T06:43:46.390",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20898.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20898.json
index 7635ecb06af..d73f1123514 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20898.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20898.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20898",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:12.667",
"lastModified": "2024-11-21T06:43:46.507",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20899.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20899.json
index c1e64639a0a..bf27c4c8ec8 100644
--- a/CVE-2022/CVE-2022-208xx/CVE-2022-20899.json
+++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20899.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20899",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:12.733",
"lastModified": "2024-11-21T06:43:46.613",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20900.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20900.json
index a62499e5497..f24bc67a8b6 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20900.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20900.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20900",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:12.803",
"lastModified": "2024-11-21T06:43:46.747",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20901.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20901.json
index fa3ca2afed8..106388d629a 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20901.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20901.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20901",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:12.867",
"lastModified": "2024-11-21T06:43:46.870",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20902.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20902.json
index e05a8bd715c..310385818ed 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20902.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20902.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20902",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:12.927",
"lastModified": "2024-11-21T06:43:46.980",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20903.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20903.json
index 3fc906b09ad..321622410e4 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20903.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20903.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20903",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:12.987",
"lastModified": "2024-11-21T06:43:47.093",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20904.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20904.json
index 6653e6370c0..0b54f1035d2 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20904.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20904.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20904",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:13.057",
"lastModified": "2024-11-21T06:43:47.210",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20905.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20905.json
index 3a338f576a9..2e123a4f045 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20905.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20905.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20905",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:29.250",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20906.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20906.json
index a273b2f3d54..d24aef3a40a 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20906.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20906.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20906",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:13.127",
"lastModified": "2024-11-21T06:43:47.450",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mprvesc-EMhDgXe5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20907.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20907.json
index aa6e1037a1c..b163c863f3d 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20907.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20907.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20907",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:13.207",
"lastModified": "2024-11-21T06:43:47.557",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mprvesc-EMhDgXe5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20908.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20908.json
index 38d3e4a09bc..69b1fa21cb2 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20908.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20908.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20908",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:13.283",
"lastModified": "2024-11-21T06:43:47.670",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mprvesc-EMhDgXe5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20909.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20909.json
index e4e19eeda8d..ee7f9aa121b 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20909.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20909.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20909",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:13.347",
"lastModified": "2024-11-21T06:43:47.777",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mprvesc-EMhDgXe5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20910.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20910.json
index ab7b29cc2dd..1b6a76ea939 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20910.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20910.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20910",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:13.413",
"lastModified": "2024-11-21T06:43:47.890",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -209,7 +209,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20911.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20911.json
index fe9e9d16de9..a5805300401 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20911.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20911.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20911",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:13.477",
"lastModified": "2024-11-21T06:43:48.003",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20912.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20912.json
index 76b7b851e9d..5fc688aa8f5 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20912.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20912.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20912",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:13.547",
"lastModified": "2024-11-21T06:43:48.120",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20913.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20913.json
index 71c5760f82c..903fc98b93a 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20913.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20913.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20913",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:13.613",
"lastModified": "2024-11-21T06:43:48.237",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-afw-2MT9tb99",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20914.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20914.json
index 1a57ebf9cb8..e8d1d0db43b 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20914.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20914.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20914",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-10T09:15:08.760",
"lastModified": "2024-11-21T06:43:48.350",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -233,7 +233,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-pwd-WH64AhQF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20915.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20915.json
index be9cce5ae85..e5aa5591d7c 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20915.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20915.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20915",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-10T21:15:10.340",
"lastModified": "2024-11-21T06:43:48.470",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -101,7 +101,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-6vpe-dos-tJBtf5Zv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20916.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20916.json
index a41107de63e..6bcfa3254a4 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20916.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20916.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20916",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-07-22T04:15:13.687",
"lastModified": "2024-11-21T06:43:48.587",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -101,7 +101,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iotcc-xss-WQrCLRVd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20917.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20917.json
index e498a4b930f..a0297882f08 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20917.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20917.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20917",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-15T03:15:07.520",
"lastModified": "2024-11-21T06:43:48.703",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -176,7 +176,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-xmpp-Ne9SCM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20918.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20918.json
index 974dd8e4ffc..9c34b11d09b 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20918.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20918.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20918",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:29.820",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -108,7 +108,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcsfr-snmp-access-6gqgtJ4S",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcsfr-snmp-access-6gqgtJ4S",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20919.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20919.json
index 493e3fddf94..d1deca143b6 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20919.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20919.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20919",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:13.417",
"lastModified": "2024-11-21T06:43:48.977",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1713,7 +1713,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cip-dos-9rTbKLt9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20920.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20920.json
index 186d0bb7820..c2b08dc7227 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20920.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20920.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20920",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-10T21:15:10.413",
"lastModified": "2024-11-21T06:43:49.133",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -7326,7 +7326,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssh-excpt-dos-FzOBQTnk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20921.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20921.json
index d417b054ab5..1a4e2a21f53 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20921.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20921.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20921",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-08-25T19:15:08.327",
"lastModified": "2024-11-21T06:43:49.690",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mso-prvesc-BPFp9cZs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20922.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20922.json
index 3723120991e..00423fd7673 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20922.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20922.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20922",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:30.743",
"lastModified": "2024-11-21T06:43:49.797",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -401,7 +401,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20923.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20923.json
index 30f0e809293..6ff0ba788c7 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20923.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20923.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20923",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-08T13:15:08.987",
"lastModified": "2024-11-21T06:43:49.923",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -234,7 +234,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-vpnbypass-Cpheup9O",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20924.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20924.json
index ffdded7e916..bef25d0eaee 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20924.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20924.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20924",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:31.730",
"lastModified": "2024-11-21T06:43:50.043",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -431,7 +431,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-snmp-dos-qsqBNM6x",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-snmp-dos-qsqBNM6x",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20925.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20925.json
index acb17fe9a84..fb066daeb59 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20925.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20925.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20925",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:32.323",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -171,7 +171,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-Z3B5MY35",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-Z3B5MY35",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20926.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20926.json
index 182b4cbf135..ca7ef387cea 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20926.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20926.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20926",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:32.467",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-Z3B5MY35",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-Z3B5MY35",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20927.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20927.json
index 0ab2ac9599b..c2f44cdff24 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20927.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20927.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20927",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:32.607",
"lastModified": "2024-11-21T06:43:50.390",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -340,7 +340,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssl-client-dos-cCrQPkA",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssl-client-dos-cCrQPkA",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20928.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20928.json
index bde34d1ffb3..90ae7b75618 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20928.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20928.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20928",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:32.720",
"lastModified": "2024-11-21T06:43:50.513",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1631,7 +1631,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-vp-authz-N2GckjN6",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-vp-authz-N2GckjN6",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20929.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20929.json
index c0ac897e4bc..65f71e73071 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20929.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20929.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20929",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-10T21:15:10.963",
"lastModified": "2024-11-21T06:43:50.707",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -99,7 +99,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-NFVIS-ISV-BQrvEv2h",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20930.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20930.json
index 304e0193c19..66f76257fcb 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20930.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20930.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20930",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:13.557",
"lastModified": "2024-11-21T06:43:50.820",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -212,7 +212,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-cli-xkGwmqKu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20931.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20931.json
index 0fa0b0917f6..ab8ab39c051 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20931.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20931.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20931",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:23.967",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-DAV-HSvEHHEt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20932.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20932.json
index ce079634adc..da1f329d16a 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20932.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20932.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20932",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:33.007",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20933.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20933.json
index 08cc3febac5..e3d699e87d3 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20933.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20933.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20933",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-26T15:15:14.713",
"lastModified": "2024-11-21T06:43:51.123",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -896,7 +896,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-vnESbgBf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20934.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20934.json
index 0f8e545fc27..bc6036596fe 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20934.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20934.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20934",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:33.600",
"lastModified": "2024-11-21T06:43:51.273",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -904,7 +904,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-fxos-cmd-inj-Q9bLNsrK",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-fxos-cmd-inj-Q9bLNsrK",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20935.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20935.json
index aee37423737..1ad819923e9 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20935.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20935.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20935",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:33.947",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20936.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20936.json
index d865f2f2741..a4d1faf568f 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20936.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20936.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20936",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:34.160",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20937.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20937.json
index 1b477eee1d3..9904ab2ddff 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20937.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20937.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20937",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-04T18:15:11.040",
"lastModified": "2024-11-21T06:43:51.660",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -187,7 +187,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-sec-atk-dos-zw5RCUYp",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-sec-atk-dos-zw5RCUYp",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20938.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20938.json
index e39c5799008..543a7777435 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20938.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20938.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20938",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:34.430",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xxe-MzPC4bYd",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xxe-MzPC4bYd",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20939.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20939.json
index 676e9d74e4d..cad6165a0dc 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20939.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20939.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20939",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:24.200",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20940.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20940.json
index 8f373290a1f..5f1ec27578c 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20940.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20940.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20940",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:34.650",
"lastModified": "2024-11-21T06:43:51.993",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -193,7 +193,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-bb-rCgtmY2",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-bb-rCgtmY2",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20941.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20941.json
index f05034ff058..cb53226d07c 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20941.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20941.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20941",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:34.877",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -565,7 +565,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-info-disc-UghNRRhP",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-info-disc-UghNRRhP",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20942.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20942.json
index 25681b1f4f6..43b112fbcbe 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20942.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20942.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20942",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-04T18:15:11.100",
"lastModified": "2024-11-21T06:43:52.233",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -198,7 +198,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnt-sec-infodiscl-BVKKnUG",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnt-sec-infodiscl-BVKKnUG",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20943.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20943.json
index a856e6a44dc..57144d7b699 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20943.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20943.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20943",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:35.077",
"lastModified": "2024-11-21T06:43:52.350",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -256,7 +256,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20944.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20944.json
index 52ad79e7e73..dfe57339c45 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20944.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20944.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20944",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-10T21:15:10.480",
"lastModified": "2024-11-21T06:43:52.467",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -203,7 +203,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cat-verify-D4NEQA6q",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20945.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20945.json
index 33c18ac80cd..016dd3f41b7 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20945.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20945.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20945",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-09-30T19:15:13.770",
"lastModified": "2024-11-21T06:43:52.580",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -202,7 +202,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-assoc-dos-EgVqtON8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20946.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20946.json
index 7a4bcb8d28c..2c691183a34 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20946.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20946.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20946",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:35.317",
"lastModified": "2024-11-21T06:43:52.687",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -153,7 +153,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-gre-dos-hmedHQPM",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-gre-dos-hmedHQPM",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20947.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20947.json
index e0d17b68657..d9778fd2548 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20947.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20947.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20947",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:35.590",
"lastModified": "2024-11-21T06:43:52.793",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1571,7 +1571,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20948.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20948.json
index 270b1c89af3..cd97f2ea77a 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20948.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20948.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20948",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:24.427",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-DAV-HSvEHHEt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20949.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20949.json
index 8f7b117ddeb..218632699ef 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20949.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20949.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20949",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:35.833",
"lastModified": "2024-11-21T06:43:53.010",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -196,7 +196,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-privesc-7GqR2th",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-mgmt-privesc-7GqR2th",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20950.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20950.json
index 8a2254cca04..386a6d37f06 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20950.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20950.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20950",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-15T21:15:36.110",
"lastModified": "2024-11-21T06:43:53.120",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdsnort3sip-dos-A4cHeArC",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdsnort3sip-dos-A4cHeArC",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20951.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20951.json
index b2fd2b53c08..4ebb3f51c82 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20951.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20951.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20951",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-04T18:15:11.157",
"lastModified": "2024-11-21T06:43:53.263",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20952.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20952.json
index da74b0b9a54..d729ffe4f8a 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20952.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20952.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20952",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-01T08:15:10.270",
"lastModified": "2024-11-21T06:43:54.277",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-bwBfugek",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20953.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20953.json
index b1937845668..0d0cc0af0c6 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20953.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20953.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20953",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-26T15:15:14.800",
"lastModified": "2024-11-21T06:43:54.390",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-trav-beFvCcyu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20954.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20954.json
index e15bc1f9af3..c851683c4e1 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20954.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20954.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20954",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-26T15:15:15.017",
"lastModified": "2024-11-21T06:43:54.497",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-trav-beFvCcyu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20955.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20955.json
index c6419f493c0..b3cbd70aeb3 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20955.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20955.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20955",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-26T15:15:15.117",
"lastModified": "2024-11-21T06:43:54.603",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-trav-beFvCcyu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20956.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20956.json
index 0d17106151e..0c4eb652475 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20956.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20956.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20956",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-04T18:15:11.217",
"lastModified": "2024-11-21T06:43:54.703",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20958.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20958.json
index 0ec8b5f9b77..47e78762e90 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20958.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20958.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20958",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-04T18:15:11.287",
"lastModified": "2024-11-21T06:43:54.827",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20959.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20959.json
index e665215f2dd..9ba993f2317 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20959.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20959.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20959",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-10-26T15:15:15.190",
"lastModified": "2024-11-21T06:43:55.237",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -198,14 +198,14 @@
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-twLnpy3M",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-cross-site-scripting/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-twLnpy3M",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20960.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20960.json
index 20bd4c7a993..6a510720153 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20960.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20960.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20960",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-04T18:15:11.347",
"lastModified": "2024-11-21T06:43:55.350",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -109,7 +109,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-gdghHmbV",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-gdghHmbV",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20961.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20961.json
index 9ea742816e1..05448979f1d 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20961.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20961.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20961",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-04T18:15:11.403",
"lastModified": "2024-11-21T06:43:55.460",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -242,7 +242,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-csrf-vgNtTpAs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-csrf-vgNtTpAs",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20962.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20962.json
index 3a84496695e..52ab241bd84 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20962.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20962.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20962",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-04T18:15:11.460",
"lastModified": "2024-11-21T06:43:55.573",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-f6M7cs6r",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-f6M7cs6r",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20963.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20963.json
index f4fa2542eb7..5850c0f69b0 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20963.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20963.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20963",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-04T18:15:11.517",
"lastModified": "2024-11-21T06:43:55.683",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -192,7 +192,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-stor-xss-kpRBWXY",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-stor-xss-kpRBWXY",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20964.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20964.json
index 01eeebf0123..a81eb6432f2 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20964.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20964.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20964",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:10.743",
"lastModified": "2024-11-21T06:43:55.800",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -262,7 +262,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20965.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20965.json
index 3562574fb59..32ae00851bd 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20965.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20965.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20965",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:11.083",
"lastModified": "2024-11-21T06:43:55.927",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -262,7 +262,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20966.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20966.json
index 86cd2a21753..ed90bb37658 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20966.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20966.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20966",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:11.377",
"lastModified": "2024-11-21T06:43:56.043",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -262,7 +262,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20967.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20967.json
index cfece9f274a..15e2d0b54ac 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20967.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20967.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20967",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:11.673",
"lastModified": "2024-11-21T06:43:56.157",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -262,7 +262,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20968.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20968.json
index 7d66277fa1d..4b67673abd7 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20968.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20968.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20968",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-12-12T09:15:12.613",
"lastModified": "2024-11-21T06:43:56.270",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3882,7 +3882,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U",
diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20969.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20969.json
index 1aa8c961d6e..ee1751f8534 100644
--- a/CVE-2022/CVE-2022-209xx/CVE-2022-20969.json
+++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20969.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2022-20969",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2022-11-04T18:15:11.570",
"lastModified": "2024-11-21T06:43:56.470",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -101,7 +101,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-xss-LfeYQV3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-xss-LfeYQV3",
diff --git a/CVE-2022/CVE-2022-234xx/CVE-2022-23439.json b/CVE-2022/CVE-2022-234xx/CVE-2022-23439.json
index a71605a77a3..e25ec78a599 100644
--- a/CVE-2022/CVE-2022-234xx/CVE-2022-23439.json
+++ b/CVE-2022/CVE-2022-234xx/CVE-2022-23439.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-22T10:15:07.737",
"lastModified": "2025-01-22T10:15:07.737",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A externally controlled reference to a resource in another sphere in Fortinet FortiManager before version 7.4.3, FortiMail before version 7.0.3, FortiAnalyzer before version 7.4.3, FortiVoice version 7.0.0, 7.0.1 and before 6.4.8, FortiProxy before version 7.0.4, FortiRecorder version 6.4.0 through 6.4.2 and before 6.0.10, FortiAuthenticator version 6.4.0 through 6.4.1 and before 6.3.3, FortiNDR version 7.2.0 before 7.1.0, FortiWLC before version 8.6.4, FortiPortal before version 6.0.9, FortiOS version 7.2.0 and before 7.0.5, FortiADC version 7.0.0 through 7.0.1 and before 6.2.3 , FortiDDoS before version 5.5.1, FortiDDoS-F before version 6.3.3, FortiTester before version 7.2.1, FortiSOAR before version 7.2.2 and FortiSwitch before version 6.3.3 allows attacker to poison web caches via crafted HTTP requests, where the `Host` header points to an arbitrary webserver"
+ },
+ {
+ "lang": "es",
+ "value": "Una referencia controlada externamente a un recurso en otra esfera en Fortinet FortiManager anterior a la versi\u00f3n 7.4.3, FortiMail anterior a la versi\u00f3n 7.0.3, FortiAnalyzer anterior a la versi\u00f3n 7.4.3, FortiVoice versi\u00f3n 7.0.0, 7.0.1 y anterior a 6.4.8, FortiProxy anterior a la versi\u00f3n 7.0.4, FortiRecorder versi\u00f3n 6.4.0 a 6.4.2 y anterior a 6.0.10, FortiAuthenticator versi\u00f3n 6.4.0 a 6.4.1 y anterior a 6.3.3, FortiNDR versi\u00f3n 7.2.0 anterior a 7.1.0, FortiWLC anterior a la versi\u00f3n 8.6.4, FortiPortal anterior a la versi\u00f3n 6.0.9, FortiOS versi\u00f3n 7.2.0 y anterior a 7.0.5, FortiADC versi\u00f3n 7.0.0 a 7.0.1 y anterior 6.2.3, FortiDDoS anterior a la versi\u00f3n 5.5.1, FortiDDoS-F anterior a la versi\u00f3n 6.3.3, FortiTester anterior a la versi\u00f3n 7.2.1, FortiSOAR anterior a la versi\u00f3n 7.2.2 y FortiSwitch anterior a la versi\u00f3n 6.3.3 permiten a los atacantes envenenar cach\u00e9s web a trav\u00e9s de solicitudes HTTP manipulado, donde el encabezado `Host` apunta a un servidor web arbitrario."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20002.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20002.json
index 6cb9a5bbebc..4e778317db4 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20002.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20002.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20002",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:12.450",
"lastModified": "2024-11-21T07:40:19.027",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -316,7 +316,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20003.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20003.json
index 738a4854d0e..1bd68270fb9 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20003.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20003.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20003",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:09.477",
"lastModified": "2024-11-21T07:40:19.190",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -304,7 +304,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbw-auth-bypass-ggnAfdZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20004.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20004.json
index e6e0b7975e9..276c6148c3e 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20004.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20004.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20004",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:24.657",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20005.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20005.json
index d57d81750ee..7724c1450a8 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20005.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20005.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20005",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T17:15:10.847",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20006.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20006.json
index 68876024c91..4df8a83d9b1 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20006.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20006.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20006",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-06-28T15:15:09.387",
"lastModified": "2024-11-21T07:40:19.593",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -149,7 +149,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssl-dos-uu7mV5p6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20007.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20007.json
index 740584c10ad..1c22ba0dfae 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20007.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20007.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20007",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:12.757",
"lastModified": "2024-11-21T07:40:19.730",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -198,7 +198,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rcedos-7HjP74jD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20008.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20008.json
index c080ae39c2a..e6e2148db0f 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20008.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20008.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20008",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:13.057",
"lastModified": "2024-11-21T07:40:19.863",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -416,7 +416,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20009.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20009.json
index 9c07de94d18..5bc8472296b 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20009.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20009.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20009",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-01T08:15:11.767",
"lastModified": "2024-11-21T07:40:20.017",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -153,7 +153,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-privesc-9DVkFpJ8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20010.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20010.json
index bd3566172b6..3ee9e235126 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20010.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20010.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20010",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:13.340",
"lastModified": "2024-11-21T07:40:20.160",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -123,7 +123,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-sql-rpPczR8n",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20011.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20011.json
index d800a148e56..7ae52616607 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20011.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20011.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20011",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-02-23T20:15:13.090",
"lastModified": "2024-11-21T07:40:20.303",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -113,7 +113,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-csrfv-DMx6KSwV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20012.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20012.json
index 9417b4d9fe5..6c5d7675087 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20012.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20012.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20012",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-02-23T20:15:13.247",
"lastModified": "2024-11-21T07:40:20.440",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -238,7 +238,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-elyfex-dos-gfvcByx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20013.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20013.json
index 61cf0b43d76..d06f773eae0 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20013.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20013.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20013",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:09.750",
"lastModified": "2024-11-21T07:40:20.583",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ivpa-cmdinj-C5XRbbOy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20014.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20014.json
index cf22a88f784..5875b78ada8 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20014.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20014.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20014",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-01T08:15:11.833",
"lastModified": "2024-11-21T07:40:20.720",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -98,7 +98,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-dnsdos-bYscZOsu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20015.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20015.json
index a3ba18a70b0..40b7931277d 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20015.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20015.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20015",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-02-23T20:15:13.333",
"lastModified": "2024-11-21T07:40:20.853",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -669,7 +669,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxfp-cmdinj-XXBZjtR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20016.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20016.json
index 5829654fc1f..6c004ac8512 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20016.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20016.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20016",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-02-23T20:15:13.407",
"lastModified": "2024-11-21T07:40:20.983",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -520,7 +520,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsm-bkpsky-H8FCQgsA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20017.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20017.json
index 08521712439..a39fb107f79 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20017.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20017.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20017",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:10.353",
"lastModified": "2024-11-21T07:40:21.120",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ivpa-cmdinj-C5XRbbOy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20018.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20018.json
index db471797e5a..abc587a457c 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20018.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20018.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20018",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:13.633",
"lastModified": "2024-11-21T07:40:21.247",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -702,7 +702,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-auth-bypass-pSqxZRPR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20019.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20019.json
index 654538729d2..bcdd2ef56a7 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20019.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20019.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20019",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:13.910",
"lastModified": "2024-11-21T07:40:21.427",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -114,7 +114,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-xss-EzqDXqG4",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20020.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20020.json
index 9ec16d46449..57be06787b3 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20020.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20020.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20020",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:14.197",
"lastModified": "2024-11-21T07:40:21.823",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -110,7 +110,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-dos-HpkeYzp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20021.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20021.json
index f95e86bd1c6..a481b4ac695 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20021.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20021.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20021",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T15:15:06.760",
"lastModified": "2024-11-21T07:40:22.173",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-os-injection-pxhKsDM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20022.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20022.json
index 2bb604178b2..f96ea848ed7 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20022.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20022.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20022",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T16:15:07.547",
"lastModified": "2024-11-21T07:40:22.303",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-os-injection-pxhKsDM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20023.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20023.json
index 447c863879f..d90a512750d 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20023.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20023.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20023",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T16:15:07.593",
"lastModified": "2024-11-21T07:40:22.423",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-os-injection-pxhKsDM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20024.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20024.json
index c16c6fbd6b2..2eb4ce6ccb4 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20024.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20024.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20024",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:09.590",
"lastModified": "2024-11-21T07:40:22.540",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -6265,7 +6265,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20025.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20025.json
index 25de37360f9..362441f923f 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20025.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20025.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20025",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:14.490",
"lastModified": "2024-11-21T07:40:22.940",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20026.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20026.json
index a78f668c1df..706a9abc29e 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20026.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20026.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20026",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:14.813",
"lastModified": "2024-11-21T07:40:23.080",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20027.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20027.json
index 1e4ef7808d0..57bc6edd145 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20027.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20027.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20027",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:13.857",
"lastModified": "2024-11-21T07:40:23.213",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1219,7 +1219,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipv4-vfr-dos-CXxtFacb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20028.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20028.json
index 1efc81bcb8c..2041902924f 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20028.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20028.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20028",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-06-28T15:15:09.457",
"lastModified": "2024-11-21T07:40:23.390",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20029.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20029.json
index 520ca134f99..522e95fb2ab 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20029.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20029.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20029",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:13.940",
"lastModified": "2024-11-21T07:40:23.523",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -339,7 +339,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-sABD8hcU",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20030.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20030.json
index 50e54fd0494..e0b6e9eff70 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20030.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20030.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20030",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T16:15:07.637",
"lastModified": "2024-11-21T07:40:23.663",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-inj-GecEHY58",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20031.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20031.json
index 29c24194c44..205b98736b2 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20031.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20031.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20031",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:08.770",
"lastModified": "2024-11-21T07:40:23.797",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -171,7 +171,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-snort3-8U4HHxH8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20032.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20032.json
index ac36e2887c7..1d0619bdd0a 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20032.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20032.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20032",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-01T08:15:11.907",
"lastModified": "2024-11-21T07:40:23.950",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -226,7 +226,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20033.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20033.json
index 535b6872d33..b6f68cec14a 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20033.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20033.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20033",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:10.687",
"lastModified": "2024-11-21T07:40:24.093",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1013,7 +1013,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cat3k-dos-ZZA4Gb3r",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20034.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20034.json
index dd4a4cddff2..e72d8d75f31 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20034.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20034.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20034",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:10.793",
"lastModified": "2024-11-21T07:40:24.270",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -113,7 +113,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20035.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20035.json
index 6cbcd5adc7f..22516f39909 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20035.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20035.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20035",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:14.030",
"lastModified": "2024-11-21T07:40:24.403",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -299,7 +299,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sdwan-VQAhEjYw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20036.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20036.json
index 1083f8f2322..36fece38f26 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20036.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20036.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20036",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:24.950",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-CAeLFk6V",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20037.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20037.json
index 799b8cd84ce..d32a3fc4269 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20037.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20037.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20037",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:15.180",
"lastModified": "2024-11-21T07:40:24.653",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-fZyVjJtG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20038.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20038.json
index 5ab4cb5d4bb..93b4446fd8c 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20038.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20038.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20038",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:15.493",
"lastModified": "2024-11-21T07:40:24.770",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-fZyVjJtG",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20039.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20039.json
index 1739991b51f..422434bf3e1 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20039.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20039.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20039",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:25.157",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-CAeLFk6V",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20040.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20040.json
index 149472447a9..c0996b92228 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20040.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20040.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20040",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:15.793",
"lastModified": "2024-11-21T07:40:24.957",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-path-trvsl-zjBeMkZg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20041.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20041.json
index ad9759b50a6..180848b9de1 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20041.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20041.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20041",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T17:15:10.917",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -146,7 +146,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20042.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20042.json
index 1ff401e04c5..ba04fa4379b 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20042.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20042.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20042",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:08.843",
"lastModified": "2024-11-21T07:40:25.200",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -361,7 +361,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssl-dos-kxG8mpUA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20043.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20043.json
index 8ba63cb06fe..6038934e043 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20043.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20043.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20043",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:16.040",
"lastModified": "2024-11-21T07:40:25.367",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cxagent-gOq9QjqZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20044.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20044.json
index ef7d9f4e396..c21bc8e9357 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20044.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20044.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20044",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:16.370",
"lastModified": "2024-11-21T07:40:25.490",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cxagent-gOq9QjqZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20045.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20045.json
index ae7cd3c7bb5..61259ec72d7 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20045.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20045.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20045",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:16.713",
"lastModified": "2024-11-21T07:40:25.607",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -226,7 +226,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-cmd-exe-n47kJQLE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20046.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20046.json
index b11e3d2345e..bb120263861 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20046.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20046.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20046",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-09T18:15:11.697",
"lastModified": "2024-11-21T07:40:25.733",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -185,7 +185,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20047.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20047.json
index 90aefa40e17..63029f120bb 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20047.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20047.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20047",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:17.063",
"lastModified": "2024-11-21T07:40:25.943",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -158,7 +158,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lldp-memlk-McOecPT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20048.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20048.json
index a7921c6cac2..f4fb533ade5 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20048.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20048.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20048",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:08.907",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -152,7 +152,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-29MP49hN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20049.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20049.json
index e4f14390949..934468ef3a3 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20049.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20049.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20049",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-09T22:15:52.200",
"lastModified": "2024-11-21T07:40:26.213",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -177,7 +177,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bfd-XmRescbT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20050.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20050.json
index c3cbd0d2092..a9e17a21fc5 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20050.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20050.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20050",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-02-23T20:15:13.483",
"lastModified": "2024-11-21T07:40:26.350",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1008,7 +1008,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cli-cmdinject-euQVK9u",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20051.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20051.json
index 1c1e82d0f41..a2a560464af 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20051.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20051.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20051",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T17:15:07.530",
"lastModified": "2024-11-21T07:40:26.517",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -120,7 +120,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-pdng-dos-KmzwEy2Q",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20052.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20052.json
index 727d924d249..fbbfd0a5236 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20052.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20052.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20052",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-01T08:15:11.980",
"lastModified": "2024-11-21T07:40:26.643",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -199,7 +199,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-xxe-TcSZduhN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20053.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20053.json
index 087a2ee7566..b1956a11b87 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20053.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20053.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20053",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-01T08:15:12.057",
"lastModified": "2024-11-21T07:40:26.780",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -98,7 +98,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nexus-dashboard-xss-xc5BcgsQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20055.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20055.json
index ae8366f7db3..f2c340ad6e4 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20055.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20055.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20055",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:14.127",
"lastModified": "2024-11-21T07:40:26.907",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-privesc-QFXe74RS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20056.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20056.json
index 4e917511ad0..d62105ab80f 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20056.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20056.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20056",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:14.220",
"lastModified": "2024-11-21T07:40:27.043",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -455,7 +455,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-cli-dos-tc2EKEpu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20057.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20057.json
index 9d837308588..5731177b413 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20057.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20057.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20057",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:17.377",
"lastModified": "2024-11-21T07:40:27.190",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -168,7 +168,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WbMQqNJh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20058.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20058.json
index 47d024ad156..9c579bfee31 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20058.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20058.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20058",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:17.633",
"lastModified": "2024-11-21T07:40:27.327",
"vulnStatus": "Modified",
@@ -40,7 +40,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -63,7 +63,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -165,7 +165,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-xss-Omm8jyBX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20059.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20059.json
index f2781abdb02..60a36d15395 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20059.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20059.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20059",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:14.303",
"lastModified": "2024-11-21T07:40:27.463",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -105,7 +105,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-infodisc-pe7zAbdR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20060.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20060.json
index 7630aa71323..d1fef14711c 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20060.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20060.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20060",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:25.357",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pcd-xss-jDXpjm7",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20061.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20061.json
index 1f7fa1410e6..1a6b3b462a6 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20061.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20061.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20061",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-03T16:15:09.990",
"lastModified": "2024-11-21T07:40:27.663",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -113,7 +113,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-infodisc-ssrf-84ZBmwVk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20062.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20062.json
index e6cb2e88d5c..b2eb6667cbf 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20062.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20062.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20062",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-03T16:15:10.093",
"lastModified": "2024-11-21T07:40:27.790",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -113,7 +113,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-infodisc-ssrf-84ZBmwVk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20063.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20063.json
index 74e35528711..6a8f466ed58 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20063.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20063.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20063",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:08.967",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -187,7 +187,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-fmc-code-inj-wSHrgz8L",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20064.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20064.json
index 5b87045b6ca..d715fee7eaf 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20064.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20064.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20064",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-09T22:15:52.277",
"lastModified": "2024-11-21T07:40:28.087",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -368,7 +368,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-load-infodisc-9rdOr5Fq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20065.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20065.json
index b721c5b395c..1d176a17591 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20065.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20065.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20065",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:14.393",
"lastModified": "2024-11-21T07:40:28.227",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1464,7 +1464,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-priv-escalate-Xg8zkyPk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20066.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20066.json
index 74ccb479960..985da0f010e 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20066.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20066.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20066",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:14.547",
"lastModified": "2024-11-21T07:40:28.413",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1469,7 +1469,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-pthtrv-es7GSb9V",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20067.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20067.json
index 4d1f8c804ef..5b581e8877f 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20067.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20067.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20067",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:14.660",
"lastModified": "2024-11-21T07:40:28.577",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -332,7 +332,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-dos-wFujBHKw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20068.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20068.json
index ba9cc4c68bc..4bc82b667b1 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20068.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20068.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20068",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T16:15:07.680",
"lastModified": "2024-11-21T07:40:28.720",
"vulnStatus": "Modified",
@@ -36,7 +36,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -59,7 +59,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -100,7 +100,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-pi-xss-PU6dnfD9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20069.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20069.json
index e762014bcff..7f9856aeac9 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20069.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20069.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20069",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-03T16:15:10.167",
"lastModified": "2024-11-21T07:40:28.840",
"vulnStatus": "Modified",
@@ -36,7 +36,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -59,7 +59,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-pi-epnm-xss-mZShH2J",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20070.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20070.json
index aca6db5fe85..e0426943b8a 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20070.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20070.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20070",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:09.027",
"lastModified": "2024-11-21T07:40:28.977",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-snort3-uAnUntcV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20071.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20071.json
index a4296300fb8..10c7bece357 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20071.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20071.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20071",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:09.090",
"lastModified": "2024-11-21T07:40:29.093",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -255,7 +255,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-ftd-zXYtnjOM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20072.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20072.json
index bc5485141da..7ecd2eb5807 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20072.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20072.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20072",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:14.727",
"lastModified": "2024-11-21T07:40:29.253",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -107,7 +107,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-gre-crash-p6nE5Sq5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20073.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20073.json
index 33002083343..874364babfd 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20073.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20073.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20073",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T16:15:07.720",
"lastModified": "2024-11-21T07:40:29.387",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -194,7 +194,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-afu-EXxwA65V",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20074.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20074.json
index c01b9cf4248..fc71ba5b904 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20074.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20074.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20074",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T17:15:10.983",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20075.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20075.json
index ad1ec8925c3..3fb4722fcb0 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20075.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20075.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20075",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-01T08:15:12.283",
"lastModified": "2024-11-21T07:40:29.687",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-privesc-9DVkFpJ8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20076.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20076.json
index 111defaa2bf..d24bb94b743 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20076.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20076.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20076",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-02-12T04:15:19.287",
"lastModified": "2024-11-21T07:40:29.813",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -449,7 +449,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-8whGn5dL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20077.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20077.json
index fc13c6cc49d..850f85ebd33 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20077.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20077.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20077",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:09.667",
"lastModified": "2024-11-21T07:40:29.950",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-dwnld-Srcdnkd2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20078.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20078.json
index caf4bb6bc43..662cc5b394d 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20078.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20078.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20078",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-03T16:15:10.277",
"lastModified": "2024-11-21T07:40:30.083",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -558,7 +558,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20079.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20079.json
index ccf6a99ec25..0a6634c10f1 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20079.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20079.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20079",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-03T16:15:10.380",
"lastModified": "2024-11-21T07:40:30.230",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -670,7 +670,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20080.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20080.json
index c4e84bf3503..81c8c13b5a9 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20080.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20080.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20080",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:14.797",
"lastModified": "2024-11-21T07:40:30.387",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -4352,7 +4352,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dhcpv6-dos-44cMvdDK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20081.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20081.json
index 7a1e90f0ffb..c3169d74c6a 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20081.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20081.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20081",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:14.873",
"lastModified": "2024-11-21T07:40:30.673",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3224,7 +3224,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftdios-dhcpv6-cli-Zf3zTv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20082.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20082.json
index e27acf657c1..23c3a460a8b 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20082.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20082.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20082",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:14.953",
"lastModified": "2024-11-21T07:40:30.893",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -332,7 +332,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9300-spi-ace-yejYgnNQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20083.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20083.json
index a1f8cdca5b6..aa9c032066c 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20083.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20083.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20083",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:09.143",
"lastModified": "2024-11-21T07:40:31.057",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -152,7 +152,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-icmpv6-dos-4eMkLuN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20084.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20084.json
index 1d55af30a2c..89eb3252e62 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20084.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20084.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20084",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-22T17:15:18.317",
"lastModified": "2024-11-21T07:40:31.210",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -282,7 +282,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-endpoint-dos-RzOgFKnd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20085.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20085.json
index 65c1ee459a7..ea7a756e2a1 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20085.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20085.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20085",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-01T08:15:12.353",
"lastModified": "2024-11-21T07:40:31.370",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-ubfHG75C",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20086.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20086.json
index d1d691e08b0..446b0380959 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20086.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20086.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20086",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T17:15:11.057",
"lastModified": "2024-11-21T07:40:31.500",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1221,7 +1221,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-icmpv6-t5TzqwNd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20087.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20087.json
index fcdf18ae210..dbf250dc905 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20087.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20087.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20087",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:09.750",
"lastModified": "2024-11-21T07:40:31.707",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-dwnld-Srcdnkd2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20088.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20088.json
index 67ae8242baf..debf0b59dac 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20088.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20088.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20088",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-03T16:15:10.453",
"lastModified": "2024-11-21T07:40:31.847",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-finesse-proxy-dos-vY5dQhrV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20089.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20089.json
index f786117a10c..cf70c09c6b4 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20089.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20089.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20089",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-02-23T20:15:13.557",
"lastModified": "2024-11-21T07:40:31.967",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -409,7 +409,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aci-lldp-dos-ySCNZOpX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20090.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20090.json
index 6e6ab771ff6..e5dbdf1a583 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20090.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20090.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20090",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:25.560",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20091.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20091.json
index fe4f53fdddb..af3631fd397 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20091.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20091.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20091",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:25.770",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20092.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20092.json
index 81a6d8b4817..341bb742528 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20092.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20092.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20092",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:25.980",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20093.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20093.json
index bdb5173b623..6d585c370eb 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20093.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20093.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20093",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:26.187",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20094.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20094.json
index 74d453ea479..1019f0b62de 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20094.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20094.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20094",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:26.390",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20095.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20095.json
index af9c26fa633..bc7f1a33d27 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20095.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20095.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20095",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:09.207",
"lastModified": "2024-11-21T07:40:32.480",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -991,7 +991,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-dos-3GhZQBAS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20096.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20096.json
index f36a86e86d9..0043101a5bb 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20096.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20096.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20096",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:07.840",
"lastModified": "2024-11-21T07:40:32.660",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -98,7 +98,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-xss-GO9L9xxr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20097.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20097.json
index 484ec1a8c99..73c30e4d239 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20097.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20097.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20097",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:15.027",
"lastModified": "2024-11-21T07:40:32.780",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -455,7 +455,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironetap-cmdinj-6bjT4FL8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20098.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20098.json
index bd32e170a7c..0e1426f76fd 100644
--- a/CVE-2023/CVE-2023-200xx/CVE-2023-20098.json
+++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20098.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20098",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-09T18:15:11.760",
"lastModified": "2024-11-21T07:40:32.920",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-wfnqmYhN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20100.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20100.json
index d94c9dcb27b..53a4293d7c3 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20100.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20100.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20100",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:15.103",
"lastModified": "2024-11-21T07:40:33.040",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -154,7 +154,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9800-apjoin-dos-nXRHkt5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20101.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20101.json
index 744169fcf2f..2635d430079 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20101.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20101.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20101",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-10-04T17:15:09.837",
"lastModified": "2024-11-21T07:40:33.160",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -101,7 +101,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cer-priv-esc-B9t3hqk9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20102.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20102.json
index e4d58116805..b1f991a2154 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20102.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20102.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20102",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:07.880",
"lastModified": "2024-11-21T07:40:33.280",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -125,7 +125,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealthsmc-rce-sfNBPjcS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20103.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20103.json
index 2ea5c837340..77056e320bc 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20103.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20103.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20103",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:07.927",
"lastModified": "2024-11-21T07:40:33.403",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -98,7 +98,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealth-rce-BDwXFK9C",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20104.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20104.json
index 0f69aa754dc..e75647f7cc0 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20104.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20104.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20104",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-03T16:15:10.523",
"lastModified": "2024-11-21T07:40:33.527",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-Yn8HHsMJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20105.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20105.json
index 883a0b7dcaa..c81b52fe3d4 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20105.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20105.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20105",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-06-28T15:15:09.517",
"lastModified": "2024-11-21T07:40:33.647",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -114,7 +114,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-priv-esc-Ls2B9t7b",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20106.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20106.json
index 5b7c8c955f5..e078fad5059 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20106.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20106.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20106",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:09.820",
"lastModified": "2024-11-21T07:40:33.787",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-delete-read-PK5ghDDd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20107.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20107.json
index d28be63ba88..8205cdaf014 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20107.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20107.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20107",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:15.197",
"lastModified": "2024-11-21T07:40:33.907",
"vulnStatus": "Modified",
@@ -36,7 +36,7 @@
],
"cvssMetricV30": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
@@ -59,7 +59,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa5500x-entropy-6v9bHVYP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20108.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20108.json
index c1b536287c8..386191b0806 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20108.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20108.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20108",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-06-28T15:15:09.577",
"lastModified": "2024-11-21T07:40:34.027",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imp-dos-49GL7rzT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20109.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20109.json
index f354caaeca4..3e4baf9e67a 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20109.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20109.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20109",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:10.860",
"lastModified": "2024-11-21T07:40:34.167",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -65,7 +65,7 @@
"cisaVulnerabilityName": "Cisco IOS and IOS XE Group Encrypted Transport VPN Out-of-Bounds Write Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -5310,7 +5310,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-getvpn-rce-g8qR68sx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20110.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20110.json
index db9e158f557..26e156b07d1 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20110.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20110.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20110",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:09.900",
"lastModified": "2024-11-21T07:40:34.660",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -98,7 +98,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssm-sql-X9MmjSYh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20111.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20111.json
index 7eed73e66db..e7aa9b65eba 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20111.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20111.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20111",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:10.433",
"lastModified": "2024-11-21T07:40:34.787",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -218,7 +218,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-credentials-tkTO3h3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20112.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20112.json
index e7864e110e6..bb439c66e6a 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20112.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20112.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20112",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:15.267",
"lastModified": "2024-11-21T07:40:34.933",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -950,7 +950,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-assoc-dos-D2SunWK2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20113.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20113.json
index d383852c19c..d1814554da2 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20113.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20113.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20113",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-03-23T17:15:15.343",
"lastModified": "2024-11-21T07:40:35.150",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -108,7 +108,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-csrf-76RDbLEh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20114.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20114.json
index a6f3e6ad65f..2c2da0efc19 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20114.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20114.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20114",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T17:15:11.147",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-file-download-7js4ug2J",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20115.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20115.json
index f76f51fcd21..8e6ed4194e7 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20115.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20115.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20115",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-23T19:15:07.587",
"lastModified": "2024-11-21T07:40:35.413",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -654,7 +654,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-sftp-xVAp5Hfd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20116.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20116.json
index ce98edbe537..54bf5fa5e05 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20116.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20116.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20116",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-06-28T15:15:09.640",
"lastModified": "2024-11-21T07:40:35.597",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,7 +132,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-dos-4Ag3yWbD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20117.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20117.json
index 19d12a65035..13341d60821 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20117.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20117.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20117",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:07.970",
"lastModified": "2024-11-21T07:40:35.757",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv32x-cmdinject-cKQsZpxL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20118.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20118.json
index cc2025b3c03..a21938ca110 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20118.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20118.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20118",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-13T07:15:21.080",
"lastModified": "2024-11-21T07:40:35.883",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -274,7 +274,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20119.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20119.json
index 430ad8e2b50..f6e601bb3cb 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20119.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20119.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20119",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-06-28T15:15:09.700",
"lastModified": "2024-11-21T07:40:36.027",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20120.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20120.json
index db09448b82a..7f2ce612f33 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20120.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20120.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20120",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-06-28T15:15:09.760",
"lastModified": "2024-11-21T07:40:36.147",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -167,7 +167,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20121.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20121.json
index 2fdc529d84f..19b72c98ea5 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20121.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20121.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20121",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:08.030",
"lastModified": "2024-11-21T07:40:36.270",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -109,7 +109,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-adeos-MLAyEcvk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20122.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20122.json
index 1d16f9c19ab..97b0242b5a4 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20122.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20122.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20122",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:08.087",
"lastModified": "2024-11-21T07:40:36.387",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-adeos-MLAyEcvk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20123.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20123.json
index 5b958b21e50..5730607ad17 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20123.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20123.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20123",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:08.147",
"lastModified": "2024-11-21T07:40:36.507",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -104,7 +104,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-replay-knuNKd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20124.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20124.json
index cb8938d5e8c..de0757802a8 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20124.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20124.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20124",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T18:15:07.590",
"lastModified": "2024-11-21T07:40:36.627",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv01x_rv32x_rce-nzAGWWDD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20125.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20125.json
index f6444a7c2de..35ac215dabe 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20125.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20125.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20125",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T15:15:05.347",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-tcp-dos-KEdJCxLs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20126.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20126.json
index 8b04dd51f08..b18b52c97fc 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20126.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20126.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20126",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-04T20:15:09.633",
"lastModified": "2024-11-21T07:40:37.103",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -109,7 +109,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spa-unauth-upgrade-UqhyTWW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20127.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20127.json
index d0ea4fa64bf..38d065d7ca4 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20127.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20127.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20127",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T18:15:07.640",
"lastModified": "2024-11-21T07:40:37.230",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -125,7 +125,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-eRPWAXLe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20128.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20128.json
index 01114d0b830..26cfa9a0222 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20128.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20128.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20128",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T18:15:07.687",
"lastModified": "2024-11-21T07:40:37.353",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -136,7 +136,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv32x-cmdinject-cKQsZpxL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20129.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20129.json
index 0d57a8e5bfe..b4da7f37cdc 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20129.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20129.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20129",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T18:15:07.747",
"lastModified": "2024-11-21T07:40:37.480",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -162,7 +162,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-eRPWAXLe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20130.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20130.json
index d65f0205973..e94e7b697ca 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20130.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20130.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20130",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T18:15:07.803",
"lastModified": "2024-11-21T07:40:37.600",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -162,7 +162,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-eRPWAXLe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20131.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20131.json
index 234468bfd3a..f6c2fc059d2 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20131.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20131.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20131",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T18:15:07.853",
"lastModified": "2024-11-21T07:40:37.737",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -162,7 +162,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-eRPWAXLe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20132.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20132.json
index 704a8998570..4c741d759ea 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20132.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20132.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20132",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T18:15:07.907",
"lastModified": "2024-11-21T07:40:37.860",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wbx-sxss-fupl-64uHbcm5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20133.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20133.json
index a8fa5f17335..32c6ed4ace1 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20133.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20133.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20133",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-07-07T20:15:09.887",
"lastModified": "2024-11-21T07:40:37.990",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -252,7 +252,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxsscsrf-2L24bBx6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20134.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20134.json
index 6ca56018e41..7ca9cdd0fbf 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20134.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20134.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20134",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T18:15:07.957",
"lastModified": "2024-11-21T07:40:38.120",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wbx-sxss-fupl-64uHbcm5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20135.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20135.json
index 4b9cc8c1409..af2b7b0ab63 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20135.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20135.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20135",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-13T17:15:09.253",
"lastModified": "2024-11-21T07:40:38.240",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -110,7 +110,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lnt-L9zOkBz5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20136.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20136.json
index 2bba6b41a99..ca8cbcca9e2 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20136.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20136.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20136",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-06-28T15:15:09.820",
"lastModified": "2024-11-21T07:40:38.363",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -98,7 +98,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csw-auth-openapi-kTndjdNX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20137.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20137.json
index ffd6ce3a787..ed48c441022 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20137.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20137.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20137",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:08.663",
"lastModified": "2024-11-21T07:40:38.490",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20138.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20138.json
index de8ed0e5655..137144b6ae7 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20138.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20138.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20138",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:08.727",
"lastModified": "2024-11-21T07:40:38.623",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20139.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20139.json
index b417bf89634..cc889299af0 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20139.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20139.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20139",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:08.780",
"lastModified": "2024-11-21T07:40:38.747",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20140.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20140.json
index 87063d68478..c47a7e97410 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20140.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20140.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20140",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:08.830",
"lastModified": "2024-11-21T07:40:38.873",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20141.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20141.json
index 980763b24c2..3fdbc5ad6e0 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20141.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20141.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20141",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:08.877",
"lastModified": "2024-11-21T07:40:38.993",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20142.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20142.json
index 6576e00471f..6d9506ac7cd 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20142.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20142.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20142",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:08.920",
"lastModified": "2024-11-21T07:40:39.123",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20143.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20143.json
index c85b3c99395..401c0175b98 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20143.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20143.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20143",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:08.973",
"lastModified": "2024-11-21T07:40:39.253",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20144.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20144.json
index a296096e066..7cd1b69e21e 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20144.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20144.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20144",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:09.017",
"lastModified": "2024-11-21T07:40:39.377",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20145.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20145.json
index 365a451ebb6..8d4665162fa 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20145.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20145.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20145",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:09.060",
"lastModified": "2024-11-21T07:40:39.503",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20146.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20146.json
index 8b2fe27f821..68acb0bf1b7 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20146.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20146.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20146",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:09.107",
"lastModified": "2024-11-21T07:40:39.647",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20147.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20147.json
index e140abdf178..d1201f69f44 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20147.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20147.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20147",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:09.167",
"lastModified": "2024-11-21T07:40:39.787",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20148.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20148.json
index e8e322737ad..e8eda9dc28f 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20148.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20148.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20148",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:09.220",
"lastModified": "2024-11-21T07:40:39.913",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20149.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20149.json
index 96c59a512cc..f50d0dd79f4 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20149.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20149.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20149",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:09.277",
"lastModified": "2024-11-21T07:40:40.040",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20150.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20150.json
index 56a127e2a96..60e70184868 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20150.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20150.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20150",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:09.317",
"lastModified": "2024-11-21T07:40:40.163",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20151.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20151.json
index 9cbe75cf9e8..07b4bb0596e 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20151.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20151.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20151",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:09.373",
"lastModified": "2024-11-21T07:40:40.290",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -244,7 +244,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20152.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20152.json
index 2dc3486ba04..c963c8f2dfc 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20152.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20152.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20152",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T18:15:08.003",
"lastModified": "2024-11-21T07:40:40.420",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-2XbOg9Dg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20153.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20153.json
index 2e74bac8e95..b0ca9d45a6f 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20153.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20153.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20153",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-04-05T19:15:09.467",
"lastModified": "2024-11-21T07:40:40.533",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -97,7 +97,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-2XbOg9Dg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20154.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20154.json
index a8a7534d749..a7041c16834 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20154.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20154.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20154",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T15:15:05.697",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cml-auth-bypass-4fUCCeG5",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20155.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20155.json
index 4aa6ad896c2..d9b7bba11bb 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20155.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20155.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20155",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T17:15:11.217",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-logview-dos-AYJdeX55",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20156.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20156.json
index e1c2c6ad944..d970a3a6ee1 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20156.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20156.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20156",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:09.973",
"lastModified": "2024-11-21T07:40:40.923",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -6265,7 +6265,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20157.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20157.json
index b8723800dac..d4bdcfe92dd 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20157.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20157.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20157",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:10.047",
"lastModified": "2024-11-21T07:40:41.260",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -6265,7 +6265,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20158.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20158.json
index a408fbb50b0..31a425d3936 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20158.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20158.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20158",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:10.123",
"lastModified": "2024-11-21T07:40:41.613",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -6265,7 +6265,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20159.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20159.json
index 8991227312e..6a544b2fa6f 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20159.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20159.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20159",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:10.190",
"lastModified": "2024-11-21T07:40:41.970",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -6265,7 +6265,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20160.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20160.json
index 9bb192bfbd4..28ce522dce6 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20160.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20160.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20160",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:10.267",
"lastModified": "2024-11-21T07:40:42.323",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -6265,7 +6265,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20161.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20161.json
index 1e497a4f9c6..16b356d5e03 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20161.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20161.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20161",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:10.337",
"lastModified": "2024-11-21T07:40:42.697",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -6265,7 +6265,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20162.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20162.json
index 730b4e82a03..866359cd1d4 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20162.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20162.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20162",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:10.413",
"lastModified": "2024-11-21T07:40:43.030",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -6265,7 +6265,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20163.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20163.json
index 6235f319586..40ba2acba33 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20163.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20163.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20163",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:10.480",
"lastModified": "2024-11-21T07:40:43.370",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -178,7 +178,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-sRQnsEU9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20164.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20164.json
index 9f34fa574b7..b8aa460860b 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20164.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20164.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20164",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:10.547",
"lastModified": "2024-11-21T07:40:43.500",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -178,7 +178,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-sRQnsEU9",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20166.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20166.json
index 9c563a12327..dc025d8c6d2 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20166.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20166.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20166",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:10.617",
"lastModified": "2024-11-21T07:40:43.620",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-traversal-ZTUgMYhu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20167.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20167.json
index 8abdb5fd7c8..b2e2ec02eca 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20167.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20167.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20167",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:10.690",
"lastModified": "2024-11-21T07:40:43.740",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-traversal-ZTUgMYhu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20168.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20168.json
index ac3455f716d..284dc024dde 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20168.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20168.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20168",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-23T19:15:07.777",
"lastModified": "2024-11-21T07:40:43.873",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -551,7 +551,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20169.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20169.json
index 02106ded5c9..044c727ca4d 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20169.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20169.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20169",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-23T19:15:07.893",
"lastModified": "2024-11-21T07:40:44.107",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -274,7 +274,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-n3_9k-isis-dos-FTCXB4Vb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20170.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20170.json
index 607d2b281bb..60d8a8bb53a 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20170.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20170.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20170",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:09.267",
"lastModified": "2024-11-21T07:40:44.240",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-QeXegrCw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20171.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20171.json
index 2d6c193b934..84072cbb51f 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20171.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20171.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20171",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:10.763",
"lastModified": "2024-11-21T07:40:44.377",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-delete-read-PK5ghDDd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20172.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20172.json
index fb7b59b8b96..ea06a8db016 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20172.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20172.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20172",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:10.830",
"lastModified": "2024-11-21T07:40:44.500",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-delete-read-PK5ghDDd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20173.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20173.json
index 280f6ad24e6..376e0f2865d 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20173.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20173.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20173",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:10.893",
"lastModified": "2024-11-21T07:40:44.627",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -178,7 +178,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-inj-696OZTCm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20174.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20174.json
index 32a964e56d2..5e6a363e567 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20174.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20174.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20174",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:10.957",
"lastModified": "2024-11-21T07:40:44.753",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -178,7 +178,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-inj-696OZTCm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20175.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20175.json
index 869c7a78eaa..8777d007ac4 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20175.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20175.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20175",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:09.330",
"lastModified": "2024-11-21T07:40:44.887",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -271,7 +271,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-QeXegrCw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20176.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20176.json
index a7341c3f21d..beea84566dd 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20176.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20176.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20176",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:10.923",
"lastModified": "2024-11-21T07:40:45.027",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -226,7 +226,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-click-ap-dos-wdcXkvnQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20177.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20177.json
index f6c8243b636..e5bf92b1944 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20177.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20177.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20177",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T17:15:11.287",
"lastModified": "2024-11-21T07:40:45.160",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -201,7 +201,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sa-ftd-snort3-urldos-OccFQTeX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20178.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20178.json
index a47d01ea35e..661c0ca3e2b 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20178.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20178.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20178",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-06-28T15:15:09.880",
"lastModified": "2024-11-21T07:40:45.287",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -104,7 +104,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-csc-privesc-wx4U4Kw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20179.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20179.json
index d2fdb2b4da3..537379d4864 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20179.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20179.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20179",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:10.987",
"lastModified": "2024-11-21T07:40:45.417",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -109,7 +109,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-html-3ZKh8d6x",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20180.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20180.json
index d70d5058bca..22ee89c4b8d 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20180.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20180.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20180",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-07-07T20:15:09.943",
"lastModified": "2024-11-21T07:40:45.563",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -252,7 +252,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxsscsrf-2L24bBx6",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20181.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20181.json
index 73b52d5a624..401fadbd5a1 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20181.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20181.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20181",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-03T22:15:10.737",
"lastModified": "2024-11-21T07:40:45.690",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -406,7 +406,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spa-web-multi-7kvPmu2F",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20182.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20182.json
index 30c63bd427c..a14eae2fbf7 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20182.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20182.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20182",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:11.023",
"lastModified": "2024-11-21T07:40:45.847",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -105,7 +105,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-multiple-kTQkGU3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20183.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20183.json
index 488a4759d56..07c3fed621b 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20183.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20183.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20183",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:11.090",
"lastModified": "2024-11-21T07:40:45.987",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -105,7 +105,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-multiple-kTQkGU3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20184.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20184.json
index 8446310a7c0..0842ce8c09c 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20184.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20184.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20184",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:11.150",
"lastModified": "2024-11-21T07:40:46.130",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -98,7 +98,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-multiple-kTQkGU3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20185.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20185.json
index 190bb94ac72..3e6b21bb548 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20185.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20185.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20185",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-07-12T14:15:09.720",
"lastModified": "2024-11-21T07:40:46.280",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -484,7 +484,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aci-cloudsec-enc-Vs5Wn2sX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20186.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20186.json
index 7dbc9f33b1c..debcbf4e270 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20186.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20186.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20186",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:11.050",
"lastModified": "2024-11-21T07:40:46.460",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -5086,7 +5086,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaascp-Tyj4fEJm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20187.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20187.json
index 1d2c0e52ee2..d34f2ee4dff 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20187.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20187.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20187",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:11.117",
"lastModified": "2024-11-21T07:40:46.903",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1143,7 +1143,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlre-H93FswRz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20188.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20188.json
index cbbd0979fae..7a6d6eaba63 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20188.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20188.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20188",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-06-28T15:15:09.943",
"lastModified": "2024-11-21T07:40:47.090",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -3376,7 +3376,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-sxss-OPYJZUmE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20189.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20189.json
index 4891c814eea..45c06b0f8fb 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20189.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20189.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20189",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-05-18T03:15:11.207",
"lastModified": "2024-11-21T07:40:47.317",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -6265,7 +6265,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20190.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20190.json
index 3f9a9e88144..77aa8c8c06e 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20190.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20190.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20190",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-13T17:15:09.357",
"lastModified": "2024-11-21T07:40:47.653",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-comp3acl-vGmp6BQ3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Exploit",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20191.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20191.json
index f3ad98aebfb..3cd7a4ead04 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20191.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20191.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20191",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-13T17:15:09.440",
"lastModified": "2024-11-21T07:40:47.793",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -114,7 +114,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnx-acl-PyzDkeYF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20192.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20192.json
index 548dac6c1e4..ff063ed20db 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20192.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20192.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20192",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-06-28T15:15:10.007",
"lastModified": "2024-11-21T07:40:47.917",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -114,7 +114,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-priv-esc-Ls2B9t7b",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20193.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20193.json
index 3175da439dd..826fca7fed6 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20193.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20193.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20193",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-07T20:15:07.473",
"lastModified": "2024-11-21T07:40:48.033",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -109,7 +109,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-KJLp2Aw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20194.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20194.json
index 4b385da9144..68a786350d7 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20194.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20194.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20194",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-07T20:15:07.593",
"lastModified": "2024-11-21T07:40:48.173",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -192,7 +192,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-KJLp2Aw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20195.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20195.json
index 3387d327925..7a0a073ddd8 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20195.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20195.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20195",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T17:15:11.357",
"lastModified": "2024-11-21T07:40:48.303",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -241,7 +241,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20196.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20196.json
index 591764cea76..86dc6a52c28 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20196.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20196.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20196",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:09.400",
"lastModified": "2024-11-21T07:40:48.440",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -241,7 +241,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20197.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20197.json
index 03c35f6ec03..ffff2085718 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20197.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20197.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20197",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:10.510",
"lastModified": "2024-11-21T07:40:48.563",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20198.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20198.json
index 758d7509fea..84af991804b 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20198.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20198.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20198",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-10-16T16:15:10.023",
"lastModified": "2024-11-21T07:40:48.700",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -65,7 +65,7 @@
"cisaVulnerabilityName": "Cisco IOS XE Web UI Privilege Escalation Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20199.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20199.json
index 267a8b4a804..2417bfe97c7 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20199.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20199.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20199",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-06-28T15:15:10.070",
"lastModified": "2024-11-21T07:40:48.870",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -99,7 +99,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-mac-bypass-OyZpVPnx",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20200.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20200.json
index e576b97183b..cdbb389a3e1 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20200.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20200.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20200",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-23T19:15:08.020",
"lastModified": "2024-11-21T07:40:48.977",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -325,7 +325,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fp-ucsfi-snmp-dos-qtv69NAO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20201.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20201.json
index 969d42b67f2..021f7ecb75d 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20201.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20201.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20201",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:10.750",
"lastModified": "2024-11-21T07:40:49.140",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -104,7 +104,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-BFjSRJP5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20202.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20202.json
index 9484ab8e73e..a06e9503c1f 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20202.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20202.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20202",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:11.177",
"lastModified": "2024-11-21T07:40:49.307",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -278,7 +278,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-wncd-HFGMsfSD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20203.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20203.json
index 15699c70ed3..8445b04a738 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20203.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20203.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20203",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:11.023",
"lastModified": "2024-11-21T07:40:49.437",
"vulnStatus": "Modified",
@@ -37,7 +37,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -84,7 +84,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-BFjSRJP5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20204.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20204.json
index 062ed35a217..3e68ee7393a 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20204.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20204.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20204",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-03T22:15:11.313",
"lastModified": "2024-11-21T07:40:49.627",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -123,7 +123,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-commpilot-xss-jC46sezF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20205.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20205.json
index 18319209bc1..a5fa451350e 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20205.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20205.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20205",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:11.127",
"lastModified": "2024-11-21T07:40:50.267",
"vulnStatus": "Modified",
@@ -37,7 +37,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -84,7 +84,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-BFjSRJP5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20206.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20206.json
index e56a466aee5..3c72881a71e 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20206.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20206.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20206",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T17:15:11.427",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -138,7 +138,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-sK2gkfvJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20207.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20207.json
index 3e364bc3b1c..f88a29d3ff7 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20207.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20207.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20207",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-07-12T14:15:09.793",
"lastModified": "2024-11-21T07:40:50.560",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-auth-info-JgkSWBLz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20208.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20208.json
index 7d9108c9eae..45a07ce16b7 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20208.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20208.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20208",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-21T19:15:08.567",
"lastModified": "2024-11-21T07:40:50.683",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -171,7 +171,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-mult-j-KxpNynR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20209.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20209.json
index 08688388e94..6d75e41bebc 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20209.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20209.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20209",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T21:15:09.650",
"lastModified": "2024-11-21T07:40:50.800",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -104,7 +104,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-injection-X475EbTQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20210.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20210.json
index 425b22fde3c..22da015dd2f 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20210.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20210.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20210",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-07-12T14:15:09.873",
"lastModified": "2024-11-21T07:40:51.007",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -674,7 +674,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-privesc-yw4ekrXW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20211.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20211.json
index 88d7e60988e..b7460a31ddf 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20211.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20211.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20211",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:11.337",
"lastModified": "2024-11-21T07:40:53.727",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-injection-g6MbwH2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20212.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20212.json
index 4ecfcd82672..0fbe07ce483 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20212.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20212.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20212",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-18T20:15:09.773",
"lastModified": "2024-11-21T07:40:53.953",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -108,7 +108,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20213.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20213.json
index dafb9748354..2fa83637da4 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20213.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20213.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20213",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T17:15:11.500",
"lastModified": "2024-11-21T07:40:54.080",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -221,7 +221,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20214.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20214.json
index 26cefc5cb57..d06ceb50f03 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20214.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20214.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20214",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-03T22:15:11.420",
"lastModified": "2024-11-21T07:40:54.210",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -132,7 +132,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-unauthapi-sphCLYPA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20215.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20215.json
index c9d7aff9be8..a8ad82eeb9f 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20215.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20215.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20215",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-03T22:15:11.513",
"lastModified": "2024-11-21T07:40:54.337",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -259,7 +259,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-bypass-vXvqwzsj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20216.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20216.json
index 1af6c7a86c0..5a17c902431 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20216.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20216.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20216",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-03T22:15:11.647",
"lastModified": "2024-11-21T07:40:54.493",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -195,7 +195,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-priv-esc-qTgUZOsQ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20217.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20217.json
index 8e6c50e2e24..aaba6c07d6c 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20217.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20217.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20217",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:11.437",
"lastModified": "2024-11-21T07:40:55.260",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-te-va-priv-esc-PUdgrx8E",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20218.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20218.json
index 646a7370ad4..0069b6070c0 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20218.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20218.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20218",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-03T22:15:11.770",
"lastModified": "2024-11-21T07:40:55.383",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -406,7 +406,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spa-web-multi-7kvPmu2F",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20219.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20219.json
index 01c963895f9..692eb12d664 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20219.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20219.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20219",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:09.460",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -145,7 +145,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmdinj-bTEgufOX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20220.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20220.json
index 8fd40c159b6..04e36a43090 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20220.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20220.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20220",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:09.523",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -152,7 +152,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmdinj-bTEgufOX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20221.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20221.json
index c81dbf14436..418408b0dfa 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20221.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20221.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20221",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:11.687",
"lastModified": "2024-11-21T07:40:55.780",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -4004,7 +4004,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-csrf-HOCmXW2c",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20222.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20222.json
index be018460fba..126e5397508 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20222.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20222.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20222",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:11.757",
"lastModified": "2024-11-21T07:40:56.013",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -104,7 +104,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-storedxss-tTjO62r",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20223.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20223.json
index dc3cdd454cc..3c5c33a0b02 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20223.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20223.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20223",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:11.240",
"lastModified": "2024-11-21T07:40:56.160",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-ins-acc-con-nHAVDRBZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20224.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20224.json
index 734ddfcddbf..cc77cadef9a 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20224.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20224.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20224",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:11.837",
"lastModified": "2024-11-21T07:40:56.263",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -98,7 +98,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thoueye-privesc-NVhHGwb3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20226.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20226.json
index 7c8760e9648..702019660fb 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20226.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20226.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20226",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:11.307",
"lastModified": "2024-11-21T07:40:56.363",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -293,7 +293,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appqoe-utd-dos-p8O57p5y",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20227.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20227.json
index e40314ed317..c286de4c394 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20227.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20227.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20227",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:11.370",
"lastModified": "2024-11-21T07:40:56.480",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -783,7 +783,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-l2tp-dos-eB5tuFmV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20228.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20228.json
index dbae8e3be4c..f1ee72f6e06 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20228.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20228.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20228",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T21:15:09.737",
"lastModified": "2024-11-21T07:40:56.623",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -253,7 +253,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-xss-UMYtYEtr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20229.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20229.json
index b95e7366c8b..b4e9597e1f8 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20229.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20229.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20229",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:12.213",
"lastModified": "2024-11-21T07:40:56.783",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -99,7 +99,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-dha-filewrite-xPMBMZAK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20230.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20230.json
index 72bf53fc7a2..aaa24ce9f61 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20230.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20230.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20230",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-23T19:15:08.133",
"lastModified": "2024-11-21T07:40:56.890",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-uapa-F4TAShk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20231.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20231.json
index 50f6b42bb5b..2fa1900c3ef 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20231.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20231.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20231",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:11.430",
"lastModified": "2024-11-21T07:40:57.000",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -803,7 +803,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdij-FzZAeXAy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20232.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20232.json
index 8189bbe1a4e..0296a4d51ba 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20232.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20232.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20232",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:12.597",
"lastModified": "2024-11-21T07:40:57.140",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -98,7 +98,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-wcp-JJeqDT3S",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20233.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20233.json
index fffa681d327..bc0b8f21b86 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20233.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20233.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20233",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-13T17:15:09.523",
"lastModified": "2024-11-21T07:40:57.257",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -128,7 +128,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xr-cfm-3pWN8MKt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20234.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20234.json
index dcb9a25f2e2..46184b74751 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20234.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20234.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20234",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-23T19:15:08.277",
"lastModified": "2024-11-21T07:40:57.383",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -314,7 +314,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-arbitrary-file-BLk6YupL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20235.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20235.json
index 48ad410f469..a8b53745f73 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20235.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20235.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20235",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-10-04T17:15:09.917",
"lastModified": "2024-11-21T07:40:57.567",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -204,7 +204,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rdocker-uATbukKn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20236.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20236.json
index 9c5d8614b73..d29c4319be3 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20236.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20236.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20236",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-13T17:15:09.607",
"lastModified": "2024-11-21T07:40:57.700",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -374,7 +374,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ipxe-sigbypass-pymfyqgB",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20237.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20237.json
index c13ee1786ba..0345881ebb3 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20237.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20237.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20237",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T22:15:12.777",
"lastModified": "2024-11-21T07:40:57.847",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -120,7 +120,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-intersight-forward-C45ncgqb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20238.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20238.json
index 865a4ce531d..32196155e42 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20238.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20238.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20238",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-06T18:15:08.043",
"lastModified": "2024-11-21T07:40:57.973",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -122,7 +122,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-auth-bypass-kCggMWhX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20239.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20239.json
index bfc6f8b2472..60655ab6223 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20239.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20239.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20239",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-22T17:16:02.760",
"lastModified": "2024-05-23T22:15:11.543",
"vulnStatus": "Rejected",
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20240.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20240.json
index 62299571742..4b1767d684d 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20240.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20240.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20240",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-22T17:15:18.520",
"lastModified": "2024-11-21T07:40:58.247",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -256,7 +256,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-accsc-dos-9SLzkZ8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20241.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20241.json
index 6ac19317b74..cdf667cb58a 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20241.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20241.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20241",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-22T17:15:18.740",
"lastModified": "2024-11-21T07:40:58.370",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -256,7 +256,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-accsc-dos-9SLzkZ8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20242.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20242.json
index d988542ca21..118bd24e47d 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20242.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20242.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20242",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-16T21:15:09.800",
"lastModified": "2024-11-21T07:40:58.500",
"vulnStatus": "Modified",
@@ -14,7 +14,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -57,7 +57,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -137,7 +137,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imp-xss-QtT4VdsK",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20243.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20243.json
index 459a0417386..a4a8006958d 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20243.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20243.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20243",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-06T18:15:08.133",
"lastModified": "2024-11-21T07:40:58.630",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -146,7 +146,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-radius-dos-W7cNn7gt",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20244.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20244.json
index 25a18b63551..2e22e06237b 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20244.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20244.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20244",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T17:15:11.577",
"lastModified": "2024-11-21T07:40:58.750",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -473,7 +473,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-intrusion-dos-DfT7wyGC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20245.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20245.json
index 56d235294ef..a5210d4a777 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20245.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20245.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20245",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T17:15:11.643",
"lastModified": "2024-11-21T07:40:58.890",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1156,7 +1156,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ac-acl-bypass-bwd7q6Gb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20246.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20246.json
index 12d78b34406..641f99511b8 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20246.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20246.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20246",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:09.583",
"lastModified": "2024-11-21T07:40:59.063",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-snort3acp-bypass-3bdR2BEh",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20247.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20247.json
index b789c9a33b9..6341318faaa 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20247.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20247.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20247",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:09.643",
"lastModified": "2024-11-21T07:40:59.200",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1251,7 +1251,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-multi-cert-dzA3h5PT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20248.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20248.json
index fa0e3f718da..c102b8027ac 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20248.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20248.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20248",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-24T21:15:46.510",
"lastModified": "2024-11-21T07:40:59.390",
"vulnStatus": "Awaiting Analysis",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-portal-xss-AXNeVg3s",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-portal-xss-AXNeVg3s",
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20249.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20249.json
index 337b2d29c84..0dd5ecf0af6 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20249.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20249.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20249",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-24T21:15:46.600",
"lastModified": "2024-11-21T07:40:59.573",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-portal-xss-AXNeVg3s",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-portal-xss-AXNeVg3s",
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20250.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20250.json
index 15dcc4c9504..2b64e64d78b 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20250.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20250.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20250",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-06T17:15:50.100",
"lastModified": "2024-11-21T07:40:59.683",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1014,7 +1014,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-stack-SHYv2f5N",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20251.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20251.json
index 288a9b22da0..f5fecbd01f8 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20251.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20251.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20251",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:11.493",
"lastModified": "2024-11-21T07:40:59.847",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -115,7 +115,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbw-dos-YSmbUqX3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20252.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20252.json
index 0dbb5501797..3251465bf69 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20252.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20252.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20252",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:11.553",
"lastModified": "2024-11-21T07:40:59.973",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20253.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20253.json
index 73e470e947a..c23d96a992a 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20253.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20253.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20253",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:11.620",
"lastModified": "2024-11-21T07:41:00.117",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -127,7 +127,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20254.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20254.json
index f7ea84a6fa9..b296cc53f19 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20254.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20254.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20254",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:11.690",
"lastModified": "2024-11-21T07:41:00.253",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -113,7 +113,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20255.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20255.json
index 970181edeaf..e8c9185c2de 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20255.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20255.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20255",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:09.700",
"lastModified": "2024-11-21T07:41:00.387",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cms-segfault-G6ES4Ve8",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20256.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20256.json
index c87593aa857..87d3d7f7046 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20256.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20256.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20256",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T17:15:11.717",
"lastModified": "2024-11-21T07:41:00.497",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -866,7 +866,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ac-acl-bypass-bwd7q6Gb",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20257.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20257.json
index deb6d435dae..2a004131655 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20257.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20257.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20257",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-17T17:15:09.960",
"lastModified": "2024-11-21T07:41:00.660",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20258.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20258.json
index ec2401b8cc1..5b411d9a49a 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20258.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20258.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20258",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-17T17:15:10.147",
"lastModified": "2024-11-21T07:41:00.830",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -108,7 +108,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20259.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20259.json
index bf27954da04..0c1f3d2136f 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20259.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20259.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20259",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-10-04T17:15:09.990",
"lastModified": "2024-11-21T07:41:00.970",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -141,7 +141,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-apidos-PGsDcdNF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20260.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20260.json
index a5d4448d3ac..b272f2ddb66 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20260.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20260.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20260",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-17T17:15:10.323",
"lastModified": "2024-11-21T07:41:01.097",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20261.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20261.json
index cc82ed7ca0b..84dc83495fe 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20261.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20261.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20261",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-10-18T17:15:08.467",
"lastModified": "2024-11-21T07:41:01.273",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -591,7 +591,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20262.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20262.json
index 10a978d84b1..64cd83c81a1 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20262.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20262.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20262",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:11.757",
"lastModified": "2024-11-21T07:41:01.443",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20263.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20263.json
index cd484d7757e..bd09e819e90 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20263.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20263.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20263",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-06T18:15:08.217",
"lastModified": "2024-11-21T07:41:01.603",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-redirect-UxLgqdUF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20264.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20264.json
index 5ab4cdb0792..8dbd30a2d78 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20264.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20264.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20264",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:09.757",
"lastModified": "2024-11-21T07:41:01.730",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -125,7 +125,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-saml-hijack-ttuQfyz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20265.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20265.json
index 495e8e24202..108eceb0d78 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20265.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20265.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20265",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-21T19:15:08.747",
"lastModified": "2024-11-21T07:41:01.880",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -200,7 +200,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uipphone-xss-NcmUykqA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20266.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20266.json
index 5f426b08846..e587caf0e5f 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20266.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20266.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20266",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-08-30T17:15:08.357",
"lastModified": "2024-11-21T07:41:02.020",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -146,7 +146,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-priv-esc-D8Bky5eg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20267.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20267.json
index 78c470b8a87..1784c91cfc7 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20267.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20267.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20267",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T18:15:09.810",
"lastModified": "2024-11-21T07:41:02.150",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdsnort3sip-bypass-LMz2ThKn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20268.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20268.json
index e0b6dd7e4c7..f065e109189 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20268.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20268.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20268",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-27T18:15:11.827",
"lastModified": "2024-12-12T18:15:21.377",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -200,7 +200,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-capwap-DDMCZS4m",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20269.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20269.json
index e4061cfbd26..7fc7b9b2fed 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20269.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20269.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20269",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-09-06T18:15:08.303",
"lastModified": "2024-11-21T07:41:02.433",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -65,7 +65,7 @@
"cisaVulnerabilityName": "Cisco Adaptive Security Appliance and Firepower Threat Defense Unauthorized Access Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -2565,7 +2565,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20270.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20270.json
index 8586988e6f4..ed16fd34f33 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20270.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20270.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20270",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-01T17:15:11.783",
"lastModified": "2024-11-21T07:41:02.670",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -156,7 +156,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-smbsnort3-dos-pfOjOYUV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20271.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20271.json
index f25903150c8..4e5f517039e 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20271.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20271.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20271",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-17T17:15:10.540",
"lastModified": "2024-11-21T07:41:02.800",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -118,7 +118,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20272.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20272.json
index df25ae695fd..7bbe54775b1 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20272.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20272.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20272",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-21T19:15:08.920",
"lastModified": "2024-11-21T07:41:02.977",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -161,7 +161,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-mult-j-KxpNynR",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20273.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20273.json
index 8305069ef74..40f781714dd 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20273.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20273.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20273",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-10-25T18:17:23.017",
"lastModified": "2024-11-21T07:41:03.110",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -65,7 +65,7 @@
"cisaVulnerabilityName": "Cisco IOS XE Web UI Command Injection Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -760,7 +760,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20274.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20274.json
index e5046f8ba11..b4e025cbb4a 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20274.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20274.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20274",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-11-21T19:15:09.087",
"lastModified": "2024-11-21T07:41:03.290",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -236,7 +236,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-php-authpriv-gEBwTvu5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20275.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20275.json
index 37000af710b..f74701a7a93 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20275.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20275.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2023-20275",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2023-12-12T18:15:16.520",
"lastModified": "2024-11-21T07:41:03.457",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1301,7 +1301,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-vpn-Y88QOm77",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26282.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26282.json
index dab1b0efbc6..c6c62ae64b0 100644
--- a/CVE-2023/CVE-2023-262xx/CVE-2023-26282.json
+++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26282.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-05T20:16:01.077",
"lastModified": "2024-11-21T07:51:03.267",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28512.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28512.json
index 2544d72f4b1..e33c8ff819d 100644
--- a/CVE-2023/CVE-2023-285xx/CVE-2023-28512.json
+++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28512.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-03T16:15:49.983",
"lastModified": "2024-11-21T07:55:15.773",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32340.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32340.json
index 5a9bbc2391f..0a225f5ceae 100644
--- a/CVE-2023/CVE-2023-323xx/CVE-2023-32340.json
+++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32340.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Sterling B2B Integrator 6.0.0.0 a 6.1.2.5 y 6.2.0.0 es vulnerable a ataques de cross-site scripting. Esta vulnerabilidad permite a los usuarios insertar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales en una sesi\u00f3n de confianza."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34412.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34412.json
index 2955852153f..b64b5717fdd 100644
--- a/CVE-2023/CVE-2023-344xx/CVE-2023-34412.json
+++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34412.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-08-17T14:15:09.700",
"lastModified": "2024-11-21T08:07:11.220",
- "vulnStatus": "Modified",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3454.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3454.json
index 2977c888bca..1dbf2626c79 100644
--- a/CVE-2023/CVE-2023-34xx/CVE-2023-3454.json
+++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3454.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-04-04T17:15:09.000",
"lastModified": "2024-11-21T08:17:18.173",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3572.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3572.json
index 9ec2097c190..f8c1f608b8d 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3572.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3572.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-08-08T07:15:10.840",
"lastModified": "2024-11-21T08:17:34.587",
- "vulnStatus": "Modified",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36998.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36998.json
index 62e81a3e1ed..3e25f467a10 100644
--- a/CVE-2023/CVE-2023-369xx/CVE-2023-36998.json
+++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36998.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The NextEPC MME <= 1.0.1 (fixed in commit a8492c9c5bc0a66c6999cb5a263545b32a4109df) contains a stack-based buffer overflow vulnerability in the Emergency Number List decoding method. An attacker may send a NAS message containing an oversized Emergency Number List value to the MME to overwrite the stack with arbitrary bytes. An attacker with a cellphone connection to any base station managed by the MME may exploit this vulnerability without having to authenticate with the LTE core."
+ },
+ {
+ "lang": "es",
+ "value": "El MME NextEPC <= 1.0.1 (corregido en commit a8492c9c5bc0a66c6999cb5a263545b32a4109df) contiene una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en el m\u00e9todo de decodificaci\u00f3n de la lista de n\u00fameros de emergencia. Un atacante puede enviar un mensaje NAS que contenga un valor de lista de n\u00fameros de emergencia de gran tama\u00f1o al MME para sobrescribir la pila con bytes arbitrarios. Un atacante con una conexi\u00f3n de tel\u00e9fono celular a cualquier estaci\u00f3n base administrada por el MME puede explotar esta vulnerabilidad sin tener que autenticarse con el n\u00facleo LTE."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37002.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37002.json
index 69a454a7f44..3380bf6c3e4 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37002.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37002.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `E-RAB Modification Indication` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Indicaci\u00f3n de modificaci\u00f3n de E-RAB\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37003.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37003.json
index 436fd42c78a..e2d68eb30a2 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37003.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37003.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `E-RAB Setup Response` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Respuesta de configuraci\u00f3n de E-RAB\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37004.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37004.json
index da130cbbcc6..c7e20cbd8d2 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37004.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37004.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `Initial Context Setup Response` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Respuesta de configuraci\u00f3n de contexto inicial\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37005.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37005.json
index b8b759bf595..dd850cb458b 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37005.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37005.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `Initial Context Setup Failure` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Error de configuraci\u00f3n de contexto inicial\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37006.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37006.json
index 5d65d8dc652..53775592c24 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37006.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37006.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `Handover Request Ack` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Handover Request Ack\" (confirmaci\u00f3n de solicitud de entrega) sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37007.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37007.json
index c1193db050a..6a4de66249b 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37007.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37007.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `Handover Cancel` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Cancelaci\u00f3n de entrega\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37008.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37008.json
index 4d247c7a3c2..efadd0b21da 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37008.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37008.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain a buffer overflow in the ASN.1 deserialization function of the S1AP handler. This buffer overflow causes type confusion in decoded fields, leading to invalid parsing and freeing of memory. An attacker may use this to crash an MME or potentially execute code in certain circumstances."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen un desbordamiento de b\u00fafer en la funci\u00f3n de deserializaci\u00f3n ASN.1 del controlador S1AP. Este desbordamiento de b\u00fafer provoca confusi\u00f3n de tipos en los campos decodificados, lo que genera un an\u00e1lisis no v\u00e1lido y la liberaci\u00f3n de memoria. Un atacante puede utilizar esto para bloquear un MME o potencialmente ejecutar c\u00f3digo en determinadas circunstancias."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37009.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37009.json
index d52be2463c8..7997977e6e2 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37009.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37009.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `Handover Notification` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Notificaci\u00f3n de transferencia\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37010.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37010.json
index 6e747c85244..1b962137853 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37010.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37010.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `eNB Status Transfer` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de `Transferencia de estado de eNB` sin el campo `MME_UE_S1AP_ID` ??requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37011.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37011.json
index 12aa02147e3..9fae9841e45 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37011.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37011.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `Handover Required` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje \"Handover Required\" (Se requiere entrega) sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37012.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37012.json
index d8548588fc5..e4984156ccc 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37012.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37012.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `Initial UE Message` message missing a required `PLMN Identity` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Mensaje inicial de UE\" sin el campo \"Identidad PLMN\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37015.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37015.json
index f194e03a921..7c1fd3ee39d 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37015.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37015.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `Path Switch Request` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Solicitud de cambio de ruta\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37016.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37016.json
index 9d942c54955..8314fc2eae6 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37016.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37016.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Modification Response` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Respuesta de modificaci\u00f3n de contexto de UE\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37017.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37017.json
index e0d24430d69..445a0a0a7a3 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37017.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37017.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `S1Setup Request` message missing a required `Global eNB ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Solicitud de configuraci\u00f3n de S1\" sin el campo \"ID de eNB global\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37018.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37018.json
index 22f91cf2cd4..5c51421096b 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37018.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37018.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Capability Info Indication` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una afirmaci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Indicaci\u00f3n de informaci\u00f3n de capacidad de UE\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37019.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37019.json
index 7305a00eadb..0dce8ceb097 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37019.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37019.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `S1Setup Request` message missing a required `Supported TAs` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Solicitud de configuraci\u00f3n de S1\" sin el campo \"TA compatibles\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37020.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37020.json
index ff03782d002..8371ce73b85 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37020.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37020.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Release Complete` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje \"UE Context Release Complete\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37021.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37021.json
index 8120d0a7831..e9da801beff 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37021.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37021.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME version <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Modification Failure` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "La versi\u00f3n 2.6.4 de Open5GS MME contiene una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Error de modificaci\u00f3n de contexto de UE\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37023.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37023.json
index 1fca0717fcc..c2a6fe5c981 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37023.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37023.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contain a reachable assertion in the `Uplink NAS Transport` packet handler. A packet missing its `MME_UE_S1AP_ID` field causes Open5gs to crash; an attacker may repeatedly send such packets to cause denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una afirmaci\u00f3n de alcance en el controlador de paquetes `Uplink NAS Transport`. Un paquete al que le falta el campo `MME_UE_S1AP_ID` ??hace que Open5gs se bloquee; un atacante puede enviar repetidamente dichos paquetes para provocar una denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37035.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37035.json
index a54e4c5d771..f0d02be0c6d 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37035.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37035.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T23:15:10.823",
"lastModified": "2025-01-22T15:15:12.017",
- "vulnStatus": "Undergoing Analysis",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `S1Setup Request` packet missing an expected `Global eNB ID` field."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de desreferencia de puntero nulo en la entidad de administraci\u00f3n m\u00f3vil (MME) en Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a atacantes adyacentes a la red bloquear la MME a trav\u00e9s de un paquete S1AP `S1Setup Request` que carece de un campo `Global eNB ID` esperado."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-377xx/CVE-2023-37777.json b/CVE-2023/CVE-2023-377xx/CVE-2023-37777.json
index 5f98cb1a3ef..69c30c546c7 100644
--- a/CVE-2023/CVE-2023-377xx/CVE-2023-37777.json
+++ b/CVE-2023/CVE-2023-377xx/CVE-2023-37777.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Synnefo Internet Management Software 2023 was discovered to contain a SQL injection vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Synnefo Internet Management Software 2023 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-378xx/CVE-2023-37857.json b/CVE-2023/CVE-2023-378xx/CVE-2023-37857.json
index e0165e28801..199b982f1f1 100644
--- a/CVE-2023/CVE-2023-378xx/CVE-2023-37857.json
+++ b/CVE-2023/CVE-2023-378xx/CVE-2023-37857.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-08-09T07:15:10.603",
"lastModified": "2024-11-21T08:12:19.860",
- "vulnStatus": "Modified",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37999.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37999.json
index 520d2c8937c..3ad1e0cd211 100644
--- a/CVE-2023/CVE-2023-379xx/CVE-2023-37999.json
+++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37999.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-17T07:15:57.750",
"lastModified": "2024-11-21T08:12:40.240",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json
index d156eaed016..a5254ade949 100644
--- a/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In multiple locations, there is a possible way to access media content belonging to another user due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En varias ubicaciones, existe una forma posible de acceder al contenido multimedia que pertenece a otro usuario debido a la falta de verificaci\u00f3n de permisos. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40132.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40132.json
index 83b1b856148..1e1263c95ea 100644
--- a/CVE-2023/CVE-2023-401xx/CVE-2023-40132.json
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40132.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In setActualDefaultRingtoneUri of RingtoneManager.java, there is a possible way to bypass content providers read permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En setActualDefaultRingtoneUri de RingtoneManager.java, existe una forma posible de eludir los permisos de lectura de los proveedores de contenido debido a la falta de una verificaci\u00f3n de permisos. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45908.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45908.json
index 25719f73cd5..56937b39a1b 100644
--- a/CVE-2023/CVE-2023-459xx/CVE-2023-45908.json
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45908.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T20:15:30.607",
"lastModified": "2025-01-21T20:15:30.607",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Homarr before v0.14.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Notebook widget."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Homarr anterior a v0.14.0 conten\u00eda una vulnerabilidad Cross-Site Scripting Almacenado (XSS) a trav\u00e9s del widget Notebook."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46401.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46401.json
index 5e2b6415c88..b13cfe3c70c 100644
--- a/CVE-2023/CVE-2023-464xx/CVE-2023-46401.json
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46401.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "KWHotel 0.47 is vulnerable to CSV Formula Injection in the invoice adding function."
+ },
+ {
+ "lang": "es",
+ "value": "KWHotel 0.47 es vulnerable a la inyecci\u00f3n de f\u00f3rmulas CSV en la funci\u00f3n de adici\u00f3n de facturas."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50309.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50309.json
index d776a9649b4..4053d221619 100644
--- a/CVE-2023/CVE-2023-503xx/CVE-2023-50309.json
+++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50309.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0\u00a0is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Sterling B2B Integrator 6.0.0.0 a 6.1.2.5 y 6.2.0.0 es vulnerable a cross-site scripting almacenado. Esta vulnerabilidad permite a los usuarios incorporar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n de confianza."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50733.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50733.json
index 5db52b33833..04c84e5191f 100644
--- a/CVE-2023/CVE-2023-507xx/CVE-2023-50733.json
+++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50733.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "7bc73191-a2b6-4c63-9918-753964601853",
"published": "2025-01-21T22:15:10.743",
"lastModified": "2025-01-21T22:15:10.743",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Server-Side Request Forgery (SSRF) vulnerability has been identified in the Web Services feature of newer\nLexmark devices."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad Server-Side Request Forgery (SSRF) en la funci\u00f3n de servicios web de los dispositivos Lexmark m\u00e1s nuevos."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50738.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50738.json
index 7c20aed6ed9..267374c4d52 100644
--- a/CVE-2023/CVE-2023-507xx/CVE-2023-50738.json
+++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50738.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "7bc73191-a2b6-4c63-9918-753964601853",
"published": "2025-01-17T21:15:09.660",
"lastModified": "2025-01-17T22:15:28.167",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A\u00a0new feature to prevent Firmware downgrades was recently added to some Lexmark products. A method to \noverride this downgrade protection has been identified."
+ },
+ {
+ "lang": "es",
+ "value": "Recientemente se agreg\u00f3 a algunos productos Lexmark una nueva funci\u00f3n para evitar la degradaci\u00f3n del firmware. Se ha identificado un m\u00e9todo para anular esta protecci\u00f3n contra la degradaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50739.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50739.json
index a87c606c764..9dc8b2bdd77 100644
--- a/CVE-2023/CVE-2023-507xx/CVE-2023-50739.json
+++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50739.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "7bc73191-a2b6-4c63-9918-753964601853",
"published": "2025-01-18T00:15:25.600",
"lastModified": "2025-01-18T00:15:25.600",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A\u00a0buffer overflow vulnerability has been identified in the Internet Printing Protocol (IPP) in various Lexmark\u00a0devices. The vulnerability can be leveraged by an attacker to execute arbitrary code."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad de desbordamiento de b\u00fafer en el Protocolo de impresi\u00f3n de Internet (IPP) en varios dispositivos Lexmark. Un atacante puede aprovechar la vulnerabilidad para ejecutar c\u00f3digo arbitrario."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52646.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52646.json
index 50b549b536a..a3b63651d84 100644
--- a/CVE-2023/CVE-2023-526xx/CVE-2023-52646.json
+++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52646.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-26T13:15:46.453",
"lastModified": "2024-11-21T08:40:16.687",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52923.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52923.json
index 3b9ddfa9d66..1ec38a9dd96 100644
--- a/CVE-2023/CVE-2023-529xx/CVE-2023-52923.json
+++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52923.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-20T11:15:07.670",
"lastModified": "2025-01-20T11:15:07.670",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: adapt set backend to use GC transaction API\n\nUse the GC transaction API to replace the old and buggy gc API and the\nbusy mark approach.\n\nNo set elements are removed from async garbage collection anymore,\ninstead the _DEAD bit is set on so the set element is not visible from\nlookup path anymore. Async GC enqueues transaction work that might be\naborted and retried later.\n\nrbtree and pipapo set backends does not set on the _DEAD bit from the\nsync GC path since this runs in control plane path where mutex is held.\nIn this case, set elements are deactivated, removed and then released\nvia RCU callback, sync GC never fails."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_tables: adaptar el backend del conjunto para usar la API de transacci\u00f3n de GC Use la API de transacci\u00f3n de GC para reemplazar la antigua y defectuosa API de gc y el enfoque de marca de ocupado. Ya no se eliminan elementos del conjunto de la recolecci\u00f3n de basura as\u00edncrona, en su lugar, se activa el bit _DEAD para que el elemento del conjunto ya no sea visible desde la ruta de b\u00fasqueda. La recolecci\u00f3n de basura as\u00edncrona pone en cola el trabajo de la transacci\u00f3n que podr\u00eda abortarse y reintentarse m\u00e1s tarde. Los backends de conjunto de rbtree y pipapo no activan el bit _DEAD de la ruta de GC de sincronizaci\u00f3n, ya que esto se ejecuta en la ruta del plano de control donde se mantiene el mutex. En este caso, los elementos del conjunto se desactivan, se eliminan y luego se liberan a trav\u00e9s de la devoluci\u00f3n de llamada de RCU, la GC de sincronizaci\u00f3n nunca falla."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5973.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5973.json
index 686cedab6ab..558eb096ebf 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5973.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5973.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-04-05T03:15:07.770",
"lastModified": "2024-11-21T08:42:53.873",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6214.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6214.json
index b8032dbd057..560b715ed1b 100644
--- a/CVE-2023/CVE-2023-62xx/CVE-2023-6214.json
+++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6214.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:07.970",
"lastModified": "2024-11-21T08:43:23.150",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6745.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6745.json
index 14b05b43017..4abd3587ce7 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6745.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6745.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-11T03:15:09.087",
"lastModified": "2024-11-21T08:44:28.240",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6748.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6748.json
index 4109796979a..94d1cd3e72a 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6748.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6748.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-11T03:15:09.310",
"lastModified": "2024-11-21T08:44:28.660",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0592.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0592.json
index 13c697145c7..e11445c5790 100644
--- a/CVE-2024/CVE-2024-05xx/CVE-2024-0592.json
+++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0592.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:12.147",
"lastModified": "2024-11-21T08:46:57.690",
- "vulnStatus": "Undergoing Analysis",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0627.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0627.json
index 87f05b938e0..f253f557bc1 100644
--- a/CVE-2024/CVE-2024-06xx/CVE-2024-0627.json
+++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0627.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-11T03:15:09.520",
"lastModified": "2024-11-21T08:47:01.937",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0653.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0653.json
index 4f91ec96f39..78e1d2f081e 100644
--- a/CVE-2024/CVE-2024-06xx/CVE-2024-0653.json
+++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0653.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-11T03:15:09.723",
"lastModified": "2024-11-21T08:47:04.787",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10261.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10261.json
index 4c388758ef5..f637c309039 100644
--- a/CVE-2024/CVE-2024-102xx/CVE-2024-10261.json
+++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10261.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-09T12:15:16.800",
"lastModified": "2024-11-12T13:56:24.513",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10403.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10403.json
index 6162b5c3c76..8dd058f4d2c 100644
--- a/CVE-2024/CVE-2024-104xx/CVE-2024-10403.json
+++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10403.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-11-21T11:15:16.533",
"lastModified": "2024-11-21T13:57:24.187",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10539.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10539.json
index ae8f4ebf48e..8de52d88eb1 100644
--- a/CVE-2024/CVE-2024-105xx/CVE-2024-10539.json
+++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10539.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2025-01-23T14:15:25.097",
"lastModified": "2025-01-23T14:15:25.097",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Uyumsoft Informatin Systems Uyumsoft ERP allows XSS Using Invalid Characters, Reflected XSS.This issue affects Uyumsoft ERP: before Erp4.2109.166p45."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Uyumsoft Informatin Systems Uyumsoft ERP permite XSS utilizando caracteres no v\u00e1lidos, XSS reflejado. Este problema afecta a Uyumsoft ERP: antes de Erp4.2109.166p45."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10846.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10846.json
index 0a3d7d92458..1ea4900b4aa 100644
--- a/CVE-2024/CVE-2024-108xx/CVE-2024-10846.json
+++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10846.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@docker.com",
"published": "2025-01-23T16:15:33.533",
"lastModified": "2025-01-23T16:15:33.533",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The compose-go library component in versions v2.10-v2.4.0 allows an authorized user who sends malicious YAML payloads to cause the compose-go to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versions v2.27.0 to v2.29.7 included"
+ },
+ {
+ "lang": "es",
+ "value": "El componente compose-go library en las versiones v2.10-v2.4.0 permite que un usuario autorizado que env\u00ede YAML payloads maliciosos haga que compose-go consuma una cantidad excesiva de memoria y ciclos de CPU mientras analiza YAML, como lo usa Docker Compose desde las versiones v2.27.0 a v2.29.7 incluidas."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10929.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10929.json
index 5770736ac41..34e5e3e525a 100644
--- a/CVE-2024/CVE-2024-109xx/CVE-2024-10929.json
+++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10929.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In certain circumstances, an issue in Arm Cortex-A72 (revisions before r1p0), Cortex-A73 and Cortex-A75 may allow an adversary to gain a weak form of control over the victim's branch history."
+ },
+ {
+ "lang": "es",
+ "value": "En determinadas circunstancias, un problema en Arm Cortex-A72 (revisiones anteriores a r1p0), Cortex-A73 y Cortex-A75 puede permitir que un adversario obtenga una forma d\u00e9bil de control sobre el historial de la rama de la v\u00edctima."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10936.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10936.json
index 1ffda97fcf3..251e09544e0 100644
--- a/CVE-2024/CVE-2024-109xx/CVE-2024-10936.json
+++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10936.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-21T09:15:06.850",
"lastModified": "2025-01-21T09:15:06.850",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1081.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1081.json
index f4e133fe7d1..a24a2b37c1b 100644
--- a/CVE-2024/CVE-2024-10xx/CVE-2024-1081.json
+++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1081.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-21T07:15:53.183",
"lastModified": "2024-11-21T08:49:45.313",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11147.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11147.json
index 9280b24d709..d22e574a020 100644
--- a/CVE-2024/CVE-2024-111xx/CVE-2024-11147.json
+++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11147.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2025-01-23T17:15:12.860",
"lastModified": "2025-01-23T17:15:12.860",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ECOVACS robot lawnmowers and vacuums use a deterministic root password generated based on model and serial number. An attacker with shell access can login as root."
+ },
+ {
+ "lang": "es",
+ "value": "Los robots cortac\u00e9sped y aspiradores ECOVACS utilizan una contrase\u00f1a ra\u00edz determinista generada en funci\u00f3n del modelo y el n\u00famero de serie. Un atacante con acceso de shell puede iniciar sesi\u00f3n como superusuario."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11166.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11166.json
index 630376803de..ca1017eaba6 100644
--- a/CVE-2024/CVE-2024-111xx/CVE-2024-11166.json
+++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11166.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "For TCAS II systems using transponders compliant with MOPS earlier than RTCA DO-181F, an attacker can impersonate a ground station and issue a Comm-A Identity Request. This action can set the Sensitivity Level Control (SLC) to the lowest setting and disable the Resolution Advisory (RA), leading to a denial-of-service condition."
+ },
+ {
+ "lang": "es",
+ "value": "En el caso de los sistemas TCAS II que utilizan transpondedores compatibles con MOPS anteriores a RTCA DO-181F, un atacante puede hacerse pasar por una estaci\u00f3n terrestre y emitir una solicitud de identidad Comm-A. Esta acci\u00f3n puede establecer el control de nivel de sensibilidad (SLC) en el valor m\u00e1s bajo y desactivar el aviso de resoluci\u00f3n (RA), lo que genera una condici\u00f3n de denegaci\u00f3n de servicio."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11218.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11218.json
index 4b0d4152221..39414adcc31 100644
--- a/CVE-2024/CVE-2024-112xx/CVE-2024-11218.json
+++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11218.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-22T05:15:08.903",
"lastModified": "2025-01-22T05:15:08.903",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in `podman build` and `buildah.` This issue occurs in a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. SELinux might mitigate it, but even with SELinux on, it still allows the enumeration of files and directories on the host."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en `podman build` y `buildah`. Este problema ocurre en una ruptura de contenedor mediante el uso de --jobs=2 y una condici\u00f3n ejecuci\u00f3n al crear un Containerfile malicioso. SELinux podr\u00eda mitigarlo, pero incluso con SELinux activado, a\u00fan permite la enumeraci\u00f3n de archivos y directorios en el host."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11226.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11226.json
index 1bb250002ae..4f95742cbf0 100644
--- a/CVE-2024/CVE-2024-112xx/CVE-2024-11226.json
+++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11226.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-21T11:15:08.063",
"lastModified": "2025-01-21T11:15:08.063",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The FireCask Like & Share Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'width' parameter in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento FireCask Like & Share Button para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'width' en todas las versiones hasta la 1.2 y incluida, debido a un escape de entrada y salida insuficiente de desinfecci\u00f3n. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11291.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11291.json
index ee49f07bfc6..0c944755032 100644
--- a/CVE-2024/CVE-2024-112xx/CVE-2024-11291.json
+++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11291.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-18T12:15:08.710",
"lastModified": "2024-12-18T12:15:08.710",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11923.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11923.json
index ba4885f70f2..6a8978be1db 100644
--- a/CVE-2024/CVE-2024-119xx/CVE-2024-11923.json
+++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11923.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
"published": "2025-01-18T00:15:25.823",
"lastModified": "2025-01-18T00:15:25.823",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Under certain log settings the IAM or CORE service will log credentials in the iam logfile in\u00a0Fortra Application Hub (Formerly named Helpsystems One) prior to version 1.3"
+ },
+ {
+ "lang": "es",
+ "value": "En determinadas configuraciones de registro, el servicio IAM o CORE registrar\u00e1 las credenciales en el archivo de registro de IAM en Fortra Application Hub (anteriormente llamado Helpsystems One) anterior a la versi\u00f3n 1.3"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11931.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11931.json
index 385d614d0d1..0d0ee47cc3c 100644
--- a/CVE-2024/CVE-2024-119xx/CVE-2024-11931.json
+++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11931.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 17.0 prior to 17.6.4, from 17.7 prior to 17.7.3, and from 17.8 prior to 17.8.1. Under certain conditions, it may have been possible for users with developer role to exfiltrate protected CI variables via CI lint."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha descubierto un problema en GitLab CE/EE que afecta a todas las versiones a partir de la 17.0 anterior a la 17.6.4, de la 17.7 anterior a la 17.7.3 y de la 17.8 anterior a la 17.8.1. En determinadas circunstancias, es posible que los usuarios con funci\u00f3n de desarrollador hayan podido exfiltrar variables de CI protegidas mediante CI lint."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12005.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12005.json
index 248177ab790..1dcbbca61bc 100644
--- a/CVE-2024/CVE-2024-120xx/CVE-2024-12005.json
+++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12005.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-21T10:15:07.423",
"lastModified": "2025-01-21T10:15:07.423",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP-BibTeX plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.1. This is due to missing or incorrect nonce validation on the wp_bibtex_option_page() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento WP-BibTeX para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 3.0.1 y incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la funci\u00f3n wp_bibtex_option_page(). Esto hace posible que atacantes no autenticados inyecten la web maliciosa scripts a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12043.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12043.json
index afd462fdb63..788a8cf69c3 100644
--- a/CVE-2024/CVE-2024-120xx/CVE-2024-12043.json
+++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12043.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Prime Slider \u2013 Addons For Elementor (Revolution of a slider, Hero Slider, Post Slider and Ecommerce Slider) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'social_link_title' parameter of the 'blog' widget in all versions up to, and including, 3.16.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Prime Slider \u2013 Addons For Elementor (Revolution of a slider, Hero Slider, Post Slider y Ecommerce Slider) para WordPress es vulnerable a Cross-Site Scriptings almacenado a trav\u00e9s del par\u00e1metro 'social_link_title' del widget 'blog' en todas las versiones hasta la 3.16.5 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12071.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12071.json
index eb21287c402..364bee5bd48 100644
--- a/CVE-2024/CVE-2024-120xx/CVE-2024-12071.json
+++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12071.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T04:15:06.690",
"lastModified": "2025-01-18T04:15:06.690",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Evergreen Content Poster \u2013 Auto Post and Schedule Your Best Content to Social Media plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the delete_network_post() function in all versions up to, and including, 1.4.4. This makes it possible for unauthenticated attackers to delete arbitrary posts and pages."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Evergreen Content Poster \u2013 Auto Post and Schedule Your Best Content to Social Media para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n delete_network_post() en todas las versiones hasta la 1.4.4 y incluida. Esto permite que atacantes no autenticados eliminen publicaciones y p\u00e1ginas arbitrarias."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12078.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12078.json
index 7cfdf7a1054..c7a00dc09ef 100644
--- a/CVE-2024/CVE-2024-120xx/CVE-2024-12078.json
+++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12078.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2025-01-23T17:15:13.020",
"lastModified": "2025-01-23T17:15:13.020",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ECOVACS robot lawn mowers and vacuums use a shared, static secret key to encrypt BLE GATT messages. An unauthenticated attacker within BLE range can control any robot using the same key."
+ },
+ {
+ "lang": "es",
+ "value": "Los robots cortac\u00e9sped y aspiradores ECOVACS utilizan una clave secreta est\u00e1tica compartida para cifrar los mensajes GATT de BLE. Un atacante no autenticado dentro del alcance de BLE puede controlar cualquier robot que utilice la misma clave."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12079.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12079.json
index 0028d697ce9..d07ed9dc1ee 100644
--- a/CVE-2024/CVE-2024-120xx/CVE-2024-12079.json
+++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12079.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2025-01-23T17:15:13.187",
"lastModified": "2025-01-23T17:15:13.187",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ECOVACS robot lawnmowers store the anti-theft PIN in cleartext on the device filesystem. An attacker can steal a lawnmower, read the PIN, and reset the anti-theft mechanism."
+ },
+ {
+ "lang": "es",
+ "value": "Los robots cortac\u00e9sped ECOVACS almacenan el PIN antirrobo en texto plano en el sistema de archivos del dispositivo. Un atacante puede robar un cortac\u00e9sped, leer el PIN y restablecer el mecanismo antirrobo."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12084.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12084.json
index ba2ab6e0838..a7084cfabf8 100644
--- a/CVE-2024/CVE-2024-120xx/CVE-2024-12084.json
+++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12084.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "Se encontr\u00f3 un fallo de desbordamiento de b\u00fafer basado en mont\u00f3n en rsync daemon. Este problema se debe a un manejo inadecuado de las longitudes de suma de comprobaci\u00f3n controladas por el atacante (s2length) en el c\u00f3digo. Cuando MAX_DIGEST_LEN excede el valor fijo SUM_LENGTH (16 bytes), un atacante puede escribir fuera de los l\u00edmites en el b\u00fafer de sum2."
+ "value": "Se encontr\u00f3 un fallo de desbordamiento de b\u00fafer basado en mont\u00f3n en rsync daemon. Este problema se debe a una gesti\u00f3n inadecuada de las longitudes de suma de comprobaci\u00f3n controladas por el atacante (s2length) en el c\u00f3digo. Cuando MAX_DIGEST_LEN excede el valor fijo SUM_LENGTH (16 bytes), un atacante puede escribir fuera de los l\u00edmites en el b\u00fafer de sum2."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12104.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12104.json
index 71240224bab..e5f3584f387 100644
--- a/CVE-2024/CVE-2024-121xx/CVE-2024-12104.json
+++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12104.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-21T10:15:07.590",
"lastModified": "2025-01-21T10:15:07.590",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Visual Website Collaboration, Feedback & Project Management \u2013 Atarim plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the wpf_delete_file and wpf_delete_file functions in all versions up to, and including, 4.0.9. This makes it possible for unauthenticated attackers to delete project pages and files."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Visual Website Collaboration, Feedback & Project Management \u2013 ??Atarim para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en las funciones wpf_delete_file y wpf_delete_file en todas las versiones hasta la 4.0.9 y incluida. Esto permite que atacantes no autenticados eliminen p\u00e1ginas y archivos de proyectos."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12118.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12118.json
index 3a22f74f447..db4f366c352 100644
--- a/CVE-2024/CVE-2024-121xx/CVE-2024-12118.json
+++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12118.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The The Events Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Event Calendar Link Widget through the html_tag attribute in all versions up to, and including, 6.9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Events Calendar para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del widget de enlace Calendario de eventos mediante el atributo html_tag en todas las versiones hasta la 6.9.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12385.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12385.json
index 782c39cbc14..fd63fe1f3df 100644
--- a/CVE-2024/CVE-2024-123xx/CVE-2024-12385.json
+++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12385.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T07:15:06.667",
"lastModified": "2025-01-18T07:15:06.667",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP Abstracts plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.2. This is due to missing nonce validation on the wpabstracts_load_status() and wpabstracts_delete_abstracts() functions. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento WP Abstracts para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.7.2 y incluida. Esto se debe a la falta de validaci\u00f3n de nonce en las funciones wpabstracts_load_status() y wpabstracts_delete_abstracts(). Esto hace posible que atacantes no autenticados inyecten Scripts web maliciosa a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12477.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12477.json
index 741038ff901..7a1c7b83480 100644
--- a/CVE-2024/CVE-2024-124xx/CVE-2024-12477.json
+++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12477.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Avada Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 3.11.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Avada Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 3.11.11 y incluida, debido a la falta de entrada desinfecci\u00f3n y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12494.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12494.json
index 918ceb2ed41..793f0e427b9 100644
--- a/CVE-2024/CVE-2024-124xx/CVE-2024-12494.json
+++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12494.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The BMLT Meeting Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bmlt_meeting_map' shortcode in all versions up to, and including, 2.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento BMLT Meeting Map para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'bmlt_meeting_map' del complemento en todas las versiones hasta la 2.6.1 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12504.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12504.json
index 335e6247ec4..7ed6a49b9f4 100644
--- a/CVE-2024/CVE-2024-125xx/CVE-2024-12504.json
+++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12504.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Broadcast Live Video \u2013 Live Streaming : HTML5, WebRTC, HLS, RTSP, RTMP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'videowhisper_hls' shortcode in all versions up to, and including, 6.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Broadcast Live Video \u2013 Live Streaming : HTML5, WebRTC, HLS, RTSP, RTMP para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'videowhisper_hls' del complemento en todas las versiones hasta la 6.1.9 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12696.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12696.json
index 0da6da63ef7..18817cc3094 100644
--- a/CVE-2024/CVE-2024-126xx/CVE-2024-12696.json
+++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12696.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T07:15:08.117",
"lastModified": "2025-01-18T07:15:08.117",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Picture Gallery \u2013 Frontend Image Uploads, AJAX Photo List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's videowhisper_picture_upload_guest shortcode in all versions up to, and including, 1.5.22 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Picture Gallery \u2013 Frontend Image Uploads, AJAX Photo List para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del shortcode videowhisper_picture_upload_guest del complemento en todas las versiones hasta incluida, 1.5.22 debido a la falta de entrada desinfecci\u00f3n y a la salida que se escapa en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten Scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12747.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12747.json
index e285ebf680a..003a2e28d0c 100644
--- a/CVE-2024/CVE-2024-127xx/CVE-2024-12747.json
+++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12747.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "Se encontr\u00f3 un fallo en rsync. Esta vulnerabilidad surge de una condici\u00f3n de ejecuci\u00f3n durante el manejo de enlaces simb\u00f3licos por parte de rsync. El comportamiento predeterminado de rsync cuando encuentra enlaces simb\u00f3licos es omitirlos. Si un atacante reemplazaba un archivo normal con un enlace simb\u00f3lico en el momento adecuado, era posible omitir el comportamiento predeterminado y atravesar los enlaces simb\u00f3licos. Seg\u00fan los privilegios del proceso rsync, un atacante podr\u00eda filtrar informaci\u00f3n confidencial, lo que podr\u00eda llevar a una escalada de privilegios."
+ "value": "Se encontr\u00f3 un fallo en rsync. Esta vulnerabilidad surge de una condici\u00f3n de ejecuci\u00f3n durante la gesti\u00f3n de enlaces simb\u00f3licos por parte de rsync. El comportamiento predeterminado de rsync cuando encuentra enlaces simb\u00f3licos es omitirlos. Si un atacante reemplazaba un archivo normal con un enlace simb\u00f3lico en el momento adecuado, era posible omitir el comportamiento predeterminado y atravesar los enlaces simb\u00f3licos. Seg\u00fan los privilegios del proceso rsync, un atacante podr\u00eda filtrar informaci\u00f3n confidencial, lo que podr\u00eda llevar a una escalada de privilegios."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12757.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12757.json
index 607458d52d2..1f4b67c9ee4 100644
--- a/CVE-2024/CVE-2024-127xx/CVE-2024-12757.json
+++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12757.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T18:15:24.690",
"lastModified": "2025-01-17T18:15:24.690",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nedap Librix Ecoreader \n is missing authentication for critical functions that could allow an \nunauthenticated attacker to potentially execute malicious code."
+ },
+ {
+ "lang": "es",
+ "value": "Nedap Librix Ecoreader carece de autenticaci\u00f3n para funciones cr\u00edticas, lo que podr\u00eda permitir que un atacante no autenticado ejecute c\u00f3digo malicioso."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12957.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12957.json
index 45012695f54..46dce7a30bb 100644
--- a/CVE-2024/CVE-2024-129xx/CVE-2024-12957.json
+++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12957.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A file handling command vulnerability in certain versions of Armoury Crate may result in arbitrary file deletion.\nRefer to the '01/23/2025 Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad en el comando de gesti\u00f3n de archivos en ciertas versiones de Armoury Crate puede provocar la eliminaci\u00f3n arbitraria de archivos. Consulta la secci\u00f3n \"Actualizaci\u00f3n de seguridad del 23/01/2025 para la aplicaci\u00f3n Armoury Crate\" en el Aviso de seguridad de ASUS para obtener m\u00e1s informaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13026.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13026.json
index 22ff36873d1..c494b41ed45 100644
--- a/CVE-2024/CVE-2024-130xx/CVE-2024-13026.json
+++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13026.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "5cdcf916-2b10-4ec8-bfc1-d054821e439e",
"published": "2025-01-17T20:15:27.600",
"lastModified": "2025-01-17T20:15:27.600",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "5cdcf916-2b10-4ec8-bfc1-d054821e439e",
@@ -16,6 +16,10 @@
{
"lang": "en",
"value": "A vulnerability exists in Algo Edge up to 2.1.1 - a previously used (legacy) component of navify\u00ae Algorithm Suite. The vulnerability impacts the authentication mechanism of this component and could allow an attacker with adjacent access to the laboratory network and the Algo Edge system to craft valid authentication tokens and access the component. Other components of navify\u00ae Algorithm Suite are not affected."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad en Algo Edge hasta la versi\u00f3n 2.1.1, un componente usado anteriormente (heredado) de navify\u00ae Algorithm Suite. La vulnerabilidad afecta el mecanismo de autenticaci\u00f3n de este componente y podr\u00eda permitir que un atacante con acceso adyacente a la red del laboratorio y a Algo Edge sistema manipule tokens de autenticaci\u00f3n v\u00e1lidos y acceda al componente. Otros componentes de navify\u00ae Algorithm Suite no se ven afectados."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13184.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13184.json
index 350bdbdb1d2..b257c992b9b 100644
--- a/CVE-2024/CVE-2024-131xx/CVE-2024-13184.json
+++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13184.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T09:15:06.937",
"lastModified": "2025-01-18T09:15:06.937",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to time-based SQL Injection via the Login Attempts module in all versions up to, and including, 3.0.12 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento The Ultimate WordPress Toolkit \u2013 WP Extended para WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del m\u00f3dulo Login Attempts en todas las versiones hasta la 3.0.12 y incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13230.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13230.json
index 4e3f5ed30a3..881da339970 100644
--- a/CVE-2024/CVE-2024-132xx/CVE-2024-13230.json
+++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13230.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-21T11:15:09.267",
"lastModified": "2025-01-21T11:15:09.267",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Social Share, Social Login and Social Comments Plugin \u2013 Super Socializer plugin for WordPress is vulnerable to Limited SQL Injection via the \u2018SuperSocializerKey\u2019 parameter in all versions up to, and including, 7.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional values into the already existing query that can be used to extract user metadata from the database."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Social Share, Social Login and Social Comments Plugin \u2013 Super Socializer para WordPress es vulnerable a una inyecci\u00f3n SQL limitada a trav\u00e9s del par\u00e1metro \u00abSuperSocializerKey\u00bb en todas las versiones hasta la 7.14 y incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen valores adicionales a la consulta ya existente que se pueden usar para extraer metadatos del usuario de la base de datos."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13234.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13234.json
index 990278cf10f..f2fe397a74d 100644
--- a/CVE-2024/CVE-2024-132xx/CVE-2024-13234.json
+++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13234.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Product Table by WBW plugin for WordPress is vulnerable to SQL Injection via the 'additionalCondition' parameter in all versions up to, and including, 2.1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Product Table de WBW para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'additionalCondition' en todas las versiones hasta la 2.1.2 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13236.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13236.json
index c21c2bd3185..4c8b3360971 100644
--- a/CVE-2024/CVE-2024-132xx/CVE-2024-13236.json
+++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13236.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Tainacan plugin for WordPress is vulnerable to SQL Injection via the 'collection_id' parameter in all versions up to, and including, 0.21.12 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Tainacan para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'collection_id' en todas las versiones hasta la 0.21.12 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13317.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13317.json
index c6a61d7e6b3..7c5d180d859 100644
--- a/CVE-2024/CVE-2024-133xx/CVE-2024-13317.json
+++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13317.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T07:15:08.290",
"lastModified": "2025-01-18T07:15:08.290",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ShipWorks Connector for Woocommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.2.5. This is due to missing or incorrect nonce validation on the 'shipworks-wordpress' page. This makes it possible for unauthenticated attackers to update the services username and password via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento ShipWorks Connector para Woocommerce para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 5.2.5 y incluida. Esto se debe a la falta o la incorrecta validaci\u00f3n de nonce en la p\u00e1gina 'shipworks-wordpress'. Esto hace posible que atacantes no autenticados actualicen el nombre de usuario y la contrase\u00f1a de los servicios a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13340.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13340.json
index eaea60dd59a..ab4ada0a79b 100644
--- a/CVE-2024/CVE-2024-133xx/CVE-2024-13340.json
+++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13340.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The MDTF \u2013 Meta Data and Taxonomies Filter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mdf_results_by_ajax' shortcode in all versions up to, and including, 1.3.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento MDTF \u2013 Meta Data and Taxonomies Filter para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'mdf_results_by_ajax' del complemento en todas las versiones hasta la 1.3.3.6 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13375.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13375.json
index f1661160c1a..e409fe29151 100644
--- a/CVE-2024/CVE-2024-133xx/CVE-2024-13375.json
+++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13375.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T09:15:07.120",
"lastModified": "2025-01-18T09:15:07.120",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Adifier System plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.1.7. This is due to the plugin not properly validating a user's identity prior to updating their details like password through the adifier_recover() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Adifier System para WordPress es vulnerable a la escalada de privilegios mediante la apropiaci\u00f3n de cuentas en todas las versiones hasta la 3.1.7 y incluida. Esto se debe a que el complemento no valida correctamente la identidad de un usuario antes de actualizar sus datos, como la contrase\u00f1a, a trav\u00e9s de la funci\u00f3n adifier_recover(). Esto permite que atacantes no autenticados cambien las contrase\u00f1as arbitrarias de usuarios, administradores de incluida y aprovechen eso para obtener acceso a sus cuentas."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13385.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13385.json
index 7f96e8b77d4..e4b387c0cbd 100644
--- a/CVE-2024/CVE-2024-133xx/CVE-2024-13385.json
+++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13385.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T07:15:08.463",
"lastModified": "2025-01-18T07:15:08.463",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The JSM Screenshot Machine Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ssm' shortcode in all versions up to, and including, 2.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento JSM Screenshot Machine Shortcode para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del shortcode 'ssm' del complemento en todas las versiones hasta la 2.3.0 y incluida, debido a la falta de entrada desinfecci\u00f3n y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten Scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13389.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13389.json
index a104dddd569..6f57beb792f 100644
--- a/CVE-2024/CVE-2024-133xx/CVE-2024-13389.json
+++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13389.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Cliptakes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'cliptakes_input_email' shortcode in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Cliptakes para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'cliptakes_input_email' del complemento en todas las versiones hasta la 1.3.4 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13391.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13391.json
index 682b95959ed..4b188e778c2 100644
--- a/CVE-2024/CVE-2024-133xx/CVE-2024-13391.json
+++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13391.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T07:15:08.637",
"lastModified": "2025-01-18T07:15:08.637",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MicroPayments \u2013 Fans Paysite: Paid Creator Subscriptions, Digital Assets, Tokens Wallet plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'videowhisper_content_upload_guest' shortcode in all versions up to, and including, 2.9.29 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento MicroPayments \u2013 Fans Paysite: Paid Creator Subscriptions, Digital Assets, Tokens Wallet para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del shortcode 'videowhisper_content_upload_guest' del complemento en todas las versiones hasta incluida, 2.9.29 debido a la entrada insuficiente desinfecci\u00f3n y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten Scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13392.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13392.json
index 46240aec022..6e061555f61 100644
--- a/CVE-2024/CVE-2024-133xx/CVE-2024-13392.json
+++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13392.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T08:15:24.327",
"lastModified": "2025-01-18T08:15:24.327",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Rate Star Review Vote \u2013 AJAX Reviews, Votes, Star Ratings plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'videowhisper_reviews' shortcode in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Rate Star Review Vote \u2013 AJAX Reviews, Votes, Star Ratings para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del shortcode 'videowhisper_reviews' del complemento en todas las versiones hasta incluida, 1.6.3 debido a la falta de entrada desinfecci\u00f3n y a la salida que se escapa en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten Scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13393.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13393.json
index 4ae87403c59..f7307da5532 100644
--- a/CVE-2024/CVE-2024-133xx/CVE-2024-13393.json
+++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13393.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T07:15:08.810",
"lastModified": "2025-01-18T07:15:08.810",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Video Share VOD \u2013 Turnkey Video Site Builder Script plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'videowhisper_videos' shortcode in all versions up to, and including, 2.6.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Video Share VOD \u2013 Turnkey Video Site Builder Script para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del shortcode 'videowhisper_videos' del complemento en todas las versiones hasta incluida, 2.6.31 debido a la entrada insuficiente desinfecci\u00f3n y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten Scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13404.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13404.json
index 8f43bd4b7f9..1fd9cc7e07c 100644
--- a/CVE-2024/CVE-2024-134xx/CVE-2024-13404.json
+++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13404.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-21T10:15:07.823",
"lastModified": "2025-01-21T10:15:07.823",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Link Library plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'searchll' parameter in all versions up to, and including, 7.7.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Link Library para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'searchll' en todas las versiones hasta 7.7.2 y incluida, debido a un escape de entrada desinfecci\u00f3n y de salida insuficiente. Esto permite que atacantes no autenticados inyecten scripts web arbitraria en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace. "
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13422.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13422.json
index a038efef291..5aa37380b02 100644
--- a/CVE-2024/CVE-2024-134xx/CVE-2024-13422.json
+++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13422.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The SEO Blogger to WordPress Migration using 301 Redirection plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'url' parameter in all versions up to, and including, 0.4.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento SEO Blogger to WordPress Migration using 301 Redirection para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'url' en todas las versiones hasta la 0.4.8 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13432.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13432.json
index 5b9b7666d91..dca84fee24a 100644
--- a/CVE-2024/CVE-2024-134xx/CVE-2024-13432.json
+++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13432.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T07:15:08.983",
"lastModified": "2025-01-18T07:15:08.983",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Webcamconsult plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.0. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Webcamconsult para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.5.0 y incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en una funci\u00f3n. Esto hace posible que atacantes no autenticados actualicen configuraciones e inyecten contenido web malicioso Scripts a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13433.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13433.json
index d6c8712b7aa..6efe4a85cdf 100644
--- a/CVE-2024/CVE-2024-134xx/CVE-2024-13433.json
+++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13433.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T07:15:09.160",
"lastModified": "2025-01-18T07:15:09.160",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Utilities for MTG plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mtglink' shortcode in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Utilities for MTG para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del shortcode 'mtglink' del complemento en todas las versiones hasta incluida, 1.4.1 debido a la falta de desinfecci\u00f3n de entrada y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten Scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13444.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13444.json
index 056311f1b79..0026e442074 100644
--- a/CVE-2024/CVE-2024-134xx/CVE-2024-13444.json
+++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13444.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-21T11:15:09.450",
"lastModified": "2025-01-21T11:15:09.450",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The wp-greet plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.2. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento wp-greet para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 6.2 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de un nonce en una funci\u00f3n. Esto permite que atacantes no autenticados actualicen configuraciones e inyecten scripts web maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador de un sitio para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13454.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13454.json
index dcb4f9c1c44..b3f69c97deb 100644
--- a/CVE-2024/CVE-2024-134xx/CVE-2024-13454.json
+++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13454.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@openvpn.net",
"published": "2025-01-20T21:15:21.453",
"lastModified": "2025-01-21T20:15:30.793",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13502.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13502.json
index 5a7080fb9f6..10eb53bb50e 100644
--- a/CVE-2024/CVE-2024-135xx/CVE-2024-13502.json
+++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13502.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Newtec/iDirect NTC2218, NTC2250, NTC2299 on Linux, PowerPC, ARM allows Local Code Inclusion.This issue affects NTC2218, NTC2250, NTC2299: from 1.0.1.1 through 2.2.6.19.\n\n\nThe `commit_multicast` page used to configure multicasts in the modem's web administration interface uses improperly parses incoming data from the request before passing it to an `eval` statement in a bash script. This allows attackers to inject arbitrary shell commands."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando del SO ('inyecci\u00f3n de comando del SO') en Newtec/iDirect NTC2218, NTC2250, NTC2299 en Linux, PowerPC, ARM que permite la inclusi\u00f3n de c\u00f3digo local. Este problema afecta a NTC2218, NTC2250, NTC2299: desde la versi\u00f3n 1.0.1.1 hasta la versi\u00f3n 2.2.6.19. La p\u00e1gina `commit_multicast` utilizada para configurar multicasts en la interfaz de administraci\u00f3n web del m\u00f3dem analiza incorrectamente los datos entrantes de la solicitud antes de pasarlos a una declaraci\u00f3n `eval` en un bash Script. Esto permite a los atacantes inyectar comandos de shell arbitrarios."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13503.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13503.json
index 744aa1d2e70..734239a03fc 100644
--- a/CVE-2024/CVE-2024-135xx/CVE-2024-13503.json
+++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13503.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Newtec NTC2218, NTC2250, NTC2299 on Linux, PowerPC, ARM (Updating signaling process in the swdownload binary modules) allows Local Execution of Code, Remote Code Inclusion.\nThis issue affects NTC2218, NTC2250, NTC2299: from 1.0.1.1 through 2.2.6.19. The issue is both present on the PowerPC versions of the modem and the ARM versions.\n\nA stack buffer buffer overflow in the swdownload binary allows attackers to execute arbitrary code. The parse_INFO function uses an unrestricted `sscanf` to read a string of an incoming network packet into a statically sized buffer."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de copia de b\u00fafer sin comprobar el tama\u00f1o de la entrada ('desbordamiento de b\u00fafer cl\u00e1sico') en Newtec NTC2218, NTC2250, NTC2299 en Linux, PowerPC, ARM (el proceso de se\u00f1alizaci\u00f3n de actualizaci\u00f3n en los m\u00f3dulos binarios swdownload) permite la ejecuci\u00f3n local de c\u00f3digo y la inclusi\u00f3n remota de c\u00f3digo. Este problema afecta a NTC2218, NTC2250, NTC2299: desde la versi\u00f3n 1.0.1.1 hasta la versi\u00f3n 2.2.6.19. El problema est\u00e1 presente tanto en las versiones PowerPC del m\u00f3dem como en las versiones ARM. Un desbordamiento de b\u00fafer de pila en el binario swdownload permite a los atacantes ejecutar c\u00f3digo arbitrario. La funci\u00f3n parse_INFO utiliza un `sscanf` sin restricciones para leer una cadena de un paquete de red entrante en un b\u00fafer de tama\u00f1o est\u00e1tico."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13511.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13511.json
index 6d0ff07637d..df43407cba6 100644
--- a/CVE-2024/CVE-2024-135xx/CVE-2024-13511.json
+++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13511.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Variation Swatches for WooCommerce plugin, in all versions starting at 1.0.8 up until 1.3.2, contains a vulnerability due to improper nonce verification in its settings reset functionality. The issue exists in the settings_init() function, which processes a reset action based on specific query parameters in the URL. The related delete_settings() function performs a faulty nonce validation check, making the reset operation insecure and susceptible to unauthorized access."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Variation Swatches para WooCommerce, en todas las versiones a partir de la 1.0.8 hasta la 1.3.2, contiene una vulnerabilidad debido a una verificaci\u00f3n de nonce incorrecta en su funci\u00f3n de restablecimiento de configuraciones. El problema existe en la funci\u00f3n settings_init(), que procesa una acci\u00f3n de restablecimiento en funci\u00f3n de par\u00e1metros de consulta espec\u00edficos en la URL. La funci\u00f3n delete_settings() relacionada realiza una verificaci\u00f3n de validaci\u00f3n de nonce defectuosa, lo que hace que la operaci\u00f3n de restablecimiento sea insegura y susceptible a acceso no autorizado."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13515.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13515.json
index c66df681b0a..88f8e4da73e 100644
--- a/CVE-2024/CVE-2024-135xx/CVE-2024-13515.json
+++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13515.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T06:15:26.410",
"lastModified": "2025-01-18T06:15:26.410",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Image Source Control Lite \u2013 Show Image Credits and Captions plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'path' parameter in all versions up to, and including, 2.28.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Image Source Control Lite \u2013 Show Image Credits and Captions para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'path' en todas las versiones hasta la 2.28.0 y incluida, debido a un escape de entrada desinfecci\u00f3n y de salida insuficiente. Esto permite que atacantes no autenticados inyecten Scripts web arbitraria en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13516.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13516.json
index 598c4f94eee..51034a7c501 100644
--- a/CVE-2024/CVE-2024-135xx/CVE-2024-13516.json
+++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13516.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T06:15:27.627",
"lastModified": "2025-01-18T06:15:27.627",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Kubio AI Page Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'message' parameter in all versions up to, and including, 2.3.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Kubio AI Page Builder para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'message' en todas las versiones hasta la 2.3.5 y incluida, debido a un escape de entrada y salida insuficiente de desinfecci\u00f3n. Esto permite que atacantes no autenticados inyecten Scripts web arbitraria en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13517.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13517.json
index 08b644f93aa..eefba6f5ad7 100644
--- a/CVE-2024/CVE-2024-135xx/CVE-2024-13517.json
+++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13517.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T07:15:09.350",
"lastModified": "2025-01-18T07:15:09.350",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Easy Digital Downloads \u2013 eCommerce Payments and Subscriptions made easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Title value in all versions up to, and including, 3.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Easy Digital Downloads \u2013 eCommerce Payments and Subscriptions made easy para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del valor del t\u00edtulo en todas las versiones hasta la 3.3.2 y incluida, debido a un escape de entrada y salida insuficiente de desinfecci\u00f3n. Esto permite que atacantes autenticados, con acceso de nivel de administrador, inyecten Scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones donde se ha deshabilitado unfiltered_html."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13519.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13519.json
index 8c263fc1441..5f80889a84c 100644
--- a/CVE-2024/CVE-2024-135xx/CVE-2024-13519.json
+++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13519.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T07:15:09.510",
"lastModified": "2025-01-18T07:15:09.510",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MarketKing \u2014 Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin's settings in all versions up to, and including, 1.9.80 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Shop Manager-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento MarketKing \u2014 Ultimate WooCommerce Multivendor Marketplace Solution para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la configuraci\u00f3n del complemento en todas las versiones hasta la 1.9.80 y incluida, debido a un escape de entrada y salida insuficiente de desinfecci\u00f3n. Esto hace posible que los atacantes autenticados, con permisos de nivel de administrador de tienda y superiores, inyecten Scripts web arbitraria en las p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones de varios sitios y a las instalaciones en las que se ha deshabilitado unfiltered_html."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13524.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13524.json
index 23dc6f80560..b08705432aa 100644
--- a/CVE-2024/CVE-2024-135xx/CVE-2024-13524.json
+++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13524.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-20T03:15:08.033",
"lastModified": "2025-01-20T03:15:08.033",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in obsproject OBS Studio up to 30.0.2 on Windows and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to untrusted search path. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. The vendor disagrees that this issue is \"something worth reporting, as every attack surface requires privileged access/user compromise\"."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en obsproject OBS Studio hasta la versi\u00f3n 30.0.2 en Windows y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida. La manipulaci\u00f3n conduce a una ruta de b\u00fasqueda no confiable. El ataque debe abordarse localmente. La complejidad de un ataque es bastante alta. La explotaci\u00f3n parece ser dif\u00edcil. Se recomienda aplicar un parche para solucionar este problema. El proveedor no est\u00e1 de acuerdo con que este problema sea \"algo que valga la pena informar, ya que cada superficie de ataque requiere acceso privilegiado/compromiso del usuario\"."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13536.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13536.json
index 0a0850fd5bb..9fdf5cf617e 100644
--- a/CVE-2024/CVE-2024-135xx/CVE-2024-13536.json
+++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13536.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-21T05:15:07.490",
"lastModified": "2025-01-21T05:15:07.490",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The 1003 Mortgage Application plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.87. This is due the /inc/class/fnm/export.php file being publicly accessible with error logging enabled. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento 1003 Mortgage Application para WordPress es vulnerable a la divulgaci\u00f3n de ruta completa en todas las versiones hasta la 1.87 incluida. Esto se debe a que el archivo /inc/class/fnm/export.php es de acceso p\u00fablico con el registro de errores habilitado. Esto permite que atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n web, que se puede utilizar para ayudar a otros ataques. La informaci\u00f3n mostrada no es \u00fatil por s\u00ed sola y requiere que exista otra vulnerabilidad para que se produzcan da\u00f1os en un sitio web afectado."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13545.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13545.json
index 23212a35e35..eb38b1e5ffc 100644
--- a/CVE-2024/CVE-2024-135xx/CVE-2024-13545.json
+++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13545.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Bootstrap Ultimate theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.4.9 via the path parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. If php://filter is enabled on the server, this issue may directly lead to Remote Code Execution."
+ },
+ {
+ "lang": "es",
+ "value": "El tema Bootstrap Ultimate para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 1.4.9 incluida a trav\u00e9s del par\u00e1metro path. Esto permite que atacantes no autenticados incluyan archivos PHP en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en casos en los que se puedan cargar e incluir archivos PHP. Si php://filter est\u00e1 habilitado en el servidor, este problema puede provocar directamente la ejecuci\u00f3n remota de c\u00f3digo."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13593.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13593.json
index 6976c449f0e..1841d64a85f 100644
--- a/CVE-2024/CVE-2024-135xx/CVE-2024-13593.json
+++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13593.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The BMLT Meeting Map plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.6.0 via the 'bmlt_meeting_map' shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento BMLT Meeting Map para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 2.6.0 incluida, a trav\u00e9s del c\u00f3digo corto 'bmlt_meeting_map'. Esto permite que atacantes autenticados, con acceso de nivel de colaborador o superior, incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en casos en los que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\"."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13659.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13659.json
index b8a3f00b56e..20f14dba41b 100644
--- a/CVE-2024/CVE-2024-136xx/CVE-2024-13659.json
+++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13659.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Listamester plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'listamester' shortcode in all versions up to, and including, 2.3.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Listamester para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'listamester' del complemento en todas las versiones hasta la 2.3.4 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13680.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13680.json
index 7ad7f9a2850..b61fe6b12df 100644
--- a/CVE-2024/CVE-2024-136xx/CVE-2024-13680.json
+++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13680.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Form Builder CP plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter of the 'CP_EASY_FORM_WILL_APPEAR_HERE' shortcode in all versions up to, and including, 1.2.41 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Form Builder CP para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'id' del shortcode 'CP_EASY_FORM_WILL_APPEAR_HERE' en todas las versiones hasta la 1.2.41 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13683.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13683.json
index dac62e6c655..cb6be38381c 100644
--- a/CVE-2024/CVE-2024-136xx/CVE-2024-13683.json
+++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13683.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Automate Hub Free by Sperse.IO plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.0. This is due to missing or incorrect nonce validation on the 'automate_hub' page. This makes it possible for unauthenticated attackers to update an activation status via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Automate Hub Free de Sperse.IO para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.7.0 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la p\u00e1gina 'automate_hub'. Esto permite que atacantes no autenticados actualicen un estado de activaci\u00f3n a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1389.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1389.json
index 11ce9730549..b67670257f5 100644
--- a/CVE-2024/CVE-2024-13xx/CVE-2024-1389.json
+++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1389.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-29T01:43:49.353",
"lastModified": "2024-11-21T08:50:28.477",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1483.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1483.json
index 8e34abc88f6..3ae565cef98 100644
--- a/CVE-2024/CVE-2024-14xx/CVE-2024-1483.json
+++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1483.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@huntr.dev",
"published": "2024-04-16T00:15:08.353",
"lastModified": "2024-11-21T08:50:40.847",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1558.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1558.json
index 85e8e8d131b..e367b34d5ac 100644
--- a/CVE-2024/CVE-2024-15xx/CVE-2024-1558.json
+++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1558.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@huntr.dev",
"published": "2024-04-16T00:15:08.533",
"lastModified": "2024-11-21T08:50:49.943",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1560.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1560.json
index 395c380f8b8..d17c1b064c2 100644
--- a/CVE-2024/CVE-2024-15xx/CVE-2024-1560.json
+++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1560.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@huntr.dev",
"published": "2024-04-16T00:15:08.713",
"lastModified": "2024-11-21T08:50:50.183",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1593.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1593.json
index 2da39b5da43..5954e8d1f01 100644
--- a/CVE-2024/CVE-2024-15xx/CVE-2024-1593.json
+++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1593.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@huntr.dev",
"published": "2024-04-16T00:15:09.247",
"lastModified": "2024-11-21T08:50:54.320",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1594.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1594.json
index a49bd16f332..164fe7492b6 100644
--- a/CVE-2024/CVE-2024-15xx/CVE-2024-1594.json
+++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1594.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@huntr.dev",
"published": "2024-04-16T00:15:09.417",
"lastModified": "2024-11-21T08:50:54.443",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20020.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20020.json
index 4eb449b2961..61dd4d04caf 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20020.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20020.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@mediatek.com",
"published": "2024-03-04T03:15:07.107",
"lastModified": "2024-11-21T08:51:49.063",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20022.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20022.json
index 0af624b4ae3..dc8a1027795 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20022.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20022.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@mediatek.com",
"published": "2024-03-04T03:15:07.150",
"lastModified": "2024-11-21T08:51:49.393",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20251.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20251.json
index 73334513614..2dbd21ef22b 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20251.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20251.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20251",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-17T17:15:11.350",
"lastModified": "2024-11-21T08:52:06.593",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1146,7 +1146,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ISE-XSS-bL4VTML",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20252.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20252.json
index aec2cec192e..532aa3f274a 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20252.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20252.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20252",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-02-07T17:15:09.913",
"lastModified": "2024-11-21T08:52:06.800",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-csrf-KnnZDMj3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20253.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20253.json
index 46e4b1e10c2..8b792d64820 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20253.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20253.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20253",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-26T18:15:10.970",
"lastModified": "2024-11-21T08:52:06.980",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -218,7 +218,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-rce-bWNzQcUm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20254.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20254.json
index 693b4e75e09..9b841a5c659 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20254.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20254.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20254",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-02-07T17:15:10.130",
"lastModified": "2024-11-21T08:52:07.193",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-csrf-KnnZDMj3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20255.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20255.json
index 2bfc9a13732..d61c4e66f98 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20255.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20255.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20255",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-02-07T17:15:10.327",
"lastModified": "2024-11-21T08:52:07.353",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-csrf-KnnZDMj3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20256.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20256.json
index af240193844..3f35b6777c1 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20256.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20256.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20256",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-15T18:15:08.720",
"lastModified": "2024-11-21T08:52:07.503",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20257.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20257.json
index e5e3fa79706..e61316e7416 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20257.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20257.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20257",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-15T18:15:08.967",
"lastModified": "2024-11-21T08:52:07.650",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20258.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20258.json
index 4df33d59e2b..4c1a29e7d56 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20258.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20258.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20258",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-15T18:15:09.193",
"lastModified": "2024-11-21T08:52:07.790",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -64,7 +64,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20259.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20259.json
index daf8f0b56a9..a6cc5f01ec7 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20259.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20259.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20259",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:50.913",
"lastModified": "2024-11-21T08:52:07.937",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dhcp-dos-T3CXPO9z",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dhcp-dos-T3CXPO9z",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20260.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20260.json
index 128e9ccfe99..a66e279aeae 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20260.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20260.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20260",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:13.950",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftdvirtual-dos-MuenGnYR",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20261.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20261.json
index 7a418303776..69c8e406dd3 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20261.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20261.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20261",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-22T17:16:12.873",
"lastModified": "2024-11-21T08:52:08.300",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-archive-bypass-z4wQjwcN",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-archive-bypass-z4wQjwcN",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20262.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20262.json
index cbd656bb6fc..e00c728c65f 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20262.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20262.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20262",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-13T17:15:47.187",
"lastModified": "2024-11-21T08:52:08.460",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-scp-dos-kb6sUUHw",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-scp-dos-kb6sUUHw",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20263.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20263.json
index 8330e6c93f7..89f7ada7e58 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20263.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20263.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20263",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-26T18:15:11.163",
"lastModified": "2024-11-21T08:52:08.607",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -4233,7 +4233,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-bus-acl-bypass-5zn9hNJk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20264.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20264.json
index bfef67d5ce8..9600dbba833 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20264.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20264.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20264",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:14.180",
"lastModified": "2024-10-31T19:04:42.863",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -176,21 +176,21 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20265.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20265.json
index fa373cb1619..b3986683183 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20265.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20265.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20265",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:51.113",
"lastModified": "2024-11-21T08:52:09.003",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20266.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20266.json
index 26d95be45a2..3c668447eec 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20266.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20266.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20266",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-13T17:15:47.407",
"lastModified": "2024-11-21T08:52:09.177",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dhcp-dos-3tgPKRdm",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dhcp-dos-3tgPKRdm",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20267.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20267.json
index acc1529db7f..69e991d5c2d 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20267.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20267.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20267",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-02-29T01:43:58.370",
"lastModified": "2024-11-21T08:52:09.347",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1121,7 +1121,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipv6-mpls-dos-R9ycXkwM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20268.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20268.json
index 3c9f36afc8c..601ac0458fb 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20268.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20268.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20268",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:14.387",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-snmp-dos-7TcnzxTU",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20269.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20269.json
index 146bc40b437..ee075874842 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20269.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20269.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20269",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:14.610",
"lastModified": "2024-10-31T19:35:03.420",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -511,21 +511,21 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20270.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20270.json
index f7b1aea138b..6bb0ef35fdc 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20270.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20270.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20270",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-17T17:15:11.627",
"lastModified": "2024-11-21T08:52:09.830",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -144,7 +144,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-6syj82Ju",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20271.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20271.json
index 37b4345158e..d215f2fe7a2 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20271.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20271.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20271",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:51.320",
"lastModified": "2024-11-21T08:52:11.843",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-h9TGGX6W",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-h9TGGX6W",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20272.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20272.json
index 6f858e30ca2..c0ae61a3379 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20272.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20272.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20272",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-17T17:15:12.130",
"lastModified": "2024-11-21T08:52:12.043",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -109,7 +109,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuc-unauth-afu-FROYsCsD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20273.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20273.json
index f9f257042a9..5066a9c8316 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20273.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20273.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20273",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:14.813",
"lastModified": "2024-10-31T19:09:24.687",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -511,21 +511,21 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20274.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20274.json
index 84b93cef0b0..02fa77300a4 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20274.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20274.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20274",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:15.027",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-nfJeYHxz",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20275.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20275.json
index 64c0efb2376..1ed8b8e7db6 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20275.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20275.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20275",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:15.237",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-g8AOKnDP",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20276.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20276.json
index 7854b2adbbd..829f28868d0 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20276.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20276.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20276",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:51.513",
"lastModified": "2024-11-21T08:52:12.480",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20277.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20277.json
index f7704a5a780..e8af7b4537a 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20277.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20277.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20277",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-17T17:15:12.300",
"lastModified": "2024-11-21T08:52:12.613",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thouseyes-privesc-DmzHG3Qv",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20278.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20278.json
index 47fe7e232c1..c8fb969f2f7 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20278.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20278.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20278",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:51.703",
"lastModified": "2024-11-21T08:52:12.753",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20279.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20279.json
index f679fb3c026..699864f04b7 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20279.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20279.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20279",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-28T17:15:06.113",
"lastModified": "2024-08-29T13:25:27.537",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-cousmo-uBpBYGbq",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20280.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20280.json
index 7ceaef8b903..673d74f1626 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20280.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20280.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20280",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-16T17:15:13.697",
"lastModified": "2024-10-31T15:35:23.060",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -64,7 +64,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsc-bkpsky-TgJ5f73J",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20281.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20281.json
index b39dc25f4cb..811c3472cfe 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20281.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20281.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20281",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-03T17:15:47.740",
"lastModified": "2024-11-21T08:52:13.080",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfccsrf-TEmZEfJ9",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfccsrf-TEmZEfJ9",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20282.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20282.json
index 8187066acd3..3bcca1f26fc 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20282.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20282.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20282",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-03T17:15:47.950",
"lastModified": "2024-11-21T08:52:13.210",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndru-pesc-kZ2PQLZH",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndru-pesc-kZ2PQLZH",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20283.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20283.json
index 7f37bd149ec..85364898f4f 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20283.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20283.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20283",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-03T17:15:48.140",
"lastModified": "2024-11-21T08:52:13.337",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndidv-LmXdvAf2",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndidv-LmXdvAf2",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20284.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20284.json
index 1cf5b28560a..b364dfdaa41 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20284.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20284.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20284",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-28T17:15:06.893",
"lastModified": "2024-10-17T15:03:07.253",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1263,14 +1263,14 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Product"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20285.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20285.json
index 4a9ab4c1ef1..076c6f5904c 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20285.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20285.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20285",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-28T17:15:07.687",
"lastModified": "2024-10-22T14:37:01.363",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1263,14 +1263,14 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Product"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20286.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20286.json
index e7504cea956..22e16d08c94 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20286.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20286.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20286",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-28T17:15:08.400",
"lastModified": "2024-10-22T14:44:16.063",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1263,14 +1263,14 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Product"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20287.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20287.json
index ade9683c0ee..ebb90932067 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20287.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20287.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20287",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-17T17:15:12.467",
"lastModified": "2024-11-21T08:52:13.810",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -113,7 +113,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-bHStWgXO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20289.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20289.json
index 9cd090da4c6..9dc0b49cfb0 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20289.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20289.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20289",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-28T17:15:09.117",
"lastModified": "2024-08-29T13:25:27.537",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmdinj-Lq6jsZhH",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20290.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20290.json
index 148db67d3f1..933d115d84f 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20290.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20290.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20290",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-02-07T17:15:10.517",
"lastModified": "2024-11-21T08:52:14.023",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -135,21 +135,21 @@
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FXZYVDNV66RNMNVJOHAJAYRZV4U64CQ/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6MUDUPAHAAV6FPB2C2QIQCFJ4SHYBOTY/",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-hDffu6t",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20291.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20291.json
index bf88374b1bc..935b5464d19 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20291.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20291.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20291",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-02-29T01:43:59.000",
"lastModified": "2024-11-21T08:52:14.173",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-po-acl-TkyePgvL",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-po-acl-TkyePgvL",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20292.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20292.json
index e662e1b7505..65466c73680 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20292.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20292.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20292",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-06T17:15:08.797",
"lastModified": "2024-11-21T08:52:14.293",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-infodisc-rLCEqm6T",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-infodisc-rLCEqm6T",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20293.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20293.json
index 7ef1303f2f3..3e2c2f52b41 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20293.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20293.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20293",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-22T17:16:13.167",
"lastModified": "2024-11-21T08:52:14.410",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ogsnsg-aclbyp-3XB8q6jX",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ogsnsg-aclbyp-3XB8q6jX",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20294.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20294.json
index c2aba06ec5d..70151aeffe7 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20294.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20294.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20294",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-02-29T01:43:59.207",
"lastModified": "2024-11-21T08:52:14.550",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-lldp-dos-z7PncTgt",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-lldp-dos-z7PncTgt",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20295.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20295.json
index 4f714c3257f..09beeb994f0 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20295.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20295.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20295",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-24T20:15:07.267",
"lastModified": "2024-11-21T08:52:14.813",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-mUx4c5AJ",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-mUx4c5AJ",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20296.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20296.json
index 8c96dcfa693..ca95fe66a30 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20296.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20296.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20296",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-07-17T17:15:12.367",
"lastModified": "2024-11-21T08:52:14.977",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-krW2TxA9",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-krW2TxA9",
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20297.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20297.json
index 4da7bf3b629..f09da2b4406 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20297.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20297.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20297",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:15.437",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-acl-bypass-VvnLNKqf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20298.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20298.json
index f66c9c1de80..6d48a919a7d 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20298.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20298.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20298",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:15.710",
"lastModified": "2024-10-31T19:25:31.523",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,21 +131,21 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20299.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20299.json
index 20d20493431..f9da7bac60a 100644
--- a/CVE-2024/CVE-2024-202xx/CVE-2024-20299.json
+++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20299.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20299",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:16.900",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-acl-bypass-VvnLNKqf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20300.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20300.json
index 60695e7dc60..9a33bd25c59 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20300.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20300.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20300",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:17.253",
"lastModified": "2024-11-01T20:14:59.393",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -521,21 +521,21 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20301.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20301.json
index 2a22efc8a78..1daaf5194fc 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20301.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20301.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20301",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-06T17:15:08.987",
"lastModified": "2024-11-21T08:52:17.907",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-win-bypass-pn42KKBm",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-win-bypass-pn42KKBm",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20302.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20302.json
index 6907f936320..606e14b2534 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20302.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20302.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20302",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-03T17:15:48.323",
"lastModified": "2024-11-21T08:52:18.023",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndo-upav-YRqsCcSP",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndo-upav-YRqsCcSP",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20303.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20303.json
index 35cbdaed490..d4eac0095d0 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20303.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20303.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20303",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:51.880",
"lastModified": "2024-11-21T08:52:18.157",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-mdns-dos-4hv6pBGf",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-mdns-dos-4hv6pBGf",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20304.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20304.json
index d23a155fdd4..c0cf17d734c 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20304.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20304.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20304",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-11T17:15:11.853",
"lastModified": "2024-10-03T14:20:07.680",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -186,7 +186,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pak-mem-exhst-3ke9FeFy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20305.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20305.json
index ee3c932241d..4a572e50f44 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20305.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20305.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20305",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-26T18:15:11.350",
"lastModified": "2024-11-21T08:52:18.450",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuc-xss-9TFuu5MS",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20306.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20306.json
index 47dc22b9bea..25229c1d4b5 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20306.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20306.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20306",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:52.067",
"lastModified": "2024-11-21T08:52:18.600",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-utd-cmd-JbL8KvHT",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-utd-cmd-JbL8KvHT",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20307.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20307.json
index 4bbe58c0dd4..cd3064091f8 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20307.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20307.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20307",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T18:15:09.357",
"lastModified": "2024-11-21T08:52:18.737",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json
index 6451883c21f..c341dbf6c8e 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20308",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T18:15:09.853",
"lastModified": "2024-11-26T16:15:12.960",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20309.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20309.json
index ef2f675f8d7..1068f088108 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20309.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20309.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20309",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:52.260",
"lastModified": "2024-11-21T08:52:19.290",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aux-333WBz8f",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aux-333WBz8f",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20310.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20310.json
index 02dca9995fb..86b430d2235 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20310.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20310.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20310",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-03T17:15:48.513",
"lastModified": "2024-11-21T08:52:19.497",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imps-xss-quWkd9yF",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imps-xss-quWkd9yF",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20311.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20311.json
index d17307821ad..bb2cfb20355 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20311.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20311.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20311",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:52.463",
"lastModified": "2024-11-21T08:52:19.683",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lisp-3gYXs3qP",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lisp-3gYXs3qP",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20312.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20312.json
index 412ab2209ce..80531733040 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20312.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20312.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20312",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:52.690",
"lastModified": "2024-11-21T08:52:20.100",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -84,7 +84,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-sGjyOUHX",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-sGjyOUHX",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20313.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20313.json
index 99429a44c6f..10ef56fe81b 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20313.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20313.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20313",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-24T21:15:46.797",
"lastModified": "2024-11-21T08:52:20.890",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -286,7 +286,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ospf-dos-dR9Sfrxp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20314.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20314.json
index c3c9136e992..1a4faec766c 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20314.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20314.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20314",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:52.920",
"lastModified": "2024-11-21T08:52:21.060",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sda-edge-dos-qZWuWXWG",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sda-edge-dos-qZWuWXWG",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20315.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20315.json
index fb3d3739288..b754d01b784 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20315.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20315.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20315",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-13T17:15:47.607",
"lastModified": "2024-11-21T08:52:21.273",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20316.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20316.json
index cca71b047d9..1b63fb41d17 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20316.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20316.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20316",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:53.110",
"lastModified": "2024-11-21T08:52:21.410",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dmi-acl-bypass-Xv8FO8Vz",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dmi-acl-bypass-Xv8FO8Vz",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20317.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20317.json
index d9f94658037..065b17a4f26 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20317.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20317.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20317",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-11T17:15:12.043",
"lastModified": "2024-10-03T17:58:40.703",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -146,7 +146,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-l2services-2mvHdNuC",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20318.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20318.json
index 0b754a72350..ef07915a944 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20318.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20318.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20318",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-13T17:15:47.813",
"lastModified": "2024-11-21T08:52:21.667",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrl2vpn-jesrU3fc",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrl2vpn-jesrU3fc",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20319.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20319.json
index aae4210f5b3..43a98a55ebf 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20319.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20319.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20319",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-13T17:15:48.003",
"lastModified": "2024-11-21T08:52:21.800",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uhv6ZDeF",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uhv6ZDeF",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20320.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20320.json
index dd9cdd781da..3553f94df9b 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20320.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20320.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20320",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-13T17:15:48.193",
"lastModified": "2024-11-21T08:52:21.960",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ssh-privesc-eWDMKew3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ssh-privesc-eWDMKew3",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20321.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20321.json
index 2762b98fa5f..5d7c45ac576 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20321.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20321.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20321",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-02-29T01:43:59.410",
"lastModified": "2024-11-21T08:52:22.093",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -336,7 +336,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ebgp-dos-L3QCwVJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20322.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20322.json
index 432767e4ab0..1183f79886c 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20322.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20322.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20322",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-13T17:15:48.407",
"lastModified": "2024-11-21T08:52:22.250",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20323.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20323.json
index 1153d34f8e7..16a33a4cb32 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20323.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20323.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20323",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-07-17T17:15:12.607",
"lastModified": "2024-11-21T08:52:22.403",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-inode-static-key-VUVCeynn",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-inode-static-key-VUVCeynn",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20324.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20324.json
index 2d2b0c6814b..7f0ef1fb640 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20324.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20324.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20324",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:53.293",
"lastModified": "2024-11-21T08:52:22.527",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-privesc-RjSMrmPK",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-privesc-RjSMrmPK",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20325.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20325.json
index 013dbd2b3d1..979146d8ee3 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20325.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20325.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20325",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-02-21T17:15:09.180",
"lastModified": "2024-11-21T08:52:22.667",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-access-control-jJsZQMjj",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-access-control-jJsZQMjj",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20326.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20326.json
index 0889d3e4fe8..e94dac5e5d7 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20326.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20326.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20326",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-16T14:15:08.420",
"lastModified": "2024-11-21T08:52:22.797",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -64,11 +64,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnfd-rwpesc-ZAOufyx8",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-rwpesc-qrQGnh3f",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnfd-rwpesc-ZAOufyx8",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20327.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20327.json
index 784e023d3ab..ae27eda653a 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20327.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20327.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20327",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-13T17:15:48.593",
"lastModified": "2024-11-21T08:52:22.960",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-pppma-JKWFgneW",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-pppma-JKWFgneW",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20328.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20328.json
index 0f613ca537c..f97bd6523f0 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20328.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20328.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20328",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-01T21:15:07.790",
"lastModified": "2024-11-21T08:52:23.097",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://blog.clamav.net/2023/11/clamav-130-122-105-released.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://blog.clamav.net/2023/11/clamav-130-122-105-released.html",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20329.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20329.json
index 9c025fb6c22..13832babfde 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20329.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20329.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20329",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:17.457",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssh-rce-gRAuPEUF",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20330.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20330.json
index 38e3626ff6a..0ec7d9c796d 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20330.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20330.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20330",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:17.663",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd2100-snort-dos-M9HuMt75",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20331.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20331.json
index 34a7b9adc00..5b717dc5cf0 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20331.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20331.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20331",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:17.870",
"lastModified": "2024-11-01T17:32:56.807",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1466,21 +1466,21 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-vpn-nyH3fhp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20332.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20332.json
index d0946827afc..146a68ae27d 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20332.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20332.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20332",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-03T17:15:48.713",
"lastModified": "2024-11-21T08:52:23.593",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -84,7 +84,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-ssrf-FtSTh5Oz",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-ssrf-FtSTh5Oz",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20333.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20333.json
index 5c28b85dc16..79a1a43eea9 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20333.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20333.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20333",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:53.480",
"lastModified": "2024-11-21T08:52:23.783",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccc-authz-bypass-5EKchJRb",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccc-authz-bypass-5EKchJRb",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20334.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20334.json
index d3b00cbd25b..ac6da1d4c7c 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20334.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20334.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20334",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-03T17:15:48.907",
"lastModified": "2024-11-21T08:52:23.913",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-xss-kGw4DX9Y",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-xss-kGw4DX9Y",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20335.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20335.json
index 5bd309880fa..3346306b5d8 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20335.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20335.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20335",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-06T17:15:09.193",
"lastModified": "2024-11-21T08:52:24.043",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-85G83CRB",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-85G83CRB",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20336.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20336.json
index fe1cccb4a20..ae844f76bdd 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20336.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20336.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20336",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-06T17:15:09.397",
"lastModified": "2024-11-21T08:52:24.187",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-85G83CRB",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-85G83CRB",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20337.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20337.json
index e013d0ce24d..a8a9d1e38ea 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20337.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20337.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20337",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-06T17:15:09.580",
"lastModified": "2024-11-21T08:52:24.313",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-client-crlf-W43V4G7",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-client-crlf-W43V4G7",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20338.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20338.json
index b7be2c563b0..a867889c92b 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20338.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20338.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20338",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-06T17:15:09.783",
"lastModified": "2024-11-21T08:52:24.457",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-privesc-sYxQO6ds",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-privesc-sYxQO6ds",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20339.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20339.json
index 789fa53a2f5..60376826415 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20339.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20339.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20339",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:18.097",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,15 +54,15 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-dos-QXYE5Ufy",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20340.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20340.json
index 4569a6e28b8..8fe9aa73998 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20340.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20340.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20340",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:18.300",
"lastModified": "2024-11-01T17:40:30.980",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -291,21 +291,21 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inject-2EnmTC8v",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20341.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20341.json
index e94491fa398..f79b984b32f 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20341.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20341.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20341",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:18.493",
"lastModified": "2024-11-01T17:22:26.577",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1466,28 +1466,28 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-xss-yjj7ZjVq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-yjj7ZjVq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20342.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20342.json
index cab6a595e41..776a9abc4b2 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20342.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20342.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20342",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:18.703",
"lastModified": "2025-01-13T18:15:17.057",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-rf-bypass-OY8f3pnM",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20343.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20343.json
index df295577b4b..045df48ca7d 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20343.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20343.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20343",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-11T17:15:12.223",
"lastModified": "2024-10-07T17:42:40.777",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -438,7 +438,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-shellutil-HCb278wD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20344.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20344.json
index 6b8b7574dc5..804a5a6fcec 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20344.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20344.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20344",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-02-29T01:43:59.613",
"lastModified": "2024-11-21T08:52:25.117",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsfi-imm-syn-p6kZTDQC",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsfi-imm-syn-p6kZTDQC",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20345.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20345.json
index c397ba656de..d1e7cdbf8a2 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20345.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20345.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20345",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-06T17:15:09.973",
"lastModified": "2024-11-21T08:52:25.243",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -84,7 +84,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-traversal-m7N8mZpF",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-traversal-m7N8mZpF",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20346.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20346.json
index f42b30be5c6..ce1169e38e0 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20346.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20346.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20346",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-06T17:15:10.173",
"lastModified": "2024-11-21T08:52:25.453",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-xss-3JwqSMNT",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-xss-3JwqSMNT",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20347.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20347.json
index c1b357de1e6..76c1a8970a1 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20347.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20347.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20347",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-03T17:15:49.107",
"lastModified": "2024-11-21T08:52:25.580",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -64,7 +64,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cem-csrf-suCmNjFr",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cem-csrf-suCmNjFr",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20348.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20348.json
index b288b2bbaab..b40ef4cc7b5 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20348.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20348.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20348",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-03T17:15:49.310",
"lastModified": "2024-11-21T08:52:25.713",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-dir-trav-SSn3AYDw",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-dir-trav-SSn3AYDw",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20350.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20350.json
index 3bf5368780f..c5b6358e2be 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20350.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20350.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20350",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:15.000",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-ssh-e4uOdASj",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20351.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20351.json
index 3cc3aeec72b..cd883584ff4 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20351.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20351.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20351",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T17:15:18.913",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,19 +54,19 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-xss-yjj7ZjVq",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sa-ftd-snort-fw-BCJTZPMu",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20352.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20352.json
index 57a18792c70..98369a8680f 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20352.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20352.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20352",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-03T17:15:49.510",
"lastModified": "2024-11-21T08:52:26.143",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cem-csrf-suCmNjFr",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cem-csrf-suCmNjFr",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20353.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20353.json
index ee5e355f008..a0021d67729 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20353.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20353.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20353",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-24T19:15:46.723",
"lastModified": "2024-11-21T08:52:26.293",
"vulnStatus": "Undergoing Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -65,7 +65,7 @@
"cisaVulnerabilityName": "Cisco ASA and FTD Denial of Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1445,7 +1445,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-websrvs-dos-X8gNucD2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20354.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20354.json
index c686697ebdd..45936e7493a 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20354.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20354.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20354",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-03-27T17:15:53.660",
"lastModified": "2024-11-21T08:52:26.567",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20355.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20355.json
index 62460985ea0..9f6e56c9778 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20355.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20355.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20355",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-22T17:16:13.477",
"lastModified": "2024-11-21T08:52:26.693",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-saml-bypass-KkNvXyKW",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-saml-bypass-KkNvXyKW",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20356.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20356.json
index 6f3d8a0f43d..ed0d078b072 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20356.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20356.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20356",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-24T20:15:07.477",
"lastModified": "2024-11-21T08:52:26.907",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20357.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20357.json
index e19e901a329..834c405351d 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20357.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20357.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20357",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-01T17:15:28.143",
"lastModified": "2024-11-21T08:52:27.070",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20358.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20358.json
index 65e3ac555c5..0b44ef327ae 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20358.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20358.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20358",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-24T20:15:07.670",
"lastModified": "2024-11-21T08:52:27.227",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1441,7 +1441,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmd-inj-ZJV8Wysm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20359.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20359.json
index ecd82aa916e..0ac87996e50 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20359.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20359.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20359",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-24T19:15:46.943",
"lastModified": "2024-11-21T08:52:27.520",
"vulnStatus": "Undergoing Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -65,7 +65,7 @@
"cisaVulnerabilityName": "Cisco ASA and FTD Privilege Escalation Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1445,7 +1445,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20360.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20360.json
index 2ac16a66110..ba1c0912897 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20360.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20360.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20360",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-22T18:15:09.493",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sqli-WFFDnNOs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20361.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20361.json
index 742fd02f56b..b9c909999cf 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20361.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20361.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20361",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-22T17:16:13.733",
"lastModified": "2024-11-21T08:52:27.917",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-object-bypass-fTH8tDjq",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-object-bypass-fTH8tDjq",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20362.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20362.json
index 4557a872c32..981e9437ba4 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20362.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20362.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20362",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-03T17:15:49.707",
"lastModified": "2024-11-21T08:52:28.043",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbiz-rv-xss-OQeRTup",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbiz-rv-xss-OQeRTup",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20363.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20363.json
index 11ea4323b7f..331a3236120 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20363.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20363.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20363",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-22T17:16:13.950",
"lastModified": "2024-11-21T08:52:28.177",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -64,7 +64,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-ips-bypass-uE69KBMd",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-ips-bypass-uE69KBMd",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20364.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20364.json
index f544b968734..9dfac008eeb 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20364.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20364.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20364",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:05.427",
"lastModified": "2024-10-31T19:36:32.277",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -306,7 +306,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20365.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20365.json
index 9b152cad1aa..20d39a378a4 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20365.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20365.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20365",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:14.863",
"lastModified": "2024-10-08T14:28:42.727",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -311,7 +311,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-redfish-cominj-sbkv5ZZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20366.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20366.json
index 33141fdc70a..a0bcbb63ad8 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20366.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20366.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20366",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-15T18:15:09.440",
"lastModified": "2024-11-21T08:52:28.580",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20367.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20367.json
index 6fce2ee0e80..e13a0290a13 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20367.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20367.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20367",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-03T17:15:49.907",
"lastModified": "2024-11-21T08:52:28.747",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CSQxgxfM",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CSQxgxfM",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20368.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20368.json
index 7afa69bd153..cae780fe3a3 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20368.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20368.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20368",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-03T17:15:50.107",
"lastModified": "2024-11-21T08:52:28.880",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-csrf-NfAKXrp5",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-csrf-NfAKXrp5",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20369.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20369.json
index a90bf96bdf4..a4e714c0579 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20369.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20369.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20369",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-15T18:15:09.673",
"lastModified": "2024-11-21T08:52:29.000",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-ordir-MNM8YqzO",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-ordir-MNM8YqzO",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20370.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20370.json
index 2ebdfde8e0c..12d1d60dd24 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20370.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20370.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20370",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:05.637",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-priv-esc-hBS9gnwq",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20371.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20371.json
index 21e76892f0f..c7229b83f63 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20371.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20371.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20371",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:14.187",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3550-acl-bypass-mhskZc2q",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20372.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20372.json
index b9c45d6c669..f770f0716bd 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20372.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20372.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20372",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:05.863",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -551,7 +551,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20373.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20373.json
index 808d72e2a43..6ffdcec9019 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20373.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20373.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20373",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T15:15:06.823",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uwBXfqww",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20374.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20374.json
index 14eedd59baf..af7315447a0 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20374.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20374.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20374",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:06.100",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Undergoing Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-2HBkA97G",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20375.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20375.json
index 220380d51e8..0d481812ad8 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20375.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20375.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20375",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-21T17:15:07.303",
"lastModified": "2024-08-21T17:24:59.627",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-dos-kkHq43We",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20376.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20376.json
index a7ca0cc2e09..27a7b50a0b8 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20376.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20376.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20376",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-01T17:15:28.407",
"lastModified": "2024-11-21T08:52:29.887",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20377.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20377.json
index 9cf6ab3fd22..cf5686ed3fd 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20377.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20377.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20377",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:06.327",
"lastModified": "2024-11-01T17:30:14.350",
"vulnStatus": "Undergoing Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -291,7 +291,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20378.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20378.json
index bf0404cd09b..13b71b66dc7 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20378.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20378.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20378",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-01T17:15:28.660",
"lastModified": "2024-11-21T08:52:30.107",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20379.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20379.json
index b365b6b633a..b89f2460e37 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20379.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20379.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20379",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:06.553",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-file-read-5q4mQRn",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20380.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20380.json
index 8ffdfc25908..95774c57fa0 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20380.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20380.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20380",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-18T20:15:17.520",
"lastModified": "2024-11-21T08:52:30.310",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://blog.clamav.net/2024/04/clamav-131-123-106-patch-versions.html",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://blog.clamav.net/2024/04/clamav-131-123-106-patch-versions.html",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20381.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20381.json
index 0595f4bea3a..26a5d557dbc 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20381.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20381.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20381",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-11T17:15:12.403",
"lastModified": "2024-10-08T21:43:28.757",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1471,7 +1471,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-auth-bypass-QnTEesp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20382.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20382.json
index 173c4292353..e74eae3ef4a 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20382.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20382.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20382",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:06.780",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-yjj7ZjVq",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20383.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20383.json
index 0c1d47165f4..4d0459dffdc 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20383.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20383.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20383",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-15T18:15:09.910",
"lastModified": "2024-11-21T08:52:30.840",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20384.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20384.json
index d0fa8649328..a507ba758fb 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20384.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20384.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20384",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:07.030",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nsgacl-bypass-77XnEAsL",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20385.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20385.json
index 522c26974ab..7826c5bf4ba 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20385.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20385.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20385",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:15.110",
"lastModified": "2024-10-08T14:22:34.120",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -109,7 +109,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndo-tlsvld-FdUF3cpw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20386.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20386.json
index 2543aa55b20..7b7098ef250 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20386.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20386.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20386",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:07.257",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -551,7 +551,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20387.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20387.json
index 16ca30e916f..23f89147257 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20387.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20387.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20387",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:07.480",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -286,7 +286,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20388.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20388.json
index bc4a6202738..5fb73c2f379 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20388.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20388.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20388",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:07.697",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -626,7 +626,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20389.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20389.json
index ffa6a66c6d2..37b2af35e6c 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20389.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20389.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20389",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-16T14:15:08.670",
"lastModified": "2024-11-21T08:52:31.623",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnfd-rwpesc-ZAOufyx8",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-rwpesc-qrQGnh3f",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnfd-rwpesc-ZAOufyx8",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20390.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20390.json
index 3b09519b7b1..ddcdb5c273b 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20390.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20390.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20390",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-11T17:15:12.613",
"lastModified": "2024-10-07T17:51:37.197",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-xml-tcpdos-ZEXvrU2S",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20391.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20391.json
index 1d7734bb8ba..1577b3fef2b 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20391.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20391.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20391",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-15T18:15:10.153",
"lastModified": "2024-11-21T08:52:31.933",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-nam-priv-esc-szu2vYpZ",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-nam-priv-esc-szu2vYpZ",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20392.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20392.json
index f8fe38429df..b2a78785e2f 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20392.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20392.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20392",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-15T18:15:10.390",
"lastModified": "2024-11-21T08:52:32.110",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-http-split-GLrnnOwS",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-http-split-GLrnnOwS",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20393.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20393.json
index ff8c8d454ef..30ef18dc50a 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20393.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20393.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20393",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:15.337",
"lastModified": "2024-10-08T14:37:39.713",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -574,7 +574,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20394.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20394.json
index 485286a31f6..f41c24936d1 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20394.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20394.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20394",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-05-15T18:15:10.620",
"lastModified": "2024-11-21T08:52:32.420",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-netvisdos-9zNbsJtK",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-netvisdos-9zNbsJtK",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20395.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20395.json
index 0e9b7b3ee57..5f1d0496ffe 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20395.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20395.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20395",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-07-17T17:15:12.833",
"lastModified": "2024-11-21T08:52:32.550",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20396.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20396.json
index 75b69594d83..b579610e2d3 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20396.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20396.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20396",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-07-17T17:15:13.070",
"lastModified": "2024-11-21T08:52:32.730",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j",
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20397.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20397.json
index 9394d260c04..2d93624616a 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20397.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20397.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20397",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-12-04T17:15:11.913",
"lastModified": "2024-12-04T17:15:11.913",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-image-sig-bypas-pQDRQvjL",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20398.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20398.json
index ef6bb21f2b7..77050102e9a 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20398.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20398.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20398",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-11T17:15:12.860",
"lastModified": "2024-10-03T01:47:52.180",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -476,7 +476,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-priv-esc-CrG5vhCq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json
index fd0238ade55..68d2c2544a7 100644
--- a/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json
+++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20399",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-07-01T17:15:04.383",
"lastModified": "2024-11-21T08:52:33.020",
"vulnStatus": "Undergoing Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -65,7 +65,7 @@
"cisaVulnerabilityName": "Cisco NX-OS Command Injection Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -2533,7 +2533,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20400.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20400.json
index 4c68f0047fd..4837dab7f51 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20400.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20400.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20400",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-07-17T17:15:13.300",
"lastModified": "2024-11-21T08:52:33.397",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-redirect-KJsFuXgj",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-redirect-KJsFuXgj",
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20401.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20401.json
index d2406190bb2..29a08e07bf3 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20401.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20401.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20401",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-07-17T17:15:13.540",
"lastModified": "2024-11-21T08:52:33.533",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH",
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20402.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20402.json
index 31470514eff..f54f3ed2f4f 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20402.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20402.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20402",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:07.930",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-dos-hOnB9pH4",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20403.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20403.json
index e28a83b8de5..c770b2391ee 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20403.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20403.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20403",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:08.193",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20404.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20404.json
index cd28251c386..cbcbb6ba9fd 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20404.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20404.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20404",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-06-05T17:15:11.790",
"lastModified": "2024-11-21T08:52:33.903",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -147,7 +147,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-finesse-ssrf-rfi-Um7wT8Ew",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20405.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20405.json
index ab13b6ddf5c..41d4a45cc86 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20405.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20405.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20405",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-06-05T17:15:12.107",
"lastModified": "2024-11-21T08:52:34.050",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -147,7 +147,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-finesse-ssrf-rfi-Um7wT8Ew",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20406.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20406.json
index 2e02fbc6071..2cd66697ee3 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20406.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20406.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20406",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-11T17:15:13.040",
"lastModified": "2024-10-07T17:56:43.103",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -110,7 +110,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-xehpbVNe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20407.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20407.json
index cfcecf5c836..0aee07c2ec3 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20407.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20407.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20407",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:08.413",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-bypass-PTry37fX",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20408.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20408.json
index 70ab6eff2c8..8bcf1a70bbd 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20408.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20408.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20408",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:08.697",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dap-dos-bhEkP7n",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20409.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20409.json
index 95005b60188..2cb41bcb7ab 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20409.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20409.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20409",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:08.970",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20410.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20410.json
index 531165c1e9d..47706417774 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20410.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20410.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20410",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:09.197",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -551,7 +551,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20411.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20411.json
index 11920c3ecc9..cdf31b58dab 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20411.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20411.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20411",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-28T17:15:09.500",
"lastModified": "2024-08-29T13:25:27.537",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20412.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20412.json
index 2e0c8823d8a..b0f994624de 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20412.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20412.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20412",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:09.430",
"lastModified": "2024-11-05T15:03:34.777",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -323,7 +323,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-statcred-dFC8tXT5",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20413.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20413.json
index f25816c5867..0e4923bf134 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20413.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20413.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20413",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-28T17:15:09.763",
"lastModified": "2024-08-29T13:25:27.537",
"vulnStatus": "Undergoing Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20414.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20414.json
index ca1c8773ba4..26329bd22dd 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20414.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20414.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20414",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:15.413",
"lastModified": "2024-10-02T20:02:22.740",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -2411,7 +2411,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-HfwnRgk",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20415.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20415.json
index a048dcadf33..2001178ec50 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20415.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20415.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20415",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:09.713",
"lastModified": "2024-11-26T16:09:02.407",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -551,7 +551,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20416.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20416.json
index 911b47089c4..2fbaa6e506b 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20416.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20416.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20416",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-07-17T17:15:13.877",
"lastModified": "2024-11-21T08:52:35.527",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv34x-rce-7pqFU2e",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv34x-rce-7pqFU2e",
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20417.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20417.json
index 329c04953f5..d1bf271a5bf 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20417.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20417.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20417",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-21T20:15:08.533",
"lastModified": "2024-08-22T12:48:02.790",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rest-5bPKrNtZ",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20418.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20418.json
index 67fbbc12033..58ef9d7d9dd 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20418.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20418.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20418",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:14.453",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-backhaul-ap-cmdinj-R7E28Ecs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20419.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20419.json
index 3ea95e675a3..30d4aafa23c 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20419.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20419.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20419",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-07-17T17:15:14.143",
"lastModified": "2024-11-21T08:52:35.887",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-auth-sLw3uhUy",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://www.secpod.com/blog/critical-flaw-in-ciscos-secure-email-gateways-allows-attackers-to-control-the-device-completely/",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-auth-sLw3uhUy",
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20420.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20420.json
index e1688b77b16..333bd2798ea 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20420.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20420.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20420",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-16T17:15:13.957",
"lastModified": "2024-10-31T14:35:05.980",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json
index 7a576eb6ddb..85dd8a935de 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20421",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-16T17:15:14.193",
"lastModified": "2024-10-31T14:35:06.853",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20424.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20424.json
index 335ed8b6d90..588de077bc1 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20424.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20424.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20424",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:09.930",
"lastModified": "2024-11-01T18:07:44.057",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -556,7 +556,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-v3AWDqN7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20426.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20426.json
index bdc2dd9248a..137888d9e27 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20426.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20426.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20426",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:10.147",
"lastModified": "2024-11-05T19:43:16.633",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -376,7 +376,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-9FgEyHsF",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20429.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20429.json
index 9f38002935c..b1ed032d1ec 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20429.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20429.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20429",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-07-17T17:15:14.497",
"lastModified": "2024-11-21T08:52:36.500",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ",
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20430.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20430.json
index 1fcc9ca0bad..133679c0ca7 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20430.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20430.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20430",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-12T20:15:04.407",
"lastModified": "2024-09-18T18:56:05.510",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-agent-dll-hj-Ptn7PtKe",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20431.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20431.json
index 4d02f34b399..912671556c3 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20431.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20431.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20431",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:10.440",
"lastModified": "2024-11-05T14:47:55.070",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -256,7 +256,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-geoip-bypass-MB4zRDu",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20432.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20432.json
index dea608b13e6..8b4be9ecaab 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20432.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20432.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20432",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:15.550",
"lastModified": "2024-10-08T14:10:35.317",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-cmdinj-UvYZrKfr",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20433.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20433.json
index 26580e7b1fe..af96723d9fd 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20433.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20433.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20433",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:15.677",
"lastModified": "2024-10-03T13:34:37.547",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -12276,7 +12276,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rsvp-dos-OypvgVZf",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20434.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20434.json
index 4ee968fe984..8eb33ff09a7 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20434.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20434.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20434",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:16.090",
"lastModified": "2024-10-08T16:20:30.933",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -551,7 +551,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vlan-dos-27Pur5RT",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20435.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20435.json
index 6fb8a9c7bbd..e5370ea9d9c 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20435.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20435.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20435",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-07-17T17:15:14.787",
"lastModified": "2024-11-21T08:52:38.787",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC",
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20436.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20436.json
index 48b67a38013..d5cafee5e46 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20436.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20436.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20436",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:16.400",
"lastModified": "2024-10-08T21:00:00.670",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1101,7 +1101,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-httpsrvr-dos-yOZThut",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20437.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20437.json
index 5ec6015c549..50b763a4e37 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20437.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20437.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20437",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:16.630",
"lastModified": "2024-10-24T19:45:01.540",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -426,7 +426,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-csrf-ycUYxkKO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20438.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20438.json
index 2840b1e2a09..a8fbb7581fc 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20438.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20438.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20438",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:15.753",
"lastModified": "2024-10-08T13:54:46.450",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -109,7 +109,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20439.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20439.json
index 5618ab7bc4f..13d73812d6f 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20439.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20439.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20439",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-04T17:15:13.210",
"lastModified": "2024-09-13T19:35:32.477",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20440.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20440.json
index 128bb6409a5..f379500d312 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20440.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20440.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20440",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-04T17:15:13.517",
"lastModified": "2024-09-19T13:42:41.017",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20441.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20441.json
index 7fc84df3f44..b7007167f3c 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20441.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20441.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20441",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:15.967",
"lastModified": "2024-10-08T13:45:07.300",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -109,7 +109,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20442.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20442.json
index a36ec180f4b..d98f059bd53 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20442.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20442.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20442",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:16.177",
"lastModified": "2024-10-07T20:11:48.687",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -109,7 +109,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20443.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20443.json
index 4003a2a645b..5db177e8daa 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20443.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20443.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20443",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-07T17:15:50.053",
"lastModified": "2024-08-23T15:18:06.347",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -286,7 +286,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-V2bm9JCY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20444.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20444.json
index cb9d6b3007d..1c40800385c 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20444.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20444.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20444",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:16.390",
"lastModified": "2024-10-08T15:26:38.527",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-raci-T46k3jnN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20445.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20445.json
index c9c3c3514e1..54590b71744 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20445.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20445.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20445",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:14.830",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-infodisc-sbyqQVbG",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20446.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20446.json
index 77a38504262..8c0f06426ed 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20446.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20446.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20446",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-28T17:15:09.997",
"lastModified": "2024-08-29T13:25:27.537",
"vulnStatus": "Undergoing Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dhcp6-relay-dos-znEAA6xn",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20448.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20448.json
index 4604569b204..329bf8614d6 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20448.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20448.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20448",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:16.597",
"lastModified": "2024-10-08T15:25:47.053",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -102,7 +102,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-cidv-XvyX2wLj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20449.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20449.json
index 768ba368065..8e2fb0960d9 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20449.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20449.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20449",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:16.820",
"lastModified": "2024-10-08T15:33:29.210",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -103,7 +103,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-ptrce-BUSHLbp",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20450.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20450.json
index 6c1856be075..fb6e524ef1f 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20450.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20450.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20450",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-07T17:15:50.283",
"lastModified": "2024-08-23T18:14:43.787",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -383,7 +383,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spa-http-vulns-RJZmX2Xz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20451.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20451.json
index 4c923b36874..48f6f030e29 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20451.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20451.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20451",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-07T17:15:50.493",
"lastModified": "2024-08-23T18:14:11.137",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -383,7 +383,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spa-http-vulns-RJZmX2Xz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20454.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20454.json
index bd759d2d4d0..fdceb31738e 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20454.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20454.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20454",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-07T17:15:50.713",
"lastModified": "2024-08-23T18:13:47.510",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -383,7 +383,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spa-http-vulns-RJZmX2Xz",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20455.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20455.json
index 9e481ff03f9..12581190c3a 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20455.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20455.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20455",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:16.827",
"lastModified": "2024-10-24T19:47:49.750",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -611,7 +611,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-utd-dos-hDATqxs",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20456.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20456.json
index ef03d2d9742..ff175913b2c 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20456.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20456.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20456",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-07-10T16:15:03.703",
"lastModified": "2024-11-21T08:52:40.973",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr-secure-boot-quD5g8Ap",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr-secure-boot-quD5g8Ap",
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20457.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20457.json
index 269679af420..8c421144fa7 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20457.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20457.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20457",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:15.107",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-inf-disc-cUPKuA5n",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20458.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20458.json
index bd9c408a3b5..f48cfa5dacd 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20458.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20458.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20458",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-16T17:15:14.423",
"lastModified": "2024-10-22T18:03:09.777",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -170,7 +170,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20459.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20459.json
index 36177ea197b..06fabefd7c8 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20459.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20459.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20459",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-16T17:15:14.657",
"lastModified": "2024-10-22T18:06:48.333",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -170,7 +170,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20460.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20460.json
index 051eee003d1..116ac84544d 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20460.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20460.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20460",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-16T17:15:14.880",
"lastModified": "2024-10-31T14:35:07.573",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20461.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20461.json
index e980343f208..94407048816 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20461.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20461.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20461",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-16T17:15:15.127",
"lastModified": "2024-10-22T18:26:01.890",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -170,7 +170,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20462.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20462.json
index 74eec52666d..4ee396b50c5 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20462.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20462.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20462",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-16T17:15:15.357",
"lastModified": "2024-10-31T14:35:08.380",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20463.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20463.json
index 57eaecb37a3..6d90025e45f 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20463.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20463.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20463",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-16T17:15:15.670",
"lastModified": "2024-10-31T13:35:02.373",
"vulnStatus": "Modified",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -180,7 +180,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20464.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20464.json
index 64e5f119e51..72e4c9bbcf2 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20464.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20464.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20464",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:17.043",
"lastModified": "2024-10-24T19:47:29.740",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -106,7 +106,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pim-APbVfySJ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20465.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20465.json
index 6ef6292d5ea..2e59f8631dc 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20465.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20465.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20465",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:17.220",
"lastModified": "2024-10-24T19:46:15.007",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-repacl-9eXgnBpD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20466.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20466.json
index dde7f9a6a28..95cab8e5a53 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20466.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20466.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20466",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-21T20:15:08.737",
"lastModified": "2024-10-31T14:35:09.360",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -64,7 +64,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-exp-vdF8Jbyk",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20467.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20467.json
index 148b30e33e2..65d5b85df31 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20467.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20467.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20467",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:17.393",
"lastModified": "2024-10-03T20:09:50.970",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -111,7 +111,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpp-vfr-dos-nhHKGgO",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20469.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20469.json
index 8668916fea5..522b479489b 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20469.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20469.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20469",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-04T17:15:13.740",
"lastModified": "2024-09-20T16:58:14.327",
"vulnStatus": "Undergoing Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -151,7 +151,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-6kn9tSxm",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20470.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20470.json
index 4342355d486..ed7f3144968 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20470.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20470.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20470",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:17.027",
"lastModified": "2024-10-09T16:55:23.887",
"vulnStatus": "Analyzed",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -574,7 +574,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20471.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20471.json
index 9af372946e4..462289a73d0 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20471.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20471.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20471",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:10.773",
"lastModified": "2024-11-01T18:16:35.227",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -551,7 +551,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20472.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20472.json
index 01a580e1a09..5499aa1bbfe 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20472.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20472.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20472",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:11.007",
"lastModified": "2024-11-01T18:22:41.030",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20473.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20473.json
index dfa0ad7fcf9..08404e17fae 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20473.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20473.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20473",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:11.280",
"lastModified": "2024-11-01T18:09:35.813",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -131,7 +131,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20474.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20474.json
index 7c853cd2820..0b43cc89255 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20474.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20474.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20474",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:11.517",
"lastModified": "2024-11-01T18:14:56.790",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -286,7 +286,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csc-dos-XvPhM3bj",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20475.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20475.json
index 88657382d63..5d45168cf56 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20475.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20475.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20475",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:17.587",
"lastModified": "2024-10-03T17:49:17.797",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -606,7 +606,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-xss-zQ4KPvYd",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20476.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20476.json
index 26c196c1e16..2bd5cf1195e 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20476.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20476.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20476",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:15.337",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vulns-AF544ED5",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20477.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20477.json
index b163897836d..9dcc977dad2 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20477.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20477.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20477",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:17.130",
"lastModified": "2024-10-08T16:00:30.167",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -109,7 +109,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20478.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20478.json
index f9ff2554278..b0eed0c5939 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20478.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20478.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20478",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-28T17:15:10.220",
"lastModified": "2024-08-29T13:25:27.537",
"vulnStatus": "Undergoing Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-priv-esc-uYQJjnuU",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20479.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20479.json
index c6fa0d235b4..63c3d6bad92 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20479.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20479.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20479",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-07T17:15:50.930",
"lastModified": "2024-08-23T15:14:45.913",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -286,7 +286,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-V2bm9JCY",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20480.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20480.json
index b49dc4d16ab..94c65395f25 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20480.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20480.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20480",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:17.787",
"lastModified": "2024-10-03T20:07:33.900",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1121,7 +1121,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sda-edge-dos-MBcbG9k",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20481.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20481.json
index 5a8cd7329d0..f2c14e7b407 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20481.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20481.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20481",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:11.737",
"lastModified": "2024-10-29T17:47:44.083",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -65,7 +65,7 @@
"cisaVulnerabilityName": "Cisco ASA and FTD Denial-of-Service Vulnerability",
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1555,7 +1555,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-bf-dos-vDZhLqrW",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20482.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20482.json
index 9c237c6081e..0365d6c7548 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20482.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20482.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20482",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:12.063",
"lastModified": "2024-11-01T19:49:21.493",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -191,7 +191,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-priv-esc-CMQ4S6m7",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20483.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20483.json
index ceda6a12573..6b45f106d21 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20483.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20483.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20483",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-11T17:15:13.213",
"lastModified": "2024-10-03T01:44:17.827",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ponctlr-ci-OHcHmsFL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20484.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20484.json
index ab99b3956b5..00411015925 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20484.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20484.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20484",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:15.580",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-Oqb9uFEv",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20485.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20485.json
index 3c03b5b9e49..90d2efce5ce 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20485.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20485.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20485",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:12.273",
"lastModified": "2024-11-01T19:50:11.107",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1526,7 +1526,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-lce-vU3ekMJ3",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20486.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20486.json
index e51ba92c3b3..b771e802871 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20486.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20486.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20486",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-21T20:15:08.933",
"lastModified": "2024-08-22T12:48:02.790",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-csrf-y4ZUz5Rj",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20487.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20487.json
index 5811446efc1..fe077405767 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20487.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20487.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20487",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:15.833",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vulns-AF544ED5",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20488.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20488.json
index 4992bf627de..822310d9b1e 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20488.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20488.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20488",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-08-21T19:15:13.163",
"lastModified": "2024-09-06T17:18:11.813",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -201,7 +201,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-9zmfHyZ",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20489.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20489.json
index e7464f878b8..7d5f7e1ec30 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20489.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20489.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20489",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-11T17:15:13.393",
"lastModified": "2024-10-03T01:40:11.637",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -121,7 +121,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ponctlr-ci-OHcHmsFL",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20490.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20490.json
index be9c67f5274..5bb5a28beec 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20490.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20490.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20490",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:17.350",
"lastModified": "2024-10-08T15:15:39.160",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-idv-Bk8VqEDc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20491.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20491.json
index 688a8616448..7d580160e3f 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20491.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20491.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20491",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:17.563",
"lastModified": "2024-10-08T15:55:08.933",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -129,7 +129,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-idv-Bk8VqEDc",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20492.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20492.json
index f732c164bc7..d90a307032e 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20492.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20492.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20492",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:17.763",
"lastModified": "2024-10-08T16:07:26.280",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -491,7 +491,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expw-escalation-3bkz77bD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20493.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20493.json
index 7f32b2fe296..f4f575ddbd6 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20493.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20493.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20493",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:12.533",
"lastModified": "2024-11-01T12:54:23.637",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1576,7 +1576,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-vpn-4gYEWMKg",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20494.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20494.json
index fb668a2fc9e..d1f6751efe5 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20494.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20494.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20494",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:12.783",
"lastModified": "2024-10-25T12:56:07.750",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-tls-CWY6zXB",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20495.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20495.json
index fb9cac1d8e4..d8c1fc5711d 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20495.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20495.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20495",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:13.007",
"lastModified": "2024-10-25T12:56:07.750",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-vpn-cZf8gT",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20496.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20496.json
index fb49981c040..63ddadd688d 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20496.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20496.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20496",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:18.020",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-vedos-KqFfhps3",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20497.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20497.json
index f041d45e3ec..bcdacc4a83d 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20497.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20497.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20497",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-04T17:15:13.970",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-auth-kdFrcZ2j",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20498.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20498.json
index 1f48e9f7e93..1ede5ddf028 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20498.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20498.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20498",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T19:15:13.870",
"lastModified": "2024-10-08T18:32:54.457",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -811,7 +811,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20499.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20499.json
index 677e20c5ad8..52cd228fa96 100644
--- a/CVE-2024/CVE-2024-204xx/CVE-2024-20499.json
+++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20499.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20499",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T19:15:14.143",
"lastModified": "2024-10-08T18:27:16.110",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -811,7 +811,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20500.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20500.json
index e998061753d..b08ed40796a 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20500.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20500.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20500",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T19:15:14.350",
"lastModified": "2024-10-08T18:27:19.347",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -811,7 +811,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20501.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20501.json
index 03bb352eeb6..5d3672de550 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20501.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20501.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20501",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T19:15:14.570",
"lastModified": "2024-10-08T18:28:51.753",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -811,7 +811,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20502.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20502.json
index 00a9f635998..5fea008e0ed 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20502.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20502.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20502",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T19:15:14.780",
"lastModified": "2024-10-08T18:46:38.437",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -811,7 +811,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20503.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20503.json
index 0af26559e5e..c6fce9542c5 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20503.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20503.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20503",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-04T17:15:14.200",
"lastModified": "2024-09-13T19:24:37.420",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -126,7 +126,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-epic-info-sdLv6h8y",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20504.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20504.json
index 78f61c8ac13..5e26d2972b1 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20504.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20504.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20504",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:16.053",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-xss-zYm3f49n",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20505.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20505.json
index 10305a86cbc..410740b4908 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20505.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20505.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20505",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-04T22:15:03.887",
"lastModified": "2024-09-12T17:28:47.010",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -111,7 +111,7 @@
"references": [
{
"url": "https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20506.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20506.json
index b8ed531bc15..481dd9ed207 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20506.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20506.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20506",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-04T22:15:04.083",
"lastModified": "2024-09-12T17:26:37.643",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -111,7 +111,7 @@
"references": [
{
"url": "https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Release Notes"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20507.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20507.json
index 3653dc103bf..56839476d07 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20507.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20507.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20507",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:16.257",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-info-disc-9ZEMAhGA",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20508.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20508.json
index f73d92e0551..32751f79808 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20508.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20508.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20508",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:18.267",
"lastModified": "2024-10-03T14:43:23.810",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -176,7 +176,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-utd-snort3-dos-bypas-b4OUEwxD",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20509.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20509.json
index 6aa47e526cc..ab4a3573c29 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20509.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20509.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20509",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T19:15:14.997",
"lastModified": "2024-10-08T18:45:52.513",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -811,7 +811,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20510.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20510.json
index 6899be13a32..8c5e7ce974f 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20510.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20510.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20510",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-09-25T17:15:18.470",
"lastModified": "2024-10-03T14:52:22.627",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -1081,7 +1081,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9800-cwa-acl-nPSbHSnA",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20511.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20511.json
index dbd92538703..9a7f65876dd 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20511.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20511.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20511",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:16.467",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-SVCkMMW",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20512.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20512.json
index 230235ea6c3..24e47939af7 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20512.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20512.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20512",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-16T17:15:15.913",
"lastModified": "2024-10-18T12:53:04.627",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccmpdm-rxss-tAX76U3k",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20513.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20513.json
index 83243aaf6ed..8456ee4b7d4 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20513.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20513.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20513",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T19:15:15.210",
"lastModified": "2024-10-08T21:16:54.820",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -811,7 +811,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20514.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20514.json
index 3994f79060c..9882e407e9a 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20514.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20514.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20514",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:16.687",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-yyf2zkXs",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json
index cd61bcbea52..4b6aeb78ef5 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20515",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:17.973",
"lastModified": "2024-10-08T16:11:23.440",
"vulnStatus": "Undergoing Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -251,7 +251,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-disc-ZYF2nEEX",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20516.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20516.json
index 41183f51801..aba0c4a34f6 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20516.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20516.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20516",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:18.200",
"lastModified": "2024-10-08T13:44:10.840",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -954,7 +954,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20517.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20517.json
index b4e2ac4d9b0..371cb5d05f1 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20517.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20517.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20517",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:18.417",
"lastModified": "2024-10-08T13:47:52.483",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -954,7 +954,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20518.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20518.json
index cebe727520d..3cf9c605c01 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20518.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20518.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20518",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:18.637",
"lastModified": "2024-10-08T13:50:14.730",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -954,7 +954,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20519.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20519.json
index fb3af1c76b2..0781e0afc3d 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20519.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20519.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20519",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:18.837",
"lastModified": "2024-10-08T13:50:35.507",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -954,7 +954,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20520.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20520.json
index 037e4743794..d770b7931fd 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20520.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20520.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20520",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:19.050",
"lastModified": "2024-10-08T13:50:48.337",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -954,7 +954,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20521.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20521.json
index 3ce04a70ad7..2d4eb6bb47d 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20521.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20521.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20521",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:19.280",
"lastModified": "2024-10-08T13:50:57.163",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -954,7 +954,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20522.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20522.json
index 1e74d11bafc..7ab9cc05ea3 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20522.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20522.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20522",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:19.490",
"lastModified": "2024-10-08T13:48:19.060",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -954,7 +954,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20523.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20523.json
index 591bb03ea0a..e6c2a651bc2 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20523.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20523.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20523",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:19.707",
"lastModified": "2024-10-08T13:48:29.500",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -954,7 +954,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20524.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20524.json
index d85d182e4f0..51bba3169ef 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20524.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20524.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20524",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:19.930",
"lastModified": "2024-10-08T13:48:58.273",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -954,7 +954,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20525.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20525.json
index a067487735b..302f2f3bbdd 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20525.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20525.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20525",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:16.927",
"lastModified": "2024-11-20T16:54:28.817",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -241,7 +241,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vuln-DBQdWRy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20526.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20526.json
index cfdf7ea1b9c..6ff51fb5349 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20526.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20526.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20526",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-23T18:15:13.303",
"lastModified": "2024-10-31T01:08:26.047",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -116,7 +116,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssh-dos-eEDWu5RM",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Mitigation",
"Vendor Advisory"
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20527.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20527.json
index cb5b2f492da..528bdc04c70 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20527.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20527.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20527",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:17.147",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vuln-DBQdWRy",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20528.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20528.json
index aecfc8eea17..c6555b58679 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20528.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20528.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20528",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:17.373",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vuln-DBQdWRy",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20529.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20529.json
index 81f56b946cd..44aacb73d02 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20529.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20529.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20529",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:17.593",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vuln-DBQdWRy",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20530.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20530.json
index 9fd28ba19d6..5f1c895a5ad 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20530.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20530.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20530",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:17.793",
"lastModified": "2024-11-20T16:50:11.577",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -241,7 +241,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vuln-DBQdWRy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20531.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20531.json
index 3c25101e094..d5ad7d12020 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20531.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20531.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20531",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:18.043",
"lastModified": "2024-11-20T16:45:31.467",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -255,7 +255,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vuln-DBQdWRy",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20532.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20532.json
index a0d4fa2f2ef..274df77be7e 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20532.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20532.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20532",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:18.270",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vuln-DBQdWRy",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20533.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20533.json
index 4a8baa3a9da..afd137f79c9 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20533.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20533.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20533",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:18.700",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mpp-xss-8tAV2TvF",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20534.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20534.json
index 8f40ceb72bc..7137d16df75 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20534.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20534.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20534",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:18.927",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mpp-xss-8tAV2TvF",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20536.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20536.json
index d662ad2346b..522c8542f25 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20536.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20536.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20536",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:19.140",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-sqli-CyPPAxrL",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20537.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20537.json
index 74921767b0c..f6ae6d73a72 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20537.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20537.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20537",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:19.350",
"lastModified": "2024-11-22T19:53:29.893",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -231,7 +231,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-BBRf7mkE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20538.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20538.json
index 6aeb8d86bfd..8b8997aa259 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20538.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20538.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20538",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:19.563",
"lastModified": "2024-11-20T14:36:01.810",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -236,7 +236,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-BBRf7mkE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20539.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20539.json
index 4af7fec0d29..9e712d34621 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20539.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20539.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20539",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:19.767",
"lastModified": "2024-11-22T19:42:09.633",
"vulnStatus": "Analyzed",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -61,7 +61,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -226,7 +226,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-BBRf7mkE",
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20540.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20540.json
index b549628dd31..3f30aef3c8e 100644
--- a/CVE-2024/CVE-2024-205xx/CVE-2024-20540.json
+++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20540.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2024-20540",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-06T17:15:19.977",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccmp-sxss-qBTDBZDD",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2084.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2084.json
index fd91d94a59f..1bb3524df4e 100644
--- a/CVE-2024/CVE-2024-20xx/CVE-2024-2084.json
+++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2084.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:15.543",
"lastModified": "2024-11-21T09:09:00.623",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2085.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2085.json
index 8c5784a0d9d..dce78ef6615 100644
--- a/CVE-2024/CVE-2024-20xx/CVE-2024-2085.json
+++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2085.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:15.710",
"lastModified": "2024-11-21T09:09:00.743",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22347.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22347.json
index 26cf9cc9ed6..1d2c465cb72 100644
--- a/CVE-2024/CVE-2024-223xx/CVE-2024-22347.json
+++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22347.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-20T18:15:13.540",
"lastModified": "2025-01-20T18:15:13.540",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM DevOps Velocity 5.0.0 and IBM UrbanCode Velocity 4.0.0 through 4.0. 25 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information."
+ },
+ {
+ "lang": "es",
+ "value": "IBM DevOps Velocity 5.0.0 e IBM UrbanCode Velocity 4.0.0 a 4.0.25 utilizan algoritmos criptogr\u00e1ficos m\u00e1s d\u00e9biles de lo esperado que podr\u00edan permitir a un atacante descifrar informaci\u00f3n altamente confidencial."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22348.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22348.json
index bcd8a213bac..f95e274c102 100644
--- a/CVE-2024/CVE-2024-223xx/CVE-2024-22348.json
+++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22348.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-20T18:15:13.737",
"lastModified": "2025-01-20T18:15:13.737",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM DevOps Velocity 5.0.0 and IBM UrbanCode Velocity 4.0.0 through 4.0. 25 uses Cross-Origin Resource Sharing (CORS) which could allow an attacker to carry out privileged actions and retrieve sensitive information as the domain name is not being limited to only trusted domains."
+ },
+ {
+ "lang": "es",
+ "value": "IBM DevOps Velocity 5.0.0 e IBM UrbanCode Velocity 4.0.0 a 4.0.25 utilizan Cross-Origin Resource Sharing (CORS), lo que podr\u00eda permitir a un atacante realizar acciones privilegiadas y recuperar informaci\u00f3n confidencial, ya que el nombre de dominio no est\u00e1 limitado solo a dominios confiables."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22349.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22349.json
index 8a7fbe554fb..e4f9a789e23 100644
--- a/CVE-2024/CVE-2024-223xx/CVE-2024-22349.json
+++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22349.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-20T18:15:13.930",
"lastModified": "2025-01-20T18:15:13.930",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM DevOps Velocity 5.0.0 and IBM UrbanCode Velocity 4.0.0 through 4.0. 25 allows web pages to be stored locally which can be read by another user on the system."
+ },
+ {
+ "lang": "es",
+ "value": "IBM DevOps Velocity 5.0.0 e IBM UrbanCode Velocity 4.0.0 a 4.0.25 permiten que las p\u00e1ginas web se almacenen localmente y que otro usuario pueda leerlas en sistema."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2226.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2226.json
index 430202a6fc0..e46dcfb1a32 100644
--- a/CVE-2024/CVE-2024-22xx/CVE-2024-2226.json
+++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2226.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-09T19:15:30.320",
"lastModified": "2024-11-21T09:09:17.873",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2255.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2255.json
index 93a0d8cc122..4ed62bd40b2 100644
--- a/CVE-2024/CVE-2024-22xx/CVE-2024-2255.json
+++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2255.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-20T04:15:10.840",
"lastModified": "2024-11-21T09:09:21.510",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24429.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24429.json
index 68ba4e13898..aef6cd66d72 100644
--- a/CVE-2024/CVE-2024-244xx/CVE-2024-24429.json
+++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24429.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A reachable assertion in the nas_eps_send_emm_to_esm function of Open5GS <= 2.6.4 allows attackers to cause a Denial of Service (DoS) via a crafted NGAP packet."
+ },
+ {
+ "lang": "es",
+ "value": "Una afirmaci\u00f3n alcanzable en la funci\u00f3n nas_eps_send_emm_to_esm de Open5GS <= 2.6.4 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NGAP manipulado."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24432.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24432.json
index 650bd6195a1..b53d88197aa 100644
--- a/CVE-2024/CVE-2024-244xx/CVE-2024-24432.json
+++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24432.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A reachable assertion in the ogs_kdf_hash_mme function of Open5GS <= 2.6.4 allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet."
+ },
+ {
+ "lang": "es",
+ "value": "Una afirmaci\u00f3n alcanzable en la funci\u00f3n ogs_kdf_hash_mme de Open5GS <= 2.6.4 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NAS manipulado."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24444.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24444.json
index fb16d899e89..0253b406c8d 100644
--- a/CVE-2024/CVE-2024-244xx/CVE-2024-24444.json
+++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24444.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T22:15:11.737",
"lastModified": "2025-01-21T22:15:11.737",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper file descriptor handling for closed connections in OpenAirInterface CN5G AMF (oai-cn5g-amf) up to v2.0.0 allows attackers to cause a Denial of Service (DoS) by repeatedly establishing SCTP connections with the N2 interface."
+ },
+ {
+ "lang": "es",
+ "value": "La gesti\u00f3n inadecuada del descriptor de archivo para conexiones cerradas en OpenAirInterface CN5G AMF (oai-cn5g-amf) hasta v2.0.0 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) al establecer repetidamente conexiones SCTP con la interfaz N2."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25999.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25999.json
index 20f40a89015..413f88430bf 100644
--- a/CVE-2024/CVE-2024-259xx/CVE-2024-25999.json
+++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25999.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-03-12T09:15:08.233",
"lastModified": "2025-01-23T18:46:09.307",
- "vulnStatus": "Analyzed",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2546.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2546.json
index da1211df309..ec644bd1c93 100644
--- a/CVE-2024/CVE-2024-25xx/CVE-2024-2546.json
+++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2546.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-17T02:15:06.190",
"lastModified": "2024-11-21T09:09:59.040",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26153.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26153.json
index b0bfa8171e8..e85d880a2df 100644
--- a/CVE-2024/CVE-2024-261xx/CVE-2024-26153.json
+++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26153.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:10.927",
"lastModified": "2025-01-17T17:15:10.927",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19 \nare vulnerable to cross-site request forgery (CSRF). An external \nattacker with no access to the device can force the end user into \nsubmitting a \"setconf\" method request, not requiring any CSRF token, \nwhich can lead into denial of service on the device."
+ },
+ {
+ "lang": "es",
+ "value": "Todas las versiones de ETIC Telecom Remote Access Server (RAS) anteriores a la 4.9.19\nson vulnerables a Cross-Site Request Forgery (CSRF). Un atacante externo sin acceso al dispositivo puede obligar al usuario final a enviar una solicitud de m\u00e9todo \"\"setconf\"\", sin necesidad de ning\u00fan token CSRF, lo que puede provocar una denegaci\u00f3n de servicio en el dispositivo. "
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26154.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26154.json
index 56739b545af..e303427d7fb 100644
--- a/CVE-2024/CVE-2024-261xx/CVE-2024-26154.json
+++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26154.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:11.147",
"lastModified": "2025-01-17T17:15:11.147",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting in the appliance site \nname. The ETIC RAS web server saves the site name and then presents it \nto the administrators in a few different pages."
+ },
+ {
+ "lang": "es",
+ "value": "Todas las versiones de ETIC Telecom Remote Access Server (RAS) anteriores a la 4.5.0 son vulnerables a la Cross Site Scripting Reflejado en el nombre del sitio del dispositivo. El servidor web ETIC RAS ??guarda el nombre del sitio y luego lo presenta a los administradores en algunas p\u00e1ginas diferentes."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26155.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26155.json
index 0689e5b78eb..6e9926e8014 100644
--- a/CVE-2024/CVE-2024-261xx/CVE-2024-26155.json
+++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26155.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:11.327",
"lastModified": "2025-01-17T17:15:11.327",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nexpose clear text credentials in the web portal. An attacker can access \nthe ETIC RAS web portal and view the HTML code, which is configured to \nbe hidden, thus allowing a connection to the ETIC RAS ssh server, which \ncould enable an attacker to perform actions on the device."
+ },
+ {
+ "lang": "es",
+ "value": "Todas las versiones de ETIC Telecom Remote Access Server (RAS) anteriores a la 4.5.0 exponen credenciales de texto sin formato en el portal web. Un atacante puede acceder al portal web de ETIC RAS ??y ver el c\u00f3digo HTML, que est\u00e1 configurado para estar oculto, lo que permite una conexi\u00f3n al servidor ssh de ETIC RAS, lo que podr\u00eda permitir a un atacante realizar acciones en el dispositivo."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26156.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26156.json
index 3e241fa533f..fd8d7f04cc7 100644
--- a/CVE-2024/CVE-2024-261xx/CVE-2024-26156.json
+++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26156.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:11.533",
"lastModified": "2025-01-17T17:15:11.533",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting (XSS) attacks in the \nmethod parameter. The ETIC RAS web server uses dynamic pages that gets \ntheir input from the client side and reflects the input in its response \nto the client."
+ },
+ {
+ "lang": "es",
+ "value": "Todas las versiones de ETIC Telecom Remote Access Server (RAS) anteriores a la 4.5.0 son vulnerables a ataques de Cross Site Scripting (XSS) Reflejado en el par\u00e1metro method. El servidor web ETIC RAS ??utiliza p\u00e1ginas din\u00e1micas que obtienen su entrada del lado del cliente y reflejan la entrada en su respuesta al cliente."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26157.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26157.json
index 305aec7a8de..92f420cdc6b 100644
--- a/CVE-2024/CVE-2024-261xx/CVE-2024-26157.json
+++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26157.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:11.697",
"lastModified": "2025-01-17T17:15:11.697",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting (XSS) attacks in get \nview method under view parameter. The ETIC RAS web server uses dynamic \npages that get their input from the client side and reflect the input in\n their response to the client."
+ },
+ {
+ "lang": "es",
+ "value": "Todas las versiones de ETIC Telecom Remote Access Server (RAS) anteriores a la 4.5.0 son vulnerables a ataques de Cross Site Scripting (XSS) Reflejado en el m\u00e9todo get view bajo el par\u00e1metro view. El servidor web ETIC RAS ??utiliza p\u00e1ginas din\u00e1micas que obtienen su informaci\u00f3n del lado del cliente y reflejan la informaci\u00f3n en su respuesta al cliente."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26649.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26649.json
index 3f77d874eaf..bc99315afdf 100644
--- a/CVE-2024/CVE-2024-266xx/CVE-2024-26649.json
+++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26649.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:10.370",
"lastModified": "2024-11-21T09:02:45.903",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26770.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26770.json
index 649f3757cb1..b1f8fd9b29e 100644
--- a/CVE-2024/CVE-2024-267xx/CVE-2024-26770.json
+++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26770.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-03T17:15:52.910",
"lastModified": "2024-11-21T09:03:01.960",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26771.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26771.json
index 4e0915c9554..4a3c868d512 100644
--- a/CVE-2024/CVE-2024-267xx/CVE-2024-26771.json
+++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26771.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-03T17:15:52.967",
"lastModified": "2024-11-21T09:03:02.077",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26863.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26863.json
index d6e281011b2..0691fc0bf43 100644
--- a/CVE-2024/CVE-2024-268xx/CVE-2024-26863.json
+++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26863.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-17T11:15:09.100",
"lastModified": "2024-11-21T09:03:14.533",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26866.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26866.json
index f581550029c..b158b60ecb1 100644
--- a/CVE-2024/CVE-2024-268xx/CVE-2024-26866.json
+++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26866.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-17T11:15:09.253",
"lastModified": "2024-11-21T09:03:15.000",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26879.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26879.json
index 1e7fa76d07f..7e958628f27 100644
--- a/CVE-2024/CVE-2024-268xx/CVE-2024-26879.json
+++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26879.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-17T11:15:09.913",
"lastModified": "2024-11-21T09:03:16.793",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26893.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26893.json
index 0b67a0a6b6d..08108269dc0 100644
--- a/CVE-2024/CVE-2024-268xx/CVE-2024-26893.json
+++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26893.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-17T11:15:10.577",
"lastModified": "2024-11-21T09:03:19.143",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27134.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27134.json
index 39195b999cf..350ed2dfd07 100644
--- a/CVE-2024/CVE-2024-271xx/CVE-2024-27134.json
+++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27134.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "reefs@jfrog.com",
"published": "2024-11-25T14:15:06.867",
"lastModified": "2024-11-25T14:15:06.867",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2790.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2790.json
index 3ee983437d0..13c923a0ab6 100644
--- a/CVE-2024/CVE-2024-27xx/CVE-2024-2790.json
+++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2790.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:19.513",
"lastModified": "2024-11-21T09:10:31.453",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2867.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2867.json
index 320dc437f49..17e5989fa6c 100644
--- a/CVE-2024/CVE-2024-28xx/CVE-2024-2867.json
+++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2867.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:20.297",
"lastModified": "2024-11-21T09:10:42.893",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29107.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29107.json
index 39a2c8ce53c..12b3903966f 100644
--- a/CVE-2024/CVE-2024-291xx/CVE-2024-29107.json
+++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29107.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-19T16:15:15.297",
"lastModified": "2024-11-21T09:07:34.160",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29953.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29953.json
index 547f0188d5e..da59cffa8d5 100644
--- a/CVE-2024/CVE-2024-299xx/CVE-2024-29953.json
+++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29953.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-06-26T00:15:10.030",
"lastModified": "2024-11-21T09:08:41.407",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30182.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30182.json
index a7b3aaf4375..de170e3eca2 100644
--- a/CVE-2024/CVE-2024-301xx/CVE-2024-30182.json
+++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30182.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-27T12:15:12.320",
"lastModified": "2024-11-21T09:11:22.890",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30422.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30422.json
index a9c194b80b1..adc5253bf37 100644
--- a/CVE-2024/CVE-2024-304xx/CVE-2024-30422.json
+++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30422.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-28T09:15:08.290",
"lastModified": "2024-11-21T09:11:53.470",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3053.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3053.json
index e37633e4fce..4dd1d6e919d 100644
--- a/CVE-2024/CVE-2024-30xx/CVE-2024-3053.json
+++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3053.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-09T19:15:39.033",
"lastModified": "2024-11-21T09:28:46.530",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31903.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31903.json
index ed0111beeb4..a4a5b98612a 100644
--- a/CVE-2024/CVE-2024-319xx/CVE-2024-31903.json
+++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31903.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "IBM Sterling B2B Integrator Standard Edition\u00a06.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2 allow an attacker on the local network to execute arbitrary code on the system, caused by the deserialization of untrusted data."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 a 6.1.2.5 y 6.2.0.0 a 6.2.0.2 permiten que un atacante en la red local ejecute c\u00f3digo arbitrario en sistema, causado por la deserializaci\u00f3n de datos no confiables."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3119.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3119.json
index 7fb98a22749..f48017d3c4e 100644
--- a/CVE-2024/CVE-2024-31xx/CVE-2024-3119.json
+++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3119.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "41c37e40-543d-43a2-b660-2fee83ea851a",
"published": "2024-04-10T00:15:12.107",
"lastModified": "2024-11-21T09:28:56.580",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3120.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3120.json
index a935a4a90c9..c1b611729e5 100644
--- a/CVE-2024/CVE-2024-31xx/CVE-2024-3120.json
+++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3120.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "41c37e40-543d-43a2-b660-2fee83ea851a",
"published": "2024-04-10T00:15:12.340",
"lastModified": "2024-11-21T09:28:56.713",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-325xx/CVE-2024-32555.json b/CVE-2024/CVE-2024-325xx/CVE-2024-32555.json
index 4383e544f82..224e42dbccc 100644
--- a/CVE-2024/CVE-2024-325xx/CVE-2024-32555.json
+++ b/CVE-2024/CVE-2024-325xx/CVE-2024-32555.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:07.027",
"lastModified": "2025-01-21T14:15:07.027",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Privilege Assignment vulnerability in NotFound Easy Real Estate allows Privilege Escalation. This issue affects Easy Real Estate: from n/a through 2.2.6."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en NotFound Easy Real Estate permite la escalada de privilegios. Este problema afecta a Easy Real Estate: desde n/a hasta 2.2.6."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3307.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3307.json
index 022f6b5f25f..5627ae147f7 100644
--- a/CVE-2024/CVE-2024-33xx/CVE-2024-3307.json
+++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3307.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:24.357",
"lastModified": "2024-11-21T09:29:21.743",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3308.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3308.json
index 8ffc22d58d5..4d93c0bf7ba 100644
--- a/CVE-2024/CVE-2024-33xx/CVE-2024-3308.json
+++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3308.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:24.520",
"lastModified": "2024-11-21T09:29:21.867",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34031.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34031.json
index 60f5e053995..edfe7a02e86 100644
--- a/CVE-2024/CVE-2024-340xx/CVE-2024-34031.json
+++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34031.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-05-03T01:15:47.983",
"lastModified": "2024-11-21T09:17:57.240",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34032.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34032.json
index 7012fe2a95e..7ef6f931748 100644
--- a/CVE-2024/CVE-2024-340xx/CVE-2024-34032.json
+++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34032.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-05-03T01:15:48.197",
"lastModified": "2024-11-21T09:17:57.383",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34033.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34033.json
index 80f8c21311b..c765d9e70a9 100644
--- a/CVE-2024/CVE-2024-340xx/CVE-2024-34033.json
+++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34033.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-05-03T01:15:48.390",
"lastModified": "2024-11-21T09:17:57.500",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34235.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34235.json
index 6800a5d6e8f..5cd3415424f 100644
--- a/CVE-2024/CVE-2024-342xx/CVE-2024-34235.json
+++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34235.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `Initial UE Message` missing a required `NAS_PDU` field to repeatedly crash the MME, resulting in denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una afirmaci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un \u00abMensaje inicial de UE\u00bb sin un campo \u00abNAS_PDU\u00bb obligatorio para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34730.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34730.json
index 0f97fb5ae26..1804f328244 100644
--- a/CVE-2024/CVE-2024-347xx/CVE-2024-34730.json
+++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34730.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In multiple locations, there is a possible bypass of user consent to enabling new Bluetooth HIDs due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En varias ubicaciones, existe la posibilidad de omitir el consentimiento del usuario para habilitar nuevos HID de Bluetooth debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35140.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35140.json
index 82735dc9e7d..9dc89daea1f 100644
--- a/CVE-2024/CVE-2024-351xx/CVE-2024-35140.json
+++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35140.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-31T17:15:08.837",
"lastModified": "2024-11-21T09:19:49.420",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35141.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35141.json
index aac96e51cc4..c370e145cae 100644
--- a/CVE-2024/CVE-2024-351xx/CVE-2024-35141.json
+++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35141.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-12-19T02:15:22.810",
"lastModified": "2024-12-19T02:15:22.810",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35142.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35142.json
index fc31e3c54bc..1d0ee5ce7af 100644
--- a/CVE-2024/CVE-2024-351xx/CVE-2024-35142.json
+++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35142.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-31T17:15:09.080",
"lastModified": "2024-11-21T09:19:49.550",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3573.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3573.json
index 275e59a7c93..fd6c25f7786 100644
--- a/CVE-2024/CVE-2024-35xx/CVE-2024-3573.json
+++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3573.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@huntr.dev",
"published": "2024-04-16T00:15:12.570",
"lastModified": "2024-11-21T09:29:54.380",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36372.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36372.json
index 5625b1d3f70..c72ec861f63 100644
--- a/CVE-2024/CVE-2024-363xx/CVE-2024-36372.json
+++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36372.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-05-29T14:15:24.450",
"lastModified": "2024-11-21T09:22:02.920",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36373.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36373.json
index f7fe3442fce..105381c9d2f 100644
--- a/CVE-2024/CVE-2024-363xx/CVE-2024-36373.json
+++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36373.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-05-29T14:15:24.670",
"lastModified": "2024-11-21T09:22:03.053",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36374.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36374.json
index bb1932b58c5..6611e97bc70 100644
--- a/CVE-2024/CVE-2024-363xx/CVE-2024-36374.json
+++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36374.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-05-29T14:15:24.883",
"lastModified": "2024-11-21T09:22:03.193",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36375.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36375.json
index 05757adb4cf..040cab8425d 100644
--- a/CVE-2024/CVE-2024-363xx/CVE-2024-36375.json
+++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36375.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-05-29T14:15:25.097",
"lastModified": "2024-11-21T09:22:03.320",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36376.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36376.json
index dd1018ada02..9008fb30d07 100644
--- a/CVE-2024/CVE-2024-363xx/CVE-2024-36376.json
+++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36376.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-05-29T14:15:25.343",
"lastModified": "2024-11-21T09:22:03.450",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36377.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36377.json
index 921f8e2af8d..2b5fc10bd4f 100644
--- a/CVE-2024/CVE-2024-363xx/CVE-2024-36377.json
+++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36377.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-05-29T14:15:25.573",
"lastModified": "2024-11-21T09:22:03.580",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36378.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36378.json
index 427cf7bc10f..ecaaadc17a1 100644
--- a/CVE-2024/CVE-2024-363xx/CVE-2024-36378.json
+++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36378.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-05-29T14:15:25.787",
"lastModified": "2024-11-21T09:22:03.713",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3680.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3680.json
index 5913e0c44b4..83b98b674a8 100644
--- a/CVE-2024/CVE-2024-36xx/CVE-2024-3680.json
+++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3680.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-14T15:42:02.270",
"lastModified": "2024-11-21T09:30:10.053",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37052.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37052.json
index aefc0f3b0a1..5681e29f700 100644
--- a/CVE-2024/CVE-2024-370xx/CVE-2024-37052.json
+++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37052.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:10.413",
"lastModified": "2024-11-21T09:23:06.550",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37053.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37053.json
index b828b7834e7..8fb5613b850 100644
--- a/CVE-2024/CVE-2024-370xx/CVE-2024-37053.json
+++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37053.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:10.957",
"lastModified": "2024-11-21T09:23:06.690",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37054.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37054.json
index 56edb8ac048..26b03dfb77a 100644
--- a/CVE-2024/CVE-2024-370xx/CVE-2024-37054.json
+++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37054.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:11.190",
"lastModified": "2024-11-21T09:23:06.817",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37055.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37055.json
index fa7820b6a7a..b344edb469c 100644
--- a/CVE-2024/CVE-2024-370xx/CVE-2024-37055.json
+++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37055.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:11.397",
"lastModified": "2024-11-21T09:23:06.957",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37056.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37056.json
index 567ee1fcf17..3e0abd11fa3 100644
--- a/CVE-2024/CVE-2024-370xx/CVE-2024-37056.json
+++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37056.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:11.593",
"lastModified": "2024-11-21T09:23:07.080",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37057.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37057.json
index fbb620586af..af2e6add7f7 100644
--- a/CVE-2024/CVE-2024-370xx/CVE-2024-37057.json
+++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37057.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:11.800",
"lastModified": "2024-11-21T09:23:07.260",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37058.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37058.json
index 8aa56b2941a..529f255f1e9 100644
--- a/CVE-2024/CVE-2024-370xx/CVE-2024-37058.json
+++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37058.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:12.023",
"lastModified": "2024-11-21T09:23:07.470",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37059.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37059.json
index fdf3c7e6ba7..6832ba86b0f 100644
--- a/CVE-2024/CVE-2024-370xx/CVE-2024-37059.json
+++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37059.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:12.227",
"lastModified": "2024-11-21T09:23:07.600",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37060.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37060.json
index 70542b554fd..cbf5c8f2264 100644
--- a/CVE-2024/CVE-2024-370xx/CVE-2024-37060.json
+++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37060.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:12.463",
"lastModified": "2024-11-21T09:23:07.720",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37061.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37061.json
index ebc4cf2eb5c..8590e021915 100644
--- a/CVE-2024/CVE-2024-370xx/CVE-2024-37061.json
+++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37061.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:12.703",
"lastModified": "2024-11-21T09:23:07.847",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37284.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37284.json
index 6c06f795ee4..dd4498143b7 100644
--- a/CVE-2024/CVE-2024-372xx/CVE-2024-37284.json
+++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37284.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "bressers@elastic.co",
"published": "2025-01-21T11:15:09.633",
"lastModified": "2025-01-21T11:15:09.633",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper handling of alternate encoding occurs when Elastic Defend on Windows systems attempts to scan a file or process encoded as a multibyte character. This leads to an uncaught exception causing Elastic Defend to crash which in turn will prevent it from quarantining the file and/or killing the process."
+ },
+ {
+ "lang": "es",
+ "value": "La gesti\u00f3n inadecuada de la codificaci\u00f3n alternativa ocurre cuando Elastic Defend en sistemas Windows intenta escanear un archivo o proceso codificado como un car\u00e1cter multibyte. Esto genera una excepci\u00f3n no detectada que hace que Elastic Defend se bloquee, lo que a su vez le impedir\u00e1 poner en cuarentena el archivo o finalizar el proceso."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json
index ae07b7dcf69..f36bea93856 100644
--- a/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json
+++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json
index 799edc03e27..69df3145e0c 100644
--- a/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json
+++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json
index ca7c1a6acfe..c736a812687 100644
--- a/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json
+++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json
index 47766adbc5c..aa3cebc3d58 100644
--- a/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json
+++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json
index 01b94a30e9f..1d282bb910e 100644
--- a/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json
+++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json
index bf3dbcb774f..58438b68107 100644
--- a/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json
+++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json
index c6dc55f154a..2c47f9c7f1a 100644
--- a/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json
+++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json
index 928111d4c29..89c68a00f7d 100644
--- a/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json
+++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38337.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38337.json
index 81f0c4e145e..2c3e82beaa5 100644
--- a/CVE-2024/CVE-2024-383xx/CVE-2024-38337.json
+++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38337.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-19T15:15:19.770",
"lastModified": "2025-01-19T15:15:19.770",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0, and 6.2.0.0 could allow an unauthorized attacker to retrieve or alter sensitive information contents due to incorrect permission assignments."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0 y 6.2.0.0 podr\u00edan permitir que un atacante no autorizado recupere o altere contenidos de informaci\u00f3n confidencial debido a asignaciones de permisos incorrectas."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38706.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38706.json
index 4cc71b5dc58..dc845807237 100644
--- a/CVE-2024/CVE-2024-387xx/CVE-2024-38706.json
+++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38706.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:15.957",
"lastModified": "2024-11-21T09:26:40.183",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3831.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3831.json
index efba3bae4ea..ae10efb5a93 100644
--- a/CVE-2024/CVE-2024-38xx/CVE-2024-3831.json
+++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3831.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-14T15:42:24.540",
"lastModified": "2024-11-21T09:30:29.240",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3883.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3883.json
index b611d53abe7..cbee8ee12f9 100644
--- a/CVE-2024/CVE-2024-38xx/CVE-2024-3883.json
+++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3883.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T09:15:07.233",
"lastModified": "2024-11-21T09:30:37.683",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39282.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39282.json
index 168736c4ad7..a42c6ab63dd 100644
--- a/CVE-2024/CVE-2024-392xx/CVE-2024-39282.json
+++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39282.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: wwan: t7xx: Soluci\u00f3n del problema de tiempo de espera del comando FSM Cuando el controlador procesa el comando de cambio de estado interno, utiliza un hilo asincr\u00f3nico para procesar la operaci\u00f3n del comando. Si el hilo principal detecta que se agot\u00f3 el tiempo de espera de la tarea, el hilo asincr\u00f3nico entrar\u00e1 en p\u00e1nico al ejecutar la notificaci\u00f3n de finalizaci\u00f3n porque se liber\u00f3 el objeto de finalizaci\u00f3n del hilo principal. ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: fffffffffffffff8 PGD 1f283a067 P4D 1f283a067 PUD 1f283c067 PMD 0 Oops: 0000 [#1] PREEMPT SMP NOPTI RIP: 0010:complete_all+0x3e/0xa0 [...] Seguimiento de llamadas: ? __die_body+0x68/0xb0 ? page_fault_oops+0x379/0x3e0 ? exc_page_fault+0x69/0xa0 ? asm_exc_page_fault+0x22/0x30 ? complete_all+0x3e/0xa0 fsm_main_thread+0xa3/0x9c0 [mtk_t7xx (HASH:1400 5)] ? __pfx_autoremove_wake_function+0x10/0x10 kthread+0xd8/0x110 ? __pfx_fsm_main_thread+0x10/0x10 [mtk_t7xx (HASH:1400 5)] ? __pfx_kthread+0x10/0x10 ret_from_fork+0x38/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1b/0x30 [...] CR2: fffffffffffffff8 ---[ fin del seguimiento 000000000000000 ]--- Utilice el contador de referencia para garantizar una liberaci\u00f3n segura como sugiere Sergey: https://lore.kernel.org/all/da90f64c-260a-4329-87bf-1f9ff20a5951@gmail.com/"
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: wwan: t7xx: Soluci\u00f3n del problema de tiempo de espera del comando FSM Cuando el controlador procesa el comando de cambio de estado interno, utiliza un hilo asincr\u00f3nico para procesar la operaci\u00f3n del comando. Si el hilo principal detecta que se agot\u00f3 el tiempo de espera de la tarea, el hilo asincr\u00f3nico entrar\u00e1 en p\u00e1nico al ejecutar la notificaci\u00f3n de finalizaci\u00f3n porque se liber\u00f3 el objeto de finalizaci\u00f3n del hilo principal. ERROR: no se puede gestionar el error de p\u00e1gina para la direcci\u00f3n: fffffffffffffff8 PGD 1f283a067 P4D 1f283a067 PUD 1f283c067 PMD 0 Oops: 0000 [#1] PREEMPT SMP NOPTI RIP: 0010:complete_all+0x3e/0xa0 [...] Seguimiento de llamadas: ? __die_body+0x68/0xb0 ? page_fault_oops+0x379/0x3e0 ? exc_page_fault+0x69/0xa0 ? asm_exc_page_fault+0x22/0x30 ? complete_all+0x3e/0xa0 fsm_main_thread+0xa3/0x9c0 [mtk_t7xx (HASH:1400 5)] ? __pfx_autoremove_wake_function+0x10/0x10 kthread+0xd8/0x110 ? __pfx_fsm_main_thread+0x10/0x10 [mtk_t7xx (HASH:1400 5)] ? __pfx_kthread+0x10/0x10 ret_from_fork+0x38/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1b/0x30 [...] CR2: fffffffffffffff8 ---[ fin del seguimiento 000000000000000 ]--- Utilice el contador de referencia para garantizar una liberaci\u00f3n segura como sugiere Sergey: https://lore.kernel.org/all/da90f64c-260a-4329-87bf-1f9ff20a5951@gmail.com/"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39354.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39354.json
index df55af7ba6d..7063d37e465 100644
--- a/CVE-2024/CVE-2024-393xx/CVE-2024-39354.json
+++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39354.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-11-11T15:15:05.243",
"lastModified": "2024-11-12T13:55:21.227",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39605.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39605.json
index de781affbd3..b198e06abc3 100644
--- a/CVE-2024/CVE-2024-396xx/CVE-2024-39605.json
+++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39605.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-11-11T15:15:05.527",
"lastModified": "2024-11-12T13:55:21.227",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3913.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3913.json
index 5fd82880f92..fc4688e0f85 100644
--- a/CVE-2024/CVE-2024-39xx/CVE-2024-3913.json
+++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3913.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-08-13T13:15:12.750",
"lastModified": "2024-09-13T15:58:13.780",
- "vulnStatus": "Analyzed",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3989.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3989.json
index 5f5d83242d7..672dff32bb8 100644
--- a/CVE-2024/CVE-2024-39xx/CVE-2024-3989.json
+++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3989.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-14T15:42:39.873",
"lastModified": "2024-11-21T09:30:50.250",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3990.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3990.json
index faa20eb32fc..21d93128baf 100644
--- a/CVE-2024/CVE-2024-39xx/CVE-2024-3990.json
+++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3990.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-14T15:42:40.570",
"lastModified": "2024-11-21T09:30:51.623",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40854.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40854.json
index 7b2d9984b47..0702f647f96 100644
--- a/CVE-2024/CVE-2024-408xx/CVE-2024-40854.json
+++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40854.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": " Se solucion\u00f3 un problema de inicializaci\u00f3n de memoria con un manejo mejorado de la memoria. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Sonoma 14.7.1 y macOS Ventura 13.7.1. Es posible que una aplicaci\u00f3n pueda provocar la finalizaci\u00f3n inesperada del sistema."
+ "value": " Se solucion\u00f3 un problema de inicializaci\u00f3n de memoria con una gesti\u00f3n mejorada de la memoria. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Sonoma 14.7.1 y macOS Ventura 13.7.1. Es posible que una aplicaci\u00f3n pueda provocar la finalizaci\u00f3n inesperada del sistema."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4092.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4092.json
index e24e6b37f15..460ddee4a51 100644
--- a/CVE-2024/CVE-2024-40xx/CVE-2024-4092.json
+++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4092.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:34.773",
"lastModified": "2024-11-21T09:42:10.703",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41742.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41742.json
index a88b38feb03..7558de5e8a6 100644
--- a/CVE-2024/CVE-2024-417xx/CVE-2024-41742.json
+++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41742.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-19T15:15:20.730",
"lastModified": "2025-01-19T15:15:20.730",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM TXSeries for Multiplatforms 10.1 is vulnerable to a denial of service, caused by improper enforcement of the timeout on individual read operations. By conducting a slowloris-type attacks, a remote attacker could exploit this vulnerability to cause a denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "IBM TXSeries for Multiplatforms 10.1 es vulnerable a una denegaci\u00f3n de servicio, causada por la aplicaci\u00f3n incorrecta del tiempo de espera en operaciones de lectura individuales. Al realizar ataques de tipo slowloris, un atacante remoto podr\u00eda aprovechar esta vulnerabilidad para provocar una denegaci\u00f3n de servicio."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41743.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41743.json
index 0428b6980ad..cc8118ed6ee 100644
--- a/CVE-2024/CVE-2024-417xx/CVE-2024-41743.json
+++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41743.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-19T15:15:20.877",
"lastModified": "2025-01-19T15:15:20.877",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM TXSeries for Multiplatforms 10.1 could allow a remote attacker to cause a denial of service using persistent connections due to improper allocation of resources."
+ },
+ {
+ "lang": "es",
+ "value": "IBM TXSeries for Multiplatforms 10.1 podr\u00eda permitir que un atacante remoto provoque una denegaci\u00f3n de servicio mediante conexiones persistentes debido a una asignaci\u00f3n incorrecta de recursos."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41783.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41783.json
index aaced7a20da..915fe627b3f 100644
--- a/CVE-2024/CVE-2024-417xx/CVE-2024-41783.json
+++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41783.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-19T15:15:21.020",
"lastModified": "2025-01-19T15:15:21.020",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0, and 6.2.0.0 could allow a privileged user to inject commands into the underlying operating system due to improper validation of a specified type of input."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0 y 6.2.0.0 podr\u00edan permitir que un usuario privilegiado inyecte comandos en el sistema operativo subyacente sistema debido a una validaci\u00f3n incorrecta de un tipo espec\u00edfico de entrada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42012.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42012.json
index 425ddf4812a..926f73bab8e 100644
--- a/CVE-2024/CVE-2024-420xx/CVE-2024-42012.json
+++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42012.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user."
+ },
+ {
+ "lang": "es",
+ "value": "GRAU DATA Blocky anterior a la versi\u00f3n 3.1 almacena contrase\u00f1as cifradas en lugar de cifradas. En la pantalla de inicio de sesi\u00f3n, la contrase\u00f1a del usuario se compara con la contrase\u00f1a texto plano descifrada del usuario. Por lo tanto, un atacante con derechos de administrador o de depuraci\u00f3n de Windows puede robar la contrase\u00f1a de Blocky del usuario y, desde all\u00ed, hacerse pasar por ese usuario local."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42013.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42013.json
index 9ccafad73cc..f8f5713433b 100644
--- a/CVE-2024/CVE-2024-420xx/CVE-2024-42013.json
+++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42013.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In GRAU DATA Blocky before 3.1, Blocky-Gui has a Client-Side Enforcement of Server-Side Security vulnerability. An attacker with Windows administrative or debugging privileges can patch a binary in memory or on disk to bypass the password login requirement and gain full access to all functions of the program."
+ },
+ {
+ "lang": "es",
+ "value": "En GRAU DATA Blocky anterior a la versi\u00f3n 3.1, Blocky-Gui tiene una vulnerabilidad de aplicaci\u00f3n de la seguridad del lado del servidor en el lado del cliente. Un atacante con privilegios administrativos o de depuraci\u00f3n de Windows puede aplicar un parche a un binario en la memoria o en el disco para eludir el requisito de inicio de sesi\u00f3n con contrase\u00f1a y obtener acceso completo a todas las funciones del programa."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42182.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42182.json
index 85cc3f803a0..472a6b5a83e 100644
--- a/CVE-2024/CVE-2024-421xx/CVE-2024-42182.json
+++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42182.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "BigFix Patch Download Plug-ins are affected by Server-Side Request Forgery (SSRF) vulnerability. It may allow the application to download files from an internally hosted server on localhost."
+ },
+ {
+ "lang": "es",
+ "value": "Los complementos de BigFix Patch Download se ven afectados por la vulnerabilidad de Server-Side Request Forgery (SSRF). Puede permitir que la aplicaci\u00f3n descargue archivos desde un servidor alojado internamente en el host local."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42183.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42183.json
index 52e5254051f..e94eab93faa 100644
--- a/CVE-2024/CVE-2024-421xx/CVE-2024-42183.json
+++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42183.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "BigFix Patch Download Plug-ins are affected by an arbitrary file download vulnerability. It could allow a malicious operator to download files from arbitrary URLs without any proper validation or allowlist controls."
+ },
+ {
+ "lang": "es",
+ "value": "Los complementos de BigFix Patch Download se ven afectados por una vulnerabilidad de descarga de archivos arbitrarios. Podr\u00eda permitir que un operador malintencionado descargue archivos desde URL arbitrarias sin ning\u00fan tipo de validaci\u00f3n o control de lista de permitidos."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42184.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42184.json
index 1a5332c4d95..b96d5670076 100644
--- a/CVE-2024/CVE-2024-421xx/CVE-2024-42184.json
+++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42184.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "BigFix Patch Download Plug-ins are affected by insecure support for file URI scheme. It could allow a malicious operator to attempt to download files using the file:// URI scheme."
+ },
+ {
+ "lang": "es",
+ "value": "Los complementos de BigFix Patch Download se ven afectados por una compatibilidad insegura con el esquema de URI de archivos. Esto podr\u00eda permitir que un operador malintencionado intente descargar archivos utilizando el esquema de URI file://."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42185.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42185.json
index ba18c1eeb70..50aa5445ec6 100644
--- a/CVE-2024/CVE-2024-421xx/CVE-2024-42185.json
+++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42185.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "BigFix Patch Download Plug-ins are affected by an insecure package which is susceptible to XML injection attacks. This allows an attacker to exploit this vulnerability by injecting malicious XML content, which can lead to various issues including denial of service and unauthorized access."
+ },
+ {
+ "lang": "es",
+ "value": "Los complementos de BigFix Patch Download se ven afectados por un paquete inseguro que es susceptible a ataques de inyecci\u00f3n XML. Esto permite que un atacante aproveche esta vulnerabilidad inyectando contenido XML malicioso, lo que puede provocar varios problemas, como la denegaci\u00f3n de servicio y el acceso no autorizado."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42186.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42186.json
index 82afa460b14..e0615cad2a4 100644
--- a/CVE-2024/CVE-2024-421xx/CVE-2024-42186.json
+++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42186.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "BigFix Patch Download Plug-ins are affected by an insecure protocol support. The application can allow improper handling of SSL certificates validation."
+ },
+ {
+ "lang": "es",
+ "value": "Los complementos de BigFix Patch Download se ven afectados por un soporte de protocolo inseguro. La aplicaci\u00f3n puede permitir una gesti\u00f3n inadecuada de la validaci\u00f3n de certificados SSL."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42187.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42187.json
index ba76c99bd2c..0280cbf3e31 100644
--- a/CVE-2024/CVE-2024-421xx/CVE-2024-42187.json
+++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42187.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "BigFix Patch Download Plug-ins are affected by path traversal vulnerability. The application could allow operators to download files from a local repository which is vulnerable to path traversal attacks."
+ },
+ {
+ "lang": "es",
+ "value": "Los complementos de BigFix Patch Download se ven afectados por una vulnerabilidad de path traversal. La aplicaci\u00f3n podr\u00eda permitir a los operadores descargar archivos desde un repositorio local que es vulnerable a ataques de path traversal."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4263.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4263.json
index 191d48045ed..c66b67a99ed 100644
--- a/CVE-2024/CVE-2024-42xx/CVE-2024-4263.json
+++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4263.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@huntr.dev",
"published": "2024-05-16T09:15:16.037",
"lastModified": "2024-11-21T09:42:30.143",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43095.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43095.json
index e755a0a4c24..0fd20f187fd 100644
--- a/CVE-2024/CVE-2024-430xx/CVE-2024-43095.json
+++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43095.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In multiple locations, there is a possible way to obtain any system permission due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En varias ubicaciones, existe una forma posible de obtener cualquier permiso sistema debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json
index 6f65e2a603f..e7fe8442091 100644
--- a/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json
+++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En build_read_multi_rsp de gatt_sr.cc, existe una posible escritura fuera de los l\u00edmites debido a una neutra. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43152.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43152.json
index fe73bfeb8c5..97303adf03c 100644
--- a/CVE-2024/CVE-2024-431xx/CVE-2024-43152.json
+++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43152.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-12T22:15:09.310",
"lastModified": "2024-08-13T12:58:25.437",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json
index 77ed79c6caa..7a65b0a6cba 100644
--- a/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json
+++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43501.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43501.json
index d6924649ddd..ff7dd826d4a 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43501.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43501.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43506.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43506.json
index dfda56c4330..26d925dbd08 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43506.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43506.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43509.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43509.json
index ca16ded3a74..0a8748f8b24 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43509.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43509.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43513.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43513.json
index e2b732266a5..d3278983a40 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43513.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43513.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43514.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43514.json
index 4ee6217dce2..4558060ab45 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43514.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43514.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43515.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43515.json
index 5f6e5af5dda..df1cf5aa042 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43515.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43515.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43517.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43517.json
index 3ec5dc7daf9..d83edc6c579 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43517.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43517.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43518.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43518.json
index 114aa535920..c7283b4fd14 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43518.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43518.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43519.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43519.json
index 67fd5c0ba63..9d6f983c4d3 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43519.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43519.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43520.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43520.json
index 366f88a5e69..c588108140e 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43520.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43520.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43521.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43521.json
index b73f0d08214..da974dfe211 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43521.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43521.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json
index cd2b39725f2..518e7320ed3 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json
index 04d1a346451..067a990b0fb 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json
index 69e0b8b2c6f..47a217a0257 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json
index 55f0d1a25c2..490b8e208d7 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json
index 410f5c2e366..1fba5c1b001 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43541.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43541.json
index 67117221d0c..4b6c34e595d 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43541.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43541.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43544.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43544.json
index ef8246f22b8..7989c941845 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43544.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43544.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43545.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43545.json
index bdc037df69b..ce0f53b2bee 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43545.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43545.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43546.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43546.json
index f939b1428e5..332a2be0212 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43546.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43546.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43549.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43549.json
index c2a7ba4a3ae..e20408ce221 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43549.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43549.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43550.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43550.json
index 9bc1bbfbe40..a2dd97de71e 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43550.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43550.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43551.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43551.json
index 2e244876928..ea2472bc640 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43551.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43551.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43554.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43554.json
index 70cfc750d6e..705434d3f93 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43554.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43554.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43556.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43556.json
index 4971a54a4f5..e682fed551a 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43556.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43556.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43560.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43560.json
index 663968979bd..1972cb67fb7 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43560.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43560.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43562.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43562.json
index 69c7068f475..0be2d1eb9da 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43562.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43562.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json
index 0ef4b6fc88a..0a0fc053edf 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43564.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43564.json
index 828c3a80d1d..6f9d448e8d8 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43564.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43564.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43565.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43565.json
index 76847e1ce88..2d59652ff9b 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43565.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43565.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43567.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43567.json
index 44152749065..ede202fc21b 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43567.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43567.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json
index 9d741c7b7ac..1ca517bfda6 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json
index 0085455cf62..100b6d6a28e 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json
index 67359110a6f..d19290ae743 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json
index b7b90ce161b..4eb8e67b7dd 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json
index 49bd5af3507..801b2062b53 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json
index 27c8d161fba..e06bd0de63b 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json
index 5a5c8f13f9f..db15735dda3 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json
index 40ec65c0b03..9135d1bb142 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json
index 785be324c89..038ba8e6c21 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json
index 1a2ae49c39e..6e8f08e2351 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json
index 90502b8875e..f93cf61c496 100644
--- a/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json
+++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json
index 707781f588d..256608f5473 100644
--- a/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json
+++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json
index 5fcd6cf982b..87f0699ee3b 100644
--- a/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json
+++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json
index 4aa99e56380..d3a111cf6f7 100644
--- a/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json
+++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43707.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43707.json
index c0a51e0fabf..4b8781af056 100644
--- a/CVE-2024/CVE-2024-437xx/CVE-2024-43707.json
+++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43707.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "An issue was identified in Kibana where a user without access to Fleet can view Elastic Agent policies that could contain sensitive information. The nature of the sensitive information depends on the integrations enabled for the Elastic Agent and their respective versions."
+ },
+ {
+ "lang": "es",
+ "value": "Se identific\u00f3 un problema en Kibana en el que un usuario sin acceso a Fleet puede ver pol\u00edticas de Elastic Agent que podr\u00edan contener informaci\u00f3n confidencial. La naturaleza de la informaci\u00f3n confidencial depende de las integraciones habilitadas para Elastic Agent y sus respectivas versiones."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43708.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43708.json
index 4db16974be5..64232029dcd 100644
--- a/CVE-2024/CVE-2024-437xx/CVE-2024-43708.json
+++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43708.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted payload to a number of inputs in Kibana UI. This can be carried out by users with read access to any feature in Kibana."
+ },
+ {
+ "lang": "es",
+ "value": "Una asignaci\u00f3n de recursos sin l\u00edmites ni limitaciones en Kibana puede provocar un bloqueo causado por un payload especialmente manipulado para una serie de entradas en la interfaz de usuario de Kibana. Esto lo pueden llevar a cabo los usuarios con acceso de lectura a cualquier funci\u00f3n de Kibana."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43709.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43709.json
index 4efb377d57c..a899b7272b5 100644
--- a/CVE-2024/CVE-2024-437xx/CVE-2024-43709.json
+++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43709.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "bressers@elastic.co",
"published": "2025-01-21T11:15:09.807",
"lastModified": "2025-01-21T11:15:09.807",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An allocation of resources without limits or throttling in Elasticsearch can lead to an OutOfMemoryError exception resulting in a crash via a specially crafted query using an SQL function."
+ },
+ {
+ "lang": "es",
+ "value": "Una asignaci\u00f3n de recursos sin l\u00edmites ni limitaci\u00f3n en Elasticsearch puede generar una excepci\u00f3n OutOfMemoryError que resulte en un bloqueo a trav\u00e9s de una consulta especialmente manipulada que utiliza una funci\u00f3n SQL."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43710.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43710.json
index 461acd8371e..f4a3c6396b2 100644
--- a/CVE-2024/CVE-2024-437xx/CVE-2024-43710.json
+++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43710.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet."
+ },
+ {
+ "lang": "es",
+ "value": "Se identific\u00f3 una vulnerabilidad de server side request forgery en Kibana, donde la API /api/fleet/health_check se pod\u00eda usar para enviar solicitudes a endpoints internos. Debido a la naturaleza de la solicitud subyacente, solo se pod\u00eda acceder a losendpoints disponibles a trav\u00e9s de https que devolvieran JSON. Esto lo pueden hacer los usuarios con acceso de lectura a Fleet."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43763.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43763.json
index 3bff08cf29f..af738fc6559 100644
--- a/CVE-2024/CVE-2024-437xx/CVE-2024-43763.json
+++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43763.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In build_read_multi_rsp of gatt_sr.cc, there is a possible denial of service due to a logic error in the code. This could lead to remote (proximal/adjacent) denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En build_read_multi_rsp de gatt_sr.cc, existe una posible denegaci\u00f3n de servicio debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json
index 71d31f8434c..6c1b75bf84f 100644
--- a/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json
+++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In multiple locations, there is a possible way to obtain access to a folder due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En varias ubicaciones, existe una forma posible de obtener acceso a una carpeta debido a un ataque de tapjacking/superposici\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios, con la necesidad de privilegios de ejecuci\u00f3n del usuario. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json
index f9def9520e5..c0982b874a9 100644
--- a/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json
+++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In gatts_process_find_info of gatt_sr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En gatts_process_find_info de gatt_sr.cc, existe una posible escritura fuera de los l\u00edmites debido a neutra. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (pr\u00f3ximo/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json
index 1267d818fb9..0534f2775b7 100644
--- a/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json
+++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In gatts_process_read_req of gatt_sr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En gatts_process_read_req de gatt_sr.cc, existe una posible escritura fuera de los l\u00edmites debido a una neutra. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45091.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45091.json
index 68cc36137cd..77086f14965 100644
--- a/CVE-2024/CVE-2024-450xx/CVE-2024-45091.json
+++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45091.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-21T01:15:07.890",
"lastModified": "2025-01-21T01:15:07.890",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.24, 7.1 through 7.1.2.10, and 7.2 through 7.2.3.13 stores potentially sensitive information in log files that could be read by a local user with access to HTTP request logs."
+ },
+ {
+ "lang": "es",
+ "value": "IBM UrbanCode Deploy (UCD) 7.0 a 7.0.5.24, 7.1 a 7.1.2.10 y 7.2 a 7.2.3.13 almacena informaci\u00f3n potencialmente confidencial en archivos de registro que podr\u00edan ser le\u00eddos por un usuario local con acceso a los registros de solicitudes HTTP."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45271.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45271.json
index 9e332433625..fdfb011b86b 100644
--- a/CVE-2024/CVE-2024-452xx/CVE-2024-45271.json
+++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45271.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-10-15T11:15:11.420",
"lastModified": "2024-11-21T09:37:35.160",
- "vulnStatus": "Modified",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45273.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45273.json
index a604b257f2c..5535b9cb9df 100644
--- a/CVE-2024/CVE-2024-452xx/CVE-2024-45273.json
+++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45273.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-10-15T11:15:11.940",
"lastModified": "2024-11-21T09:37:35.450",
- "vulnStatus": "Modified",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45479.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45479.json
index 2d09deb0368..171d8c5f547 100644
--- a/CVE-2024/CVE-2024-454xx/CVE-2024-45479.json
+++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45479.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@apache.org",
"published": "2025-01-21T22:15:12.290",
"lastModified": "2025-01-21T22:15:12.290",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SSRF vulnerability in Edit Service Page of Apache Ranger UI in Apache Ranger Version 2.4.0.\nUsers are recommended to upgrade to version Apache Ranger 2.5.0, which fixes this issue."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad SSRF en la p\u00e1gina Editar servicio de la interfaz de usuario de Apache Ranger en la versi\u00f3n 2.4.0 de Apache Ranger. Se recomienda a los usuarios que actualicen a la versi\u00f3n 2.5.0 de Apache Ranger, que soluciona este problema."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45647.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45647.json
index 38ae7fdccd3..23a587aec2d 100644
--- a/CVE-2024/CVE-2024-456xx/CVE-2024-45647.json
+++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45647.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-20T15:15:07.507",
"lastModified": "2025-01-20T15:15:07.507",
- "vulnStatus": "Received",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security Verify Access 10.0.0 through 10.0.8 and IBM Security Verify Access Docker 10.0.0 through 10.0.8 could allow could an unverified user to change the password of an expired user without prior knowledge of that password."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Security Verify Access 10.0.0 a 10.0.8 e IBM Security Verify Access Docker 10.0.0 a 10.0.8 podr\u00edan permitir que un usuario no verificado cambie la contrase\u00f1a de un usuario vencido sin conocimiento previo de dicha contrase\u00f1a."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45652.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45652.json
index 95b1876e673..acbb3645760 100644
--- a/CVE-2024/CVE-2024-456xx/CVE-2024-45652.json
+++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45652.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-19T03:15:06.647",
"lastModified": "2025-01-19T03:15:06.647",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Maximo MXAPIASSET API 7.6.1.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system."
+ },
+ {
+ "lang": "es",
+ "value": "La API MXAPIASSET de IBM Maximo 7.6.1.3 podr\u00eda permitir que un atacante remoto recorra directorios en sistema. Un atacante podr\u00eda enviar una solicitud de URL manipulado especial que contenga secuencias de \"punto punto\" (/../) para ver archivos arbitrarios en el directorio sistema."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45653.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45653.json
index 32bd3e462b4..9f4f3b8966a 100644
--- a/CVE-2024/CVE-2024-456xx/CVE-2024-45653.json
+++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45653.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-19T03:15:07.643",
"lastModified": "2025-01-19T03:15:07.643",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could disclose sensitive IP address information to authenticated users in responses that could be used in further attacks against the system."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2 y 6.3 podr\u00edan revelar informaci\u00f3n confidencial de direcciones IP a usuarios autenticados en respuestas que podr\u00edan usarse en futuros ataques contra sistema."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45654.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45654.json
index a39858b51a3..7bf5cfe6859 100644
--- a/CVE-2024/CVE-2024-456xx/CVE-2024-45654.json
+++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45654.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-19T03:15:07.787",
"lastModified": "2025-01-19T03:15:07.787",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security ReaQta 3.12 could allow an authenticated user to perform unauthorized actions due to reliance on untrusted inputs."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Security ReaQta 3.12 podr\u00eda permitir que un usuario autenticado realice acciones no autorizadas debido a la confianza en entradas no confiables."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45662.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45662.json
index 2d493928037..fea161d188b 100644
--- a/CVE-2024/CVE-2024-456xx/CVE-2024-45662.json
+++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45662.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-18T17:15:07.343",
"lastModified": "2025-01-18T17:15:07.343",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Safer Payments\u00a06.4.0.00 through 6.4.2.07, 6.5.0.00 through 6.5.0.05, and 6.6.0.00 through 6.6.0.03 could allow a remote attacker to cause a denial of service due to improper allocation of resources."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Safer Payments 6.4.0.00 a 6.4.2.07, 6.5.0.00 a 6.5.0.05 y 6.6.0.00 a 6.6.0.03 podr\u00edan permitir que un atacante remoto provoque una denegaci\u00f3n de servicio debido a una asignaci\u00f3n incorrecta de recursos."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45672.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45672.json
index a0837ab71d4..226f5deb314 100644
--- a/CVE-2024/CVE-2024-456xx/CVE-2024-45672.json
+++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45672.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-23T18:15:30.057",
"lastModified": "2025-01-23T18:15:30.057",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security Verify Bridge 1.0.0 through 1.0.15 could allow a local privileged user to overwrite files due to excessive privileges granted to the agent. which could also cause a denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Security Verify Bridge 1.0.0 a 1.0.15 podr\u00eda permitir que un usuario privilegiado local sobrescriba archivos debido a privilegios excesivos otorgados al agente, lo que tambi\u00e9n podr\u00eda causar una denegaci\u00f3n de servicio."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45687.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45687.json
index a4ec1639876..875b3f0d4e1 100644
--- a/CVE-2024/CVE-2024-456xx/CVE-2024-45687.json
+++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45687.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "769c9ae7-73c3-4e47-ae19-903170fc3eb8",
"published": "2025-01-21T17:15:14.073",
"lastModified": "2025-01-21T17:15:14.073",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') vulnerability in Payara Platform Payara Server (Grizzly, REST Management Interface modules), Payara Platform Payara Micro (Grizzly modules) allows Manipulating State, Identity Spoofing.This issue affects Payara Server: from 4.1.151 through 4.1.2.191.51, from 5.20.0 through 5.70.0, from 5.2020.2 through 5.2022.5, from 6.2022.1 through 6.2024.12, from 6.0.0 through 6.21.0; Payara Micro: from 4.1.152 through 4.1.2.191.51, from 5.20.0 through 5.70.0, from 5.2020.2 through 5.2022.5, from 6.2022.1 through 6.2024.12, from 6.0.0 through 6.21.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de secuencias CRLF en encabezados HTTP ('Divisi\u00f3n de solicitud/respuesta HTTP') en Payara Platform Payara Server (Grizzly, m\u00f3dulos de interfaz de administraci\u00f3n REST), Payara Platform Payara Micro (m\u00f3dulos Grizzly) permite manipular el estado y suplantar la identidad. Este problema afecta a Payara Server: desde la versi\u00f3n 4.1.151 hasta la 4.1.2.191.51, desde la versi\u00f3n 5.20.0 hasta la 5.70.0, desde la versi\u00f3n 5.2020.2 hasta la 5.2022.5, desde la versi\u00f3n 6.2022.1 hasta la 6.2024.12, desde la versi\u00f3n 6.0.0 hasta la 6.21.0; Payara Micro: de 4.1.152 a 4.1.2.191.51, de 5.20.0 a 5.70.0, de 5.2020.2 a 5.2022.5, de 6.2022.1 a 6.2024.12, de 6.0.0 a 6.21.0."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45832.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45832.json
index 2dbf5b64ef3..91232b94675 100644
--- a/CVE-2024/CVE-2024-458xx/CVE-2024-45832.json
+++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45832.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:11.870",
"lastModified": "2025-01-17T17:15:11.870",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hard-coded credentials were included as part of the application binary. \nThese credentials served as part of the application authentication flow \nand communication with the mobile application. An attacker could access \nunauthorized information."
+ },
+ {
+ "lang": "es",
+ "value": "Se incluyeron credenciales codificadas como parte del binario de la aplicaci\u00f3n. Estas credenciales sirvieron como parte del flujo de autenticaci\u00f3n de la aplicaci\u00f3n y la comunicaci\u00f3n con la aplicaci\u00f3n m\u00f3vil. Un atacante podr\u00eda acceder a informaci\u00f3n no autorizada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4581.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4581.json
index cd65ce3b846..4593abacb20 100644
--- a/CVE-2024/CVE-2024-45xx/CVE-2024-4581.json
+++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4581.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T09:15:09.587",
"lastModified": "2024-11-21T09:43:09.063",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4637.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4637.json
index 55720cfa18a..a86339296b6 100644
--- a/CVE-2024/CVE-2024-46xx/CVE-2024-4637.json
+++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4637.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T10:15:12.503",
"lastModified": "2024-11-21T09:43:15.697",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47106.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47106.json
index 9d71c9963c3..5e20ed90593 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47106.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47106.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-18T16:15:37.883",
"lastModified": "2025-01-18T16:15:37.883",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Jazz for Service Management 1.1.3 through 1.1.3.22 could allow a remote attacker to obtain sensitive information from improper access restrictions that could aid in further attacks against the system."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Jazz for Service Management 1.1.3 a 1.1.3.22 podr\u00eda permitir que un atacante remoto obtenga informaci\u00f3n confidencial de restricciones de acceso indebidas que podr\u00edan ayudar en futuros ataques contra sistema."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47113.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47113.json
index 1ee91230e82..2f0e44020f9 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47113.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47113.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-18T16:15:38.897",
"lastModified": "2025-01-18T16:15:38.897",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM ICP - Voice Gateway\u00a01.0.2, 1.0.2.4, 1.0.3, 1.0.4, 1.0.5, 1.0.6. 1.0.7, 1.0.7.1, and 1.0.8 could allow remote attacker to send specially crafted XML statements, which would allow them to attacker to view or modify information in the XML document."
+ },
+ {
+ "lang": "es",
+ "value": "IBM ICP - Voice Gateway 1.0.2, 1.0.2.4, 1.0.3, 1.0.4, 1.0.5, 1.0.6. 1.0.7, 1.0.7.1 y 1.0.8 podr\u00edan permitir a un atacante remoto enviar declaraciones XML manipulado especiales, lo que le permitir\u00eda al atacante ver o modificar informaci\u00f3n en el documento XML."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47131.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47131.json
index 675c478ea56..79eca14fb69 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47131.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47131.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-11-11T15:15:06.153",
"lastModified": "2024-11-12T13:55:21.227",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47366.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47366.json
index 410b61d04c2..3943bf78027 100644
--- a/CVE-2024/CVE-2024-473xx/CVE-2024-47366.json
+++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47366.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-06T10:15:05.483",
"lastModified": "2024-10-07T17:47:48.410",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48876.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48876.json
index 3d1c44c7efc..7bb576618de 100644
--- a/CVE-2024/CVE-2024-488xx/CVE-2024-48876.json
+++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48876.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: stackdepot: se corrige stack_depot_save_flags() en el contexto NMI Seg\u00fan la documentaci\u00f3n, se supon\u00eda que stack_depot_save_flags() se pod\u00eda usar desde el contexto NMI si STACK_DEPOT_FLAG_CAN_ALLOC no est\u00e1 configurado. Sin embargo, a\u00fan intentar\u00eda tomar el pool_lock en un intento de guardar un seguimiento de pila en el pool actual (si hay espacio disponible). Esto podr\u00eda resultar en un bloqueo si se maneja un NMI mientras pool_lock ya est\u00e1 retenido. Para evitar el bloqueo, solo intente tomar el bloqueo en el contexto NMI y abandone si no tiene \u00e9xito. La documentaci\u00f3n se corrige para transmitir esto claramente."
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: stackdepot: se corrige stack_depot_save_flags() en el contexto NMI Seg\u00fan la documentaci\u00f3n, se supon\u00eda que stack_depot_save_flags() se pod\u00eda usar desde el contexto NMI si STACK_DEPOT_FLAG_CAN_ALLOC no est\u00e1 configurado. Sin embargo, a\u00fan intentar\u00eda tomar el pool_lock en un intento de guardar un seguimiento de pila en el pool actual (si hay espacio disponible). Esto podr\u00eda resultar en un bloqueo si se gestiona un NMI mientras pool_lock ya est\u00e1 retenido. Para evitar el bloqueo, solo intente tomar el bloqueo en el contexto NMI y abandone si no tiene \u00e9xito. La documentaci\u00f3n se corrige para transmitir esto claramente."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48883.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48883.json
index 693cd717b57..2e1fcce4236 100644
--- a/CVE-2024/CVE-2024-488xx/CVE-2024-48883.json
+++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48883.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung, el procesador port\u00e1til y el m\u00f3dem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, el m\u00f3dem 5123 y el m\u00f3dem 5300. El UE maneja incorrectamente un mensaje de programaci\u00f3n de enlace ascendente mal formado, lo que resulta en una fuga de informaci\u00f3n del UE."
+ "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung, el procesador port\u00e1til y el m\u00f3dem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, el m\u00f3dem 5123 y el m\u00f3dem 5300. El UE gestiona incorrectamente un mensaje de programaci\u00f3n de enlace ascendente mal formado, lo que resulta en una fuga de informaci\u00f3n del UE."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4875.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4875.json
index 963c5c0c8b3..82ff7e40c97 100644
--- a/CVE-2024/CVE-2024-48xx/CVE-2024-4875.json
+++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4875.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-21T09:15:09.103",
"lastModified": "2024-11-21T09:43:46.460",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4891.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4891.json
index c0b30e0a797..25983608889 100644
--- a/CVE-2024/CVE-2024-48xx/CVE-2024-4891.json
+++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4891.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-18T05:15:46.917",
"lastModified": "2024-11-21T09:43:48.267",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49300.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49300.json
index 61a80a410dd..e4e06ba97e2 100644
--- a/CVE-2024/CVE-2024-493xx/CVE-2024-49300.json
+++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49300.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:07.817",
"lastModified": "2025-01-21T14:15:07.817",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Hero Mega Menu - Responsive WordPress Menu Plugin allows Reflected XSS. This issue affects Hero Mega Menu - Responsive WordPress Menu Plugin: from n/a through 1.16.5."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Hero Mega Menu - Responsive WordPress Menu Plugin permite XSS reflejado. Este problema afecta a Hero Mega Menu - Responsive WordPress Menu Plugin: desde n/a hasta 1.16.5."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49303.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49303.json
index 98415249152..024fe9894e4 100644
--- a/CVE-2024/CVE-2024-493xx/CVE-2024-49303.json
+++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49303.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:07.987",
"lastModified": "2025-01-21T14:15:07.987",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Hero Mega Menu - Responsive WordPress Menu Plugin allows SQL Injection. This issue affects Hero Mega Menu - Responsive WordPress Menu Plugin: from n/a through 1.16.5."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en NotFound Hero Mega Menu - Responsive WordPress Menu Plugin permite la inyecci\u00f3n SQL. Este problema afecta a Hero Mega Menu - Responsive WordPress Menu Plugin: desde n/a hasta 1.16.5."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49333.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49333.json
index c7611041c81..e9b18cc246c 100644
--- a/CVE-2024/CVE-2024-493xx/CVE-2024-49333.json
+++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49333.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:08.143",
"lastModified": "2025-01-21T14:15:08.143",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Hero Mega Menu - Responsive WordPress Menu Plugin allows SQL Injection. This issue affects Hero Mega Menu - Responsive WordPress Menu Plugin: from n/a through 1.16.5."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en NotFound Hero Mega Menu - Responsive WordPress Menu Plugin permite la inyecci\u00f3n SQL. Este problema afecta a Hero Mega Menu - Responsive WordPress Menu Plugin: desde n/a hasta 1.16.5."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49338.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49338.json
index a8cfd696ec9..586c8be6bc9 100644
--- a/CVE-2024/CVE-2024-493xx/CVE-2024-49338.json
+++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49338.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-18T15:15:07.433",
"lastModified": "2025-01-18T15:15:07.433",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM App Connect Enterprise 12.0.1.0 through 12.0.7.0and 13.0.1.0 under certain configurations could allow a privileged user to obtain JMS credentials."
+ },
+ {
+ "lang": "es",
+ "value": "IBM App Connect Enterprise 12.0.1.0 a 12.0.7.0 y 13.0.1.0 en ciertas configuraciones podr\u00edan permitir que un usuario privilegiado obtenga credenciales JMS."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49354.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49354.json
index d85e9252762..1d016861724 100644
--- a/CVE-2024/CVE-2024-493xx/CVE-2024-49354.json
+++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49354.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-18T16:15:39.040",
"lastModified": "2025-01-18T16:15:39.040",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Concert 1.0.0, 1.0.1, and 1.0.2 is vulnerable to sensitive information disclosure through specially crafted API Calls."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Concert 1.0.0, 1.0.1 y 1.0.2 es vulnerable a la divulgaci\u00f3n de informaci\u00f3n confidencial a trav\u00e9s de llamadas API especiales manipulado."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49655.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49655.json
index c2210fd9d6a..15130502871 100644
--- a/CVE-2024/CVE-2024-496xx/CVE-2024-49655.json
+++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49655.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:08.310",
"lastModified": "2025-01-21T14:15:08.310",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound ARPrice allows SQL Injection. This issue affects ARPrice: from n/a through 4.0.3."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL (\"Inyecci\u00f3n SQL\") en NotFound ARPrice permite la inyecci\u00f3n SQL. Este problema afecta a ARPrice: desde n/a hasta 4.0.3."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49666.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49666.json
index 533bfba64e7..e1bc62473aa 100644
--- a/CVE-2024/CVE-2024-496xx/CVE-2024-49666.json
+++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49666.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:08.450",
"lastModified": "2025-01-21T14:15:08.450",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound ARPrice allows SQL Injection. This issue affects ARPrice: from n/a through 4.0.3."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL (\"Inyecci\u00f3n SQL\") en NotFound ARPrice permite la inyecci\u00f3n SQL. Este problema afecta a ARPrice: desde n/a hasta 4.0.3."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49688.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49688.json
index f1b13528d60..5cb7b8c8270 100644
--- a/CVE-2024/CVE-2024-496xx/CVE-2024-49688.json
+++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49688.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:08.613",
"lastModified": "2025-01-21T14:15:08.613",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in NotFound ARPrice allows Object Injection. This issue affects ARPrice: from n/a through 4.0.3."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en NotFound ARPrice permite la inyecci\u00f3n de objetos. Este problema afecta a ARPrice desde n/a hasta 4.0.3."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49699.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49699.json
index 842248b48df..75b4884d695 100644
--- a/CVE-2024/CVE-2024-496xx/CVE-2024-49699.json
+++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49699.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:08.780",
"lastModified": "2025-01-21T14:15:08.780",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in NotFound ARPrice allows Object Injection. This issue affects ARPrice: from n/a through 4.0.3."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en NotFound ARPrice permite la inyecci\u00f3n de objetos. Este problema afecta a ARPrice desde n/a hasta 4.0.3."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49700.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49700.json
index 6835b3bd5c3..930d840c67f 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49700.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49700.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:08.937",
"lastModified": "2025-01-21T14:15:08.937",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ARPrice allows Reflected XSS. This issue affects ARPrice: from n/a through 4.0.3."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound ARPrice permite XSS reflejado. Este problema afecta a ARPrice: desde n/a hasta 4.0.3."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49724.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49724.json
index 72ec177bad4..eaa77c1c7dd 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49724.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49724.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In multiple functions of AccountManagerService.java, there is a possible way to bypass permissions and launch protected activities due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En varias funciones de AccountManagerService.java, existe una forma posible de eludir permisos e iniciar actividades protegidas debido a una condici\u00f3n ejecuci\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49732.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49732.json
index 30a20c7ebb0..fcd9170108a 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49732.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49732.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In multiple functions of CompanionDeviceManagerService.java, there is a possible way to grant permissions without user consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En varias funciones de CompanionDeviceManagerService.java, existe una forma posible de otorgar permisos sin el consentimiento del usuario debido a una verificaci\u00f3n de permisos faltante. Esto podr\u00eda generar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json
index 44dd12e0ddf..d29bd44170e 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In reload of ServiceListing.java , there is a possible way to allow a malicious app to hide an NLS from Settings due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En la recarga de ServiceListing.java, existe una forma posible de permitir que una aplicaci\u00f3n maliciosa oculte un NLS de Settings debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. "
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49734.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49734.json
index 3eed24a44e2..f60a224bad9 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49734.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49734.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In multiple functions of ConnectivityService.java, there is a possible way for a Wi-Fi AP to determine what site a device has connected to through a VPN due to side channel information disclosure. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En varias funciones de ConnectivityService.java, existe una forma posible para que un punto de acceso Wi-Fi determine a qu\u00e9 sitio se ha conectado un dispositivo a trav\u00e9s de una VPN debido a la divulgaci\u00f3n de informaci\u00f3n del canal lateral. Esto podr\u00eda generar una divulgaci\u00f3n de informaci\u00f3n remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49735.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49735.json
index a4394cac8d2..9cd1bb25047 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49735.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49735.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In multiple locations, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En varias ubicaciones, es posible que no se puedan conservar las configuraciones de permisos debido al agotamiento de los recursos. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49736.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49736.json
index 8b201c8d8e5..594910ca52d 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49736.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49736.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In onClick of MainClear.java, there is a possible way to trigger factory reset without explicit user consent due to a logic error in the code. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En onClick de MainClear.java, existe una forma posible de activar el restablecimiento de f\u00e1brica sin el consentimiento expl\u00edcito del usuario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49737.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49737.json
index 6418c41bb63..ed3e76f4353 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49737.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49737.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In applyTaskFragmentOperation of WindowOrganizerController.java, there is a possible way to launch arbitrary activities as the system UID due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En applyTaskFragmentOperation de WindowOrganizerController.java, existe una forma posible de iniciar actividades arbitrarias como el UID sistema debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49738.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49738.json
index c908a665959..3bb744581ac 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49738.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49738.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In writeInplace of Parcel.cpp, there is a possible out of bounds write. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En writeInplace de Parcel.cpp, existe la posibilidad de una escritura fuera de los l\u00edmites. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49742.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49742.json
index 9968642d03b..3d6c95628da 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49742.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49742.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In onCreate of NotificationAccessConfirmationActivity.java , there is a possible way to hide an app with notification access in Settings due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En onCreate de NotificationAccessConfirmationActivity.java, existe una forma posible de ocultar una aplicaci\u00f3n con acceso a notificaciones en Configuraci\u00f3n debido a una verificaci\u00f3n de permisos faltante. Esto podr\u00eda generar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49744.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49744.json
index ccecd9f35ec..e802cebc9f7 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49744.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49744.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to bypass parcel mismatch mitigation due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En checkKeyIntentParceledCorrectly de AccountManagerService.java, existe una forma posible de evitar la mitigaci\u00f3n de la falta de coincidencia de paquetes debido a una deserializaci\u00f3n insegura. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49745.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49745.json
index 7a4233e6ea2..8a5bd8a93ad 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49745.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49745.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In growData of Parcel.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En growData de Parcel.cpp, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49747.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49747.json
index 0807cbaff9c..d282d418858 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49747.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49747.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In gatts_process_read_by_type_req of gatt_sr.cc, there is a possible out of bounds write due to a logic error in the code. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En gatts_process_read_by_type_req de gatt_sr.cc, existe una posible escritura fuera de los l\u00edmites debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49748.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49748.json
index 969cb1c1f33..34f50677879 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49748.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49748.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In gatts_process_primary_service_req of gatt_sr.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En gatts_process_primary_service_req de gatt_sr.cc, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento del b\u00fafer de mont\u00f3n. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49749.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49749.json
index ba94edfa405..a98cdb71eb3 100644
--- a/CVE-2024/CVE-2024-497xx/CVE-2024-49749.json
+++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49749.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In DGifSlurp of dgif_lib.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En DGifSlurp de dgif_lib.c, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49824.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49824.json
index a99edc6d25c..c9f8bc69255 100644
--- a/CVE-2024/CVE-2024-498xx/CVE-2024-49824.json
+++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49824.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-18T16:15:39.183",
"lastModified": "2025-01-18T16:15:39.183",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Robotic Process Automation 21.0.0 through 21.0.7.18 and 23.0.0 through 23.0.18 and \n\nIBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.18 and 23.0.0 through 23.0.18\n\ncould allow an authenticated user to perform unauthorized actions as a privileged user due to improper validation of client-side security enforcement."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Robotic Process Automation 21.0.0 a 21.0.7.18 y 23.0.0 a 23.0.18 e IBM Robotic Process Automation for Cloud Pak 21.0.0 a 21.0.7.18 y 23.0.0 a 23.0.18 podr\u00eda permitir que un usuario autenticado realice acciones no autorizadas como un usuario privilegiado debido a una validaci\u00f3n incorrecta de la aplicaci\u00f3n de la seguridad del lado del cliente."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50664.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50664.json
index eaed8dfed3d..9255e8c625b 100644
--- a/CVE-2024/CVE-2024-506xx/CVE-2024-50664.json
+++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50664.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "gpac 2.4 contains a heap-buffer-overflow at isomedia/sample_descs.c:1799 in gf_isom_new_mpha_description in gpac/MP4Box."
+ },
+ {
+ "lang": "es",
+ "value": "gpac 2.4 contiene un desbordamiento de b\u00fafer de mont\u00f3n en isomedia/sample_descs.c:1799 en gf_isom_new_mpha_description en gpac/MP4Box."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50665.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50665.json
index 2ff659c14eb..e35cbed16dd 100644
--- a/CVE-2024/CVE-2024-506xx/CVE-2024-50665.json
+++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50665.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "gpac 2.4 contains a SEGV at src/isomedia/drm_sample.c:1562:96 in isom_cenc_get_sai_by_saiz_saio in MP4Box."
+ },
+ {
+ "lang": "es",
+ "value": "gpac 2.4 contiene un SEGV en src/isomedia/drm_sample.c:1562:96 en isom_cenc_get_sai_by_saiz_saio en MP4Box."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50954.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50954.json
index 19de24a676d..379f7286637 100644
--- a/CVE-2024/CVE-2024-509xx/CVE-2024-50954.json
+++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50954.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "Los controladores l\u00f3gicos programables XINJE XL5E-16T y XD5E-24R-E V3.5.3b-V3.7.2a tienen una vulnerabilidad en el manejo de mensajes Modbus. Cuando se establece una conexi\u00f3n TCP con la serie de controladores antes mencionada dentro de una red de \u00e1rea local (LAN), el env\u00edo de un mensaje Modbus espec\u00edfico al controlador puede provocar que el PLC se bloquee, interrumpiendo el funcionamiento normal de los programas que se ejecutan en el PLC. Esto hace que la luz indicadora ERR se encienda y la luz indicadora RUN se apague."
+ "value": "Los controladores l\u00f3gicos programables XINJE XL5E-16T y XD5E-24R-E V3.5.3b-V3.7.2a tienen una vulnerabilidad en la gesti\u00f3n de mensajes Modbus. Cuando se establece una conexi\u00f3n TCP con la serie de controladores antes mencionada dentro de una red de \u00e1rea local (LAN), el env\u00edo de un mensaje Modbus espec\u00edfico al controlador puede provocar que el PLC se bloquee, interrumpiendo el funcionamiento normal de los programas que se ejecutan en el PLC. Esto hace que la luz indicadora ERR se encienda y la luz indicadora RUN se apague."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50967.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50967.json
index 9b34a186c56..ead28309238 100644
--- a/CVE-2024/CVE-2024-509xx/CVE-2024-50967.json
+++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50967.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The /rest/rights/ REST API endpoint in Becon DATAGerry through 2.2.0 contains an Incorrect Access Control vulnerability. An attacker can remotely access this endpoint without authentication, leading to unauthorized disclosure of sensitive information."
+ },
+ {
+ "lang": "es",
+ "value": "La API REST /rest/rights/ Endpoint en Becon DATAGerry hasta la versi\u00f3n 2.2.0 contiene una vulnerabilidad de control de acceso incorrecto. Un atacante puede acceder de forma remota a este endpoint sin autenticaci\u00f3n, lo que lleva a la divulgaci\u00f3n no autorizada de informaci\u00f3n confidencial."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5031.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5031.json
index 1d6d35f1c6d..5b7355d65a5 100644
--- a/CVE-2024/CVE-2024-50xx/CVE-2024-5031.json
+++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5031.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-22T09:15:13.350",
"lastModified": "2024-11-21T09:46:48.853",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51417.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51417.json
index 950f84793c3..6f0c0fc627d 100644
--- a/CVE-2024/CVE-2024-514xx/CVE-2024-51417.json
+++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51417.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T19:15:10.950",
"lastModified": "2025-01-21T19:15:10.950",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in System.Linq.Dynamic.Core Latest version v.1.4.6 allows remote access to properties on reflection types and static properties/fields."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en System.Linq.Dynamic.Core La \u00faltima versi\u00f3n v.1.4.6 permite el acceso remoto a propiedades en tipos de reflexi\u00f3n y propiedades/campos est\u00e1ticos."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51448.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51448.json
index e03817bfdce..7ea15e39d08 100644
--- a/CVE-2024/CVE-2024-514xx/CVE-2024-51448.json
+++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51448.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-18T15:15:08.183",
"lastModified": "2025-01-18T15:15:08.183",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Robotic Process Automation 21.0.0 through 21.0.7.17 and 23.0.0 through 23.0.18 could allow a local user to escalate their privileges. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service. A subsequent service or server restart will then run that binary with administrator privilege."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Robotic Process Automation 21.0.0 a 21.0.7.17 y 23.0.0 a 23.0.18 podr\u00edan permitir que un usuario local aumente sus privilegios. Todos los archivos de la instalaci\u00f3n heredan los permisos de archivo del directorio principal y, por lo tanto, un usuario sin privilegios puede sustituir cualquier ejecutable por el servicio nssm.exe. Un reinicio posterior del servicio o del servidor ejecutar\u00e1 ese binario con privilegios de administrador."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51457.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51457.json
index 82654fdaae5..90d0244d1b2 100644
--- a/CVE-2024/CVE-2024-514xx/CVE-2024-51457.json
+++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51457.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "IBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.19 and 23.0.0 through 23.0.19 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Robotic Process Automation for Cloud Pak 21.0.0 a 21.0.7.19 y 23.0.0 a 23.0.19 es vulnerable a ataques de cross-site scripting. Esta vulnerabilidad permite que un usuario autenticado incorpore c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, lo que altera la funcionalidad prevista y puede provocar la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n de confianza."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51738.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51738.json
index 0671ce321ce..a06aa7cb0a0 100644
--- a/CVE-2024/CVE-2024-517xx/CVE-2024-51738.json
+++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51738.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-20T16:15:27.667",
"lastModified": "2025-01-20T16:15:27.667",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sunshine is a self-hosted game stream host for Moonlight. In 0.23.1 and earlier, Sunshine's pairing protocol implementation does not validate request order and is thereby vulnerable to a MITM attack, potentially allowing an unauthenticated attacker to pair a client by hijacking a legitimate pairing attempt. This bug may also be used by a remote attacker to crash Sunshine. This vulnerability is fixed in 2025.118.151840."
+ },
+ {
+ "lang": "es",
+ "value": "Sunshine es un servidor de transmisi\u00f3n de juegos autoalojado para Moonlight. En la versi\u00f3n 0.23.1 y anteriores, la implementaci\u00f3n del protocolo de emparejamiento de Sunshine no valida el orden de las solicitudes y, por lo tanto, es vulnerable a un ataque MITM, lo que potencialmente permite que un atacante no autenticado empareje un cliente secuestrando un intento de emparejamiento leg\u00edtimo. Un atacante remoto tambi\u00e9n puede usar este error para bloquear Sunshine. Esta vulnerabilidad se corrigi\u00f3 en 2025.118.151840."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-518xx/CVE-2024-51818.json b/CVE-2024/CVE-2024-518xx/CVE-2024-51818.json
index 32a5d6adfc1..71ab1e7e8fe 100644
--- a/CVE-2024/CVE-2024-518xx/CVE-2024-51818.json
+++ b/CVE-2024/CVE-2024-518xx/CVE-2024-51818.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:09.087",
"lastModified": "2025-01-21T14:15:09.087",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Fancy Product Designer. This issue affects Fancy Product Designer: from n/a through 6.4.3."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en NotFound Fancy Product Designer. Este problema afecta a Fancy Product Designer: desde n/a hasta 6.4.3."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-518xx/CVE-2024-51888.json b/CVE-2024/CVE-2024-518xx/CVE-2024-51888.json
index bebb3db4352..ea7c356d08a 100644
--- a/CVE-2024/CVE-2024-518xx/CVE-2024-51888.json
+++ b/CVE-2024/CVE-2024-518xx/CVE-2024-51888.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:09.260",
"lastModified": "2025-01-21T14:15:09.260",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Privilege Assignment vulnerability in NotFound Homey Login Register allows Privilege Escalation. This issue affects Homey Login Register: from n/a through 2.4.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en NotFound Homey Login Register permite la escalada de privilegios. Este problema afecta a Homey Login Register desde n/a hasta 2.4.0."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51919.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51919.json
index 01d51f7b446..7cd6d3b195a 100644
--- a/CVE-2024/CVE-2024-519xx/CVE-2024-51919.json
+++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51919.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:09.417",
"lastModified": "2025-01-21T14:15:09.417",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in NotFound Fancy Product Designer. This issue affects Fancy Product Designer: from n/a through 6.4.3."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en NotFound Fancy Product Designer. Este problema afecta a Fancy Product Designer: desde n/a hasta 6.4.3."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5173.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5173.json
index 1699f021e49..8c2555bb606 100644
--- a/CVE-2024/CVE-2024-51xx/CVE-2024-5173.json
+++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5173.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-26T02:15:09.340",
"lastModified": "2024-11-21T09:47:07.830",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52325.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52325.json
index 4033fb046d7..972137708f1 100644
--- a/CVE-2024/CVE-2024-523xx/CVE-2024-52325.json
+++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52325.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2025-01-23T16:15:35.943",
"lastModified": "2025-01-23T16:15:35.943",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ECOVACS robot lawnmowers and vacuums are vulnerable to command injection via SetNetPin() over an unauthenticated BLE connection."
+ },
+ {
+ "lang": "es",
+ "value": "Los robots cortac\u00e9sped y aspiradores ECOVACS son vulnerables a la inyecci\u00f3n de comandos a trav\u00e9s de SetNetPin() en una conexi\u00f3n BLE no autenticada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52327.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52327.json
index 2377335eb9b..1668d5d907a 100644
--- a/CVE-2024/CVE-2024-523xx/CVE-2024-52327.json
+++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52327.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2025-01-23T17:15:13.890",
"lastModified": "2025-01-23T17:15:13.890",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The cloud service used by ECOVACS robot lawnmowers and vacuums allows authenticated attackers to bypass the PIN entry required to access the live video feed."
+ },
+ {
+ "lang": "es",
+ "value": "El servicio en la nube utilizado por los robots cortac\u00e9sped y aspiradores ECOVACS permite a atacantes autenticados eludir la entrada del PIN necesaria para acceder a la transmisi\u00f3n de v\u00eddeo en directo."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52328.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52328.json
index ea226458aea..0cd547c5213 100644
--- a/CVE-2024/CVE-2024-523xx/CVE-2024-52328.json
+++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52328.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2025-01-23T17:15:14.133",
"lastModified": "2025-01-23T17:15:14.133",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ECOVACS robot lawnmowers and vacuums insecurely store audio files used to indicate that the camera is on. An attacker with access to the /data filesystem can delete or modify warning files such that users may not be aware that the camera is on."
+ },
+ {
+ "lang": "es",
+ "value": "Los robots cortac\u00e9sped y aspiradores ECOVACS almacenan de forma insegura archivos de audio que se utilizan para indicar que la c\u00e1mara est\u00e1 encendida. Un atacante con acceso al sistema de archivos /data puede eliminar o modificar los archivos de advertencia de forma que los usuarios no sepan que la c\u00e1mara est\u00e1 encendida."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52329.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52329.json
index 39f7b81976b..c4f2e2d1c69 100644
--- a/CVE-2024/CVE-2024-523xx/CVE-2024-52329.json
+++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52329.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2025-01-23T17:15:14.287",
"lastModified": "2025-01-23T17:15:14.287",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ECOVACS HOME mobile app plugins for specific robots do not properly validate TLS certificates. An unauthenticated attacker can read or modify TLS traffic and obtain authentication tokens."
+ },
+ {
+ "lang": "es",
+ "value": "Los complementos de la aplicaci\u00f3n m\u00f3vil ECOVACS HOME para robots espec\u00edficos no validan correctamente los certificados TLS. Un atacante no autenticado puede leer o modificar el tr\u00e1fico TLS y obtener tokens de autenticaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52330.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52330.json
index bd0c79fe5e9..34a78138fb2 100644
--- a/CVE-2024/CVE-2024-523xx/CVE-2024-52330.json
+++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52330.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2025-01-23T17:15:14.427",
"lastModified": "2025-01-23T17:15:14.427",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ECOVACS lawnmowers and vacuums do not properly validate TLS certificates. An unauthenticated attacker can read or modify TLS traffic, possibly modifying firmware updates."
+ },
+ {
+ "lang": "es",
+ "value": "Las cortadoras de c\u00e9sped y las aspiradoras ECOVACS no validan correctamente los certificados TLS. Un atacante no autenticado puede leer o modificar el tr\u00e1fico TLS, posiblemente modificando las actualizaciones de firmware."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52331.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52331.json
index 6670f687ce9..bc8a15a2c85 100644
--- a/CVE-2024/CVE-2024-523xx/CVE-2024-52331.json
+++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52331.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2025-01-23T17:15:14.563",
"lastModified": "2025-01-23T17:15:14.563",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ECOVACS robot lawnmowers and vacuums use a deterministic symmetric key to decrypt firmware updates. An attacker can create and encrypt malicious firmware that will be successfully decrypted and installed by the robot."
+ },
+ {
+ "lang": "es",
+ "value": "Los robots cortac\u00e9sped y aspiradores ECOVACS utilizan una clave sim\u00e9trica determinista para descifrar las actualizaciones de firmware. Un atacante puede crear y cifrar un firmware malicioso que el robot descifrar\u00e1 e instalar\u00e1 con \u00e9xito."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52870.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52870.json
index 680d212b39e..ba31f21f56c 100644
--- a/CVE-2024/CVE-2024-528xx/CVE-2024-52870.json
+++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52870.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-17T20:15:28.527",
"lastModified": "2025-01-17T22:15:28.663",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Teradata Vantage Editor 1.0.1 is mostly intended for SQL database access and docs.teradata.com access, but provides unintended functionality (including Chromium Developer Tools) that can result in a client user accessing arbitrary remote websites."
+ },
+ {
+ "lang": "es",
+ "value": "Teradata Vantage Editor 1.0.1 est\u00e1 destinado principalmente al acceso a bases de datos SQL y a docs.teradata.com, pero proporciona una funcionalidad no deseada (incluida Chromium Developer Tools) que puede provocar que un usuario cliente acceda a sitios web remotos arbitrarios."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52972.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52972.json
index 32cd5e77c42..09f55cbae49 100644
--- a/CVE-2024/CVE-2024-529xx/CVE-2024-52972.json
+++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52972.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/metrics/snapshot. This can be carried out by users with read access to the Observability Metrics or Logs features in Kibana."
+ },
+ {
+ "lang": "es",
+ "value": "Una asignaci\u00f3n de recursos sin l\u00edmites ni limitaci\u00f3n en Kibana puede provocar un bloqueo causado por una solicitud especialmente manipulado a /api/metrics/snapshot. Esto lo pueden llevar a cabo los usuarios con acceso de lectura a las funciones de M\u00e9tricas de Observabilidad o Registros en Kibana."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52973.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52973.json
index 3a0d92f24e1..91dac383acf 100644
--- a/CVE-2024/CVE-2024-529xx/CVE-2024-52973.json
+++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52973.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "bressers@elastic.co",
"published": "2025-01-21T11:15:10.200",
"lastModified": "2025-01-21T11:15:10.200",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/log_entries/summary. This can be carried out by users with read access to the Observability-Logs feature in Kibana."
+ },
+ {
+ "lang": "es",
+ "value": "Una asignaci\u00f3n de recursos sin l\u00edmites ni constricci\u00f3n en Kibana puede provocar un bloqueo causado por una solicitud manipulado especial a /api/log_entries/summary. Esto lo pueden llevar a cabo los usuarios con acceso de lectura a la funci\u00f3n Observability-Logs en Kibana."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52975.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52975.json
index 4af6080ce1d..3d292cfacaf 100644
--- a/CVE-2024/CVE-2024-529xx/CVE-2024-52975.json
+++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52975.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "An issue was identified in Fleet Server where Fleet policies that could contain sensitive information were logged on INFO and ERROR log levels. The nature of the sensitive information largely depends on the integrations enabled."
+ },
+ {
+ "lang": "es",
+ "value": "Se identific\u00f3 un problema en Fleet Server donde las pol\u00edticas de Fleet que pod\u00edan contener informaci\u00f3n confidencial se registraban en los niveles de registro INFO y ERROR. La naturaleza de la informaci\u00f3n confidencial depende en gran medida de las integraciones habilitadas."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5215.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5215.json
index ec19c0c4e6d..a4ba70f0564 100644
--- a/CVE-2024/CVE-2024-52xx/CVE-2024-5215.json
+++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5215.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-26T07:15:11.013",
"lastModified": "2024-11-21T09:47:12.033",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53379.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53379.json
index 21c9b111682..930199e6048 100644
--- a/CVE-2024/CVE-2024-533xx/CVE-2024-53379.json
+++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53379.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Heap buffer overflow in the server site handshake implementation in Real Time Logic LLC's SharkSSL version (from 05/05/24) commit 64808a5e12c83b38f85c943dee0112e428dc2a43 allows a remote attacker to trigger a Denial-of-Service via a malformed Client-Hello message."
+ },
+ {
+ "lang": "es",
+ "value": "El desbordamiento del b\u00fafer de mont\u00f3n en la implementaci\u00f3n del protocolo de enlace del sitio del servidor en la versi\u00f3n SharkSSL de Real Time Logic LLC (del 24/05/05), el commit 64808a5e12c83b38f85c943dee0112e428dc2a43 permite que un atacante remoto active una denegaci\u00f3n de servicio a trav\u00e9s de un mensaje Client-Hello mal formado."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53683.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53683.json
index 9abd560506e..fc704289079 100644
--- a/CVE-2024/CVE-2024-536xx/CVE-2024-53683.json
+++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53683.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:12.053",
"lastModified": "2025-01-17T17:15:12.053",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A valid set of credentials in a .js file and a static token for \ncommunication were obtained from the decompiled IPA. An attacker could \nuse the information to disrupt normal use of the application by changing\n the translation files and thus weaken the integrity of normal use."
+ },
+ {
+ "lang": "es",
+ "value": "Se obtuvo un conjunto v\u00e1lido de credenciales en un archivo .js y un token est\u00e1tico para la comunicaci\u00f3n a partir del IPA descompilado. Un atacante podr\u00eda utilizar la informaci\u00f3n para interrumpir el uso normal de la aplicaci\u00f3n al cambiar los archivos de traducci\u00f3n y, de ese modo, debilitar la integridad del uso normal."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53687.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53687.json
index 99bed0f3464..fb51cbe2bc7 100644
--- a/CVE-2024/CVE-2024-536xx/CVE-2024-53687.json
+++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53687.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: riscv: Se corrige el uso de IPI en kfence_protect_page(). flush_tlb_kernel_range() puede usar IPI para vaciar las TLB de todos los n\u00facleos, lo que activa la siguiente advertencia cuando las irq est\u00e1n deshabilitadas: [ 3.455330] ADVERTENCIA: CPU: 1 PID: 0 en kernel/smp.c:815 smp_call_function_many_cond+0x452/0x520 [ 3.456647] M\u00f3dulos vinculados en: [ 3.457218] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 No contaminado 6.12.0-rc7-00010-g91d3de7240b8 #1 [ 3.457416] Nombre del hardware: QEMU QEMU Virtual Machine, BIOS [ 3.457633] epc : funci\u00f3n_llamada_smp_muchas_cond+0x452/0x520 [ 3.457736] ra : en_cada_m\u00e1scara_cond_de_cpu+0x1e/0x30 [ 3.457786] epc : ffffffff800b669a ra : ffffffff800b67c2 sp : ff2000000000bb50 [ 3.457824] gp : ffffffff815212b8 tp : ff6000008014f080 t0 : 000000000000003f [ 3.457859] t1 : ffffffff815221e0 t2 : 000000000000000f s0: ff2000000000bc10 [3.457920] s1: 0000000000000040 a0: ffffffff815221e0 a1: 0000000000000001 [3.457953] a2 : 0000000000010000 a3 : 0000000000000003 a4 : 0000000000000000 [ 3.458006] a5 : 00000000000000000 a6 : ffffffffffffffff a7 : 0000000000000000 [ 3.458042] s2 : ffffffff815223be s3 : 00fffffffffff000 s4 : ff600001ffe38fc0 [ 3.458076] s5 : ff600001ff950d00 s6 : 0000000200000120 s7: 00000000000000001 [3.458109] s8: 0000000000000001 s9: ff60000080841ef0 s10: 0000000000000001 [ 3.458141] t11: ffffffff81524812 t3 : 0000000000000001 t4 : ff60000080092bc0 [ 3.458172] t5 : 0000000000000000 t6 : ff200000000236d0 [ 3.458203] estado: 0000000200000100 direcci\u00f3n incorrecta: ffffffff800b669a causa: 0000000000000003 [ 3.458373] [] funci\u00f3n_llamada_smp_muchas_cond+0x452/0x520 [ 3.458593] [] en cada m\u00e1scara de condici\u00f3n de CPU+0x1e/0x30 [ 3.458625] [] __flush_tlb_range+0x118/0x1ca [ 3.458656] [] flush_tlb_kernel_range+0x1e/0x26 [ 3.458683] [] kfence_protect+0xc0/0xce [ 3.458717] [] kfence_guarded_free+0xc6/0x1c0 [ 3.458742] [] __kfence_free+0x62/0xc6 [ 3.458764] [] kfree+0x106/0x32c [ 3.458786] [] detach_buf_split+0x188/0x1a8 [ 3.458816] [] virtqueue_get_buf_ctx+0xb6/0x1f6 [ 3.458839] [] virtqueue_get_buf+0xe/0x16 [ 3.458880] [] virtblk_done+0x5c/0xe2 [ 3.458908] [] interrupci\u00f3n_de_vring+0x6a/0x74 [ 3.458930] [] __controlador_de_evento_irq_percpu+0x7c/0xe2 [ 3.458956] [] control_de_evento_irq+0x3c/0x86 [ 3.458978] [] control_de_irq_simple+0x9e/0xbe [ 3.459004] [] control_de_dominio_gen\u00e9rico_irq+0x1c/0x2a [ 3.459027] [] imsic_handle_irq+0xba/0x120 [ 3.459056] [] generic_handle_domain_irq+0x1c/0x2a [ 3.459080] [] riscv_intc_aia_irq+0x24/0x34 [ 3.459103] [] handle_riscv_irq+0x2e/0x4c [ 3.459133] [] call_on_irq_stack+0x32/0x40 Por lo tanto, solo limpie la TLB local y deje que el manejo de errores de p\u00e1gina de kfence se ocupe de los errores que podr\u00edan Esto ocurre cuando un n\u00facleo tiene una versi\u00f3n antigua de PTE protegida almacenada en cach\u00e9 en su TLB. Esto genera posibles imprecisiones que pueden tolerarse al usar kfence."
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: riscv: Se corrige el uso de IPI en kfence_protect_page(). flush_tlb_kernel_range() puede usar IPI para vaciar las TLB de todos los n\u00facleos, lo que activa la siguiente advertencia cuando las irq est\u00e1n deshabilitadas: [ 3.455330] ADVERTENCIA: CPU: 1 PID: 0 en kernel/smp.c:815 smp_call_function_many_cond+0x452/0x520 [ 3.456647] M\u00f3dulos vinculados en: [ 3.457218] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 No contaminado 6.12.0-rc7-00010-g91d3de7240b8 #1 [ 3.457416] Nombre del hardware: QEMU QEMU Virtual Machine, BIOS [ 3.457633] epc : funci\u00f3n_llamada_smp_muchas_cond+0x452/0x520 [ 3.457736] ra : en_cada_m\u00e1scara_cond_de_cpu+0x1e/0x30 [ 3.457786] epc : ffffffff800b669a ra : ffffffff800b67c2 sp : ff2000000000bb50 [ 3.457824] gp : ffffffff815212b8 tp : ff6000008014f080 t0 : 000000000000003f [ 3.457859] t1 : ffffffff815221e0 t2 : 000000000000000f s0: ff2000000000bc10 [3.457920] s1: 0000000000000040 a0: ffffffff815221e0 a1: 0000000000000001 [3.457953] a2 : 0000000000010000 a3 : 0000000000000003 a4 : 0000000000000000 [ 3.458006] a5 : 00000000000000000 a6 : ffffffffffffffff a7 : 0000000000000000 [ 3.458042] s2 : ffffffff815223be s3 : 00fffffffffff000 s4 : ff600001ffe38fc0 [ 3.458076] s5 : ff600001ff950d00 s6 : 0000000200000120 s7: 00000000000000001 [3.458109] s8: 0000000000000001 s9: ff60000080841ef0 s10: 0000000000000001 [ 3.458141] t11: ffffffff81524812 t3 : 0000000000000001 t4 : ff60000080092bc0 [ 3.458172] t5 : 0000000000000000 t6 : ff200000000236d0 [ 3.458203] estado: 0000000200000100 direcci\u00f3n incorrecta: ffffffff800b669a causa: 0000000000000003 [ 3.458373] [] funci\u00f3n_llamada_smp_muchas_cond+0x452/0x520 [ 3.458593] [] en cada m\u00e1scara de condici\u00f3n de CPU+0x1e/0x30 [ 3.458625] [] __flush_tlb_range+0x118/0x1ca [ 3.458656] [] flush_tlb_kernel_range+0x1e/0x26 [ 3.458683] [] kfence_protect+0xc0/0xce [ 3.458717] [] kfence_guarded_free+0xc6/0x1c0 [ 3.458742] [] __kfence_free+0x62/0xc6 [ 3.458764] [] kfree+0x106/0x32c [ 3.458786] [] detach_buf_split+0x188/0x1a8 [ 3.458816] [] virtqueue_get_buf_ctx+0xb6/0x1f6 [ 3.458839] [] virtqueue_get_buf+0xe/0x16 [ 3.458880] [] virtblk_done+0x5c/0xe2 [ 3.458908] [] interrupci\u00f3n_de_vring+0x6a/0x74 [ 3.458930] [] __controlador_de_evento_irq_percpu+0x7c/0xe2 [ 3.458956] [] control_de_evento_irq+0x3c/0x86 [ 3.458978] [] control_de_irq_simple+0x9e/0xbe [ 3.459004] [] control_de_dominio_gen\u00e9rico_irq+0x1c/0x2a [ 3.459027] [] imsic_handle_irq+0xba/0x120 [ 3.459056] [] generic_handle_domain_irq+0x1c/0x2a [ 3.459080] [] riscv_intc_aia_irq+0x24/0x34 [ 3.459103] [] handle_riscv_irq+0x2e/0x4c [ 3.459133] [] call_on_irq_stack+0x32/0x40 Por lo tanto, solo limpie la TLB local y deje que la gesti\u00f3n de errores de p\u00e1gina de kfence se ocupe de los errores que podr\u00edan Esto ocurre cuando un n\u00facleo tiene una versi\u00f3n antigua de PTE protegida almacenada en cach\u00e9 en su TLB. Esto genera posibles imprecisiones que pueden tolerarse al usar kfence."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53689.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53689.json
index 5cf008d28c9..4e3f58e3f55 100644
--- a/CVE-2024/CVE-2024-536xx/CVE-2024-53689.json
+++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53689.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: block: Fix potential deadlock while frozen queue and acquires sysfs_lock Para almacenar un valor en un atributo de cola, la funci\u00f3n queue_attr_store primero congela la cola (->q_usage_counter(io)) y luego adquiere ->sysfs_lock. Esto no parece correcto ya que el orden habitual deber\u00eda ser adquirir ->sysfs_lock antes de congelar la cola. Este orden incorrecto provoca el siguiente splat lockdep que siempre podemos reproducir simplemente accediendo al archivo /sys/kernel/debug usando el comando ls: [ 57.597146] ADVERTENCIA: posible dependencia de bloqueo circular detectada [ 57.597154] 6.12.0-10553-gb86545e02e8c #20 Tainted: GW [ 57.597162] ------------------------------------------------------ [ 57.597168] ls/4605 est\u00e1 intentando adquirir el bloqueo: [ 57.597176] c00000003eb56710 (&mm->mmap_lock){++++}-{4:4}, at: __might_fault+0x58/0xc0 [ 57.597200] pero la tarea ya tiene el bloqueo: [ 57.597207] c0000018e27c6810 (&sb->s_type->i_mutex_key#3){++++}-{4:4}, en: iterate_dir+0x94/0x1d4 [ 57.597226] cuyo bloqueo ya depende del nuevo bloqueo. [ 57.597233] la cadena de dependencia existente (en orden inverso) es: [ 57.597241] -> #5 (&sb->s_type->i_mutex_key#3){++++}-{4:4}: [ 57.597255] down_write+0x6c/0x18c [ 57.597264] start_creating+0xb4/0x24c [ 57.597274] debugfs_create_dir+0x2c/0x1e8 [ 57.597283] blk_register_queue+0xec/0x294 [ 57.597292] add_disk_fwnode+0x2e4/0x548 [ 57.597302] brd_alloc+0x2c8/0x338 [ 57.597309] brd_init+0x100/0x178 [ 57.597317] hacer_una_initcall+0x88/0x3e4 [ 57.597326] kernel_init_freeable+0x3cc/0x6e0 [ 57.597334] kernel_init+0x34/0x1cc [ 57.597342] retirar_del_subproceso_usuario_kernel+0x14/0x1c [ 57.597350] -> #4 (&q->debugfs_mutex){+.+.}-{4:4}: [ 57.597362] __mutex_lock+0xfc/0x12a0 [ 57.597370] blk_register_queue+0xd4/0x294 [ 57.597379] add_disk_fwnode+0x2e4/0x548 [ 57.597388] brd_alloc+0x2c8/0x338 [ 57.597395] brd_init+0x100/0x178 [ 57.597402] hacer_una_llamada_inicio+0x88/0x3e4 [ 57.597410] kernel_init_freeable+0x3cc/0x6e0 [ 57.597418] kernel_init+0x34/0x1cc [ 57.597426] ret_desde_hilo_usuario_kernel+0x14/0x1c [ 57.597434] -> #3 (&q->sysfs_lock){+.+.}-{4:4}: [ 57.597446] __mutex_lock+0xfc/0x12a0 [ 57.597454] queue_attr_store+0x9c/0x110 [ 57.597462] sysfs_kf_write+0x70/0xb0 [ 57.597471] kernfs_fop_write_iter+0x1b0/0x2ac [ 57.597480] vfs_write+0x3dc/0x6e8 [ 57.597488] ksys_write+0x84/0x140 [ 57.597495] excepci\u00f3n_de_llamada_del_sistema+0x130/0x360 [ 57.597504] llamada_del_sistema_com\u00fan+0x160/0x2c4 [ 57.597516] -> #2 (&q->q_contador_de_uso(io)#21){++++}-{0:0}: [ 57.597530] __submit_bio+0x5ec/0x828 [ 57.597538] enviar_bio_noacct_nocheck+0x1e4/0x4f0 [ 57.597547] iomap_readahead+0x2a0/0x448 [ 57.597556] xfs_vm_readahead+0x28/0x3c [ 57.597564] leer_p\u00e1ginas+0x88/0x41c [ 57.597571] page_cache_ra_unbounded+0x1ac/0x2d8 [ 57.597580] filemap_get_pages+0x188/0x984 [ 57.597588] filemap_read+0x13c/0x4bc [ 57.597596] xfs_file_buffered_read+0x88/0x17c [ 57.597605] xfs_file_read_iter+0xac/0x158 [ 57.597614] vfs_read+0x2d4/0x3b4 [ 57.597622] ksys_read+0x84/0x144 [ 57.597629] excepci\u00f3n_llamada_sistema+0x130/0x360 [ 57.597637] llamada_sistema_com\u00fan+0x160/0x2c4 [ 57.597647] -> #1 (asignaci\u00f3n.invalidar_bloqueo#2){++++}-{4:4}: [ 57.597661] lectura_abajo+0x6c/0x220 [ 57.597669] error_mapa_archivo+0x870/0x100c [ 57.597677] error_mapa_archivo_xfs+0xc4/0x18c [ 57.597684] __error_do+0x64/0x164 [ 57.597693] __error_manejar_mm+0x1274/0x1dac [ 57.597702] handle_mm_fault+0x248/0x48 ---truncado---"
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: block: Fix potential deadlock while frozen queue and acquires sysfs_lock Para almacenar un valor en un atributo de cola, la funci\u00f3n queue_attr_store primero congela la cola (->q_usage_counter(io)) y luego adquiere ->sysfs_lock. Esto no parece correcto ya que el orden habitual deber\u00eda ser adquirir ->sysfs_lock antes de congelar la cola. Este orden incorrecto provoca el siguiente splat lockdep que siempre podemos reproducir simplemente accediendo al archivo /sys/kernel/debug usando el comando ls: [ 57.597146] ADVERTENCIA: posible dependencia de bloqueo circular detectada [ 57.597154] 6.12.0-10553-gb86545e02e8c #20 Tainted: GW [ 57.597162] ------------------------------------------------------ [ 57.597168] ls/4605 est\u00e1 intentando adquirir el bloqueo: [ 57.597176] c00000003eb56710 (&mm->mmap_lock){++++}-{4:4}, at: __might_fault+0x58/0xc0 [ 57.597200] pero la tarea ya tiene el bloqueo: [ 57.597207] c0000018e27c6810 (&sb->s_type->i_mutex_key#3){++++}-{4:4}, en: iterate_dir+0x94/0x1d4 [ 57.597226] cuyo bloqueo ya depende del nuevo bloqueo. [ 57.597233] la cadena de dependencia existente (en orden inverso) es: [ 57.597241] -> #5 (&sb->s_type->i_mutex_key#3){++++}-{4:4}: [ 57.597255] down_write+0x6c/0x18c [ 57.597264] start_creating+0xb4/0x24c [ 57.597274] debugfs_create_dir+0x2c/0x1e8 [ 57.597283] blk_register_queue+0xec/0x294 [ 57.597292] add_disk_fwnode+0x2e4/0x548 [ 57.597302] brd_alloc+0x2c8/0x338 [ 57.597309] brd_init+0x100/0x178 [ 57.597317] hacer_una_initcall+0x88/0x3e4 [ 57.597326] kernel_init_freeable+0x3cc/0x6e0 [ 57.597334] kernel_init+0x34/0x1cc [ 57.597342] retirar_del_subproceso_usuario_kernel+0x14/0x1c [ 57.597350] -> #4 (&q->debugfs_mutex){+.+.}-{4:4}: [ 57.597362] __mutex_lock+0xfc/0x12a0 [ 57.597370] blk_register_queue+0xd4/0x294 [ 57.597379] add_disk_fwnode+0x2e4/0x548 [ 57.597388] brd_alloc+0x2c8/0x338 [ 57.597395] brd_init+0x100/0x178 [ 57.597402] hacer_una_llamada_inicio+0x88/0x3e4 [ 57.597410] kernel_init_freeable+0x3cc/0x6e0 [ 57.597418] kernel_init+0x34/0x1cc [ 57.597426] ret_desde_hilo_usuario_kernel+0x14/0x1c [ 57.597434] -> #3 (&q->sysfs_lock){+.+.}-{4:4}: [ 57.597446] __mutex_lock+0xfc/0x12a0 [ 57.597454] queue_attr_store+0x9c/0x110 [ 57.597462] sysfs_kf_write+0x70/0xb0 [ 57.597471] kernfs_fop_write_iter+0x1b0/0x2ac [ 57.597480] vfs_write+0x3dc/0x6e8 [ 57.597488] ksys_write+0x84/0x140 [ 57.597495] excepci\u00f3n_de_llamada_del_sistema+0x130/0x360 [ 57.597504] llamada_del_sistema_com\u00fan+0x160/0x2c4 [ 57.597516] -> #2 (&q->q_contador_de_uso(io)#21){++++}-{0:0}: [ 57.597530] __submit_bio+0x5ec/0x828 [ 57.597538] enviar_bio_noacct_nocheck+0x1e4/0x4f0 [ 57.597547] iomap_readahead+0x2a0/0x448 [ 57.597556] xfs_vm_readahead+0x28/0x3c [ 57.597564] leer_p\u00e1ginas+0x88/0x41c [ 57.597571] page_cache_ra_unbounded+0x1ac/0x2d8 [ 57.597580] filemap_get_pages+0x188/0x984 [ 57.597588] filemap_read+0x13c/0x4bc [ 57.597596] xfs_file_buffered_read+0x88/0x17c [ 57.597605] xfs_file_read_iter+0xac/0x158 [ 57.597614] vfs_read+0x2d4/0x3b4 [ 57.597622] ksys_read+0x84/0x144 [ 57.597629] excepci\u00f3n_llamada_sistema+0x130/0x360 [ 57.597637] llamada_sistema_com\u00fan+0x160/0x2c4 [ 57.597647] -> #1 (asignaci\u00f3n.invalidar_bloqueo#2){++++}-{4:4}: [ 57.597661] lectura_abajo+0x6c/0x220 [ 57.597669] error_mapa_archivo+0x870/0x100c [ 57.597677] error_mapa_archivo_xfs+0xc4/0x18c [ 57.597684] __error_do+0x64/0x164 [ 57.597693] __error_gestionar_mm+0x1274/0x1dac [ 57.597702] handle_mm_fault+0x248/0x48 ---truncado---"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53829.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53829.json
index 4f17be864dc..b899337d334 100644
--- a/CVE-2024/CVE-2024-538xx/CVE-2024-53829.json
+++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53829.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf",
"published": "2025-01-21T15:15:13.200",
"lastModified": "2025-01-21T15:15:13.200",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \nCross-site request forgery allows an unauthenticated attacker to hijack the authentication of a logged in user, and use the web API with the same permissions,\u00a0including but not limited to adding, removing or editing products. The attacker needs to know the ID of the available products to modify or delete them. The attacker cannot directly exfiltrate data (view) from CodeChecker, due to being limited to form-based CSRF.\n\nThis issue affects CodeChecker: through 6.24.4."
+ },
+ {
+ "lang": "es",
+ "value": "CodeChecker es una herramienta de an\u00e1lisis, una base de datos de defectos y una extensi\u00f3n de visualizaci\u00f3n para Clang Static Analyzer y Clang Tidy. Cross-site request forgery permite a un atacante no autenticado secuestrar la autenticaci\u00f3n de un usuario conectado y usar la API web con los mismos permisos, incluidos, entre otros, agregar, eliminar o editar productos. El atacante necesita saber el ID de los productos disponibles para modificarlos o eliminarlos. El atacante no puede exfiltrar datos directamente (ver) desde CodeChecker, debido a que est\u00e1 limitado a CSRF basado en formularios. Este problema afecta a CodeChecker: hasta 6.24.4."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54031.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54031.json
index bc661ad7c7f..ed01ed2ee98 100644
--- a/CVE-2024/CVE-2024-540xx/CVE-2024-54031.json
+++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54031.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nft_set_hash: lectura at\u00f3mica no alineada en la estructura nft_set_ext El acceso al campo genmask en la estructura nft_set_ext da como resultado una lectura at\u00f3mica no alineada: [72.130109] No se puede manejar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual ffff0000c2bb708c [72.131036] Informaci\u00f3n de cancelaci\u00f3n de memoria: [72.131213] ESR = 0x0000000096000021 [72.131446] EC = 0x25: DABT (EL actual), IL = 32 bits [72.132209] SET = 0, FnV = 0 [72.133216] EA = 0, S1PTW = 0 [ 72.134080] FSC = 0x21: error de alineaci\u00f3n [ 72.135593] Informaci\u00f3n de cancelaci\u00f3n de datos: [ 72.137194] ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000 [ 72.142351] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 72.145989] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 72.150115] swapper pgtable: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000000237d27000 [ 72.154893] [ffff0000c2bb708c] pgd=0000000000000000, p4d=180000023ffff403, pud=180000023f84b403, pmd=180000023f835403, +pte=0068000102bb7707 [ 72.163021] Error interno: Oops: 0000000096000021 [#1] SMP [...] [ 72.170041] CPU: 7 UID: 0 PID: 54 Comm: kworker/7:0 Contaminado: GE 6.13.0-rc3+ #2 [ 72.170509] Contaminado: [E]=UNSIGNED_MODULE [ 72.170720] Nombre del hardware: QEMU QEMU Virtual M\u00e1quina, BIOS edk2-stable202302-for-qemu 03/01/2023 [ 72.171192] Cola de trabajo: events_power_efficient nft_rhash_gc [nf_tables] [ 72.171552] pstate: 21400005 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 72.171915] pc : nft_rhash_gc+0x200/0x2d8 [nf_tables] [ 72.172166] lr : nft_rhash_gc+0x128/0x2d8 [nf_tables] [ 72.172546] sp : ffff800081f2bce0 [ 72.172724] x29: ffff800081f2bd40 x28: ffff0000c2bb708c x27: 0000000000000038 [ 72.173078] x26: ffff0000c6780ef0 x25: ffff0000c643df00 x24: ffff0000c6778f78 [ 72.173431] x23: 000000000000001a x22: ffff0000c4b1f000 x21: ffff0000c6780f78 [ 72.173782] x20: ffff0000c2bb70dc x19: ffff0000c2bb7080 x18: 0000000000000000 [ 72.174135] x17: ffff0000c0a4e1c0 x16: 0000000000003000 x15: 0000ac26d173b978 [ 72.174485] x14: ffffffffffffffffff x13: 0000000000000030 x12: ffff0000c6780ef0 [ 72.174841] x11: 000000000000000 x10: ffff800081f2bcf8 x9 : ffff0000c3000000 [ 72.175193] x8 : 00000000000004be x7 : 0000000000000000 x6 : 0000000000000000 [ 72.175544] x5 : 0000000000000040 x4 : ffff0000c3000010 x3 : 0000000000000000 [ 72.175871] x2 : 0000000000003a98 x1 : ffff0000c2bb708c x0 : 0000000000000004 [ 72.176207] Rastreo de llamadas: [ 72.176316] nft_rhash_gc+0x200/0x2d8 [nf_tables] (P) [ 72.176653] process_one_work+0x178/0x3d0 [ 72.176831] worker_thread+0x200/0x3f0 [ 72.176995] kthread+0xe8/0xf8 [ 72.177130] ret_from_fork+0x10/0x20 [ 72.177289] C\u00f3digo: 54fff984 d503201f d2800080 91003261 (f820303f) [ 72.177557] ---[ fin de seguimiento 0000000000000000 ]--- Alinear estructura nft_set_ext al tama\u00f1o de palabra para abordar esto y documentarlo. pahole informa que esto aumenta el tama\u00f1o de los elementos para rhash y pipapo en 8 bytes en x86_64."
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nft_set_hash: lectura at\u00f3mica no alineada en la estructura nft_set_ext El acceso al campo genmask en la estructura nft_set_ext da como resultado una lectura at\u00f3mica no alineada: [72.130109] No se puede gestionar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual ffff0000c2bb708c [72.131036] Informaci\u00f3n de cancelaci\u00f3n de memoria: [72.131213] ESR = 0x0000000096000021 [72.131446] EC = 0x25: DABT (EL actual), IL = 32 bits [72.132209] SET = 0, FnV = 0 [72.133216] EA = 0, S1PTW = 0 [ 72.134080] FSC = 0x21: error de alineaci\u00f3n [ 72.135593] Informaci\u00f3n de cancelaci\u00f3n de datos: [ 72.137194] ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000 [ 72.142351] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 72.145989] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 72.150115] swapper pgtable: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000000237d27000 [ 72.154893] [ffff0000c2bb708c] pgd=0000000000000000, p4d=180000023ffff403, pud=180000023f84b403, pmd=180000023f835403, +pte=0068000102bb7707 [ 72.163021] Error interno: Oops: 0000000096000021 [#1] SMP [...] [ 72.170041] CPU: 7 UID: 0 PID: 54 Comm: kworker/7:0 Contaminado: GE 6.13.0-rc3+ #2 [ 72.170509] Contaminado: [E]=UNSIGNED_MODULE [ 72.170720] Nombre del hardware: QEMU QEMU Virtual M\u00e1quina, BIOS edk2-stable202302-for-qemu 03/01/2023 [ 72.171192] Cola de trabajo: events_power_efficient nft_rhash_gc [nf_tables] [ 72.171552] pstate: 21400005 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 72.171915] pc : nft_rhash_gc+0x200/0x2d8 [nf_tables] [ 72.172166] lr : nft_rhash_gc+0x128/0x2d8 [nf_tables] [ 72.172546] sp : ffff800081f2bce0 [ 72.172724] x29: ffff800081f2bd40 x28: ffff0000c2bb708c x27: 0000000000000038 [ 72.173078] x26: ffff0000c6780ef0 x25: ffff0000c643df00 x24: ffff0000c6778f78 [ 72.173431] x23: 000000000000001a x22: ffff0000c4b1f000 x21: ffff0000c6780f78 [ 72.173782] x20: ffff0000c2bb70dc x19: ffff0000c2bb7080 x18: 0000000000000000 [ 72.174135] x17: ffff0000c0a4e1c0 x16: 0000000000003000 x15: 0000ac26d173b978 [ 72.174485] x14: ffffffffffffffffff x13: 0000000000000030 x12: ffff0000c6780ef0 [ 72.174841] x11: 000000000000000 x10: ffff800081f2bcf8 x9 : ffff0000c3000000 [ 72.175193] x8 : 00000000000004be x7 : 0000000000000000 x6 : 0000000000000000 [ 72.175544] x5 : 0000000000000040 x4 : ffff0000c3000010 x3 : 0000000000000000 [ 72.175871] x2 : 0000000000003a98 x1 : ffff0000c2bb708c x0 : 0000000000000004 [ 72.176207] Rastreo de llamadas: [ 72.176316] nft_rhash_gc+0x200/0x2d8 [nf_tables] (P) [ 72.176653] process_one_work+0x178/0x3d0 [ 72.176831] worker_thread+0x200/0x3f0 [ 72.176995] kthread+0xe8/0xf8 [ 72.177130] ret_from_fork+0x10/0x20 [ 72.177289] C\u00f3digo: 54fff984 d503201f d2800080 91003261 (f820303f) [ 72.177557] ---[ fin de seguimiento 0000000000000000 ]--- Alinear estructura nft_set_ext al tama\u00f1o de palabra para abordar esto y documentarlo. pahole informa que esto aumenta el tama\u00f1o de los elementos para rhash y pipapo en 8 bytes en x86_64."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-546xx/CVE-2024-54681.json b/CVE-2024/CVE-2024-546xx/CVE-2024-54681.json
index d136f6f14de..35e71e3c4aa 100644
--- a/CVE-2024/CVE-2024-546xx/CVE-2024-54681.json
+++ b/CVE-2024/CVE-2024-546xx/CVE-2024-54681.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:12.227",
"lastModified": "2025-01-17T17:15:12.227",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple bash files were present in the application's private directory.\n Bash files can be used on their own, by an attacker that has already \nfull access to the mobile platform to compromise the translations for \nthe application."
+ },
+ {
+ "lang": "es",
+ "value": "Hab\u00eda varios archivos bash en el directorio privado de la aplicaci\u00f3n. Un atacante que ya tiene acceso total a la plataforma m\u00f3vil puede utilizar los archivos bash por s\u00ed solos para comprometer las traducciones de la aplicaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54792.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54792.json
index cdc8e1b872b..536772da2d8 100644
--- a/CVE-2024/CVE-2024-547xx/CVE-2024-54792.json
+++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54792.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T18:15:14.277",
"lastModified": "2025-01-21T19:15:11.080",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) vulnerability has been found in SpagoBI v3.5.1 in the user administration panel. An authenticated user can lead another user into executing unwanted actions inside the application they are logged in, like adding, editing or deleting users."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad Cross-Site Request Forgery (CSRF) en SpagoBI v3.5.1 en el panel de administraci\u00f3n de usuarios. Un usuario autenticado puede hacer que otro usuario ejecute acciones no deseadas dentro de la aplicaci\u00f3n en la que ha iniciado sesi\u00f3n, como agregar, editar o eliminar usuarios."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54794.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54794.json
index acf3c9c8b4f..0c0bb7cad28 100644
--- a/CVE-2024/CVE-2024-547xx/CVE-2024-54794.json
+++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54794.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T18:15:14.410",
"lastModified": "2025-01-21T19:15:11.243",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The script input feature of SpagoBI 3.5.1 allows arbitrary code execution."
+ },
+ {
+ "lang": "es",
+ "value": "La funci\u00f3n de entrada script de SpagoBI 3.5.1 permite la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54795.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54795.json
index 648dcee417c..d12e5fe3b95 100644
--- a/CVE-2024/CVE-2024-547xx/CVE-2024-54795.json
+++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54795.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T18:15:14.537",
"lastModified": "2025-01-21T19:15:11.407",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SpagoBI v3.5.1 contains multiple Stored Cross-Site Scripting (XSS) vulnerabilities in the create/edit forms of the worksheet designer function."
+ },
+ {
+ "lang": "es",
+ "value": "SpagoBI v3.5.1 contiene m\u00faltiples vulnerabilidades Cross-Site Scripting (XSS) almacenado en los formularios de creaci\u00f3n/edici\u00f3n de la funci\u00f3n de dise\u00f1o de hojas de trabajo."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54848.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54848.json
index f4c8bb39fa6..575c6637b4b 100644
--- a/CVE-2024/CVE-2024-548xx/CVE-2024-54848.json
+++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54848.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "El manejo y almacenamiento inadecuados de certificados en CP Plus CP-VNR-3104 B3223P22C02424 permiten a los atacantes descifrar las comunicaciones o ejecutar ataques de tipo \"man-in-the-middle\"."
+ "value": "La gesti\u00f3n y almacenamiento inadecuados de certificados en CP Plus CP-VNR-3104 B3223P22C02424 permiten a los atacantes descifrar las comunicaciones o ejecutar ataques de tipo \"man-in-the-middle\"."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5460.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5460.json
index d7723021f19..f076257194b 100644
--- a/CVE-2024/CVE-2024-54xx/CVE-2024-5460.json
+++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5460.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-06-26T00:15:11.093",
"lastModified": "2024-11-21T09:47:43.710",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55192.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55192.json
index 8ddc88f9a2a..e2e24cb439d 100644
--- a/CVE-2024/CVE-2024-551xx/CVE-2024-55192.json
+++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55192.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*)."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que OpenImageIO v3.1.0.0dev contiene un desbordamiento de mont\u00f3n a trav\u00e9s del componente OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*)."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55194.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55194.json
index 2e1b46afe4d..df645935458 100644
--- a/CVE-2024/CVE-2024-551xx/CVE-2024-55194.json
+++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55194.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component /OpenImageIO/fmath.h."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que OpenImageIO v3.1.0.0dev contiene un desbordamiento de mont\u00f3n a trav\u00e9s del componente /OpenImageIO/fmath.h."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55195.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55195.json
index 60d62d97ae2..ad038a77457 100644
--- a/CVE-2024/CVE-2024-551xx/CVE-2024-55195.json
+++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55195.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "An allocation-size-too-big bug in the component /imagebuf.cpp of OpenImageIO v3.1.0.0dev may cause a Denial of Service (DoS) when the program to requests to allocate too much space."
+ },
+ {
+ "lang": "es",
+ "value": "Un error de tama\u00f1o de asignaci\u00f3n demasiado grande en el componente /imagebuf.cpp de OpenImageIO v3.1.0.0dev puede provocar una denegaci\u00f3n de servicio (DoS) cuando el programa solicita asignar demasiado espacio."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55488.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55488.json
index b03b5408924..3acd4dec9c9 100644
--- a/CVE-2024/CVE-2024-554xx/CVE-2024-55488.json
+++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55488.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in Umbraco CMS v14.3.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad Cross-Site Scripting (XSS) Almacenado en Umbraco CMS v14.3.1 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55504.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55504.json
index 2576a11114e..5c1b8ff05c1 100644
--- a/CVE-2024/CVE-2024-555xx/CVE-2024-55504.json
+++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55504.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T19:15:11.567",
"lastModified": "2025-01-21T19:15:11.567",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in RAR Extractor - Unarchiver Free and Pro v.6.4.0 allows local attackers to inject arbitrary code potentially leading to remote control and unauthorized access to sensitive user data via the exploit_combined.dylib component on MacOS."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en RAR Extractor - Unarchiver Free and Pro v.6.4.0 permite a atacantes locales inyectar c\u00f3digo arbitrario que potencialmente conduce al control remoto y acceso no autorizado a datos confidenciales del usuario a trav\u00e9s del componente exploit_combined.dylib en MacOS."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55916.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55916.json
index c6f0591e80d..51a474f85ce 100644
--- a/CVE-2024/CVE-2024-559xx/CVE-2024-55916.json
+++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55916.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Controladores: hv: util: evitar acceder a un b\u00fafer de anillo que a\u00fan no se ha inicializado Si el demonio KVP (o VSS) se inicia antes de que el b\u00fafer de anillo del canal VMBus se haya inicializado por completo, podemos activar el p\u00e1nico siguiente: hv_utils: registrar el controlador de la utilidad HyperV hv_vmbus: registrar el controlador hv_utils ... ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 000000000000000 CPU: 44 UID: 0 PID: 2552 Comm: hv_kvp_daemon Tainted: GE 6.11.0-rc3+ #1 RIP: 0010:hv_pkt_iter_first+0x12/0xd0 Seguimiento de llamadas: ... vmbus_recvpacket hv_kvp_onchannelcallback vmbus_on_event tasklet_action_common asm_sysvec_hyperv_stimer0 ... kvp_register_done hvt_op_read vfs_read ksys_read __x64_sys_read Esto puede suceder porque la devoluci\u00f3n de llamada del canal KVP/VSS se puede invocar incluso antes de que el canal est\u00e9 completamente abierto: 1) tan pronto como hv_kvp_init() -> hvutil_transport_init() crea /dev/vmbus/hv_kvp, el demonio kvp puede abrir el archivo del dispositivo inmediatamente y registrarse en el controlador escribiendo un mensaje KVP_OP_REGISTER1 en el archivo (que es manejado por kvp_on_msg() ->kvp_handle_handshake()) y leyendo el archivo para la respuesta del controlador, que es manejada por hvt_op_read(), que llama a hvt->on_read(), es decir, kvp_register_done(). 2) El problema con kvp_register_done() es que puede provocar que se llame a la devoluci\u00f3n de llamada del canal incluso antes de que el canal est\u00e9 completamente abierto, y cuando la devoluci\u00f3n de llamada del canal est\u00e1 comenzando a ejecutarse, util_probe()-> vmbus_open() puede no haber inicializado a\u00fan el ringbuffer, por lo que la devoluci\u00f3n de llamada puede alcanzar el p\u00e1nico de la desreferencia de puntero NULL. Para reproducir el p\u00e1nico de manera consistente, podemos agregar un \"ssleep(10)\" para KVP en __vmbus_open(), justo antes del primer hv_ringbuffer_init(), y luego descargamos y volvemos a cargar el controlador hv_utils, y ejecutamos el demonio manualmente dentro de los 10 segundos. Solucione el problema reordenando los pasos en util_probe() de modo que la entrada char dev que utiliza el demonio KVP o VSS no se cree hasta que se haya completado vmbus_open(). Esta reordenaci\u00f3n evita que se produzca la condici\u00f3n de ejecuci\u00f3n."
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Controladores: hv: util: evitar acceder a un b\u00fafer de anillo que a\u00fan no se ha inicializado Si el daemon KVP (o VSS) se inicia antes de que el b\u00fafer de anillo del canal VMBus se haya inicializado por completo, podemos activar el p\u00e1nico siguiente: hv_utils: registrar el controlador de la utilidad HyperV hv_vmbus: registrar el controlador hv_utils ... ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 000000000000000 CPU: 44 UID: 0 PID: 2552 Comm: hv_kvp_daemon Tainted: GE 6.11.0-rc3+ #1 RIP: 0010:hv_pkt_iter_first+0x12/0xd0 Seguimiento de llamadas: ... vmbus_recvpacket hv_kvp_onchannelcallback vmbus_on_event tasklet_action_common asm_sysvec_hyperv_stimer0 ... kvp_register_done hvt_op_read vfs_read ksys_read __x64_sys_read Esto puede suceder porque la devoluci\u00f3n de llamada del canal KVP/VSS se puede invocar incluso antes de que el canal est\u00e9 completamente abierto: 1) tan pronto como hv_kvp_init() -> hvutil_transport_init() crea /dev/vmbus/hv_kvp, el daemon kvp puede abrir el archivo del dispositivo inmediatamente y registrarse en el controlador escribiendo un mensaje KVP_OP_REGISTER1 en el archivo (que es gestionado por kvp_on_msg() ->kvp_handle_handshake()) y leyendo el archivo para la respuesta del controlador, que es gestionada por hvt_op_read(), que llama a hvt->on_read(), es decir, kvp_register_done(). 2) El problema con kvp_register_done() es que puede provocar que se llame a la devoluci\u00f3n de llamada del canal incluso antes de que el canal est\u00e9 completamente abierto, y cuando la devoluci\u00f3n de llamada del canal est\u00e1 comenzando a ejecutarse, util_probe()-> vmbus_open() puede no haber inicializado a\u00fan el ringbuffer, por lo que la devoluci\u00f3n de llamada puede alcanzar el p\u00e1nico de la desreferencia de puntero NULL. Para reproducir el p\u00e1nico de manera consistente, podemos agregar un \"ssleep(10)\" para KVP en __vmbus_open(), justo antes del primer hv_ringbuffer_init(), y luego descargamos y volvemos a cargar el controlador hv_utils, y ejecutamos el daemon manualmente dentro de los 10 segundos. Solucione el problema reordenando los pasos en util_probe() de modo que la entrada char dev que utiliza el daemon KVP o VSS no se cree hasta que se haya completado vmbus_open(). Esta reordenaci\u00f3n evita que se produzca la condici\u00f3n de ejecuci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55925.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55925.json
index 75205d67743..6e4e6865e23 100644
--- a/CVE-2024/CVE-2024-559xx/CVE-2024-55925.json
+++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55925.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"published": "2025-01-23T17:15:15.380",
"lastModified": "2025-01-23T17:15:15.380",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "API Security bypass through header manipulation"
+ },
+ {
+ "lang": "es",
+ "value": "Omisi\u00f3n de seguridad de API mediante manipulaci\u00f3n de encabezado"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55926.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55926.json
index 176c7c4013a..8fa3741eae9 100644
--- a/CVE-2024/CVE-2024-559xx/CVE-2024-55926.json
+++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55926.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"published": "2025-01-23T18:15:31.780",
"lastModified": "2025-01-23T18:15:31.780",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Arbitrary file upload, deletion and read through header manipulation"
+ },
+ {
+ "lang": "es",
+ "value": "Carga, eliminaci\u00f3n y lectura arbitraria de archivos mediante manipulaci\u00f3n del encabezado"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55927.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55927.json
index f124edf8327..30787fb150b 100644
--- a/CVE-2024/CVE-2024-559xx/CVE-2024-55927.json
+++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55927.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"published": "2025-01-23T18:15:31.940",
"lastModified": "2025-01-23T18:15:31.940",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Flawed token generation implementation & Hard-coded key implementation"
+ },
+ {
+ "lang": "es",
+ "value": "Implementaci\u00f3n de generaci\u00f3n de tokens defectuosa e implementaci\u00f3n de clave codificada"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55928.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55928.json
index 164323797bb..d5b26b0c9fc 100644
--- a/CVE-2024/CVE-2024-559xx/CVE-2024-55928.json
+++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55928.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"published": "2025-01-23T18:15:32.100",
"lastModified": "2025-01-23T18:15:32.100",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Clear text secrets returned & Remote system secrets in clear text"
+ },
+ {
+ "lang": "es",
+ "value": "Secretos texto plano devueltos y secretos sistema remotos en texto plano"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55929.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55929.json
index 592405c61c7..41ae12013a3 100644
--- a/CVE-2024/CVE-2024-559xx/CVE-2024-55929.json
+++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55929.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"published": "2025-01-23T18:15:32.277",
"lastModified": "2025-01-23T18:15:32.277",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mail spoofing"
+ },
+ {
+ "lang": "es",
+ "value": "Falsificaci\u00f3n de correo"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55930.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55930.json
index 6050d17edb1..88d6c228532 100644
--- a/CVE-2024/CVE-2024-559xx/CVE-2024-55930.json
+++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55930.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"published": "2025-01-23T18:15:32.450",
"lastModified": "2025-01-23T18:15:32.450",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Weak default folder permissions"
+ },
+ {
+ "lang": "es",
+ "value": "Permisos de carpeta predeterminados d\u00e9biles"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55971.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55971.json
index 8e6738c148d..bbf7d25b32c 100644
--- a/CVE-2024/CVE-2024-559xx/CVE-2024-55971.json
+++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55971.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-23T16:15:36.307",
"lastModified": "2025-01-23T16:15:36.307",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in the default configuration of the Logitime WebClock application <= 5.43.0 allows an unauthenticated user to run arbitrary code on the backend database server."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de inyecci\u00f3n SQL en la configuraci\u00f3n predeterminada de la aplicaci\u00f3n Logitime WebClock <= 5.43.0 permite que un usuario no autenticado ejecute c\u00f3digo arbitrario en el servidor de base de datos backend."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56277.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56277.json
index 5b79f64d73e..25c65e10a64 100644
--- a/CVE-2024/CVE-2024-562xx/CVE-2024-56277.json
+++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56277.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:09.593",
"lastModified": "2025-01-21T14:15:09.593",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Encoding or Escaping of Output vulnerability in Poll Maker Team Poll Maker. This issue affects Poll Maker: from n/a through n/a."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de codificaci\u00f3n o escape incorrectos de la salida en Poll Maker Team Poll Maker. Este problema afecta a Poll Maker: desde n/d hasta n/d."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56788.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56788.json
index 3be1f5b0031..f6aedff77c0 100644
--- a/CVE-2024/CVE-2024-567xx/CVE-2024-56788.json
+++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56788.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ethernet: oa_tc6: arregla la condici\u00f3n de ejecuci\u00f3n de tx skb entre punteros de referencia Hay dos punteros skb para administrar los tx skb en cola desde la pila n/w. El puntero waiting_tx_skb apunta al tx skb que necesita ser procesado y el puntero progress_tx_skb apunta al tx skb que est\u00e1 siendo procesado. El hilo SPI prepara los fragmentos de datos de tx desde el tx skb apuntado por el puntero progress_tx_skb. Cuando se procesa el tx skb apuntado por progress_tx_skb, el tx skb apuntado por progress_tx_skb se asigna a progress_tx_skb y el puntero waiting_tx_skb se asigna con NULL. Siempre que haya un nuevo skb tx de la pila n/w, se asignar\u00e1 al puntero waiting_tx_skb si es NULL. Puesta en cola y procesamiento de un skb tx manejado en dos subprocesos diferentes. Considere un escenario donde el subproceso SPI proces\u00f3 un going_tx_skb y mueve el siguiente skb tx del puntero waiting_tx_skb al puntero going_tx_skb sin hacer ninguna comprobaci\u00f3n NULL. En este momento, si el puntero waiting_tx_skb es NULL, entonces el puntero going_tx_skb tambi\u00e9n se asigna con NULL. Despu\u00e9s de eso, si un nuevo skb tx se asigna al puntero waiting_tx_skb por la pila n/w y existe la posibilidad de sobrescribir el puntero skb tx con NULL en el subproceso SPI. Finalmente, uno de los skb tx quedar\u00e1 como sin manejar, lo que resultar\u00e1 en la p\u00e9rdida de paquetes y p\u00e9rdida de memoria. - Considere el siguiente escenario donde el TXC informado de la transferencia anterior es 10 y progress_tx_skb contiene una trama Ethernet de transmisi\u00f3n que se puede transportar en 20 TXC y waiting_tx_skb sigue siendo NULL. tx_credits = 10; /* 21 se completan en la transferencia anterior */ progress_tx_skb = 20; waiting_tx_skb = NULL; /* Sigue siendo NULL */ - Entonces, (tc6->ongoing_tx_skb || tc6->waiting_tx_skb) se vuelve verdadero. - Despu\u00e9s de oa_tc6_prepare_spi_tx_buf_for_tx_skbs() progress_tx_skb = 10; waiting_tx_skb = NULL; /* Sigue siendo NULL */ - Realizar transferencia SPI. - Procesar el b\u00fafer de recepci\u00f3n SPI para obtener el TXC de los pies de p\u00e1gina. - Ahora supongamos que los 21 TXC previamente completados se liberan, por lo que estamos listos para transportar los siguientes 10 fragmentos de tx restantes desde progress_tx_skb. tx_credits = 21; progress_tx_skb = 10; waiting_tx_skb = NULL; - Entonces, (tc6->ongoing_tx_skb || tc6->waiting_tx_skb) se vuelve verdadero nuevamente. - En oa_tc6_prepare_spi_tx_buf_for_tx_skbs() progress_tx_skb = NULL; waiting_tx_skb = NULL; - Ahora, el siguiente caso malo podr\u00eda ocurrir, Thread1 (oa_tc6_start_xmit) Thread2 (oa_tc6_spi_thread_handler) --------------------------- ----------------------------------- - si waiting_tx_skb es NULL - si going_tx_skb es NULL - going_tx_skb = waiting_tx_skb - waiting_tx_skb = skb - waiting_tx_skb = NULL ... - going_tx_skb = NULL - si waiting_tx_skb es NULL - waiting_tx_skb = skb Para superar el problema anterior, proteja el movimiento de la referencia tx skb del puntero waiting_tx_skb al puntero going_tx_skb y asigne el nuevo tx skb al puntero waiting_tx_skb, de modo que el otro hilo no pueda acceder al puntero waiting_tx_skb hasta que el hilo actual complete el movimiento de la referencia tx skb de manera segura."
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ethernet: oa_tc6: arregla la condici\u00f3n de ejecuci\u00f3n de tx skb entre punteros de referencia Hay dos punteros skb para administrar los tx skb en cola desde la pila n/w. El puntero waiting_tx_skb apunta al tx skb que necesita ser procesado y el puntero progress_tx_skb apunta al tx skb que est\u00e1 siendo procesado. El hilo SPI prepara los fragmentos de datos de tx desde el tx skb apuntado por el puntero progress_tx_skb. Cuando se procesa el tx skb apuntado por progress_tx_skb, el tx skb apuntado por progress_tx_skb se asigna a progress_tx_skb y el puntero waiting_tx_skb se asigna con NULL. Siempre que haya un nuevo skb tx de la pila n/w, se asignar\u00e1 al puntero waiting_tx_skb si es NULL. Puesta en cola y procesamiento de un skb tx gestionado en dos subprocesos diferentes. Considere un escenario donde el subproceso SPI proces\u00f3 un going_tx_skb y mueve el siguiente skb tx del puntero waiting_tx_skb al puntero going_tx_skb sin hacer ninguna comprobaci\u00f3n NULL. En este momento, si el puntero waiting_tx_skb es NULL, entonces el puntero going_tx_skb tambi\u00e9n se asigna con NULL. Despu\u00e9s de eso, si un nuevo skb tx se asigna al puntero waiting_tx_skb por la pila n/w y existe la posibilidad de sobrescribir el puntero skb tx con NULL en el subproceso SPI. Finalmente, uno de los skb tx quedar\u00e1 como sin gestionar, lo que resultar\u00e1 en la p\u00e9rdida de paquetes y p\u00e9rdida de memoria. - Considere el siguiente escenario donde el TXC informado de la transferencia anterior es 10 y progress_tx_skb contiene una trama Ethernet de transmisi\u00f3n que se puede transportar en 20 TXC y waiting_tx_skb sigue siendo NULL. tx_credits = 10; /* 21 se completan en la transferencia anterior */ progress_tx_skb = 20; waiting_tx_skb = NULL; /* Sigue siendo NULL */ - Entonces, (tc6->ongoing_tx_skb || tc6->waiting_tx_skb) se vuelve verdadero. - Despu\u00e9s de oa_tc6_prepare_spi_tx_buf_for_tx_skbs() progress_tx_skb = 10; waiting_tx_skb = NULL; /* Sigue siendo NULL */ - Realizar transferencia SPI. - Procesar el b\u00fafer de recepci\u00f3n SPI para obtener el TXC de los pies de p\u00e1gina. - Ahora supongamos que los 21 TXC previamente completados se liberan, por lo que estamos listos para transportar los siguientes 10 fragmentos de tx restantes desde progress_tx_skb. tx_credits = 21; progress_tx_skb = 10; waiting_tx_skb = NULL; - Entonces, (tc6->ongoing_tx_skb || tc6->waiting_tx_skb) se vuelve verdadero nuevamente. - En oa_tc6_prepare_spi_tx_buf_for_tx_skbs() progress_tx_skb = NULL; waiting_tx_skb = NULL; - Ahora, el siguiente caso malo podr\u00eda ocurrir, Thread1 (oa_tc6_start_xmit) Thread2 (oa_tc6_spi_thread_handler) --------------------------- ----------------------------------- - si waiting_tx_skb es NULL - si going_tx_skb es NULL - going_tx_skb = waiting_tx_skb - waiting_tx_skb = skb - waiting_tx_skb = NULL ... - going_tx_skb = NULL - si waiting_tx_skb es NULL - waiting_tx_skb = skb Para superar el problema anterior, proteja el movimiento de la referencia tx skb del puntero waiting_tx_skb al puntero going_tx_skb y asigne el nuevo tx skb al puntero waiting_tx_skb, de modo que el otro hilo no pueda acceder al puntero waiting_tx_skb hasta que el hilo actual complete el movimiento de la referencia tx skb de manera segura."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56990.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56990.json
index 1441791c5d1..c80dd590184 100644
--- a/CVE-2024/CVE-2024-569xx/CVE-2024-56990.json
+++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56990.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T16:15:13.947",
"lastModified": "2025-01-21T16:15:13.947",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPGurukul Hospital Management System 4.0 is vulnerable to Cross Site Scripting (XSS) in /view-medhistory.php and /admin/view-patient.php."
+ },
+ {
+ "lang": "es",
+ "value": "PHPGurukul Hospital Management System 4.0 es vulnerable a Cross Site Scripting (XSS) en /view-medhistory.php y /admin/view-patient.php."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56997.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56997.json
index 5655b245089..50aab341a00 100644
--- a/CVE-2024/CVE-2024-569xx/CVE-2024-56997.json
+++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56997.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T15:15:13.343",
"lastModified": "2025-01-21T20:15:35.757",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPGurukul Hospital Management System 4.0 is vulnerable to Cross Site Scripting (XSS) in /doctor/index.php via the 'Email' parameter."
+ },
+ {
+ "lang": "es",
+ "value": "PHPGurukul Hospital Management System 4.0 es vulnerable a Cross Site Scripting (XSS) en /doctor/index.php a trav\u00e9s del par\u00e1metro 'Email'."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56998.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56998.json
index 9a74cda2a62..18d5bb16398 100644
--- a/CVE-2024/CVE-2024-569xx/CVE-2024-56998.json
+++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56998.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T15:15:13.467",
"lastModified": "2025-01-21T20:15:35.937",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPGurukul Hospital Management System 4.0 is vulnerable to Cross Site Scripting (XSS) in /edit-profile.php via the parameter $address."
+ },
+ {
+ "lang": "es",
+ "value": "PHPGurukul Hospital Management System 4.0 es vulnerable a Cross Site Scripting (XSS) en /edit-profile.php a trav\u00e9s del par\u00e1metro $address."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57030.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57030.json
index 9794ecda84c..cc7bf7ceda2 100644
--- a/CVE-2024/CVE-2024-570xx/CVE-2024-57030.json
+++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57030.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-17T20:15:28.667",
"lastModified": "2025-01-17T21:15:09.823",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Wegia < 3.2.0 is vulnerable to Cross Site Scripting (XSS) in /geral/documentos_funcionario.php via the id parameter."
+ },
+ {
+ "lang": "es",
+ "value": "Wegia < 3.2.0 es vulnerable a Cross Site Scripting (XSS) en /geral/documentos_funcionario.php a trav\u00e9s del par\u00e1metro id."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57031.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57031.json
index f93a94c7b2e..764ae295a8f 100644
--- a/CVE-2024/CVE-2024-570xx/CVE-2024-57031.json
+++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57031.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-17T20:15:28.790",
"lastModified": "2025-01-21T17:15:15.130",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57032.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57032.json
index 0e62fdcf850..b261578b905 100644
--- a/CVE-2024/CVE-2024-570xx/CVE-2024-57032.json
+++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57032.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-17T20:15:28.910",
"lastModified": "2025-01-21T17:15:15.313",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57034.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57034.json
index 29f5b64f6e3..638a829ed3b 100644
--- a/CVE-2024/CVE-2024-570xx/CVE-2024-57034.json
+++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57034.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-17T20:15:29.020",
"lastModified": "2025-01-21T17:15:15.513",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57035.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57035.json
index b4b0480e414..9beaa069d3b 100644
--- a/CVE-2024/CVE-2024-570xx/CVE-2024-57035.json
+++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57035.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-17T21:15:10.100",
"lastModified": "2025-01-21T17:15:15.703",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57036.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57036.json
index cc293cc7503..0660a4b5126 100644
--- a/CVE-2024/CVE-2024-570xx/CVE-2024-57036.json
+++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57036.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T16:15:14.143",
"lastModified": "2025-01-21T16:15:14.143",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK A810R V4.1.2cu.5032_B20200407 was found to contain a command insertion vulnerability in downloadFile.cgi main function. This vulnerability allows an attacker to execute arbitrary commands by sending HTTP request."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK A810R V4.1.2cu.5032_B20200407 conten\u00eda una vulnerabilidad de inserci\u00f3n de comandos en la funci\u00f3n principal downloadFile.cgi. Esta vulnerabilidad permite que un atacante ejecute comandos arbitrarios mediante el env\u00edo de una solicitud HTTP."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json
index 49ec2229e74..b50714e2d67 100644
--- a/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json
+++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T16:15:32.700",
"lastModified": "2025-01-16T16:15:32.700",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57252.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57252.json
index 1320740d0ce..ed4ad75c1af 100644
--- a/CVE-2024/CVE-2024-572xx/CVE-2024-57252.json
+++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57252.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-17T21:15:10.217",
"lastModified": "2025-01-17T22:15:28.817",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OtCMS <=V7.46 is vulnerable to Server-Side Request Forgery (SSRF) in /admin/read.php, which can Read system files arbitrarily."
+ },
+ {
+ "lang": "es",
+ "value": "OtCMS <=V7.46 es vulnerable a Server-Side Request Forgery (SSRF) en /admin/read.php, que puede leer archivos sistema arbitrariamente."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-573xx/CVE-2024-57369.json b/CVE-2024/CVE-2024-573xx/CVE-2024-57369.json
index 547962e7df0..bbbc0e25172 100644
--- a/CVE-2024/CVE-2024-573xx/CVE-2024-57369.json
+++ b/CVE-2024/CVE-2024-573xx/CVE-2024-57369.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-17T20:15:29.140",
"lastModified": "2025-01-17T20:15:29.140",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Clickjacking vulnerability in typecho v1.2.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de clickjacking en typecho v1.2.1."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-573xx/CVE-2024-57372.json b/CVE-2024/CVE-2024-573xx/CVE-2024-57372.json
index f4954187e28..0dd9686d61d 100644
--- a/CVE-2024/CVE-2024-573xx/CVE-2024-57372.json
+++ b/CVE-2024/CVE-2024-573xx/CVE-2024-57372.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-17T20:15:29.447",
"lastModified": "2025-01-17T22:15:28.957",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in InformationPush master version allows a remote attacker to obtain sensitive information via the title, time and msg parameters"
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad Cross Site Scripting en la versi\u00f3n InformationPush master permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de los par\u00e1metros de t\u00edtulo, hora y mensaje."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57538.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57538.json
index c74131f8531..731ba2fc232 100644
--- a/CVE-2024/CVE-2024-575xx/CVE-2024-57538.json
+++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57538.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T21:15:11.803",
"lastModified": "2025-01-21T21:15:11.803",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Linksys E8450 v1.2.00.360516 was discovered to contain a buffer overflow vulnerability. The parsed field (anonymous_protect_status) is copied to the stack without length verification."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Linksys E8450 v1.2.00.360516 contiene una vulnerabilidad de desbordamiento de b\u00fafer. El campo analizado (anonymous_protect_status) se copia a la pila sin verificaci\u00f3n de longitud."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57539.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57539.json
index 3c6566c6900..42de7cdbb7e 100644
--- a/CVE-2024/CVE-2024-575xx/CVE-2024-57539.json
+++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57539.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T21:15:11.920",
"lastModified": "2025-01-21T21:15:11.920",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via userEmail."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Linksys E8450 v1.2.00.360516 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s de userEmail."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57540.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57540.json
index 9d051d10e6a..903df385cfb 100644
--- a/CVE-2024/CVE-2024-575xx/CVE-2024-57540.json
+++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57540.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T21:15:12.040",
"lastModified": "2025-01-21T21:15:12.040",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Linksys E8450 v1.2.00.360516 was discovered to contain a buffer overflow vulnerability. The parsed field (action) is copied to the stack without length verification."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Linksys E8450 v1.2.00.360516 contiene una vulnerabilidad de desbordamiento de b\u00fafer. El campo analizado (acci\u00f3n) se copia a la pila sin verificaci\u00f3n de longitud."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57793.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57793.json
index 7ee2e49cf01..60d124a0eae 100644
--- a/CVE-2024/CVE-2024-577xx/CVE-2024-57793.json
+++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57793.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors En las m\u00e1quinas virtuales CoCo, es posible que el host no confiable haga que set_memory_decrypted() falle de modo que se devuelva un error y se comparta la memoria resultante. Los llamadores deben tener cuidado de manejar estos errores para evitar devolver memoria descifrada (compartida) al asignador de p\u00e1ginas, lo que podr\u00eda provocar problemas funcionales o de seguridad. Filtra la memoria descifrada cuando set_memory_decrypted() falla y no necesitas imprimir un error ya que set_memory_decrypted() llamar\u00e1 a WARN_ONCE()."
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors En las m\u00e1quinas virtuales CoCo, es posible que el host no confiable haga que set_memory_decrypted() falle de modo que se devuelva un error y se comparta la memoria resultante. Los llamadores deben tener cuidado de gestionar estos errores para evitar devolver memoria descifrada (compartida) al asignador de p\u00e1ginas, lo que podr\u00eda provocar problemas funcionales o de seguridad. Filtra la memoria descifrada cuando set_memory_decrypted() falla y no necesitas imprimir un error ya que set_memory_decrypted() llamar\u00e1 a WARN_ONCE()."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57844.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57844.json
index 916852913a0..be108404abd 100644
--- a/CVE-2024/CVE-2024-578xx/CVE-2024-57844.json
+++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57844.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe: Se corrige un error en el cierre de fd despu\u00e9s de desvincular Si el espacio de usuario mantiene abierto un fd, desvincula el dispositivo y luego lo cierra, el controlador no deber\u00eda intentar acceder al hardware. Prot\u00e9jalo usando drm_dev_enter()/drm_dev_exit(). Esto corrige el siguiente error de p\u00e1gina: <6> [IGT] xe_wedged: saliendo, ret=98 <1> ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: ffffc901bc5e508c <1> #PF: acceso de lectura del supervisor en modo kernel <1> #PF: error_code(0x0000) - not-present page ... <4> xe_lrc_update_timestamp+0x1c/0xd0 [xe] <4> xe_exec_queue_update_run_ticks+0x50/0xb0 [xe] <4> xe_exec_queue_fini+0x16/0xb0 [xe] <4> __guc_exec_queue_fini_async+0xc4/0x190 [xe] <4> guc_exec_queue_fini_async+0xa0/0xe0 [xe] <4> guc_exec_queue_fini+0x23/0x40 [xe] <4> xe_exec_queue_destroy+0xb3/0xf0 [xe] <4> xe_file_close+0xd4/0x1a0 [xe] <4> drm_file_free+0x210/0x280 [drm] <4> drm_close_helper.isra.0+0x6d/0x80 [drm] <4> drm_release_noglobal+0x20/0x90 [drm] (seleccionado de la confirmaci\u00f3n 4ca1fd418338d4d135428a0eb1e16e3b3ce17ee8)"
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe: Se corrige un error en el cierre de fd despu\u00e9s de desvincular Si el espacio de usuario mantiene abierto un fd, desvincula el dispositivo y luego lo cierra, el controlador no deber\u00eda intentar acceder al hardware. Prot\u00e9jalo usando drm_dev_enter()/drm_dev_exit(). Esto corrige el siguiente error de p\u00e1gina: <6> [IGT] xe_wedged: saliendo, ret=98 <1> ERROR: no se puede gestionar el error de p\u00e1gina para la direcci\u00f3n: ffffc901bc5e508c <1> #PF: acceso de lectura del supervisor en modo kernel <1> #PF: error_code(0x0000) - not-present page ... <4> xe_lrc_update_timestamp+0x1c/0xd0 [xe] <4> xe_exec_queue_update_run_ticks+0x50/0xb0 [xe] <4> xe_exec_queue_fini+0x16/0xb0 [xe] <4> __guc_exec_queue_fini_async+0xc4/0x190 [xe] <4> guc_exec_queue_fini_async+0xa0/0xe0 [xe] <4> guc_exec_queue_fini+0x23/0x40 [xe] <4> xe_exec_queue_destroy+0xb3/0xf0 [xe] <4> xe_file_close+0xd4/0x1a0 [xe] <4> drm_file_free+0x210/0x280 [drm] <4> drm_close_helper.isra.0+0x6d/0x80 [drm] <4> drm_release_noglobal+0x20/0x90 [drm] (seleccionado de el commit 4ca1fd418338d4d135428a0eb1e16e3b3ce17ee8)"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57849.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57849.json
index 71aacc159c7..a72ae791041 100644
--- a/CVE-2024/CVE-2024-578xx/CVE-2024-57849.json
+++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57849.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: s390/cpum_sf: Controlar la eliminaci\u00f3n de hotplug de la CPU durante el muestreo El manejo de la eliminaci\u00f3n de hotplug de la CPU activa la siguiente secuencia de llamada de funci\u00f3n: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() El controlador de hotplug de la CPU de muestreo s390 CPUMF invoca: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() Esta funci\u00f3n anula la asignaci\u00f3n de todos los b\u00faferes de datos de muestreo (SDB) asignados para esa CPU en la inicializaci\u00f3n del evento. Tambi\u00e9n borra el bit PMU_F_RESERVED. La CPU desaparece y no se puede muestrear. Mientras el evento sigue activo en la CPU eliminada, la compatibilidad con hot plug de eventos de CPU en el subsistema de rendimiento del n\u00facleo activa las siguientes llamadas de funci\u00f3n en la CPU eliminada: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_context() +--> event_sched_out() +--> cpumsf_pmu_del() +--> cpumsf_pmu_stop() +--> hw_perf_event_update() para detener y eliminar el evento. Durante la eliminaci\u00f3n del evento, el controlador del dispositivo de muestreo intenta leer las muestras restantes de los b\u00faferes de datos de muestra (SDB). Pero ya se han liberado (y es posible que se hayan reasignado). Esto puede provocar una situaci\u00f3n de use after free, en cuyo caso es muy probable que las muestras no sean v\u00e1lidas. En el mejor de los casos, la memoria no se ha reasignado y a\u00fan contiene datos v\u00e1lidos. Solucione esta situaci\u00f3n y compruebe si la CPU sigue en estado reservado (bit PMU_F_RESERVED activado). En este caso, los SDB no se han liberado y contienen datos v\u00e1lidos. Esto siempre ocurre cuando se elimina el evento (y no se ha producido ninguna desconexi\u00f3n en caliente de la CPU). Si el bit PMU_F_RESERVED no est\u00e1 activado, los b\u00faferes SDB desaparecen."
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: s390/cpum_sf: Controlar la eliminaci\u00f3n de hotplug de la CPU durante el muestreo la gesti\u00f3n de la eliminaci\u00f3n de hotplug de la CPU activa la siguiente secuencia de llamada de funci\u00f3n: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() El controlador de hotplug de la CPU de muestreo s390 CPUMF invoca: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() Esta funci\u00f3n anula la asignaci\u00f3n de todos los b\u00faferes de datos de muestreo (SDB) asignados para esa CPU en la inicializaci\u00f3n del evento. Tambi\u00e9n borra el bit PMU_F_RESERVED. La CPU desaparece y no se puede muestrear. Mientras el evento sigue activo en la CPU eliminada, la compatibilidad con hot plug de eventos de CPU en el subsistema de rendimiento del n\u00facleo activa las siguientes llamadas de funci\u00f3n en la CPU eliminada: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_context() +--> event_sched_out() +--> cpumsf_pmu_del() +--> cpumsf_pmu_stop() +--> hw_perf_event_update() para detener y eliminar el evento. Durante la eliminaci\u00f3n del evento, el controlador del dispositivo de muestreo intenta leer las muestras restantes de los b\u00faferes de datos de muestra (SDB). Pero ya se han liberado (y es posible que se hayan reasignado). Esto puede provocar una situaci\u00f3n de use after free, en cuyo caso es muy probable que las muestras no sean v\u00e1lidas. En el mejor de los casos, la memoria no se ha reasignado y a\u00fan contiene datos v\u00e1lidos. Solucione esta situaci\u00f3n y compruebe si la CPU sigue en estado reservado (bit PMU_F_RESERVED activado). En este caso, los SDB no se han liberado y contienen datos v\u00e1lidos. Esto siempre ocurre cuando se elimina el evento (y no se ha producido ninguna desconexi\u00f3n en caliente de la CPU). Si el bit PMU_F_RESERVED no est\u00e1 activado, los b\u00faferes SDB desaparecen."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57874.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57874.json
index 6d854a265ff..4f1d75c1242 100644
--- a/CVE-2024/CVE-2024-578xx/CVE-2024-57874.json
+++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57874.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: ptrace: arreglo de SETREGSET parcial para NT_ARM_TAGGED_ADDR_CTRL Actualmente, tagged_addr_ctrl_set() no inicializa la variable temporal 'ctrl', y una llamada a SETREGSET con una longitud de cero la dejar\u00e1 sin inicializar. En consecuencia, tagged_addr_ctrl_set() consumir\u00e1 un valor arbitrario, lo que potencialmente filtrar\u00e1 hasta 64 bits de memoria de la pila del kernel. La lectura est\u00e1 limitada a una ranura espec\u00edfica en la pila, y el problema no proporciona un mecanismo de escritura. Como set_tagged_addr_ctrl() solo acepta valores donde los bits [63:4] sean cero y rechaza otros valores, un intento de SETREGSET parcial tendr\u00e1 \u00e9xito o fallar\u00e1 aleatoriamente dependiendo del valor del valor no inicializado, y la exposici\u00f3n es significativamente limitada. Solucione esto inicializando el valor temporal antes de copiar el conjunto de registros desde el espacio de usuario, como para otros conjuntos de registros (por ejemplo, NT_PRSTATUS, NT_PRFPREG, NT_ARM_SYSTEM_CALL). En el caso de una escritura de longitud cero, se conservar\u00e1 el valor existente de la direcci\u00f3n etiquetada ctrl. El conjunto de registros NT_ARM_TAGGED_ADDR_CTRL solo es visible en la vista user_aarch64_view utilizada por una tarea nativa de AArch64 para manipular otra tarea nativa de AArch64. Como get_tagged_addr_ctrl() solo devuelve un valor de error cuando se llama para una tarea de compatibilidad, tagged_addr_ctrl_get() y tagged_addr_ctrl_set() nunca deben observar un valor de error de get_tagged_addr_ctrl(). Agregue un WARN_ON_ONCE() a ambos para indicar que dicho error ser\u00eda inesperado y que el manejo de errores no falta en ninguno de los casos."
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: ptrace: arreglo de SETREGSET parcial para NT_ARM_TAGGED_ADDR_CTRL Actualmente, tagged_addr_ctrl_set() no inicializa la variable temporal 'ctrl', y una llamada a SETREGSET con una longitud de cero la dejar\u00e1 sin inicializar. En consecuencia, tagged_addr_ctrl_set() consumir\u00e1 un valor arbitrario, lo que potencialmente filtrar\u00e1 hasta 64 bits de memoria de la pila del kernel. La lectura est\u00e1 limitada a una ranura espec\u00edfica en la pila, y el problema no proporciona un mecanismo de escritura. Como set_tagged_addr_ctrl() solo acepta valores donde los bits [63:4] sean cero y rechaza otros valores, un intento de SETREGSET parcial tendr\u00e1 \u00e9xito o fallar\u00e1 aleatoriamente dependiendo del valor del valor no inicializado, y la exposici\u00f3n es significativamente limitada. Solucione esto inicializando el valor temporal antes de copiar el conjunto de registros desde el espacio de usuario, como para otros conjuntos de registros (por ejemplo, NT_PRSTATUS, NT_PRFPREG, NT_ARM_SYSTEM_CALL). En el caso de una escritura de longitud cero, se conservar\u00e1 el valor existente de la direcci\u00f3n etiquetada ctrl. El conjunto de registros NT_ARM_TAGGED_ADDR_CTRL solo es visible en la vista user_aarch64_view utilizada por una tarea nativa de AArch64 para manipular otra tarea nativa de AArch64. Como get_tagged_addr_ctrl() solo devuelve un valor de error cuando se llama para una tarea de compatibilidad, tagged_addr_ctrl_get() y tagged_addr_ctrl_set() nunca deben observar un valor de error de get_tagged_addr_ctrl(). Agregue un WARN_ON_ONCE() a ambos para indicar que dicho error ser\u00eda inesperado y que la gesti\u00f3n de errores no falta en ninguno de los casos."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57893.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57893.json
index 29bbc299348..4a3907c15ec 100644
--- a/CVE-2024/CVE-2024-578xx/CVE-2024-57893.json
+++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57893.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: seq: oss: Se corrigen las ejecuciones al procesar mensajes SysEx El secuenciador OSS maneja los mensajes SysEx divididos en paquetes de 6 bytes y la capa OSS del secuenciador ALSA intenta combinarlos. Almacena los datos en el b\u00fafer interno y este acceso es acelerado a partir de ahora, lo que puede llevar al acceso fuera de los l\u00edmites. Como soluci\u00f3n temporal, introduzca un mutex para serializar el proceso de los paquetes de mensajes SysEx."
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: seq: oss: Se corrigen las ejecuciones al procesar mensajes SysEx El secuenciador OSS gestiona los mensajes SysEx divididos en paquetes de 6 bytes y la capa OSS del secuenciador ALSA intenta combinarlos. Almacena los datos en el b\u00fafer interno y este acceso es acelerado a partir de ahora, lo que puede llevar al acceso fuera de los l\u00edmites. Como soluci\u00f3n temporal, introduzca un mutex para serializar el proceso de los paquetes de mensajes SysEx."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57905.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57905.json
index 3d5da36b1ac..029835e5518 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57905.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57905.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:24.710",
"lastModified": "2025-01-19T12:15:24.710",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: ti-ads1119: fix information leak in triggered buffer\n\nThe 'scan' local struct is used to push data to user space from a\ntriggered buffer, but it has a hole between the sample (unsigned int)\nand the timestamp. This hole is never initialized.\n\nInitialize the struct to zero before using it to avoid pushing\nuninitialized information to userspace."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: adc: ti-ads1119: se corrige la fuga de informaci\u00f3n en el b\u00fafer activado La estructura local 'scan' se usa para enviar datos al espacio de usuario desde un b\u00fafer activado, pero tiene un agujero entre la muestra (unsigned int) y la marca de tiempo. Este agujero nunca se inicializa. Inicialice la estructura a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio de usuario."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57909.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57909.json
index efdf2ef28e9..8379af50902 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57909.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57909.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:25.083",
"lastModified": "2025-01-19T12:15:25.083",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: light: bh1745: fix information leak in triggered buffer\n\nThe 'scan' local struct is used to push data to user space from a\ntriggered buffer, but it does not set values for inactive channels, as\nit only uses iio_for_each_active_channel() to assign new values.\n\nInitialize the struct to zero before using it to avoid pushing\nuninitialized information to userspace."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: light: bh1745: se corrige la fuga de informaci\u00f3n en el b\u00fafer activado La estructura local 'scan' se utiliza para enviar datos al espacio del usuario desde un b\u00fafer activado, pero no establece valores para canales inactivos, ya que solo utiliza iio_for_each_active_channel() para asignar nuevos valores. Inicialice la estructura a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio del usuario."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57914.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57914.json
index 3244febcd1b..6434e86191d 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57914.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57914.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:25.573",
"lastModified": "2025-01-19T12:15:25.573",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: tcpci: fix NULL pointer issue on shared irq case\n\nThe tcpci_irq() may meet below NULL pointer dereference issue:\n\n[ 2.641851] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010\n[ 2.641951] status 0x1, 0x37f\n[ 2.650659] Mem abort info:\n[ 2.656490] ESR = 0x0000000096000004\n[ 2.660230] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 2.665532] SET = 0, FnV = 0\n[ 2.668579] EA = 0, S1PTW = 0\n[ 2.671715] FSC = 0x04: level 0 translation fault\n[ 2.676584] Data abort info:\n[ 2.679459] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n[ 2.684936] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[ 2.689980] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[ 2.695284] [0000000000000010] user address but active_mm is swapper\n[ 2.701632] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP\n[ 2.707883] Modules linked in:\n[ 2.710936] CPU: 1 UID: 0 PID: 87 Comm: irq/111-2-0051 Not tainted 6.12.0-rc6-06316-g7f63786ad3d1-dirty #4\n[ 2.720570] Hardware name: NXP i.MX93 11X11 EVK board (DT)\n[ 2.726040] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 2.732989] pc : tcpci_irq+0x38/0x318\n[ 2.736647] lr : _tcpci_irq+0x14/0x20\n[ 2.740295] sp : ffff80008324bd30\n[ 2.743597] x29: ffff80008324bd70 x28: ffff800080107894 x27: ffff800082198f70\n[ 2.750721] x26: ffff0000050e6680 x25: ffff000004d172ac x24: ffff0000050f0000\n[ 2.757845] x23: ffff000004d17200 x22: 0000000000000001 x21: ffff0000050f0000\n[ 2.764969] x20: ffff000004d17200 x19: 0000000000000000 x18: 0000000000000001\n[ 2.772093] x17: 0000000000000000 x16: ffff80008183d8a0 x15: ffff00007fbab040\n[ 2.779217] x14: ffff00007fb918c0 x13: 0000000000000000 x12: 000000000000017a\n[ 2.786341] x11: 0000000000000001 x10: 0000000000000a90 x9 : ffff80008324bd00\n[ 2.793465] x8 : ffff0000050f0af0 x7 : ffff00007fbaa840 x6 : 0000000000000031\n[ 2.800589] x5 : 000000000000017a x4 : 0000000000000002 x3 : 0000000000000002\n[ 2.807713] x2 : ffff80008324bd3a x1 : 0000000000000010 x0 : 0000000000000000\n[ 2.814838] Call trace:\n[ 2.817273] tcpci_irq+0x38/0x318\n[ 2.820583] _tcpci_irq+0x14/0x20\n[ 2.823885] irq_thread_fn+0x2c/0xa8\n[ 2.827456] irq_thread+0x16c/0x2f4\n[ 2.830940] kthread+0x110/0x114\n[ 2.834164] ret_from_fork+0x10/0x20\n[ 2.837738] Code: f9426420 f9001fe0 d2800000 52800201 (f9400a60)\n\nThis may happen on shared irq case. Such as two Type-C ports share one\nirq. After the first port finished tcpci_register_port(), it may trigger\ninterrupt. However, if the interrupt comes by chance the 2nd port finishes\ndevm_request_threaded_irq(), the 2nd port interrupt handler will run at\nfirst. Then the above issue happens due to tcpci is still a NULL pointer\nin tcpci_irq() when dereference to regmap.\n\n devm_request_threaded_irq()\n\t\t\t\t<-- port1 irq comes\n disable_irq(client->irq);\n tcpci_register_port()\n\nThis will restore the logic to the state before commit (77e85107a771 \"usb:\ntypec: tcpci: support edge irq\").\n\nHowever, moving tcpci_register_port() earlier creates a problem when use\nedge irq because tcpci_init() will be called before\ndevm_request_threaded_irq(). The tcpci_init() writes the ALERT_MASK to\nthe hardware to tell it to start generating interrupts but we're not ready\nto deal with them yet, then the ALERT events may be missed and ALERT line\nwill not recover to high level forever. To avoid the issue, this will also\nset ALERT_MASK register after devm_request_threaded_irq() return."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: typec: tcpci: soluciona el problema del puntero NULL en el caso de irq compartida. La funci\u00f3n tcpci_irq() puede encontrarse con el siguiente problema de desreferencia de puntero NULL: [2.641851] No se puede gestionar la desreferencia de puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000010 [2.641951] estado 0x1, 0x37f [2.650659] Informaci\u00f3n de aborto de memoria: [2.656490] ESR = 0x0000000096000004 [2.660230] EC = 0x25: DABT (EL actual), IL = 32 bits [2.665532] SET = 0, FnV = 0 [2.668579] EA = 0, S1PTW = 0 [ 2.671715] FSC = 0x04: error de traducci\u00f3n de nivel 0 [ 2.676584] Informaci\u00f3n de cancelaci\u00f3n de datos: [ 2.679459] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 2.684936] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 2.689980] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 2.695284] [0000000000000010] direcci\u00f3n de usuario pero active_mm es intercambiador [ 2.701632] Error interno: Oops: 0000000096000004 [#1] PREEMPT SMP [ 2.707883] M\u00f3dulos vinculados en: [ 2.710936] CPU: 1 UID: 0 PID: 87 Comm: irq/111-2-0051 No contaminado 6.12.0-rc6-06316-g7f63786ad3d1-dirty #4 [ 2.720570] Nombre del hardware: Placa NXP i.MX93 11X11 EVK (DT) [ 2.726040] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 2.732989] pc : tcpci_irq+0x38/0x318 [ 2.736647] lr : _tcpci_irq+0x14/0x20 [ 2.740295] sp : ffff80008324bd30 [ 2.743597] x29: ffff80008324bd70 x28: ffff800080107894 x27: ffff800082198f70 [ 2.750721] x26: ffff0000050e6680 x25: ffff000004d172ac x24: ffff0000050f0000 [ 2.757845] x23: ffff000004d17200 x22: 0000000000000001 x21: ffff0000050f0000 [ 2.764969] x20: ffff000004d17200 x19: 0000000000000000 x18: 0000000000000001 [ 2.772093] x17: 0000000000000000 x16: ffff80008183d8a0 x15: ffff00007fbab040 [ 2.779217] x14: ffff00007fb918c0 x13: 0000000000000000 x12: 000000000000017a [ 2.786341] x11: 0000000000000001 x10: 0000000000000a90 x9 : ffff80008324bd00 [ 2.793465] x8 : ffff0000050f0af0 x7 : ffff00007fbaa840 x6 : 0000000000000031 [ 2.800589] x5 : 000000000000017a x4 : 0000000000000002 x3 : 0000000000000002 [ 2.807713] x2 : ffff80008324bd3a x1 : 00000000000000010 x0 : 0000000000000000 [ 2.814838] Rastreo de llamadas: [ 2.817273] tcpci_irq+0x38/0x318 [ 2.820583] _tcpci_irq+0x14/0x20 [ 2.823885] irq_thread_fn+0x2c/0xa8 [ 2.827456] irq_thread+0x16c/0x2f4 [ 2.830940] kthread+0x110/0x114 [ 2.834164] ret_from_fork+0x10/0x20 [ 2.837738] C\u00f3digo: f9426420 f9001fe0 d2800000 52800201 (f9400a60) Esto puede suceder en el caso de irq compartido. Por ejemplo, dos puertos Tipo-C comparten un irq. Despu\u00e9s de que el primer puerto termin\u00f3 tcpci_register_port(), puede activar la interrupci\u00f3n. Sin embargo, si la interrupci\u00f3n llega por casualidad, el segundo puerto termina devm_request_threaded_irq(), el controlador de interrupci\u00f3n del segundo puerto se ejecutar\u00e1 primero. Entonces, el problema anterior ocurre debido a que tcpci sigue siendo un puntero NULL en tcpci_irq() cuando se desreferencia a regmap. devm_request_threaded_irq() <-- port1 irq viene deshabilitar_irq(client->irq); tcpci_register_port() Esto restaurar\u00e1 la l\u00f3gica al estado anterior a el commit (77e85107a771 \"usb: typec: tcpci: support edge irq\"). Sin embargo, mover tcpci_register_port() antes crea un problema cuando se usa el irq de borde porque tcpci_init() se llamar\u00e1 antes que devm_request_threaded_irq(). tcpci_init() escribe ALERT_MASK en el hardware para indicarle que comience a generar interrupciones, pero a\u00fan no estamos listos para lidiar con ellas, entonces los eventos ALERT pueden perderse y la l\u00ednea ALERT no se recuperar\u00e1 al nivel alto para siempre. Para evitar el problema, esto tambi\u00e9n establecer\u00e1 el registro ALERT_MASK despu\u00e9s del retorno de devm_request_threaded_irq()."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57916.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57916.json
index 526399da1db..c2161f1e516 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57916.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57916.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:25.763",
"lastModified": "2025-01-19T12:15:25.763",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling\n\nResolve kernel panic caused by improper handling of IRQs while\naccessing GPIO values. This is done by replacing generic_handle_irq with\nhandle_nested_irq."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: microchip: pci1xxxx: Resuelve el p\u00e1nico del kernel durante la gesti\u00f3n de IRQ GPIO Resuelve el p\u00e1nico del kernel causado por la gesti\u00f3n incorrecta de IRQ mientras se accede a valores GPIO. Esto se hace reemplazando generic_handle_irq con handle_nested_irq."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57918.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57918.json
index b86c553566d..9122fb0b598 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57918.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57918.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:25.960",
"lastModified": "2025-01-19T12:15:25.960",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: fix page fault due to max surface definition mismatch\n\nDC driver is using two different values to define the maximum number of\nsurfaces: MAX_SURFACES and MAX_SURFACE_NUM. Consolidate MAX_SURFACES as\nthe unique definition for surface updates across DC.\n\nIt fixes page fault faced by Cosmic users on AMD display versions that\nsupport two overlay planes, since the introduction of cursor overlay\nmode.\n\n[Nov26 21:33] BUG: unable to handle page fault for address: 0000000051d0f08b\n[ +0.000015] #PF: supervisor read access in kernel mode\n[ +0.000006] #PF: error_code(0x0000) - not-present page\n[ +0.000005] PGD 0 P4D 0\n[ +0.000007] Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI\n[ +0.000006] CPU: 4 PID: 71 Comm: kworker/u32:6 Not tainted 6.10.0+ #300\n[ +0.000006] Hardware name: Valve Jupiter/Jupiter, BIOS F7A0131 01/30/2024\n[ +0.000007] Workqueue: events_unbound commit_work [drm_kms_helper]\n[ +0.000040] RIP: 0010:copy_stream_update_to_stream.isra.0+0x30d/0x750 [amdgpu]\n[ +0.000847] Code: 8b 10 49 89 94 24 f8 00 00 00 48 8b 50 08 49 89 94 24 00 01 00 00 8b 40 10 41 89 84 24 08 01 00 00 49 8b 45 78 48 85 c0 74 0b <0f> b6 00 41 88 84 24 90 64 00 00 49 8b 45 60 48 85 c0 74 3b 48 8b\n[ +0.000010] RSP: 0018:ffffc203802f79a0 EFLAGS: 00010206\n[ +0.000009] RAX: 0000000051d0f08b RBX: 0000000000000004 RCX: ffff9f964f0a8070\n[ +0.000004] RDX: ffff9f9710f90e40 RSI: ffff9f96600c8000 RDI: ffff9f964f000000\n[ +0.000004] RBP: ffffc203802f79f8 R08: 0000000000000000 R09: 0000000000000000\n[ +0.000005] R10: 0000000000000000 R11: 0000000000000000 R12: ffff9f96600c8000\n[ +0.000004] R13: ffff9f9710f90e40 R14: ffff9f964f000000 R15: ffff9f96600c8000\n[ +0.000004] FS: 0000000000000000(0000) GS:ffff9f9970000000(0000) knlGS:0000000000000000\n[ +0.000005] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ +0.000005] CR2: 0000000051d0f08b CR3: 00000002e6a20000 CR4: 0000000000350ef0\n[ +0.000005] Call Trace:\n[ +0.000011] \n[ +0.000010] ? __die_body.cold+0x19/0x27\n[ +0.000012] ? page_fault_oops+0x15a/0x2d0\n[ +0.000014] ? exc_page_fault+0x7e/0x180\n[ +0.000009] ? asm_exc_page_fault+0x26/0x30\n[ +0.000013] ? copy_stream_update_to_stream.isra.0+0x30d/0x750 [amdgpu]\n[ +0.000739] ? dc_commit_state_no_check+0xd6c/0xe70 [amdgpu]\n[ +0.000470] update_planes_and_stream_state+0x49b/0x4f0 [amdgpu]\n[ +0.000450] ? srso_return_thunk+0x5/0x5f\n[ +0.000009] ? commit_minimal_transition_state+0x239/0x3d0 [amdgpu]\n[ +0.000446] update_planes_and_stream_v2+0x24a/0x590 [amdgpu]\n[ +0.000464] ? srso_return_thunk+0x5/0x5f\n[ +0.000009] ? sort+0x31/0x50\n[ +0.000007] ? amdgpu_dm_atomic_commit_tail+0x159f/0x3a30 [amdgpu]\n[ +0.000508] ? srso_return_thunk+0x5/0x5f\n[ +0.000009] ? amdgpu_crtc_get_scanout_position+0x28/0x40 [amdgpu]\n[ +0.000377] ? srso_return_thunk+0x5/0x5f\n[ +0.000009] ? drm_crtc_vblank_helper_get_vblank_timestamp_internal+0x160/0x390 [drm]\n[ +0.000058] ? srso_return_thunk+0x5/0x5f\n[ +0.000005] ? dma_fence_default_wait+0x8c/0x260\n[ +0.000010] ? srso_return_thunk+0x5/0x5f\n[ +0.000005] ? wait_for_completion_timeout+0x13b/0x170\n[ +0.000006] ? srso_return_thunk+0x5/0x5f\n[ +0.000005] ? dma_fence_wait_timeout+0x108/0x140\n[ +0.000010] ? commit_tail+0x94/0x130 [drm_kms_helper]\n[ +0.000024] ? process_one_work+0x177/0x330\n[ +0.000008] ? worker_thread+0x266/0x3a0\n[ +0.000006] ? __pfx_worker_thread+0x10/0x10\n[ +0.000004] ? kthread+0xd2/0x100\n[ +0.000006] ? __pfx_kthread+0x10/0x10\n[ +0.000006] ? ret_from_fork+0x34/0x50\n[ +0.000004] ? __pfx_kthread+0x10/0x10\n[ +0.000005] ? ret_from_fork_asm+0x1a/0x30\n[ +0.000011] \n\n(cherry picked from commit 1c86c81a86c60f9b15d3e3f43af0363cf56063e7)"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: se corrige el error de p\u00e1gina debido a la falta de coincidencia de la definici\u00f3n de superficie m\u00e1xima. El controlador DC est\u00e1 usando dos valores diferentes para definir la cantidad m\u00e1xima de superficies: MAX_SURFACES y MAX_SURFACE_NUM. Se consolida MAX_SURFACES como la definici\u00f3n \u00fanica para las actualizaciones de superficie en DC. Corrige el error de p\u00e1gina que enfrentan los usuarios de Cosmic en las versiones de pantalla AMD que admiten dos planos de superposici\u00f3n, desde la introducci\u00f3n del modo de superposici\u00f3n del cursor. [26 nov 21:33] ERROR: no se puede gestionar el error de p\u00e1gina para la direcci\u00f3n: 0000000051d0f08b [ +0.000015] #PF: acceso de lectura del supervisor en modo kernel [ +0.000006] #PF: error_code(0x0000) - p\u00e1gina no presente [ +0.000005] PGD 0 P4D 0 [ +0.000007] Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI [ +0.000006] CPU: 4 PID: 71 Comm: kworker/u32:6 No contaminado 6.10.0+ #300 [ +0.000006] Nombre del hardware: Valve Jupiter/Jupiter, BIOS F7A0131 30/01/2024 [ +0.000007] Cola de trabajo: eventos_sin_enlace_confirmaci\u00f3n_trabajo [drm_kms_helper] [ +0.000040] RIP: 0010:copiar_actualizaci\u00f3n_de_flujo_a_flujo.isra.0+0x30d/0x750 [amdgpu] [ +0.000847] C\u00f3digo: 8b 10 49 89 94 24 f8 00 00 00 48 8b 50 08 49 89 94 24 00 01 00 00 8b 40 10 41 89 84 24 08 01 00 00 49 8b 45 78 48 85 c0 74 0b <0f> b6 00 41 88 84 24 90 64 00 00 49 8b 45 60 48 85 c0 74 3b 48 8b [ +0.000010] RSP: 0018:ffffc203802f79a0 EFLAGS: 00010206 [ +0.000009] RAX: 0000000051d0f08b RBX: 0000000000000004 RCX: ffff9f964f0a8070 [ +0.000004] RDX: ffff9f9710f90e40 RSI: ffff9f96600c8000 RDI: ffff9f964f000000 [ +0.000004] RBP: ffffc203802f79f8 R08: 0000000000000000 R09: 0000000000000000 [ +0.000005] R10: 0000000000000000 R11: 0000000000000000 R12: ffff9f96600c8000 [ +0.000004] R13: ffff9f9710f90e40 R14: ffff9f964f000000 R15: ffff9f96600c8000 [ +0.000004] FS: 000000000000000(0000) GS:ffff9f9970000000(0000) knlGS:0000000000000000 [ +0.000005] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ +0.000005] CR2: 0000000051d0f08b CR3: 00000002e6a20000 CR4: 0000000000350ef0 [ +0.000005] Rastreo de llamadas: [ +0.000011] [ +0.000010] ? __die_body.cold+0x19/0x27 [ +0.000012] ? exc_page_fault_oops+0x15a/0x2d0 [ +0.000014] ? exc_page_fault+0x7e/0x180 [ +0.000009] ? asm_exc_page_fault+0x26/0x30 [ +0.000013] ? copia_actualizaci\u00f3n_de_flujo_a_flujo.isra.0+0x30d/0x750 [amdgpu] [ +0.000739] ? estado_de_confirmaci\u00f3n_dc_sin_verificaci\u00f3n+0xd6c/0xe70 [amdgpu] [ +0.000470] actualizaci\u00f3n_de_planos_y_estado_de_flujo+0x49b/0x4f0 [amdgpu] [ +0.000450] ? srso_return_thunk+0x5/0x5f [ +0.000009] ? estado_transici\u00f3n_m\u00ednimo_confirmaci\u00f3n+0x239/0x3d0 [amdgpu] [ +0.000446] planos_actualizaci\u00f3n_y_flujo_v2+0x24a/0x590 [amdgpu] [ +0.000464] ? srso_return_thunk+0x5/0x5f [ +0.000009] ? sort+0x31/0x50 [ +0.000007] ? amdgpu_dm_atomic_commit_tail+0x159f/0x3a30 [amdgpu] [ +0.000508] ? srso_return_thunk+0x5/0x5f [ +0.000009] ? amdgpu_crtc_get_scanout_position+0x28/0x40 [amdgpu] [ +0.000377] ? srso_return_thunk+0x5/0x5f [ +0.000009] ? drm_crtc_vblank_helper_get_vblank_timestamp_internal+0x160/0x390 [drm] [ +0.000058] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? dma_fence_default_wait+0x8c/0x260 [ +0.000010] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? tiempo_espera_finalizaci\u00f3n+0x13b/0x170 [ +0.000006] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? tiempo_espera_finalizaci\u00f3n+0x108/0x140 [ +0.000010] ? cola_commit+0x94/0x130 [drm_kms_helper] [ +0.000024] ? proceso_una_obra+0x177/0x330 [ +0.000008] ? subproceso_trabajador+0x266/0x3a0 [ +0.000006] ? __pfx_worker_thread+0x10/0x10 [ +0.000004] ? kthread+0xd2/0x100 [ +0.000006] ? __pfx_kthread+0x10/0x10 [ +0.000006] ? ret_from_fork+0x34/0x50 [ +0.000004] ? __pfx_kthread+0x10/0x10 [ +0.000005] ? ret_from_fork_asm+0x1a/0x30 [ +0.000011] (seleccionado de el commit 1c86c81a86c60f9b15d3e3f43af0363cf56063e7)"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57919.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57919.json
index 683de3e3cd2..e476cfe1cf5 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57919.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57919.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:26.053",
"lastModified": "2025-01-19T12:15:26.053",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: fix divide error in DM plane scale calcs\n\ndm_get_plane_scale doesn't take into account plane scaled size equal to\nzero, leading to a kernel oops due to division by zero. Fix by setting\nout-scale size as zero when the dst size is zero, similar to what is\ndone by drm_calc_scale(). This issue started with the introduction of\ncursor ovelay mode that uses this function to assess cursor mode changes\nvia dm_crtc_get_cursor_mode() before checking plane state.\n\n[Dec17 17:14] Oops: divide error: 0000 [#1] PREEMPT SMP NOPTI\n[ +0.000018] CPU: 5 PID: 1660 Comm: surface-DP-1 Not tainted 6.10.0+ #231\n[ +0.000007] Hardware name: Valve Jupiter/Jupiter, BIOS F7A0131 01/30/2024\n[ +0.000004] RIP: 0010:dm_get_plane_scale+0x3f/0x60 [amdgpu]\n[ +0.000553] Code: 44 0f b7 41 3a 44 0f b7 49 3e 83 e0 0f 48 0f a3 c2 73 21 69 41 28 e8 03 00 00 31 d2 41 f7 f1 31 d2 89 06 69 41 2c e8 03 00 00 <41> f7 f0 89 07 e9 d7 d8 7e e9 44 89 c8 45 89 c1 41 89 c0 eb d4 66\n[ +0.000005] RSP: 0018:ffffa8df0de6b8a0 EFLAGS: 00010246\n[ +0.000006] RAX: 00000000000003e8 RBX: ffff9ac65c1f6e00 RCX: ffff9ac65d055500\n[ +0.000003] RDX: 0000000000000000 RSI: ffffa8df0de6b8b0 RDI: ffffa8df0de6b8b4\n[ +0.000004] RBP: ffff9ac64e7a5800 R08: 0000000000000000 R09: 0000000000000a00\n[ +0.000003] R10: 00000000000000ff R11: 0000000000000054 R12: ffff9ac6d0700010\n[ +0.000003] R13: ffff9ac65d054f00 R14: ffff9ac65d055500 R15: ffff9ac64e7a60a0\n[ +0.000004] FS: 00007f869ea00640(0000) GS:ffff9ac970080000(0000) knlGS:0000000000000000\n[ +0.000004] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ +0.000003] CR2: 000055ca701becd0 CR3: 000000010e7f2000 CR4: 0000000000350ef0\n[ +0.000004] Call Trace:\n[ +0.000007] \n[ +0.000006] ? __die_body.cold+0x19/0x27\n[ +0.000009] ? die+0x2e/0x50\n[ +0.000007] ? do_trap+0xca/0x110\n[ +0.000007] ? do_error_trap+0x6a/0x90\n[ +0.000006] ? dm_get_plane_scale+0x3f/0x60 [amdgpu]\n[ +0.000504] ? exc_divide_error+0x38/0x50\n[ +0.000005] ? dm_get_plane_scale+0x3f/0x60 [amdgpu]\n[ +0.000488] ? asm_exc_divide_error+0x1a/0x20\n[ +0.000011] ? dm_get_plane_scale+0x3f/0x60 [amdgpu]\n[ +0.000593] dm_crtc_get_cursor_mode+0x33f/0x430 [amdgpu]\n[ +0.000562] amdgpu_dm_atomic_check+0x2ef/0x1770 [amdgpu]\n[ +0.000501] drm_atomic_check_only+0x5e1/0xa30 [drm]\n[ +0.000047] drm_mode_atomic_ioctl+0x832/0xcb0 [drm]\n[ +0.000050] ? __pfx_drm_mode_atomic_ioctl+0x10/0x10 [drm]\n[ +0.000047] drm_ioctl_kernel+0xb3/0x100 [drm]\n[ +0.000062] drm_ioctl+0x27a/0x4f0 [drm]\n[ +0.000049] ? __pfx_drm_mode_atomic_ioctl+0x10/0x10 [drm]\n[ +0.000055] amdgpu_drm_ioctl+0x4e/0x90 [amdgpu]\n[ +0.000360] __x64_sys_ioctl+0x97/0xd0\n[ +0.000010] do_syscall_64+0x82/0x190\n[ +0.000008] ? __pfx_drm_mode_createblob_ioctl+0x10/0x10 [drm]\n[ +0.000044] ? srso_return_thunk+0x5/0x5f\n[ +0.000006] ? drm_ioctl_kernel+0xb3/0x100 [drm]\n[ +0.000040] ? srso_return_thunk+0x5/0x5f\n[ +0.000005] ? __check_object_size+0x50/0x220\n[ +0.000007] ? srso_return_thunk+0x5/0x5f\n[ +0.000005] ? srso_return_thunk+0x5/0x5f\n[ +0.000005] ? drm_ioctl+0x2a4/0x4f0 [drm]\n[ +0.000039] ? __pfx_drm_mode_createblob_ioctl+0x10/0x10 [drm]\n[ +0.000043] ? srso_return_thunk+0x5/0x5f\n[ +0.000005] ? srso_return_thunk+0x5/0x5f\n[ +0.000005] ? __pm_runtime_suspend+0x69/0xc0\n[ +0.000006] ? srso_return_thunk+0x5/0x5f\n[ +0.000005] ? amdgpu_drm_ioctl+0x71/0x90 [amdgpu]\n[ +0.000366] ? srso_return_thunk+0x5/0x5f\n[ +0.000006] ? syscall_exit_to_user_mode+0x77/0x210\n[ +0.000007] ? srso_return_thunk+0x5/0x5f\n[ +0.000005] ? do_syscall_64+0x8e/0x190\n[ +0.000006] ? srso_return_thunk+0x5/0x5f\n[ +0.000006] ? do_syscall_64+0x8e/0x190\n[ +0.000006] ? srso_return_thunk+0x5/0x5f\n[ +0.000007] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ +0.000008] RIP: 0033:0x55bb7cd962bc\n[ +0.000007] Code: 4c 89 6c 24 18 4c 89 64 24 20 4c 89 74 24 28 0f 57 c0 0f 11 44 24 30 89 c7 48 8d 54 24 08 b8 10 00 00 00 be bc 64\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: se corrige el error de divisi\u00f3n en los c\u00e1lculos de escala del plano DM dm_get_plane_scale no tiene en cuenta el tama\u00f1o de escala del plano igual a cero, lo que genera un error en el kernel debido a la divisi\u00f3n por cero. Se soluciona estableciendo el tama\u00f1o de escala exterior como cero cuando el tama\u00f1o de dst es cero, de forma similar a lo que hace drm_calc_scale(). Este problema comenz\u00f3 con la introducci\u00f3n del modo de superposici\u00f3n del cursor que utiliza esta funci\u00f3n para evaluar los cambios del modo del cursor a trav\u00e9s de dm_crtc_get_cursor_mode() antes de verificar el estado del plano. [Dec17 17:14] Ups: error de divisi\u00f3n: 0000 [#1] PREEMPT SMP NOPTI [ +0.000018] CPU: 5 PID: 1660 Comm: surface-DP-1 No contaminado 6.10.0+ #231 [ +0.000007] Nombre del hardware: Valve Jupiter/Jupiter, BIOS F7A0131 30/01/2024 [ +0.000004] RIP: 0010:dm_get_plane_scale+0x3f/0x60 [amdgpu] [ +0.000553] C\u00f3digo: 44 0f b7 41 3a 44 0f b7 49 3e 83 e0 0f 48 0f a3 c2 73 21 69 41 28 e8 03 00 00 31 d2 41 f7 f1 31 d2 89 06 69 41 2c e8 03 00 00 <41> f7 f0 89 07 e9 d7 d8 7e e9 44 89 c8 45 89 c1 41 89 c0 eb d4 66 [ +0.000005] RSP: 0018:ffffa8df0de6b8a0 EFLAGS: 00010246 [ +0.000006] RAX: 00000000000003e8 RBX: ffff9ac65c1f6e00 RCX: ffff9ac65d055500 [ +0,000003] RDX: 0000000000000000 RSI: ffffa8df0de6b8b0 RDI: ffffa8df0de6b8b4 [ +0.000004] RBP: ffff9ac64e7a5800 R08: 000000000000000 R09: 0000000000000a00 [ +0.000003] R10: 0000000000000ff R11: 0000000000000054 R12: ffff9ac6d0700010 [ +0.000003] R13: ffff9ac65d054f00 R14: ffff9ac65d055500 R15: ffff9ac64e7a60a0 [ +0.000004] FS: 00007f869ea00640(0000) GS:ffff9ac970080000(0000) knlGS:0000000000000000 [ +0.000004] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ +0.000003] CR2: 000055ca701becd0 CR3: 000000010e7f2000 CR4: 0000000000350ef0 [ +0.000004] Rastreo de llamadas: [ +0.000007] [ +0.000006] ? __die_body.cold+0x19/0x27 [ +0.000009] ? die+0x2e/0x50 [ +0.000007] ? do_trap+0xca/0x110 [ +0.000007] ? do_error_trap+0x6a/0x90 [ +0.000006] ? dm_get_plane_scale+0x3f/0x60 [amdgpu] [ +0.000504] ? exc_divide_error+0x38/0x50 [ +0.000005] ? dm_get_plane_scale+0x3f/0x60 [amdgpu] [ +0.000488] ? [+0.000050] \u00bf __pfx_drm_mode_atomic_ioctl+0x10/0x10 [drm] [ +0.000047] drm_ioctl_kernel+0xb3/0x100 [drm] [ +0.000062] drm_ioctl+0x27a/0x4f0 [drm] [ +0.000049] ? __pfx_drm_mode_atomic_ioctl+0x10/0x10 [drm] [ +0.000055] amdgpu_drm_ioctl+0x4e/0x90 [amdgpu] [ +0.000360] __x64_sys_ioctl+0x97/0xd0 [ +0.000010] do_syscall_64+0x82/0x190 [ +0.000008] ? __pfx_drm_mode_createblob_ioctl+0x10/0x10 [drm] [ +0.000044] ? srso_return_thunk+0x5/0x5f [ +0.000006] ? drm_ioctl_kernel+0xb3/0x100 [drm] [ +0.000040] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? __check_object_size+0x50/0x220 [ +0.000007] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? drm_ioctl+0x2a4/0x4f0 [drm] [ +0.000039] ? __pfx_drm_mode_createblob_ioctl+0x10/0x10 [drm] [ +0.000043] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? __pm_runtime_suspend+0x69/0xc0 [ +0.000006] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? amdgpu_drm_ioctl+0x71/0x90 [amdgpu] [ +0.000366] ? srso_return_thunk+0x5/0x5f [ +0.000006] ? syscall_salir_al_modo_usuario+0x77/0x210 [ +0.000007] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? do_syscall_64+0x8e/0x190 [ +0.000006] ? srso_return_thunk+0x5/0x5f [ +0.000006] ? do_syscall_64+0x8e/0x190 [ +0.000006] ? srso_return_thunk+0x5/0x5f [ +0.000007] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ +0.000008] RIP: 0033:0x55bb7cd962bc [ +0.000007] C\u00f3digo: 4c 89 6c 24 18 4c 89 64 24 20 4c 89 74 24 28 0f 57 c0 0f 11 44 24 30 89 c7 48 8d 54 24 08 b8 10 00 00 00 be bc 64 ---truncado---"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57920.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57920.json
index 71d615ae3c2..9a3de43400b 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57920.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57920.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:26.150",
"lastModified": "2025-01-19T12:15:26.150",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: wq_release signals dma_fence only when available\n\nkfd_process_wq_release() signals eviction fence by\ndma_fence_signal() which wanrs if dma_fence\nis NULL.\n\nkfd_process->ef is initialized by kfd_process_device_init_vm()\nthrough ioctl. That means the fence is NULL for a new\ncreated kfd_process, and close a kfd_process right\nafter open it will trigger the warning.\n\nThis commit conditionally signals the eviction fence\nin kfd_process_wq_release() only when it is available.\n\n[ 503.660882] WARNING: CPU: 0 PID: 9 at drivers/dma-buf/dma-fence.c:467 dma_fence_signal+0x74/0xa0\n[ 503.782940] Workqueue: kfd_process_wq kfd_process_wq_release [amdgpu]\n[ 503.789640] RIP: 0010:dma_fence_signal+0x74/0xa0\n[ 503.877620] Call Trace:\n[ 503.880066] \n[ 503.882168] ? __warn+0xcd/0x260\n[ 503.885407] ? dma_fence_signal+0x74/0xa0\n[ 503.889416] ? report_bug+0x288/0x2d0\n[ 503.893089] ? handle_bug+0x53/0xa0\n[ 503.896587] ? exc_invalid_op+0x14/0x50\n[ 503.900424] ? asm_exc_invalid_op+0x16/0x20\n[ 503.904616] ? dma_fence_signal+0x74/0xa0\n[ 503.908626] kfd_process_wq_release+0x6b/0x370 [amdgpu]\n[ 503.914081] process_one_work+0x654/0x10a0\n[ 503.918186] worker_thread+0x6c3/0xe70\n[ 503.921943] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 503.926735] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 503.931527] ? __kthread_parkme+0x82/0x140\n[ 503.935631] ? __pfx_worker_thread+0x10/0x10\n[ 503.939904] kthread+0x2a8/0x380\n[ 503.943132] ? __pfx_kthread+0x10/0x10\n[ 503.946882] ret_from_fork+0x2d/0x70\n[ 503.950458] ? __pfx_kthread+0x10/0x10\n[ 503.954210] ret_from_fork_asm+0x1a/0x30\n[ 503.958142] \n[ 503.960328] ---[ end trace 0000000000000000 ]---\n\n(cherry picked from commit 2774ef7625adb5fb9e9265c26a59dca7b8fd171e)"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdkfd: wq_release env\u00eda una se\u00f1al a dma_fence solo cuando est\u00e1 disponible kfd_process_wq_release() env\u00eda una se\u00f1al de desalojo a dma_fence_signal(), que se activa si dma_fence es NULL. kfd_process->ef se inicializa mediante kfd_process_device_init_vm() a trav\u00e9s de ioctl. Esto significa que el desalojo es NULL para un nuevo kfd_process creado, y cerrar un kfd_process justo despu\u00e9s de abrirlo activar\u00e1 la advertencia. Esta confirmaci\u00f3n env\u00eda una se\u00f1al condicional al desalojo en kfd_process_wq_release() solo cuando est\u00e1 disponible. [ 503.660882] ADVERTENCIA: CPU: 0 PID: 9 en drivers/dma-buf/dma-fence.c:467 dma_fence_signal+0x74/0xa0 [ 503.782940] Cola de trabajo: kfd_process_wq kfd_process_wq_release [amdgpu] [ 503.789640] RIP: 0010:dma_fence_signal+0x74/0xa0 [ 503.877620] Seguimiento de llamadas: [ 503.880066] [ 503.882168] ? __warn+0xcd/0x260 [ 503.885407] ? dma_fence_signal+0x74/0xa0 [ 503.889416] ? report_bug+0x288/0x2d0 [ 503.893089] ? handle_bug+0x53/0xa0 [ 503.896587] ? exc_invalid_op+0x14/0x50 [ 503.900424] ? asm_exc_invalid_op+0x16/0x20 [ 503.904616] ? __kthread_parkme+0x82/0x140 [503.935631] ? __pfx_worker_thread+0x10/0x10 [ 503.939904] kthread+0x2a8/0x380 [ 503.943132] ? __pfx_kthread+0x10/0x10 [ 503.954210] ret_from_fork_asm+0x1a/0x30 [ 503.958142] [ 503.960328] ---[ fin del seguimiento 000000000000000 ]--- (seleccionado de el commit 2774ef7625adb5fb9e9265c26a59dca7b8fd171e)"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57921.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57921.json
index 607c2bfd3e0..ac50b72e954 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57921.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57921.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:26.247",
"lastModified": "2025-01-19T12:15:26.247",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Add a lock when accessing the buddy trim function\n\nWhen running YouTube videos and Steam games simultaneously,\nthe tester found a system hang / race condition issue with\nthe multi-display configuration setting. Adding a lock to\nthe buddy allocator's trim function would be the solution.\n\n\n[ 7197.250436] general protection fault, probably for non-canonical address 0xdead000000000108\n[ 7197.250447] RIP: 0010:__alloc_range+0x8b/0x340 [amddrm_buddy]\n[ 7197.250470] Call Trace:\n[ 7197.250472] \n[ 7197.250475] ? show_regs+0x6d/0x80\n[ 7197.250481] ? die_addr+0x37/0xa0\n[ 7197.250483] ? exc_general_protection+0x1db/0x480\n[ 7197.250488] ? drm_suballoc_new+0x13c/0x93d [drm_suballoc_helper]\n[ 7197.250493] ? asm_exc_general_protection+0x27/0x30\n[ 7197.250498] ? __alloc_range+0x8b/0x340 [amddrm_buddy]\n[ 7197.250501] ? __alloc_range+0x109/0x340 [amddrm_buddy]\n[ 7197.250506] amddrm_buddy_block_trim+0x1b5/0x260 [amddrm_buddy]\n[ 7197.250511] amdgpu_vram_mgr_new+0x4f5/0x590 [amdgpu]\n[ 7197.250682] amdttm_resource_alloc+0x46/0xb0 [amdttm]\n[ 7197.250689] ttm_bo_alloc_resource+0xe4/0x370 [amdttm]\n[ 7197.250696] amdttm_bo_validate+0x9d/0x180 [amdttm]\n[ 7197.250701] amdgpu_bo_pin+0x15a/0x2f0 [amdgpu]\n[ 7197.250831] amdgpu_dm_plane_helper_prepare_fb+0xb2/0x360 [amdgpu]\n[ 7197.251025] ? try_wait_for_completion+0x59/0x70\n[ 7197.251030] drm_atomic_helper_prepare_planes.part.0+0x2f/0x1e0\n[ 7197.251035] drm_atomic_helper_prepare_planes+0x5d/0x70\n[ 7197.251037] drm_atomic_helper_commit+0x84/0x160\n[ 7197.251040] drm_atomic_nonblocking_commit+0x59/0x70\n[ 7197.251043] drm_mode_atomic_ioctl+0x720/0x850\n[ 7197.251047] ? __pfx_drm_mode_atomic_ioctl+0x10/0x10\n[ 7197.251049] drm_ioctl_kernel+0xb9/0x120\n[ 7197.251053] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 7197.251056] drm_ioctl+0x2d4/0x550\n[ 7197.251058] ? __pfx_drm_mode_atomic_ioctl+0x10/0x10\n[ 7197.251063] amdgpu_drm_ioctl+0x4e/0x90 [amdgpu]\n[ 7197.251186] __x64_sys_ioctl+0xa0/0xf0\n[ 7197.251190] x64_sys_call+0x143b/0x25c0\n[ 7197.251193] do_syscall_64+0x7f/0x180\n[ 7197.251197] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 7197.251199] ? amdgpu_display_user_framebuffer_create+0x215/0x320 [amdgpu]\n[ 7197.251329] ? drm_internal_framebuffer_create+0xb7/0x1a0\n[ 7197.251332] ? srso_alias_return_thunk+0x5/0xfbef5\n\n(cherry picked from commit 3318ba94e56b9183d0304577c74b33b6b01ce516)"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: Agregar un bloqueo al acceder a la funci\u00f3n de recorte del compa\u00f1ero Al ejecutar videos de YouTube y juegos de Steam simult\u00e1neamente, el evaluador encontr\u00f3 un problema de condici\u00f3n de ejecuci\u00f3n/bloqueo del sistema con la configuraci\u00f3n de m\u00faltiples pantallas. Agregar un bloqueo a la funci\u00f3n de recorte del asignador de compa\u00f1eros ser\u00eda la soluci\u00f3n. [ 7197.250436] error de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdead000000000108 [ 7197.250447] RIP: 0010:__alloc_range+0x8b/0x340 [amddrm_buddy] [ 7197.250470] Seguimiento de llamadas: [ 7197.250472] [ 7197.250475] ? asm_exc_general_protection+0x27/0x30 [7197.250498] ? __alloc_range+0x8b/0x340 [amddrm_buddy] [7197.250501] ? __alloc_range+0x109/0x340 [amddrm_buddy] [ 7197.250506] amddrm_buddy_block_trim+0x1b5/0x260 [amddrm_buddy] [ 7197.250511] amdgpu_vram_mgr_new+0x4f5/0x590 [amdgpu] [ 7197.250682] amdttm_resource_alloc+0x46/0xb0 [amdttm] [ 7197.250689] ttm_bo_alloc_resource+0xe4/0x370 [amdttm] [ 7197.250696] amdttm_bo_validate+0x9d/0x180 [amdttm] [ [7197.250701] amdgpu_bo_pin+0x15a/0x2f0 [amdgpu] [ 7197.250831] amdgpu_dm_plane_helper_prepare_fb+0xb2/0x360 [amdgpu] [ 7197.251025] ? drm_atomic_helper_prepare_planes.part.0+0x2f/0x1e0 [ 7197.251035] drm_atomic_helper_prepare_planes+0x5d/0x70 [ 7197.251037] drm_atomic_helper_commit+0x84/0x160 [ 7197.251040] drm_atomic_nonblocking_commit+0x59/0x70 [ 7197.251043] drm_mode_atomic_ioctl+0x720/0x850 [ 7197.251047] ? __pfx_drm_mode_atomic_ioctl+0x10/0x10 [ 7197.251049] drm_ioctl_kernel+0xb9/0x120 [ 7197.251053] ? srso_alias_return_thunk+0x5/0xfbef5 [ 7197.251056] drm_ioctl+0x2d4/0x550 [ 7197.251058] ? __pfx_drm_mode_atomic_ioctl+0x10/0x10 [ 7197.251063] amdgpu_drm_ioctl+0x4e/0x90 [ amdgpu] [ 7197.251186] __x64_sys_ioctl+0xa0/0xf0 [ 7197.251190] x64_sys_call+0x143b/0x25c0 [ 7197.251193] do_syscall_64+0x7f/0x180 [ 7197.251197] ? srso_alias_return_thunk+0x5/0xfbef5 [ 7197.251199] ? amdgpu_display_user_framebuffer_create+0x215/0x320 [amdgpu] [ 7197.251329] ? drm_internal_framebuffer_create+0xb7/0x1a0 [ 7197.251332] ? srso_alias_return_thunk+0x5/0xfbef5 (seleccionado de el commit 3318ba94e56b9183d0304577c74b33b6b01ce516)"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57923.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57923.json
index 684cd053ed3..e2c15d0429f 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57923.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57923.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:26.433",
"lastModified": "2025-01-19T12:15:26.433",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: zlib: fix avail_in bytes for s390 zlib HW compression path\n\nSince the input data length passed to zlib_compress_folios() can be\narbitrary, always setting strm.avail_in to a multiple of PAGE_SIZE may\ncause read-in bytes to exceed the input range. Currently this triggers\nan assert in btrfs_compress_folios() on the debug kernel (see below).\nFix strm.avail_in calculation for S390 hardware acceleration path.\n\n assertion failed: *total_in <= orig_len, in fs/btrfs/compression.c:1041\n ------------[ cut here ]------------\n kernel BUG at fs/btrfs/compression.c:1041!\n monitor event: 0040 ilc:2 [#1] PREEMPT SMP\n CPU: 16 UID: 0 PID: 325 Comm: kworker/u273:3 Not tainted 6.13.0-20241204.rc1.git6.fae3b21430ca.300.fc41.s390x+debug #1\n Hardware name: IBM 3931 A01 703 (z/VM 7.4.0)\n Workqueue: btrfs-delalloc btrfs_work_helper\n Krnl PSW : 0704d00180000000 0000021761df6538 (btrfs_compress_folios+0x198/0x1a0)\n R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:1 PM:0 RI:0 EA:3\n Krnl GPRS: 0000000080000000 0000000000000001 0000000000000047 0000000000000000\n 0000000000000006 ffffff01757bb000 000001976232fcc0 000000000000130c\n 000001976232fcd0 000001976232fcc8 00000118ff4a0e30 0000000000000001\n 00000111821ab400 0000011100000000 0000021761df6534 000001976232fb58\n Krnl Code: 0000021761df6528: c020006f5ef4 larl %r2,0000021762be2310\n 0000021761df652e: c0e5ffbd09d5 brasl %r14,00000217615978d8\n #0000021761df6534: af000000 mc 0,0\n >0000021761df6538: 0707 bcr 0,%r7\n 0000021761df653a: 0707 bcr 0,%r7\n 0000021761df653c: 0707 bcr 0,%r7\n 0000021761df653e: 0707 bcr 0,%r7\n 0000021761df6540: c004004bb7ec brcl 0,000002176276d518\n Call Trace:\n [<0000021761df6538>] btrfs_compress_folios+0x198/0x1a0\n ([<0000021761df6534>] btrfs_compress_folios+0x194/0x1a0)\n [<0000021761d97788>] compress_file_range+0x3b8/0x6d0\n [<0000021761dcee7c>] btrfs_work_helper+0x10c/0x160\n [<0000021761645760>] process_one_work+0x2b0/0x5d0\n [<000002176164637e>] worker_thread+0x20e/0x3e0\n [<000002176165221a>] kthread+0x15a/0x170\n [<00000217615b859c>] __ret_from_fork+0x3c/0x60\n [<00000217626e72d2>] ret_from_fork+0xa/0x38\n INFO: lockdep is turned off.\n Last Breaking-Event-Address:\n [<0000021761597924>] _printk+0x4c/0x58\n Kernel panic - not syncing: Fatal exception: panic_on_oops"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: zlib: arregla los bytes avail_in para la ruta de compresi\u00f3n de hardware zlib s390 Dado que la longitud de los datos de entrada que se pasan a zlib_compress_folios() puede ser arbitraria, configurar siempre strm.avail_in como un m\u00faltiplo de PAGE_SIZE puede provocar que los bytes de lectura superen el rango de entrada. Actualmente, esto activa una afirmaci\u00f3n en btrfs_compress_folios() en el kernel de depuraci\u00f3n (ver a continuaci\u00f3n). Arregla el c\u00e1lculo de strm.avail_in para la ruta de aceleraci\u00f3n de hardware S390. La afirmaci\u00f3n fall\u00f3: *total_in <= orig_len, en fs/btrfs/compression.c:1041 ------------[ corte aqu\u00ed ]------------ \u00a1ERROR del kernel en fs/btrfs/compression.c:1041! Evento de monitor: 0040 ilc:2 [#1] PREEMPT SMP CPU: 16 UID: 0 PID: 325 Comm: kworker/u273:3 No contaminado 6.13.0-20241204.rc1.git6.fae3b21430ca.300.fc41.s390x+debug #1 Nombre de hardware: IBM 3931 A01 703 (z/VM 7.4.0) Cola de trabajo: btrfs-delalloc btrfs_work_helper Krnl PSW: 0704d00180000000 0000021761df6538 (btrfs_compress_folios+0x198/0x1a0) R:0 T:1 IO:1 EX:1 Clave:0 M:1 W:0 P:0 AS:3 CC:1 PM:0 RI:0 EA:3 Krnl GPRS: 0000000080000000 0000000000000001 0000000000000047 0000000000000000 000000000000006 ffffff01757bb000 000001976232fcc0 000000000000130c 000001976232fcd0 000001976232fcc8 00000118ff4a0e30 0000000000000001 00000111821ab400 0000011100000000 0000021761df6534 000001976232fb58 C\u00f3digo Krnl: 0000021761df6528: c020006f5ef4 larl %r2,0000021762be2310 0000021761df652e: c0e5ffbd09d5 brasl %r14,00000217615978d8 #0000021761df6534: af000000 mc 0,0 >0000021761df6538: 0707 bcr 0,%r7 0000021761df653a: 0707 bcr 0,%r7 0000021761df653c: 0707 bcr 0,%r7 0000021761df653e: 0707 bcr 0,%r7 0000021761df6540: c004004bb7ec brcl 0,000002176276d518 Seguimiento de llamadas: [<0000021761df6538>] btrfs_compress_folios+0x198/0x1a0 ([<0000021761df6534>] btrfs_compress_folios+0x194/0x1a0) [<0000021761d97788>] rango_archivo_comprimir+0x3b8/0x6d0 [<0000021761dcee7c>] ayuda_trabajo_btrfs+0x10c/0x160 [<0000021761645760>] trabajo_proceso_uno+0x2b0/0x5d0 [<000002176164637e>] subproceso_trabajador+0x20e/0x3e0 [<000002176165221a>] subproceso_k+0x15a/0x170 [<00000217615b859c>] __ret_de_bifurcaci\u00f3n+0x3c/0x60 [<00000217626e72d2>] ret_de_bifurcaci\u00f3n+0xa/0x38 INFORMACI\u00d3N: bloqueo_dep es Desactivado. Direcci\u00f3n del \u00faltimo evento de ruptura: [<0000021761597924>] _printk+0x4c/0x58 P\u00e1nico del kernel: no se sincroniza: Excepci\u00f3n fatal: panic_on_oops"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57926.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57926.json
index ccf24d94482..3e2ac299461 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57926.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57926.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:26.713",
"lastModified": "2025-01-19T12:15:26.713",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err\n\nThe pointer need to be set to NULL, otherwise KASAN complains about\nuse-after-free. Because in mtk_drm_bind, all private's drm are set\nas follows.\n\nprivate->all_drm_private[i]->drm = drm;\n\nAnd drm will be released by drm_dev_put in case mtk_drm_kms_init returns\nfailure. However, the shutdown path still accesses the previous allocated\nmemory in drm_atomic_helper_shutdown.\n\n[ 84.874820] watchdog: watchdog0: watchdog did not stop!\n[ 86.512054] ==================================================================\n[ 86.513162] BUG: KASAN: use-after-free in drm_atomic_helper_shutdown+0x33c/0x378\n[ 86.514258] Read of size 8 at addr ffff0000d46fc068 by task shutdown/1\n[ 86.515213]\n[ 86.515455] CPU: 1 UID: 0 PID: 1 Comm: shutdown Not tainted 6.13.0-rc1-mtk+gfa1a78e5d24b-dirty #55\n[ 86.516752] Hardware name: Unknown Product/Unknown Product, BIOS 2022.10 10/01/2022\n[ 86.517960] Call trace:\n[ 86.518333] show_stack+0x20/0x38 (C)\n[ 86.518891] dump_stack_lvl+0x90/0xd0\n[ 86.519443] print_report+0xf8/0x5b0\n[ 86.519985] kasan_report+0xb4/0x100\n[ 86.520526] __asan_report_load8_noabort+0x20/0x30\n[ 86.521240] drm_atomic_helper_shutdown+0x33c/0x378\n[ 86.521966] mtk_drm_shutdown+0x54/0x80\n[ 86.522546] platform_shutdown+0x64/0x90\n[ 86.523137] device_shutdown+0x260/0x5b8\n[ 86.523728] kernel_restart+0x78/0xf0\n[ 86.524282] __do_sys_reboot+0x258/0x2f0\n[ 86.524871] __arm64_sys_reboot+0x90/0xd8\n[ 86.525473] invoke_syscall+0x74/0x268\n[ 86.526041] el0_svc_common.constprop.0+0xb0/0x240\n[ 86.526751] do_el0_svc+0x4c/0x70\n[ 86.527251] el0_svc+0x4c/0xc0\n[ 86.527719] el0t_64_sync_handler+0x144/0x168\n[ 86.528367] el0t_64_sync+0x198/0x1a0\n[ 86.528920]\n[ 86.529157] The buggy address belongs to the physical page:\n[ 86.529972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d46fd4d0 pfn:0x1146fc\n[ 86.531319] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)\n[ 86.532267] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000\n[ 86.533390] raw: ffff0000d46fd4d0 0000000000000000 00000000ffffffff 0000000000000000\n[ 86.534511] page dumped because: kasan: bad access detected\n[ 86.535323]\n[ 86.535559] Memory state around the buggy address:\n[ 86.536265] ffff0000d46fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 86.537314] ffff0000d46fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 86.538363] >ffff0000d46fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 86.544733] ^\n[ 86.551057] ffff0000d46fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 86.557510] ffff0000d46fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n[ 86.563928] ==================================================================\n[ 86.571093] Disabling lock debugging due to kernel taint\n[ 86.577642] Unable to handle kernel paging request at virtual address e0e9c0920000000b\n[ 86.581834] KASAN: maybe wild-memory-access in range [0x0752049000000058-0x075204900000005f]\n..."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/mediatek: Establecer private->all_drm_private[i]->drm en NULL si mtk_drm_bind devuelve err El puntero debe establecerse en NULL, de lo contrario KASAN se queja de use-after-free. Porque en mtk_drm_bind, todos los drm de private se establecen de la siguiente manera. private->all_drm_private[i]->drm = drm; Y drm ser\u00e1 liberado por drm_dev_put en caso de que mtk_drm_kms_init devuelva un error. Sin embargo, la ruta de apagado a\u00fan accede a la memoria asignada previamente en drm_atomic_helper_shutdown. [ 84.874820] watchdog: watchdog0: \u00a1watchdog no se detuvo! [ 86.512054] ======================================================================= [ 86.513162] ERROR: KASAN: use-after-free en drm_atomic_helper_shutdown+0x33c/0x378 [ 86.514258] Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff0000d46fc068 por la tarea shutdown/1 [ 86.515213] [ 86.515455] CPU: 1 UID: 0 PID: 1 Comm: shutdown No contaminado 6.13.0-rc1-mtk+gfa1a78e5d24b-dirty #55 [ 86.516752] Nombre del hardware: Producto desconocido/Producto desconocido, BIOS 2022.10 10/01/2022 [ 86.517960] Rastreo de llamadas: [ 86.518333] show_stack+0x20/0x38 (C) [ 86.518891] dump_stack_lvl+0x90/0xd0 [ 86.519443] print_report+0xf8/0x5b0 [ 86.519985] kasan_report+0xb4/0x100 [ 86.520526] __asan_report_load8_noabort+0x20/0x30 [ 86.521240] drm_atomic_helper_shutdown+0x33c/0x378 [ 86.521966] apagado_drm_mtk+0x54/0x80 [ 86.522546] apagado_plataforma+0x64/0x90 [ 86.523137] apagado_dispositivo+0x260/0x5b8 [ 86.523728] reinicio_n\u00facleo+0x78/0xf0 [ 86.524282] __do_sys_reboot+0x258/0x2f0 [ 86.524871] __arm64_sys_reboot+0x90/0xd8 [ 86.525473] invocar_syscall+0x74/0x268 [ 86.526041] el0_svc_common.constprop.0+0xb0/0x240 [ 86.526751] do_el0_svc+0x4c/0x70 [ 86.527251] el0_svc+0x4c/0xc0 [ 86.527719] el0t_64_sync_handler+0x144/0x168 [ 86.528367] el0t_64_sync+0x198/0x1a0 [ 86.528920] [ 86.529157] La direcci\u00f3n con errores pertenece a la p\u00e1gina f\u00edsica: [ 86.529972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d46fd4d0 pfn:0x1146fc [86.531319] indicadores: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [86.532267] sin procesar: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [86.533390] sin procesar: ffff0000d46fd4d0 000000000000000 00000000ffffffff 0000000000000000 [86.534511] p\u00e1gina volcada porque: kasan: se detect\u00f3 un acceso incorrecto [ 86.535323] [ 86.535559] Estado de la memoria alrededor de la direcci\u00f3n con errores: [ 86.536265] ffff0000d46fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 86.537314] ffff0000d46fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 86.538363] >ffff0000d46fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 86.544733] ^ [ 86.551057] ffff0000d46fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 86.557510] ffff0000d46fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 86.563928] ===================================================================== [ 86.571093] Deshabilitando la depuraci\u00f3n de bloqueo debido a una corrupci\u00f3n del kernel [ 86.577642] No se puede gestionar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual e0e9c0920000000b [ 86.581834] KASAN: tal vez acceso a memoria salvaje en el rango [0x0752049000000058-0x075204900000005f] ..."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57927.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57927.json
index 5e17e6af7f9..5ab3121a4a1 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57927.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57927.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:26.810",
"lastModified": "2025-01-19T12:15:26.810",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: Fix oops in nfs_netfs_init_request() when copying to cache\n\nWhen netfslib wants to copy some data that has just been read on behalf of\nnfs, it creates a new write request and calls nfs_netfs_init_request() to\ninitialise it, but with a NULL file pointer. This causes\nnfs_file_open_context() to oops - however, we don't actually need the nfs\ncontext as we're only going to write to the cache.\n\nFix this by just returning if we aren't given a file pointer and emit a\nwarning if the request was for something other than copy-to-cache.\n\nFurther, fix nfs_netfs_free_request() so that it doesn't try to free the\ncontext if the pointer is NULL."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfs: Arreglar oops en nfs_netfs_init_request() al copiar a cach\u00e9 Cuando netfslib quiere copiar algunos datos que acaban de leerse en nombre de nfs, crea una nueva solicitud de escritura y llama a nfs_netfs_init_request() para inicializarla, pero con un puntero de archivo NULL. Esto hace que nfs_file_open_context() d\u00e9 un error; sin embargo, en realidad no necesitamos el contexto nfs ya que solo vamos a escribir en la cach\u00e9. Arregla esto simplemente devolviendo si no se nos da un puntero de archivo y emitiendo una advertencia si la solicitud fue para algo distinto a copiar a cach\u00e9. Adem\u00e1s, arregla nfs_netfs_free_request() para que no intente liberar el contexto si el puntero es NULL."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57928.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57928.json
index 2cd44c9bd6c..0a81bcab761 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57928.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57928.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:26.903",
"lastModified": "2025-01-19T12:15:26.903",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfs: Fix enomem handling in buffered reads\n\nIf netfs_read_to_pagecache() gets an error from either ->prepare_read() or\nfrom netfs_prepare_read_iterator(), it needs to decrement ->nr_outstanding,\ncancel the subrequest and break out of the issuing loop. Currently, it\nonly does this for two of the cases, but there are two more that aren't\nhandled.\n\nFix this by moving the handling to a common place and jumping to it from\nall four places. This is in preference to inserting a wrapper around\nnetfs_prepare_read_iterator() as proposed by Dmitry Antipov[1]."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfs: Arreglar la gesti\u00f3n de enomem en lecturas en b\u00fafer Si netfs_read_to_pagecache() obtiene un error de ->prepare_read() o de netfs_prepare_read_iterator(), necesita decrementar ->nr_outstanding, cancelar la subsolicitud y salir del bucle de emisi\u00f3n. Actualmente, solo hace esto para dos de los casos, pero hay dos m\u00e1s que no se gestionan. Arregle esto moviendo la gesti\u00f3n a un lugar com\u00fan y saltando a \u00e9l desde los cuatro lugares. Esto es preferible a insertar un contenedor alrededor de netfs_prepare_read_iterator() como lo propuso Dmitry Antipov[1]."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57930.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57930.json
index 812c8e21f27..9eb8a4cfbb8 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57930.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57930.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T12:15:26.600",
"lastModified": "2025-01-21T12:15:26.600",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Have process_string() also allow arrays\n\nIn order to catch a common bug where a TRACE_EVENT() TP_fast_assign()\nassigns an address of an allocated string to the ring buffer and then\nreferences it in TP_printk(), which can be executed hours later when the\nstring is free, the function test_event_printk() runs on all events as\nthey are registered to make sure there's no unwanted dereferencing.\n\nIt calls process_string() to handle cases in TP_printk() format that has\n\"%s\". It returns whether or not the string is safe. But it can have some\nfalse positives.\n\nFor instance, xe_bo_move() has:\n\n TP_printk(\"move_lacks_source:%s, migrate object %p [size %zu] from %s to %s device_id:%s\",\n __entry->move_lacks_source ? \"yes\" : \"no\", __entry->bo, __entry->size,\n xe_mem_type_to_name[__entry->old_placement],\n xe_mem_type_to_name[__entry->new_placement], __get_str(device_id))\n\nWhere the \"%s\" references into xe_mem_type_to_name[]. This is an array of\npointers that should be safe for the event to access. Instead of flagging\nthis as a bad reference, if a reference points to an array, where the\nrecord field is the index, consider it safe."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tracing: Hacer que process_string() tambi\u00e9n permita matrices Para detectar un error com\u00fan en el que un TP_fast_assign() de TRACE_EVENT() asigna una direcci\u00f3n de una cadena asignada al b\u00fafer de anillo y luego la referencia en TP_printk(), que se puede ejecutar horas despu\u00e9s cuando la cadena est\u00e1 libre, la funci\u00f3n test_event_printk() se ejecuta en todos los eventos a medida que se registran para asegurarse de que no haya desreferenciaciones no deseadas. Llama a process_string() para gestionar los casos en formato TP_printk() que tienen \"%s\". Devuelve si la cadena es segura o no. Pero puede tener algunos falsos positivos. Por ejemplo, xe_bo_move() tiene: TP_printk(\"move_lacks_source:%s, migrate object %p [size %zu] from %s to %s device_id:%s\", __entry->move_lacks_source ? \"yes\" : \"no\", __entry->bo, __entry->size, xe_mem_type_to_name[__entry->old_placement], xe_mem_type_to_name[__entry->new_placement], __get_str(device_id)) Where the \"%s\" Donde \"%s\" hace referencia a xe_mem_type_to_name[]. Esta es una matriz de punteros a los que el evento deber\u00eda poder acceder de forma segura. En lugar de marcar esto como una referencia incorrecta, si una referencia apunta a una matriz, donde el campo de registro es el \u00edndice, consid\u00e9rela segura."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57931.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57931.json
index 2092edba954..d08788675ef 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57931.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57931.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T12:15:26.713",
"lastModified": "2025-01-21T12:15:26.713",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: ignore unknown extended permissions\n\nWhen evaluating extended permissions, ignore unknown permissions instead\nof calling BUG(). This commit ensures that future permissions can be\nadded without interfering with older kernels."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: selinux: ignorar permisos extendidos desconocidos Al evaluar permisos extendidos, ignorar permisos desconocidos en lugar de llamar a BUG(). Esta confirmaci\u00f3n garantiza que se puedan agregar permisos futuros sin interferir con kernels m\u00e1s antiguos."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57932.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57932.json
index 72f4fc62e95..6b5d610ecd1 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57932.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57932.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T12:15:26.837",
"lastModified": "2025-01-21T12:15:26.837",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: guard XDP xmit NDO on existence of xdp queues\n\nIn GVE, dedicated XDP queues only exist when an XDP program is installed\nand the interface is up. As such, the NDO XDP XMIT callback should\nreturn early if either of these conditions are false.\n\nIn the case of no loaded XDP program, priv->num_xdp_queues=0 which can\ncause a divide-by-zero error, and in the case of interface down,\nnum_xdp_queues remains untouched to persist XDP queue count for the next\ninterface up, but the TX pointer itself would be NULL.\n\nThe XDP xmit callback also needs to synchronize with a device\ntransitioning from open to close. This synchronization will happen via\nthe GVE_PRIV_FLAGS_NAPI_ENABLED bit along with a synchronize_net() call,\nwhich waits for any RCU critical sections at call-time to complete."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gve: guard XDP xmit NDO on existing xdp queues En GVE, las colas XDP dedicadas solo existen cuando se instala un programa XDP y la interfaz est\u00e1 activa. Como tal, la devoluci\u00f3n de llamada NDO XDP XMIT debe regresar temprano si alguna de estas condiciones es falsa. En el caso de que no haya un programa XDP cargado, priv->num_xdp_queues=0 que puede causar un error de divisi\u00f3n por cero, y en el caso de que la interfaz est\u00e9 inactiva, num_xdp_queues permanece intacto para persistir el conteo de colas XDP para la siguiente interfaz activa, pero el puntero TX en s\u00ed ser\u00eda NULL. La devoluci\u00f3n de llamada XDP xmit tambi\u00e9n necesita sincronizarse con un dispositivo que est\u00e9 pasando de abierto a cerrado. Esta sincronizaci\u00f3n ocurrir\u00e1 a trav\u00e9s del bit GVE_PRIV_FLAGS_NAPI_ENABLED junto con una llamadasynchronous_net(), que espera a que se completen las secciones cr\u00edticas de RCU en el momento de la llamada."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57933.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57933.json
index 563bb53244e..99be5b782fb 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57933.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57933.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T12:15:26.947",
"lastModified": "2025-01-21T12:15:26.947",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: guard XSK operations on the existence of queues\n\nThis patch predicates the enabling and disabling of XSK pools on the\nexistence of queues. As it stands, if the interface is down, disabling\nor enabling XSK pools would result in a crash, as the RX queue pointer\nwould be NULL. XSK pool registration will occur as part of the next\ninterface up.\n\nSimilarly, xsk_wakeup needs be guarded against queues disappearing\nwhile the function is executing, so a check against the\nGVE_PRIV_FLAGS_NAPI_ENABLED flag is added to synchronize with the\ndisabling of the bit and the synchronize_net() in gve_turndown."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gve: proteger las operaciones XSK ante la existencia de colas Este parche predica la habilitaci\u00f3n y deshabilitaci\u00f3n de los grupos XSK ante la existencia de colas. Tal como est\u00e1, si la interfaz est\u00e1 inactiva, deshabilitar o habilitar los grupos XSK provocar\u00eda un bloqueo, ya que el puntero de cola RX ser\u00eda NULL. El registro del grupo XSK se producir\u00e1 como parte de la siguiente interfaz activa. De forma similar, xsk_wakeup debe protegerse contra la desaparici\u00f3n de colas mientras se ejecuta la funci\u00f3n, por lo que se agrega una comprobaci\u00f3n contra el indicador GVE_PRIV_FLAGS_NAPI_ENABLED para sincronizar con la desactivaci\u00f3n del bit y elsynchronous_net() en gve_turndown."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57934.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57934.json
index 52f6a433cd2..8fb094eadb2 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57934.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57934.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T12:15:27.047",
"lastModified": "2025-01-21T12:15:27.047",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfgraph: Add READ_ONCE() when accessing fgraph_array[]\n\nIn __ftrace_return_to_handler(), a loop iterates over the fgraph_array[]\nelements, which are fgraph_ops. The loop checks if an element is a\nfgraph_stub to prevent using a fgraph_stub afterward.\n\nHowever, if the compiler reloads fgraph_array[] after this check, it might\nrace with an update to fgraph_array[] that introduces a fgraph_stub. This\ncould result in the stub being processed, but the stub contains a null\n\"func_hash\" field, leading to a NULL pointer dereference.\n\nTo ensure that the gops compared against the fgraph_stub matches the gops\nprocessed later, add a READ_ONCE(). A similar patch appears in commit\n63a8dfb (\"function_graph: Add READ_ONCE() when accessing fgraph_array[]\")."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fgraph: Agregar READ_ONCE() al acceder a fgraph_array[] En __ftrace_return_to_handler(), un bucle itera sobre los elementos fgraph_array[], que son fgraph_ops. El bucle comprueba si un elemento es un fgraph_stub para evitar usar un fgraph_stub despu\u00e9s. Sin embargo, si el compilador vuelve a cargar fgraph_array[] despu\u00e9s de esta comprobaci\u00f3n, podr\u00eda competir con una actualizaci\u00f3n a fgraph_array[] que introduce un fgraph_stub. Esto podr\u00eda dar como resultado que se procese el stub, pero que este contenga un campo \"func_hash\" nulo, lo que lleva a una desreferencia de puntero NULL. Para garantizar que los gops comparados con fgraph_stub coincidan con los gops procesados ??m\u00e1s tarde, agregue un READ_ONCE(). Un parche similar aparece en el commit 63a8dfb (\"function_graph: Agregar READ_ONCE() al acceder a fgraph_array[]\")."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57935.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57935.json
index b8e05beae99..3c64eee7da3 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57935.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57935.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T12:15:27.153",
"lastModified": "2025-01-21T12:15:27.153",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix accessing invalid dip_ctx during destroying QP\n\nIf it fails to modify QP to RTR, dip_ctx will not be attached. And\nduring detroying QP, the invalid dip_ctx pointer will be accessed."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/hns: Se solucion\u00f3 el acceso a un dip_ctx no v\u00e1lido durante la destrucci\u00f3n de QP. Si no se puede modificar QP a RTR, no se adjuntar\u00e1 dip_ctx. Y durante la destrucci\u00f3n de QP, se acceder\u00e1 al puntero dip_ctx no v\u00e1lido."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57936.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57936.json
index a011a559ac4..34fd6798add 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57936.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57936.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T12:15:27.257",
"lastModified": "2025-01-21T12:15:27.257",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Fix max SGEs for the Work Request\n\nGen P7 supports up to 13 SGEs for now. WQE software structure\ncan hold only 6 now. Since the max send sge is reported as\n13, the stack can give requests up to 13 SGEs. This is causing\ntraffic failures and system crashes.\n\nUse the define for max SGE supported for variable size. This\nwill work for both static and variable WQEs."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/bnxt_re: Se corrige el n\u00famero m\u00e1ximo de SGE para la solicitud de trabajo. La generaci\u00f3n P7 admite hasta 13 SGE por ahora. La estructura de software de WQE solo puede admitir 6 ahora. Dado que el n\u00famero m\u00e1ximo de SGE de env\u00edo se informa como 13, la pila puede dar solicitudes de hasta 13 SGE. Esto est\u00e1 causando fallas de tr\u00e1fico y bloqueos del sistema. Utilice la definici\u00f3n para el n\u00famero m\u00e1ximo de SGE admitidos para el tama\u00f1o variable. Esto funcionar\u00e1 tanto para WQE est\u00e1ticos como variables."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57938.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57938.json
index cddae402788..5e7a8207a7b 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57938.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57938.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sctp: Prevent autoclose integer overflow in sctp_association_init()\n\nWhile by default max_autoclose equals to INT_MAX / HZ, one may set\nnet.sctp.max_autoclose to UINT_MAX. There is code in\nsctp_association_init() that can consequently trigger overflow."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/sctp: Evitar el desbordamiento de enteros de cierre autom\u00e1tico en sctp_association_init() Si bien, de forma predeterminada, max_autoclose es igual a INT_MAX / HZ, se puede establecer net.sctp.max_autoclose en UINT_MAX. Hay un c\u00f3digo en sctp_association_init() que, en consecuencia, puede provocar un desbordamiento. "
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57941.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57941.json
index 8a1bf9e9d47..d9a048d8a00 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57941.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57941.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T13:15:08.640",
"lastModified": "2025-01-21T13:15:08.640",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfs: Fix the (non-)cancellation of copy when cache is temporarily disabled\n\nWhen the caching for a cookie is temporarily disabled (e.g. due to a DIO\nwrite on that file), future copying to the cache for that file is disabled\nuntil all fds open on that file are closed. However, if netfslib is using\nthe deprecated PG_private_2 method (such as is currently used by ceph), and\ndecides it wants to copy to the cache, netfs_advance_write() will just bail\nat the first check seeing that the cache stream is unavailable, and\nindicate that it dealt with all the content.\n\nThis means that we have no subrequests to provide notifications to drive\nthe state machine or even to pin the request and the request just gets\ndiscarded, leaving the folios with PG_private_2 set.\n\nFix this by jumping directly to cancel the request if the cache is not\navailable. That way, we don't remove mark3 from the folio_queue list and\nnetfs_pgpriv2_cancel() will clean up the folios.\n\nThis was found by running the generic/013 xfstest against ceph with an\nactive cache and the \"-o fsc\" option passed to ceph. That would usually\nhang"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfs: Arreglar la (no) cancelaci\u00f3n de copia cuando el cach\u00e9 est\u00e1 deshabilitado temporalmente Cuando el almacenamiento en cach\u00e9 de una cookie est\u00e1 deshabilitado temporalmente (por ejemplo, debido a una escritura DIO en ese archivo), la copia futura al cach\u00e9 para ese archivo se deshabilita hasta que todos los fds abiertos en ese archivo se cierren. Sin embargo, si netfslib est\u00e1 usando el m\u00e9todo PG_private_2 obsoleto (como el que usa actualmente ceph) y decide que quiere copiar al cach\u00e9, netfs_advance_write() simplemente abandonar\u00e1 en la primera verificaci\u00f3n al ver que el flujo de cach\u00e9 no est\u00e1 disponible e indicar\u00e1 que se ocup\u00f3 de todo el contenido. Esto significa que no tenemos subsolicitudes para proporcionar notificaciones para controlar la m\u00e1quina de estado o incluso para fijar la solicitud y la solicitud simplemente se descarta, dejando los folios con PG_private_2 establecido. Arregle esto saltando directamente para cancelar la solicitud si el cach\u00e9 no est\u00e1 disponible. De esa manera, no eliminamos mark3 de la lista folio_queue y netfs_pgpriv2_cancel() limpiar\u00e1 los folios. Esto se descubri\u00f3 al ejecutar el xfstest gen\u00e9rico/013 contra ceph con un cach\u00e9 activo y la opci\u00f3n \"-o fsc\" pasada a ceph. Eso generalmente se bloqueaba"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57942.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57942.json
index a14c2048840..0e154962371 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57942.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57942.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T13:15:08.743",
"lastModified": "2025-01-21T13:15:08.743",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfs: Fix ceph copy to cache on write-begin\n\nAt the end of netfs_unlock_read_folio() in which folios are marked\nappropriately for copying to the cache (either with by being marked dirty\nand having their private data set or by having PG_private_2 set) and then\nunlocked, the folio_queue struct has the entry pointing to the folio\ncleared. This presents a problem for netfs_pgpriv2_write_to_the_cache(),\nwhich is used to write folios marked with PG_private_2 to the cache as it\nexpects to be able to trawl the folio_queue list thereafter to find the\nrelevant folios, leading to a hang.\n\nFix this by not clearing the folio_queue entry if we're going to do the\ndeprecated copy-to-cache. The clearance will be done instead as the folios\nare written to the cache.\n\nThis can be reproduced by starting cachefiles, mounting a ceph filesystem\nwith \"-o fsc\" and writing to it."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfs: Fix ceph copy to cache on write-begin Al final de netfs_unlock_read_folio() en el que los folios se marcan adecuadamente para copiarlos al cach\u00e9 (ya sea marc\u00e1ndolos como sucios y teniendo sus datos privados configurados o teniendo PG_private_2 configurado) y luego se desbloquean, la estructura folio_queue tiene la entrada que apunta al folio borrada. Esto presenta un problema para netfs_pgpriv2_write_to_the_cache(), que se usa para escribir folios marcados con PG_private_2 en el cach\u00e9, ya que espera poder rastrear la lista folio_queue a partir de entonces para encontrar los folios relevantes, lo que lleva a un bloqueo. Solucione esto al no borrar la entrada folio_queue si vamos a hacer la copia al cach\u00e9 obsoleta. La limpieza se realizar\u00e1 en su lugar a medida que los folios se escriben en el cach\u00e9. Esto se puede reproducir iniciando cachefiles, montando un sistema de archivos ceph con \"-o fsc\" y escribiendo en \u00e9l."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57943.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57943.json
index a4860922316..4227b3d61da 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57943.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57943.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T13:15:08.837",
"lastModified": "2025-01-21T13:15:08.837",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nexfat: fix the new buffer was not zeroed before writing\n\nBefore writing, if a buffer_head marked as new, its data must\nbe zeroed, otherwise uninitialized data in the page cache will\nbe written.\n\nSo this commit uses folio_zero_new_buffers() to zero the new\nbuffers before ->write_end()."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: exfat: se corrige que el nuevo b\u00fafer no se pusiera a cero antes de escribir. Antes de escribir, si un buffer_head est\u00e1 marcado como nuevo, sus datos deben ponerse a cero; de lo contrario, se escribir\u00e1n datos no inicializados en la cach\u00e9 de p\u00e1ginas. Por lo tanto, esta confirmaci\u00f3n utiliza folio_zero_new_buffers() para poner a cero los nuevos b\u00faferes antes de ->write_end()."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57945.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57945.json
index 84d6087fac4..9d1954600f9 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57945.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57945.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T13:15:09.033",
"lastModified": "2025-01-21T13:15:09.033",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: mm: Fix the out of bound issue of vmemmap address\n\nIn sparse vmemmap model, the virtual address of vmemmap is calculated as:\n((struct page *)VMEMMAP_START - (phys_ram_base >> PAGE_SHIFT)).\nAnd the struct page's va can be calculated with an offset:\n(vmemmap + (pfn)).\n\nHowever, when initializing struct pages, kernel actually starts from the\nfirst page from the same section that phys_ram_base belongs to. If the\nfirst page's physical address is not (phys_ram_base >> PAGE_SHIFT), then\nwe get an va below VMEMMAP_START when calculating va for it's struct page.\n\nFor example, if phys_ram_base starts from 0x82000000 with pfn 0x82000, the\nfirst page in the same section is actually pfn 0x80000. During\ninit_unavailable_range(), we will initialize struct page for pfn 0x80000\nwith virtual address ((struct page *)VMEMMAP_START - 0x2000), which is\nbelow VMEMMAP_START as well as PCI_IO_END.\n\nThis commit fixes this bug by introducing a new variable\n'vmemmap_start_pfn' which is aligned with memory section size and using\nit to calculate vmemmap address instead of phys_ram_base."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: riscv: mm: Corrige el problema de salida de l\u00edmites de la direcci\u00f3n vmemmap En el modelo vmemmap disperso, la direcci\u00f3n virtual de vmemmap se calcula como: ((struct page *)VMEMMAP_START - (phys_ram_base >> PAGE_SHIFT)). Y la va de la p\u00e1gina de estructura se puede calcular con un desplazamiento: (vmemmap + (pfn)). Sin embargo, al inicializar las p\u00e1ginas de estructura, el kernel en realidad comienza desde la primera p\u00e1gina de la misma secci\u00f3n a la que pertenece phys_ram_base. Si la direcci\u00f3n f\u00edsica de la primera p\u00e1gina no es (phys_ram_base >> PAGE_SHIFT), obtenemos una va por debajo de VMEMMAP_START al calcular la va para su p\u00e1gina de estructura. Por ejemplo, si phys_ram_base comienza desde 0x82000000 con pfn 0x82000, la primera p\u00e1gina en la misma secci\u00f3n es en realidad pfn 0x80000. Durante init_unavailable_range(), inicializaremos struct page para pfn 0x80000 con direcci\u00f3n virtual ((struct page *)VMEMMAP_START - 0x2000), que est\u00e1 debajo de VMEMMAP_START y PCI_IO_END. Esta confirmaci\u00f3n corrige este error al introducir una nueva variable 'vmemmap_start_pfn' que est\u00e1 alineada con el tama\u00f1o de la secci\u00f3n de memoria y la usa para calcular la direcci\u00f3n vmemmap en lugar de phys_ram_base."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57946.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57946.json
index 09be585bdf9..425d83a97a8 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57946.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57946.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T13:15:09.137",
"lastModified": "2025-01-21T13:15:09.137",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-blk: don't keep queue frozen during system suspend\n\nCommit 4ce6e2db00de (\"virtio-blk: Ensure no requests in virtqueues before\ndeleting vqs.\") replaces queue quiesce with queue freeze in virtio-blk's\nPM callbacks. And the motivation is to drain inflight IOs before suspending.\n\nblock layer's queue freeze looks very handy, but it is also easy to cause\ndeadlock, such as, any attempt to call into bio_queue_enter() may run into\ndeadlock if the queue is frozen in current context. There are all kinds\nof ->suspend() called in suspend context, so keeping queue frozen in the\nwhole suspend context isn't one good idea. And Marek reported lockdep\nwarning[1] caused by virtio-blk's freeze queue in virtblk_freeze().\n\n[1] https://lore.kernel.org/linux-block/ca16370e-d646-4eee-b9cc-87277c89c43c@samsung.com/\n\nGiven the motivation is to drain in-flight IOs, it can be done by calling\nfreeze & unfreeze, meantime restore to previous behavior by keeping queue\nquiesced during suspend."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virtio-blk: no mantener la cola congelada durante la suspensi\u00f3n del sistema. Commit 4ce6e2db00de (\"virtio-blk: Aseg\u00farese de que no haya solicitudes en virtqueues antes de eliminar vqs\") reemplaza la inactividad de la cola con el congelamiento de la cola en las devoluciones de llamadas de PM de virtio-blk. Y la motivaci\u00f3n es drenar las E/S en vuelo antes de suspender. El congelamiento de la cola de la capa de bloque parece muy \u00fatil, pero tambi\u00e9n es f\u00e1cil causar un bloqueo, como, por ejemplo, cualquier intento de llamar a bio_queue_enter() puede encontrarse con un bloqueo si la cola est\u00e1 congelada en el contexto actual. Hay todo tipo de ->suspend() llamados en el contexto de suspensi\u00f3n, por lo que mantener la cola congelada en todo el contexto de suspensi\u00f3n no es una buena idea. Y Marek inform\u00f3 una advertencia de lockdep[1] causada por la cola congelada de virtio-blk en virtblk_freeze(). [1] https://lore.kernel.org/linux-block/ca16370e-d646-4eee-b9cc-87277c89c43c@samsung.com/ Dado que la motivaci\u00f3n es drenar las E/S en vuelo, se puede hacer llamando a congelar y descongelar, mientras tanto restaurar el comportamiento anterior manteniendo la cola inactiva durante la suspensi\u00f3n."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57947.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57947.json
index 2a299a07f01..b4795574e80 100644
--- a/CVE-2024/CVE-2024-579xx/CVE-2024-57947.json
+++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57947.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-23T14:15:25.293",
"lastModified": "2025-01-23T14:15:25.293",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_set_pipapo: fix initial map fill\n\nThe initial buffer has to be inited to all-ones, but it must restrict\nit to the size of the first field, not the total field size.\n\nAfter each round in the map search step, the result and the fill map\nare swapped, so if we have a set where f->bsize of the first element\nis smaller than m->bsize_max, those one-bits are leaked into future\nrounds result map.\n\nThis makes pipapo find an incorrect matching results for sets where\nfirst field size is not the largest.\n\nFollowup patch adds a test case to nft_concat_range.sh selftest script.\n\nThanks to Stefano Brivio for pointing out that we need to zero out\nthe remainder explicitly, only correcting memset() argument isn't enough."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_set_pipapo: arregla el relleno inicial del mapa El b\u00fafer inicial tiene que ser inicializado a todos unos, pero debe restringirlo al tama\u00f1o del primer campo, no al tama\u00f1o total del campo. Despu\u00e9s de cada ronda en el paso de b\u00fasqueda del mapa, el resultado y el mapa de relleno se intercambian, as\u00ed que si tenemos un conjunto donde f->bsize del primer elemento es menor que m->bsize_max, esos unos bits se filtran en el mapa de resultados de rondas futuras. Esto hace que pipapo encuentre resultados coincidentes incorrectos para conjuntos donde el tama\u00f1o del primer campo no es el m\u00e1s grande. El parche de seguimiento agrega un caso de prueba al script de autoprueba nft_concat_range.sh. Gracias a Stefano Brivio por se\u00f1alar que necesitamos poner a cero el resto expl\u00edcitamente, solo corregir el argumento memset() no es suficiente."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5784.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5784.json
index f3f92f914e0..36ffd227608 100644
--- a/CVE-2024/CVE-2024-57xx/CVE-2024-5784.json
+++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5784.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-30T04:15:08.193",
"lastModified": "2024-09-03T14:48:19.570",
- "vulnStatus": "Analyzed",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6466.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6466.json
index 69d3f699493..935953b69a1 100644
--- a/CVE-2024/CVE-2024-64xx/CVE-2024-6466.json
+++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6466.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
"published": "2025-01-21T10:15:07.990",
"lastModified": "2025-01-21T20:15:36.103",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NEC Corporation's WebSAM DeploymentManager v6.0 to v6.80 allows an attacker to reset configurations or restart products via network with X-FRAME-OPTIONS is not specified."
+ },
+ {
+ "lang": "es",
+ "value": "WebSAM DeploymentManager v6.0 a v6.80 de NEC Corporation permite a un atacante restablecer configuraciones o reiniciar productos a trav\u00e9s de la red con X-framework-OPTIONS no especificado."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7516.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7516.json
index f325f61f495..c7adb3e084e 100644
--- a/CVE-2024/CVE-2024-75xx/CVE-2024-7516.json
+++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7516.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-11-12T19:15:18.753",
"lastModified": "2024-11-21T17:15:25.520",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8722.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8722.json
index fd45849cbdf..6a810172fcc 100644
--- a/CVE-2024/CVE-2024-87xx/CVE-2024-8722.json
+++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8722.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-19T05:15:07.987",
"lastModified": "2025-01-19T05:15:07.987",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Import any XML or CSV File to WordPress PRO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 4.9.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Import any XML or CSV File to WordPress PRO para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta incluida, 4.9.7 debido a un escape de entrada desinfecci\u00f3n y de salida insuficiente. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador y superior, inyecten Scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9310.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9310.json
index 3dc33fa3f2d..a3b93d557f2 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9310.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9310.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "By utilizing software-defined radios and a custom low-latency processing pipeline, RF signals with spoofed location data can be transmitted to aircraft targets. This can lead to the appearance of fake aircraft on displays and potentially trigger undesired Resolution Advisories (RAs)."
+ },
+ {
+ "lang": "es",
+ "value": "Al utilizar radios definidas por software y un flujo de procesamiento personalizado de baja latencia, se pueden transmitir se\u00f1ales de RF con datos de ubicaci\u00f3n falsificados a objetivos a\u00e9reos. Esto puede provocar la aparici\u00f3n de aeronaves falsas en las pantallas y potencialmente activar avisos de resoluci\u00f3n no deseados."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0308.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0308.json
index 9640b1a1e17..7b406cf02bd 100644
--- a/CVE-2025/CVE-2025-03xx/CVE-2025-0308.json
+++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0308.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T06:15:27.880",
"lastModified": "2025-01-18T06:15:27.880",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ultimate Member \u2013 User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the search parameter in all versions up to, and including, 2.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Ultimate Member \u2013 User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin para WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del par\u00e1metro de b\u00fasqueda en todas las versiones hasta incluida, 2.9.1 debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0314.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0314.json
index c8b9b6dc6b2..c41692d71cd 100644
--- a/CVE-2025/CVE-2025-03xx/CVE-2025-0314.json
+++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0314.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "An issue has been discovered in GitLab CE/EE affecting all versions from 17.2 before 17.6.4, 17.7 before 17.7.3, and 17.8 before 17.8.1. Improper rendering of certain file types lead to cross-site scripting."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha descubierto un problema en GitLab CE/EE que afecta a todas las versiones desde la 17.2 hasta la 17.6.4, desde la 17.7 hasta la 17.7.3 y desde la 17.8 hasta la 17.8.1. La representaci\u00f3n incorrecta de ciertos tipos de archivos provoca cross-site scripting. "
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0318.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0318.json
index 76ab0866195..30668bf2b24 100644
--- a/CVE-2025/CVE-2025-03xx/CVE-2025-0318.json
+++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0318.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T06:15:28.017",
"lastModified": "2025-01-18T06:15:28.017",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ultimate Member \u2013 User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.9.1 through different error messages in the responses. This makes it possible for unauthenticated attackers to exfiltrate data from wp_usermeta table."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Ultimate Member \u2013 User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta incluida, 2.9.1 a trav\u00e9s de diferentes mensajes de error en las respuestas. Esto permite que atacantes no autenticados extraigan datos de la tabla wp_usermeta."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0369.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0369.json
index d2c23b8154d..3757afb755c 100644
--- a/CVE-2025/CVE-2025-03xx/CVE-2025-0369.json
+++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0369.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T07:15:09.720",
"lastModified": "2025-01-18T07:15:09.720",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The JetEngine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018list_tag\u2019 parameter in all versions up to, and including, 3.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento JetEngine para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro \u2018list_tag\u2019 en todas las versiones hasta la 3.6.2 y incluida, debido a un escape de entrada y salida insuficiente de desinfecci\u00f3n. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten Scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0371.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0371.json
index 879c170c74f..67115bfa324 100644
--- a/CVE-2025/CVE-2025-03xx/CVE-2025-0371.json
+++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0371.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-21T09:15:07.747",
"lastModified": "2025-01-21T09:15:07.747",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0377.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0377.json
index 5d4a8b3472d..de453577252 100644
--- a/CVE-2025/CVE-2025-03xx/CVE-2025-0377.json
+++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0377.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@hashicorp.com",
"published": "2025-01-21T16:15:14.290",
"lastModified": "2025-01-21T16:15:14.290",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HashiCorp\u2019s go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry."
+ },
+ {
+ "lang": "es",
+ "value": "El go-slug librer\u00eda de HashiCorp es vulnerable a un ataque de estilo zip-slip cuando se extrae una ruta proporcionada por el usuario que no existe de la entrada tar."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0430.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0430.json
index c5e08e99bd1..bb2e2f45d45 100644
--- a/CVE-2025/CVE-2025-04xx/CVE-2025-0430.json
+++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0430.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T18:15:30.920",
"lastModified": "2025-01-17T18:15:30.920",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Belledonne Communications Linphone-Desktop \n is vulnerable to a NULL Dereference vulnerability, which could allow a remote attacker to create a denial-of-service condition."
+ },
+ {
+ "lang": "es",
+ "value": "Belledonne Communications Linphone-Desktop es vulnerable a una vulnerabilidad de desreferencia NULL, que podr\u00eda permitir a un atacante remoto crear una condici\u00f3n de denegaci\u00f3n de servicio."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0450.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0450.json
index a34343b22e4..7051b9e7669 100644
--- a/CVE-2025/CVE-2025-04xx/CVE-2025-0450.json
+++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0450.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-21T11:15:10.593",
"lastModified": "2025-01-21T11:15:10.593",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Betheme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's custom JS functionality in all versions up to, and including, 27.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Betheme para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la funcionalidad JS personalizada del complemento en todas las versiones hasta incluida, 27.6.1 debido a la falta de desinfecci\u00f3n de entrada y el escape de salida en los atributos proporcionados por el usuario. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en las p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0476.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0476.json
index e41ea1e922f..f7ea86fcd71 100644
--- a/CVE-2025/CVE-2025-04xx/CVE-2025-0476.json
+++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0476.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": " Las versiones de aplicaciones m\u00f3viles de Mattermost <=2.22.0 no pueden manejar correctamente los nombres de archivos adjuntos especialmente manipulados, lo que permite que un atacante bloquee la aplicaci\u00f3n m\u00f3vil para cualquier usuario que haya abierto un canal que contenga el archivo adjunto especialmente manipulado."
+ "value": " Las versiones de aplicaciones m\u00f3viles de Mattermost <=2.22.0 no pueden gestionar correctamente los nombres de archivos adjuntos especialmente manipulados, lo que permite que un atacante bloquee la aplicaci\u00f3n m\u00f3vil para cualquier usuario que haya abierto un canal que contenga el archivo adjunto especialmente manipulado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0479.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0479.json
index b0b05654b6b..059d907a8c2 100644
--- a/CVE-2025/CVE-2025-04xx/CVE-2025-0479.json
+++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0479.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2025-01-20T12:15:23.563",
"lastModified": "2025-01-20T12:15:23.563",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "Esta vulnerabilidad existe en el enrutador CP Plus debido al manejo inseguro de los indicadores de cookies utilizados dentro de su interfaz web. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad interceptando transmisiones de datos durante una sesi\u00f3n HTTP en el sistema vulnerable. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir al atacante obtener informaci\u00f3n confidencial y comprometer el sistema objetivo."
+ "value": "Esta vulnerabilidad existe en el enrutador CP Plus debido a la gesti\u00f3n insegura de los indicadores de cookies utilizados dentro de su interfaz web. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad interceptando transmisiones de datos durante una sesi\u00f3n HTTP en el sistema vulnerable. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir al atacante obtener informaci\u00f3n confidencial y comprometer el sistema objetivo."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0515.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0515.json
index 1e19de6daa1..e895996d9dd 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0515.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0515.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T07:15:09.903",
"lastModified": "2025-01-18T07:15:09.903",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Buzz Club \u2013 Night Club, DJ and Music Festival Event WordPress Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cmsmasters_hide_admin_notice' function in all versions up to, and including, 2.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 'hide' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration."
+ },
+ {
+ "lang": "es",
+ "value": "El tema Buzz Club \u2013 Night Club, DJ and Music Festival Event WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos que puede provocar una denegaci\u00f3n de servicio debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n 'cmsmasters_hide_admin_notice' en todas las versiones hasta incluida, 2.0.4. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen los valores de las opciones a 'ocultar' en el sitio de WordPress. Esto se puede aprovechar para actualizar una opci\u00f3n que crear\u00eda un error en el sitio y denegar\u00eda el servicio a usuarios leg\u00edtimos o se puede utilizar para establecer algunos valores como verdaderos, como el registro."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json
index 013cc29b143..7bc14e0485e 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A vulnerability classified as critical was found in code-projects Admission Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /signupconfirm.php. The manipulation of the argument in_eml leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Admission Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /signupconfirm.php. La manipulaci\u00f3n del argumento in_eml provoca una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0528.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0528.json
index d68bcb01a3a..abff08b9d93 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0528.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0528.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Tenda AC8, AC10 and AC18 16.03.10.20. Affected by this issue is some unknown functionality of the file /goform/telnet of the component HTTP Request Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Tenda AC8, AC10 y AC18 16.03.10.20. Este problema afecta a una funcionalidad desconocida del archivo /goform/telnet del componente HTTP Request Handler. La manipulaci\u00f3n conduce a la inyecci\u00f3n de comandos. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json
index a4fd7b027e7..1a400035247 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in code-projects Train Ticket Reservation System 1.0. This affects an unknown part of the component Login Form. The manipulation of the argument username leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Train Ticket Reservation System 1.0. Afecta a una parte desconocida del componente Login Form. La manipulaci\u00f3n del argumento username provoca un desbordamiento del b\u00fafer basado en la pila. Es necesario atacar de forma local. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0530.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0530.json
index 224d21a1153..dd433b048d4 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0530.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0530.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-17T16:15:33.937",
"lastModified": "2025-01-17T16:15:33.937",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as problematic. This vulnerability affects unknown code of the file /_parse/_feedback_system.php. The manipulation of the argument type leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en code-projects Job Recruitment 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /_parse/_feedback_system.php. La manipulaci\u00f3n del tipo de argumento conduce a Cross Site Scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0531.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0531.json
index fc4c7c78d3a..736896a4722 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0531.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0531.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-17T16:15:34.250",
"lastModified": "2025-01-17T16:15:34.250",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Chat System 1.0 and classified as critical. This issue affects some unknown processing of the file /user/leaveroom.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Chat System 1.0 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /user/leaveroom.php. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0532.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0532.json
index 4e946e10c36..26fe6ef30cb 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0532.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0532.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-17T18:15:31.237",
"lastModified": "2025-01-21T16:15:14.560",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0533.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0533.json
index 5695f4e330e..a26dbe9fe1e 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0533.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0533.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-17T18:15:31.577",
"lastModified": "2025-01-17T21:15:10.487",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 1000 Projects Campaign Management System Platform for Women 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Code/sc_login.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en 1000 Projects Campaign Management System Platform for Women 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /Code/sc_login.php. La manipulaci\u00f3n del argumento uname conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0534.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0534.json
index e3950c2f3fe..73df396ecc0 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0534.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0534.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-17T19:15:28.777",
"lastModified": "2025-01-17T21:15:10.650",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 1000 Projects Campaign Management System Platform for Women 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Code/loginnew.php. The manipulation of the argument Username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en 1000 Projects Campaign Management System Platform for Women 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /Code/loginnew.php. La manipulaci\u00f3n del argumento Username conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0535.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0535.json
index 728cf6a8ca9..ce6a9493e3b 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0535.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0535.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-17T19:15:28.990",
"lastModified": "2025-01-21T17:15:16.677",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0536.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0536.json
index 28d5ef0325c..25217bf9ae5 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0536.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0536.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-17T20:15:29.583",
"lastModified": "2025-01-17T20:15:29.583",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in 1000 Projects Attendance Tracking Management System 1.0. This vulnerability affects unknown code of the file /admin/edit_action.php. The manipulation of the argument attendance_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en 1000 Projects Attendance Tracking Management System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/edit_action.php. La manipulaci\u00f3n del argumento attendance_id conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0537.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0537.json
index f4e78bc5d11..ccb44284226 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0537.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0537.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-17T20:15:29.767",
"lastModified": "2025-01-18T09:15:07.307",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in code-projects Car Rental Management System 1.0. This issue affects some unknown processing of the file /admin/manage-pages.php. The manipulation of the argument pgdetails leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Car Rental Management System 1.0. Este problema afecta a algunos procesos desconocidos del archivo /admin/manage-pages.php. La manipulaci\u00f3n del argumento pgdetails conduce a Cross Site Scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0538.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0538.json
index 8b5aa236113..8651c37ad0b 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0538.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0538.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-17T21:15:10.847",
"lastModified": "2025-01-18T09:15:07.570",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in code-projects Tourism Management System 1.0. Affected is an unknown function of the file /admin/manage-pages.php. The manipulation of the argument pgedetails leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Tourism Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /admin/manage-pages.php. La manipulaci\u00f3n del argumento pgedetails conduce a Cross Site Scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0540.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0540.json
index 521e830edc7..6a6bbf5ca43 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0540.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0540.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-17T21:15:11.037",
"lastModified": "2025-01-17T21:15:11.037",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /expadd.php. The manipulation of the argument expcat leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en itsourcecode Tailoring Management System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /expadd.php. La manipulaci\u00f3n del argumento expcat provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0541.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0541.json
index 05d9dccbfb8..5fb02963b12 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0541.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0541.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-17T22:15:29.337",
"lastModified": "2025-01-17T22:15:29.337",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/edit_member.php. The manipulation of the argument name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Codezips Gym Management System 1.0 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /dashboard/admin/edit_member.php. La manipulaci\u00f3n del nombre del argumento conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. La vulnerabilidad se ha divulgado al p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0554.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0554.json
index f5c2bef7c83..4d97902a742 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0554.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0554.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-18T06:15:28.160",
"lastModified": "2025-01-18T06:15:28.160",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Podlove Podcast Publisher plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Feed Name value in version <= 4.1.25 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Podlove Podcast Publisher para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del valor del nombre del feed en la versi\u00f3n <= 4.1.25 debido a una cantidad insuficiente de desinfecci\u00f3n de entrada y de escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de administrador, inyecten Scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones donde se ha deshabilitado unfiltered_html."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0557.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0557.json
index 5fa9521ef1d..4c375c656ab 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0557.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0557.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-18T09:15:07.710",
"lastModified": "2025-01-18T09:15:07.710",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in Hyland Alfresco Community Edition and Alfresco Enterprise Edition up to 6.2.2. This affects an unknown part of the file /share/s/ of the component URL Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0 is able to address this issue. It is recommended to upgrade the affected component."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Hyland Alfresco Community Edition y Alfresco Enterprise Edition hasta la versi\u00f3n 6.2.2. Afecta a una parte desconocida del archivo /share/s/ del componente URL Handler. La manipulaci\u00f3n conduce a Cross Site Scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 7.0 puede solucionar este problema. Se recomienda actualizar el componente afectado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0558.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0558.json
index 9d7b10dd22c..0484d6ae3ad 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0558.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0558.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-18T13:15:20.417",
"lastModified": "2025-01-18T13:15:20.417",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in TDuckCloud tduck-platform up to 4.0. This vulnerability affects the function QueryProThemeRequest of the file src/main/java/com/tduck/cloud/form/request/QueryProThemeRequest.java. The manipulation of the argument color leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en TDuckCloud tduck-platform hasta la versi\u00f3n 4.0. Esta vulnerabilidad afecta a la funci\u00f3n QueryProThemeRequest del archivo src/main/java/com/tduck/cloud/form/request/QueryProThemeRequest.java. La manipulaci\u00f3n del argumento color provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0559.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0559.json
index 28cf3a66a06..aa670e4206a 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0559.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0559.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-18T14:15:25.420",
"lastModified": "2025-01-18T14:15:25.420",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in Campcodes School Management Software 1.0. This issue affects some unknown processing of the file /create-id-card of the component Create Id Card Page. The manipulation of the argument ID Card Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Campcodes School Management Software 1.0. Este problema afecta a algunos procesos desconocidos del archivo /create-id-card del componente Create Id Card Page. La manipulaci\u00f3n del argumento ID Card Title conduce a Cross Site Scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0560.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0560.json
index 0c14fa30a67..4f181d1cce2 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0560.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0560.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-18T15:15:08.343",
"lastModified": "2025-01-18T15:15:08.343",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in CampCodes School Management Software 1.0. Affected is an unknown function of the file /photo-gallery of the component Photo Gallery Page. The manipulation of the argument Description leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en CampCodes School Management Software 1.0. Se trata de una funci\u00f3n desconocida del archivo /photo-gallery del componente Photo Gallery Page. La manipulaci\u00f3n del argumento Description conduce a Cross Site Scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0561.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0561.json
index ab6ad824456..2152c6ef758 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0561.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0561.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-19T00:15:25.077",
"lastModified": "2025-01-19T00:15:25.077",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in itsourcecode Farm Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigno leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en itsourcecode Farm Management System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /add-pig.php. La manipulaci\u00f3n del argumento pigno conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0562.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0562.json
index 51976f7f226..ec0b8ca0a9f 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0562.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0562.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-19T02:15:24.380",
"lastModified": "2025-01-19T02:15:24.380",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/health_status_entry.php. The manipulation of the argument usrid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Codezips Gym Management System 1.0 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /dashboard/admin/health_status_entry.php. La manipulaci\u00f3n del argumento usrid conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0563.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0563.json
index c1924516672..8122e50b529 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0563.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0563.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-19T02:15:24.560",
"lastModified": "2025-01-19T02:15:24.560",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been classified as critical. Affected is an unknown function of the file /dash/update.php. The manipulation of the argument uname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en code-projects Fantasy-Cricket 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /dash/update.php. La manipulaci\u00f3n del argumento uname provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0564.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0564.json
index 937416624a7..b5e25d34fd0 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0564.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0564.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-19T04:15:07.090",
"lastModified": "2025-01-19T04:15:07.090",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /authenticate.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en code-projects Fantasy-Cricket 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /authenticate.php. La manipulaci\u00f3n del argumento uname conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0565.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0565.json
index db191bf2e29..99fb3fccd0d 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0565.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0565.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-19T06:15:06.820",
"lastModified": "2025-01-19T06:15:06.820",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ZZCMS 2023. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en ZZCMS 2023. Se la ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /index.php. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0566.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0566.json
index 039efbe76e5..11d567bae58 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0566.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0566.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-19T07:15:06.407",
"lastModified": "2025-01-19T07:15:06.407",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Tenda AC15 15.13.07.13. This affects the function formSetDevNetName of the file /goform/SetDevNetName. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Tenda AC15 15.13.07.13. Afecta a la funci\u00f3n formSetDevNetName del archivo /goform/SetDevNetName. La manipulaci\u00f3n del argumento mac provoca un desbordamiento del b\u00fafer basado en la pila. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0567.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0567.json
index ab34fefbc48..b0b0f2f890c 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0567.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0567.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-19T08:15:06.637",
"lastModified": "2025-01-19T08:15:06.637",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in Epic Games Launcher up to 17.2.1. This vulnerability affects unknown code in the library profapi.dll of the component Installer. The manipulation leads to untrusted search path. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitation appears to be difficult."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Epic Games Launcher hasta la versi\u00f3n 17.2.1. Esta vulnerabilidad afecta a c\u00f3digo desconocido en el archivo librer\u00eda profapi.dll del componente Installer. La manipulaci\u00f3n conduce a una ruta de b\u00fasqueda no confiable. Es necesario atacar localmente. La complejidad de un ataque es bastante alta. La explotaci\u00f3n parece ser dif\u00edcil."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0575.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0575.json
index 9b2156ad220..a733c5f4e84 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0575.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0575.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-19T23:15:20.013",
"lastModified": "2025-01-19T23:15:20.013",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Union Bank of India Vyom 8.0.34 on Android and classified as problematic. This vulnerability affects unknown code of the component Rooting Detection. The manipulation leads to protection mechanism failure. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en Union Bank of India Vyom 8.0.34 para Android y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del componente Rooting Detection. La manipulaci\u00f3n provoca un fallo del mecanismo de protecci\u00f3n. El ataque debe abordarse de forma local. La complejidad de un ataque es bastante alta. La explotaci\u00f3n parece ser dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0576.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0576.json
index f64553f0e0d..e2a57330ea3 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0576.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0576.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-20T00:15:16.320",
"lastModified": "2025-01-20T00:15:16.320",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Mobotix M15 4.3.4.83 and classified as problematic. This issue affects some unknown processing of the file /control/player?center&eventlist&pda&dummy_for_reload=1736177631&p_evt. The manipulation of the argument p_qual leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Mobotix M15 4.3.4.83 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del archivo /control/player?center&eventlist&pda&dummy_for_reload=1736177631&p_evt. La manipulaci\u00f3n del argumento p_qual conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0578.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0578.json
index 55e6196728f..a3049c72947 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0578.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0578.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-20T02:15:18.913",
"lastModified": "2025-01-20T02:15:18.913",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Facile Sistemas Cloud Apps up to 20250107. It has been classified as problematic. Affected is an unknown function of the file /account/forgotpassword of the component Password Reset Handler. The manipulation of the argument reterros leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en lFacile Sistemas Cloud Apps hasta la versi\u00f3n 20250107. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo /account/forgotpassword del componente Password Reset Handler. La manipulaci\u00f3n del argumento reterros provoca cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0579.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0579.json
index 28ca96b07ec..7bf053d2aa6 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0579.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0579.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-20T03:15:08.353",
"lastModified": "2025-01-20T03:15:08.353",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Shiprocket Module 3/4 on OpenCart. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php?route=extension/shiprocket/module/restapi of the component REST API Module. The manipulation of the argument x-username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en Shiprocket Module 3/4 on OpenCart. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /index.php?route=extension/shiprocket/module/restapi del componente REST API Module. La manipulaci\u00f3n del argumento x-username conduce a una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0580.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0580.json
index 48eb0f9354d..5d9c38d714f 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0580.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0580.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-20T03:15:08.540",
"lastModified": "2025-01-20T03:15:08.540",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Shiprocket Module 3 on OpenCart. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php?route=extension/module/rest_api&action=getOrders of the component REST API Module. The manipulation of the argument contentHash leads to incorrect authorization. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en Shiprocket Module 3 on OpenCart. Se ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /index.php?route=extension/module/rest_api&action=getOrders del componente REST API Module. La manipulaci\u00f3n del argumento contentHash provoca una autorizaci\u00f3n incorrecta. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. La explotaci\u00f3n se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0581.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0581.json
index 93654b8cf70..683dbf1a367 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0581.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0581.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-20T03:15:08.737",
"lastModified": "2025-01-20T03:15:08.737",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in CampCodes School Management Software 1.0. This affects an unknown part of the file /chat/group/send of the component Chat History. The manipulation of the argument message leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en CampCodes School Management Software 1.0. Afecta a una parte desconocida del archivo /chat/group/send del componente Chat History. La manipulaci\u00f3n del argumento message provoca ataques de cross site scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0582.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0582.json
index c6861057c26..5af0ef5f857 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0582.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0582.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-20T03:15:08.930",
"lastModified": "2025-01-20T03:15:08.930",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in itsourcecode Farm Management System up to 1.0. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigphoto leads to unrestricted upload. The attack can be initiated remotely."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en itsourcecode Farm Management System hasta la versi\u00f3n 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /add-pig.php. La manipulaci\u00f3n del argumento pigphoto provoca una subida sin restricciones. El ataque puede iniciarse de forma remota."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0583.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0583.json
index 2cb9590501f..12dc92a1d3f 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0583.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0583.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-01-20T02:15:19.767",
"lastModified": "2025-01-20T02:15:19.767",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The a+HRD from aEnrich Technology has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks."
+ },
+ {
+ "lang": "es",
+ "value": "a+HRD de aEnrich Technology tiene una vulnerabilidad de Cross-site Scripting reflejado, que permite a atacantes remotos no autenticados ejecutar c\u00f3digos JavaScript arbitrarios en el navegador del usuario a trav\u00e9s de ataques de phishing."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0584.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0584.json
index c297da046f5..e61314dcebe 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0584.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0584.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-01-20T03:15:09.120",
"lastModified": "2025-01-20T03:15:09.120",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The a+HRD from aEnrich Technology has a Server-side Request Forgery, allowing unauthenticated remote attackers to exploit this vulnerability to probe internal network."
+ },
+ {
+ "lang": "es",
+ "value": "a+HRD de aEnrich Technology tiene un Server-side Request Forgery, lo que permite a atacantes remotos no autenticados explotar esta vulnerabilidad para sondear la red interna."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0585.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0585.json
index cd97dd12d89..663194cc4fa 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0585.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0585.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-01-20T03:15:09.283",
"lastModified": "2025-01-20T03:15:09.283",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The a+HRD from aEnrich Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents."
+ },
+ {
+ "lang": "es",
+ "value": "a+HRD de aEnrich Technology tiene una vulnerabilidad de inyecci\u00f3n SQL, que permite a atacantes remotos no autenticados inyectar comandos SQL arbitrarios para leer, modificar y eliminar contenidos de la base de datos."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0586.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0586.json
index 06627fca497..ce21fe0cbcc 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0586.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0586.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-01-20T03:15:09.433",
"lastModified": "2025-01-20T03:15:09.433",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The a+HRD from aEnrich Technology has an Insecure Deserialization vulnerability, allowing remote attackers with database modification privileges and regular system privileges to perform arbitrary code execution."
+ },
+ {
+ "lang": "es",
+ "value": "a+HRD de aEnrich Technology tiene una vulnerabilidad de deserializaci\u00f3n insegura, que permite a atacantes remotos con privilegios de modificaci\u00f3n de base de datos y privilegios regulares del sistema realizar la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0590.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0590.json
index c1466d7849e..5b6c7df34ae 100644
--- a/CVE-2025/CVE-2025-05xx/CVE-2025-0590.json
+++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0590.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",
"published": "2025-01-20T07:17:10.383",
"lastModified": "2025-01-21T15:15:14.117",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0604.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0604.json
index 72d94523450..4bc91c16f5f 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0604.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0604.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A flaw was found in Keycloak. When an Active Directory user resets their password, the system updates it without performing an LDAP bind to validate the new credentials against AD. This vulnerability allows users whose AD accounts are expired or disabled to regain access in Keycloak, bypassing AD restrictions. The issue enables authentication bypass and could allow unauthorized access under certain conditions."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una falla en Keycloak. Cuando un usuario de Active Directory restablece su contrase\u00f1a, sistema la actualiza sin realizar un enlace LDAP para validar las nuevas credenciales contra AD. Esta vulnerabilidad permite que los usuarios cuyas cuentas de AD hayan expirado o est\u00e9n deshabilitadas recuperen el acceso en Keycloak, eludiendo las restricciones de AD. El problema permite omitir la autenticaci\u00f3n y podr\u00eda permitir el acceso no autorizado en determinadas condiciones."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0611.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0611.json
index 2a2408d5dd3..7c4e73b7101 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0611.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0611.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Object corruption in V8 in Google Chrome prior to 132.0.6834.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
+ },
+ {
+ "lang": "es",
+ "value": "La corrupci\u00f3n de objetos en la versi\u00f3n 8 de Google Chrome anterior a la 132.0.6834.110 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulado. (Gravedad de seguridad de Chromium: Alta)"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0612.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0612.json
index a428b4add79..e5af458eb67 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0612.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0612.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Out of bounds memory access in V8 in Google Chrome prior to 132.0.6834.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
+ },
+ {
+ "lang": "es",
+ "value": "El acceso a la memoria fuera de los l\u00edmites en la versi\u00f3n 8 de Google Chrome anterior a la versi\u00f3n 132.0.6834.110 permiti\u00f3 que un atacante remoto explotara potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulado. (Gravedad de seguridad de Chromium: Alta)"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0614.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0614.json
index dd37da2a663..b894aeca0c5 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0614.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0614.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-21T12:15:27.580",
"lastModified": "2025-01-21T12:15:27.580",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Input validation vulnerability in Qualifio's Wheel of Fortune. This vulnerability could allow an attacker to modify a single email to contain upper and lower case characters in order to access the application and win prizes as many times as wanted."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de validaci\u00f3n de entrada en la Ruleta de la Fortuna de Qualifio. Esta vulnerabilidad podr\u00eda permitir a un atacante modificar un \u00fanico correo electr\u00f3nico para que contenga caracteres en may\u00fasculas y min\u00fasculas con el fin de acceder a la aplicaci\u00f3n y ganar premios tantas veces como desee."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0615.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0615.json
index a3ac5028463..8ce77fce6d1 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0615.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0615.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-21T12:15:27.737",
"lastModified": "2025-01-21T12:15:27.737",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Input validation vulnerability in Qualifio's Wheel of Fortune. This vulnerability allows an attacker to modify an email to contain the \u2018+\u2019 symbol to access the application and win prizes as many times as wanted."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de validaci\u00f3n de entrada en la Ruleta de la Fortuna de Qualifio. Esta vulnerabilidad permite a un atacante modificar un correo electr\u00f3nico para que contenga el s\u00edmbolo \u2018+\u2019 para acceder a la aplicaci\u00f3n y ganar premios tantas veces como desee."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0619.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0619.json
index 964a6f0947a..fe85ebf877b 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0619.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0619.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Unsafe password recovery from configuration in M-Files Server before 25.1 allows a highly privileged user to recover external connector passwords"
+ },
+ {
+ "lang": "es",
+ "value": "La recuperaci\u00f3n de contrase\u00f1as no seguras de la configuraci\u00f3n en M-Files Server anterior a la versi\u00f3n 25.1 permite que un usuario con altos privilegios recupere contrase\u00f1as de conectores externos"
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0625.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0625.json
index 7f9eeca0801..1e07e75203a 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0625.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0625.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in CampCodes School Management Software 1.0. This affects an unknown part of the component Attachment Handler. The manipulation leads to improper control of resource identifiers. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "CampCodes School Management Software 1.0 se ha detectado una vulnerabilidad clasificada como problem\u00e1tica. Afecta a una parte desconocida del componente Attachment Handler. La manipulaci\u00f3n conduce a un control inadecuado de los identificadores de recursos. Es posible iniciar el ataque de forma remota. La complejidad del ataque es bastante alta. Se dice que la explotaci\u00f3n es dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0635.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0635.json
index 40367e7d5ad..fc9c33cb84c 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0635.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0635.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Denial of service condition in M-Files Server in versions before \n\n25.1.14445.5 allows an unauthenticated user to consume computing resources in certain conditions."
+ },
+ {
+ "lang": "es",
+ "value": "La condici\u00f3n de denegaci\u00f3n de servicio en M-Files Server en versiones anteriores a 25.1.14445.5 permite que un usuario no autenticado consuma recursos inform\u00e1ticos en determinadas condiciones."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0637.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0637.json
index 6ccca8841a7..caee5f3c2c7 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0637.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0637.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-23T16:15:36.617",
"lastModified": "2025-01-23T16:15:36.617",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "It has been found that the Beta10 software does not provide for proper authorisation control in multiple areas of the application. This deficiency could allow a malicious actor, without authentication, to access private areas and/or areas intended for other roles. The vulnerability has been identified at least in the file or path \u2018/app/tools.html\u2019."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado que el software Beta10 no contempla un control adecuado de las autorizaciones en m\u00faltiples \u00e1reas de la aplicaci\u00f3n. Esta deficiencia podr\u00eda permitir a un actor malintencionado acceder, sin autenticaci\u00f3n, a \u00e1reas privadas y/o destinadas a otros roles. La vulnerabilidad ha sido identificada al menos en el archivo o ruta \u2018/app/tools.html\u2019."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0638.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0638.json
index 28e7ab2e9a7..ad77ae1f64d 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0638.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0638.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The initial code parsing the manifest did not check the content of the file names yet later code assumed that it was checked and panicked when encountering illegal characters, resulting in a crash of Routinator."
+ },
+ {
+ "lang": "es",
+ "value": "El c\u00f3digo inicial que analiza el manifiesto no verifica el contenido de los nombres de los archivos, pero el c\u00f3digo posterior asumi\u00f3 que estaba verificado y entr\u00f3 en p\u00e1nico al encontrar caracteres ilegales, lo que provoc\u00f3 un bloqueo de Routinator."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0648.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0648.json
index 29450980b4a..e0751dd72ef 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0648.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0648.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Unexpected server crash in database driver in M-Files Server before 25.1.14445.5 allows a highly privileged attacker to cause denial of service via configuration change."
+ },
+ {
+ "lang": "es",
+ "value": "Una falla inesperada del servidor en el controlador de base de datos en M-Files Server anterior a 25.1.14445.5 permite que un atacante altamente privilegiado provoque una denegaci\u00f3n de servicio a trav\u00e9s de un cambio de configuraci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0650.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0650.json
index 12c150d0ab6..2d91fa6c88d 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0650.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0650.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-23T17:15:22.163",
"lastModified": "2025-01-23T18:15:33.110",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the Open Virtual Network (OVN). Specially crafted UDP packets may bypass egress access control lists (ACLs) in OVN installations configured with a logical switch with DNS records set on it and if the same switch has any egress ACLs configured. This issue can lead to unauthorized access to virtual machines and containers running on the OVN network."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una falla en Open Virtual Network (OVN). Los paquetes UDP manipulados en particular pueden eludir las listas de control de acceso (ACL) de salida en instalaciones OVN configuradas con un conmutador l\u00f3gico con registros DNS configurados en \u00e9l y si el mismo conmutador tiene alguna ACL de salida configurada. Este problema puede provocar acceso no autorizado a m\u00e1quinas virtuales y contenedores que se ejecutan en la red OVN."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0651.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0651.json
index 8f753a08e13..9317414f28b 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0651.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0651.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Privilege Management vulnerability in Cloudflare WARP on Windows allows File Manipulation.\n\nUser with a low system privileges\u00a0 can create a set of symlinks inside the\u00a0C:\\ProgramData\\Cloudflare\\warp-diag-partials folder. After triggering the 'Reset all settings\" option the WARP service will delete the files that the symlink was pointing to. Given the WARP service operates with System privileges this might lead to deleting files owned by the System user.\nThis issue affects WARP: before 2024.12.492.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de administraci\u00f3n de privilegios incorrecta en Cloudflare WARP en Windows permite la manipulaci\u00f3n de archivos. El usuario con privilegios de sistema bajos puede crear un conjunto de enlaces simb\u00f3licos dentro de la carpeta C:\\ProgramData\\Cloudflare\\warp-diag-partials. Despu\u00e9s de activar la opci\u00f3n \"Restablecer todas las configuraciones\", el servicio WARP eliminar\u00e1 los archivos a los que apuntaba el enlace simb\u00f3lico. Dado que el servicio WARP opera con privilegios de System, esto podr\u00eda provocar la eliminaci\u00f3n de archivos propiedad del usuario de System. Este problema afecta a WARP: antes de 2024.12.492.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0693.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0693.json
index 389188ae497..6a63baaf44d 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0693.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0693.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Variable response times in the AWS Sign-in IAM user login flow allowed for the use of brute force enumeration techniques to identify valid IAM usernames in an arbitrary AWS account."
+ },
+ {
+ "lang": "es",
+ "value": "Los tiempos de respuesta variables en el flujo de inicio de sesi\u00f3n de usuario de IAM de AWS Sign-in permitieron el uso de t\u00e9cnicas de enumeraci\u00f3n de fuerza bruta para identificar nombres de usuario de IAM v\u00e1lidos en una cuenta de AWS arbitraria."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20123.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20123.json
index ec90496d549..6fd0c16dc84 100644
--- a/CVE-2025/CVE-2025-201xx/CVE-2025-20123.json
+++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20123.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2025-20123",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2025-01-08T16:15:38.150",
"lastModified": "2025-01-08T16:15:38.150",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20126.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20126.json
index c53bd1f82fc..21d8d475067 100644
--- a/CVE-2025/CVE-2025-201xx/CVE-2025-20126.json
+++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20126.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2025-20126",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2025-01-08T16:15:38.357",
"lastModified": "2025-01-08T19:15:38.553",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
@@ -54,7 +54,7 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thousandeyes-cert-pqtJUv9N",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20128.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20128.json
index cc78dc41386..d1ed08991c2 100644
--- a/CVE-2025/CVE-2025-201xx/CVE-2025-20128.json
+++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20128.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.\r\nFor a description of this vulnerability, see the .\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad en la rutina de descifrado Object Linking and Embedding 2 (OLE2) de ClamAV podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a un desbordamiento de enteros en una comprobaci\u00f3n de los l\u00edmites que permite una lectura de desbordamiento de b\u00fafer de mont\u00f3n. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un archivo manipulado con contenido OLE2 para que ClamAV lo escanee en un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante terminar el proceso de escaneo de ClamAV, lo que provocar\u00eda una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el software afectado. Para obtener una descripci\u00f3n de esta vulnerabilidad, consulte el . Cisco ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20156.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20156.json
index 3a24141e004..0e9c2e326cb 100644
--- a/CVE-2025/CVE-2025-201xx/CVE-2025-20156.json
+++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20156.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A vulnerability in the REST API of Cisco Meeting Management could allow a remote, authenticated attacker with low privileges to elevate privileges to administrator on an affected device.\r\n\r\nThis vulnerability exists because proper authorization is not enforced upon REST API users. An attacker could exploit this vulnerability by sending API requests to a specific endpoint. A successful exploit could allow the attacker to gain administrator-level control over edge nodes that are managed by Cisco Meeting Management."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad en la API REST de Cisco Meeting Management podr\u00eda permitir que un atacante remoto autenticado con privilegios bajos eleve los permisos a administrador en un dispositivo afectado. Esta vulnerabilidad existe porque no se aplica la autorizaci\u00f3n adecuada a los usuarios de la API REST. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes de API a un endpoint espec\u00edfico. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante obtener control a nivel de administrador sobre los nodos perimetrales administrados por Cisco Meeting Management."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20165.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20165.json
index 733b686e444..67cbe986cbe 100644
--- a/CVE-2025/CVE-2025-201xx/CVE-2025-20165.json
+++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20165.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad en el subsistema de procesamiento SIP de Cisco BroadWorks podr\u00eda permitir que un atacante remoto no autenticado detenga el procesamiento de solicitudes SIP entrantes, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a una gesti\u00f3n inadecuada de la memoria para ciertas solicitudes SIP. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una gran cantidad de solicitudes SIP a un sistema afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante agote la memoria asignada a los servidores de red Cisco BroadWorks que manejan el tr\u00e1fico SIP. Si no hay memoria disponible, los servidores de red ya no pueden procesar solicitudes entrantes, lo que da como resultado una condici\u00f3n de DoS que requiere intervenci\u00f3n manual para recuperarse."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20166.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20166.json
index dcd94959c37..8fbd88a4adf 100644
--- a/CVE-2025/CVE-2025-201xx/CVE-2025-20166.json
+++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20166.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2025-20166",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2025-01-08T17:15:16.990",
"lastModified": "2025-01-08T17:15:16.990",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20167.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20167.json
index 0d4ec494837..1a1b3a62127 100644
--- a/CVE-2025/CVE-2025-201xx/CVE-2025-20167.json
+++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20167.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2025-20167",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2025-01-08T17:15:17.163",
"lastModified": "2025-01-08T17:15:17.163",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20168.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20168.json
index c7f6936a084..a4724ff1b58 100644
--- a/CVE-2025/CVE-2025-201xx/CVE-2025-20168.json
+++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20168.json
@@ -1,6 +1,6 @@
{
"id": "CVE-2025-20168",
- "sourceIdentifier": "ykramarz@cisco.com",
+ "sourceIdentifier": "psirt@cisco.com",
"published": "2025-01-08T17:15:17.323",
"lastModified": "2025-01-08T17:15:17.323",
"vulnStatus": "Awaiting Analysis",
@@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
},
"weaknesses": [
{
- "source": "ykramarz@cisco.com",
+ "source": "psirt@cisco.com",
"type": "Primary",
"description": [
{
@@ -54,11 +54,11 @@
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU",
- "source": "ykramarz@cisco.com"
+ "source": "psirt@cisco.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20617.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20617.json
index 8583259b1b7..e5fc7ee0a4c 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20617.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20617.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-01-22T06:15:14.170",
"lastModified": "2025-01-22T06:15:14.170",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. If this vulnerability is exploited, an arbitrary OS command may be executed by an attacker who can access the affected product with an administrative account."
+ },
+ {
+ "lang": "es",
+ "value": "Existe un problema de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo ('Inyecci\u00f3n de comando del sistema operativo') en el firmware UD-LT2 Ver.1.00.008_SE y anteriores. Si se explota esta vulnerabilidad, un atacante que pueda acceder al producto afectado con una cuenta administrativa puede ejecutar un comando arbitrario del sistema operativo."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20621.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20621.json
index ff74b6e7a38..a926e288ac3 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20621.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20621.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": " Las versiones de Mattermost 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 no manejan adecuadamente las publicaciones con archivos adjuntos que contienen campos que no se pueden convertir a una cadena, lo que permite a un atacante hacer que la aplicaci\u00f3n web se bloquee al crear y enviar dicha publicaci\u00f3n a un canal."
+ "value": " Las versiones de Mattermost 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 no gestionan adecuadamente las publicaciones con archivos adjuntos que contienen campos que no se pueden convertir a una cadena, lo que permite a un atacante hacer que la aplicaci\u00f3n web se bloquee al crear y enviar dicha publicaci\u00f3n a un canal."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20630.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20630.json
index d26b986a723..2a8578759c6 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20630.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20630.json
@@ -12,7 +12,7 @@
},
{
"lang": "es",
- "value": "Las versiones de Mattermost Mobile <=2.22.0 no manejan adecuadamente las publicaciones con archivos adjuntos que contienen campos que no se pueden convertir a una cadena, lo que permite a un atacante provocar que el m\u00f3vil se bloquee al crear y enviar dicha publicaci\u00f3n a un canal."
+ "value": "Las versiones de Mattermost Mobile <=2.22.0 no gestionan adecuadamente las publicaciones con archivos adjuntos que contienen campos que no se pueden convertir a una cadena, lo que permite a un atacante provocar que el m\u00f3vil se bloquee al crear y enviar dicha publicaci\u00f3n a un canal."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21185.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21185.json
index 6f060e0de36..191183f8e77 100644
--- a/CVE-2025/CVE-2025-211xx/CVE-2025-21185.json
+++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21185.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-01-17T20:15:30.227",
"lastModified": "2025-01-17T20:15:30.227",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Microsoft Edge (basado en Chromium)"
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21313.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21313.json
index 9cb6e965a02..e925328cedc 100644
--- a/CVE-2025/CVE-2025-213xx/CVE-2025-21313.json
+++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21313.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-01-14T18:15:55.007",
"lastModified": "2025-01-14T18:15:55.007",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21314.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21314.json
index 0b82318868a..cf1615495ae 100644
--- a/CVE-2025/CVE-2025-213xx/CVE-2025-21314.json
+++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21314.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-01-14T18:15:55.163",
"lastModified": "2025-01-14T18:15:55.163",
- "vulnStatus": "Awaiting Analysis",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json
index 726f89db491..e36176057c1 100644
--- a/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json
+++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-01-17T20:15:46.117",
"lastModified": "2025-01-17T21:15:11.283",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Microsoft Edge (basado en Chromium)"
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21498.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21498.json
index 0f1ef2830bc..bbbd4eec757 100644
--- a/CVE-2025/CVE-2025-214xx/CVE-2025-21498.json
+++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21498.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:14.617",
"lastModified": "2025-01-21T21:15:14.617",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle HTTP Server accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle HTTP Server de Oracle Fusion Middleware (componente: Core). La versi\u00f3n compatible afectada es la 12.2.1.4.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle HTTP Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle HTTP Server. Puntuaci\u00f3n base de CVSS 3.1: 5,3 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21514.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21514.json
index 1fb9ca8d6f8..42413997653 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21514.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21514.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:16.753",
"lastModified": "2025-01-21T21:15:16.753",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto JD Edwards EnterpriseOne Tools de Oracle JD Edwards (componente: Web Runtime SEC). Las versiones compatibles afectadas son anteriores a la 9.2.9.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro JD Edwards EnterpriseOne Tools. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso de lectura no autorizado a un subconjunto de datos accesibles de JD Edwards EnterpriseOne Tools. Puntuaci\u00f3n base de CVSS 3.1: 5,3 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21515.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21515.json
index 5a66aa3f581..ff8dfe6f308 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21515.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21515.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:16.887",
"lastModified": "2025-01-21T21:15:16.887",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto JD Edwards EnterpriseOne Tools de Oracle JD Edwards (componente: Web Runtime SEC). Las versiones compatibles afectadas son anteriores a la 9.2.9.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP ponga en peligro JD Edwards EnterpriseOne Tools. Los ataques exitosos de esta vulnerabilidad pueden provocar la toma de control de JD Edwards EnterpriseOne Tools. Puntuaci\u00f3n base de CVSS 3.1: 8,8 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21523.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21523.json
index 66a073982bf..9a36d80afa5 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21523.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21523.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:17.937",
"lastModified": "2025-01-21T21:15:17.937",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: InnoDB). Las versiones compatibles afectadas son 8.0.40 y anteriores, 8.4.3 y anteriores y 9.1.0 y anteriores. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios elevados y acceso a la red a trav\u00e9s de m\u00faltiples protocolos ponga en peligro MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetible (DOS completo) de MySQL Server. Puntuaci\u00f3n base de CVSS 3.1: 4,9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21524.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21524.json
index 071b9d04fc6..fcec11930b7 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21524.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21524.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:18.070",
"lastModified": "2025-01-21T21:15:18.070",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Monitoring and Diagnostics SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto JD Edwards EnterpriseOne Tools de Oracle JD Edwards (componente: Monitoring and Diagnostics SEC). Las versiones compatibles afectadas son anteriores a la 9.2.9.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro JD Edwards EnterpriseOne Tools. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la toma de control de JD Edwards EnterpriseOne Tools. Puntuaci\u00f3n base de CVSS 3.1: 9,8 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21526.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21526.json
index ff1c3084df3..52fe7746832 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21526.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21526.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:18.337",
"lastModified": "2025-01-21T21:15:18.337",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0, 22.12.1.0-22.12.16.0 and 23.12.1.0-23.12.10.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Primavera P6 Enterprise Project Portfolio Management de Oracle Construction and Engineering (componente: Web Access). Las versiones compatibles afectadas son 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0, 22.12.1.0-22.12.16.0 y 23.12.1.0-23.12.10.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP ponga en peligro Primavera P6 Enterprise Project Portfolio Management. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad se encuentra en Primavera P6 Enterprise Project Portfolio Management, los ataques pueden afectar significativamente a otros productos (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden dar como resultado el acceso no autorizado a actualizaciones, inserciones o eliminaciones de algunos datos accesibles de Primavera P6 Enterprise Project Portfolio Management, as\u00ed como el acceso no autorizado a un subconjunto de datos accesibles de Primavera P6 Enterprise Project Portfolio Management. Puntuaci\u00f3n base CVSS 3.1: 5,4 (impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21527.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21527.json
index 9f13fb42af8..b517aef2861 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21527.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21527.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:18.467",
"lastModified": "2025-01-21T21:15:18.467",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Design Tools SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto JD Edwards EnterpriseOne Tools de Oracle JD Edwards (componente: Design Tools SEC). Las versiones compatibles afectadas son anteriores a la 9.2.9.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro JD Edwards EnterpriseOne Tools. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad se encuentra en JD Edwards EnterpriseOne Tools, los ataques pueden afectar significativamente a otros productos (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada de algunos datos accesibles de JD Edwards EnterpriseOne Tools, as\u00ed como el acceso de lectura no autorizado a un subconjunto de datos accesibles de JD Edwards EnterpriseOne Tools. Puntuaci\u00f3n base de CVSS 3.1: 6,1 (impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21528.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21528.json
index fe54cfcbcd7..0b4823cc55e 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21528.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21528.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:18.597",
"lastModified": "2025-01-21T21:15:18.597",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0, 22.12.1.0-22.12.16.0 and 23.12.1.0-23.12.10.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Primavera P6 Enterprise Project Portfolio Management de Oracle Construction and Engineering (componente: Web Access). Las versiones compatibles afectadas son 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0, 22.12.1.0-22.12.16.0 y 23.12.1.0-23.12.10.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro Primavera P6 Enterprise Project Portfolio Management. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada de algunos datos accesibles de Primavera P6 Enterprise Project Portfolio Management. Puntuaci\u00f3n base CVSS 3.1: 4,3 (impactos en la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21550.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21550.json
index 43bcd9f7083..7c783e87b8c 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21550.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21550.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:21.510",
"lastModified": "2025-01-21T21:15:21.510",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Financial Services Behavior Detection Platform product of Oracle Financial Services Applications (component: Web UI). Supported versions that are affected are 8.0.8.1, 8.1.2.7 and 8.1.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Behavior Detection Platform. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Behavior Detection Platform, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Financial Services Behavior Detection Platform accessible data as well as unauthorized read access to a subset of Oracle Financial Services Behavior Detection Platform accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Financial Services Behavior Detection Platform de Oracle Financial Services Applications (componente: Web UI). Las versiones compatibles afectadas son 8.0.8.1, 8.1.2.7 y 8.1.2.8. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle Financial Services Behavior Detection Platform. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad se encuentra en Oracle Financial Services Behavior Detection Platform, los ataques pueden afectar significativamente a otros productos (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada de algunos datos accesibles de Oracle Financial Services Behavior Detection Platform, as\u00ed como el acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Financial Services Behavior Detection Platform. Puntuaci\u00f3n base CVSS 3.1 6.1 (impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21551.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21551.json
index 47d4ad27700..a389ad5bebb 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21551.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21551.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:21.637",
"lastModified": "2025-01-21T21:15:21.637",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Solaris product of Oracle Systems (component: File system). The supported version that is affected is 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Solaris accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 6.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Solaris de Oracle Systems (componente: Archivo sistema). La versi\u00f3n compatible afectada es la 11. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios elevados y que inicie sesi\u00f3n en la infraestructura donde se ejecuta Oracle Solaris comprometa Oracle Solaris. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la creaci\u00f3n, eliminaci\u00f3n o modificaci\u00f3n no autorizada de datos cr\u00edticos o de todos los datos accesibles de Oracle Solaris y la capacidad no autorizada de provocar un bloqueo o una falla repetitiva frecuente (DOS completa) de Oracle Solaris. Puntuaci\u00f3n base de CVSS 3.1: 6,0 (impactos en la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21552.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21552.json
index ca83421e1e6..b287290ffcd 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21552.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21552.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:21.763",
"lastModified": "2025-01-21T21:15:21.763",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the JD Edwards EnterpriseOne Orchestrator product of Oracle JD Edwards (component: E1 IOT Orchestrator Security). Supported versions that are affected are Prior to 9.2.9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Orchestrator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Orchestrator accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto JD Edwards EnterpriseOne Orchestrator de Oracle JD Edwards (componente: E1 IOT Orchestrator Security). Las versiones compatibles afectadas son anteriores a la 9.2.9.2. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios reducidos y acceso a la red a trav\u00e9s de HTTP ponga en peligro JD Edwards EnterpriseOne Orchestrator. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de JD Edwards EnterpriseOne Orchestrator. Puntuaci\u00f3n base de CVSS 3.1: 6,5 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21553.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21553.json
index 2b8d005c872..838a77b28c3 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21553.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21553.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:21.880",
"lastModified": "2025-01-21T21:15:21.880",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.25, 21.3-21.16 and 23.4-23.6. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java VM accessible data as well as unauthorized read access to a subset of Java VM accessible data. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el componente Java VM de Oracle Database Server. Las versiones compatibles afectadas son 19.3-19.25, 21.3-21.16 y 23.4-23.6. Esta vulnerabilidad, dif\u00edcil de explotar, permite que un atacante con privilegios bajos, que tenga privilegios de creaci\u00f3n de sesi\u00f3n y de creaci\u00f3n de procedimiento con acceso a la red a trav\u00e9s de Oracle Net, ponga en peligro Java VM. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso no autorizado a actualizaciones, inserciones o eliminaciones de algunos datos accesibles de Java VM, as\u00ed como un acceso de lectura no autorizado a un subconjunto de datos accesibles de Java VM. Puntuaci\u00f3n base CVSS 3.1 4.2 (impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21554.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21554.json
index 7e34df96f55..b1b86c888c1 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21554.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21554.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:22.020",
"lastModified": "2025-01-21T21:15:22.020",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: Security). Supported versions that are affected are 7.4.0, 7.4.1 and 7.5.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Order and Service Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Order and Service Management accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Communications Order and Service Management de Oracle Communications Applications (componente: Seguridad). Las versiones compatibles afectadas son 7.4.0, 7.4.1 y 7.5.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle Communications Order and Service Management. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Communications Order and Service Management. Puntuaci\u00f3n base de CVSS 3.1: 5,3 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21555.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21555.json
index fc01308fe43..6d0e9553d18 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21555.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21555.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:22.163",
"lastModified": "2025-01-21T21:15:22.163",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: InnoDB). Las versiones compatibles afectadas son 8.0.40 y anteriores, 8.4.3 y anteriores y 9.1.0 y anteriores. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite a un atacante con privilegios elevados y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometer MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetible (DOS completo) de MySQL Server, as\u00ed como el acceso no autorizado a actualizaciones, inserciones o eliminaciones de algunos de los datos accesibles de MySQL Server. Puntuaci\u00f3n base CVSS 3.1 5,5 (impactos en la integridad y disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21556.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21556.json
index 21295092b68..173846a3982 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21556.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21556.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:22.290",
"lastModified": "2025-01-21T21:15:22.290",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Agile Integration Services). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM Framework. While the vulnerability is in Oracle Agile PLM Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Agile PLM Framework. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Agile PLM framework de Oracle Supply Chain (componente: Agile Integration Services). La versi\u00f3n compatible afectada es la 9.3.6. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios reducidos y acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle Agile PLMframeworkk. Si bien la vulnerabilidad se encuentra en Oracle Agile PLframeworkrk, los ataques pueden afectar significativamente a otros productos (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden provocar la toma de control de Oracle Agile Pframeworkork. Puntuaci\u00f3n base CVSS 3.1: 9,9 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21557.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21557.json
index dccd3a44299..a9ef9487321 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21557.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21557.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:22.423",
"lastModified": "2025-01-21T21:15:22.423",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in Oracle Application Express (component: General). Supported versions that are affected are 23.2 and 24.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express accessible data as well as unauthorized read access to a subset of Oracle Application Express accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en Oracle Application Express (componente: General). Las versiones compatibles afectadas son 23.2 y 24.1. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios reducidos y acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle Application Express. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad se encuentra en Oracle Application Express, los ataques pueden afectar significativamente a otros productos (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada de algunos datos accesibles de Oracle Application Express, as\u00ed como el acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Application Express. Puntuaci\u00f3n base de CVSS 3.1: 5,4 (impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21558.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21558.json
index 69be4dc4339..08f0e1372d7 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21558.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21558.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:22.537",
"lastModified": "2025-01-21T21:15:22.537",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0 and 22.12.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Primavera P6 Enterprise Project Portfolio Management de Oracle Construction and Engineering (componente: Web Access). Las versiones compatibles afectadas son 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0 y 22.12.1.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP ponga en peligro Primavera P6 Enterprise Project Portfolio Management. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad se encuentra en Primavera P6 Enterprise Project Portfolio Management, los ataques pueden afectar significativamente a otros productos (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden dar como resultado el acceso no autorizado a actualizaciones, inserciones o eliminaciones de algunos datos accesibles de Primavera P6 Enterprise Project Portfolio Management, as\u00ed como el acceso no autorizado a un subconjunto de datos accesibles de Primavera P6 Enterprise Project Portfolio Management. Puntuaci\u00f3n base CVSS 3.1: 5,4 (impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21559.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21559.json
index 9155b04c880..49c155a9af3 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21559.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21559.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:22.667",
"lastModified": "2025-01-21T21:15:22.667",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: InnoDB). Las versiones compatibles afectadas son 8.0.40 y anteriores, 8.4.3 y anteriores y 9.1.0 y anteriores. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite a un atacante con privilegios elevados y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometer MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetible (DOS completo) de MySQL Server, as\u00ed como el acceso no autorizado a actualizaciones, inserciones o eliminaciones de algunos de los datos accesibles de MySQL Server. Puntuaci\u00f3n base CVSS 3.1 5,5 (impactos en la integridad y disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21560.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21560.json
index 30f97d9d1c7..8f10509671a 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21560.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21560.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:22.793",
"lastModified": "2025-01-21T21:15:22.793",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: SDK-Software Development Kit). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM Framework accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Agile PLM framework de Oracle Supply Chain (componente: SDK-Software Development Kit). La versi\u00f3n compatible afectada es la 9.3.6. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios reducidos y acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle Agile PLMframeworkk. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de Oracle Agile PLframeworkrk. Puntuaci\u00f3n base de CVSS 3.1: 6,5 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21561.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21561.json
index 3b82d647f2f..db8885d5bdf 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21561.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21561.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:22.920",
"lastModified": "2025-01-21T21:15:22.920",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the PeopleSoft Enterprise SCM Purchasing product of Oracle PeopleSoft (component: Purchasing). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM Purchasing. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise SCM Purchasing accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise SCM Purchasing accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto PeopleSoft Enterprise SCM Purchasing de Oracle PeopleSoft (componente: Purchasing). La versi\u00f3n compatible afectada es la 9.2. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios reducidos y acceso a la red a trav\u00e9s de HTTP comprometa PeopleSoft Enterprise SCM Purchasing. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado el acceso no autorizado a actualizaciones, inserciones o eliminaciones de algunos datos accesibles de PeopleSoft Enterprise SCM Purchasing, as\u00ed como el acceso no autorizado a un subconjunto de datos accesibles de PeopleSoft Enterprise SCM Purchasing. Puntuaci\u00f3n base de CVSS 3.1: 5,4 (impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21562.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21562.json
index 288639b3999..f134c0487a5 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21562.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21562.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:23.060",
"lastModified": "2025-01-21T21:15:23.060",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Run Control Management). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise CC Common Application Objects accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto PeopleSoft Enterprise CC Common Application Objects de Oracle PeopleSoft (componente: Run Control Management). La versi\u00f3n compatible afectada es la 9.2. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios reducidos y acceso a la red a trav\u00e9s de HTTP ponga en peligro PeopleSoft Enterprise CC Common Application Objects. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso de lectura no autorizado a un subconjunto de datos accesibles de PeopleSoft Enterprise CC Common Application Objects. Puntuaci\u00f3n base de CVSS 3.1: 4,3 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21563.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21563.json
index 107496bf5af..b6017634a97 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21563.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21563.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:23.207",
"lastModified": "2025-01-21T21:15:23.207",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Run Control Management). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise CC Common Application Objects accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto PeopleSoft Enterprise CC Common Application Objects de Oracle PeopleSoft (componente: Run Control Management). La versi\u00f3n compatible afectada es la 9.2. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios reducidos y acceso a la red a trav\u00e9s de HTTP comprometa PeopleSoft Enterprise CC Common Application Objects. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada de algunos datos accesibles de PeopleSoft Enterprise CC Common Application Objects. Puntuaci\u00f3n base de CVSS 3.1: 4,3 (impactos en la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21564.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21564.json
index 757a401c3f3..13d9cda8e69 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21564.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21564.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:23.330",
"lastModified": "2025-01-21T21:15:23.330",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Agile Integration Services). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM Framework accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Agile PLM Framework. CVSS 3.1 Base Score 8.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Agile PLM framework de Oracle Supply Chain (componente: Agile Integration Services). La versi\u00f3n compatible afectada es la 9.3.6. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios reducidos y acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle Agile PLMframeworkk. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de Oracle Agile PLframeworkrk y la capacidad no autorizada de provocar un bloqueo o una falla repetitiva frecuente (DOS completa) de Oracle Agile Pframeworkork. Puntuaci\u00f3n base de CVSS 3.1: 8,1 (impactos en la confidencialidad y disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21565.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21565.json
index 263dc4ccd35..dff64cda198 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21565.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21565.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:23.460",
"lastModified": "2025-01-21T21:15:23.460",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Install). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM Framework accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Agile PLM framework de Oracle Supply Chain (componente: Instalaci\u00f3n). La versi\u00f3n compatible afectada es la 9.3.6. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle Agile PLMframeworkk. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de Oracle Agile PLframeworkrk. Puntuaci\u00f3n base de CVSS 3.1: 7,5 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21566.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21566.json
index 689d50d6473..3bd55eeb0c3 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21566.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21566.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:23.590",
"lastModified": "2025-01-21T21:15:23.590",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Optimizer). Las versiones compatibles afectadas son 9.1.0 y anteriores. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetitivo (DOS completo) de MySQL Server. Puntuaci\u00f3n base de CVSS 3.1: 6,5 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21567.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21567.json
index 792c9a7e587..0faa37d27ad 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21567.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21567.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:23.710",
"lastModified": "2025-01-21T21:15:23.710",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Security: Privileges). Las versiones compatibles afectadas son 9.1.0 y anteriores. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso de lectura no autorizado a un subconjunto de datos accesibles de MySQL Server. Puntuaci\u00f3n base de CVSS 3.1: 4,3 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21568.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21568.json
index 1c4bc123932..16ae5a780e3 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21568.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21568.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:23.843",
"lastModified": "2025-01-21T21:15:23.843",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Hyperion Data Relationship Management product of Oracle Hyperion (component: Access and Security). The supported version that is affected is 11.2.19.0.000. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hyperion Data Relationship Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hyperion Data Relationship Management accessible data. CVSS 3.1 Base Score 4.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Hyperion Data Relationship Management de Oracle Hyperion (componente: Access and Security). La versi\u00f3n compatible afectada es la 11.2.19.0.000. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios elevados y acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle Hyperion Data Relationship Management. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado el acceso no autorizado a datos cr\u00edticos o el acceso completo a todos los datos accesibles de Oracle Hyperion Data Relationship Management. Puntuaci\u00f3n base de CVSS 3.1: 4,5 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21569.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21569.json
index d0377ac2680..feaa71b33a3 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21569.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21569.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:23.977",
"lastModified": "2025-01-21T21:15:23.977",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Hyperion Data Relationship Management product of Oracle Hyperion (component: Web Services). The supported version that is affected is 11.2.19.0.000. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hyperion Data Relationship Management. Successful attacks of this vulnerability can result in takeover of Oracle Hyperion Data Relationship Management. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Hyperion Data Relationship Management de Oracle Hyperion (componente: Web Services). La versi\u00f3n compatible afectada es la 11.2.19.0.000. Esta vulnerabilidad, dif\u00edcil de explotar, permite que un atacante con privilegios elevados y acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle Hyperion Data Relationship Management. Los ataques exitosos de esta vulnerabilidad pueden provocar la toma de control de Oracle Hyperion Data Relationship Management. Puntuaci\u00f3n base CVSS 3.1 6.6 (impactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21570.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21570.json
index 760ff15d06b..445f96168a9 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21570.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21570.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:24.113",
"lastModified": "2025-01-21T21:15:24.113",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Life Sciences Argus Safety product of Oracle Health Sciences Applications (component: Login). The supported version that is affected is 8.2.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Life Sciences Argus Safety. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Life Sciences Argus Safety, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Life Sciences Argus Safety accessible data as well as unauthorized read access to a subset of Oracle Life Sciences Argus Safety accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Life Sciences Argus Safety de Oracle Health Sciences Applications (componente: Login). La versi\u00f3n compatible afectada es la 8.2.3. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP comprometa Oracle Life Sciences Argus Safety. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad se encuentra en Oracle Life Sciences Argus Safety, los ataques pueden afectar significativamente a otros productos (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada de algunos datos accesibles de Oracle Life Sciences Argus Safety, as\u00ed como el acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Life Sciences Argus Safety. Puntuaci\u00f3n base CVSS 3.1 6.1 (impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21571.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21571.json
index 35c4504cb9c..8cacb04fedd 100644
--- a/CVE-2025/CVE-2025-215xx/CVE-2025-21571.json
+++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21571.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:24.260",
"lastModified": "2025-01-21T21:15:24.260",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.24 and prior to 7.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle VM VirtualBox de Oracle Virtualization (componente: Core). Las versiones compatibles afectadas son anteriores a la 7.0.24 y a la 7.1.6. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios elevados que inicie sesi\u00f3n en la infraestructura donde se ejecuta Oracle VM VirtualBox comprometa Oracle VM VirtualBox. Si bien la vulnerabilidad se encuentra en Oracle VM VirtualBox, los ataques pueden afectar significativamente a otros productos (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la creaci\u00f3n, eliminaci\u00f3n o modificaci\u00f3n no autorizada de datos cr\u00edticos o de todos los datos accesibles de Oracle VM VirtualBox, as\u00ed como el acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle VM VirtualBox y la capacidad no autorizada de provocar una denegaci\u00f3n de servicio parcial (DOS parcial) de Oracle VM VirtualBox. Puntuaci\u00f3n base CVSS 3.1: 7,3 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21606.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21606.json
index f207adda768..d0fd1aec2e4 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21606.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21606.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-17T21:15:11.420",
"lastModified": "2025-01-17T21:15:11.420",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "stats is a macOS system monitor in for the menu bar. The Stats application is vulnerable to a local privilege escalation due to the insecure implementation of its XPC service. The application registers a Mach service under the name `eu.exelban.Stats.SMC.Helper`. The associated binary, eu.exelban.Stats.SMC.Helper, is a privileged helper tool designed to execute actions requiring elevated privileges on behalf of the client, such as setting fan modes, adjusting fan speeds, and executing the `powermetrics` command. The root cause of this vulnerability lies in the `shouldAcceptNewConnection` method, which unconditionally returns YES (or true), allowing any XPC client to connect to the service without any form of verification. As a result, unauthorized clients can establish a connection to the Mach service and invoke methods exposed by the HelperTool interface. An attacker can exploit this vulnerability to modify the hardware settings of the user\u2019s device and execute arbitrary code with root privileges. This issue has been addressed in version 2.11.21 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "stats es un monitor macOS sistema para la barra de men\u00fa. La aplicaci\u00f3n Stats es vulnerable a una escalada de privilegios locales debido a la implementaci\u00f3n insegura de su servicio XPC. La aplicaci\u00f3n registra un servicio Mach con el nombre `eu.exelban.Stats.SMC.Helper`. El binario asociado, eu.exelban.Stats.SMC.Helper, es una herramienta auxiliar privilegiada dise\u00f1ada para ejecutar acciones que requieren privilegios elevados en nombre del cliente, como configurar los modos del ventilador, ajustar las velocidades del ventilador y ejecutar el comando `powermetrics`. La causa ra\u00edz de esta vulnerabilidad radica en el m\u00e9todo `shouldAcceptNewConnection`, que devuelve incondicionalmente YES (o true), lo que permite que cualquier cliente XPC se conecte al servicio sin ning\u00fan tipo de verificaci\u00f3n. Como resultado, los clientes no autorizados pueden establecer una conexi\u00f3n con el servicio Mach e invocar m\u00e9todos expuestos por la interfaz HelperTool. Un atacante puede explotar esta vulnerabilidad para modificar la configuraci\u00f3n de hardware del dispositivo del usuario y ejecutar c\u00f3digo arbitrario con privilegios de superusario. Este problema se ha solucionado en la versi\u00f3n 2.11.21 y se recomienda a todos los usuarios que actualicen la versi\u00f3n. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21632.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21632.json
index a48f9ab1dd4..ba1895e8f3c 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21632.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21632.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:08.650",
"lastModified": "2025-01-19T11:15:08.650",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Ensure shadow stack is active before \"getting\" registers\n\nThe x86 shadow stack support has its own set of registers. Those registers\nare XSAVE-managed, but they are \"supervisor state components\" which means\nthat userspace can not touch them with XSAVE/XRSTOR. It also means that\nthey are not accessible from the existing ptrace ABI for XSAVE state.\nThus, there is a new ptrace get/set interface for it.\n\nThe regset code that ptrace uses provides an ->active() handler in\naddition to the get/set ones. For shadow stack this ->active() handler\nverifies that shadow stack is enabled via the ARCH_SHSTK_SHSTK bit in the\nthread struct. The ->active() handler is checked from some call sites of\nthe regset get/set handlers, but not the ptrace ones. This was not\nunderstood when shadow stack support was put in place.\n\nAs a result, both the set/get handlers can be called with\nXFEATURE_CET_USER in its init state, which would cause get_xsave_addr() to\nreturn NULL and trigger a WARN_ON(). The ssp_set() handler luckily has an\nssp_active() check to avoid surprising the kernel with shadow stack\nbehavior when the kernel is not ready for it (ARCH_SHSTK_SHSTK==0). That\ncheck just happened to avoid the warning.\n\nBut the ->get() side wasn't so lucky. It can be called with shadow stacks\ndisabled, triggering the warning in practice, as reported by Christina\nSchimpe:\n\nWARNING: CPU: 5 PID: 1773 at arch/x86/kernel/fpu/regset.c:198 ssp_get+0x89/0xa0\n[...]\nCall Trace:\n\n? show_regs+0x6e/0x80\n? ssp_get+0x89/0xa0\n? __warn+0x91/0x150\n? ssp_get+0x89/0xa0\n? report_bug+0x19d/0x1b0\n? handle_bug+0x46/0x80\n? exc_invalid_op+0x1d/0x80\n? asm_exc_invalid_op+0x1f/0x30\n? __pfx_ssp_get+0x10/0x10\n? ssp_get+0x89/0xa0\n? ssp_get+0x52/0xa0\n__regset_get+0xad/0xf0\ncopy_regset_to_user+0x52/0xc0\nptrace_regset+0x119/0x140\nptrace_request+0x13c/0x850\n? wait_task_inactive+0x142/0x1d0\n? do_syscall_64+0x6d/0x90\narch_ptrace+0x102/0x300\n[...]\n\nEnsure that shadow stacks are active in a thread before looking them up\nin the XSAVE buffer. Since ARCH_SHSTK_SHSTK and user_ssp[SHSTK_EN] are\nset at the same time, the active check ensures that there will be\nsomething to find in the XSAVE buffer.\n\n[ dhansen: changelog/subject tweaks ]"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/fpu: Aseg\u00farese de que la pila de sombras est\u00e9 activa antes de \"obtener\" registros El soporte de la pila de sombras x86 tiene su propio conjunto de registros. Esos registros son administrados por XSAVE, pero son \"componentes de estado de supervisor\", lo que significa que el espacio de usuario no puede tocarlos con XSAVE/XRSTOR. Tambi\u00e9n significa que no son accesibles desde la ABI de ptrace existente para el estado XSAVE. Por lo tanto, hay una nueva interfaz get/set de ptrace para ello. El c\u00f3digo de conjunto de registros que usa ptrace proporciona un controlador ->active() adem\u00e1s de los de obtenci\u00f3n/configuraci\u00f3n. Para la pila de sombras, este controlador ->active() verifica que la pila de sombras est\u00e9 habilitada a trav\u00e9s del bit ARCH_SHSTK_SHSTK en la estructura del hilo. El controlador ->active() se verifica desde algunos sitios de llamada de los controladores get/set de conjuntos de registros, pero no de los de ptrace. Esto no se comprendi\u00f3 cuando se implement\u00f3 el soporte de la pila de sombras. Como resultado, ambos manejadores set/get pueden ser llamados con XFEATURE_CET_USER en su estado init, lo que har\u00eda que get_xsave_addr() devuelva NULL y active un WARN_ON(). El manejador ssp_set() afortunadamente tiene una verificaci\u00f3n ssp_active() para evitar sorprender al kernel con el comportamiento de la pila shadow cuando el kernel no est\u00e1 listo para ello (ARCH_SHSTK_SHSTK==0). Esa verificaci\u00f3n simplemente sucedi\u00f3 para evitar la advertencia. Pero el lado ->get() no tuvo tanta suerte. Puede ser llamado con las pilas shadow deshabilitadas, lo que activa la advertencia en la pr\u00e1ctica, como lo inform\u00f3 Christina Schimpe: ADVERTENCIA: CPU: 5 PID: 1773 en arch/x86/kernel/fpu/regset.c:198 ssp_get+0x89/0xa0 [...] Seguimiento de llamadas: ? show_regs+0x6e/0x80 ? ssp_get+0x89/0xa0 ? __warn+0x91/0x150 ? ssp_get+0x89/0xa0 ? report_bug+0x19d/0x1b0 ? handle_bug+0x46/0x80 ? exc_invalid_op+0x1d/0x80 ? asm_exc_invalid_op+0x1f/0x30 ? __pfx_ssp_get+0x10/0x10 ? ssp_get+0x89/0xa0 ? ssp_get+0x52/0xa0 __regset_get+0xad/0xf0 copy_regset_to_user+0x52/0xc0 ptrace_regset+0x119/0x140 ptrace_request+0x13c/0x850 ? wait_task_inactive+0x142/0x1d0 ? do_syscall_64+0x6d/0x90 arch_ptrace+0x102/0x300 [...] Aseg\u00farese de que las pilas de sombras est\u00e9n activas en un hilo antes de buscarlas en el b\u00fafer XSAVE. Dado que ARCH_SHSTK_SHSTK y user_ssp[SHSTK_EN] se configuran al mismo tiempo, la comprobaci\u00f3n activa garantiza que habr\u00e1 algo que encontrar en el b\u00fafer XSAVE. [ dhansen: registro de cambios/asunto ajustes ]"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21633.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21633.json
index e937a37ce4c..b3a897389e9 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21633.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21633.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:08.773",
"lastModified": "2025-01-19T11:15:08.773",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/sqpoll: zero sqd->thread on tctx errors\n\nSyzkeller reports:\n\nBUG: KASAN: slab-use-after-free in thread_group_cputime+0x409/0x700 kernel/sched/cputime.c:341\nRead of size 8 at addr ffff88803578c510 by task syz.2.3223/27552\n Call Trace:\n \n ...\n kasan_report+0x143/0x180 mm/kasan/report.c:602\n thread_group_cputime+0x409/0x700 kernel/sched/cputime.c:341\n thread_group_cputime_adjusted+0xa6/0x340 kernel/sched/cputime.c:639\n getrusage+0x1000/0x1340 kernel/sys.c:1863\n io_uring_show_fdinfo+0xdfe/0x1770 io_uring/fdinfo.c:197\n seq_show+0x608/0x770 fs/proc/fd.c:68\n ...\n\nThat's due to sqd->task not being cleared properly in cases where\nSQPOLL task tctx setup fails, which can essentially only happen with\nfault injection to insert allocation errors."
+ },
+ {
+ "lang": "es",
+ "value": "En kernel de linux, se ha resuelto la siguiente vulnerabilidad: io_uring/sqpoll: cero errores sqd->thread en tctx Syzkeller informa: BUG: KASAN: slab-use-after-free in thread_group_cputime+0x409/0x700 kernel/sched/cputime.c:341 Read of size 8 at addr ffff88803578c510 by task syz.2.3223/27552 Call Trace: ... kasan_report+0x143/0x180 mm/kasan/report.c:602 thread_group_cputime+0x409/0x700 kernel/sched/cputime.c:341 thread_group_cputime_adjusted+0xa6/0x340 kernel/sched/cputime.c:639 getrusage+0x1000/0x1340 kernel/sys.c:1863 io_uring_show_fdinfo+0xdfe/0x1770 io_uring/fdinfo.c:197 seq_show+0x608/0x770 fs/proc/fd.c:68... Esto se debe a que sqd->task no se borra correctamente en los casos en que falla la configuraci\u00f3n de tctx de la tarea SQPOLL, lo que esencialmente solo puede ocurrir con errores de inyecci\u00f3n de errores en la asignaci\u00f3n de insertos."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21634.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21634.json
index 1f65a503a70..4a30165c52a 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21634.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21634.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:08.890",
"lastModified": "2025-01-19T11:15:08.890",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup/cpuset: remove kernfs active break\n\nA warning was found:\n\nWARNING: CPU: 10 PID: 3486953 at fs/kernfs/file.c:828\nCPU: 10 PID: 3486953 Comm: rmdir Kdump: loaded Tainted: G\nRIP: 0010:kernfs_should_drain_open_files+0x1a1/0x1b0\nRSP: 0018:ffff8881107ef9e0 EFLAGS: 00010202\nRAX: 0000000080000002 RBX: ffff888154738c00 RCX: dffffc0000000000\nRDX: 0000000000000007 RSI: 0000000000000004 RDI: ffff888154738c04\nRBP: ffff888154738c04 R08: ffffffffaf27fa15 R09: ffffed102a8e7180\nR10: ffff888154738c07 R11: 0000000000000000 R12: ffff888154738c08\nR13: ffff888750f8c000 R14: ffff888750f8c0e8 R15: ffff888154738ca0\nFS: 00007f84cd0be740(0000) GS:ffff8887ddc00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000555f9fbe00c8 CR3: 0000000153eec001 CR4: 0000000000370ee0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n kernfs_drain+0x15e/0x2f0\n __kernfs_remove+0x165/0x300\n kernfs_remove_by_name_ns+0x7b/0xc0\n cgroup_rm_file+0x154/0x1c0\n cgroup_addrm_files+0x1c2/0x1f0\n css_clear_dir+0x77/0x110\n kill_css+0x4c/0x1b0\n cgroup_destroy_locked+0x194/0x380\n cgroup_rmdir+0x2a/0x140\n\nIt can be explained by:\nrmdir \t\t\t\techo 1 > cpuset.cpus\n\t\t\t\tkernfs_fop_write_iter // active=0\ncgroup_rm_file\nkernfs_remove_by_name_ns\tkernfs_get_active // active=1\n__kernfs_remove\t\t\t\t\t // active=0x80000002\nkernfs_drain\t\t\tcpuset_write_resmask\nwait_event\n//waiting (active == 0x80000001)\n\t\t\t\tkernfs_break_active_protection\n\t\t\t\t// active = 0x80000001\n// continue\n\t\t\t\tkernfs_unbreak_active_protection\n\t\t\t\t// active = 0x80000002\n...\nkernfs_should_drain_open_files\n// warning occurs\n\t\t\t\tkernfs_put_active\n\nThis warning is caused by 'kernfs_break_active_protection' when it is\nwriting to cpuset.cpus, and the cgroup is removed concurrently.\n\nThe commit 3a5a6d0c2b03 (\"cpuset: don't nest cgroup_mutex inside\nget_online_cpus()\") made cpuset_hotplug_workfn asynchronous, This change\ninvolves calling flush_work(), which can create a multiple processes\ncircular locking dependency that involve cgroup_mutex, potentially leading\nto a deadlock. To avoid deadlock. the commit 76bb5ab8f6e3 (\"cpuset: break\nkernfs active protection in cpuset_write_resmask()\") added\n'kernfs_break_active_protection' in the cpuset_write_resmask. This could\nlead to this warning.\n\nAfter the commit 2125c0034c5d (\"cgroup/cpuset: Make cpuset hotplug\nprocessing synchronous\"), the cpuset_write_resmask no longer needs to\nwait the hotplug to finish, which means that concurrent hotplug and cpuset\noperations are no longer possible. Therefore, the deadlock doesn't exist\nanymore and it does not have to 'break active protection' now. To fix this\nwarning, just remove kernfs_break_active_protection operation in the\n'cpuset_write_resmask'."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cgroup/cpuset: eliminar kernfs active break Se encontr\u00f3 una advertencia: ADVERTENCIA: CPU: 10 PID: 3486953 en fs/kernfs/file.c:828 CPU: 10 PID: 3486953 Comm: rmdir Kdump: cargado Tainted: G RIP: 0010:kernfs_should_drain_open_files+0x1a1/0x1b0 RSP: 0018:ffff8881107ef9e0 EFLAGS: 00010202 RAX: 0000000080000002 RBX: ffff888154738c00 RCX: dffffc0000000000 RDX: 00000000000000007 RSI: 0000000000000004 RDI: ffff888154738c04 RBP: ffff888154738c04 R08: ffffffffaf27fa15 R09: ffffed102a8e7180 R10: ffff888154738c07 R11: 0000000000000000 R12: ffff888154738c08 R13: ffff888750f8c000 R14: ffff888750f8c0e8 R15: ffff888154738ca0 FS: 00007f84cd0be740(0000) GS:ffff8887ddc00000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555f9fbe00c8 CR3: 0000000153eec001 CR4: 0000000000370ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: GS:ffff8887ddc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555f9fbe00c8 CR3: 0000000153eec001 CR4: 0000000000370ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: kernfs_drain+0x15e/0x2f0 __kernfs_remove+0x165/0x300 kernfs_remove_by_name_ns+0x7b/0xc0 cgroup_rm_file+0x154/0x1c0 cgroup_addrm_files+0x1c2/0x1f0 css_clear_dir+0x77/0x110 kill_css+0x4c/0x1b0 cgroup_destroy_locked+0x194/0x380 cgroup_rmdir+0x2a/0x140 Se puede explicar por: rmdir echo 1 > cpuset.cpus kernfs_fop_write_iter // active=0 cgroup_rm_file kernfs_remove_by_name_ns kernfs_get_active // ??activo=1 __kernfs_remove // ??activo=0x80000002 kernfs_drain cpuset_write_resmask wait_event //esperando (activo == 0x80000001) kernfs_break_active_protection // activo = 0x80000001 // continuar kernfs_unbreak_active_protection // activo = 0x80000002 ... kernfs_should_drain_open_files // se produce una advertencia kernfs_put_active Esta advertencia es causada por 'kernfs_break_active_protection' cuando est\u00e1 escribiendo en cpuset.cpus y el cgroup se elimina simult\u00e1neamente. El commit 3a5a6d0c2b03 (\"cpuset: no anide cgroup_mutex dentro de get_online_cpus()\") hizo que cpuset_hotplug_workfn sea as\u00edncrono. Este cambio implica llamar a flush_work(), que puede crear una dependencia de bloqueo circular de m\u00faltiples procesos que involucran a cgroup_mutex, lo que puede llevar a un bloqueo. Para evitarlo, el commit 76bb5ab8f6e3 (\"cpuset: interrumpa la protecci\u00f3n activa de kernfs en cpuset_write_resmask()\") agreg\u00f3 'kernfs_break_active_protection' en cpuset_write_resmask. Esto podr\u00eda llevar a esta advertencia. Despu\u00e9s de el commit 2125c0034c5d (\"cgroup/cpuset: haga que el procesamiento de hotplug de cpuset sea sincr\u00f3nico\"), cpuset_write_resmask ya no necesita esperar a que finalice el hotplug, lo que significa que las operaciones de hotplug y cpuset concurrentes ya no son posibles. Por lo tanto, el bloqueo ya no existe y ya no es necesario \"interrumpir la protecci\u00f3n activa\". Para solucionar esta advertencia, simplemente elimine la operaci\u00f3n kernfs_break_active_protection en \"cpuset_write_resmask\"."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21635.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21635.json
index 1d3cbcfaade..e1d152eda09 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21635.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21635.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:09.000",
"lastModified": "2025-01-19T11:15:09.000",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nrds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy\n\nAs mentioned in a previous commit of this series, using the 'net'\nstructure via 'current' is not recommended for different reasons:\n\n- Inconsistency: getting info from the reader's/writer's netns vs only\n from the opener's netns.\n\n- current->nsproxy can be NULL in some cases, resulting in an 'Oops'\n (null-ptr-deref), e.g. when the current task is exiting, as spotted by\n syzbot [1] using acct(2).\n\nThe per-netns structure can be obtained from the table->data using\ncontainer_of(), then the 'net' one can be retrieved from the listen\nsocket (if available)."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rds: sysctl: rds_tcp_{rcv,snd}buf: evitar usar current->nsproxy Como se mencion\u00f3 en un commit anterior de esta serie, no se recomienda usar la estructura 'net' a trav\u00e9s de 'current' por diferentes razones: - Inconsistencia: obtener informaci\u00f3n de los netns del lector/escritor vs solo de los netns del abridor. - current->nsproxy puede ser NULL en algunos casos, lo que resulta en un 'Oops' (null-ptr-deref), p. ej. cuando la tarea actual est\u00e1 saliendo, como lo detect\u00f3 syzbot [1] usando acct(2). La estructura per-netns se puede obtener de table->data usando Container_of(), luego la 'net' se puede recuperar del socket de escucha (si est\u00e1 disponible)."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21641.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21641.json
index 1f3b3d711cc..855e48d7a85 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21641.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21641.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:09.643",
"lastModified": "2025-01-19T11:15:09.643",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: sysctl: blackhole timeout: avoid using current->nsproxy\n\nAs mentioned in the previous commit, using the 'net' structure via\n'current' is not recommended for different reasons:\n\n- Inconsistency: getting info from the reader's/writer's netns vs only\n from the opener's netns.\n\n- current->nsproxy can be NULL in some cases, resulting in an 'Oops'\n (null-ptr-deref), e.g. when the current task is exiting, as spotted by\n syzbot [1] using acct(2).\n\nThe 'pernet' structure can be obtained from the table->data using\ncontainer_of()."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mptcp: sysctl: blackhole timeout: avoid using current->nsproxy Como se mencion\u00f3 en el commit anterior, no se recomienda usar la estructura 'net' a trav\u00e9s de 'current' por diferentes razones: - Inconsistencia: obtener informaci\u00f3n de las redes de red del lector/escritor frente a solo de las redes de red del abridor. - current->nsproxy puede ser NULL en algunos casos, lo que resulta en un 'Oops' (null-ptr-deref), por ejemplo, cuando la tarea actual est\u00e1 saliendo, como lo detect\u00f3 syzbot [1] usando acct(2). La estructura 'pernet' se puede obtener de table->data usando Container_of()."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21642.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21642.json
index 29adf261c7b..4a46bca9e29 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21642.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21642.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:09.757",
"lastModified": "2025-01-19T11:15:09.757",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: sysctl: sched: avoid using current->nsproxy\n\nUsing the 'net' structure via 'current' is not recommended for different\nreasons.\n\nFirst, if the goal is to use it to read or write per-netns data, this is\ninconsistent with how the \"generic\" sysctl entries are doing: directly\nby only using pointers set to the table entry, e.g. table->data. Linked\nto that, the per-netns data should always be obtained from the table\nlinked to the netns it had been created for, which may not coincide with\nthe reader's or writer's netns.\n\nAnother reason is that access to current->nsproxy->netns can oops if\nattempted when current->nsproxy had been dropped when the current task\nis exiting. This is what syzbot found, when using acct(2):\n\n Oops: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN PTI\n KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]\n CPU: 1 UID: 0 PID: 5924 Comm: syz-executor Not tainted 6.13.0-rc5-syzkaller-00004-gccb98ccef0e5 #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\n RIP: 0010:proc_scheduler+0xc6/0x3c0 net/mptcp/ctrl.c:125\n Code: 03 42 80 3c 38 00 0f 85 fe 02 00 00 4d 8b a4 24 08 09 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7c 24 28 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 cc 02 00 00 4d 8b 7c 24 28 48 8d 84 24 c8 00 00\n RSP: 0018:ffffc900034774e8 EFLAGS: 00010206\n\n RAX: dffffc0000000000 RBX: 1ffff9200068ee9e RCX: ffffc90003477620\n RDX: 0000000000000005 RSI: ffffffff8b08f91e RDI: 0000000000000028\n RBP: 0000000000000001 R08: ffffc90003477710 R09: 0000000000000040\n R10: 0000000000000040 R11: 00000000726f7475 R12: 0000000000000000\n R13: ffffc90003477620 R14: ffffc90003477710 R15: dffffc0000000000\n FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007fee3cd452d8 CR3: 000000007d116000 CR4: 00000000003526f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \n proc_sys_call_handler+0x403/0x5d0 fs/proc/proc_sysctl.c:601\n __kernel_write_iter+0x318/0xa80 fs/read_write.c:612\n __kernel_write+0xf6/0x140 fs/read_write.c:632\n do_acct_process+0xcb0/0x14a0 kernel/acct.c:539\n acct_pin_kill+0x2d/0x100 kernel/acct.c:192\n pin_kill+0x194/0x7c0 fs/fs_pin.c:44\n mnt_pin_kill+0x61/0x1e0 fs/fs_pin.c:81\n cleanup_mnt+0x3ac/0x450 fs/namespace.c:1366\n task_work_run+0x14e/0x250 kernel/task_work.c:239\n exit_task_work include/linux/task_work.h:43 [inline]\n do_exit+0xad8/0x2d70 kernel/exit.c:938\n do_group_exit+0xd3/0x2a0 kernel/exit.c:1087\n get_signal+0x2576/0x2610 kernel/signal.c:3017\n arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337\n exit_to_user_mode_loop kernel/entry/common.c:111 [inline]\n exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]\n __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]\n syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218\n do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x7fee3cb87a6a\n Code: Unable to access opcode bytes at 0x7fee3cb87a40.\n RSP: 002b:00007fffcccac688 EFLAGS: 00000202 ORIG_RAX: 0000000000000037\n RAX: 0000000000000000 RBX: 00007fffcccac710 RCX: 00007fee3cb87a6a\n RDX: 0000000000000041 RSI: 0000000000000000 RDI: 0000000000000003\n RBP: 0000000000000003 R08: 00007fffcccac6ac R09: 00007fffcccacac7\n R10: 00007fffcccac710 R11: 0000000000000202 R12: 00007fee3cd49500\n R13: 00007fffcccac6ac R14: 0000000000000000 R15: 00007fee3cd4b000\n \n Modules linked in:\n ---[ end trace 0000000000000000 ]---\n RIP: 0010:proc_scheduler+0xc6/0x3c0 net/mptcp/ctrl.c:125\n Code: 03 42 80 3c 38 00 0f 85 fe 02 00 00 4d 8b a4 24 08 09 00 00 48 b8 00 00 00 00 00 fc\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mptcp: sysctl: sched: evitar usar current->nsproxy No se recomienda usar la estructura 'net' a trav\u00e9s de 'current' por diferentes razones. Primero, si el objetivo es usarlo para leer o escribir datos per-netns, esto es inconsistente con c\u00f3mo funcionan las entradas sysctl \"gen\u00e9ricas\": directamente usando solo punteros configurados en la entrada de la tabla, por ejemplo table->data. Vinculado a eso, los datos per-netns siempre deben obtenerse de la tabla vinculada a los netns para los que se crearon, que pueden no coincidir con los netns del lector o escritor. Otra raz\u00f3n es que el acceso a current->nsproxy->netns puede fallar si se intenta cuando current->nsproxy se ha eliminado cuando la tarea actual est\u00e1 saliendo. Esto es lo que syzbot encontr\u00f3 al usar acct(2): Oops: falla de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref en el rango [0x000000000000028-0x000000000000002f] CPU: 1 UID: 0 PID: 5924 Comm: syz-executor No contaminado 6.13.0-rc5-syzkaller-00004-gccb98ccef0e5 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 13/09/2024 RIP: 0010:proc_scheduler+0xc6/0x3c0 net/mptcp/ctrl.c:125 C\u00f3digo: 03 42 80 3c 38 00 0f 85 fe 02 00 00 4d 8b a4 24 08 09 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7c 24 28 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 cc 02 00 00 4d 8b 7c 24 28 48 8d 84 24 c8 00 00 RSP: 0018:ffffc900034774e8 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: 1ffff9200068ee9e RCX: ffffc90003477620 RDX: 0000000000000005 RSI: ffffffff8b08f91e RDI: 0000000000000028 RBP: 0000000000000001 R08: ffffc90003477710 R09: 0000000000000040 R10: 0000000000000040 R11: 00000000726f7475 R12: 0000000000000000 R13: ffffc90003477620 R14: ffffc90003477710 R15: dffffc0000000000 FS: 000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fee3cd452d8 CR3: 000000007d116000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: proc_sys_call_handler+0x403/0x5d0 fs/proc/proc_sysctl.c:601 __kernel_write_iter+0x318/0xa80 fs/read_write.c:612 __kernel_write+0xf6/0x140 fs/read_write.c:632 do_acct_process+0xcb0/0x14a0 kernel/acct.c:539 acct_pin_kill+0x2d/0x100 kernel/acct.c:192 pin_kill+0x194/0x7c0 fs/fs_pin.c:44 mnt_pin_kill+0x61/0x1e0 fs/fs_pin.c:81 cleanup_mnt+0x3ac/0x450 fs/namespace.c:1366 task_work_run+0x14e/0x250 kernel/task_work.c:239 exit_task_work include/linux/task_work.h:43 [en l\u00ednea] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 get_signal+0x2576/0x2610 kernel/signal.c:3017 arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337 bucle de salida al modo usuario kernel/entry/common.c:111 [en l\u00ednea] preparaci\u00f3n de salida al modo usuario include/linux/entry-common.h:329 [en l\u00ednea] __syscall_salir_al_modo_usuario_work kernel/entry/common.c:207 [en l\u00ednea] syscall_salir_al_modo_usuario+0x150/0x2a0 kernel/entry/common.c:218 hacer_syscall_64+0xda/0x250 arch/x86/entry/common.c:89 entrada_SYSCALL_64_despu\u00e9s_de_hwframe+0x77/0x7f RIP: 0033:0x7fee3cb87a6a C\u00f3digo: No se puede acceder a los bytes del c\u00f3digo de operaci\u00f3n en 0x7fee3cb87a40. RSP: 002b:00007fffcccac688 EFLAGS: 00000202 ORIG_RAX: 0000000000000037 RAX: 0000000000000000 RBX: 00007fffcccac710 RCX: 00007fee3cb87a6a RDX: 0000000000000041 RSI: 000000000000000 RDI: 0000000000000003 RBP: 0000000000000003 R08: 00007fffcccac6ac R09: 00007fffcccacac7 R10: 00007fffcccac710 R11: 0000000000000202 R12: 00007fee3cd49500 R13: 00007fffcccac6ac R14: 0000000000000000 R15: 00007fee3cd4b000 M\u00f3dulos vinculados en: ---[ fin del seguimiento 000000000000000 ]--- RIP: 0010:proc_scheduler+0xc6/0x3c0 net/mptcp/ctrl.c:125 C\u00f3digo: 03 42 80 3c 38 00 0f 85 fe 02 00 00 4d 8b a4 24 08 09 00 00 48 b8 00 00 00 00 00 fc ---truncado---"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21643.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21643.json
index a07fa09a884..dbf2fa0f3b6 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21643.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21643.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:09.870",
"lastModified": "2025-01-19T11:15:09.870",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfs: Fix kernel async DIO\n\nNetfslib needs to be able to handle kernel-initiated asynchronous DIO that\nis supplied with a bio_vec[] array. Currently, because of the async flag,\nthis gets passed to netfs_extract_user_iter() which throws a warning and\nfails because it only handles IOVEC and UBUF iterators. This can be\ntriggered through a combination of cifs and a loopback blockdev with\nsomething like:\n\n mount //my/cifs/share /foo\n dd if=/dev/zero of=/foo/m0 bs=4K count=1K\n losetup --sector-size 4096 --direct-io=on /dev/loop2046 /foo/m0\n echo hello >/dev/loop2046\n\nThis causes the following to appear in syslog:\n\n WARNING: CPU: 2 PID: 109 at fs/netfs/iterator.c:50 netfs_extract_user_iter+0x170/0x250 [netfs]\n\nand the write to fail.\n\nFix this by removing the check in netfs_unbuffered_write_iter_locked() that\ncauses async kernel DIO writes to be handled as userspace writes. Note\nthat this change relies on the kernel caller maintaining the existence of\nthe bio_vec array (or kvec[] or folio_queue) until the op is complete."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfs: Se corrige el error DIO asincr\u00f3nico del kernel Netfslib debe poder gestionar el error DIO asincr\u00f3nico iniciado por el kernel que se suministra con una matriz bio_vec[]. Actualmente, debido al indicador async, esto se pasa a netfs_extract_user_iter() que lanza una advertencia y falla porque solo gestiona iteradores IOVEC y UBUF. Esto se puede activar a trav\u00e9s de una combinaci\u00f3n de cifs y un blockdev de bucle invertido con algo como: mount //my/cifs/share /foo dd if=/dev/zero of=/foo/m0 bs=4K count=1K losetup --sector-size 4096 --direct-io=on /dev/loop2046 /foo/m0 echo hello >/dev/loop2046 Esto hace que aparezca lo siguiente en syslog: ADVERTENCIA: CPU: 2 PID: 109 en fs/netfs/iterator.c:50 netfs_extract_user_iter+0x170/0x250 [netfs] y que la escritura falle. Solucione esto eliminando la comprobaci\u00f3n en netfs_unbuffered_write_iter_locked() que hace que las escrituras DIO del kernel as\u00edncronas se gestionen como escrituras del espacio de usuario. Tenga en cuenta que este cambio depende de que el llamador del n\u00facleo mantenga la existencia de la matriz bio_vec (o kvec[] o folio_queue) hasta que se complete la operaci\u00f3n."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21644.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21644.json
index abc4cb70030..0efa160324b 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21644.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21644.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:09.977",
"lastModified": "2025-01-19T11:15:09.977",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Fix tlb invalidation when wedging\n\nIf GuC fails to load, the driver wedges, but in the process it tries to\ndo stuff that may not be initialized yet. This moves the\nxe_gt_tlb_invalidation_init() to be done earlier: as its own doc says,\nit's a software-only initialization and should had been named with the\n_early() suffix.\n\nMove it to be called by xe_gt_init_early(), so the locks and seqno are\ninitialized, avoiding a NULL ptr deref when wedging:\n\n\txe 0000:03:00.0: [drm] *ERROR* GT0: load failed: status: Reset = 0, BootROM = 0x50, UKernel = 0x00, MIA = 0x00, Auth = 0x01\n\txe 0000:03:00.0: [drm] *ERROR* GT0: firmware signature verification failed\n\txe 0000:03:00.0: [drm] *ERROR* CRITICAL: Xe has declared device 0000:03:00.0 as wedged.\n\t...\n\tBUG: kernel NULL pointer dereference, address: 0000000000000000\n\t#PF: supervisor read access in kernel mode\n\t#PF: error_code(0x0000) - not-present page\n\tPGD 0 P4D 0\n\tOops: Oops: 0000 [#1] PREEMPT SMP NOPTI\n\tCPU: 9 UID: 0 PID: 3908 Comm: modprobe Tainted: G U W 6.13.0-rc4-xe+ #3\n\tTainted: [U]=USER, [W]=WARN\n\tHardware name: Intel Corporation Alder Lake Client Platform/AlderLake-S ADP-S DDR5 UDIMM CRB, BIOS ADLSFWI1.R00.3275.A00.2207010640 07/01/2022\n\tRIP: 0010:xe_gt_tlb_invalidation_reset+0x75/0x110 [xe]\n\nThis can be easily triggered by poking the GuC binary to force a\nsignature failure. There will still be an extra message,\n\n\txe 0000:03:00.0: [drm] *ERROR* GT0: GuC mmio request 0x4100: no reply 0x4100\n\nbut that's better than a NULL ptr deref.\n\n(cherry picked from commit 5001ef3af8f2c972d6fd9c5221a8457556f8bea6)"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe: Se corrige la invalidaci\u00f3n de tlb al realizar un wedging. Si GuC no se carga, el controlador realiza un wedging, pero en el proceso intenta hacer cosas que quiz\u00e1s a\u00fan no se hayan inicializado. Esto hace que xe_gt_tlb_invalidation_init() se realice antes: como dice su propia documentaci\u00f3n, es una inicializaci\u00f3n solo de software y deber\u00eda haber sido nombrada con el sufijo _early(). Mu\u00e9velo para que sea llamado por xe_gt_init_early(), de modo que los bloqueos y seqno se inicialicen, evitando un ptr deref NULL al realizar cu\u00f1as: xe 0000:03:00.0: [drm] *ERROR* GT0: carga fallida: estado: Reset = 0, BootROM = 0x50, UKernel = 0x00, MIA = 0x00, Auth = 0x01 xe 0000:03:00.0: [drm] *ERROR* GT0: verificaci\u00f3n de firma de firmware fallida xe 0000:03:00.0: [drm] *ERROR* CR\u00cdTICO: Xe ha declarado el dispositivo 0000:03:00.0 como cu\u00f1ado. ... ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 0000000000000000 #PF: acceso de lectura del supervisor en modo kernel #PF: error_code(0x0000) - p\u00e1gina no presente PGD 0 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 9 UID: 0 PID: 3908 Comm: modprobe Contaminado: GUW 6.13.0-rc4-xe+ #3 Contaminado: [U]=USER, [W]=WARN Nombre del hardware: Intel Corporation Alder Lake Client Platform/AlderLake-S ADP-S DDR5 UDIMM CRB, BIOS ADLSFWI1.R00.3275.A00.2207010640 01/07/2022 RIP: 0010:xe_gt_tlb_invalidation_reset+0x75/0x110 [xe] Esto se puede activar f\u00e1cilmente al presionar el binario GuC para forzar un error de firma. A\u00fan habr\u00e1 un mensaje adicional, xe 0000:03:00.0: [drm] *ERROR* GT0: Solicitud mmio GuC 0x4100: no hay respuesta 0x4100 pero eso es mejor que una desreferencia de ptr NULL. (seleccionado de el commit 5001ef3af8f2c972d6fd9c5221a8457556f8bea6)"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21645.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21645.json
index 96d3781295c..4c6b25d2aab 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21645.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21645.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:10.090",
"lastModified": "2025-01-19T11:15:10.090",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it\n\nWakeup for IRQ1 should be disabled only in cases where i8042 had\nactually enabled it, otherwise \"wake_depth\" for this IRQ will try to\ndrop below zero and there will be an unpleasant WARN() logged:\n\nkernel: atkbd serio0: Disabling IRQ1 wakeup source to avoid platform firmware bug\nkernel: ------------[ cut here ]------------\nkernel: Unbalanced IRQ 1 wake disable\nkernel: WARNING: CPU: 10 PID: 6431 at kernel/irq/manage.c:920 irq_set_irq_wake+0x147/0x1a0\n\nThe PMC driver uses DEFINE_SIMPLE_DEV_PM_OPS() to define its dev_pm_ops\nwhich sets amd_pmc_suspend_handler() to the .suspend, .freeze, and\n.poweroff handlers. i8042_pm_suspend(), however, is only set as\nthe .suspend handler.\n\nFix the issue by call PMC suspend handler only from the same set of\ndev_pm_ops handlers as i8042_pm_suspend(), which currently means just\nthe .suspend handler.\n\nTo reproduce this issue try hibernating (S4) the machine after a fresh boot\nwithout putting it into s2idle first.\n\n[ij: edited the commit message.]"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: platform/x86/amd/pmc: Solo deshabilitar la activaci\u00f3n de IRQ1 donde i8042 realmente la habilit\u00f3 La activaci\u00f3n para IRQ1 debe deshabilitarse solo en los casos en que i8042 realmente la haya habilitado, de lo contrario, \"wake_depth\" para esta IRQ intentar\u00e1 caer por debajo de cero y se registrar\u00e1 un WARN() desagradable: kernel: atkbd serio0: Deshabilitar la fuente de activaci\u00f3n de IRQ1 para evitar un error de firmware de la plataforma kernel: ------------[ cortar aqu\u00ed ]------------ kernel: Deshabilitar activaci\u00f3n de IRQ 1 no balanceada kernel: ADVERTENCIA: CPU: 10 PID: 6431 en kernel/irq/manage.c:920 irq_set_irq_wake+0x147/0x1a0 El controlador PMC usa DEFINE_SIMPLE_DEV_PM_OPS() para definir su dev_pm_ops que establece amd_pmc_suspend_handler() en .suspend, .freeze y .poweroff. Sin embargo, i8042_pm_suspend() solo se configura como el controlador .suspend. Solucione el problema llamando al controlador de suspensi\u00f3n PMC solo desde el mismo conjunto de controladores dev_pm_ops que i8042_pm_suspend(), lo que actualmente significa solo el controlador .suspend. Para reproducir este problema, intente hibernar (S4) la m\u00e1quina despu\u00e9s de un arranque nuevo sin ponerla primero en s2idle. [ij: edit\u00e9 el mensaje de confirmaci\u00f3n]."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21647.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21647.json
index efc8a7aa984..968f1c69296 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21647.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21647.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:10.307",
"lastModified": "2025-01-19T11:15:10.307",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched: sch_cake: add bounds checks to host bulk flow fairness counts\n\nEven though we fixed a logic error in the commit cited below, syzbot\nstill managed to trigger an underflow of the per-host bulk flow\ncounters, leading to an out of bounds memory access.\n\nTo avoid any such logic errors causing out of bounds memory accesses,\nthis commit factors out all accesses to the per-host bulk flow counters\nto a series of helpers that perform bounds-checking before any\nincrements and decrements. This also has the benefit of improving\nreadability by moving the conditional checks for the flow mode into\nthese helpers, instead of having them spread out throughout the\ncode (which was the cause of the original logic error).\n\nAs part of this change, the flow quantum calculation is consolidated\ninto a helper function, which means that the dithering applied to the\nost load scaling is now applied both in the DRR rotation and when a\nsparse flow's quantum is first initiated. The only user-visible effect\nof this is that the maximum packet size that can be sent while a flow\nstays sparse will now vary with +/- one byte in some cases. This should\nnot make a noticeable difference in practice, and thus it's not worth\ncomplicating the code to preserve the old behaviour."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched: sch_cake: agregar comprobaciones de los l\u00edmites a los recuentos de equidad de flujo masivo del host Aunque arreglamos un error l\u00f3gico en el commit citada a continuaci\u00f3n, syzbot a\u00fan logr\u00f3 activar un desbordamiento de los contadores de flujo masivo por host, lo que provoc\u00f3 un acceso a la memoria fuera de los l\u00edmites. Para evitar que dichos errores l\u00f3gicos provoquen accesos a la memoria fuera de los l\u00edmites, esta confirmaci\u00f3n elimina todos los accesos a los contadores de flujo masivo por host a una serie de ayudantes que realizan la comprobaci\u00f3n de los l\u00edmites antes de cualquier incremento o decremento. Esto tambi\u00e9n tiene el beneficio de mejorar la legibilidad al mover las comprobaciones condicionales para el modo de flujo a estos ayudantes, en lugar de tenerlas distribuidas por todo el c\u00f3digo (que era la causa del error l\u00f3gico original). Como parte de este cambio, el c\u00e1lculo cu\u00e1ntico de flujo se consolida en una funci\u00f3n auxiliar, lo que significa que el tramado aplicado al escalamiento de carga ost ahora se aplica tanto en la rotaci\u00f3n DRR como cuando se inicia por primera vez el cu\u00e1ntico de un flujo disperso. El \u00fanico efecto visible para el usuario es que el tama\u00f1o m\u00e1ximo de paquete que se puede enviar mientras un flujo permanece disperso variar\u00e1 ahora en +/- un byte en algunos casos. Esto no deber\u00eda suponer una diferencia notable en la pr\u00e1ctica y, por lo tanto, no vale la pena complicar el c\u00f3digo para conservar el comportamiento anterior."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21649.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21649.json
index 17f39de1b27..cd38e3d52a2 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21649.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21649.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:10.517",
"lastModified": "2025-01-19T11:15:10.517",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix kernel crash when 1588 is sent on HIP08 devices\n\nCurrently, HIP08 devices does not register the ptp devices, so the\nhdev->ptp is NULL. But the tx process would still try to set hardware time\nstamp info with SKBTX_HW_TSTAMP flag and cause a kernel crash.\n\n[ 128.087798] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018\n...\n[ 128.280251] pc : hclge_ptp_set_tx_info+0x2c/0x140 [hclge]\n[ 128.286600] lr : hclge_ptp_set_tx_info+0x20/0x140 [hclge]\n[ 128.292938] sp : ffff800059b93140\n[ 128.297200] x29: ffff800059b93140 x28: 0000000000003280\n[ 128.303455] x27: ffff800020d48280 x26: ffff0cb9dc814080\n[ 128.309715] x25: ffff0cb9cde93fa0 x24: 0000000000000001\n[ 128.315969] x23: 0000000000000000 x22: 0000000000000194\n[ 128.322219] x21: ffff0cd94f986000 x20: 0000000000000000\n[ 128.328462] x19: ffff0cb9d2a166c0 x18: 0000000000000000\n[ 128.334698] x17: 0000000000000000 x16: ffffcf1fc523ed24\n[ 128.340934] x15: 0000ffffd530a518 x14: 0000000000000000\n[ 128.347162] x13: ffff0cd6bdb31310 x12: 0000000000000368\n[ 128.353388] x11: ffff0cb9cfbc7070 x10: ffff2cf55dd11e02\n[ 128.359606] x9 : ffffcf1f85a212b4 x8 : ffff0cd7cf27dab0\n[ 128.365831] x7 : 0000000000000a20 x6 : ffff0cd7cf27d000\n[ 128.372040] x5 : 0000000000000000 x4 : 000000000000ffff\n[ 128.378243] x3 : 0000000000000400 x2 : ffffcf1f85a21294\n[ 128.384437] x1 : ffff0cb9db520080 x0 : ffff0cb9db500080\n[ 128.390626] Call trace:\n[ 128.393964] hclge_ptp_set_tx_info+0x2c/0x140 [hclge]\n[ 128.399893] hns3_nic_net_xmit+0x39c/0x4c4 [hns3]\n[ 128.405468] xmit_one.constprop.0+0xc4/0x200\n[ 128.410600] dev_hard_start_xmit+0x54/0xf0\n[ 128.415556] sch_direct_xmit+0xe8/0x634\n[ 128.420246] __dev_queue_xmit+0x224/0xc70\n[ 128.425101] dev_queue_xmit+0x1c/0x40\n[ 128.429608] ovs_vport_send+0xac/0x1a0 [openvswitch]\n[ 128.435409] do_output+0x60/0x17c [openvswitch]\n[ 128.440770] do_execute_actions+0x898/0x8c4 [openvswitch]\n[ 128.446993] ovs_execute_actions+0x64/0xf0 [openvswitch]\n[ 128.453129] ovs_dp_process_packet+0xa0/0x224 [openvswitch]\n[ 128.459530] ovs_vport_receive+0x7c/0xfc [openvswitch]\n[ 128.465497] internal_dev_xmit+0x34/0xb0 [openvswitch]\n[ 128.471460] xmit_one.constprop.0+0xc4/0x200\n[ 128.476561] dev_hard_start_xmit+0x54/0xf0\n[ 128.481489] __dev_queue_xmit+0x968/0xc70\n[ 128.486330] dev_queue_xmit+0x1c/0x40\n[ 128.490856] ip_finish_output2+0x250/0x570\n[ 128.495810] __ip_finish_output+0x170/0x1e0\n[ 128.500832] ip_finish_output+0x3c/0xf0\n[ 128.505504] ip_output+0xbc/0x160\n[ 128.509654] ip_send_skb+0x58/0xd4\n[ 128.513892] udp_send_skb+0x12c/0x354\n[ 128.518387] udp_sendmsg+0x7a8/0x9c0\n[ 128.522793] inet_sendmsg+0x4c/0x8c\n[ 128.527116] __sock_sendmsg+0x48/0x80\n[ 128.531609] __sys_sendto+0x124/0x164\n[ 128.536099] __arm64_sys_sendto+0x30/0x5c\n[ 128.540935] invoke_syscall+0x50/0x130\n[ 128.545508] el0_svc_common.constprop.0+0x10c/0x124\n[ 128.551205] do_el0_svc+0x34/0xdc\n[ 128.555347] el0_svc+0x20/0x30\n[ 128.559227] el0_sync_handler+0xb8/0xc0\n[ 128.563883] el0_sync+0x160/0x180"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: hns3: se corrige el fallo del kernel cuando se env\u00eda 1588 en dispositivos HIP08. Actualmente, los dispositivos HIP08 no registran los dispositivos ptp, por lo que hdev->ptp es NULL. Pero el proceso tx a\u00fan intentar\u00eda establecer la informaci\u00f3n de la marca de tiempo del hardware con el indicador SKBTX_HW_TSTAMP y provocar\u00eda un fallo del kernel. [ 128.087798] No se puede gestionar la desreferencia del puntero NULL del n\u00facleo en la direcci\u00f3n virtual 0000000000000018 ... [ 128.280251] pc : hclge_ptp_set_tx_info+0x2c/0x140 [hclge] [ 128.286600] lr : hclge_ptp_set_tx_info+0x20/0x140 [hclge] [ 128.292938] sp : ffff800059b93140 [ 128.297200] x29: ffff800059b93140 x28: 0000000000003280 [ 128.303455] x27: ffff800020d48280 x26: ffff0cb9dc814080 [ 128.309715] x25: ffff0cb9cde93fa0 x24: 0000000000000001 [ 128.315969] x23: 0000000000000000 x22: 0000000000000194 [ 128.322219] x21: ffff0cd94f986000 x20: 0000000000000000 [ 128.328462] x19: ffff0cb9d2a166c0 x18: 0000000000000000 [ [128.334698] x17: 0000000000000000 x16: ffffcf1fc523ed24 [128.340934] x15: 0000ffffd530a518 x14: 0000000000000000 [128.347162] x13: ffff0cd6bdb31310 x12: 0000000000000368 [128.353388] x11: ffff0cb9cfbc7070 x10: ffff2cf55dd11e02 [128.359606] x9: ffffcf1f85a212b4 x8: ffff0cd7cf27dab0 [ 128.365831] x7 : 0000000000000a20 x6 : ffff0cd7cf27d000 [ 128.372040] x5 : 000000000000000 x4 : 000000000000ffff [ 128.378243] x3 : 0000000000000400 x2 : ffffcf1f85a21294 [ 128.384437] x1 : ffff0cb9db520080 x0 : ffff0cb9db500080 [ 128.390626] Rastreo de llamadas: [ 128.393964] hclge_ptp_set_tx_info+0x2c/0x140 [hclge] [ 128.399893] hns3_nic_net_xmit+0x39c/0x4c4 [hns3] [ 128.405468] xmit_one.constprop.0+0xc4/0x200 [ 128.410600] dev_hard_start_xmit+0x54/0xf0 [ 128.415556] sch_direct_xmit+0xe8/0x634 [ 128.420246] __dev_queue_xmit+0x224/0xc70 [ 128.425101] dev_queue_xmit+0x1c/0x40 [ 128.429608] ovs_vport_send+0xac/0x1a0 [openvswitch] [ 128.435409] hacer_salida+0x60/0x17c [openvswitch] [ 128.440770] hacer_ejecutar_acciones+0x898/0x8c4 [openvswitch] [ 128.446993] ovs_ejecutar_acciones+0x64/0xf0 [openvswitch] [ 128.453129] ovs_dp_process_packet+0xa0/0x224 [openvswitch] [ 128.459530] ovs_vport_receive+0x7c/0xfc [openvswitch] [ 128.465497] interno_dev_xmit+0x34/0xb0 [openvswitch] [ 128.471460] xmit_one.constprop.0+0xc4/0x200 [ 128.476561] dev_hard_start_xmit+0x54/0xf0 [ 128.481489] __dev_queue_xmit+0x968/0xc70 [ 128.486330] dev_queue_xmit+0x1c/0x40 [ 128.490856] ip_finish_output2+0x250/0x570 [ 128.495810] __ip_finish_output+0x170/0x1e0 [ 128.500832] ip_finish_output+0x3c/0xf0 [ 128.505504] ip_output+0xbc/0x160 [ 128.509654] ip_send_skb+0x58/0xd4 [ 128.513892] udp_send_skb+0x12c/0x354 [ 128.518387] udp_sendmsg+0x7a8/0x9c0 [ 128.522793] inet_sendmsg+0x4c/0x8c [ 128.527116] __sock_sendmsg+0x48/0x80 [ 128.531609] __sys_sendto+0x124/0x164 [ 128.536099] __arm64_sys_sendto+0x30/0x5c [ 128.540935] invocar_llamada_al_sistema+0x50/0x130 [ 128.545508] el0_svc_common.constprop.0+0x10c/0x124 [ 128.551205] hacer_el0_svc+0x34/0xdc [ 128.555347] el0_svc+0x20/0x30 [ 128.559227] el0_sync_handler+0xb8/0xc0 [ 128.563883] el0_sync+0x160/0x180"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21650.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21650.json
index a96a24c9dee..b24965e4ce6 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21650.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21650.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:10.630",
"lastModified": "2025-01-19T11:15:10.630",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue\n\nThe TQP BAR space is divided into two segments. TQPs 0-1023 and TQPs\n1024-1279 are in different BAR space addresses. However,\nhclge_fetch_pf_reg does not distinguish the tqp space information when\nreading the tqp space information. When the number of TQPs is greater\nthan 1024, access bar space overwriting occurs.\nThe problem of different segments has been considered during the\ninitialization of tqp.io_base. Therefore, tqp.io_base is directly used\nwhen the queue is read in hclge_fetch_pf_reg.\n\nThe error message:\n\nUnable to handle kernel paging request at virtual address ffff800037200000\npc : hclge_fetch_pf_reg+0x138/0x250 [hclge]\nlr : hclge_get_regs+0x84/0x1d0 [hclge]\nCall trace:\n hclge_fetch_pf_reg+0x138/0x250 [hclge]\n hclge_get_regs+0x84/0x1d0 [hclge]\n hns3_get_regs+0x2c/0x50 [hns3]\n ethtool_get_regs+0xf4/0x270\n dev_ethtool+0x674/0x8a0\n dev_ioctl+0x270/0x36c\n sock_do_ioctl+0x110/0x2a0\n sock_ioctl+0x2ac/0x530\n __arm64_sys_ioctl+0xa8/0x100\n invoke_syscall+0x4c/0x124\n el0_svc_common.constprop.0+0x140/0x15c\n do_el0_svc+0x30/0xd0\n el0_svc+0x1c/0x2c\n el0_sync_handler+0xb0/0xb4\n el0_sync+0x168/0x180"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net:hns3: se ha corregido el problema de que hclge_fetch_pf_reg accede al espacio de la barra fuera de los l\u00edmites El espacio BAR de TQP se divide en dos segmentos. Los TQP 0-1023 y los TQP 1024-1279 est\u00e1n en diferentes direcciones de espacio BAR. Sin embargo, hclge_fetch_pf_reg no distingue la informaci\u00f3n del espacio tqp al leer la informaci\u00f3n del espacio tqp. Cuando el n\u00famero de TQP es mayor que 1024, se produce una sobrescritura del espacio de la barra de acceso. El problema de los diferentes segmentos se ha considerado durante la inicializaci\u00f3n de tqp.io_base. Por lo tanto, tqp.io_base se utiliza directamente cuando se lee la cola en hclge_fetch_pf_reg. Mensaje de error: No se puede gestionar la solicitud de paginaci\u00f3n del n\u00facleo en la direcci\u00f3n virtual ffff800037200000 pc : hclge_fetch_pf_reg+0x138/0x250 [hclge] lr : hclge_get_regs+0x84/0x1d0 [hclge] Call trace: hclge_fetch_pf_reg+0x138/0x250 [hclge] hclge_get_regs+0x84/0x1d0 [hclge] hns3_get_regs+0x2c/0x50 [hns3] ethtool_get_regs+0xf4/0x270 dev_ethtool+0x674/0x8a0 dev_ioctl+0x270/0x36c sock_do_ioctl+0x110/0x2a0 sock_ioctl+0x2ac/0x530 __arm64_sys_ioctl+0xa8/0x100 invoke_syscall+0x4c/0x124 el0_svc_common.constprop.0+0x140/0x15c do_el0_svc+0x30/0xd0 el0_svc+0x1c/0x2c el0_sync_handler+0xb0/0xb4 el0_sync+0x168/0x180 "
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21651.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21651.json
index b7163d47b27..4edd211df07 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21651.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21651.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:10.733",
"lastModified": "2025-01-19T11:15:10.733",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: don't auto enable misc vector\n\nCurrently, there is a time window between misc irq enabled\nand service task inited. If an interrupte is reported at\nthis time, it will cause warning like below:\n\n[ 16.324639] Call trace:\n[ 16.324641] __queue_delayed_work+0xb8/0xe0\n[ 16.324643] mod_delayed_work_on+0x78/0xd0\n[ 16.324655] hclge_errhand_task_schedule+0x58/0x90 [hclge]\n[ 16.324662] hclge_misc_irq_handle+0x168/0x240 [hclge]\n[ 16.324666] __handle_irq_event_percpu+0x64/0x1e0\n[ 16.324667] handle_irq_event+0x80/0x170\n[ 16.324670] handle_fasteoi_edge_irq+0x110/0x2bc\n[ 16.324671] __handle_domain_irq+0x84/0xfc\n[ 16.324673] gic_handle_irq+0x88/0x2c0\n[ 16.324674] el1_irq+0xb8/0x140\n[ 16.324677] arch_cpu_idle+0x18/0x40\n[ 16.324679] default_idle_call+0x5c/0x1bc\n[ 16.324682] cpuidle_idle_call+0x18c/0x1c4\n[ 16.324684] do_idle+0x174/0x17c\n[ 16.324685] cpu_startup_entry+0x30/0x6c\n[ 16.324687] secondary_start_kernel+0x1a4/0x280\n[ 16.324688] ---[ end trace 6aa0bff672a964aa ]---\n\nSo don't auto enable misc vector when request irq.."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: hns3: no habilitar autom\u00e1ticamente misc vector Actualmente, hay una ventana de tiempo entre la habilitaci\u00f3n de misc irq y la iniciaci\u00f3n de la tarea de servicio. Si se informa una interrupci\u00f3n en este momento, se generar\u00e1 una advertencia como la siguiente: [ 16.324639] Rastreo de llamadas: [ 16.324641] __queue_delayed_work+0xb8/0xe0 [ 16.324643] mod_delayed_work_on+0x78/0xd0 [ 16.324655] hclge_errhand_task_schedule+0x58/0x90 [hclge] [ 16.324662] hclge_misc_irq_handle+0x168/0x240 [hclge] [ 16.324666] __handle_irq_event_percpu+0x64/0x1e0 [ 16.324667] handle_irq_event+0x80/0x170 [ 16.324670] gestionar_fasteoi_edge_irq+0x110/0x2bc [ 16.324671] __gestionar_dominio_irq+0x84/0xfc [ 16.324673] gic_gestionar_irq+0x88/0x2c0 [ 16.324674] el1_irq+0xb8/0x140 [ 16.324677] arch_cpu_idle+0x18/0x40 [ 16.324679] llamada_inactiva_por_defecto+0x5c/0x1bc [ 16.324682] llamada_inactiva_cpu_idle+0x18c/0x1c4 [ 16.324684] do_idle+0x174/0x17c [ 16.324685] cpu_startup_entry+0x30/0x6c [ 16.324687] secondary_start_kernel+0x1a4/0x280 [ 16.324688] ---[ fin de seguimiento 6aa0bff672a964aa ]--- Por lo tanto, no habilite autom\u00e1ticamente el vector miscel\u00e1neo cuando solicite irq."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21652.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21652.json
index 2562e4b2ec0..51320f414a7 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21652.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21652.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:10.830",
"lastModified": "2025-01-19T11:15:10.830",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Fix use-after-free in ipvlan_get_iflink().\n\nsyzbot presented an use-after-free report [0] regarding ipvlan and\nlinkwatch.\n\nipvlan does not hold a refcnt of the lower device unlike vlan and\nmacvlan.\n\nIf the linkwatch work is triggered for the ipvlan dev, the lower dev\nmight have already been freed, resulting in UAF of ipvlan->phy_dev in\nipvlan_get_iflink().\n\nWe can delay the lower dev unregistration like vlan and macvlan by\nholding the lower dev's refcnt in dev->netdev_ops->ndo_init() and\nreleasing it in dev->priv_destructor().\n\nJakub pointed out calling .ndo_XXX after unregister_netdevice() has\nreturned is error prone and suggested [1] addressing this UAF in the\ncore by taking commit 750e51603395 (\"net: avoid potential UAF in\ndefault_operstate()\") further.\n\nLet's assume unregistering devices DOWN and use RCU protection in\ndefault_operstate() not to race with the device unregistration.\n\n[0]:\nBUG: KASAN: slab-use-after-free in ipvlan_get_iflink+0x84/0x88 drivers/net/ipvlan/ipvlan_main.c:353\nRead of size 4 at addr ffff0000d768c0e0 by task kworker/u8:35/6944\n\nCPU: 0 UID: 0 PID: 6944 Comm: kworker/u8:35 Not tainted 6.13.0-rc2-g9bc5c9515b48 #12 4c3cb9e8b4565456f6a355f312ff91f4f29b3c47\nHardware name: linux,dummy-virt (DT)\nWorkqueue: events_unbound linkwatch_event\nCall trace:\n show_stack+0x38/0x50 arch/arm64/kernel/stacktrace.c:484 (C)\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0xbc/0x108 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0x16c/0x6f0 mm/kasan/report.c:489\n kasan_report+0xc0/0x120 mm/kasan/report.c:602\n __asan_report_load4_noabort+0x20/0x30 mm/kasan/report_generic.c:380\n ipvlan_get_iflink+0x84/0x88 drivers/net/ipvlan/ipvlan_main.c:353\n dev_get_iflink+0x7c/0xd8 net/core/dev.c:674\n default_operstate net/core/link_watch.c:45 [inline]\n rfc2863_policy+0x144/0x360 net/core/link_watch.c:72\n linkwatch_do_dev+0x60/0x228 net/core/link_watch.c:175\n __linkwatch_run_queue+0x2f4/0x5b8 net/core/link_watch.c:239\n linkwatch_event+0x64/0xa8 net/core/link_watch.c:282\n process_one_work+0x700/0x1398 kernel/workqueue.c:3229\n process_scheduled_works kernel/workqueue.c:3310 [inline]\n worker_thread+0x8c4/0xe10 kernel/workqueue.c:3391\n kthread+0x2b0/0x360 kernel/kthread.c:389\n ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862\n\nAllocated by task 9303:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x30/0x68 mm/kasan/common.c:68\n kasan_save_alloc_info+0x44/0x58 mm/kasan/generic.c:568\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x84/0xa0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __do_kmalloc_node mm/slub.c:4283 [inline]\n __kmalloc_node_noprof+0x2a0/0x560 mm/slub.c:4289\n __kvmalloc_node_noprof+0x9c/0x230 mm/util.c:650\n alloc_netdev_mqs+0xb4/0x1118 net/core/dev.c:11209\n rtnl_create_link+0x2b8/0xb60 net/core/rtnetlink.c:3595\n rtnl_newlink_create+0x19c/0x868 net/core/rtnetlink.c:3771\n __rtnl_newlink net/core/rtnetlink.c:3896 [inline]\n rtnl_newlink+0x122c/0x15c0 net/core/rtnetlink.c:4011\n rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6901\n netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2542\n rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6928\n netlink_unicast_kernel net/netlink/af_netlink.c:1321 [inline]\n netlink_unicast+0x618/0x838 net/netlink/af_netlink.c:1347\n netlink_sendmsg+0x5fc/0x8b0 net/netlink/af_netlink.c:1891\n sock_sendmsg_nosec net/socket.c:711 [inline]\n __sock_sendmsg net/socket.c:726 [inline]\n __sys_sendto+0x2ec/0x438 net/socket.c:2197\n __do_sys_sendto net/socket.c:2204 [inline]\n __se_sys_sendto net/socket.c:2200 [inline]\n __arm64_sys_sendto+0xe4/0x110 net/socket.c:2200\n __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n invoke_syscall+0x90/0x278 arch/arm64/kernel/syscall.c:49\n el0_svc_common+0x13c/0x250 arch/arm64/kernel/syscall.c:132\n do_el0_svc+0x54/0x70 arch/arm64/kernel/syscall.c:151\n el\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipvlan: Se ha corregido el error use-after-free en ipvlan_get_iflink(). syzbot present\u00f3 un informe de error use-after-free [0] sobre ipvlan y linkwatch. ipvlan no contiene un refcnt del dispositivo inferior a diferencia de vlan y macvlan. Si se activa el trabajo de linkwatch para el dispositivo ipvlan dev, es posible que el dispositivo inferior ya se haya liberado, lo que da como resultado un UAF de ipvlan->phy_dev en ipvlan_get_iflink(). Podemos retrasar la anulaci\u00f3n del registro del dispositivo inferior como vlan y macvlan al retener el refcnt del dispositivo inferior en dev->netdev_ops->ndo_init() y liberarlo en dev->priv_destructor(). Jakub se\u00f1al\u00f3 que llamar a .ndo_XXX despu\u00e9s de que unregister_netdevice() haya regresado es propenso a errores y sugiri\u00f3 [1] abordar este UAF en el n\u00facleo llevando m\u00e1s all\u00e1 el commit 750e51603395 (\"net: evitar un UAF potencial en default_operstate()\"). Supongamos que se cancela el registro de dispositivos y usemos la protecci\u00f3n RCU en default_operstate() para no competir con la cancelaci\u00f3n del registro del dispositivo. [0]: ERROR: KASAN: slab-use-after-free in ipvlan_get_iflink+0x84/0x88 drivers/net/ipvlan/ipvlan_main.c:353 Read of size 4 at addr ffff0000d768c0e0 by task kworker/u8:35/6944 CPU: 0 UID: 0 PID: 6944 Comm: kworker/u8:35 Not tainted 6.13.0-rc2-g9bc5c9515b48 #12 4c3cb9e8b4565456f6a355f312ff91f4f29b3c47 Hardware name: linux,dummy-virt (DT) Workqueue: events_unbound linkwatch_event Call trace: show_stack+0x38/0x50 arch/arm64/kernel/stacktrace.c:484 (C) __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xbc/0x108 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x16c/0x6f0 mm/kasan/report.c:489 kasan_report+0xc0/0x120 mm/kasan/report.c:602 __asan_report_load4_noabort+0x20/0x30 mm/kasan/report_generic.c:380 ipvlan_get_iflink+0x84/0x88 drivers/net/ipvlan/ipvlan_main.c:353 dev_get_iflink+0x7c/0xd8 net/core/dev.c:674 default_operstate net/core/link_watch.c:45 [inline] rfc2863_policy+0x144/0x360 net/core/link_watch.c:72 linkwatch_do_dev+0x60/0x228 net/core/link_watch.c:175 __linkwatch_run_queue+0x2f4/0x5b8 net/core/link_watch.c:239 linkwatch_event+0x64/0xa8 net/core/link_watch.c:282 process_one_work+0x700/0x1398 kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x8c4/0xe10 kernel/workqueue.c:3391 kthread+0x2b0/0x360 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862 Allocated by task 9303: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x30/0x68 mm/kasan/common.c:68 kasan_save_alloc_info+0x44/0x58 mm/kasan/generic.c:568 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x84/0xa0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __do_kmalloc_node mm/slub.c:4283 [inline] __kmalloc_node_noprof+0x2a0/0x560 mm/slub.c:4289 __kvmalloc_node_noprof+0x9c/0x230 mm/util.c:650 alloc_netdev_mqs+0xb4/0x1118 net/core/dev.c:11209 rtnl_create_link+0x2b8/0xb60 net/core/rtnetlink.c:3595 rtnl_newlink_create+0x19c/0x868 net/core/rtnetlink.c:3771 __rtnl_newlink net/core/rtnetlink.c:3896 [inline] rtnl_newlink+0x122c/0x15c0 net/core/rtnetlink.c:4011 rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6901 netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2542 rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6928 netlink_unicast_kernel net/netlink/af_netlink.c:1321 [inline] netlink_unicast+0x618/0x838 net/netlink/af_netlink.c:1347 netlink_sendmsg+0x5fc/0x8b0 net/netlink/af_netlink.c:1891 sock_sendmsg_nosec net/socket.c:711 [inline] __sock_sendmsg net/socket.c:726 [inline] __sys_sendto+0x2ec/0x438 net/socket.c:2197 __do_sys_sendto net/socket.c:2204 [inline] __se_sys_sendto net/socket.c:2200 [inline] __arm64_sys_sendto+0xe4/0x110 net/socket.c:2200 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x90/0x278 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x13c/0x250 arch/arm64/kernel/syscall.c:132 do_el0_svc+0x54/0x---truncado---"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21655.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21655.json
index 08ab0396d5a..26392110ae5 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21655.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21655.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-20T14:15:27.027",
"lastModified": "2025-01-20T14:15:27.027",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/eventfd: ensure io_eventfd_signal() defers another RCU period\n\nio_eventfd_do_signal() is invoked from an RCU callback, but when\ndropping the reference to the io_ev_fd, it calls io_eventfd_free()\ndirectly if the refcount drops to zero. This isn't correct, as any\npotential freeing of the io_ev_fd should be deferred another RCU grace\nperiod.\n\nJust call io_eventfd_put() rather than open-code the dec-and-test and\nfree, which will correctly defer it another RCU grace period."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring/eventfd: garantizar que io_eventfd_signal() posponga otro per\u00edodo de RCU io_eventfd_do_signal() se invoca desde una devoluci\u00f3n de llamada de RCU, pero al eliminar la referencia a io_ev_fd, llama a io_eventfd_free() directamente si El recuento cae a cero. Esto no es correcto, ya que cualquier posible liberaci\u00f3n de io_ev_fd deber\u00eda posponerse otro per\u00edodo de gracia de RCU. Simplemente llame a io_eventfd_put() en lugar de abrir el c\u00f3digo dec-and-test y free, lo que lo diferir\u00e1 correctamente a otro per\u00edodo de gracia de RCU."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21656.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21656.json
index 75976374de0..bf96498417a 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21656.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21656.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T13:15:09.240",
"lastModified": "2025-01-21T13:15:09.240",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur\n\nscsi_execute_cmd() function can return both negative (linux codes) and\npositive (scsi_cmnd result field) error codes.\n\nCurrently the driver just passes error codes of scsi_execute_cmd() to\nhwmon core, which is incorrect because hwmon only checks for negative\nerror codes. This leads to hwmon reporting uninitialized data to\nuserspace in case of SCSI errors (for example if the disk drive was\ndisconnected).\n\nThis patch checks scsi_execute_cmd() output and returns -EIO if it's\nerror code is positive.\n\n[groeck: Avoid inline variable declaration for portability]"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: (drivetemp) Se soluciona que el controlador produzca datos basura cuando se producen errores SCSI. La funci\u00f3n scsi_execute_cmd() puede devolver c\u00f3digos de error negativos (c\u00f3digos de Linux) y positivos (campo de resultado scsi_cmnd). Actualmente, el controlador solo pasa los c\u00f3digos de error de scsi_execute_cmd() al n\u00facleo de hwmon, lo que es incorrecto porque hwmon solo verifica los c\u00f3digos de error negativos. Esto hace que hwmon informe datos no inicializados al espacio de usuario en caso de errores SCSI (por ejemplo, si la unidad de disco se desconect\u00f3). Este parche verifica la salida de scsi_execute_cmd() y devuelve -EIO si su c\u00f3digo de error es positivo. [groeck: Evite la declaraci\u00f3n de variables en l\u00ednea para la portabilidad]"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21657.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21657.json
index 770f5e6c2a2..9ba73641569 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21657.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21657.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T13:15:09.340",
"lastModified": "2025-01-21T13:15:09.340",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched_ext: Replace rq_lock() to raw_spin_rq_lock() in scx_ops_bypass()\n\nscx_ops_bypass() iterates all CPUs to re-enqueue all the scx tasks.\nFor each CPU, it acquires a lock using rq_lock() regardless of whether\na CPU is offline or the CPU is currently running a task in a higher\nscheduler class (e.g., deadline). The rq_lock() is supposed to be used\nfor online CPUs, and the use of rq_lock() may trigger an unnecessary\nwarning in rq_pin_lock(). Therefore, replace rq_lock() to\nraw_spin_rq_lock() in scx_ops_bypass().\n\nWithout this change, we observe the following warning:\n\n===== START =====\n[ 6.615205] rq->balance_callback && rq->balance_callback != &balance_push_callback\n[ 6.615208] WARNING: CPU: 2 PID: 0 at kernel/sched/sched.h:1730 __schedule+0x1130/0x1c90\n===== END ====="
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched_ext: Reemplace rq_lock() por raw_spin_rq_lock() en scx_ops_bypass() scx_ops_bypass() itera todas las CPU para volver a poner en cola todas las tareas de scx. Para cada CPU, adquiere un bloqueo mediante rq_lock() independientemente de si una CPU est\u00e1 fuera de l\u00ednea o si la CPU est\u00e1 ejecutando actualmente una tarea en una clase de programador superior (por ejemplo, fecha l\u00edmite). Se supone que rq_lock() se debe utilizar para CPU en l\u00ednea, y el uso de rq_lock() puede activar una advertencia innecesaria en rq_pin_lock(). Por lo tanto, reemplace rq_lock() por raw_spin_rq_lock() en scx_ops_bypass(). Sin este cambio, observamos la siguiente advertencia: ===== START ===== [ 6.615205] rq->balance_callback && rq->balance_callback != &balance_push_callback [ 6.615208] ADVERTENCIA: CPU: 2 PID: 0 en kernel/sched/sched.h:1730 __schedule+0x1130/0x1c90 ===== END ========== "
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21658.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21658.json
index afc5222ae4d..ef9297f2b8e 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21658.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21658.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid NULL pointer dereference if no valid extent tree\n\n[BUG]\nSyzbot reported a crash with the following call trace:\n\n BTRFS info (device loop0): scrub: started on devid 1\n BUG: kernel NULL pointer dereference, address: 0000000000000208\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 106e70067 P4D 106e70067 PUD 107143067 PMD 0\n Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 1 UID: 0 PID: 689 Comm: repro Kdump: loaded Tainted: G O 6.13.0-rc4-custom+ #206\n Tainted: [O]=OOT_MODULE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 02/02/2022\n RIP: 0010:find_first_extent_item+0x26/0x1f0 [btrfs]\n Call Trace:\n \n scrub_find_fill_first_stripe+0x13d/0x3b0 [btrfs]\n scrub_simple_mirror+0x175/0x260 [btrfs]\n scrub_stripe+0x5d4/0x6c0 [btrfs]\n scrub_chunk+0xbb/0x170 [btrfs]\n scrub_enumerate_chunks+0x2f4/0x5f0 [btrfs]\n btrfs_scrub_dev+0x240/0x600 [btrfs]\n btrfs_ioctl+0x1dc8/0x2fa0 [btrfs]\n ? do_sys_openat2+0xa5/0xf0\n __x64_sys_ioctl+0x97/0xc0\n do_syscall_64+0x4f/0x120\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \n\n[CAUSE]\nThe reproducer is using a corrupted image where extent tree root is\ncorrupted, thus forcing to use \"rescue=all,ro\" mount option to mount the\nimage.\n\nThen it triggered a scrub, but since scrub relies on extent tree to find\nwhere the data/metadata extents are, scrub_find_fill_first_stripe()\nrelies on an non-empty extent root.\n\nBut unfortunately scrub_find_fill_first_stripe() doesn't really expect\nan NULL pointer for extent root, it use extent_root to grab fs_info and\ntriggered a NULL pointer dereference.\n\n[FIX]\nAdd an extra check for a valid extent root at the beginning of\nscrub_find_fill_first_stripe().\n\nThe new error path is introduced by 42437a6386ff (\"btrfs: introduce\nmount option rescue=ignorebadroots\"), but that's pretty old, and later\ncommit b979547513ff (\"btrfs: scrub: introduce helper to find and fill\nsector info for a scrub_stripe\") changed how we do scrub.\n\nSo for kernels older than 6.6, the fix will need manual backport."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: evitar la desreferencia de puntero NULL si no hay un \u00e1rbol de extensi\u00f3n v\u00e1lido [ERROR] Syzbot inform\u00f3 de un fallo con el siguiente seguimiento de llamada: Informaci\u00f3n de BTRFS (bucle de dispositivo 0): scrub: iniciado en devid 1 ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 0000000000000208 #PF: acceso de lectura de supervisor en modo kernel #PF: error_code(0x0000) - p\u00e1gina no presente PGD 106e70067 P4D 106e70067 PUD 107143067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 1 UID: 0 PID: 689 Comm: repro Kdump: cargado Tainted: G O 6.13.0-rc4-custom+ #206 Tainted: [O]=OOT_MODULE Nombre de hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS desconocido 02/02/2022 RIP: 0010:find_first_extent_item+0x26/0x1f0 [btrfs] Seguimiento de llamadas: Scrub_find_fill_first_stripe+0x13d/0x3b0 [btrfs] Scrub_simple_mirror+0x175/0x260 [btrfs] Scrub_stripe+0x5d4/0x6c0 [btrfs] Scrub_chunk+0xbb/0x170 [btrfs] Scrub_enumerate_chunks+0x2f4/0x5f0 [btrfs] btrfs_scrub_dev+0x240/0x600 [btrfs] btrfs_ioctl+0x1dc8/0x2fa0 [btrfs] ? do_sys_openat2+0xa5/0xf0 __x64_sys_ioctl+0x97/0xc0 do_syscall_64+0x4f/0x120 entry_SYSCALL_64_after_hwframe+0x76/0x7e [CAUSA] El reproductor est\u00e1 usando una imagen da\u00f1ada donde la ra\u00edz del \u00e1rbol de extensi\u00f3n est\u00e1 da\u00f1ada, lo que obliga a usar la opci\u00f3n de montaje \"rescue=all,ro\" para montar la imagen. Luego, activ\u00f3 una limpieza, pero como la limpieza depende del \u00e1rbol de extensi\u00f3n para encontrar d\u00f3nde est\u00e1n las extensiones de datos/metadatos, scrub_find_fill_first_stripe() depende de una ra\u00edz de extensi\u00f3n no vac\u00eda. Pero desafortunadamente scrub_find_fill_first_stripe() no espera realmente un puntero NULL para la ra\u00edz de la extensi\u00f3n, usa extended_root para obtener fs_info y activa una desreferencia de puntero NULL. [SOLUCI\u00d3N] Agregue una verificaci\u00f3n adicional para una ra\u00edz de extensi\u00f3n v\u00e1lida al comienzo de scrub_find_fill_first_stripe(). La nueva ruta de error es introducida por 42437a6386ff (\"btrfs: introduce mount option rescue=ignorebadroots\"), pero eso es bastante antiguo, y el commit posterior b979547513ff (\"btrfs: scrub: introduce helper to find and fill sector info for a scrub_stripe\") cambi\u00f3 la forma en que realizamos el scrub. Entonces, para los kernels anteriores a 6.6, la soluci\u00f3n necesitar\u00e1 una adaptaci\u00f3n manual. "
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21659.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21659.json
index 0c203ff6a6d..913d492cd0a 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21659.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21659.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T13:15:09.540",
"lastModified": "2025-01-21T13:15:09.540",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetdev: prevent accessing NAPI instances from another namespace\n\nThe NAPI IDs were not fully exposed to user space prior to the netlink\nAPI, so they were never namespaced. The netlink API must ensure that\nat the very least NAPI instance belongs to the same netns as the owner\nof the genl sock.\n\nnapi_by_id() can become static now, but it needs to move because of\ndev_get_by_napi_id()."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netdev: evitar el acceso a instancias NAPI desde otro espacio de nombres Los identificadores NAPI no estaban completamente expuestos al espacio de usuario antes de la API netlink, por lo que nunca se asignaron espacios de nombres. La API netlink debe garantizar que, como m\u00ednimo, la instancia NAPI pertenezca a la misma red que el propietario del calcet\u00edn genl. napi_by_id() ahora puede volverse est\u00e1tico, pero debe moverse debido a dev_get_by_napi_id(). "
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21660.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21660.json
index 7fffa42c1a8..32fb906d36f 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21660.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21660.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T13:15:09.643",
"lastModified": "2025-01-21T13:15:09.643",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix unexpectedly changed path in ksmbd_vfs_kern_path_locked\n\nWhen `ksmbd_vfs_kern_path_locked` met an error and it is not the last\nentry, it will exit without restoring changed path buffer. But later this\nbuffer may be used as the filename for creation."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: se corrige la ruta inesperadamente cambiada en ksmbd_vfs_kern_path_locked Cuando `ksmbd_vfs_kern_path_locked` encuentra un error y no es la \u00faltima entrada, saldr\u00e1 sin restaurar el b\u00fafer de ruta cambiada. Pero m\u00e1s adelante, este b\u00fafer se puede usar como nombre de archivo para la creaci\u00f3n."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21661.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21661.json
index 7cc0be82b5a..5f93041cbdf 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21661.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21661.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T13:15:09.747",
"lastModified": "2025-01-21T13:15:09.747",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: virtuser: fix missing lookup table cleanups\n\nWhen a virtuser device is created via configfs and the probe fails due\nto an incorrect lookup table, the table is not removed. This prevents\nsubsequent probe attempts from succeeding, even if the issue is\ncorrected, unless the device is released. Additionally, cleanup is also\nneeded in the less likely case of platform_device_register_full()\nfailure.\n\nBesides, a consistent memory leak in lookup_table->dev_id was spotted\nusing kmemleak by toggling the live state between 0 and 1 with a correct\nlookup table.\n\nIntroduce gpio_virtuser_remove_lookup_table() as the counterpart to the\nexisting gpio_virtuser_make_lookup_table() and call it from all\nnecessary points to ensure proper cleanup."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gpio: virtuser: corregir limpiezas de tablas de b\u00fasqueda faltantes Cuando se crea un dispositivo virtuser a trav\u00e9s de configfs y la sonda falla debido a una tabla de b\u00fasqueda incorrecta, la tabla no se elimina. Esto evita que los intentos de sonda posteriores tengan \u00e9xito, incluso si se corrige el problema, a menos que se libere el dispositivo. Adem\u00e1s, tambi\u00e9n se necesita limpieza en el caso menos probable de que falle platform_device_register_full(). Adem\u00e1s, se detect\u00f3 una p\u00e9rdida de memoria constante en lookup_table->dev_id usando kmemleak alternando el estado activo entre 0 y 1 con una tabla de b\u00fasqueda correcta. Introduzca gpio_virtuser_remove_lookup_table() como contraparte del gpio_virtuser_make_lookup_table() existente y ll\u00e1melo desde todos los puntos necesarios para garantizar una limpieza adecuada. "
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21662.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21662.json
index 740460a3310..a2760fb433d 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21662.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21662.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T13:15:09.847",
"lastModified": "2025-01-21T13:15:09.847",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix variable not being completed when function returns\n\nWhen cmd_alloc_index(), fails cmd_work_handler() needs\nto complete ent->slotted before returning early.\nOtherwise the task which issued the command may hang:\n\n mlx5_core 0000:01:00.0: cmd_work_handler:877:(pid 3880418): failed to allocate command entry\n INFO: task kworker/13:2:4055883 blocked for more than 120 seconds.\n Not tainted 4.19.90-25.44.v2101.ky10.aarch64 #1\n \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n kworker/13:2 D 0 4055883 2 0x00000228\n Workqueue: events mlx5e_tx_dim_work [mlx5_core]\n Call trace:\n __switch_to+0xe8/0x150\n __schedule+0x2a8/0x9b8\n schedule+0x2c/0x88\n schedule_timeout+0x204/0x478\n wait_for_common+0x154/0x250\n wait_for_completion+0x28/0x38\n cmd_exec+0x7a0/0xa00 [mlx5_core]\n mlx5_cmd_exec+0x54/0x80 [mlx5_core]\n mlx5_core_modify_cq+0x6c/0x80 [mlx5_core]\n mlx5_core_modify_cq_moderation+0xa0/0xb8 [mlx5_core]\n mlx5e_tx_dim_work+0x54/0x68 [mlx5_core]\n process_one_work+0x1b0/0x448\n worker_thread+0x54/0x468\n kthread+0x134/0x138\n ret_from_fork+0x10/0x18"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: Se solucion\u00f3 que la variable no se completara cuando la funci\u00f3n retorna Cuando cmd_alloc_index(), falla cmd_work_handler() debe completar ent->slotted antes de regresar antes. De lo contrario, la tarea que emiti\u00f3 el comando puede bloquearse: mlx5_core 0000:01:00.0: cmd_work_handler:877:(pid 3880418): no se pudo asignar la entrada del comando INFO: la tarea kworker/13:2:4055883 se bloque\u00f3 durante m\u00e1s de 120 segundos. No est\u00e1 contaminada 4.19.90-25.44.v2101.ky10.aarch64 #1 \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message. kworker/13:2 D 0 4055883 2 0x00000228 Workqueue: events mlx5e_tx_dim_work [mlx5_core] Call trace: __switch_to+0xe8/0x150 __schedule+0x2a8/0x9b8 schedule+0x2c/0x88 schedule_timeout+0x204/0x478 wait_for_common+0x154/0x250 wait_for_completion+0x28/0x38 cmd_exec+0x7a0/0xa00 [mlx5_core] mlx5_cmd_exec+0x54/0x80 [mlx5_core] mlx5_core_modify_cq+0x6c/0x80 [mlx5_core] mlx5_core_modify_cq_moderation+0xa0/0xb8 [mlx5_core] mlx5e_tx_dim_work+0x54/0x68 [mlx5_core] process_one_work+0x1b0/0x448 worker_thread+0x54/0x468 kthread+0x134/0x138 ret_from_fork+0x10/0x18 "
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21663.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21663.json
index 9f89eade7eb..792ab1ad23e 100644
--- a/CVE-2025/CVE-2025-216xx/CVE-2025-21663.json
+++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21663.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T13:15:09.947",
"lastModified": "2025-01-21T13:15:09.947",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: dwmac-tegra: Read iommu stream id from device tree\n\nNvidia's Tegra MGBE controllers require the IOMMU \"Stream ID\" (SID) to be\nwritten to the MGBE_WRAP_AXI_ASID0_CTRL register.\n\nThe current driver is hard coded to use MGBE0's SID for all controllers.\nThis causes softirq time outs and kernel panics when using controllers\nother than MGBE0.\n\nExample dmesg errors when an ethernet cable is connected to MGBE1:\n\n[ 116.133290] tegra-mgbe 6910000.ethernet eth1: Link is Up - 1Gbps/Full - flow control rx/tx\n[ 121.851283] tegra-mgbe 6910000.ethernet eth1: NETDEV WATCHDOG: CPU: 5: transmit queue 0 timed out 5690 ms\n[ 121.851782] tegra-mgbe 6910000.ethernet eth1: Reset adapter.\n[ 121.892464] tegra-mgbe 6910000.ethernet eth1: Register MEM_TYPE_PAGE_POOL RxQ-0\n[ 121.905920] tegra-mgbe 6910000.ethernet eth1: PHY [stmmac-1:00] driver [Aquantia AQR113] (irq=171)\n[ 121.907356] tegra-mgbe 6910000.ethernet eth1: Enabling Safety Features\n[ 121.907578] tegra-mgbe 6910000.ethernet eth1: IEEE 1588-2008 Advanced Timestamp supported\n[ 121.908399] tegra-mgbe 6910000.ethernet eth1: registered PTP clock\n[ 121.908582] tegra-mgbe 6910000.ethernet eth1: configuring for phy/10gbase-r link mode\n[ 125.961292] tegra-mgbe 6910000.ethernet eth1: Link is Up - 1Gbps/Full - flow control rx/tx\n[ 181.921198] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:\n[ 181.921404] rcu: \t7-....: (1 GPs behind) idle=540c/1/0x4000000000000002 softirq=1748/1749 fqs=2337\n[ 181.921684] rcu: \t(detected by 4, t=6002 jiffies, g=1357, q=1254 ncpus=8)\n[ 181.921878] Sending NMI from CPU 4 to CPUs 7:\n[ 181.921886] NMI backtrace for cpu 7\n[ 181.922131] CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Kdump: loaded Not tainted 6.13.0-rc3+ #6\n[ 181.922390] Hardware name: NVIDIA CTI Forge + Orin AGX/Jetson, BIOS 202402.1-Unknown 10/28/2024\n[ 181.922658] pstate: 40400009 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 181.922847] pc : handle_softirqs+0x98/0x368\n[ 181.922978] lr : __do_softirq+0x18/0x20\n[ 181.923095] sp : ffff80008003bf50\n[ 181.923189] x29: ffff80008003bf50 x28: 0000000000000008 x27: 0000000000000000\n[ 181.923379] x26: ffffce78ea277000 x25: 0000000000000000 x24: 0000001c61befda0\n[ 181.924486] x23: 0000000060400009 x22: ffffce78e99918bc x21: ffff80008018bd70\n[ 181.925568] x20: ffffce78e8bb00d8 x19: ffff80008018bc20 x18: 0000000000000000\n[ 181.926655] x17: ffff318ebe7d3000 x16: ffff800080038000 x15: 0000000000000000\n[ 181.931455] x14: ffff000080816680 x13: ffff318ebe7d3000 x12: 000000003464d91d\n[ 181.938628] x11: 0000000000000040 x10: ffff000080165a70 x9 : ffffce78e8bb0160\n[ 181.945804] x8 : ffff8000827b3160 x7 : f9157b241586f343 x6 : eeb6502a01c81c74\n[ 181.953068] x5 : a4acfcdd2e8096bb x4 : ffffce78ea277340 x3 : 00000000ffffd1e1\n[ 181.960329] x2 : 0000000000000101 x1 : ffffce78ea277340 x0 : ffff318ebe7d3000\n[ 181.967591] Call trace:\n[ 181.970043] handle_softirqs+0x98/0x368 (P)\n[ 181.974240] __do_softirq+0x18/0x20\n[ 181.977743] ____do_softirq+0x14/0x28\n[ 181.981415] call_on_irq_stack+0x24/0x30\n[ 181.985180] do_softirq_own_stack+0x20/0x30\n[ 181.989379] __irq_exit_rcu+0x114/0x140\n[ 181.993142] irq_exit_rcu+0x14/0x28\n[ 181.996816] el1_interrupt+0x44/0xb8\n[ 182.000316] el1h_64_irq_handler+0x14/0x20\n[ 182.004343] el1h_64_irq+0x80/0x88\n[ 182.007755] cpuidle_enter_state+0xc4/0x4a8 (P)\n[ 182.012305] cpuidle_enter+0x3c/0x58\n[ 182.015980] cpuidle_idle_call+0x128/0x1c0\n[ 182.020005] do_idle+0xe0/0xf0\n[ 182.023155] cpu_startup_entry+0x3c/0x48\n[ 182.026917] secondary_start_kernel+0xdc/0x120\n[ 182.031379] __secondary_switched+0x74/0x78\n[ 212.971162] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 7-.... } 6103 jiffies s: 417 root: 0x80/.\n[ 212.985935] rcu: blocking rcu_node structures (internal RCU debug):\n[ 212.992758] Sending NMI from CPU 0 to CPUs 7:\n[ 212.998539] NMI backtrace for cpu 7\n[ 213.004304] CPU: 7 UID: 0 PI\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: stmmac: dwmac-tegra: Leer el ID de flujo de iommu del \u00e1rbol de dispositivos Los controladores Tegra MGBE de Nvidia requieren que el \"ID de flujo\" (SID) de IOMMU se escriba en el registro MGBE_WRAP_AXI_ASID0_CTRL. El controlador actual est\u00e1 codificado de forma r\u00edgida para utilizar el SID de MGBE0 para todos los controladores. Esto provoca tiempos de espera de softirq y p\u00e1nicos del kernel cuando se utilizan controladores distintos de MGBE0. Ejemplo de errores dmesg cuando un cable Ethernet est\u00e1 conectado a MGBE1: [ 116.133290] tegra-mgbe 6910000.ethernet eth1: El enlace est\u00e1 activo - 1 Gbps/completo - control de flujo rx/tx [ 121.851283] tegra-mgbe 6910000.ethernet eth1: NETDEV WATCHDOG: CPU: 5: la cola de transmisi\u00f3n 0 agot\u00f3 el tiempo de espera de 5690 ms [ 121.851782] tegra-mgbe 6910000.ethernet eth1: Reiniciar el adaptador. [ 121.892464] tegra-mgbe 6910000.ethernet eth1: Registrar MEM_TYPE_PAGE_POOL RxQ-0 [ 121.905920] tegra-mgbe 6910000.ethernet eth1: Controlador PHY [stmmac-1:00] [Aquantia AQR113] (irq=171) [ 121.907356] tegra-mgbe 6910000.ethernet eth1: Habilitaci\u00f3n de funciones de seguridad [ 121.907578] tegra-mgbe 6910000.ethernet eth1: Marca de tiempo avanzada IEEE 1588-2008 compatible [ 121.908399] tegra-mgbe 6910000.ethernet eth1: Reloj PTP registrado [ 121.908582] tegra-mgbe 6910000.ethernet eth1: configurando para modo de enlace phy/10gbase-r [ 125.961292] tegra-mgbe 6910000.ethernet eth1: Enlace activo - 1 Gbps/completo - control de flujo rx/tx [ 181.921198] rcu: INFORMACI\u00d3N: rcu_preempt detect\u00f3 bloqueos en CPU/tareas: [ 181.921404] rcu: 7-....: (1 GP detr\u00e1s) idle=540c/1/0x4000000000000002 softirq=1748/1749 fqs=2337 [ 181.921684] rcu: (detectado por 4, t=6002 jiffies, g=1357, q=1254 ncpus=8) [ 181.921878] Enviando NMI desde la CPU 4 a las CPU 7: [ 181.921886] Seguimiento de NMI para la CPU 7 [ 181.922131] CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Kdump: cargado No contaminado 6.13.0-rc3+ #6 [ 181.922390] Nombre del hardware: NVIDIA CTI Forge + Orin AGX/Jetson, BIOS 202402.1-Unknown 28/10/2024 [ 181.922658] pstate: 40400009 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 181.922847] pc : handle_softirqs+0x98/0x368 [ 181.922978] lr : __do_softirq+0x18/0x20 [ 181.923095] sp : ffff80008003bf50 [ 181.923189] x29: ffff80008003bf50 x28: 0000000000000008 x27: 0000000000000000 [ 181.923379] x26: ffffce78ea277000 x25: 0000000000000000 x24: 0000001c61befda0 [ 181.924486] x23: 0000000060400009 x22: ffffce78e99918bc x21: ffff80008018bd70 [ 181.925568] x20: ffffce78e8bb00d8 x19: ffff80008018bc20 x18: 0000000000000000 [ 181.926655] x17: ffff318ebe7d3000 x16: ffff800080038000 x15: 0000000000000000 [ 181.931455] x14: ffff000080816680 x13: ffff318ebe7d3000 x12: 000000003464d91d [ 181.938628] x11: 0000000000000040 x10: ffff000080165a70 x9 : ffffce78e8bb0160 [ 181.945804] x8: ffff8000827b3160 x7: f9157b241586f343 x6: eeb6502a01c81c74 [181.953068] x5: a4acfcdd2e8096bb x4: ffffce78ea277340 x3: 00000000ffffd1e1 [ 181.960329] x2 : 0000000000000101 x1 : ffffce78ea277340 x0 : ffff318ebe7d3000 [ 181.967591] Rastreo de llamadas: [ 181.970043] handle_softirqs+0x98/0x368 (P) [ 181.974240] __do_softirq+0x18/0x20 [ 181.977743] ____do_softirq+0x14/0x28 [ 181.981415] call_on_irq_stack+0x24/0x30 [ 181.985180] do_softirq_own_stack+0x20/0x30 [ 181.989379] __irq_exit_rcu+0x114/0x140 [ 181.993142] irq_exit_rcu+0x14/0x28 [ 181.996816] el1_interrupt+0x44/0xb8 [ 182.000316] el1h_64_irq_handler+0x14/0x20 [ 182.004343] el1h_64_irq+0x80/0x88 [ 182.007755] cpuidle_enter_state+0xc4/0x4a8 (P) [ 182.012305] cpuidle_enter+0x3c/0x58 [ 182.015980] cpuidle_idle_call+0x128/0x1c0 [ 182.020005] do_idle+0xe0/0xf0 [ 182.023155] cpu_startup_entry+0x3c/0x48 [ 182.026917] secondary_start_kernel+0xdc/0x120 [ 182.031379] __secondary_switched+0x74/0x78 [ 212.971162] rcu:---truncado---"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22131.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22131.json
index bac6e1228ee..dc0357110b2 100644
--- a/CVE-2025/CVE-2025-221xx/CVE-2025-22131.json
+++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22131.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-20T16:15:27.880",
"lastModified": "2025-01-20T16:15:27.880",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Cross-Site Scripting (XSS) vulnerability in the code which translates the XLSX file into a HTML representation and displays it in the response."
+ },
+ {
+ "lang": "es",
+ "value": "PhpSpreadsheet es una librer\u00eda de PHP para leer y escribir archivos de hojas de c\u00e1lculo. Vulnerabilidad de Cross-Site Scripting (XSS) en el c\u00f3digo que traduce el archivo XLSX a una representaci\u00f3n HTML y lo muestra en la respuesta."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22150.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22150.json
index 1738325734c..b92e737c595 100644
--- a/CVE-2025/CVE-2025-221xx/CVE-2025-22150.json
+++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22150.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-21T18:15:14.887",
"lastModified": "2025-01-21T18:15:14.887",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers."
+ },
+ {
+ "lang": "es",
+ "value": "Undici es un cliente HTTP/1.1. A partir de la versi\u00f3n 4.5.0 y antes de las versiones 5.28.5, 6.21.1 y 7.2.3, undici usa `Math.random()` para elegir el l\u00edmite de una solicitud multiparte/form-data. Se sabe que la salida de `Math.random()` se puede predecir si se conocen varios de sus valores generados. Si hay un mecanismo en una aplicaci\u00f3n que env\u00eda solicitudes multiparte a un sitio web controlado por un atacante, este puede usarlo para filtrar los valores necesarios. Por lo tanto, un atacante puede manipular las solicitudes que van a las API de backend si se cumplen ciertas condiciones. Esto se solucion\u00f3 en las versiones 5.28.5, 6.21.1 y 7.2.3. Como workaround, no env\u00ede solicitudes multiparte a servidores controlados por un atacante."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22153.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22153.json
index dffdbc5e649..cdc336626bc 100644
--- a/CVE-2025/CVE-2025-221xx/CVE-2025-22153.json
+++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22153.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-23T18:15:33.267",
"lastModified": "2025-01-23T18:15:33.267",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RestrictedPython is a tool that helps to define a subset of the Python language which allows to provide a program input into a trusted environment. Via a type confusion bug in versions of the CPython interpreter starting in 3.11 and prior to 3.13.2 when using `try/except*`, RestrictedPython starting in version 6.0 and prior to version 8.0 could be bypassed. The issue is patched in version 8.0 of RestrictedPython by removing support for `try/except*` clauses. No known workarounds are available."
+ },
+ {
+ "lang": "es",
+ "value": "RestrictedPython es una herramienta que ayuda a definir un subconjunto del lenguaje Python que permite proporcionar una entrada de programa en un entorno de confianza. A trav\u00e9s de un error de confusi\u00f3n de tipos en las versiones del int\u00e9rprete CPython a partir de la 3.11 y anteriores a la 3.13.2 cuando se usa `try/except*`, se pod\u00eda omitir RestrictedPython a partir de la versi\u00f3n 6.0 y anteriores a la versi\u00f3n 8.0. El problema se solucion\u00f3 en la versi\u00f3n 8.0 de RestrictedPython al eliminar la compatibilidad con las cl\u00e1usulas `try/except*`. No hay workarounds disponibles."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22262.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22262.json
index 7abefe43d57..335405cd71c 100644
--- a/CVE-2025/CVE-2025-222xx/CVE-2025-22262.json
+++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22262.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:09.757",
"lastModified": "2025-01-21T14:15:09.757",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Bonjour Bar allows Stored XSS. This issue affects Bonjour Bar: from n/a through 1.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Bonjour Bar permite XSS almacenado. Este problema afecta a Bonjour Bar: desde n/a hasta 1.0.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22264.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22264.json
index 37d9769b709..992a4958b0f 100644
--- a/CVE-2025/CVE-2025-222xx/CVE-2025-22264.json
+++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22264.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:37.257",
"lastModified": "2025-01-23T16:15:37.257",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tarak Patel WP Query Creator allows Reflected XSS. This issue affects WP Query Creator: from n/a through 1.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Tarak Patel WP Query Creator permite XSS reflejado. Este problema afecta a WP Query Creator: desde n/a hasta 1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22267.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22267.json
index 737983ea3e3..29afb89439d 100644
--- a/CVE-2025/CVE-2025-222xx/CVE-2025-22267.json
+++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22267.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T18:15:15.100",
"lastModified": "2025-01-21T18:15:15.100",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bruce Wampler Weaver Themes Shortcode Compatibility allows Stored XSS. This issue affects Weaver Themes Shortcode Compatibility: from n/a through 1.0.4."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Bruce Wampler Weaver Themes Shortcode Compatibility permite XSS almacenado. Este problema afecta a Weaver Themes Shortcode Compatibility: desde n/a hasta 1.0.4."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22276.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22276.json
index cfd2c00826f..6ab88dffaf5 100644
--- a/CVE-2025/CVE-2025-222xx/CVE-2025-22276.json
+++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22276.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T18:15:15.303",
"lastModified": "2025-01-21T18:15:15.303",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Enguerran Weiss Related Post Shortcode allows Stored XSS. This issue affects Related Post Shortcode: from n/a through 1.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Enguerran Weiss Related Post Shortcode permite XSS almacenado. Este problema afecta a Related Post Shortcode: desde n/a hasta 1.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22311.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22311.json
index 5b9b52307dc..95dce55e07e 100644
--- a/CVE-2025/CVE-2025-223xx/CVE-2025-22311.json
+++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22311.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:09.930",
"lastModified": "2025-01-21T14:15:09.930",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound Private Messages for UserPro. This issue affects Private Messages for UserPro: from n/a through 4.10.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en un programa PHP ('Inclusi\u00f3n remota de archivos PHP') en NotFound Private Messages for UserPro. Este problema afecta a Private Messages for UserPro: desde n/a hasta 4.10.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22318.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22318.json
index 9d4b80d6254..bc9b1dca302 100644
--- a/CVE-2025/CVE-2025-223xx/CVE-2025-22318.json
+++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22318.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:10.110",
"lastModified": "2025-01-21T14:15:10.110",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Eniture Technology Standard Box Sizes \u2013 for WooCommerce. This issue affects Standard Box Sizes \u2013 for WooCommerce: from n/a through 1.6.13."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de falta de autorizaci\u00f3n en Standard Box Sizes de Eniture Technology para WooCommerce. Este problema afecta a Standard Box Sizes para WooCommerce: desde n/d hasta 1.6.13."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22322.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22322.json
index 61affdd9755..b14b368f61d 100644
--- a/CVE-2025/CVE-2025-223xx/CVE-2025-22322.json
+++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22322.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:10.280",
"lastModified": "2025-01-21T14:15:10.280",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Private Messages for UserPro allows Reflected XSS. This issue affects Private Messages for UserPro: from n/a through 4.10.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Private Messages for UserPro permite XSS reflejado. Este problema afecta a Private Messages for UserPro: desde n/a hasta 4.10.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22450.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22450.json
index 399ad4d6e34..282e9ebbfa1 100644
--- a/CVE-2025/CVE-2025-224xx/CVE-2025-22450.json
+++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22450.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-01-22T06:15:14.327",
"lastModified": "2025-01-22T06:15:14.327",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inclusion of undocumented features issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. A remote attacker may disable the LAN-side firewall function of the affected products, and open specific ports."
+ },
+ {
+ "lang": "es",
+ "value": "Existe un problema de inclusi\u00f3n de funciones no documentadas en el firmware UD-LT2 Ver.1.00.008_SE y anteriores. Un atacante remoto podr\u00eda deshabilitar la funci\u00f3n de firewall del lado LAN de los productos afectados y abrir puertos espec\u00edficos."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22553.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22553.json
index 5c7b7d8dc49..1123bfed47a 100644
--- a/CVE-2025/CVE-2025-225xx/CVE-2025-22553.json
+++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22553.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:10.453",
"lastModified": "2025-01-21T14:15:10.453",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Multiple Carousel allows SQL Injection. This issue affects Multiple Carousel: from n/a through 2.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL (\"inyecci\u00f3n SQL\") en NotFound Multiple Carousel que permite la inyecci\u00f3n SQL. Este problema afecta a Multiple Carousel: desde n/a hasta 2.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22620.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22620.json
index 95007853c69..ed060ef8855 100644
--- a/CVE-2025/CVE-2025-226xx/CVE-2025-22620.json
+++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22620.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-20T16:15:28.017",
"lastModified": "2025-01-20T16:15:28.017",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "gitoxide is an implementation of git written in Rust. Prior to 0.17.0, gix-worktree-state specifies 0777 permissions when checking out executable files, intending that the umask will restrict them appropriately. But one of the strategies it uses to set permissions is not subject to the umask. This causes files in a repository to be world-writable in some situations. This vulnerability is fixed in 0.17.0."
+ },
+ {
+ "lang": "es",
+ "value": "gitoxide es una implementaci\u00f3n de git escrita en Rust. Antes de la versi\u00f3n 0.17.0, gix-worktree-state especifica permisos 0777 al extraer archivos ejecutables, con la intenci\u00f3n de que la m\u00e1scara de usuario los restrinja de manera adecuada. Pero una de las estrategias que utiliza para establecer permisos no est\u00e1 sujeta a la m\u00e1scara de usuario. Esto hace que los archivos de un repositorio sean modificables por todo el mundo en algunas situaciones. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 0.17.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22661.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22661.json
index 20b6c14cbfd..4a0cc999e15 100644
--- a/CVE-2025/CVE-2025-226xx/CVE-2025-22661.json
+++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22661.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T18:15:15.707",
"lastModified": "2025-01-21T18:15:15.707",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in vcita.com Online Payments \u2013 Get Paid with PayPal, Square & Stripe allows Stored XSS. This issue affects Online Payments \u2013 Get Paid with PayPal, Square & Stripe: from n/a through 3.20.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en vcita.com Online Payments \u2013 Get Paid with PayPal, Square & Stripe permite XSS almacenado. Este problema afecta a Pagos en l\u00ednea: Reciba pagos con PayPal, Square y Stripe: desde n/a hasta 3.20.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22706.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22706.json
index 01929a393d1..54c67aad6fd 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22706.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22706.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:10.640",
"lastModified": "2025-01-21T14:15:10.640",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in iova.mihai Social Pug: Author Box allows Reflected XSS. This issue affects Social Pug: Author Box: from n/a through 1.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en iova.mihai Social Pug: Author Box permite XSS reflejado. Este problema afecta a Social Pug: Author Box: desde n/a hasta 1.0.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22709.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22709.json
index 72b30694f3e..1e4bc177bf0 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22709.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22709.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:10.823",
"lastModified": "2025-01-21T14:15:10.823",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Soft8Soft LLC Verge3D allows Reflected XSS. This issue affects Verge3D: from n/a through 4.8.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Soft8Soft LLC Verge3D permite XSS reflejado. Este problema afecta a Verge3D: desde n/a hasta 4.8.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22710.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22710.json
index 3a3a7ad8d90..0dfd1fa75df 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22710.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22710.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:11.000",
"lastModified": "2025-01-21T14:15:11.000",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in StoreApps Smart Manager allows Blind SQL Injection. This issue affects Smart Manager: from n/a through 8.52.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en StoreApps Smart Manager permite la inyecci\u00f3n Blind SQL. Este problema afecta a Smart Manager: desde n/a hasta 8.52.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22711.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22711.json
index bdfbd999aaf..b713e322e2b 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22711.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22711.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:11.173",
"lastModified": "2025-01-21T14:15:11.173",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Thomas Maier Image Source Control allows Reflected XSS. This issue affects Image Source Control: from n/a through 2.29.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Thomas Maier Image Source Control permite XSS reflejado. Este problema afecta a Image Source Control: desde n/a hasta 2.29.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22716.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22716.json
index 476eb5b1cf1..1113e493407 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22716.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22716.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:11.343",
"lastModified": "2025-01-21T14:15:11.343",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Taskbuilder Team Taskbuilder allows SQL Injection. This issue affects Taskbuilder: from n/a through 3.0.6."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Taskbuilder Team Taskbuilder permite la inyecci\u00f3n SQL. Este problema afecta a Taskbuilder: desde n/a hasta 3.0.6."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22717.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22717.json
index e995fb8e064..d00b40a064f 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22717.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22717.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:11.527",
"lastModified": "2025-01-21T14:15:11.527",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Joe Dolson My Tickets allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects My Tickets: from n/a through 2.0.9."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de falta de autorizaci\u00f3n en My Tickets de Joe Dolson permite acceder a funciones que no est\u00e1n correctamente restringidas por las listas de control de acceso. Este problema afecta a Mis tickets desde la versi\u00f3n n/a hasta la versi\u00f3n 2.0.9."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22718.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22718.json
index d120a42ef44..544c8f682fa 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22718.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22718.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:11.697",
"lastModified": "2025-01-21T14:15:11.697",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Roninwp FAT Event Lite allows Stored XSS. This issue affects FAT Event Lite: from n/a through 1.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Roninwp FAT Event Lite permite XSS almacenado. Este problema afecta a FAT Event Lite: desde n/a hasta 1.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22719.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22719.json
index 39d9ea3301d..92172094cd1 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22719.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22719.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:11.860",
"lastModified": "2025-01-21T14:15:11.860",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in E4J s.r.l. VikAppointments Services Booking Calendar allows Stored XSS. This issue affects VikAppointments Services Booking Calendar: from n/a through 1.2.16."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en E4J s.r.l. VikAppointments Services Booking Calendar permite XSS almacenado. Este problema afecta al calendario de reservas de VikAppointments Services: desde n/a hasta 1.2.16."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22721.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22721.json
index 130610026cc..7a5af82ed93 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22721.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22721.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T18:15:15.880",
"lastModified": "2025-01-21T18:15:15.880",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Farhan Noor ApplyOnline \u2013 Application Form Builder and Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ApplyOnline \u2013 Application Form Builder and Manager: from n/a through 2.6.7.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Farhan Noor ApplyOnline \u2013 Application Form Builder and Manager permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a ApplyOnline \u2013 Application Form Builder and Manager: desde n/a hasta 2.6.7.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22722.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22722.json
index 7262f2a111f..e4d5e2ba1b9 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22722.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22722.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T18:15:16.057",
"lastModified": "2025-01-21T18:15:16.057",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Widget Options Team Widget Options allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Widget Options: from n/a through 4.0.8."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de falta de autorizaci\u00f3n en Widget Options Team Widget Options permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Widget Options: desde n/a hasta 4.0.8."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22723.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22723.json
index 09262754c98..e39c3fb85dd 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22723.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22723.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:12.017",
"lastModified": "2025-01-21T14:15:12.017",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in UkrSolution Barcode Scanner with Inventory & Order Manager allows Upload a Web Shell to a Web Server. This issue affects Barcode Scanner with Inventory & Order Manager: from n/a through 1.6.7."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en UkrSolution Barcode Scanner with Inventory & Order Manager permite cargar un shell web en un servidor web. Este problema afecta al esc\u00e1ner de c\u00f3digos de barras con Inventory & Order Manager: desde n/a hasta 1.6.7."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22727.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22727.json
index 58373b5fe8a..992b7016f35 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22727.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22727.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:12.173",
"lastModified": "2025-01-21T14:15:12.173",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PluginOps MailChimp Subscribe Forms allows Stored XSS. This issue affects MailChimp Subscribe Forms : from n/a through 4.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en PluginOps MailChimp Subscribe Forms que permite XSS almacenado. Este problema afecta a los formularios de suscripci\u00f3n de MailChimp: desde n/a hasta 4.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22732.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22732.json
index 0d8740817d0..eaa3e34596d 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22732.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22732.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:12.387",
"lastModified": "2025-01-21T14:15:12.387",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Admiral Ad Blocking Detector allows Stored XSS. This issue affects Ad Blocking Detector: from n/a through 3.6.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Admiral Ad Blocking Detector permite XSS almacenado. Este problema afecta a Ad Blocking Detector: desde n/a hasta 3.6.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22733.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22733.json
index f95ab97b0f7..f81ef417895 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22733.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22733.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:12.570",
"lastModified": "2025-01-21T14:15:12.570",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPHocus My auctions allegro allows Reflected XSS. This issue affects My auctions allegro: from n/a through 3.6.18."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPHocus My auctions allegro permite XSS reflejado. Este problema afecta a My auctions allegro: desde n/a hasta 3.6.18."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22735.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22735.json
index afc04a56bd8..60dcd50197f 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22735.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22735.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:12.737",
"lastModified": "2025-01-21T14:15:12.737",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TaxoPress WordPress Tag Cloud Plugin \u2013 Tag Groups allows Reflected XSS. This issue affects WordPress Tag Cloud Plugin \u2013 Tag Groups: from n/a through 2.0.4."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en TaxoPress WordPress Tag Cloud Plugin \u2013 Tag Groups permite XSS reflejado. Este problema afecta al complemento Tag Cloud de WordPress \u2013 Tag Groups: desde n/a hasta 2.0.4."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22763.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22763.json
index 9c0d9a7e047..23a06c16520 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22763.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22763.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:12.900",
"lastModified": "2025-01-21T14:15:12.900",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Brizy Pro allows Reflected XSS. This issue affects Brizy Pro: from n/a through 2.6.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Brizy Pro que permite XSS reflejado. Este problema afecta a Brizy Pro: desde n/a hasta 2.6.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22768.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22768.json
index 102510952fc..fa20775747b 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22768.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22768.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:37.403",
"lastModified": "2025-01-23T16:15:37.403",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Qwerty23 Rocket Media Library Mime Type allows Stored XSS. This issue affects Rocket Media Library Mime Type: from n/a through 2.1.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad Cross-Site Request Forgery (CSRF) en Qwerty23 Rocket Media librer\u00eda MIME Type permite XSS almacenado. Este problema afecta a Rocket Medlibrer\u00edaary MIME Type: desde n/a hasta 2.1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22772.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22772.json
index 0966406cccc..7a7c77f4cfe 100644
--- a/CVE-2025/CVE-2025-227xx/CVE-2025-22772.json
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22772.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Mapbox for WP Advanced allows Reflected XSS. This issue affects Mapbox for WP Advanced: from n/a through 1.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Mapbox for WP Advanced permite XSS reflejado. Este problema afecta a Mapbox for WP Advanced: desde n/a hasta 1.0.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22825.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22825.json
index 238b076318b..1c66efe1067 100644
--- a/CVE-2025/CVE-2025-228xx/CVE-2025-22825.json
+++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22825.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:13.060",
"lastModified": "2025-01-21T14:15:13.060",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Desk Flexible PDF Coupons allows Stored XSS. This issue affects Flexible PDF Coupons: from n/a through n/a."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP Desk Flexible PDF Coupons que permite XSS almacenado. Este problema afecta a Flexible PDF Coupons: desde n/d hasta n/d."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22980.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22980.json
index e075f98c361..7ddeff0a777 100644
--- a/CVE-2025/CVE-2025-229xx/CVE-2025-22980.json
+++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22980.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A SQL Injection vulnerability exists in Senayan Library Management System SLiMS 9 Bulian 9.6.1 via the tempLoanID parameter in the loan form on /admin/modules/circulation/loan.php."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en Senayan Library Management System SLiMS 9 Bulian 9.6.1 a trav\u00e9s del par\u00e1metro tempLoanID en el formulario de pr\u00e9stamo en /admin/modules/circulation/loan.php."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23011.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23011.json
index 8e85df12c82..70d5c5875d5 100644
--- a/CVE-2025/CVE-2025-230xx/CVE-2025-23011.json
+++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23011.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Fedora Repository 3.8.1 allows path traversal when extracting uploaded archives (\"Zip Slip\"). A remote, authenticated attacker can upload a specially crafted archive that will extract an arbitrary JSP file to a location that can be executed by an unauthenticated GET request. Fedora Repository 3.8.1 was released on 2015-06-11 and is no longer maintained. Migrate to a currently supported version (6.5.1 as of 2025-01-23)."
+ },
+ {
+ "lang": "es",
+ "value": "Fedora Repository 3.8.1 permite Path Traversal al extraer archivos cargados (\"Zip Slip\"). Un atacante remoto autenticado puede cargar un archivo manipulado especial que extraer\u00e1 un archivo JSP arbitrario a una ubicaci\u00f3n que se puede ejecutar mediante una solicitud GET no autenticada. El repositorio de Fedora 3.8.1 se lanz\u00f3 el 11 de junio de 2015 y ya no se mantiene. Migre a una versi\u00f3n compatible actualmente (6.5.1 a partir del 23 de enero de 2025)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23012.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23012.json
index a23bfac3b20..06d1ed3d5da 100644
--- a/CVE-2025/CVE-2025-230xx/CVE-2025-23012.json
+++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23012.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Fedora Repository 3.8.x includes a service account (fedoraIntCallUser) with default credentials and privileges to read read local files by manipulating datastreams. Fedora Repository 3.8.1 was released on 2015-06-11 and is no longer maintained. Migrate to a currently supported version (6.5.1 as of 2025-01-23)."
+ },
+ {
+ "lang": "es",
+ "value": "Fedora Repository 3.8.x incluye una cuenta de servicio (fedoraIntCallUser) con credenciales y privilegios predeterminados para leer archivos locales mediante la manipulaci\u00f3n de flujos de datos. Fedora Repository 3.8.1 se lanz\u00f3 el 11 de junio de 2015 y ya no se mantiene. Migre a una versi\u00f3n compatible actualmente (6.5.1 a partir del 23 de enero de 2025)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23028.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23028.json
index cbe8b8cb53e..23e5ff2ce88 100644
--- a/CVE-2025/CVE-2025-230xx/CVE-2025-23028.json
+++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23028.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. A denial of service vulnerability affects versions 1.14.0 through 1.14.7, 1.15.0 through 1.15.11, and 1.16.0 through 1.16.4. In a Kubernetes cluster where Cilium is configured to proxy DNS traffic, an attacker can crash Cilium agents by sending a crafted DNS response to workloads from outside the cluster. For traffic that is allowed but without using DNS-based policy, the dataplane will continue to pass traffic as configured at the time of the DoS. For workloads that have DNS-based policy configured, existing connections may continue to operate, and new connections made without relying on DNS resolution may continue to be established, but new connections which rely on DNS resolution may be disrupted. Any configuration changes that affect the impacted agent may not be applied until the agent is able to restart. This issue is fixed in Cilium v1.14.18, v1.15.12, and v1.16.5. No known workarounds are available."
+ },
+ {
+ "lang": "es",
+ "value": "Cilium es una soluci\u00f3n de redes, observabilidad y seguridad con un plano de datos basado en eBPF. Una vulnerabilidad de denegaci\u00f3n de servicio afecta a las versiones 1.14.0 a 1.14.7, 1.15.0 a 1.15.11 y 1.16.0 a 1.16.4. En un cl\u00faster de Kubernetes donde Cilium est\u00e1 configurado para actuar como proxy del tr\u00e1fico DNS, un atacante puede bloquear los agentes de Cilium enviando una respuesta DNS manipulado a las cargas de trabajo desde fuera del cl\u00faster. Para el tr\u00e1fico permitido pero sin utilizar una pol\u00edtica basada en DNS, el plano de datos seguir\u00e1 pasando el tr\u00e1fico tal como se configur\u00f3 en el momento del ataque de denegaci\u00f3n de servicio. Para las cargas de trabajo que tienen configurada una pol\u00edtica basada en DNS, las conexiones existentes pueden seguir funcionando y las nuevas conexiones realizadas sin depender de la resoluci\u00f3n DNS pueden seguir estableci\u00e9ndose, pero las nuevas conexiones que dependen de la resoluci\u00f3n DNS pueden verse interrumpidas. Es posible que los cambios de configuraci\u00f3n que afecten al agente afectado no se apliquen hasta que el agente pueda reiniciarse. Este problema se solucion\u00f3 en Cilium v1.14.18, v1.15.12 y v1.16.5. No hay workarounds disponibles."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23039.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23039.json
index 2ea2825418a..a33c477bff7 100644
--- a/CVE-2025/CVE-2025-230xx/CVE-2025-23039.json
+++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23039.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-17T21:15:11.560",
"lastModified": "2025-01-17T21:15:11.560",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Caido is a web security auditing toolkit. A Cross-Site Scripting (XSS) vulnerability was identified in Caido v0.45.0 due to improper sanitization in the URL decoding tooltip of HTTP request and response editors. This issue could allow an attacker to execute arbitrary scripts, potentially leading to the theft of sensitive information. This issue has been addressed in version 0.45.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Caido es un kit de herramientas de auditor\u00eda de seguridad web. Se identific\u00f3 una vulnerabilidad de Cross-Site Scripting (XSS) en Caido v0.45.0 debido a una desinfecci\u00f3n incorrecta en la informaci\u00f3n sobre herramientas de decodificaci\u00f3n de URL de los editores de solicitudes y respuestas HTTP. Este problema podr\u00eda permitir que un atacante ejecute Scripts arbitrario, lo que podr\u00eda llevar al robo de informaci\u00f3n confidencial. Este problema se ha solucionado en la versi\u00f3n 0.45.1 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23044.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23044.json
index b9660fc02b9..239c4f2af60 100644
--- a/CVE-2025/CVE-2025-230xx/CVE-2025-23044.json
+++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23044.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-20T16:15:28.170",
"lastModified": "2025-01-20T16:15:28.170",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PwnDoc is a penetration test report generator. There is no CSRF protection in pwndoc, allowing attackers to send requests on a logged-in user's behalf. This includes GET and POST requests due to the missing SameSite= attribute on cookies and the ability to refresh cookies. Commit 14acb704891245bf1703ce6296d62112e85aa995 patches the issue."
+ },
+ {
+ "lang": "es",
+ "value": "PwnDoc es un generador de informes de pruebas de penetraci\u00f3n. No hay protecci\u00f3n CSRF en pwndoc, lo que permite a los atacantes enviar solicitudes en nombre de un usuario conectado. Esto incluye solicitudes GET y POST debido a la falta del atributo SameSite= en las cookies y la capacidad de actualizar las cookies. El commit 14acb704891245bf1703ce6296d62112e85aa995 soluciona el problema."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23047.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23047.json
index d7798f699fd..6d6d2a322f3 100644
--- a/CVE-2025/CVE-2025-230xx/CVE-2025-23047.json
+++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23047.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An insecure default `Access-Control-Allow-Origin` header value could lead to sensitive data exposure for users of Cilium versions 1.14.0 through 1.14.7, 1.15.0 through 1.15.11, and 1.16.0 through 1.16.4 who deploy Hubble UI using either Cilium CLI or via the Cilium Helm chart. A user with access to a Hubble UI instance affected by this issue could leak configuration details about the Kubernetes cluster which Hubble UI is monitoring, including node names, IP addresses, and other metadata about workloads and the cluster networking configuration. In order for this vulnerability to be exploited, a victim would have to first visit a malicious page. This issue is fixed in Cilium v1.14.18, v1.15.12, and v1.16.5. As a workaround, users who deploy Hubble UI using the Cilium Helm chart directly can remove the CORS headers from the Helm template as shown in the patch from commit a3489f190ba6e87b5336ee685fb6c80b1270d06d."
+ },
+ {
+ "lang": "es",
+ "value": "Cilium es una soluci\u00f3n de seguridad, observabilidad y redes con un plano de datos basado en eBPF. Un valor de encabezado `Access-Control-Allow-Origin` predeterminado inseguro podr\u00eda provocar la exposici\u00f3n de datos confidenciales para los usuarios de las versiones de Cilium 1.14.0 a 1.14.7, 1.15.0 a 1.15.11 y 1.16.0 a 1.16.4 que implementan Hubble UI mediante la CLI de Cilium o mediante el gr\u00e1fico Helm de Cilium. Un usuario con acceso a una instancia de Hubble UI afectada por este problema podr\u00eda filtrar detalles de configuraci\u00f3n sobre el cl\u00faster de Kubernetes que Hubble UI est\u00e1 monitoreando, nombres de nodos incluida, direcciones IP y otros metadatos sobre cargas de trabajo y la configuraci\u00f3n de red del cl\u00faster. Para que se aproveche esta vulnerabilidad, la v\u00edctima primero tendr\u00eda que visitar una p\u00e1gina maliciosa. Este problema se solucion\u00f3 en Cilium v1.14.18, v1.15.12 y v1.16.5. Como workaround, los usuarios que implementan Hubble UI usando el gr\u00e1fico Helm de Cilium directamente pueden eliminar los encabezados CORS de la plantilla Helm como se muestra en el parche de commit a3489f190ba6e87b5336ee685fb6c80b1270d06d."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23083.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23083.json
index 51567ed1d8a..60f64708162 100644
--- a/CVE-2025/CVE-2025-230xx/CVE-2025-23083.json
+++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23083.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-22T02:15:33.930",
"lastModified": "2025-01-22T02:15:33.930",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. \r\n\r\nThis vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23."
+ },
+ {
+ "lang": "es",
+ "value": "Con la ayuda de la utilidad diagnostics_channel, se puede conectar un evento cada vez que se crea un subproceso de trabajo. Esto no se limita solo a los trabajadores, sino que tambi\u00e9n expone a los trabajadores internos, donde se puede obtener una instancia de ellos y se puede obtener su constructor y restablecerlo para un uso malintencionado. Esta vulnerabilidad afecta a los usuarios del modelo de permisos (--permission) en Node.js v20, v22 y v23."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23086.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23086.json
index 8ff4008cfca..37176052320 100644
--- a/CVE-2025/CVE-2025-230xx/CVE-2025-23086.json
+++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23086.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-21T05:15:07.960",
"lastModified": "2025-01-21T15:15:14.833",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23090.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23090.json
index 619035227fe..225f849be10 100644
--- a/CVE-2025/CVE-2025-230xx/CVE-2025-23090.json
+++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23090.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-22T02:15:34.443",
"lastModified": "2025-01-22T02:15:34.443",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers\n but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage.\n\nThis vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23."
+ },
+ {
+ "lang": "es",
+ "value": "Con la ayuda de la utilidad diagnostics_channel, se puede conectar un evento cada vez que se crea un subproceso de trabajo. Esto no se limita solo a los trabajadores, sino que tambi\u00e9n expone a los trabajadores internos, donde se puede obtener una instancia de ellos y se puede obtener su constructor y restablecerlo para un uso malintencionado. Esta vulnerabilidad afecta a los usuarios del modelo de permisos (--permission) en Node.js v20, v22 y v23."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23184.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23184.json
index 7ae10f15c68..30870a07234 100644
--- a/CVE-2025/CVE-2025-231xx/CVE-2025-23184.json
+++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23184.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security@apache.org",
"published": "2025-01-21T10:15:08.110",
"lastModified": "2025-01-21T10:15:08.110",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A potential denial of service vulnerability is present in versions of Apache CXF before\u00a03.5.10, 3.6.5 and 4.0.6.\u00a0In some edge cases, the CachedOutputStream instances may not be closed and, if backed by temporary files, may fill up the file system (it applies to servers and clients)."
+ },
+ {
+ "lang": "es",
+ "value": "Hay una posible vulnerabilidad de denegaci\u00f3n de servicio presente en versiones de Apache CXF anteriores a 3.5.10, 3.6.5 y 4.0.6. En algunos casos extremos, es posible que las instancias de CachedOutputStream no se cierren y, si est\u00e1n respaldadas por archivos temporales, pueden llenar el archivo sistema (se aplica a servidores y clientes)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23202.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23202.json
index 65eb44c2310..567dd769e5b 100644
--- a/CVE-2025/CVE-2025-232xx/CVE-2025-23202.json
+++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23202.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-17T21:15:11.713",
"lastModified": "2025-01-17T21:15:11.713",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Bible Module is a tool designed for ROBLOX developers to integrate Bible functionality into their games. The `FetchVerse` and `FetchPassage` functions in the Bible Module are susceptible to injection attacks due to the absence of input validation. This vulnerability could allow an attacker to manipulate the API request URLs, potentially leading to unauthorized access or data tampering. This issue has been addressed in version 0.0.3. All users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "El m\u00f3dulo de la Biblia es una herramienta dise\u00f1ada para que los desarrolladores de ROBLOX integren la funcionalidad de la Biblia en sus juegos. Las funciones `FetchVerse` y `FetchPassage` del m\u00f3dulo de la Biblia son susceptibles a ataques de inyecci\u00f3n debido a la ausencia de validaci\u00f3n de entrada. Esta vulnerabilidad podr\u00eda permitir a un atacante manipular las URL de solicitud de API, lo que podr\u00eda provocar un acceso no autorizado o la manipulaci\u00f3n de datos. Este problema se ha solucionado en la versi\u00f3n 0.0.3. Se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23205.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23205.json
index f51455c3ee0..69bfbbe53e9 100644
--- a/CVE-2025/CVE-2025-232xx/CVE-2025-23205.json
+++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23205.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-17T21:15:11.850",
"lastModified": "2025-01-17T21:15:11.850",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "nbgrader is a system for assigning and grading notebooks. Enabling frame-ancestors: 'self' grants any JupyterHub user the ability to extract formgrader content by sending malicious links to users with access to formgrader, at least when using the default JupyterHub configuration of `enable_subdomains = False`. #1915 disables a protection which would allow user Alice to craft a page embedding formgrader in an IFrame. If Bob visits that page, his credentials will be sent and the formgrader page loaded. Because Alice's page is on the same Origin as the formgrader iframe, Javasript on Alice's page has _full access_ to the contents of the page served by formgrader using Bob's credentials. This issue has been addressed in release 0.9.5 and all users are advised to upgrade. Users unable to upgrade may disable `frame-ancestors: self`, or enable per-user and per-service subdomains with `JupyterHub.enable_subdomains = True` (then even if embedding in an IFrame is allowed, the host page does not have access to the contents of the frame)."
+ },
+ {
+ "lang": "es",
+ "value": "nbgrader es un sistema para asignar y calificar cuadernos. Habilitar framework-ancestors: 'self' otorga a cualquier usuario de JupyterHub la capacidad de extraer contenido de formgrader enviando enlaces maliciosos a usuarios con acceso a formgrader, al menos cuando se usa la configuraci\u00f3n predeterminada de JupyterHub de `enable_subdomains = False`. #1915 deshabilita una protecci\u00f3n que permitir\u00eda al usuario Alice manipular una p\u00e1gina que incorpore formgrader en un IFrame. Si Bob visita esa p\u00e1gina, se enviar\u00e1n sus credenciales y se cargar\u00e1 la p\u00e1gina formgrader. Debido a que la p\u00e1gina de Alice est\u00e1 en el mismo origen que el iframe formgrader, Javasript en la p\u00e1gina de Alice tiene _acceso completo_ al contenido de la p\u00e1gina servida por formgrader usando las credenciales de Bob. Este problema se ha solucionado en la versi\u00f3n 0.9.5 y se recomienda a todos los usuarios que actualicen. Los usuarios que no puedan actualizar pueden deshabilitar frame-ancestors: self o habilitar subdominios por usuario y por servicio con JupyterHub.enable_subdomains = True (luego, incluso si se permite la incrustaci\u00f3n en un IFrame, la p\u00e1gina del host no tiene acceso al contenido del frame)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23206.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23206.json
index 591c9592429..6e48e2c3cfc 100644
--- a/CVE-2025/CVE-2025-232xx/CVE-2025-23206.json
+++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23206.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-17T21:15:12.003",
"lastModified": "2025-01-17T21:15:12.003",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. Users who use IAM OIDC custom resource provider package will download CA Thumbprints as part of the custom resource workflow. However, the current `tls.connect` method will always set `rejectUnauthorized: false` which is a potential security concern. CDK should follow the best practice and set `rejectUnauthorized: true`. However, this could be a breaking change for existing CDK applications and we should fix this with a feature flag. Note that this is marked as low severity Security advisory because the issuer url is provided by CDK users who define the CDK application. If they insist on connecting to a unauthorized OIDC provider, CDK should not disallow this. Additionally, the code block is run in a Lambda environment which mitigate the MITM attack. The patch is in progress. To mitigate, upgrade to CDK v2.177.0 (Expected release date 2025-02-22). Once upgraded, users should make sure the feature flag '@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections' is set to true in `cdk.context.json` or `cdk.json`. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "AWS Cloud Development Kit (AWS CDK) es un software de desarrollo de c\u00f3digo abierto framework para definir la infraestructura de la nube en c\u00f3digo y aprovisionarla a trav\u00e9s de AWS CloudFormation. Los usuarios que usan el paquete de proveedor de recursos personalizado de IAM OIDC descargar\u00e1n CA Thumbprints como parte del flujo de trabajo de recursos personalizado. Sin embargo, el m\u00e9todo `tls.connect` actual siempre establecer\u00e1 `rejectUnauthorized: false`, lo que es un posible problema de seguridad. CDK deber\u00eda seguir las mejores pr\u00e1cticas y establecer `rejectUnauthorized: true`. Sin embargo, esto podr\u00eda ser un cambio radical para las aplicaciones CDK existentes y deber\u00edamos solucionarlo con una marca de funci\u00f3n. Tenga en cuenta que esto est\u00e1 marcado como un aviso de seguridad de baja gravedad porque la URL del emisor la proporcionan los usuarios de CDK que definen la aplicaci\u00f3n CDK. Si insisten en conectarse a un proveedor de OIDC no autorizado, CDK no deber\u00eda prohibirlo. Adem\u00e1s, el bloque de c\u00f3digo se ejecuta en un entorno Lambda que mitiga el ataque MITM. El parche est\u00e1 en proceso. Para mitigar este problema, actualice a CDK v2.177.0 (fecha de lanzamiento prevista: 22/02/2025). Una vez actualizado, los usuarios deben asegurarse de que la marca de funci\u00f3n '@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections' est\u00e9 configurada como verdadera en `cdk.context.json` o `cdk.json`. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23207.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23207.json
index de2cd870ed6..3a8b8180a9c 100644
--- a/CVE-2025/CVE-2025-232xx/CVE-2025-23207.json
+++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23207.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-17T22:15:29.523",
"lastModified": "2025-01-17T22:15:29.523",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "KaTeX is a fast, easy-to-use JavaScript library for TeX math rendering on the web. KaTeX users who render untrusted mathematical expressions with `renderToString` could encounter malicious input using `\\htmlData` that runs arbitrary JavaScript, or generate invalid HTML. Users are advised to upgrade to KaTeX v0.16.21 to remove this vulnerability. Users unable to upgrade should avoid use of or turn off the `trust` option, or set it to forbid `\\htmlData` commands, forbid inputs containing the substring `\"\\\\htmlData\"` and sanitize HTML output from KaTeX."
+ },
+ {
+ "lang": "es",
+ "value": "KaTeX es una Librer\u00eda de JavaScript r\u00e1pida y f\u00e1cil de usar para la representaci\u00f3n matem\u00e1tica de TeX en la web. Los usuarios de KaTeX que representen expresiones matem\u00e1ticas no confiables con `renderToString` podr\u00edan encontrarse con entradas maliciosas utilizando `\\htmlData` que ejecutan JavaScript arbitrario o generan HTML no v\u00e1lido. Se recomienda a los usuarios que actualicen a KaTeX v0.16.21 para eliminar esta vulnerabilidad. Los usuarios que no puedan actualizar deben evitar el uso de la opci\u00f3n `trust` o desactivarla, o configurarla para prohibir los comandos `\\htmlData`, prohibir las entradas que contengan la subcadena `\"\\\\htmlData\"` y la salida HTML Desinfectar de KaTeX."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23208.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23208.json
index be380e2054e..d97491ce7f0 100644
--- a/CVE-2025/CVE-2025-232xx/CVE-2025-23208.json
+++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23208.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-17T23:15:13.107",
"lastModified": "2025-01-17T23:15:13.107",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "zot is a production-ready vendor-neutral OCI image registry. The group data stored for users in the boltdb database (meta.db) is an append-list so group revocations/removals are ignored in the API. SetUserGroups is alled on login, but instead of replacing the group memberships, they are appended. This may be due to some conflict with the group definitions in the config file, but that wasn't obvious to me if it were the case. Any Zot configuration that relies on group-based authorization will not respect group remove/revocation by an IdP. This issue has been addressed in version 2.1.2. All users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Zot es un registro de im\u00e1genes OCI independiente del proveedor y listo para producci\u00f3n. Los datos de grupo almacenados para los usuarios en la base de datos boltdb (meta.db) son una lista de anexos, por lo que las revocaciones/eliminaciones de grupos se ignoran en la API. SetUserGroups se agrega al iniciar sesi\u00f3n, pero en lugar de reemplazar las membres\u00edas de grupo, se agregan. Esto puede deberse a alg\u00fan conflicto con las definiciones de grupo en el archivo de configuraci\u00f3n, pero no me resultar\u00eda obvio si fuera el caso. Cualquier configuraci\u00f3n de Zot que dependa de la autorizaci\u00f3n basada en grupos no respetar\u00e1 la eliminaci\u00f3n/revocaci\u00f3n de grupos por parte de un IdP. Este problema se ha solucionado en la versi\u00f3n 2.1.2. Se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23209.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23209.json
index eff4fe36ce4..afea98cc4e9 100644
--- a/CVE-2025/CVE-2025-232xx/CVE-2025-23209.json
+++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23209.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-18T01:15:07.633",
"lastModified": "2025-01-18T01:15:07.633",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. This is an remote code execution (RCE) vulnerability that affects Craft 4 and 5 installs where your security key has already been compromised. Anyone running an unpatched version of Craft with a compromised security key is affected. This vulnerability has been patched in Craft 5.5.8 and 4.13.8. Users who cannot update to a patched version, should rotate their security keys and ensure their privacy to help migitgate the issue."
+ },
+ {
+ "lang": "es",
+ "value": "Craft es un CMS flexible y f\u00e1cil de usar para crear experiencias digitales personalizadas en la web y m\u00e1s all\u00e1. Esta es una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) que afecta a las instalaciones de Craft 4 y 5 en las que su clave de seguridad ya se ha visto comprometida. Cualquiera que ejecute una versi\u00f3n sin parches de Craft con una clave de seguridad comprometida se ve afectado. Esta vulnerabilidad se ha corregido en Craft 5.5.8 y 4.13.8. Los usuarios que no puedan actualizar a una versi\u00f3n parcheada deben rotar sus claves de seguridad y garantizar su privacidad para ayudar a mitigar el problema."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23214.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23214.json
index affc9105e6f..846d94fe481 100644
--- a/CVE-2025/CVE-2025-232xx/CVE-2025-23214.json
+++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23214.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-20T18:15:14.127",
"lastModified": "2025-01-20T18:15:14.127",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cosmos provides users the ability self-host a home server by acting as a secure gateway to your application, as well as a server manager. By monitoring the error code returned in the login, it is possible to figure out whether a user exist or not in the database. Patched in 0.17.7."
+ },
+ {
+ "lang": "es",
+ "value": "Cosmos ofrece a los usuarios la posibilidad de alojar ellos mismos un servidor dom\u00e9stico, actuando como puerta de enlace segura a su aplicaci\u00f3n y como administrador del servidor. Al supervisar el c\u00f3digo de error que se devuelve al iniciar sesi\u00f3n, es posible averiguar si un usuario existe o no en la base de datos. Se ha aplicado un parche en la versi\u00f3n 0.17.7."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23218.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23218.json
index 32c8dc6aef8..96ef7c15cfe 100644
--- a/CVE-2025/CVE-2025-232xx/CVE-2025-23218.json
+++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23218.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-20T16:15:28.317",
"lastModified": "2025-01-21T15:15:15.053",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23219.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23219.json
index 45772841549..b07b6608148 100644
--- a/CVE-2025/CVE-2025-232xx/CVE-2025-23219.json
+++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23219.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-20T16:15:28.460",
"lastModified": "2025-01-21T15:15:15.247",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23220.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23220.json
index a83b174f177..62170e99afd 100644
--- a/CVE-2025/CVE-2025-232xx/CVE-2025-23220.json
+++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23220.json
@@ -3,7 +3,7 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-20T16:15:28.593",
"lastModified": "2025-01-21T15:15:15.430",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23221.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23221.json
index 1a6fa38c0c5..61dc57996c2 100644
--- a/CVE-2025/CVE-2025-232xx/CVE-2025-23221.json
+++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23221.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-20T17:15:07.987",
"lastModified": "2025-01-20T17:15:07.987",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fedify is a TypeScript library for building federated server apps powered by ActivityPub and other standards. This vulnerability allows a user to maneuver the Webfinger mechanism to perform a GET request to any internal resource on any Host, Port, URL combination regardless of present security mechanisms, and forcing the victim\u2019s server into an infinite loop causing Denial of Service. Moreover, this issue can also be maneuvered into performing a Blind SSRF attack. This vulnerability is fixed in 1.0.14, 1.1.11, 1.2.11, and 1.3.4."
+ },
+ {
+ "lang": "es",
+ "value": "Fedify es una librer\u00eda de TypeScript para crear aplicaciones de servidor federado basadas en ActivityPub y otros est\u00e1ndares. Esta vulnerabilidad permite a un usuario manipular el mecanismo Webfinger para realizar una solicitud GET a cualquier recurso interno en cualquier combinaci\u00f3n de host, puerto y URL, independientemente de los mecanismos de seguridad actuales, y obligar al servidor de la v\u00edctima a entrar en un bucle infinito que provoca una denegaci\u00f3n de servicio. Adem\u00e1s, este problema tambi\u00e9n se puede manipular para realizar un ataque SSRF ciego. Esta vulnerabilidad se ha corregido en 1.0.14, 1.1.11, 1.2.11 y 1.3.4."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23227.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23227.json
index 2fa6403ea79..b4dbd70683c 100644
--- a/CVE-2025/CVE-2025-232xx/CVE-2025-23227.json
+++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23227.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-23T18:15:33.440",
"lastModified": "2025-01-23T18:15:33.440",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.11 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 a 7.3.0.11 es vulnerable a Cross-Site Scripting Almacenado. Esta vulnerabilidad permite a los usuarios autenticados incorporar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n de confianza."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23237.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23237.json
index 2f7cd12c1f4..f75d6b12595 100644
--- a/CVE-2025/CVE-2025-232xx/CVE-2025-23237.json
+++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23237.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-01-22T06:15:14.480",
"lastModified": "2025-01-22T06:15:14.480",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. If a user logs in to CLI of the affected product, an arbitrary OS command may be executed."
+ },
+ {
+ "lang": "es",
+ "value": "Existe un problema de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del SO ('Inyecci\u00f3n de comando del SO') en el firmware UD-LT2 Ver.1.00.008_SE y anteriores. Si un usuario inicia sesi\u00f3n en la CLI del producto afectado, se puede ejecutar un comando arbitrario del SO."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23369.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23369.json
index fe483b366f5..ee12f24f882 100644
--- a/CVE-2025/CVE-2025-233xx/CVE-2025-23369.json
+++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23369.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "product-cna@github.com",
"published": "2025-01-21T19:15:12.147",
"lastModified": "2025-01-21T19:15:12.147",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed signature spoofing for unauthorized internal users. Instances not utilizing SAML single sign-on or where the attacker is not already an existing user were not impacted. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12.14, 3.13.10, 3.14.7, 3.15.2, and 3.16.0. This vulnerability was reported via the GitHub Bug Bounty program."
+ },
+ {
+ "lang": "es",
+ "value": "Se identific\u00f3 una vulnerabilidad de verificaci\u00f3n incorrecta de la firma criptogr\u00e1fica en GitHub Enterprise Server que permit\u00eda la suplantaci\u00f3n de firmas para usuarios internos no autorizados. Las instancias que no utilizaban el inicio de sesi\u00f3n \u00fanico SAML o en las que el atacante no era un usuario existente no se vieron afectadas. Esta vulnerabilidad afect\u00f3 a todas las versiones de GitHub Enterprise Server anteriores a 3.12.14, 3.13.10, 3.14.7, 3.15.2 y 3.16.0. Esta vulnerabilidad se inform\u00f3 a trav\u00e9s del programa de recompensas por errores de GitHub."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23449.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23449.json
index 49aaabb1442..10977a9bcae 100644
--- a/CVE-2025/CVE-2025-234xx/CVE-2025-23449.json
+++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23449.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Simple shortcode buttons allows Reflected XSS. This issue affects Simple shortcode buttons: from n/a through 1.3.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Simple shortcode buttons permite XSS reflejado. Este problema afecta a los botones de c\u00f3digo corto Simple: desde n/a hasta 1.3.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23454.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23454.json
index 445deb242de..c49ea034a8b 100644
--- a/CVE-2025/CVE-2025-234xx/CVE-2025-23454.json
+++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23454.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T18:15:16.223",
"lastModified": "2025-01-21T18:15:16.223",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in flashmaniac Nature FlipBook allows Reflected XSS. This issue affects Nature FlipBook: from n/a through 1.7."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en flashmaniac Nature FlipBook permite XSS reflejado. Este problema afecta a Nature FlipBook: desde n/a hasta 1.7."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23461.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23461.json
index c0cf37d2f6f..ae0744d6a0c 100644
--- a/CVE-2025/CVE-2025-234xx/CVE-2025-23461.json
+++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23461.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T18:15:16.387",
"lastModified": "2025-01-21T18:15:16.387",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Andrea Dotta, Jacopo Campani, di xkoll.com Social2Blog allows Reflected XSS. This issue affects Social2Blog: from n/a through 0.2.990."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Andrea Dotta, Jacopo Campani, di xkoll.com Social2Blog permite XSS reflejado. Este problema afecta a Social2Blog: desde n/a hasta 0.2.990."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23462.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23462.json
index c05314b8ff1..2760b7915c3 100644
--- a/CVE-2025/CVE-2025-234xx/CVE-2025-23462.json
+++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23462.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound FWD Slider allows Reflected XSS. This issue affects FWD Slider: from n/a through 1.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound FWD Slider permite XSS reflejado. Este problema afecta a FWD Slider: desde n/a hasta 1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23475.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23475.json
index 0d263e3a2ef..b1b2992c1d3 100644
--- a/CVE-2025/CVE-2025-234xx/CVE-2025-23475.json
+++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23475.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound History timeline allows Reflected XSS. This issue affects History timeline: from n/a through 0.7.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound History timeline permite XSS reflejado. Este problema afecta a la l\u00ednea de tiempo de History: desde n/d hasta 0.7.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23477.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23477.json
index 5ae27c57741..95da6bd2a2d 100644
--- a/CVE-2025/CVE-2025-234xx/CVE-2025-23477.json
+++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23477.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T18:15:16.570",
"lastModified": "2025-01-21T18:15:16.570",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Realty Workstation Realty Workstation allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Realty Workstation: from n/a through 1.0.45."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de falta de autorizaci\u00f3n en Realty Workstation Realty Workstation permite acceder a funciones que no est\u00e1n correctamente limitadas por las listas de control de acceso. Este problema afecta a Realty Workstation: desde n/a hasta 1.0.45."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23486.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23486.json
index d9187c11ecb..52748e8ccc8 100644
--- a/CVE-2025/CVE-2025-234xx/CVE-2025-23486.json
+++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23486.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Missing Authorization vulnerability in NotFound Database Sync allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Database Sync: from n/a through 0.5.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de falta de autorizaci\u00f3n en NotFound Database Sync permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Database Sync desde n/a hasta 0.5.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23489.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23489.json
index bc2aed64552..550ce5baafa 100644
--- a/CVE-2025/CVE-2025-234xx/CVE-2025-23489.json
+++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23489.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T18:15:16.740",
"lastModified": "2025-01-21T18:15:16.740",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brian Messenlehner of WebDevStudios WP-Announcements allows Reflected XSS. This issue affects WP-Announcements: from n/a through 1.8."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP-Announcements de Brian Messenlehner de WebDevStudios permite XSS reflejado. Este problema afecta a WP-Announcements: desde n/a hasta 1.8."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23495.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23495.json
index 4de9ac52f33..b7dd7c0cfb3 100644
--- a/CVE-2025/CVE-2025-234xx/CVE-2025-23495.json
+++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23495.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WooCommerce Order Search allows Reflected XSS. This issue affects WooCommerce Order Search: from n/a through 1.1.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WooCommerce Order Search permite XSS reflejado. Este problema afecta a WooCommerce Order Search: desde n/a hasta 1.1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23498.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23498.json
index 04299ed635c..1ac1cb5573d 100644
--- a/CVE-2025/CVE-2025-234xx/CVE-2025-23498.json
+++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23498.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Translation.Pro allows Reflected XSS. This issue affects Translation.Pro: from n/a through 1.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Translation.Pro permite XSS reflejado. Este problema afecta a Translation.Pro: desde n/a hasta 1.0.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23500.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23500.json
index 3dcb435aba2..a9e3c8bf3ea 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23500.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23500.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Faaiq Ahmed, Technial Architect,faaiqsj@gmail.com Simple Custom post type custom field allows Reflected XSS. This issue affects Simple Custom post type custom field: from n/a through 1.0.3."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Faaiq Ahmed, Technial Architect,faaiqsj@gmail.com Simple Custom post type custom field permite XSS reflejado. Este problema afecta al campo personalizado de tipo de publicaci\u00f3n personalizada simple: desde n/a hasta 1.0.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23503.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23503.json
index a45faa567d1..5436842c472 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23503.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23503.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Customizable Captcha and Contact Us allows Reflected XSS. This issue affects Customizable Captcha and Contact Us: from n/a through 1.0.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Customizable Captcha y Contact Us permite XSS reflejado. Este problema afecta a Customizable Captcha y Contact Us: desde n/a hasta 1.0.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23506.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23506.json
index 6b7eb2004da..f9764dbbf9b 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23506.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23506.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP IMAP Auth allows Reflected XSS. This issue affects WP IMAP Auth: from n/a through 4.0.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP IMAP Auth permite XSS reflejado. Este problema afecta a WP IMAP Auth: desde n/a hasta 4.0.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23507.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23507.json
index 8302ed885f3..f0ca3f8222b 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23507.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23507.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Blrt Blrt WP Embed allows Reflected XSS. This issue affects Blrt WP Embed: from n/a through 1.6.9."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Blrt Blrt WP Embed permite XSS reflejado. Este problema afecta a Blrt WP Embed: desde n/a hasta 1.6.9."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23509.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23509.json
index e71444938ac..4c2ba957952 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23509.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23509.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound HyperComments allows Reflected XSS. This issue affects HyperComments: from n/a through 0.9.6."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound HyperComments permite XSS reflejado. Este problema afecta a HyperComments: desde n/a hasta 0.9.6."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23512.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23512.json
index 44c34d03b4b..5fe38c10641 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23512.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23512.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Missing Authorization vulnerability in Team118GROUP Team 118GROUP Agent allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Team 118GROUP Agent: from n/a through 1.6.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de falta de autorizaci\u00f3n en Team118GROUP El agente Team 118GROUP permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al agente Team 118GROUP desde n/a hasta 1.6.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23535.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23535.json
index 5159dc62005..5308316e761 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23535.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23535.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in clickandsell REAL WordPress Sidebar allows Stored XSS. This issue affects REAL WordPress Sidebar: from n/a through 0.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en clickandsell REAL WordPress Sidebar permite XSS almacenado. Este problema afecta a la barra lateral REAL WordPress: desde n/a hasta la versi\u00f3n 0.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23540.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23540.json
index 881f37314e8..667eff4e70f 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23540.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23540.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:37.577",
"lastModified": "2025-01-23T16:15:37.577",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mohsin khan WP Front-end login and register allows Reflected XSS. This issue affects WP Front-end login and register: from n/a through 2.1.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Mohsin khan WP Front-end login and register que permite XSS reflejado. Este problema afecta al inicio de sesi\u00f3n y registro de WP Front-end: desde n/a hasta 2.1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23541.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23541.json
index 22ea4b06c75..d173ececac4 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23541.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23541.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:37.737",
"lastModified": "2025-01-23T16:15:37.737",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in edmon Download, Downloads allows Reflected XSS. This issue affects Download, Downloads : from n/a through 1.4.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en edmon Download, Downloads permite XSS reflejado. Este problema afecta a Download, Downloads : desde n/a hasta 1.4.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23544.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23544.json
index fd23062c74c..6fc4bca4c36 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23544.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23544.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:37.897",
"lastModified": "2025-01-23T16:15:37.897",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in heart5 StatPressCN allows Reflected XSS. This issue affects StatPressCN: from n/a through 1.9.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en heart5 StatPressCN permite XSS reflejado. Este problema afecta a StatPressCN: desde n/a hasta 1.9.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23545.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23545.json
index f5d27c8108d..cb1db7597df 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23545.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23545.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:38.070",
"lastModified": "2025-01-23T16:15:38.070",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Navnish Bhardwaj WP Social Broadcast allows Reflected XSS. This issue affects WP Social Broadcast: from n/a through 1.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Navnish Bhardwaj WP Social Broadcast permite XSS reflejado. Este problema afecta a WP Social Broadcast: desde n/a hasta 1.0.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23548.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23548.json
index ec992b7314a..0f6ad4c0773 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23548.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23548.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bilal TAS Responsivity allows Reflected XSS. This issue affects Responsivity: from n/a through 0.0.6."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Bilal TAS Responsivity permite XSS reflejado. Este problema afecta a Responsivity: desde n/a hasta 0.0.6."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23551.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23551.json
index b0b9c28c0ea..a0a1ba54369 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23551.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23551.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T18:15:16.927",
"lastModified": "2025-01-21T18:15:16.927",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in P. Razvan SexBundle allows Reflected XSS. This issue affects SexBundle: from n/a through 1.4."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en P. Razvan SexBundle permite XSS reflejado. Este problema afecta a SexBundle: desde n/a hasta 1.4."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23562.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23562.json
index 51bfcb19fe8..cff44e3f50f 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23562.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23562.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound XLSXviewer allows Path Traversal. This issue affects XLSXviewer: from n/a through 2.1.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en NotFound XLSXviewer permite PathPath Traversal. Este problema afecta a XLSXviewer: desde n/a hasta 2.1.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23578.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23578.json
index 22a0652bebc..8d099f11374 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23578.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23578.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Custom CSS Addons allows Reflected XSS. This issue affects Custom CSS Addons: from n/a through 1.9.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Custom CSS Addons permite XSS reflejado. Este problema afecta a los complementos CSS personalizados: desde n/a hasta 1.9.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23580.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23580.json
index 63091e3de6f..3fb4be8b6b1 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23580.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23580.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T18:15:17.133",
"lastModified": "2025-01-21T18:15:17.133",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matthew Garvin BizLibrary allows Reflected XSS. This issue affects BizLibrary: from n/a through 1.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en BizLibrary de Matthew Garvin permite XSS reflejado. Este problema afecta a BizLibrary: desde n/a hasta 1.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23583.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23583.json
index 5e8b0fed5e2..233619b7944 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23583.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23583.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Explara Explara Membership allows Reflected XSS. This issue affects Explara Membership: from n/a through 0.0.7."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Explara Explara Membership permite XSS reflejado. Este problema afecta a Explara Membership: desde n/a hasta 0.0.7."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23589.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23589.json
index 1e4dca208c7..e9578407f4c 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23589.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23589.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ContentOptin Lite allows Reflected XSS. This issue affects ContentOptin Lite: from n/a through 1.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound ContentOptin Lite permite XSS reflejado. Este problema afecta a ContentOptin Lite: desde n/a hasta 1.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23592.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23592.json
index bc0c3389ad1..acc66064c3f 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23592.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23592.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound dForms allows Reflected XSS. This issue affects dForms: from n/a through 1.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound dForms permite XSS reflejado. Este problema afecta a dForms: desde n/a hasta 1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23597.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23597.json
index 4ee25b2dfff..5b5fff1f3d0 100644
--- a/CVE-2025/CVE-2025-235xx/CVE-2025-23597.json
+++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23597.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Riosis Private Limited Rio Photo Gallery allows Reflected XSS. This issue affects Rio Photo Gallery: from n/a through 0.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Riosis Private Limited Rio Photo Gallery permite XSS reflejado. Este problema afecta a Rio Photo Gallery: desde n/a hasta 0.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23601.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23601.json
index aaf9e8476fb..05680886d95 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23601.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23601.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Tab My Content allows Reflected XSS. This issue affects Tab My Content: from n/a through 1.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Tab My Content de NotFound permite XSS reflejado. Este problema afecta a Tab My Content: desde n/a hasta 1.0.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23602.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23602.json
index 91e4d55e275..a43e0e783d9 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23602.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23602.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound EELV Newsletter allows Reflected XSS. This issue affects EELV Newsletter: from n/a through 4.8.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound EELV Newsletter permite XSS reflejado. Este problema afecta a EELV Newsletter: desde n/a hasta 4.8.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23603.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23603.json
index c20091feb2e..ad6721748c4 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23603.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23603.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Group category creator allows Reflected XSS. This issue affects Group category creator: from n/a through 1.3.0.3."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Group category creator permite XSS reflejado. Este problema afecta al creador de categor\u00edas de grupo: desde n/a hasta 1.3.0.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23604.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23604.json
index 45571c6f4b1..94da9978703 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23604.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23604.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Rezdy Reloaded allows Stored XSS. This issue affects Rezdy Reloaded: from n/a through 1.0.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Rezdy Reloaded permite XSS almacenado. Este problema afecta a Rezdy Reloaded: desde n/a hasta 1.0.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23605.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23605.json
index 8233b5df03a..acc9c680b3c 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23605.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23605.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LamPD Call To Action Popup allows Reflected XSS. This issue affects Call To Action Popup: from n/a through 1.0.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en LamPD Call To Action Popup permite XSS reflejado. Este problema afecta a la ventana emergente de llamada a la acci\u00f3n: desde n/a hasta 1.0.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23606.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23606.json
index c2b0d55c069..1ff4f8ac66c 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23606.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23606.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Calendi allows Reflected XSS. This issue affects Calendi: from n/a through 1.1.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Calendi permite XSS reflejado. Este problema afecta a Calendi: desde n/a hasta 1.1.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23607.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23607.json
index 39808b887cd..33df841e6bb 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23607.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23607.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Camoo Sarl CAMOO SMS allows Reflected XSS. This issue affects CAMOO SMS: from n/a through 3.0.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Camoo Sarl CAMOO SMS permite XSS reflejado. Este problema afecta a CAMOO SMS: desde n/a hasta 3.0.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23609.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23609.json
index 8049b246d48..72858140b55 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23609.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23609.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Helmuth Lammer Tagesteller allows Reflected XSS. This issue affects Tagesteller: from n/a through v.1.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Helmuth Lammer Tagesteller permite XSS reflejado. Este problema afecta a Tagesteller: desde n/a hasta v.1.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23610.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23610.json
index d984ded6f5c..7913698154e 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23610.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23610.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Ultimate Events allows Reflected XSS. This issue affects Ultimate Events: from n/a through 1.3.3."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Ultimate Events permite XSS reflejado. Este problema afecta a Ultimate Events: desde n/a hasta 1.3.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23611.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23611.json
index 415b575ff3c..30fdba36221 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23611.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23611.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WH Cache & Security allows Reflected XSS. This issue affects WH Cache & Security: from n/a through 1.1.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WH Cache & Security que permite XSS reflejado. Este problema afecta a WH Cache & Security: desde n/a hasta 1.1.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23624.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23624.json
index bfc79377a05..30e52aaa1bc 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23624.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23624.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:38.223",
"lastModified": "2025-01-23T16:15:38.223",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alessandro Benoit WpDevTool allows Reflected XSS. This issue affects WpDevTool: from n/a through 0.1.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WpDevTool de Alessandro Benoit que permite XSS reflejado. Este problema afecta a WpDevTool: desde n/a hasta 0.1.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23625.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23625.json
index 244cc3a7263..761a8cbd8f0 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23625.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23625.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AWcode, PDSonline Unique UX allows Reflected XSS. This issue affects Unique UX: from n/a through 0.9.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en AWcode, PDSonline Unique UX permite XSS reflejado. Este problema afecta a Unique UX: desde n/a hasta 0.9.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23626.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23626.json
index cbec168e92d..c1abda1e668 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23626.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23626.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:38.390",
"lastModified": "2025-01-23T16:15:38.390",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hidetoshi Fukushima Kumihimo allows Reflected XSS. This issue affects Kumihimo: from n/a through 1.0.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Hidetoshi Fukushima Kumihimo permite XSS reflejado. Este problema afecta a Kumihimo: desde n/a hasta 1.0.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23628.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23628.json
index a36585d04fa..ea760acab30 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23628.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23628.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:38.547",
"lastModified": "2025-01-23T16:15:38.547",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in New Media One GeoDigs allows Reflected XSS. This issue affects GeoDigs: from n/a through 3.4.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en New Media One GeoDigs permite XSS reflejado. Este problema afecta a GeoDigs: desde n/a hasta 3.4.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23629.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23629.json
index a4465e3d299..7a47dc3c3ee 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23629.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23629.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:38.690",
"lastModified": "2025-01-23T16:15:38.690",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Subhasis Laha Gallerio allows Reflected XSS. This issue affects Gallerio: from n/a through 1.0.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Subhasis Laha Gallerio permite XSS reflejado. Este problema afecta a Gallerio: desde n/a hasta 1.0.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23630.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23630.json
index e80bd83607e..b8e87f004bb 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23630.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23630.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Cyber Slider allows Reflected XSS. This issue affects Cyber Slider: from n/a through 1.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Cyber ??Slider permite XSS reflejado. Este problema afecta a Cyber ??Slider: desde n/a hasta 1.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23631.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23631.json
index f80b88bb111..df8c36cf032 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23631.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23631.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Content Planner allows Reflected XSS. This issue affects Content Planner: from n/a through 1.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Content Planner permite XSS reflejado. Este problema afecta a Content Planner: desde n/a hasta 1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23634.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23634.json
index 8389d6c9a9e..a04a77c4ea7 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23634.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23634.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:38.840",
"lastModified": "2025-01-23T16:15:38.840",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Youtube Video Grid allows Reflected XSS. This issue affects Youtube Video Grid: from n/a through 1.9."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Youtube Video Grid permite XSS reflejado. Este problema afecta a Youtube Video Grid: desde n/a hasta 1.9."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23636.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23636.json
index ab3cd88853a..8ddf2bdeb50 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23636.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23636.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:38.983",
"lastModified": "2025-01-23T16:15:38.983",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dimitar Atanasov My Favorite Car allows Reflected XSS. This issue affects My Favorite Car: from n/a through 1.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en My Favorite Car de Dimitar Atanasov que permite XSS reflejado. Este problema afecta a My Favorite Car: desde n/a hasta 1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23643.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23643.json
index 1882dbca213..0e11bb01e6d 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23643.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23643.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ReadMe Creator allows Reflected XSS. This issue affects ReadMe Creator: from n/a through 1.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound ReadMe Creator permite XSS reflejado. Este problema afecta a ReadMe Creator: desde n/a hasta 1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23672.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23672.json
index 5ce81bcc5aa..8f08a7d3683 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23672.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23672.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Instant Appointment allows Reflected XSS. This issue affects Instant Appointment: from n/a through 1.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Instant Appointment permite XSS reflejado. Este problema afecta a Instant Appointment: desde n/a hasta 1.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23674.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23674.json
index 528c06145e6..2994db84adf 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23674.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23674.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Bit.ly linker allows Reflected XSS. This issue affects Bit.ly linker: from n/a through 1.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Bit.ly linker permite XSS reflejado. Este problema afecta al enlazador Bit.ly: desde n/a hasta 1.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23676.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23676.json
index f8b1b77d3ed..c31ffe67bba 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23676.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23676.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound LH Email allows Reflected XSS. This issue affects LH Email: from n/a through 1.12."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound LH Email que permite XSS reflejado. Este problema afecta a LH Email: desde n/a hasta 1.12."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23678.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23678.json
index 528ba36a33b..488abfb3157 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23678.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23678.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound LocalGrid allows Reflected XSS. This issue affects LocalGrid: from n/a through 1.0.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound LocalGrid permite XSS reflejado. Este problema afecta a LocalGrid: desde n/a hasta 1.0.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23679.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23679.json
index 5ac43ed7281..e364c5b1aca 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23679.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23679.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Moshiur Rahman Mehedi FP RSS Category Excluder allows Reflected XSS. This issue affects FP RSS Category Excluder: from n/a through 1.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Moshiur Rahman Mehedi FP RSS Category Excluder permite XSS reflejado. Este problema afecta a FP RSS Category Excluder: desde n/a hasta 1.0.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23681.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23681.json
index a7c04ab540d..2f2b618ff20 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23681.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23681.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jannatqualitybacklinks.com REDIRECTION PLUS allows Reflected XSS. This issue affects REDIRECTION PLUS: from n/a through 2.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en jannatqualitybacklinks.com REDIRECTION PLUS permite XSS reflejado. Este problema afecta a REDIRECTION PLUS: desde n/a hasta 2.0.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23682.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23682.json
index 8864cbf4378..2f092cfe549 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23682.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23682.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Preloader Quotes allows Reflected XSS. This issue affects Preloader Quotes: from n/a through 1.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Preloader Quotes permite XSS reflejado. Este problema afecta a Preloader Quotes: desde n/a hasta 1.0.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23683.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23683.json
index 6bc96e300eb..0cb6f81a899 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23683.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23683.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound MACME allows Reflected XSS. This issue affects MACME: from n/a through 1.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound MACME permite XSS reflejado. Este problema afecta a MACME: desde n/a hasta 1.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23684.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23684.json
index ea6f1c37be3..ae9f3964f23 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23684.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23684.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Missing Authorization vulnerability in Eugen Bobrowski Debug Tool allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Debug Tool: from n/a through 2.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Eugen Bobrowski Debug Tool permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a la herramienta de depuraci\u00f3n desde n/a hasta la versi\u00f3n 2.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23686.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23686.json
index efc6232296b..ff00d524f62 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23686.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23686.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Callum Richards Admin Menu Organizer allows Reflected XSS. This issue affects Admin Menu Organizer: from n/a through 1.0.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Callum Richards Admin Menu Organizer permite XSS reflejado. Este problema afecta al Organizador del men\u00fa de administraci\u00f3n: desde n/a hasta 1.0.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23695.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23695.json
index 877892479b8..ac58ca869da 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23695.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23695.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound CtyGrid Hyp3rL0cal Search allows Reflected XSS. This issue affects CtyGrid Hyp3rL0cal Search: from n/a through 0.1.1.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound CtyGrid Hyp3rL0cal Search que permite XSS reflejado. Este problema afecta a CtyGrid Hyp3rL0cal Search: desde n/a hasta 0.1.1.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23696.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23696.json
index 724174e6126..c984d839717 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23696.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23696.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Staging CDN allows Reflected XSS. This issue affects Staging CDN: from n/a through 1.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Staging CDN permite XSS reflejado. Este problema afecta a Staging CDN: desde n/a hasta 1.0.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23697.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23697.json
index 2489a321591..26bb44ac39b 100644
--- a/CVE-2025/CVE-2025-236xx/CVE-2025-23697.json
+++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23697.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebDeal s.r.o. Pod\u010dl\u00e1nkov\u00e1 inzerce allows Reflected XSS. This issue affects Pod\u010dl\u00e1nkov\u00e1 inzerce: from n/a through 2.4.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WebDeal s.r.o. Pod?l\u00e1nkov\u00e1 inzerce permite XSS reflejado. Este problema afecta a Pod?l\u00e1nkov\u00e1 inzerce: desde n/a hasta 2.4.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23700.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23700.json
index 1df11a72edf..e8eab05c752 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23700.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23700.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yonatan Reinberg yCyclista allows Reflected XSS. This issue affects yCyclista: from n/a through 1.2.3."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Yonatan Reinberg yCyclista permite XSS reflejado. Este problema afecta a yCyclista: desde n/a hasta 1.2.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23701.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23701.json
index ab057ce78de..ec485005516 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23701.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23701.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matthew Blackford, LimeSquare Pty Ltd Lime Developer Login allows Reflected XSS. This issue affects Lime Developer Login: from n/a through 1.4.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Matthew Blackford, LimeSquare Pty Ltd Lime Developer Login permite XSS reflejado. Este problema afecta a Lime Developer Login: desde n/a hasta 1.4.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23706.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23706.json
index 2509ae99f3f..f1eba03f1af 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23706.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23706.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Jet Skinner for BuddyPress allows Reflected XSS. This issue affects Jet Skinner for BuddyPress: from n/a through 1.2.5."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Jet Skinner for BuddyPress que permite XSS reflejado. Este problema afecta a Jet Skinner for BuddyPress: desde n/a hasta 1.2.5."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23709.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23709.json
index 8e769b3845f..61c85866be5 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23709.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23709.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kiro G. Formatted post allows Reflected XSS. This issue affects Formatted post: from n/a through 1.01."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Kiro G. Formatted post permiten XSS reflejado. Este problema afecta a las publicaciones con formato: desde n/a hasta 1.01."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23722.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23722.json
index 74281301d33..b5d125798c2 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23722.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23722.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:39.117",
"lastModified": "2025-01-23T16:15:39.117",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Mind3doM RyeBread Widgets allows Reflected XSS. This issue affects Mind3doM RyeBread Widgets: from n/a through 1.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Mind3doM RyeBread Widgets permite XSS reflejado. Este problema afecta a los widgets RyeBread de Mind3doM: desde n/a hasta 1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23723.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23723.json
index d236fab273c..40a37b050a3 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23723.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23723.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:39.260",
"lastModified": "2025-01-23T16:15:39.260",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Plestar Inc Plestar Directory Listing allows Reflected XSS. This issue affects Plestar Directory Listing: from n/a through 1.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Plestar Inc Plestar Directory Listing permite XSS reflejado. Este problema afecta a Plestar Directory Listing: desde n/a hasta 1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23724.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23724.json
index eb154a076f2..2814e797c03 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23724.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23724.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:39.387",
"lastModified": "2025-01-23T16:15:39.387",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Oleksandr Ustymenko University Quizzes Online allows Reflected XSS. This issue affects University Quizzes Online: from n/a through 1.4."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Oleksandr Ustymenko University Quizzes Online que permite XSS reflejado. Este problema afecta a University Quizzes Online: desde n/a hasta 1.4."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23725.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23725.json
index 6c17910ade7..72156856c1a 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23725.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23725.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:39.530",
"lastModified": "2025-01-23T16:15:39.530",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TaskMeister Accessibility Task Manager allows Reflected XSS. This issue affects Accessibility Task Manager: from n/a through 1.2.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en TaskMeister Accessibility Task Manager permite XSS reflejado. Este problema afecta al Administrador de tareas de accesibilidad: desde n/a hasta 1.2.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23727.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23727.json
index a3d24980868..7d7bb639a3c 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23727.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23727.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:39.660",
"lastModified": "2025-01-23T16:15:39.660",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound AZ Content Finder allows Reflected XSS. This issue affects AZ Content Finder: from n/a through 0.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound AZ Content Finder que permite XSS reflejado. Este problema afecta a AZ Content Finder: desde n/a hasta 0.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23729.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23729.json
index a596f988940..d54463bb7e9 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23729.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23729.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:39.790",
"lastModified": "2025-01-23T16:15:39.790",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fures XTRA Settings allows Reflected XSS. This issue affects XTRA Settings: from n/a through 2.1.8."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en fures XTRA Settings que permite XSS reflejado. Este problema afecta a XTRA Settings: desde n/a hasta 2.1.8."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23730.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23730.json
index 10ad096ca63..6c08f7ace1f 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23730.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23730.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:39.933",
"lastModified": "2025-01-23T16:15:39.933",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound FLX Dashboard Groups allows Reflected XSS. This issue affects FLX Dashboard Groups: from n/a through 0.0.7."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound FLX Dashboard Groups permite XSS reflejado. Este problema afecta a FLX Dashboard Groups: desde n/a hasta 0.0.7."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23732.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23732.json
index 251d4a38908..6b44eab27ff 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23732.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23732.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Easy Filtering allows Reflected XSS. This issue affects Easy Filtering: from n/a through 2.5.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Easy Filtering permite XSS reflejado. Este problema afecta a Easy Filtering: desde n/a hasta 2.5.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23733.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23733.json
index 91091608fbe..5c12567adce 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23733.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23733.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:40.073",
"lastModified": "2025-01-23T16:15:40.073",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sayocode SC Simple Zazzle allows Reflected XSS. This issue affects SC Simple Zazzle: from n/a through 1.1.6."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en sayocode SC Simple Zazzle permite XSS reflejado. Este problema afecta a SC Simple Zazzle: desde n/a hasta 1.1.6."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23746.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23746.json
index d599c4edc8c..1a350c0eb4a 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23746.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23746.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound CMC MIGRATE allows Reflected XSS. This issue affects CMC MIGRATE: from n/a through 0.0.3."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound CMC MIGRATE permite XSS reflejado. Este problema afecta a CMC MIGRATE: desde n/a hasta 0.0.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23758.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23758.json
index 8242f32885f..47a61ed3151 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23758.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23758.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Pootle button allows Reflected XSS. This issue affects Pootle button: from n/a through 1.2.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Pootle button permite XSS reflejado. Este problema afecta al bot\u00f3n Pootle: desde n/a hasta 1.2.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23768.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23768.json
index 9662cc49f59..a1438473766 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23768.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23768.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound InFunding allows Reflected XSS. This issue affects InFunding: from n/a through 1.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound InFunding permite XSS reflejado. Este problema afecta a InFunding: desde n/a hasta 1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23769.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23769.json
index 965e3af88c9..3decd89be12 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23769.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23769.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Content Mirror allows Reflected XSS. This issue affects Content Mirror: from n/a through 1.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Content Mirror permite XSS reflejado. Este problema afecta a Content Mirror: desde n/a hasta 1.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23770.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23770.json
index 5e4c3f9b5b5..9325d4f1b8b 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23770.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23770.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Fast Tube allows Reflected XSS. This issue affects Fast Tube: from n/a through 2.3.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Fast Tube permite XSS reflejado. Este problema afecta a Fast Tube: desde n/a hasta 2.3.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23774.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23774.json
index 57a5f977c2b..633f00cf714 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23774.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23774.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Insertion of Sensitive Information Into Sent Data vulnerability in NotFound WPDB to Sql allows Retrieve Embedded Sensitive Data. This issue affects WPDB to Sql: from n/a through 1.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en los datos enviados en NotFound WPDB to SQL permite recuperar datos confidenciales incrustados. Este problema afecta a WPDB to SQL: desde n/a hasta 1.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23781.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23781.json
index 6043d6a9cee..083b79a7c40 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23781.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23781.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Insertion of Sensitive Information Into Sent Data vulnerability in NotFound WM Options Import Export allows Retrieve Embedded Sensitive Data. This issue affects WM Options Import Export: from n/a through 1.0.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en los datos enviados en NotFound WM Options Import Export permite recuperar datos confidenciales integrados. Este problema afecta a WM Options Import Export: desde n/a hasta 1.0.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23784.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23784.json
index b5e5145a0d9..0cc9d30ff9c 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23784.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23784.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Contact Form 7 Round Robin Lead Distribution allows SQL Injection. This issue affects Contact Form 7 Round Robin Lead Distribution: from n/a through 1.2.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en NotFound Contact Form 7 Round Robin Lead Distribution permite la inyecci\u00f3n SQL. Este problema afecta a Contact Form 7 Round Robin Lead Distribution: desde n/a hasta 1.2.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23798.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23798.json
index 33e9a59787f..44fd0b1884f 100644
--- a/CVE-2025/CVE-2025-237xx/CVE-2025-23798.json
+++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23798.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eliott Robson Mass Messaging in BuddyPress allows Reflected XSS. This issue affects Mass Messaging in BuddyPress: from n/a through 2.2.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Eliott Robson Mass Messaging en BuddyPress permite XSS reflejado. Este problema afecta a Mass Messaging en BuddyPress: desde n/a hasta 2.2.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23803.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23803.json
index 7170ff4aeac..3666108190d 100644
--- a/CVE-2025/CVE-2025-238xx/CVE-2025-23803.json
+++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23803.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in PQINA Snippy allows Reflected XSS. This issue affects Snippy: from n/a through 1.4.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad Cross-Site Request Forgery (CSRF) en PQINA Snippy permite XSS reflejado. Este problema afecta a Snippy: desde n/a hasta 1.4.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23806.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23806.json
index 8a7ac7a399f..635161ac972 100644
--- a/CVE-2025/CVE-2025-238xx/CVE-2025-23806.json
+++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23806.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in ThemeFarmer Ultimate Subscribe allows Reflected XSS. This issue affects Ultimate Subscribe: from n/a through 1.3."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad Cross-Site Request Forgery (CSRF) en ThemeFarmer Ultimate Subscribe permite XSS reflejado. Este problema afecta a Ultimate Subscribe: desde n/a hasta 1.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23809.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23809.json
index b321ce15e53..055533e428f 100644
--- a/CVE-2025/CVE-2025-238xx/CVE-2025-23809.json
+++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23809.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Blue Wrench Video Widget allows Reflected XSS. This issue affects Blue Wrench Video Widget: from n/a through 2.1.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Blue Wrench Video Widget permite XSS reflejado. Este problema afecta al widget de video Blue Wrench: desde n/a hasta 2.1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23811.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23811.json
index 7f94df73806..0963057508f 100644
--- a/CVE-2025/CVE-2025-238xx/CVE-2025-23811.json
+++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23811.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP2APP allows Reflected XSS. This issue affects WP2APP: from n/a through 2.6.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP2APP permite XSS reflejado. Este problema afecta a WP2APP: desde n/a hasta 2.6.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23812.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23812.json
index cb49ecaeaa6..5c8aa3d50b6 100644
--- a/CVE-2025/CVE-2025-238xx/CVE-2025-23812.json
+++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23812.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Contact Form 7 Round Robin Lead Distribution allows Reflected XSS. This issue affects Contact Form 7 Round Robin Lead Distribution: from n/a through 1.2.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Contact Form 7 Round Robin Lead Distribution permite XSS reflejado. Este problema afecta a Contact Form 7 Round Robin Lead Distribution: desde n/a hasta 1.2.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23834.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23834.json
index 20e9eac160d..c3eb3161f3e 100644
--- a/CVE-2025/CVE-2025-238xx/CVE-2025-23834.json
+++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23834.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:40.203",
"lastModified": "2025-01-23T16:15:40.203",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Links/Problem Reporter allows Reflected XSS. This issue affects Links/Problem Reporter: from n/a through 2.6.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Links/Problem Reporter permite XSS reflejado. Este problema afecta a Links/Problem Reporter: desde n/a hasta 2.6.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23835.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23835.json
index 1728690d881..b0a7266b8f6 100644
--- a/CVE-2025/CVE-2025-238xx/CVE-2025-23835.json
+++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23835.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:40.353",
"lastModified": "2025-01-23T16:15:40.353",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Legal + allows Reflected XSS. This issue affects Legal +: from n/a through 1.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Legal + permite XSS reflejado. Este problema afecta a Legal +: desde n/a hasta 1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23836.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23836.json
index 8388d8f3243..c2690bd285b 100644
--- a/CVE-2025/CVE-2025-238xx/CVE-2025-23836.json
+++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23836.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:40.497",
"lastModified": "2025-01-23T16:15:40.497",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SuryaBhan Custom Coming Soon allows Reflected XSS. This issue affects Custom Coming Soon: from n/a through 2.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en SuryaBhan Custom Coming Soon permite XSS reflejado. Este problema afecta a Custom Coming Soon: desde n/a hasta 2.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23846.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23846.json
index fba7d4eff60..e65d7400975 100644
--- a/CVE-2025/CVE-2025-238xx/CVE-2025-23846.json
+++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23846.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kolja Nolte Flexible Blogtitle allows Reflected XSS. This issue affects Flexible Blogtitle: from n/a through 0.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Kolja Nolte Flexible Blogtitle permite XSS reflejado. Este problema afecta a Flexible Blogtitle: desde n/a hasta 0.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23866.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23866.json
index e7c8ed6e5e6..4d1f0e9d2cf 100644
--- a/CVE-2025/CVE-2025-238xx/CVE-2025-23866.json
+++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23866.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound EU DSGVO Helper allows Reflected XSS. This issue affects EU DSGVO Helper: from n/a through 1.0.6.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound EU DSGVO Helper permite XSS reflejado. Este problema afecta a EU DSGVO Helper: desde n/a hasta 1.0.6.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23867.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23867.json
index a1c99496f9e..cd5743d0180 100644
--- a/CVE-2025/CVE-2025-238xx/CVE-2025-23867.json
+++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23867.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WordPress File Search allows Reflected XSS. This issue affects WordPress File Search: from n/a through 1.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WordPress File Search permite XSS reflejado. Este problema afecta a WordPress File Search: desde n/a hasta 1.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23874.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23874.json
index 5169fe50171..9e9eaf4bd17 100644
--- a/CVE-2025/CVE-2025-238xx/CVE-2025-23874.json
+++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23874.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Block Pack allows Reflected XSS. This issue affects WP Block Pack: from n/a through 1.1.6."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP Block Pack permite XSS reflejado. Este problema afecta a WP Block Pack: desde n/a hasta 1.1.6."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23882.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23882.json
index 38104248a7a..0253a492527 100644
--- a/CVE-2025/CVE-2025-238xx/CVE-2025-23882.json
+++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23882.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Download Codes allows Reflected XSS. This issue affects WP Download Codes: from n/a through 2.5.4."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP Download Codes permite XSS reflejado. Este problema afecta a WP Download Codes: desde n/a hasta 2.5.4."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23894.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23894.json
index 401e9364d86..a1a66dcbe41 100644
--- a/CVE-2025/CVE-2025-238xx/CVE-2025-23894.json
+++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23894.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:40.637",
"lastModified": "2025-01-23T16:15:40.637",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tatsuya Fukata, Alexander Ovsov wp-flickr-press allows Reflected XSS. This issue affects wp-flickr-press: from n/a through 2.6.4."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Tatsuya Fukata, Alexander Ovsov wp-flickr-press permite XSS reflejado. Este problema afecta a wp-flickr-press: desde n/a hasta 2.6.4."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23910.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23910.json
index e7e1c71b996..adc8fa71623 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23910.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23910.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Menus Plus+ allows SQL Injection. This issue affects Menus Plus+: from n/a through 1.9.6."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en NotFound Menus Plus+ que permite la inyecci\u00f3n SQL. Este problema afecta a Menus Plus+: desde n/a hasta 1.9.6."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23914.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23914.json
index 32e1d26dfc7..b22ed67d12b 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23914.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23914.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in NotFound Muzaara Google Ads Report allows Object Injection. This issue affects Muzaara Google Ads Report: from n/a through 3.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en NotFound Muzaara Google Ads Report permite la inyecci\u00f3n de objetos. Este problema afecta a Muzaara Google Ads Report: desde n/a hasta 3.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23918.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23918.json
index b034374aea1..6cc69746efc 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23918.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23918.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in NotFound Smallerik File Browser allows Upload a Web Shell to a Web Server. This issue affects Smallerik File Browser: from n/a through 1.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en NotFound Smallerik File Browser permite cargar un shell web a un servidor web. Este problema afecta a Smallerik File Browser: desde n/a hasta 1.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23921.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23921.json
index 5f5e7fbbd06..a43cfa0244e 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23921.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23921.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in NotFound Multi Uploader for Gravity Forms allows Upload a Web Shell to a Web Server. This issue affects Multi Uploader for Gravity Forms: from n/a through 1.1.3."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en NotFound Multi Uploader for Gravity Forms permite cargar un shell web en un servidor web. Este problema afecta a Multi Uploader for Gravity Forms: desde n/a hasta 1.1.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23931.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23931.json
index c944cfa90bd..6e751a29f3d 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23931.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23931.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound WordPress Local SEO allows Blind SQL Injection. This issue affects WordPress Local SEO: from n/a through 2.3."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en NotFound WordPress Local SEO permite la inyecci\u00f3n Blind SQL. Este problema afecta a WordPress Local SEO: desde n/a hasta 2.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23932.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23932.json
index bed4508965c..ce0231720aa 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23932.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23932.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in NotFound Quick Count allows Object Injection. This issue affects Quick Count: from n/a through 3.00."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en NotFound Quick Count permite la inyecci\u00f3n de objetos. Este problema afecta a Quick Count: desde n/a hasta la versi\u00f3n 3.00."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23938.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23938.json
index 926c03b7289..a0756ad8577 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23938.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23938.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound Image Gallery Box by CRUDLab allows PHP Local File Inclusion. This issue affects Image Gallery Box by CRUDLab: from n/a through 1.0.3."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en NotFound Image Gallery Box de CRUDLab permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a Image Gallery Box de CRUDLab: desde n/a hasta 1.0.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23942.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23942.json
index 4245347adf4..7059b1ec7b1 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23942.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23942.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in NgocCode WP Load Gallery allows Upload a Web Shell to a Web Server. This issue affects WP Load Gallery: from n/a through 2.1.6."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en NgocCode WP Load Gallery permite cargar un shell web a un servidor web. Este problema afecta a WP Load Gallery: desde n/a hasta 2.1.6."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23944.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23944.json
index ffefa13850e..6e284936bd1 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23944.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23944.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in WOOEXIM.COM WOOEXIM allows Object Injection. This issue affects WOOEXIM: from n/a through 5.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en WOOEXIM.COM WOOEXIM permite la inyecci\u00f3n de objetos. Este problema afecta a WOOEXIM: desde n/a hasta 5.0.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23948.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23948.json
index 5e6fab8a1a0..1de9e6d0208 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23948.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23948.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WebArea Background animation blocks allows PHP Local File Inclusion. This issue affects Background animation blocks: from n/a through 2.1.5."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en WebArea Background animation blocks permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a los bloques de animaci\u00f3n de fondo: desde n/a hasta 2.1.5."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23949.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23949.json
index 77b0ea89e97..b5727f15a83 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23949.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23949.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mihajlovic Nenad Improved Sale Badges \u2013 Free Version allows PHP Local File Inclusion. This issue affects Improved Sale Badges \u2013 Free Version: from n/a through 1.0.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en Mihajlovic Nenad Improved Sale Badges \u2013 Free Version que permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a Improved Sale Badges \u2013 Free Version: desde n/a hasta 1.0.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23953.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23953.json
index d23adeeb442..becb52148d3 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23953.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23953.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Innovative Solutions user files allows Upload a Web Shell to a Web Server. This issue affects user files: from n/a through 2.4.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en los archivos de usuario de Innovative Solutions permite cargar un shell web en un servidor web. Este problema afecta a los archivos de usuario: desde n/a hasta 2.4.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23959.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23959.json
index 7a0ae714cb7..cccf8cd4ac5 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23959.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23959.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Linus Lundahl Good Old Gallery allows Reflected XSS. This issue affects Good Old Gallery: from n/a through 2.1.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Linus Lundahl Good Old Gallery que permite XSS reflejado. Este problema afecta a Good Old Gallery: desde n/a hasta 2.1.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23960.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23960.json
index cbbe74553b0..8fc6b14e126 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23960.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23960.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-23T16:15:40.777",
"lastModified": "2025-01-23T16:15:40.777",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in basteln3rk Save & Import Image from URL allows Reflected XSS. This issue affects Save & Import Image from URL: from n/a through 0.7."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en basteln3rk Save & Import Image from URL permite XSS reflejado. Este problema afecta a Save & Import Image from URL: desde n/a hasta 0.7."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23966.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23966.json
index 25325bd96d1..b56823340e7 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23966.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23966.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AlaFalaki a Gateway for Pasargad Bank on WooCommerce allows Reflected XSS. This issue affects a Gateway for Pasargad Bank on WooCommerce: from n/a through 2.5.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en AlaFalaki a Gateway for Pasargad Bank on WooCommerce, que permite XSS reflejado. Este problema afecta a una puerta de enlace para Pasargad Bank en WooCommerce: desde n/a hasta 2.5.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23992.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23992.json
index 76c9630c0e2..28ef7648659 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23992.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23992.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Leetoo Toocheke Companion allows Stored XSS. This issue affects Toocheke Companion: from n/a through 1.166."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Leetoo Toocheke Companion permite XSS almacenado. Este problema afecta a Toocheke Companion: desde n/a hasta 1.166."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23994.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23994.json
index 3cb7b04e517..de0c181c1a3 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23994.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23994.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T18:15:17.313",
"lastModified": "2025-01-21T18:15:17.313",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Estatebud Estatebud \u2013 Properties & Listings allows Stored XSS. This issue affects Estatebud \u2013 Properties & Listings: from n/a through 5.5.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Estatebud Estatebud \u2013 Properties & Listings permite XSS almacenado. Este problema afecta a Estatebud \u2013 Properties & Listings: desde n/a hasta 5.5.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23996.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23996.json
index 4fa1c77ade2..58eecdd560b 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23996.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23996.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T18:15:17.503",
"lastModified": "2025-01-21T18:15:17.503",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in anyroad.com AnyRoad allows Cross Site Request Forgery. This issue affects AnyRoad: from n/a through 1.3.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad Cross-Site Request Forgery (CSRF) en anyroad.com AnyRoad permite Cross Site Request Forgery. Este problema afecta a AnyRoad: desde n/a hasta 1.3.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23997.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23997.json
index afa9f66d918..332973a345e 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23997.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23997.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:13.230",
"lastModified": "2025-01-21T14:15:13.230",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dev@tamara.co Tamara Checkout allows Stored XSS. This issue affects Tamara Checkout: from n/a through 1.9.8."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en dev@tamara.co Tamara Checkout permite XSS almacenado. Este problema afecta a Tamara Checkout: desde n/a hasta 1.9.8."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23998.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23998.json
index a5a55d1a051..798d1a47509 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23998.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23998.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:13.413",
"lastModified": "2025-01-21T14:15:13.413",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rara Theme UltraLight allows Reflected XSS. This issue affects UltraLight: from n/a through 1.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Rara Theme UltraLight permite XSS reflejado. Este problema afecta a UltraLight: desde n/a hasta 1.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24001.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24001.json
index f7a58f47372..084f681d81b 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24001.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24001.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:13.600",
"lastModified": "2025-01-21T14:15:13.600",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in PPO Vi\u1ec7t Nam (ppo.vn) PPO Call To Actions allows Cross Site Request Forgery. This issue affects PPO Call To Actions: from n/a through 0.1.3."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad Cross-Site Request Forgery (CSRF) en PPO Vi?t Nam (ppo.vn) PPO Call To Actions permiten Cross Site Request Forgery. Este problema afecta a las llamadas a la acci\u00f3n de PPO: desde n/a hasta 0.1.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24010.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24010.json
index 61c22e0cc4f..e7347837814 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24010.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24010.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-20T16:15:28.730",
"lastModified": "2025-01-20T16:15:28.730",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vite is a frontend tooling framework for javascript. Vite allowed any websites to send any requests to the development server and read the response due to default CORS settings and lack of validation on the Origin header for WebSocket connections. This vulnerability is fixed in 6.0.9, 5.4.12, and 4.5.6."
+ },
+ {
+ "lang": "es",
+ "value": "Vite es una herramienta de interfaz framework para JavaScript. Vite permit\u00eda que cualquier sitio web enviara solicitudes al servidor de desarrollo y leyera la respuesta debido a la configuraci\u00f3n CORS predeterminada y la falta de validaci\u00f3n en el encabezado Origin para las conexiones WebSocket. Esta vulnerabilidad se solucion\u00f3 en 6.0.9, 5.4.12 y 4.5.6."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24011.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24011.json
index 2ccd849744a..6e788f7266a 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24011.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24011.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-21T16:15:14.760",
"lastModified": "2025-01-21T16:15:14.760",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Umbraco is a free and open source .NET content management system. Starting in version 14.0.0 and prior to versions 14.3.2 and 15.1.2, it's possible to determine whether an account exists based on an analysis of response codes and timing of Umbraco management API responses. Versions 14.3.2 and 15.1.2 contain a patch. No known workarounds are available."
+ },
+ {
+ "lang": "es",
+ "value": "Umbraco es un sistema de gesti\u00f3n de contenido .NET sistema gratuito y de c\u00f3digo abierto. A partir de la versi\u00f3n 14.0.0 y antes de las versiones 14.3.2 y 15.1.2, es posible determinar si existe una cuenta en funci\u00f3n de un an\u00e1lisis de los c\u00f3digos de respuesta y el tiempo de las respuestas de la API de gesti\u00f3n de Umbraco. Las versiones 14.3.2 y 15.1.2 contienen un parche. No se conocen workarounds disponibles."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24012.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24012.json
index 394f6556baa..ad7625e7156 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24012.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24012.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-21T16:15:14.923",
"lastModified": "2025-01-21T16:15:14.923",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Umbraco is a free and open source .NET content management system. Starting in version 14.0.0 and prior to versions 14.3.2 and 15.1.2, authenticated users are able to exploit a cross-site scripting vulnerability when viewing certain localized backoffice components. Versions 14.3.2 and 15.1.2 contain a patch."
+ },
+ {
+ "lang": "es",
+ "value": "Umbraco es un sistema de gesti\u00f3n de contenido .NET gratuito y de c\u00f3digo abierto sistema. A partir de la versi\u00f3n 14.0.0 y antes de las versiones 14.3.2 y 15.1.2, los usuarios autenticados pueden aprovechar una vulnerabilidad de cross-site scripting al visualizar determinados componentes de backoffice localizados. Las versiones 14.3.2 y 15.1.2 contienen un parche."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24013.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24013.json
index 2c03a3c76b2..bda8f6cb2b6 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24013.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24013.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-20T16:15:28.877",
"lastModified": "2025-01-20T16:15:28.877",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CodeIgniter is a PHP full-stack web framework. Prior to 4.5.8, CodeIgniter lacked proper header validation for its name and value. The potential attacker can construct deliberately malformed headers with Header class. This could disrupt application functionality, potentially causing errors or generating invalid HTTP requests. In some cases, these malformed requests might lead to a DoS scenario if a remote service\u2019s web application firewall interprets them as malicious and blocks further communication with the application. This vulnerability is fixed in 4.5.8."
+ },
+ {
+ "lang": "es",
+ "value": "CodeIgniter es una web PHP full-stack framework. Antes de la versi\u00f3n 4.5.8, CodeIgniter carec\u00eda de una validaci\u00f3n de encabezado adecuada para su nombre y valor. El atacante potencial puede construir encabezados malformados deliberadamente con la clase Header. Esto podr\u00eda interrumpir la funcionalidad de la aplicaci\u00f3n, lo que podr\u00eda causar errores o generar solicitudes HTTP no v\u00e1lidas. En algunos casos, estas solicitudes malformadas pueden conducir a un escenario de denegaci\u00f3n de servicio (DoS) si el firewall de la aplicaci\u00f3n web de un servicio remoto las interpreta como maliciosas y bloquea la comunicaci\u00f3n con la aplicaci\u00f3n. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 4.5.8."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24014.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24014.json
index 63decf78864..fd8a9158108 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24014.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24014.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-20T23:15:07.730",
"lastModified": "2025-01-21T03:15:06.393",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vim is an open source, command line text editor. A segmentation fault was found in Vim before 9.1.1043. In silent Ex mode (-s -e), Vim typically doesn't show a screen and just operates silently in batch mode. However, it is still possible to trigger the function that handles the scrolling of a gui version of Vim by feeding some binary characters to Vim. The function that handles the scrolling however may be triggering a redraw, which will access the ScreenLines pointer, even so this variable hasn't been allocated (since there is no screen). This vulnerability is fixed in 9.1.1043."
+ },
+ {
+ "lang": "es",
+ "value": "Vim es un editor de texto de l\u00ednea de comandos de c\u00f3digo abierto. Se encontr\u00f3 un error de segmentaci\u00f3n en Vim antes de la versi\u00f3n 9.1.1043. En el modo Ex silencioso (-s -e), Vim normalmente no muestra una pantalla y solo funciona silenciosamente en modo por lotes. Sin embargo, a\u00fan es posible activar la funci\u00f3n que maneja el desplazamiento de una versi\u00f3n de interfaz gr\u00e1fica de usuario de Vim al introducir algunos caracteres binarios en Vim. Sin embargo, la funci\u00f3n que gestiona el desplazamiento puede estar activando un redibujado, que acceder\u00e1 al puntero ScreenLines, incluso aunque esta variable no haya sido asignada (ya que no hay pantalla). Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 9.1.1043."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24017.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24017.json
index 9c52f7a11d3..d63d521eb35 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24017.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24017.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-21T16:15:15.087",
"lastModified": "2025-01-21T18:15:17.683",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "YesWiki is a wiki system written in PHP. Versions up to and including 4.4.5 are vulnerable to any end-user crafting a DOM based XSS on all of YesWiki's pages which is triggered when a user clicks on a malicious link. The vulnerability makes use of the search by tag feature. When a tag doesn't exist, the tag is reflected on the page and isn't properly sanitized on the server side which allows a malicious user to generate a link that will trigger an XSS on the client's side when clicked. This vulnerability allows any user to generate a malicious link that will trigger an account takeover when clicked, therefore allowing a user to steal other accounts, modify pages, comments, permissions, extract user data (emails), thus impacting the integrity, availability and confidentiality of a YesWiki instance. Version 4.5.0 contains a patch for the issue."
+ },
+ {
+ "lang": "es",
+ "value": "YesWiki es una wiki sistema escrita en PHP. Las versiones hasta incluida 4.4.5 son vulnerables a que cualquier usuario final manipule un XSS basado en DOM en todas las p\u00e1ginas de YesWiki que se active cuando un usuario haga clic en un enlace malicioso. La vulnerabilidad hace uso de la funci\u00f3n de b\u00fasqueda por etiqueta. Cuando una etiqueta no existe, la etiqueta se refleja en la p\u00e1gina y no se desinfecta correctamente en el lado del servidor, lo que permite a un usuario malicioso generar un enlace que activar\u00e1 un XSS en el lado del cliente cuando se haga clic en \u00e9l. Esta vulnerabilidad permite a cualquier usuario generar un enlace malicioso que activar\u00e1 una apropiaci\u00f3n de cuenta cuando se haga clic en \u00e9l, lo que permite a un usuario robar otras cuentas, modificar p\u00e1ginas, comentarios, permisos, extraer datos de usuario (correos electr\u00f3nicos), lo que afecta la integridad, disponibilidad y confidencialidad de una instancia de YesWiki. La versi\u00f3n 4.5.0 contiene un parche para el problema."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24018.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24018.json
index a0a15340d44..ae5a2fea00a 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24018.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24018.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-21T17:15:16.917",
"lastModified": "2025-01-21T18:15:17.803",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "YesWiki is a wiki system written in PHP. In versions up to and including 4.4.5, it is possible for an authenticated user with rights to edit/create a page or comment to trigger a stored XSS which will be reflected on any page where the resource is loaded. The vulnerability makes use of the content edition feature and more specifically of the `{{attach}}` component allowing users to attach files/medias to a page. When a file is attached using the `{{attach}}` component, if the resource contained in the `file` attribute doesn't exist, then the server will generate a file upload button containing the filename. This vulnerability allows any malicious authenticated user that has the right to create a comment or edit a page to be able to steal accounts and therefore modify pages, comments, permissions, extract user data (emails), thus impacting the integrity, availability and confidentiality of a YesWiki instance. Version 4.5.0 contains a patch for the issue."
+ },
+ {
+ "lang": "es",
+ "value": "YesWiki es una wiki sistema escrita en PHP. En versiones hasta incluida 4.4.5, es posible que un usuario autenticado con derechos para editar/crear una p\u00e1gina o comentario active un XSS almacenado que se reflejar\u00e1 en cualquier p\u00e1gina donde se cargue el recurso. La vulnerabilidad hace uso de la funci\u00f3n de edici\u00f3n de contenido y, m\u00e1s espec\u00edficamente, del componente `{{attach}}` que permite a los usuarios adjuntar archivos/medios a una p\u00e1gina. Cuando se adjunta un archivo utilizando el componente `{{attach}}`, si el recurso contenido en el atributo `file` no existe, entonces el servidor generar\u00e1 un bot\u00f3n de carga de archivo que contiene el nombre del archivo. Esta vulnerabilidad permite que cualquier usuario autenticado malintencionado que tenga derecho a crear un comentario o editar una p\u00e1gina pueda robar cuentas y, por lo tanto, modificar p\u00e1ginas, comentarios, permisos, extraer datos de usuario (correos electr\u00f3nicos), lo que afecta la integridad, disponibilidad y confidencialidad de una instancia de YesWiki. La versi\u00f3n 4.5.0 contiene un parche para el problema."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24019.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24019.json
index d0d012f2886..750afae1c36 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24019.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24019.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-21T18:15:17.933",
"lastModified": "2025-01-21T18:15:17.933",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "YesWiki is a wiki system written in PHP. In versions up to and including 4.4.5, it is possible for any authenticated user, through the use of the filemanager to delete any file owned by the user running the FastCGI Process Manager (FPM) on the host without any limitation on the filesystem's scope. This vulnerability allows any authenticated user to arbitrarily remove content from the Wiki resulting in partial loss of data and defacement/deterioration of the website. In the context of a container installation of YesWiki without any modification, the `yeswiki` files (for example .php) are not owned by the same user (root) as the one running the FPM process (www-data). However in a standard installation, www-data may also be the owner of the PHP files, allowing a malicious user to completely cut the access to the wiki by deleting all important PHP files (like index.php or core files of YesWiki). Version 4.5.0 contains a patch for this issue."
+ },
+ {
+ "lang": "es",
+ "value": "YesWiki es un wiki sistema escrito en PHP. En versiones hasta incluida 4.4.5, es posible que cualquier usuario autenticado, mediante el uso del administrador de archivos, elimine cualquier archivo propiedad del usuario que ejecuta el Administrador de procesos FastCGI (FPM) en el host sin ninguna limitaci\u00f3n en el alcance del sistema de archivos. Esta vulnerabilidad permite a cualquier usuario autenticado eliminar contenido del Wiki de forma arbitraria, lo que resulta en la p\u00e9rdida parcial de datos y la desfiguraci\u00f3n/deterioro del sitio web. En el contexto de una instalaci\u00f3n de contenedor de YesWiki sin ninguna modificaci\u00f3n, los archivos `yeswiki` (por ejemplo .php) no son propiedad del mismo usuario (superusuario) que el que ejecuta el proceso FPM (www-data). Sin embargo, en una instalaci\u00f3n est\u00e1ndar, www-data tambi\u00e9n puede ser el propietario de los archivos PHP, lo que permite a un usuario malintencionado cortar por completo el acceso al wiki eliminando todos los archivos PHP importantes (como index.php o los archivos principales de YesWiki). La versi\u00f3n 4.5.0 contiene un parche para este problema."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24020.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24020.json
index ad30aff5fb5..21199a8c35e 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24020.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24020.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-21T18:15:18.157",
"lastModified": "2025-01-21T18:15:18.157",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a Web manager for charitable institutions. An Open Redirect vulnerability was identified in the `control.php` endpoint of versions up to and including 3.2.10 of the WeGIA application. The vulnerability allows the `nextPage` parameter to be manipulated, redirecting authenticated users to arbitrary external URLs without validation. The issue stems from the lack of validation for the `nextPage` parameter, which accepts external URLs as redirection destinations. This vulnerability can be exploited to perform phishing attacks or redirect users to malicious websites. Version 3.2.11 contains a fix for the issue."
+ },
+ {
+ "lang": "es",
+ "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se ha identificado una vulnerabilidad de Open Redirect en el `control.php` endpoint de las versiones hasta incluida 3.2.10 de la aplicaci\u00f3n WeGIA. La vulnerabilidad permite manipular el par\u00e1metro `nextPage`, redirigiendo a los usuarios autenticados a URL externas arbitrarias sin validaci\u00f3n. El problema surge de la falta de validaci\u00f3n del par\u00e1metro `nextPage`, que acepta URL externas como destinos de redirecci\u00f3n. Esta vulnerabilidad puede explotarse para realizar ataques de phishing o redirigir a los usuarios a sitios web maliciosos. La versi\u00f3n 3.2.11 contiene una soluci\u00f3n para el problema."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24024.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24024.json
index d67dedb5d98..f09a9ceaf96 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24024.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24024.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-21T20:15:46.617",
"lastModified": "2025-01-21T20:15:46.617",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mjolnir is a moderation tool for Matrix. Mjolnir v1.9.0 responds to management commands from any room the bot is member of. This can allow users who aren't operators of the bot to use the bot's functions, including server administration components if enabled. Version 1.9.1 reverts the feature that introduced the bug, and version 1.9.2 reintroduces the feature safely. Downgrading to version 1.8.3 is recommended if upgrading to 1.9.1 or higher isn't possible."
+ },
+ {
+ "lang": "es",
+ "value": "Mjolnir es una herramienta de moderaci\u00f3n para Matrix. Mjolnir v1.9.0 responde a los comandos de administraci\u00f3n desde cualquier sala de la que sea miembro el bot. Esto puede permitir que los usuarios que no sean operadores del bot utilicen las funciones del bot y los componentes de administraci\u00f3n del servidor incluida si est\u00e1n habilitados. La versi\u00f3n 1.9.1 revierte la funci\u00f3n que introdujo el error y la versi\u00f3n 1.9.2 reintroduce la funci\u00f3n de forma segura. Se recomienda cambiar a la versi\u00f3n 1.8.3 si no es posible actualizar a la 1.9.1 o una versi\u00f3n superior."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24027.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24027.json
index 3cd8435e555..bdd83fb1aaf 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24027.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24027.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "ps_contactinfo, a PrestaShop module for displaying store contact information, has a cross-site scripting (XSS) vulnerability in versions up to and including 3.3.2. This can not be exploited in a fresh install of PrestaShop, only shops made vulnerable by third party modules are concerned. For example, if the shop has a third party module vulnerable to SQL injections, then ps_contactinfo might execute a stored cross-site scripting in formatting objects. Commit d60f9a5634b4fc2d3a8831fb08fe2e1f23cbfa39 keeps formatted addresses from displaying a XSS stored in the database, and the fix is expected to be available in version 3.3.3. No workarounds are available aside from applying the fix and keeping all modules maintained and update."
+ },
+ {
+ "lang": "es",
+ "value": "ps_contactinfo, un m\u00f3dulo de PrestaShop para mostrar informaci\u00f3n de contacto de la tienda, tiene una vulnerabilidad de cross-site scripting (XSS) en versiones hasta incluida 3.3.2. Esto no se puede explotar en una nueva instalaci\u00f3n de PrestaShop, solo se ven afectadas las tiendas que se vuelven vulnerables por m\u00f3dulos de terceros. Por ejemplo, si la tienda tiene un m\u00f3dulo de terceros vulnerable a inyecciones SQL, entonces ps_contactinfo podr\u00eda ejecutar una Cross-Site Scripting Almacenado en los objetos de formato. El commit d60f9a5634b4fc2d3a8831fb08fe2e1f23cbfa39 evita que las direcciones formateadas muestren un XSS almacenado en la base de datos, y se espera que la soluci\u00f3n est\u00e9 disponible en la versi\u00f3n 3.3.3. No hay workarounds disponibles aparte de aplicar la soluci\u00f3n y mantener todos los m\u00f3dulos actualizados."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24030.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24030.json
index 801dedbbb2d..07fc21e31fe 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24030.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24030.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. A user with access to the Kubernetes cluster can use a path traversal attack to execute Envoy Admin interface commands on proxies managed by any version of Envoy Gateway prior to 1.2.6. The admin interface can be used to terminate the Envoy process and extract the Envoy configuration (possibly containing confidential data). Version 1.2.6 fixes the issue. As a workaround, the `EnvoyProxy` API can be used to apply a bootstrap config patch that restricts access strictly to the prometheus stats endpoint. Find below an example of such a bootstrap patch."
+ },
+ {
+ "lang": "es",
+ "value": "Envoy Gateway es un proyecto de c\u00f3digo abierto para administrar Envoy Proxy como una puerta de enlace de aplicaciones independiente o basada en Kubernetes. Un usuario con acceso al cl\u00faster de Kubernetes puede usar un ataque de recorrido de ruta para ejecutar comandos de la interfaz de administraci\u00f3n de Envoy en servidores proxy administrados por cualquier versi\u00f3n de Envoy Gateway anterior a la 1.2.6. La interfaz de administraci\u00f3n se puede usar para finalizar el proceso de Envoy y extraer la configuraci\u00f3n de Envoy (que posiblemente contenga datos confidenciales). La versi\u00f3n 1.2.6 soluciona el problema. Como workaround, se puede usar la API `EnvoyProxy` para aplicar un parche de configuraci\u00f3n de arranque que restrinja el acceso estrictamente al endpoint de estad\u00edsticas de Prometheus. A continuaci\u00f3n, encontrar\u00e1 un ejemplo de un parche de arranque de este tipo."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24033.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24033.json
index 0d0c2ccbf91..4715eb9f980 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24033.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24033.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-23T18:15:33.610",
"lastModified": "2025-01-23T18:15:33.610",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "@fastify/multipart is a Fastify plugin for parsing the multipart content-type. Prior to versions 8.3.1 and 9.0.3, the `saveRequestFiles` function does not delete the uploaded temporary files when user cancels the request. The issue is fixed in versions 8.3.1 and 9.0.3. As a workaround, do not use `saveRequestFiles`."
+ },
+ {
+ "lang": "es",
+ "value": "@fastify/multipart es un complemento de Fastify para analizar el tipo de contenido multipart. Antes de las versiones 8.3.1 y 9.0.3, la funci\u00f3n `saveRequestFiles` no elimina los archivos temporales cargados cuando el usuario cancela la solicitud. El problema se solucion\u00f3 en las versiones 8.3.1 y 9.0.3. Como workaround, no use `saveRequestFiles`."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24034.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24034.json
index 4fd45782f79..822cd1d10bf 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24034.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24034.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-23T18:15:33.793",
"lastModified": "2025-01-23T18:15:33.793",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Starting in version 0.7.0 and prior to versions 0.7.15 and 0.8.3, Himmelblau is vulnerable to leaking credentials in debug logs. When debug logging is enabled, user access tokens are inadvertently logged, potentially exposing sensitive authentication data. Similarly, Kerberos Ticket-Granting Tickets (TGTs) are logged when debug logging is enabled. Both issues pose a risk of exposing sensitive credentials, particularly in environments where debug logging is enabled. Himmelblau versions 0.7.15 and 0.8.3 contain a patch that fixes both issues. Some workarounds are available for users who are unable to upgrade. For the **logon compliance script issue**, disable the `logon_script` option in `/etc/himmelblau/himmelblau.conf`, and avoid using the `-d` flag when starting the `himmelblaud` daemon. For the Kerberos CCache issue, one may disable debug logging globally by setting the `debug` option in `/etc/himmelblau/himmelblau.conf` to `false` and avoiding the `-d` parameter when starting `himmelblaud`."
+ },
+ {
+ "lang": "es",
+ "value": "Himmelblau es una suite de interoperabilidad para Microsoft Azure Entra ID e Intune. A partir de la versi\u00f3n 0.7.0 y antes de las versiones 0.7.15 y 0.8.3, Himmelblau es vulnerable a la filtraci\u00f3n de credenciales en los registros de depuraci\u00f3n. Cuando el registro de depuraci\u00f3n est\u00e1 habilitado, los tokens de acceso de usuario se registran inadvertidamente, lo que potencialmente expone datos de autenticaci\u00f3n confidenciales. De manera similar, los tickets de concesi\u00f3n de tickets (TGT) de Kerberos se registran cuando el registro de depuraci\u00f3n est\u00e1 habilitado. Ambos problemas plantean un riesgo de exposici\u00f3n de credenciales confidenciales, especialmente en entornos donde el registro de depuraci\u00f3n est\u00e1 habilitado. Las versiones 0.7.15 y 0.8.3 de Himmelblau contienen un parche que corrige ambos problemas. Algunos workarounds est\u00e1n disponibles para los usuarios que no pueden actualizar. Para el problema de cumplimiento de inicio de sesi\u00f3n script, deshabilite la opci\u00f3n `logon_script` en `/etc/himmelblau/himmelblau.conf` y evite usar el par\u00e1metro `-d` al iniciar `himmelblaud` daemon. Para el problema de Kerberos CCache, se puede deshabilitar el registro de depuraci\u00f3n globalmente configurando la opci\u00f3n `debug` en `/etc/himmelblau/himmelblau.conf` en `false` y evitando el par\u00e1metro `-d` al iniciar `himmelblaud`."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24337.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24337.json
index fe97eaa0dc2..6b8d310dd0b 100644
--- a/CVE-2025/CVE-2025-243xx/CVE-2025-24337.json
+++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24337.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-20T14:15:27.130",
"lastModified": "2025-01-20T14:15:27.130",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WriteFreely through 0.15.1, when MySQL is used, allows local users to discover credentials by reading config.ini."
+ },
+ {
+ "lang": "es",
+ "value": "WriteFreely hasta 0.15.1, cuando se utiliza MySQL, permite a los usuarios locales descubrir credenciales leyendo config.ini."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24353.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24353.json
index efff4908a86..edf9e156974 100644
--- a/CVE-2025/CVE-2025-243xx/CVE-2025-24353.json
+++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24353.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-23T18:15:33.990",
"lastModified": "2025-01-23T18:15:33.990",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 11.2.0, when sharing an item, a typical user can specify an arbitrary role. It allows the user to use a higher-privileged role to see fields that otherwise the user should not be able to see. Instances that are impacted are those that use the share feature and have specific roles hierarchy and fields that are not visible for certain roles. Version 11.2.0 contains a patch the issue."
+ },
+ {
+ "lang": "es",
+ "value": "Directus es una API en tiempo real y un panel de control de aplicaciones para administrar el contenido de bases de datos SQL. Antes de la versi\u00f3n 11.2.0, al compartir un elemento, un usuario t\u00edpico pod\u00eda especificar un rol arbitrario. Esto permite al usuario usar un rol con mayores privilegios para ver campos que, de lo contrario, no podr\u00eda ver. Las instancias que se ven afectadas son aquellas que usan la funci\u00f3n de compartir y tienen una jerarqu\u00eda de roles espec\u00edfica y campos que no son visibles para ciertos roles. La versi\u00f3n 11.2.0 contiene un parche para solucionar el problema."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24456.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24456.json
index 25ad6959ca0..8cb8a777703 100644
--- a/CVE-2025/CVE-2025-244xx/CVE-2025-24456.json
+++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24456.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@jetbrains.com",
"published": "2025-01-21T18:15:18.320",
"lastModified": "2025-01-21T18:15:18.320",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains Hub before 2024.3.55417 privilege escalation was possible via LDAP authentication mapping"
+ },
+ {
+ "lang": "es",
+ "value": "En JetBrains Hub antes de 2024.3.55417, la escalada de privilegios era posible a trav\u00e9s del mapeo de autenticaci\u00f3n LDAP"
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24457.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24457.json
index 7bc002101c7..70bac7b9e60 100644
--- a/CVE-2025/CVE-2025-244xx/CVE-2025-24457.json
+++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24457.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@jetbrains.com",
"published": "2025-01-21T18:15:18.520",
"lastModified": "2025-01-21T18:15:18.520",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains YouTrack before 2024.3.55417 permanent tokens could be exposed in logs"
+ },
+ {
+ "lang": "es",
+ "value": "En JetBrains YouTrack antes de 2024.3.55417, los tokens permanentes podr\u00edan quedar expuestos en los registros"
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24458.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24458.json
index d36bf055ed0..994c2b0476e 100644
--- a/CVE-2025/CVE-2025-244xx/CVE-2025-24458.json
+++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24458.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@jetbrains.com",
"published": "2025-01-21T18:15:18.697",
"lastModified": "2025-01-21T18:15:18.697",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains YouTrack before 2024.3.55417 account takeover was possible via spoofed email and Helpdesk integration"
+ },
+ {
+ "lang": "es",
+ "value": "En JetBrains YouTrack antes de 2024.3.55417, la apropiaci\u00f3n de cuentas era posible a trav\u00e9s de correo electr\u00f3nico falsificado e integraci\u00f3n con Helpdesk."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24459.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24459.json
index 40329da3ab0..a91a699e135 100644
--- a/CVE-2025/CVE-2025-244xx/CVE-2025-24459.json
+++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24459.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@jetbrains.com",
"published": "2025-01-21T18:15:18.890",
"lastModified": "2025-01-21T18:15:18.890",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2024.12.1 reflected XSS was possible on the Vault Connection page"
+ },
+ {
+ "lang": "es",
+ "value": "En JetBrains TeamCity antes de 2024.12.1, el XSS reflejado era posible en la p\u00e1gina de Conexi\u00f3n de Vault"
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24460.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24460.json
index 05665dfb9e5..fea46405527 100644
--- a/CVE-2025/CVE-2025-244xx/CVE-2025-24460.json
+++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24460.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@jetbrains.com",
"published": "2025-01-21T18:15:19.067",
"lastModified": "2025-01-21T18:15:19.067",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2024.12.1 improper access control allowed to see Projects\u2019 names in the agent pool"
+ },
+ {
+ "lang": "es",
+ "value": "En JetBrains TeamCity antes del 1 de diciembre de 2024, un control de acceso incorrecto permit\u00eda ver los nombres de los proyectos en el grupo de agentes"
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24461.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24461.json
index 2d7c9f285c8..7758d692589 100644
--- a/CVE-2025/CVE-2025-244xx/CVE-2025-24461.json
+++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24461.json
@@ -3,12 +3,16 @@
"sourceIdentifier": "cve@jetbrains.com",
"published": "2025-01-21T18:15:19.260",
"lastModified": "2025-01-21T18:15:19.260",
- "vulnStatus": "Received",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2024.12.1 decryption of connection secrets without proper permissions was possible via Test Connection endpoint"
+ },
+ {
+ "lang": "es",
+ "value": "En JetBrains TeamCity antes de 2024.12.1 era posible descifrar secretos de conexi\u00f3n sin los permisos adecuados a trav\u00e9s de Conexi\u00f3n de prueba endpoint"
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24529.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24529.json
index b664b4dd758..9b7dc44d626 100644
--- a/CVE-2025/CVE-2025-245xx/CVE-2025-24529.json
+++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24529.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "An issue was discovered in phpMyAdmin 5.x before 5.2.2. An XSS vulnerability has been discovered for the Insert tab."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en phpMyAdmin 5.x anterior a 5.2.2. Se descubri\u00f3 una vulnerabilidad XSS para la pesta\u00f1a Insertar."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24530.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24530.json
index 8b72f9e406f..a214d9528de 100644
--- a/CVE-2025/CVE-2025-245xx/CVE-2025-24530.json
+++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24530.json
@@ -9,6 +9,10 @@
{
"lang": "en",
"value": "An issue was discovered in phpMyAdmin 5.x before 5.2.2. An XSS vulnerability has been discovered for the check tables feature. A crafted table or database name could be used for XSS."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en phpMyAdmin 5.x anterior a 5.2.2. Se descubri\u00f3 una vulnerabilidad XSS para la funci\u00f3n de verificaci\u00f3n de tablas. Se podr\u00eda usar un nombre de tabla o base de datos manipulado para XSS."
}
],
"metrics": {
diff --git a/README.md b/README.md
index 29ab9787a4a..ec73d330971 100644
--- a/README.md
+++ b/README.md
@@ -13,7 +13,7 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
-2025-01-25T19:00:19.210624+00:00
+2025-01-26T03:00:19.791548+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
@@ -27,7 +27,7 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
-2025-01-25T01:00:04.380356+00:00
+2025-01-26T01:00:04.334646+00:00
```
### Total Number of included CVEs
@@ -38,17 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
-Recently added CVEs: `2`
+Recently added CVEs: `0`
-- [CVE-2025-0542](CVE-2025/CVE-2025-05xx/CVE-2025-0542.json) (`2025-01-25T17:15:21.030`)
-- [CVE-2025-0543](CVE-2025/CVE-2025-05xx/CVE-2025-0543.json) (`2025-01-25T17:15:21.720`)
### CVEs modified in the last Commit
-Recently modified CVEs: `1`
+Recently modified CVEs: `6707`
-- [CVE-2025-21502](CVE-2025/CVE-2025-215xx/CVE-2025-21502.json) (`2025-01-25T18:15:26.790`)
+- [CVE-2025-24001](CVE-2025/CVE-2025-240xx/CVE-2025-24001.json) (`2025-01-21T14:15:13.600`)
+- [CVE-2025-24010](CVE-2025/CVE-2025-240xx/CVE-2025-24010.json) (`2025-01-20T16:15:28.730`)
+- [CVE-2025-24011](CVE-2025/CVE-2025-240xx/CVE-2025-24011.json) (`2025-01-21T16:15:14.760`)
+- [CVE-2025-24012](CVE-2025/CVE-2025-240xx/CVE-2025-24012.json) (`2025-01-21T16:15:14.923`)
+- [CVE-2025-24013](CVE-2025/CVE-2025-240xx/CVE-2025-24013.json) (`2025-01-20T16:15:28.877`)
+- [CVE-2025-24014](CVE-2025/CVE-2025-240xx/CVE-2025-24014.json) (`2025-01-21T03:15:06.393`)
+- [CVE-2025-24017](CVE-2025/CVE-2025-240xx/CVE-2025-24017.json) (`2025-01-21T18:15:17.683`)
+- [CVE-2025-24018](CVE-2025/CVE-2025-240xx/CVE-2025-24018.json) (`2025-01-21T18:15:17.803`)
+- [CVE-2025-24019](CVE-2025/CVE-2025-240xx/CVE-2025-24019.json) (`2025-01-21T18:15:17.933`)
+- [CVE-2025-24020](CVE-2025/CVE-2025-240xx/CVE-2025-24020.json) (`2025-01-21T18:15:18.157`)
+- [CVE-2025-24024](CVE-2025/CVE-2025-240xx/CVE-2025-24024.json) (`2025-01-21T20:15:46.617`)
+- [CVE-2025-24027](CVE-2025/CVE-2025-240xx/CVE-2025-24027.json) (`2025-01-22T15:15:27.090`)
+- [CVE-2025-24030](CVE-2025/CVE-2025-240xx/CVE-2025-24030.json) (`2025-01-23T04:15:07.100`)
+- [CVE-2025-24033](CVE-2025/CVE-2025-240xx/CVE-2025-24033.json) (`2025-01-23T18:15:33.610`)
+- [CVE-2025-24034](CVE-2025/CVE-2025-240xx/CVE-2025-24034.json) (`2025-01-23T18:15:33.793`)
+- [CVE-2025-24337](CVE-2025/CVE-2025-243xx/CVE-2025-24337.json) (`2025-01-20T14:15:27.130`)
+- [CVE-2025-24353](CVE-2025/CVE-2025-243xx/CVE-2025-24353.json) (`2025-01-23T18:15:33.990`)
+- [CVE-2025-24456](CVE-2025/CVE-2025-244xx/CVE-2025-24456.json) (`2025-01-21T18:15:18.320`)
+- [CVE-2025-24457](CVE-2025/CVE-2025-244xx/CVE-2025-24457.json) (`2025-01-21T18:15:18.520`)
+- [CVE-2025-24458](CVE-2025/CVE-2025-244xx/CVE-2025-24458.json) (`2025-01-21T18:15:18.697`)
+- [CVE-2025-24459](CVE-2025/CVE-2025-244xx/CVE-2025-24459.json) (`2025-01-21T18:15:18.890`)
+- [CVE-2025-24460](CVE-2025/CVE-2025-244xx/CVE-2025-24460.json) (`2025-01-21T18:15:19.067`)
+- [CVE-2025-24461](CVE-2025/CVE-2025-244xx/CVE-2025-24461.json) (`2025-01-21T18:15:19.260`)
+- [CVE-2025-24529](CVE-2025/CVE-2025-245xx/CVE-2025-24529.json) (`2025-01-23T06:15:27.710`)
+- [CVE-2025-24530](CVE-2025/CVE-2025-245xx/CVE-2025-24530.json) (`2025-01-23T06:15:27.893`)
## Download and Usage
diff --git a/_state.csv b/_state.csv
index 952035f9698..34b0fcc9849 100644
--- a/_state.csv
+++ b/_state.csv
@@ -28400,11 +28400,11 @@ CVE-2007-5576,0,0,7ed42e5b32f5b11ac3fdb9aba305fb3715b42d47efca54f2e86ec57611bbd6
CVE-2007-5577,0,0,4bc91100ad38aa88acc7285b5a2fc272647e00187841820209a6676b9515110e,2024-11-21T00:38:13.507000
CVE-2007-5578,0,0,b5e4f669f43891f1c42ff5311dedaa97fbb1a0e4d67d4d37a0d877e37e46b8bb,2024-11-21T00:38:13.650000
CVE-2007-5579,0,0,bfd37e99899a9feeafb5513e44b8032378d25e7ac9dd04579fda2dcbfdbb7f0b,2024-11-21T00:38:13.793000
-CVE-2007-5580,0,0,37c0af5bc19c0d05cf0f563acbfe09c799944625418bba459810ce7fc80348d9,2024-11-21T00:38:14.630000
-CVE-2007-5581,0,0,2b028912bbf3e8c752f9658c2dcfc228b7df8d7f5372164bde45d06dfa1c5f81,2024-11-21T00:38:14.857000
-CVE-2007-5582,0,0,b67978d5c6af1b76d52cb65c87d13a5925ea586b99f1770a766a085b079b77e4,2024-11-21T00:38:14.973000
-CVE-2007-5583,0,0,3c59e9e7ac477150675b6fb2c0539a4b424d7784dfe46e209aec35c93ed23662,2024-11-21T00:38:15.080000
-CVE-2007-5584,0,0,7de7d2cd7a34ed2796879179b1aa0ad7e3956d908abed382fbdc369fe078bc1e,2024-11-21T00:38:15.197000
+CVE-2007-5580,0,1,a085220792636591b663a1b0e3c193b4c8f609e8362ac19b1f756dfd50f4390d,2024-11-21T00:38:14.630000
+CVE-2007-5581,0,1,2e4183e1fb61472c416eec861c37f7fca5e168d9846d26045eacea5a2c147550,2024-11-21T00:38:14.857000
+CVE-2007-5582,0,1,4121591f3a69c6d8b9e8daed044a2adbebdceee819e7d1c8ce68e5187367a7ff,2024-11-21T00:38:14.973000
+CVE-2007-5583,0,1,da3dd40504107eccba14f1c9639383f2d776225cdb747ad349f0b442d5a709b9,2024-11-21T00:38:15.080000
+CVE-2007-5584,0,1,ad57d8c35a167da0159dfb4ef2ab752cecd3bf2ed9276ec8595ba3272787a3bb,2024-11-21T00:38:15.197000
CVE-2007-5585,0,0,3a91e9cdbe0ddd1e5e8a1adca6b58451f989f74d5dead86938a75df3019c48db,2024-11-21T00:38:15.303000
CVE-2007-5586,0,0,9672c1be12a3124458d6afd3642f79e8964fc613ff4eda192e1788d6225f799a,2023-11-07T02:01:20.710000
CVE-2007-5587,0,0,9156f1c422c6cbf1ece23c32fbf33cd899bb6fcbe312f75256182d0af85197da,2024-11-21T00:38:15.450000
@@ -29536,11 +29536,11 @@ CVE-2008-0015,0,0,30a85661eac7d9b29343fe353e98b7d2e3bd80bb77bd42308bd22286595c66
CVE-2008-0016,0,0,ea0a8350e56ad24ea45d2e98f551723a21871259425b4fcccfed2027f6ed108c,2024-11-21T00:40:58.967000
CVE-2008-0017,0,0,66fca0790eaefc02ee84fab1b3cd0750b4900beb7859ca920833b08e22d871aa,2024-11-21T00:40:59.173000
CVE-2008-0020,0,0,42183628b21f2d5c009b63c9b4709a6580236a49ab05ce72c188556ba36ae931,2024-11-21T00:40:59.400000
-CVE-2008-0026,0,0,afac81b64d7c47be94b3de697e3c2d711986d99441b2869a170de3ca0a5d1a91,2024-11-21T00:40:59.550000
-CVE-2008-0027,0,0,1a6b639d7ca1c5ccb4fbd93d5233f5622a407b7b97bd0d40f6fd66710a86f0a7,2024-11-21T00:40:59.670000
-CVE-2008-0028,0,0,ff32e818610940c0d5838cd4b655df2cf72e6e1197c2ccb7147381037d60bb0c,2024-11-21T00:40:59.783000
-CVE-2008-0029,0,0,1c01a0bac7d685c6f7be46d60f9c9bc9f9bc2518545b49268f81893d2730fbd4,2024-11-21T00:40:59.907000
-CVE-2008-0030,0,0,a00e08890b17ec9010a64dafb4da94205503dc5e4e891f7ac3caf04a171f5025,2023-11-07T02:01:39.243000
+CVE-2008-0026,0,1,991343988537492d790db7d836921b74ca577fb05c5ef340d9cb93818f421a6b,2024-11-21T00:40:59.550000
+CVE-2008-0027,0,1,bd4ff785da1488fcb9374de090c48a6de033faa3fd006721410aed5ad76421ee,2024-11-21T00:40:59.670000
+CVE-2008-0028,0,1,9015013692fb555948410272f14510da807d446d7aea2b7963b6dd1ed7192e0d,2024-11-21T00:40:59.783000
+CVE-2008-0029,0,1,eb7081b458d40cb21596438e02d60a185cf1d1e71cc5041962d3ed982e69a0df,2024-11-21T00:40:59.907000
+CVE-2008-0030,0,1,8b37f46c8b3214b45117cfbf401fe3e320e0ba68a6ae40b28a5c50ff0389e0c9,2023-11-07T02:01:39.243000
CVE-2008-0031,0,0,eca9f4e85edb61ea408b5562a6de9d7d4a0e89061372023b014b0341fad62a5a,2024-11-21T00:41:00.037000
CVE-2008-0032,0,0,899350f4277e30fdc87192a6ac95e9d73041decde988bd7d5d33d457c8334c88,2024-11-21T00:41:00.190000
CVE-2008-0033,0,0,2260cc9002a74a86f1613a9eb48f9e40c47061f0b7bbd38f19d771ef3b474c83,2024-11-21T00:41:00.350000
@@ -30020,18 +30020,18 @@ CVE-2008-0522,0,0,dd70f0ddc6c2f5a4946bc1c0bed526bed91bf8a11855578fed58242b80c229
CVE-2008-0523,0,0,dfddc460ee931238298eb2d6e0c7abb332a5a627abffd57a25af6e7f7be90568,2024-11-21T00:42:18.293000
CVE-2008-0524,0,0,e233e00effec2e001d411ef25b5f42384c3e858843cb5d6d0a346e30359793d5,2024-11-21T00:42:18.430000
CVE-2008-0525,0,0,2cdbb27e33e98d6fa172253b3077c937c6447051b0a2f8d6dfd54342f259a297,2024-11-21T00:42:18.560000
-CVE-2008-0526,0,0,a77dc628cb64c8971ea46d79de2a0726462efd313b0ade79992d6243cd25bc87,2024-11-21T00:42:18.710000
-CVE-2008-0527,0,0,293ec34e82440cdec07f612fda719c0e908a5865aad80c81653b51d2ee27e7f3,2024-11-21T00:42:18.827000
-CVE-2008-0528,0,0,479e0fd68a55af6b22a30746ee2ba69a356a4f05c11985c53c70c30fbee26eed,2024-11-21T00:42:18.943000
-CVE-2008-0529,0,0,cb0c72732cd9c0f0ea6c31ca50ac877cdba3cdfba5eae1f0902eede7bfcedea6,2024-11-21T00:42:19.060000
-CVE-2008-0530,0,0,50a232f8f5439814295c4f1330114375725b4c7d2e541006725293f0ceca2b77,2024-11-21T00:42:19.177000
-CVE-2008-0531,0,0,d43d6ac505fcfdc7ca7c03f4e05ebc8334aaac835b2e336b022c9e2ec80df664,2024-11-21T00:42:19.290000
-CVE-2008-0532,0,0,2eea683c561cff6eb7ebe3a643daddb2deed9476e09e1f2569c998b87c9cc908,2024-11-21T00:42:19.410000
-CVE-2008-0533,0,0,54af6513855c04a6bf9571e9b419b7f73c213524b1a32ff9dd69c73cb2ae4f54,2024-11-21T00:42:19.523000
-CVE-2008-0534,0,0,a34f6da85a1e4c9db52f611420c1ac0794cd27369799d891c5a169ebaaacaec9,2024-11-21T00:42:19.643000
-CVE-2008-0535,0,0,c11e3cebc65370286f95a91ed70563b4659be3437ec635c66d92aedd532efe7a,2024-11-21T00:42:19.767000
-CVE-2008-0536,0,0,a4925ec01082f8fd3703d513947ed5ddea95d6a33db72bbebc9043784fb5010e,2024-11-21T00:42:19.883000
-CVE-2008-0537,0,0,a07350d2d24d5c5bb6f13515c6b8f0566e9a492520e11c0dde56bc39773f67d9,2024-11-21T00:42:20
+CVE-2008-0526,0,1,f16b47d6b16d1c886fcb7817292c7159b638d4842f9603c9ee1f27dda7231473,2024-11-21T00:42:18.710000
+CVE-2008-0527,0,1,22b030f4e651973d49eab014d2e83204d7f082044f0af575937efc9dcb918dab,2024-11-21T00:42:18.827000
+CVE-2008-0528,0,1,385d06838d892c5baeee14a708d69000658c2d5d4302fca92c269bd7e7c493b0,2024-11-21T00:42:18.943000
+CVE-2008-0529,0,1,dfe0dc1a9d01d1caf87b577cbb6638bf7f8e35f8ce90bab71a11f73cfe485aaa,2024-11-21T00:42:19.060000
+CVE-2008-0530,0,1,0c5f719772e252bba33133c4eb76413b7b429912df5c2602b190f65515c387c9,2024-11-21T00:42:19.177000
+CVE-2008-0531,0,1,32ee6e6e97039c269aba3404ccd75c664982a8903a7d7ab65901cdeec1950a27,2024-11-21T00:42:19.290000
+CVE-2008-0532,0,1,02d85780cb7a2fceac724cadc4ed8c154255760e6304abd6dc0f56297ac238a2,2024-11-21T00:42:19.410000
+CVE-2008-0533,0,1,9c4fc184d62be35523219effe01b03bb0fcc5cb2ed36855eb9c4776dedb64506,2024-11-21T00:42:19.523000
+CVE-2008-0534,0,1,6d2b6d4b66de65c1260bffb2d4ad8f835dcdeab8730da6a506354942675b5beb,2024-11-21T00:42:19.643000
+CVE-2008-0535,0,1,39cc15d4c387ab9306ca5a011a637671fe5a233ca1eef6b3c37f4c27ce2614de,2024-11-21T00:42:19.767000
+CVE-2008-0536,0,1,391bda70acf38a7da6450ed6222153999f4d9ec633c9474e20ca89d7fef0b8be,2024-11-21T00:42:19.883000
+CVE-2008-0537,0,1,901b7d9f7624117ba7008628a58909a063c6b4bc7da91459570bbf234cd4a2ab,2024-11-21T00:42:20
CVE-2008-0538,0,0,ae53823865d8fea118610f431958cd8ca76dda58c0009e78b842effd3b57f909,2024-11-21T00:42:20.117000
CVE-2008-0539,0,0,9ca292e98339b85d55ff5b9d06e429ef1df449f71b5e3ff503ccf896e8cb4c58,2024-11-21T00:42:20.253000
CVE-2008-0540,0,0,e2a57496fa71f9f53ce7fa1c4b1bb7b14370be2ba9d4809b3b1d458079c39573,2024-11-21T00:42:20.410000
@@ -30636,16 +30636,16 @@ CVE-2008-1146,0,0,286fdbf918edc060bac5f032a402af4415b16627daa1fda584f305c051f6ae
CVE-2008-1147,0,0,f9671ec623fa58d4a68d0f6f0e048279d0aff14f3c9fc42d3a23c2d524a87745,2024-11-21T00:43:47.333000
CVE-2008-1148,0,0,a52b6f44d408606346612720e9620ce389d4cb510432e3a1d765f365f03f3fcc,2024-11-21T00:43:47.510000
CVE-2008-1149,0,0,39a23234d100a9775b1f0d658db18a277c3411654181b143777a609d89ef6960,2024-11-21T00:43:47.697000
-CVE-2008-1150,0,0,0e91ede50c7543626f0a866586d214ef2e6098a67c8a042c7ebe812f19c9afed,2024-11-21T00:43:47.867000
-CVE-2008-1151,0,0,e7d655f3a20732e33a2e3dacdbeffa1993554b4ee22eed5c01a4399ab4801167,2024-11-21T00:43:47.980000
-CVE-2008-1152,0,0,eb9c61c7376c963f5f2214e2facb01cf9f8ca80b7e82f85c4aab96611a3693bb,2024-11-21T00:43:48.110000
-CVE-2008-1153,0,0,e7e6497c377366d49e8688ebb56a354ca038ad81bc573c593d54651b6900d533,2024-11-21T00:43:48.270000
-CVE-2008-1154,0,0,72b154591573506fcf719fda9a202bfec6cbc934f297e0aa2e756bfc6438be91,2024-11-21T00:43:48.393000
-CVE-2008-1155,0,0,8e00fbd052a51dbc3faa4e5f38b1a144e8e975eac63bdb52e8de6372f58de93e,2024-11-21T00:43:48.513000
-CVE-2008-1156,0,0,d266e2f4ccc5b081c6c75964c569d0ec8268845ea1ad7e515f2e30e9a5b2293b,2024-11-21T00:43:48.640000
-CVE-2008-1157,0,0,b9de15adcca3ec3836547e7765b6bbffc3a07a45fe3ebc0034e4ee3f54c97ef9,2024-11-21T00:43:48.767000
-CVE-2008-1158,0,0,dde5246bd1c9ed88fe968aede52829f1c029c49d1e174149aa9b0866c0b1b561,2024-11-21T00:43:48.890000
-CVE-2008-1159,0,0,097f54a599d2787131c6fc2c3ba3faa6851f0f959dad8a2dae86a1f7f503f283,2024-11-21T00:43:49
+CVE-2008-1150,0,1,dcc73d00020971bb617c6ad8731fde8cdf9734cad87e772229c2099e51b593a5,2024-11-21T00:43:47.867000
+CVE-2008-1151,0,1,6d50e09bc0ca03b589865ba85f4c79bd05b81b09304bef2f9533234a6a2d052c,2024-11-21T00:43:47.980000
+CVE-2008-1152,0,1,faa928fe3d664ceb1d92252bcd933c8499296107ffcad49a0cc00fe4bcb954a1,2024-11-21T00:43:48.110000
+CVE-2008-1153,0,1,96f0916c1ad0b4fb7009f7fda05e2098d89354e33a22b0f669f8163f6b59ebca,2024-11-21T00:43:48.270000
+CVE-2008-1154,0,1,269783ff50cabb0b35ff3495605e4b615e8c2db8f34169d547db34990f153c3c,2024-11-21T00:43:48.393000
+CVE-2008-1155,0,1,ad56dcc7ac4f7c35bf8897f8b2bfd953a73243547eea737027f61d08278ef3b5,2024-11-21T00:43:48.513000
+CVE-2008-1156,0,1,2a76e41a0fc7a159f8ac1fae86e27d1eef832364070b8c6382428352e029ba5c,2024-11-21T00:43:48.640000
+CVE-2008-1157,0,1,e63fc10a469d7c45456af3cac81006474543eee2f822cc510e01b6e39a7e743e,2024-11-21T00:43:48.767000
+CVE-2008-1158,0,1,5fe835cee9271ef82f35eeee3c24f54ddfe5d001e61201af3d23ef3d08b9f197,2024-11-21T00:43:48.890000
+CVE-2008-1159,0,1,47796a32752d9dc6bfa7ba3e6a0af176bb8089ed9af850122bac14d0ac870702,2024-11-21T00:43:49
CVE-2008-1160,0,0,0484dbbf6c86727a745fc4e1e50e1cec76d39e174453e34e7a64d34bb1ab0246,2024-11-21T00:43:49.113000
CVE-2008-1161,0,0,dc5bffd13e48ddfb44f30ce70af5fef185efdc380d3a1d73834c2172b90a7c24,2024-11-21T00:43:49.270000
CVE-2008-1162,0,0,e6662d032f5a255d77cf29c93d2ea2f65dedfc0a4c1742f13d4e7edb941da6fc,2024-11-21T00:43:49.413000
@@ -31215,16 +31215,16 @@ CVE-2008-1736,0,0,77210c21015a03736c286366e63be5e76f6a70748b97a860cabe644b24c2f6
CVE-2008-1737,0,0,45a1cab638510b06c608feb955382d60f90a75d1c0c04ad6c8344f8b5956dabb,2024-11-21T00:45:12.937000
CVE-2008-1738,0,0,205f5fa1bb1c462b366eadc1451b24d41fd0e2291e6f8d4d89c0bac3c42462cf,2024-11-21T00:45:13.080000
CVE-2008-1739,0,0,18d3c1d01ef852b5ababc1a3c8ef23f2789a5eda463b8e32956a0d3178a56c79,2024-11-21T00:45:13.223000
-CVE-2008-1740,0,0,3d90cac79ac6b3962c34ef0d6c5f28ad467c536546299c41f2d5497e70b76e3f,2024-11-21T00:45:13.363000
-CVE-2008-1741,0,0,d106d4d4d30bd9f5d698c149efa2be02c07165a1ed2a0d530dd3c715acfc680a,2024-11-21T00:45:13.470000
-CVE-2008-1742,0,0,df960e0086b6cb97e2dca617240dea0da7e4eab1028923d32771ad1b9b99750e,2024-11-21T00:45:13.583000
-CVE-2008-1743,0,0,d8a9b157418e3afff158bf8af3e00f536cbb39ef77ea232d11a331c9abac946c,2024-11-21T00:45:13.697000
-CVE-2008-1744,0,0,f76a442f97ef604f09720ed5123b57bcbccef3f3b1bea697f225c689b8f2d776,2024-11-21T00:45:13.810000
-CVE-2008-1745,0,0,acbf402a16b6ef4dfc7fd0beeef2b9599c3ec0e81baa209af46ff0a8e9d18f51,2024-11-21T00:45:13.917000
-CVE-2008-1746,0,0,4dc782c8e22f64b56c95d5a33c2bd100956f077f28365df25e90ad1bcca82484,2024-11-21T00:45:14.017000
-CVE-2008-1747,0,0,63e84df30d5102d7102591fe26b450f3e000c80333591b24fc7cf8d84698b9b1,2024-11-21T00:45:14.123000
-CVE-2008-1748,0,0,cf19dd06d3f7477cd80b08e2c90ae0edac90dadadb9695301c3b6e0d60aeff12,2024-11-21T00:45:14.240000
-CVE-2008-1749,0,0,a47933540dc558409e16b2ace7313b2d8aa05d1816af12e1952841de9eb0308d,2024-11-21T00:45:14.353000
+CVE-2008-1740,0,1,216ef5d7aecc9789dbd0537ee8ae2be900286abe72945a3a147eebd6ee97e81a,2024-11-21T00:45:13.363000
+CVE-2008-1741,0,1,e2308c0efe03f668b04747190240032358b64a5b0d730096092f7fd9a67dfcb7,2024-11-21T00:45:13.470000
+CVE-2008-1742,0,1,fbca52ea954107b5587c8ef235b3ca0cbcb7977d48a0dc69fa284d1d8ce602b2,2024-11-21T00:45:13.583000
+CVE-2008-1743,0,1,9a222ee65c43f709faaf9316b2cf55d7a2b52a7ce97f5c35ea701b1aca96ea5d,2024-11-21T00:45:13.697000
+CVE-2008-1744,0,1,4993a44125732ff6c35643d7df72a1115d4d3feab5bd8a0ee6a7d61315957b56,2024-11-21T00:45:13.810000
+CVE-2008-1745,0,1,d8c44ed1298d526b9f490c602cf2d379748aaf06ec91932418cb021122655a09,2024-11-21T00:45:13.917000
+CVE-2008-1746,0,1,7b0ff13c87ff36fb663249faeb0ce0c1dbacb27045dcc06b463e1c0ad8933a3f,2024-11-21T00:45:14.017000
+CVE-2008-1747,0,1,6c942bf273a8db06b7510f7a93dfa1fe0d68e8c4458646ada5b8de75514fc1fe,2024-11-21T00:45:14.123000
+CVE-2008-1748,0,1,9c22bc7e244368ab10e9d2a731294151decfb18d60f70c5cbf48899dffdd4822,2024-11-21T00:45:14.240000
+CVE-2008-1749,0,1,184c7ee68edf97b164aa788263bea9c6dc4e68d69215429b1d4cfd8478d622ee,2024-11-21T00:45:14.353000
CVE-2008-1750,0,0,cace0477666bd0c667db0257900b6ae5722f4881d58e1393899094d9bfccf192,2024-11-21T00:45:14.467000
CVE-2008-1751,0,0,9de19e20534de4def6daa607d5321ead95f01281caa79a96b207d496e9431700,2024-11-21T00:45:14.600000
CVE-2008-1752,0,0,510adb18546224e212481f4748e38fab3124dc3fe629b3feb7a2c4e745bf0774,2024-11-21T00:45:14.737000
@@ -31525,16 +31525,16 @@ CVE-2008-2049,0,0,81c789e397faaf8831f5278e444247df6e63f20cd0f0f70b2f0716ceb5c4b5
CVE-2008-2050,0,0,b73f7d71612407f17af152e63f1155fb6ce06c122a8a323c680c525ed85e57d5,2024-11-21T00:45:58.377000
CVE-2008-2051,0,0,15ffb4c30a660449439810e709d5b697d7a11e23c913048deab9518053208876,2024-11-21T00:45:58.517000
CVE-2008-2052,0,0,e82825b1869914d8db05843a8c34797ae7e6f7fb8b8112969ef62af20a386b9f,2024-11-21T00:45:58.653000
-CVE-2008-2053,0,0,a02affe895b3fbb739e9878465ef46e9aab6035bddca2ffd0d0d227ec543a762,2024-11-21T00:45:58.787000
-CVE-2008-2054,0,0,3cbca720c44f76f663f5bbf422e4583a39235e65901490098bdfd9219950ae6e,2024-11-21T00:45:58.887000
-CVE-2008-2055,0,0,31b925004b262e95e56b4a9b0d8ada8309d85df1352cc9a96c5c83f1282cd4ef,2024-11-21T00:45:58.983000
-CVE-2008-2056,0,0,159accacf67867455f023d984903276e530b6ce5f273a8e6768625e4b2ffa041,2024-11-21T00:45:59.083000
-CVE-2008-2057,0,0,308a372d121a25557be54ef7e74e2068ec76374fdc2f2bd80317624a533e6e08,2024-11-21T00:45:59.200000
-CVE-2008-2058,0,0,d541b761e31a2767bca6fed74af3a39b9df16418f2b59313173bd88218d664df,2024-11-21T00:45:59.307000
-CVE-2008-2059,0,0,c1a03e6e7220ca0cac3a65154391c29c397554929c68912d36c0b08bdb111f62,2024-11-21T00:45:59.407000
-CVE-2008-2060,0,0,68273bbc9de31b6d6538aa6cb847b5f82f57f30840a2d42f76c1105ae39facd8,2024-11-21T00:45:59.500000
-CVE-2008-2061,0,0,dad5a0870316fa9ce02b93d25b1b70c5d76c62d4297ab1c2f91cb064f0b50b16,2024-11-21T00:45:59.600000
-CVE-2008-2062,0,0,aef30603ed891834368b6d5ebac884324c889ac81e2330fc09467cd481d77c8f,2024-11-21T00:45:59.707000
+CVE-2008-2053,0,1,154e34d7f961345b10bb92f357446401dbb35d864be60f70ca96be3d5d431a33,2024-11-21T00:45:58.787000
+CVE-2008-2054,0,1,7aba1ce8db1c5b002ec1be566c52ec985c84ba419f6f766ef38f9afb5751ceab,2024-11-21T00:45:58.887000
+CVE-2008-2055,0,1,f6c20ef7c4346b6c4e27c38fd9adb4677f60fd88685dc6417063f36e35073e20,2024-11-21T00:45:58.983000
+CVE-2008-2056,0,1,21b41dc1b74f9a919338c774c9cd4e274c9ef9236d1f78e25aeb07e6d0250f47,2024-11-21T00:45:59.083000
+CVE-2008-2057,0,1,195709b7493b58693d37bfeaca2422ffbf7c18c71d7c95dee94268c81d1a00d8,2024-11-21T00:45:59.200000
+CVE-2008-2058,0,1,c99a0a5fc10fb5d8e30aa8d4ce39ce70168d202275403e6b5778780e7c9e98ee,2024-11-21T00:45:59.307000
+CVE-2008-2059,0,1,d5f7939f44d8605aa7527f414dda7ced5b3b8bd41b02610c7aa58e62541f6811,2024-11-21T00:45:59.407000
+CVE-2008-2060,0,1,159db43685f0779e904a1697f28c86b1025b225e5fde5befd4985bdd86ea3b4d,2024-11-21T00:45:59.500000
+CVE-2008-2061,0,1,2f50d51b4b5474b140daca290045a3842ff3011d756bec809d49132fa38460c0,2024-11-21T00:45:59.600000
+CVE-2008-2062,0,1,556f71e3912fd5a5ecf7b93bf355a66feab759c780b5a64ae92a5c9a1eb18221,2024-11-21T00:45:59.707000
CVE-2008-2063,0,0,9fba17da7f787346b4629de6324c506b76aa9cc3fa75313533bf5e91ff64a474,2024-11-21T00:45:59.820000
CVE-2008-2064,0,0,b7c5347c51d3caf29b2a23026b94b2f479cf71104cac25e352eb34c2ae76c836,2024-11-21T00:45:59.950000
CVE-2008-2065,0,0,0fb8744fa536da95ed913a79adf89a362b4cc70a753e15f365269cfaddbd6340,2024-11-21T00:46:00.090000
@@ -32172,14 +32172,14 @@ CVE-2008-2726,0,0,8606d34c4fcd0bb46fcba22b127ea1549661f9f28e50adf66a270438bb970f
CVE-2008-2727,0,0,59044aecc8684926fe4bea86978313a24b833a8bf57ad57882401c3ae5d8d124,2023-11-07T02:02:17.137000
CVE-2008-2728,0,0,1ed8a1f37781348791af472cf5f9b6b72de99d92bd3bb6df0f6e8b0ad039e77c,2023-11-07T02:02:17.353000
CVE-2008-2729,0,0,9e5319d902c8cbbc1b889c635bc6ac1b8a64182cf3ca1d67f8f67f18b52da1a0,2024-11-21T00:47:34.297000
-CVE-2008-2730,0,0,670aa20ba0c071c3682b1eb550ed7bc1f1914a41fcbfb8aea6639862a3f683c4,2024-11-21T00:47:34.463000
-CVE-2008-2732,0,0,ae58fe10a1ab016b69e14582e0e72cbb3732cc918c670220a3729615c0bd0bda,2024-11-21T00:47:34.577000
-CVE-2008-2733,0,0,67b6ff8dfc688bb81b635d27644d2c2aff5943d4f800573d620cce0d1a4756ed,2024-11-21T00:47:34.687000
-CVE-2008-2734,0,0,3127610adb18f6d2608a4e5b149a460637997db430ef633ffc0ff687ed46d89e,2024-11-21T00:47:34.803000
-CVE-2008-2735,0,0,00c81b40fff45def5dc754ccce2f6616d0f311987cbdeb00ab60f7bb4d68efd5,2024-11-21T00:47:34.920000
-CVE-2008-2736,0,0,db6f89c974e4645fbffce7d844505238f7b7c136297021bc21120deac4af7e50,2024-11-21T00:47:35.037000
-CVE-2008-2737,0,0,db4cdb1124c51a3e708da908105d8d77094547beaf4200cf6f7545c4b7acffb7,2023-11-07T02:02:17.723000
-CVE-2008-2739,0,0,5f202ea482d8db148cbbd976d224fd255a6dae2360b8d7e7a1798159a3bd59b6,2024-11-21T00:47:35.177000
+CVE-2008-2730,0,1,7c55ecd9f3dad4860f89ce40d9110b5da4a5d95170818d843bed274739bce8be,2024-11-21T00:47:34.463000
+CVE-2008-2732,0,1,e660ac39c7f9d7c5ffe1b05e788d91595711183a2f9c37f9a3f3be3d2c2aeeb6,2024-11-21T00:47:34.577000
+CVE-2008-2733,0,1,57fb054d2bce166f7bb5897b59450f6277c79f4262b922069f642fb84631174d,2024-11-21T00:47:34.687000
+CVE-2008-2734,0,1,b66b2062c9496b445155bd126b566274bfb67fd456d3bdb27f3da680f8670412,2024-11-21T00:47:34.803000
+CVE-2008-2735,0,1,ad2338f0999a95dc05cfb5ab2201d79de9c44a3818833117495be389ce988cbd,2024-11-21T00:47:34.920000
+CVE-2008-2736,0,1,0399d5106059358974f7f1e78c311105df9cca5e533970ce354966546b73ad8b,2024-11-21T00:47:35.037000
+CVE-2008-2737,0,1,a06f57f872da8e0755f80e3f3d309d080fb7641fa94fcab93ea732ba97202f2f,2023-11-07T02:02:17.723000
+CVE-2008-2739,0,1,2bd9226338454957e2b74e7d9bcf62cb96a23988ccb13e1b2adcae4b15def534,2024-11-21T00:47:35.177000
CVE-2008-2742,0,0,6fdd8154992bffd1e2403d7ad4a340c31932dec42517d5d1e7a17346204908a2,2024-11-21T00:47:35.300000
CVE-2008-2743,0,0,a11f8990b4742e17e2d3091c2b4d0818fd4bad228531ad154c9f1d841e6f834d,2024-11-21T00:47:35.447000
CVE-2008-2744,0,0,4616bb9bb2101e7bc292d408233c666e46e3d044f3c4a491854574f5520ad440,2024-11-21T00:47:35.590000
@@ -33225,31 +33225,31 @@ CVE-2008-3793,0,0,5174ce8e1061bb97677c6f7a3d922ce7094370edde25ae8b2447e2980b76de
CVE-2008-3794,0,0,a16dd4d27eaab2dd0595464ae948257e26d90b0c420fa2c3c535a3ded9d1ed00,2024-11-21T00:50:08.913000
CVE-2008-3795,0,0,a0e8dcd27760e9971a67233e50b3f43b8b506ed46758aeef5a4e036c9dc8bf27,2024-11-21T00:50:09.073000
CVE-2008-3796,0,0,6ea3d3b414106eca1a556e98b27077bb28be836c643edf4e0c1a226c702005b3,2024-11-21T00:50:09.213000
-CVE-2008-3798,0,0,14c81b94799269cfacc010c957646ff32c036a8beed95cdf2b99409cdaaf7551,2024-11-21T00:50:09.360000
-CVE-2008-3799,0,0,3f1a08ea43d9eb64490c37183f5a7ba8d5696cf34e094500071514facc209c8b,2024-11-21T00:50:09.490000
-CVE-2008-3800,0,0,bbb90440cb605e4dbda2d18578fd5c4c296bae9ea30d882324463e0d9caba683,2024-11-21T00:50:09.610000
-CVE-2008-3801,0,0,88dc1eae54ec4da75d384893be9ce3b22857beac65ac0546cb9abdc7c772e23b,2024-11-21T00:50:09.747000
-CVE-2008-3802,0,0,980c550e667db9f732f78657916e66ddace3e80d4d9507cfe684f8103e5dc603,2024-11-21T00:50:09.880000
-CVE-2008-3803,0,0,9be846a29e859256153875b2a3f61df38fbef371852338540dee5f9043afbe07,2024-11-21T00:50:10.020000
-CVE-2008-3804,0,0,f35500d307bb5d70f6ae712c0957dcffa96ac8c712659715d5632f67aee72363,2024-11-21T00:50:10.150000
-CVE-2008-3805,0,0,1a8646cd32f169f4c1f23b5dd1a8f11b5dabf28b7ec156884252b9617bf52302,2024-11-21T00:50:10.280000
-CVE-2008-3806,0,0,30459d659945e33d2fb133c9d3887a30de9eaa60897917758c56c5fcd08f3652,2024-11-21T00:50:10.437000
-CVE-2008-3807,0,0,b58b8c1d6b51708e73d531951d2c5c4ca2fc8f2aecadd17b4c83160d694bcf93,2024-11-21T00:50:10.567000
-CVE-2008-3808,0,0,1ff69efa887d36024c6aa2cd0ecac866f419c06698538c8e7b5a9d8f19b98ee3,2024-11-21T00:50:10.690000
-CVE-2008-3809,0,0,94d207f6807ecd623e3aadca2958c635c4e7529367d33763a13b9acd3d23c68e,2024-11-21T00:50:10.847000
-CVE-2008-3810,0,0,a63e5dcc3fce1135fee969d10c1fe06472a4fb629e89fe1a4e1c30fe282af985,2024-11-21T00:50:11
-CVE-2008-3811,0,0,1c705a48a0696557bb05b0390ae453a16acde41a57efe77309e1798c98114528,2024-11-21T00:50:11.133000
-CVE-2008-3812,0,0,3ad7f06801543497d81818808e242f00938c5f8d5edce8befa6af62f18d127fc,2024-11-21T00:50:11.260000
-CVE-2008-3813,0,0,d74b6837aea48668d650a92785d655bfce3946ffd2a1bfb500cbadc14c8b3e9c,2024-11-21T00:50:11.380000
-CVE-2008-3814,0,0,2890af31bf96f0eb4bf34e39e11c8b8e9cb876eb632c93cdee8f8ceb52d0b0c0,2024-11-21T00:50:11.490000
-CVE-2008-3815,0,0,aa3de0464d95df3247d815878740fd0838f304e81ff52e95f5ec419e902479a6,2024-11-21T00:50:11.610000
-CVE-2008-3816,0,0,f2e70e62f91bb00dae8d6ba45ac785ebc599f41b6c32baed5a55daf22a5125e9,2024-11-21T00:50:11.737000
-CVE-2008-3817,0,0,e0e58c1d12534fbf8bccea3c6aec07beac17319c0283ee128a8ef8ce89c0647f,2024-11-21T00:50:11.853000
-CVE-2008-3818,0,0,7cf95b54f52a7cf1c60711ce36b50d005b590c3dba1da05953c71ecc6b502aff,2024-11-21T00:50:11.960000
-CVE-2008-3819,0,0,692c0aeb48b5b449d7d9b2264344893a8ee55b4a8146575ef7d0be76dbe507d9,2024-11-21T00:50:12.073000
-CVE-2008-3820,0,0,ed7a670381f1c4b704aedd675c6361eb59d5ff14c4eea424aa5b7364a1108db0,2024-11-21T00:50:12.180000
-CVE-2008-3821,0,0,cbedb244ca67a512db9a84ab89cf96320ccbe4201e99b222b37f27f321385215,2024-11-21T00:50:12.293000
-CVE-2008-3822,0,0,53e87aa5dd26941f8bb2f1e431be2a064ae42828ef0d5398a441a3fa6cec50bd,2023-11-07T02:02:35.683000
+CVE-2008-3798,0,1,afee314a19597984ab5db2eb3bf3c4aa6ca2f7b43c8d3eb74906f5a2c7b08a79,2024-11-21T00:50:09.360000
+CVE-2008-3799,0,1,2bf1ddec7ae04cc9a5223b136c9a77ebb6fc0bbee5ce64d2b7c9d3d00f82baaa,2024-11-21T00:50:09.490000
+CVE-2008-3800,0,1,47b185e6e880e7c47c04e74fac6e12dc9e711b11203fee362ae1e2fe51d7f926,2024-11-21T00:50:09.610000
+CVE-2008-3801,0,1,1b05c832f68db354e7e1d7e071f2d8fde753dca41ef728049763f4220e1d63bc,2024-11-21T00:50:09.747000
+CVE-2008-3802,0,1,f75dd8a56852c2cf8e337165d762c23e91abddd1e15854537e880c6ba0ed5bf1,2024-11-21T00:50:09.880000
+CVE-2008-3803,0,1,07449964cb8374f4c8da06f1f8b1acf2527aef6a109ec71927c5e9eb51fc0d3a,2024-11-21T00:50:10.020000
+CVE-2008-3804,0,1,4aeafe355da403116292b58d4e20df1ae7696d26f59b2929013c622326ca7b06,2024-11-21T00:50:10.150000
+CVE-2008-3805,0,1,b2ee53ac18a09a715e52f90c3507ca5d5ceef9d3286c626b39c6c6ac7d9e1ec4,2024-11-21T00:50:10.280000
+CVE-2008-3806,0,1,83c232b1b4563372b2e4470aa7380998d533879b584f4c29a3c5f06beeee91d8,2024-11-21T00:50:10.437000
+CVE-2008-3807,0,1,94a961151f3e706c98f15d37e33017e8fca5e3b5f8a468e7009b7415a8f01002,2024-11-21T00:50:10.567000
+CVE-2008-3808,0,1,2a0a641f0b43b2873f446bf08b85ac497e28965229d64695a0a91c28b74784f8,2024-11-21T00:50:10.690000
+CVE-2008-3809,0,1,51be80b17299a5114eb9ca1708cb2753eae71f6b7743c953c9264973ccf0aaf0,2024-11-21T00:50:10.847000
+CVE-2008-3810,0,1,9a682fd9b3081a6044473537f3757ada4b0c37ba878b348c835bfb3866e925f5,2024-11-21T00:50:11
+CVE-2008-3811,0,1,33f280e047a8ab3e5e79b15bc9adecd2a0ced2013cac918e201f6ac877877b54,2024-11-21T00:50:11.133000
+CVE-2008-3812,0,1,178ebc57dff6dba2a034ec88df57988c0e267887f13276739c8b76cd7add106e,2024-11-21T00:50:11.260000
+CVE-2008-3813,0,1,0c14f58aaa7297700c070f7234b9e18d06c78ecd83867ef1b8da81aca7ed630f,2024-11-21T00:50:11.380000
+CVE-2008-3814,0,1,13319ba3a9e5ed5fb7de815e578de50776ae328f42ba1696170e4b70ba5710a7,2024-11-21T00:50:11.490000
+CVE-2008-3815,0,1,cf2fca27e45bbb965f0a187f60613b9b37c6384df42f3037f50b316a4cb46e5d,2024-11-21T00:50:11.610000
+CVE-2008-3816,0,1,2281f6e09063ed43367a2f628fe919fe55ca2c3b1bfe96d5b7fe9cf5c546fa8f,2024-11-21T00:50:11.737000
+CVE-2008-3817,0,1,5e10132306f2584528d169a4461260e4eb8dc7ecd3041b5f144a65acc56b8e7c,2024-11-21T00:50:11.853000
+CVE-2008-3818,0,1,a687591b3464b798ed7535be1f47fe9d71c5890afed1ad69366f314c735e805e,2024-11-21T00:50:11.960000
+CVE-2008-3819,0,1,f608032de67dcd3aadce3020219c31d362ce25c61c38698fa76fcc6317ec9c69,2024-11-21T00:50:12.073000
+CVE-2008-3820,0,1,50226f99882e704c935395f500c0ef1ccd9bc4a6aaf03281c3944217c620c2f5,2024-11-21T00:50:12.180000
+CVE-2008-3821,0,1,3a98a2eae3fad1c0fed24fe0dcf7572e10ee2c3e6172a025fdd1d2f263051a5f,2024-11-21T00:50:12.293000
+CVE-2008-3822,0,1,eda18f4c5c36562eb0db8dad370499862d803b804a8820c0a5055e9b1cc307aa,2023-11-07T02:02:35.683000
CVE-2008-3823,0,0,fb6a6420aa5735cb1ea18ed2c586dcd2d9dcd9260966f77296c326ca23107607,2024-11-21T00:50:12.473000
CVE-2008-3824,0,0,6f43c9648fc7bac65b30d2a69367b6c9dd8a568e30ec2dd29939e7dfed0b9384,2024-11-21T00:50:12.600000
CVE-2008-3825,0,0,1f08a24f38b351b3d849ffd2ca89e730b4e3e4ce84c9803e5a3c820ea166ecc4,2024-11-21T00:50:12.713000
@@ -36744,15 +36744,15 @@ CVE-2009-0049,0,0,1c16207974b2bd64ceb4fbb86e60292ec72cb78af7db1a6ecff69de5d669e4
CVE-2009-0050,0,0,e1e8f2173d1590135922c10e4f62d4991d06198e0d46d933af9c72aea5450619,2024-11-21T00:58:57.070000
CVE-2009-0051,0,0,c43e5a58faa66b5e3c35a779bd6572ce0d6a85f5bd1b4d45a8b93b37397058ef,2024-11-21T00:58:57.210000
CVE-2009-0052,0,0,5c5524b39063bbf87f849924a7c1d322cf42c863727506d8ef1dcaeda7b4fb18,2024-11-21T00:58:57.357000
-CVE-2009-0053,0,0,088e084c2091447aa63387b1680dd8f9daf5f6de053e2c11d3ce96b731be5c9c,2024-11-21T00:58:57.513000
-CVE-2009-0054,0,0,51e6acc1d6b47f1048dba30140f132e036b121f62c5e1530f9059ace08e8b332,2024-11-21T00:58:57.623000
-CVE-2009-0055,0,0,b347d3d3dc93480432df2dd3c29726f75e8066fae5946062e208d095d69693b2,2024-11-21T00:58:57.743000
-CVE-2009-0056,0,0,eb66409e42a0af55c34603cc653f1685fd16be48c80710f611aec00b8e56e662,2024-11-21T00:58:57.867000
-CVE-2009-0057,0,0,ff33e06fdc889296c965b81535cd1518d7bd96440df7a514c7a0f1316fdb78e1,2024-11-21T00:58:57.983000
-CVE-2009-0058,0,0,2e79fcbf0314f24475d742e49d7ad76e294d5ec11954a56b34393056a8f553ed,2024-11-21T00:58:58.107000
-CVE-2009-0059,0,0,1a63d07bac64063a6dd530608d186c93f4a3e5e0d611557092091619076d3f10,2024-11-21T00:58:58.233000
-CVE-2009-0061,0,0,88224554e30695fed9adaa671d04068d12824384cf7fae0d2f0d35151349667f,2024-11-21T00:58:58.350000
-CVE-2009-0062,0,0,d02234ef2adcf6200f737064875ac8bb7ca5ef23f285006a01ec77dfdde53b78,2024-11-21T00:58:58.470000
+CVE-2009-0053,0,1,6f20bb381a7e2dc4708050a1bbff9f4570e100856bf394cdb970694597c2ded5,2024-11-21T00:58:57.513000
+CVE-2009-0054,0,1,b29dd414e7e88ec7527300b526f790561dd5d748da98a4984b6d0e00af30ce55,2024-11-21T00:58:57.623000
+CVE-2009-0055,0,1,64f5f653d7c1ca0cbb4a12f2a39e793518a87bc7519ed5a12905032e68fce08e,2024-11-21T00:58:57.743000
+CVE-2009-0056,0,1,f1b0ca3756a3b7a99672c36c7aafd1638d337d9ce5b210396f091bed59201d0e,2024-11-21T00:58:57.867000
+CVE-2009-0057,0,1,6efd9609553100468511ad65ececbb77631ff407f107d128b015140cfc296c07,2024-11-21T00:58:57.983000
+CVE-2009-0058,0,1,8c0794ce31cf6931ba42c4665fc697d6a7214e18d7db4bc40beddddd28246546,2024-11-21T00:58:58.107000
+CVE-2009-0059,0,1,7d85034014a12f600223b3cf4947ba13b50c1f1b139fa57a47592edb5ede491e,2024-11-21T00:58:58.233000
+CVE-2009-0061,0,1,ba786e753d2d596946273cd01b790e25bb1a716111b0ba8e33be40fd1015e399,2024-11-21T00:58:58.350000
+CVE-2009-0062,0,1,ad26d1996055e7a93c338152e2f1865a027bca3af484b5e7b68d3656221ef5e5,2024-11-21T00:58:58.470000
CVE-2009-0063,0,0,3561f1217a9d9ae9d2bc15b87ca06ad61028dd42b2fc5c2189c45d8cde3dd405,2024-11-21T00:58:58.577000
CVE-2009-0064,0,0,dbed16b6d38999dc11568d9371de9c25da37a13db7d9448b4ccd40478bea3217,2024-11-21T00:58:58.737000
CVE-2009-0065,0,0,36fc286769e71227d288994a0b3adb2ccb7f015257405ec9d720faf9b63f2083,2024-11-21T00:58:58.893000
@@ -37294,31 +37294,31 @@ CVE-2009-0610,0,0,0e4330a72d8f9ebbba1b30971a805a74f655cb2b97653bc699acbb7c54da19
CVE-2009-0611,0,0,dcdb162628fb28cab7dc84485822188f8132460518902312c00765ecef1c5587,2024-11-21T01:00:30.710000
CVE-2009-0612,0,0,5bf6afadb77af9d9b46cabcd77cf0ea384b1122105149ede03291cf9cf06e9ad,2024-11-21T01:00:30.920000
CVE-2009-0613,0,0,6fb760dab8c854b67cc25afc8e11c271b71a69ec8fe366bfe9dc28202eddeef5,2024-11-21T01:00:31.130000
-CVE-2009-0614,0,0,ae3a9e77dc86a0ba5deb8a922942785aefbe91e3b2646cf824075ad9586d8a62,2024-11-21T01:00:31.313000
-CVE-2009-0615,0,0,914de22db7749f707121212d750a6529ea528219adfc348e41be5cfd21d877fd,2024-11-21T01:00:31.473000
-CVE-2009-0616,0,0,a4e87e7cf6cab7db148cf556031dbbf7b5ee71682eb9c47fbe14e63327fbe63d,2024-11-21T01:00:31.633000
-CVE-2009-0617,0,0,6fcfd5599f79f8914db38f97a9909d9cd1418046842d88127272de113b67d1c7,2024-11-21T01:00:31.773000
-CVE-2009-0618,0,0,08c5d358524f3bc83fcfc058ecb34d760b8e9730973c7a686bff488564b2ac44,2024-11-21T01:00:31.927000
-CVE-2009-0619,0,0,692b01cc617df37391f310503cd513374ec19a6a0847f12cb8bb3d9d47278c22,2024-11-21T01:00:32.080000
-CVE-2009-0620,0,0,cc14c34bb2eb10cd6b0a92de439e2bcaa506120e647aefc377369ad3b375f44b,2024-11-21T01:00:32.243000
-CVE-2009-0621,0,0,516a1e3d12cb3376dd73ea28d83c707cef3cb724f0829c216294ee4650122b3b,2024-11-21T01:00:32.400000
-CVE-2009-0622,0,0,56623650f3ca213fb0bdf85617ee58f3758ecfaa9f982b6874f4290c7235e52d,2024-11-21T01:00:32.533000
-CVE-2009-0623,0,0,be84b75907894d0088234e79b7dee30ced94982a880bf6daa2048cdf7381e16e,2024-11-21T01:00:32.720000
-CVE-2009-0624,0,0,cf78250da4dc769ca1cbb85887b4d6dc8c02cfc768febbe09fead7efd5660c59,2024-11-21T01:00:32.883000
-CVE-2009-0625,0,0,34efb88feac3c1ba627e3ea599644fa93377ce7f2250ca0e6fd058bbed2be5b1,2024-11-21T01:00:33.013000
-CVE-2009-0626,0,0,2d19499e2ea4ebabb6daa292859f2a73a96611faed925945c6138422b169d4d3,2024-11-21T01:00:33.130000
-CVE-2009-0627,0,0,cc232ec60b944cc6974519ee500f96607be9c3aedb758c5a9129435be61aa878,2024-11-21T01:00:33.270000
-CVE-2009-0628,0,0,a948888398a0cb12ef0291630e31fcca6998739e12b5ddeb8908df0c914359ea,2024-11-21T01:00:33.397000
-CVE-2009-0629,0,0,fe1df6155ef8179244fc2d1a22b2f93e5c0ad0155230582f7002b4c50b7ae7c7,2024-11-21T01:00:33.537000
-CVE-2009-0630,0,0,ffc577bd8684995753e3c6e60294f2259e3465701c170fb8a87481caffefe0d0,2024-11-21T01:00:33.693000
-CVE-2009-0631,0,0,6b32f78cb8162f9c4cd94d6eb3220b1f0766af977769a9bd3e9a7d7f6deeda85,2024-11-21T01:00:33.853000
-CVE-2009-0632,0,0,bd032dec14447d3bbc16f67e29d65e3e3a726f7ab2f2222adb3b576d57124dd3,2024-11-21T01:00:34.007000
-CVE-2009-0633,0,0,179203c08cc4fd81c82e8bbdb1c9acded3d962465f70abc0161585ab958e2ef1,2024-11-21T01:00:34.133000
-CVE-2009-0634,0,0,b17bbec77b191e89f71c3f49d50d81127cd727bcdf59ab1f6099c98078b905ef,2024-11-21T01:00:34.270000
-CVE-2009-0635,0,0,c3f129d023aa182eba7255a6c12032f14da48c90cd067971f7616a4f9a900913,2024-11-21T01:00:34.410000
-CVE-2009-0636,0,0,03e8f89526b6e159971a87b6aa517977f4a6a864d6dce7848a992cb685347e3a,2024-11-21T01:00:34.533000
-CVE-2009-0637,0,0,fa40f2b5878897341838718122cdcbc7375f80e46253deafe5b6bd1ed6d3742a,2024-11-21T01:00:34.690000
-CVE-2009-0638,0,0,cda091a4827fd4389bce4afaac586562398c71ac2d4266bb76b67a1cc34e3faf,2024-11-21T01:00:34.850000
+CVE-2009-0614,0,1,538f6250ef5bd619bb748e467035170d181f303e07e9b6a1146db37c23b95acc,2024-11-21T01:00:31.313000
+CVE-2009-0615,0,1,124e3a47a44efa34c87c5bfb053d41dd89b97a9611bf6aa5febed4298c598f6c,2024-11-21T01:00:31.473000
+CVE-2009-0616,0,1,aff23935e47c4b320535b1d867bc4e264af0fc2b4cd39b14c2d05adb4bac0bc8,2024-11-21T01:00:31.633000
+CVE-2009-0617,0,1,4417977a96cc414c55fc187c5d3ec1506c5af979b40ee8ffb349f3737e9d4939,2024-11-21T01:00:31.773000
+CVE-2009-0618,0,1,2a7c6971387b7d88d35e7ddcdf88a8b4a3bd6dadfa59d000e5c703d60556464e,2024-11-21T01:00:31.927000
+CVE-2009-0619,0,1,da49cb519db1bc9e7e030d09ce4bf401237f23d0fca8a602d54d0f78cf68fc17,2024-11-21T01:00:32.080000
+CVE-2009-0620,0,1,a2920b4ddf6068edc1379c3fee119de61d8832a4f39d1e9cc6755e0a7778e798,2024-11-21T01:00:32.243000
+CVE-2009-0621,0,1,808020a63cde7161f0da7416430c7d1d349ff421ef1cad22d5fd310432284892,2024-11-21T01:00:32.400000
+CVE-2009-0622,0,1,0809531865654a93e39a184cdabf78ea4765974659f039a3a6d425060987187c,2024-11-21T01:00:32.533000
+CVE-2009-0623,0,1,7a0fd489421130e3c91bbddba7c44a44f82c315ba5115e1aebe404a8563d9f0a,2024-11-21T01:00:32.720000
+CVE-2009-0624,0,1,0c2db38ef0803cf10b6b8d920d27f0e8985e73394485c9a1fad5340afef134c6,2024-11-21T01:00:32.883000
+CVE-2009-0625,0,1,e29382481ac43528b839e744aecc7323f70e107f01c180519878c9584dbbd983,2024-11-21T01:00:33.013000
+CVE-2009-0626,0,1,b286479fb3023cf4f4fde1ec22c0c6f58bc66d281183a8ff29de9e1933ad9b31,2024-11-21T01:00:33.130000
+CVE-2009-0627,0,1,de495294510b6bb60f55c742b002b7fc5d518866bf4b207177147dac8fd1f993,2024-11-21T01:00:33.270000
+CVE-2009-0628,0,1,9d62b5e9013103ea443c925217fe80e8246b20d4069a8b7fbfd2c8aac90ffaeb,2024-11-21T01:00:33.397000
+CVE-2009-0629,0,1,78f48a55bef50a873f27c80353354a79cb6d6505586e7d8466fd247f06270d22,2024-11-21T01:00:33.537000
+CVE-2009-0630,0,1,fde0a5d153b14fdee06b871c400640f1620cf751bca75f65df345594edd46513,2024-11-21T01:00:33.693000
+CVE-2009-0631,0,1,fbd4c7cec73974a11c0406ade6fbde0bac2553630094daaeca891c29ceb49108,2024-11-21T01:00:33.853000
+CVE-2009-0632,0,1,c9709f0cafa1dc8efa72a69ea3423e8caf0b1104fd15bda200b9bc325e70a2e7,2024-11-21T01:00:34.007000
+CVE-2009-0633,0,1,79332cde7126ac2be20b4a79afd23a9ba996d72716d9f1ad7d4c7330cfc6e0b0,2024-11-21T01:00:34.133000
+CVE-2009-0634,0,1,f7cf975301ebafa8d76cd657694ddb7b3dac441f69396e96a0362296eb0a07cd,2024-11-21T01:00:34.270000
+CVE-2009-0635,0,1,c958d88f018ffae89586228c1b6c10ccea8916d29cb0299fe6a17c85cd6df544,2024-11-21T01:00:34.410000
+CVE-2009-0636,0,1,900c570379353863d5a8096eab0def61db4fb48b41b321d46ccc9a9f9f5205ad,2024-11-21T01:00:34.533000
+CVE-2009-0637,0,1,f18953b144b9db5b4a13f06fbdad9d04619a60216fb300cda7830b7d3e855558,2024-11-21T01:00:34.690000
+CVE-2009-0638,0,1,569827f40d29d5cffebda642d96062a3999f367e4516b2560288fa702f6106ac,2024-11-21T01:00:34.850000
CVE-2009-0639,0,0,2c5a203667f1dd3bc52da2766d33fca4af3464c08b01ba97483d00913ac3b640,2024-11-21T01:00:35.007000
CVE-2009-0640,0,0,e6799f2d8b5b0afd89401dbd7e3de891d767d2d5c754ab027c92be6b07c3fde3,2024-11-21T01:00:35.163000
CVE-2009-0641,0,0,14180be361dbed9db97a29ca5f60890da4a94a80ffe42e8e4720f43771f525ec,2024-11-21T01:00:35.310000
@@ -37810,21 +37810,21 @@ CVE-2009-1150,0,0,5cc349a9e3971324cb61cc0a6a51047172880f8f6b734e3a6e9a0b75bb6625
CVE-2009-1151,0,0,766b9eae5abbf9baffa9696ce75d56c0fea94d1c374e7b3bebf96d508b5fd9b5,2024-12-19T17:45:24.963000
CVE-2009-1152,0,0,358dcd6e18da03e24a75a84ae4626b5b1ad88e6ee4c0bf8b08901e7ef26713fc,2024-11-21T01:01:47.427000
CVE-2009-1153,0,0,9ee254420d37f17a680057409bf7721a86b9060ce786c56f620e61ff9fdc3de4,2023-11-07T02:03:49.947000
-CVE-2009-1154,0,0,8e6285222d5b3617dfea50193d32ccc34fed331bfacf02edfd1f34ae8f7b671a,2024-11-21T01:01:47.580000
-CVE-2009-1155,0,0,d62084653d9c0b41843c732e070ac2fd7949dfb4fec7197daecc5b092bac161e,2024-11-21T01:01:47.690000
-CVE-2009-1156,0,0,19e7651c4203ef54ff5e6b5c1af8a0eeaad9033443743d0f1e78c215cfcf27fd,2024-11-21T01:01:47.803000
-CVE-2009-1157,0,0,ad3b01d0192ded153f96ffec3d488e551a169cf5f93981816ce02611eb9d3d61,2024-11-21T01:01:47.920000
-CVE-2009-1158,0,0,fdaf34133803ca598e7889e24943daf38da69bdd8711b6afb3f4b834eeff483b,2024-11-21T01:01:48.030000
-CVE-2009-1159,0,0,7d44b0a166e8b03c1a2c83f891f65711b7d416b4639586c1d651ed00ea46c0f3,2024-11-21T01:01:48.137000
-CVE-2009-1160,0,0,ed490bcaaec8a989fe29438fca0977ac5d9ede7a66e383285bb07e413dcec280,2024-11-21T01:01:48.250000
-CVE-2009-1161,0,0,6186d0f18beea2c196bffe48b7ef9d4a9b60b7292e4fc4890576e62c33b5442d,2024-11-21T01:01:48.360000
-CVE-2009-1162,0,0,9a66ede5d90faea19eb338452339303e4aa82eed08c0cb0dd58714f547823262,2024-11-21T01:01:48.467000
-CVE-2009-1163,0,0,a121837bd8346131d43de38e09bebdaa3625a5824c85ee234993beef3303b636,2024-11-21T01:01:48.577000
-CVE-2009-1164,0,0,a0344bcbd4fc59d557d9b7235e6ed51d361e41cd7837a7d7fb937cbe074871f3,2024-11-21T01:01:48.680000
-CVE-2009-1165,0,0,0933685e42622faf92924903f25c0d753bfe70ac1d3927e70d9b94b796973db6,2024-11-21T01:01:48.787000
-CVE-2009-1166,0,0,f889af414af193e0cb73122d7e8934c7c455290252a07322cb2e770a3339da05,2024-11-21T01:01:48.900000
-CVE-2009-1167,0,0,fbcef88dbe10424f493ad90a7ef630ad2d38559654178aa1a0009057e77ff0dc,2024-11-21T01:01:49.007000
-CVE-2009-1168,0,0,f0ef41d6a70405eddd81d941085d30da19e639e5038335ad71063e0c555acf48,2024-11-21T01:01:49.120000
+CVE-2009-1154,0,1,a4b7693f504fc25d9dab22c04363b7eab12350fccfe990448171365390923095,2024-11-21T01:01:47.580000
+CVE-2009-1155,0,1,c5e7607effa0cadd45ed01eb004e16bb26dd57a0e6ef94ed826261776d57d355,2024-11-21T01:01:47.690000
+CVE-2009-1156,0,1,14cb24d40c4615dc486191eb5be59939ed5c08a9392058e1f8beef26055a890a,2024-11-21T01:01:47.803000
+CVE-2009-1157,0,1,db209e045467ade5c6692521743cf0d332d57eea18bbc0f8621d7455c55695ef,2024-11-21T01:01:47.920000
+CVE-2009-1158,0,1,cc4e89ef3ec39d519df59d0ea3e9b33b73676415d4c1aa1460c26aef9d3faded,2024-11-21T01:01:48.030000
+CVE-2009-1159,0,1,2d3fc39bc51b54eeaecefd7f2295432079cd20d25e09b3ebd8e153af950a4344,2024-11-21T01:01:48.137000
+CVE-2009-1160,0,1,d0eae8a7e3c233723bcacead69ced5aa0108eb58e4761ddd7afc520bf1e4388a,2024-11-21T01:01:48.250000
+CVE-2009-1161,0,1,d60bdd833c585d2beb206829a895766de85afbb1069a5ed93aa6178a1e1113c1,2024-11-21T01:01:48.360000
+CVE-2009-1162,0,1,5b6f2ed5fa576d5e68371e3a32c0029e7d00d5ad54d9bb41d9f029ce95bcabfe,2024-11-21T01:01:48.467000
+CVE-2009-1163,0,1,cc85c0d4354a581c3ecb5f5f3aa63b2a8c234391cdca8611ae79aadca17f8fea,2024-11-21T01:01:48.577000
+CVE-2009-1164,0,1,a738c2a445ea8781bf9d4e3f495f1e9f5a096e8b68084230180ec5e8fe424f2f,2024-11-21T01:01:48.680000
+CVE-2009-1165,0,1,60561b8b8e4d5df20868c727d5276f406b25af97a8d5dbdcd0e74f9a65851a14,2024-11-21T01:01:48.787000
+CVE-2009-1166,0,1,3d295d6117534bb2be479b837ce9888623ab79db25884a88db0b6d4299c58788,2024-11-21T01:01:48.900000
+CVE-2009-1167,0,1,d1a323d6faaa1f75b22fa3df90a283b49d73f070cdd339b4ea2f81c684795f86,2024-11-21T01:01:49.007000
+CVE-2009-1168,0,1,95b3e9125884dd9b5e8d451c0595d4d59ab2d280595106c4bc11b631f3513452,2024-11-21T01:01:49.120000
CVE-2009-1169,0,0,d2f2039eafb6d904e11ab0065ca7e1c7a7c0549c3c26c0b0cabafa2f645a35b5,2024-11-21T01:01:49.240000
CVE-2009-1170,0,0,40b5d6b30beb86cc0937ec8bae9b58509914d5d08979c32fb86cb3d163d091e4,2024-11-21T01:01:49.393000
CVE-2009-1171,0,0,185dd24299b8653adfa138f9a3aa4faff4584f753ae01f2e7a772168dc56218c,2024-11-21T01:01:49.547000
@@ -38680,18 +38680,18 @@ CVE-2009-2041,0,0,293302ebab2f950044636b0f9d63c992ff40b65acae37ddc5e5b2bdc0a4616
CVE-2009-2042,0,0,f70e577c8dad8572a759b4e54e89fb752a8558cb53ceaa26e5f4371b49b0f7cc,2024-11-21T01:03:59.720000
CVE-2009-2043,0,0,29bcd5ea89189d0be9da61f8f667bc9d62856b8c7eca6fa565537cbd6d749dec,2024-11-21T01:03:59.940000
CVE-2009-2044,0,0,36a3902269a0c10ac9130f234fd64d1806ab02f26faecc804b2c5cb6b047942e,2024-11-21T01:04:00.087000
-CVE-2009-2045,0,0,a5f69504da76ebfc0e8708e7e1283459d4e68c37859c12558f4c9b68380840f6,2024-11-21T01:04:00.223000
-CVE-2009-2046,0,0,9f6767916e0b9bb2898c08c0dbe8dca83870517dc3d4a60ab81594d085e6ffae,2024-11-21T01:04:00.327000
-CVE-2009-2047,0,0,94c53a10a21e658e89a91d4753b9d856e018abc62d45a380eaefa35739c36c99,2024-11-21T01:04:00.427000
-CVE-2009-2048,0,0,d3f5cf333109badffc77506e12f82730f5800ce44ec58504c10757a264a76e5e,2024-11-21T01:04:00.537000
-CVE-2009-2049,0,0,0b690c44a7cfd92b622dd44b802312768f18d77cd459793ffbf167749697e266,2024-11-21T01:04:00.653000
-CVE-2009-2050,0,0,fb246b859492943e57af40b30de1cb059d10a8d5c185f60c5e5fc26a0708a7f7,2024-11-21T01:04:00.760000
-CVE-2009-2051,0,0,b0d8950732ae1d0346d2c80545113d1be2c0cda3731342eacda2730d5d6dbda2,2024-11-21T01:04:00.877000
-CVE-2009-2052,0,0,3b33c50e14c4a0570574c93c653f190b05066df8d983bb2c046bb7089f05b838,2024-11-21T01:04:01.017000
-CVE-2009-2053,0,0,3fb5982f880bf5b3a5ded1ca0c12381c3369a4028d446e3644ca95c9cc8988ad,2024-11-21T01:04:01.140000
-CVE-2009-2054,0,0,0388df2edbf4d55cb7f20c7a83429c41508ab3efb76a65d168f42d757385abde,2024-11-21T01:04:01.247000
-CVE-2009-2055,0,0,a5657d44002a4b5ab15a8caa902359f2711045d86bfddce2fe62fc9b510fa81f,2025-01-06T19:08:16.263000
-CVE-2009-2056,0,0,1861f1313d56806e7549880f533d9e22196e05427b8bb2e88cbb4b24ab9022b9,2024-11-21T01:04:01.500000
+CVE-2009-2045,0,1,eaba4952a6136217d2a4187721346f208b88c0d3bd17aac9c3249afcdc9fdf86,2024-11-21T01:04:00.223000
+CVE-2009-2046,0,1,ff5cf26d67a4dadf945092320154b573fd8bf79cf48629f2b0b92e9eefc934b3,2024-11-21T01:04:00.327000
+CVE-2009-2047,0,1,dc52dea976018f6833fc5967cd3d54fcfe352538523c7cb46cdafb72e96b2ade,2024-11-21T01:04:00.427000
+CVE-2009-2048,0,1,8afc2563e565b513baca24995fbdf077a030594b28c656c86197755100fe850d,2024-11-21T01:04:00.537000
+CVE-2009-2049,0,1,80714fae801636468a02a86d346d6e098c9a58365c81b585860dda87262d013c,2024-11-21T01:04:00.653000
+CVE-2009-2050,0,1,42dfc4bc02e8fddc8717ab56b6253a843f6ddfe9a23b766bdfce496ae3d756f9,2024-11-21T01:04:00.760000
+CVE-2009-2051,0,1,2f5aab6059e66dd40e4abdb7a7cf486460773badd11b8aec1bd2f5daa7eb4e41,2024-11-21T01:04:00.877000
+CVE-2009-2052,0,1,23e4f76784744c41d4e81047f5004f07e47dcd5de7794f66e7d8301b4cc925e4,2024-11-21T01:04:01.017000
+CVE-2009-2053,0,1,29bf7c55525dff1a7360a02007d5cd5ee0448c196bacb201e93a1e2d4e0b46f5,2024-11-21T01:04:01.140000
+CVE-2009-2054,0,1,d267bd28b9ac5239f63f61e6b126d3097dbbac051856af7d487e2e066e9aa275,2024-11-21T01:04:01.247000
+CVE-2009-2055,0,1,c14af3af8d73949135fb001f53adc6b8d7b6cdd8a1573aecffaf9c4b67ac4333,2025-01-06T19:08:16.263000
+CVE-2009-2056,0,1,3dab3b8439b85fdaccd03b45f4c93e511a9e17e769ae3ed9cfe40af13c9add38,2024-11-21T01:04:01.500000
CVE-2009-2057,0,0,38d99e08de37321a8da92dc8067fbb14f953840d93c96a9e6105ac53d3d96973,2024-11-21T01:04:01.613000
CVE-2009-2058,0,0,d4dab9f0afd3098d1d8f3130e947a14eee29c39d8ca4bbd22459336fe66c5746,2024-11-21T01:04:01.777000
CVE-2009-2059,0,0,82da060513ac0c01b7d005d52eb38cb3b120f1c91e75c45e595653e01f24711e,2024-11-21T01:04:01.917000
@@ -39465,26 +39465,26 @@ CVE-2009-2857,0,0,478e4b4e46e44077feb14b65e3a40d4c54d8a5a25370a9751cef78af7c39b7
CVE-2009-2858,0,0,bfa09f73d79178a54c37579a5763c6d1e0cd7f465d430b1554ff022b1a8a75d2,2024-11-21T01:05:55.097000
CVE-2009-2859,0,0,2f952d60e97a502322526560885a334934fd7d1868f53c69eae841323b3d9334,2024-11-21T01:05:55.240000
CVE-2009-2860,0,0,494d0d6044227d11f659110a3e38875733cf99c1beb26f1faa206d6b0ec41412,2024-11-21T01:05:55.380000
-CVE-2009-2861,0,0,25d69d58a690e4e75f05a8e736f07c8d54e9c35fd625d974570ad25bd2895334,2024-11-21T01:05:55.540000
-CVE-2009-2862,0,0,ecf77354ab4e82bccab5617ed8b3f7fd39b325349884b79c0f2039aaa00a66dd,2024-11-21T01:05:55.667000
-CVE-2009-2863,0,0,57b8cd542c56e26388d81709f4af5772a8580333c3f52d2081e48d273b11205a,2024-11-21T01:05:55.833000
-CVE-2009-2864,0,0,4d441bdca3934cad5615ba2b4e2a02279d4756bd881b809963e79d5e6c361253,2024-11-21T01:05:55.973000
-CVE-2009-2865,0,0,106c652038e663b5e27c68a4565d43833327964065156c7b36d7f1fb484e82b3,2024-11-21T01:05:56.103000
-CVE-2009-2866,0,0,ada67c42c1bb61697dc7b7a85c08ebd9cb1bfc85eddbb650ee33d5dd81ad7e16,2024-11-21T01:05:56.230000
-CVE-2009-2867,0,0,f3d93a235b2256d5029470a0459a29bf63b7c8ae9a613671e64536e4a4891174,2024-11-21T01:05:56.363000
-CVE-2009-2868,0,0,dc8436e5e365354e37f144af04df689b68ed1d5168e023ac147a8f2f30cfb7de,2024-11-21T01:05:56.477000
-CVE-2009-2869,0,0,990b6879578a8e00f8c6300db87b13720d78ddc763afdc98847ec73877eee489,2024-11-21T01:05:56.607000
-CVE-2009-2870,0,0,8a4569282d85351f0f37ca3c570a735ac1f5fb9426b69164b9c349c56c4d98ea,2024-11-21T01:05:56.720000
-CVE-2009-2871,0,0,f510ea0567429f265d68fb77673e76170b8db3279d7c78fb284e0d6324defc79,2024-11-21T01:05:56.843000
-CVE-2009-2872,0,0,7429f16db10dc7fa7b56ebade50848958c0e8d5f0c5d1eb21a2840b4bd43b043,2024-11-21T01:05:56.960000
-CVE-2009-2873,0,0,9c949a772c6c38eefd9dcf805222d2331b49474afb67f14e5dc56b6458bb19d7,2024-11-21T01:05:57.103000
-CVE-2009-2874,0,0,1223d07510722d9de367de140440351380919fd29dd635e0dae9dc8548863037,2024-11-21T01:05:57.250000
-CVE-2009-2875,0,0,41f2bc7c01268c049cb65d5cbc7cb189e8391b3cab2938344186349801fb75d7,2024-11-21T01:05:57.377000
-CVE-2009-2876,0,0,7e095c66dd47df17bc447bc42c6f60a7ecdf518d4a7a4b4b5aa9beca3eb4c1a7,2024-11-21T01:05:57.530000
-CVE-2009-2877,0,0,e377cee5d95d30f79f57a177fb0f29b19a7e7bf357ea2881f4b379528f3f65d5,2024-11-21T01:05:57.657000
-CVE-2009-2878,0,0,9196dd7e1f468bbebe0e576e74d9747062d844d42a61f70880af2f4730750a84,2024-11-21T01:05:57.790000
-CVE-2009-2879,0,0,6b9bfeb60a60db0460f1564185855cb39d50659ea38bd74e3ff300cf930cd526,2024-11-21T01:05:57.933000
-CVE-2009-2880,0,0,8aef292cbd5c09d152f3fda231ff89785bdfa554acc7b1fe3b67b3baa3737e2c,2024-11-21T01:05:58.077000
+CVE-2009-2861,0,1,a32905a9514be590966d7f6c950ffe8cbe4dc4a1ad074004d90b31520ff92fac,2024-11-21T01:05:55.540000
+CVE-2009-2862,0,1,45a04fa7f9a01a3ff7b7ac3d18c7c3838864951a14f10a00d34b77d52dabb88c,2024-11-21T01:05:55.667000
+CVE-2009-2863,0,1,f6e9efa805e7eeeb636f87e91af607db11b4008ad907494f4d9e0cef09102cde,2024-11-21T01:05:55.833000
+CVE-2009-2864,0,1,75eedd47c226cfbba75e230c40b06e0b7e7e51bf5b76485bd12772cc9cfe101a,2024-11-21T01:05:55.973000
+CVE-2009-2865,0,1,33ad534913a9cccbb8dd250c1fc3fa052df751720665ad2cded3dfd7668ad96a,2024-11-21T01:05:56.103000
+CVE-2009-2866,0,1,8e6abda37793c0d638f8071c3f38edcda3d04600054da6dff7254e24164f6027,2024-11-21T01:05:56.230000
+CVE-2009-2867,0,1,8c44c3abe914fa5dd0cd935a917355a1496b22401f43938a98bf2353c85e6d50,2024-11-21T01:05:56.363000
+CVE-2009-2868,0,1,1cc6d4c596023d3a08ee86e69c074ae712c0ce42514c7cf623550ded66aa093b,2024-11-21T01:05:56.477000
+CVE-2009-2869,0,1,36a7de25f7b2c5e714b1cab05c97970117273293ea7fc08ba03d930920583dfe,2024-11-21T01:05:56.607000
+CVE-2009-2870,0,1,cb4c26c46929cc7f3b010b00f96a11242db7302357e1dd51c45a909f304b3f1f,2024-11-21T01:05:56.720000
+CVE-2009-2871,0,1,05e46688a3118660c1480720ceaed5d18718b7f1bd404a6955f7bd53feadf167,2024-11-21T01:05:56.843000
+CVE-2009-2872,0,1,a075d4c9ecdc7ccbf1dc89ea66f98866f4b9a6eba555cb75916f54d250ad047d,2024-11-21T01:05:56.960000
+CVE-2009-2873,0,1,0b0509a1cd0fe81834ec661e8104d050ce5793b16abd9058641a4fd60dcf0348,2024-11-21T01:05:57.103000
+CVE-2009-2874,0,1,9791fa3b59ae917dda26ee356b0629df80e375111b9aebdb2f570cba42fcd756,2024-11-21T01:05:57.250000
+CVE-2009-2875,0,1,e081322f3eed2043b40b0b93518f5c2be001b48dcd506f92c2cc2a5e26343fbb,2024-11-21T01:05:57.377000
+CVE-2009-2876,0,1,dc1d3b8ef6e9a53af507e533334b82b0ba2b8e07cafd5de8d16ad654d53b4ad4,2024-11-21T01:05:57.530000
+CVE-2009-2877,0,1,15464aa7e09d261e6a16ac18e693d123f67f459bbedfed4cac2f6047dbf45c8c,2024-11-21T01:05:57.657000
+CVE-2009-2878,0,1,481d1f1709c4e6709f2658061f8dd01c2aad78b02852516a1a993183b3264491,2024-11-21T01:05:57.790000
+CVE-2009-2879,0,1,d722df882faafd8cf9d11a2c971cca9ff297199feebf8cd760a6b3a525c9d803,2024-11-21T01:05:57.933000
+CVE-2009-2880,0,1,01dcc96955dc584544b59c49f4f891f8c98220a041e0ee87bb6da9cda8f70730,2024-11-21T01:05:58.077000
CVE-2009-2881,0,0,980b0a4834cccc885cfced2a014fe76d5744f1e6ad8c8b42efa9f7f0f8873229,2024-11-21T01:05:58.207000
CVE-2009-2882,0,0,88193c7636f148d101bf0f361f7e6f768e46b022ff01da2db4d47fb5b60c91ac,2024-11-21T01:05:58.353000
CVE-2009-2883,0,0,a416434ef7e245b8b5cd6c42dbeafbd96341e883e075190478d5a00be11a5c57,2024-11-21T01:05:58.500000
@@ -40550,7 +40550,7 @@ CVE-2009-3956,0,0,4ba646051bdfa34cefc657c93fafdadf0315add9f3de0cb9c160be28ac4000
CVE-2009-3957,0,0,702fc28e8c9e417e88daf4e1394bafd0864f091675a5589b374bdc8322490a65,2024-11-21T01:08:36.317000
CVE-2009-3958,0,0,709058b652a413e6fd7f513e68f60ae5c9c364eda27886095d5d83669b627350,2024-11-21T01:08:36.470000
CVE-2009-3959,0,0,1f41e5aa60350b547b3fa43259c3de8d87db6beb4cb1cabb27f05c30c628bd81,2024-11-21T01:08:36.613000
-CVE-2009-3960,0,0,bcdd13d96b1f1febfd4838c11dcf189ce96a164a6ac45618cfacb6c3fcc4dbe9,2024-12-19T18:09:00.497000
+CVE-2009-3960,0,1,38c890ddcad0f4102cc94c324fe3295e5cacf5c9ff45181f45d75474be093d6d,2024-12-19T18:09:00.497000
CVE-2009-3961,0,0,a10d1b6fedeea42c2cebe6a0d7f54b5a1aa0f61a360c3eaafab8fa3c807769a3,2024-11-21T01:08:36.877000
CVE-2009-3962,0,0,5d45ee67756faa1b6ebc9702c91e3631d10dbedee8046b1050f3573e306da029,2024-11-21T01:08:37.017000
CVE-2009-3963,0,0,3f9642ea26b7e9879f0f4bff388a45a2212dd477020c100250b258df0731b69e,2024-11-21T01:08:37.163000
@@ -41867,21 +41867,21 @@ CVE-2010-0133,0,0,b3f243ac022ae284578fbec1919f2c1f351c823d7300b08736596444ad42b5
CVE-2010-0134,0,0,9b6b6eefdb0425ff1a21714fc3e42f671db3930150dab1129563c8efbd4cefb8,2024-11-21T01:11:36.180000
CVE-2010-0135,0,0,30f6bce9ae4e40d49b3f68c1063a1153685636296bb950e56d5c5183535f1efd,2024-11-21T01:11:36.283000
CVE-2010-0136,0,0,93ef38b34034d0e99093ba1b51b0a434267ffb2572cd1367c80293a6411840b1,2024-11-21T01:11:36.397000
-CVE-2010-0137,0,0,eaef16bc992e364b7f82db6a4b24aa8ba003507823cfb66061378c401d436fde,2024-11-21T01:11:36.543000
-CVE-2010-0138,0,0,f7dbcf61bbd662050132d0bb66269538e6aa51de7a3778546f8b5c01bef175f5,2024-11-21T01:11:36.650000
-CVE-2010-0139,0,0,6b874658dc6f4a9bbd7aef7a0f81328944480e57ce5d817a5c21d052eb766f96,2024-11-21T01:11:36.760000
-CVE-2010-0140,0,0,9439c4705050096cddc3d1f7ebd5932dddca9ec31d816ba0606415ecaed0a4bb,2024-11-21T01:11:36.863000
-CVE-2010-0141,0,0,842b7dcdb21f9353d63a3858a2b7333119695faca8575f01eabd949e0c1f1a4e,2024-11-21T01:11:36.970000
-CVE-2010-0142,0,0,b4b36a31e4f12c5053642e4363f5b3c1cb5cf5c285bfd2d20704be59841eaea7,2024-11-21T01:11:37.073000
-CVE-2010-0143,0,0,12721191168a647b273ddb19e75f9c65314751b8bd859c9c56e36f12bcf3f530,2024-11-21T01:11:37.207000
-CVE-2010-0144,0,0,0c486a90de3293472212b2a50b59fc91f9135e895440537874ad0bb3a4029a96,2024-11-21T01:11:37.327000
-CVE-2010-0145,0,0,65feacc1af15c9a0501589fc2d089b45c96d0b131962d3f0209b6fa4bbb6b2eb,2024-11-21T01:11:37.450000
-CVE-2010-0146,0,0,14fa168e20c874bd6cc4704e8c3342c1ecfc25b87f45335eef6c47fc63b074c5,2024-11-21T01:11:37.563000
-CVE-2010-0147,0,0,6a9a0d7e554de98789d1fa6b469cd02ac2d06d34b90809486e0303bab54005e5,2024-11-21T01:11:37.680000
-CVE-2010-0148,0,0,092643671bae6c16a638e51d2138d54b127eaa50cd96587eaf918d10aca84bdb,2024-11-21T01:11:37.793000
-CVE-2010-0149,0,0,25096775d2af0d352bd0470b252f3cde88f06bfb7ae57d522e1e5d56ce1f68f7,2024-11-21T01:11:37.910000
-CVE-2010-0150,0,0,32985d758f3f4e74aa8bca1bfbe7796f994e934b6a57987badc82ccc92843ee5,2024-11-21T01:11:38.023000
-CVE-2010-0151,0,0,b98d662c67410e6ed6c5fc6886bc2912d18dec9c87be71b7bed613fc267298bd,2024-11-21T01:11:38.140000
+CVE-2010-0137,0,1,480aa462398a1cf44bfaead456021899c7710f2116159a41ea16149bccce25cb,2024-11-21T01:11:36.543000
+CVE-2010-0138,0,1,0ecdaf9ca8ba176781787884bc42c67df2ed67bdf66c2cd88a550f2a20b6d137,2024-11-21T01:11:36.650000
+CVE-2010-0139,0,1,58e01e181956195dc345e17e3f566fdecdbca0d6cbf841326f11c891b77aa32d,2024-11-21T01:11:36.760000
+CVE-2010-0140,0,1,1a260ed9a83e2edd235c2d1acc779b354fb633d8c6381c2a9d60cb40eb3ae578,2024-11-21T01:11:36.863000
+CVE-2010-0141,0,1,ec84cb0026381bcedec94f49be175b3d061d2ab540f6d7d050e972c852cfc088,2024-11-21T01:11:36.970000
+CVE-2010-0142,0,1,1a69b1a2c08e8b0353e78f809840dc948bcc14cc5f48d4679b66115f4068e449,2024-11-21T01:11:37.073000
+CVE-2010-0143,0,1,77d4bf440ce44103bb2ec167813a23e7738e9d0eb9551b3b87e4e560bed70939,2024-11-21T01:11:37.207000
+CVE-2010-0144,0,1,747b4a041c8917d71608400156f96a589fbe7bd5b461948c9ee5b8fc7069d66a,2024-11-21T01:11:37.327000
+CVE-2010-0145,0,1,8dd30c8c7ecb6583bd4f0480e97fd88e24f29a7b02668d4c2170a8ca45fbae72,2024-11-21T01:11:37.450000
+CVE-2010-0146,0,1,d87fe059c51907761341be623d0063e69652ec12224ef59c59a303c76b39b499,2024-11-21T01:11:37.563000
+CVE-2010-0147,0,1,1a1e438be0c9e0a297d10bba61aa45cb5a3d1958043a31b9280c49a31e5ed01f,2024-11-21T01:11:37.680000
+CVE-2010-0148,0,1,a12a05ff4dea60279fc5e3c94fc88a4853004898d2ab116f47a525c58947c456,2024-11-21T01:11:37.793000
+CVE-2010-0149,0,1,26d26dee0a59e6eea31c526e6e5646a480c176e296bf7a8d66ac5db940ef8ee6,2024-11-21T01:11:37.910000
+CVE-2010-0150,0,1,99c39cf13152f37e6358d57aa687ad07f59cd5e5a78028007fab5fcc3938a765,2024-11-21T01:11:38.023000
+CVE-2010-0151,0,1,4f651ba9dc44ef3cb6467ddf18d471b6603e84239c059f423b8e4f37b9b69fe6,2024-11-21T01:11:38.140000
CVE-2010-0152,0,0,4d24aea4f099fb99122eec0a8fc1d4c62c5c4e21189ab6bedfcd24b5babb7e59,2024-11-21T01:11:38.257000
CVE-2010-0153,0,0,94b3f876dc80fde071728e5bd9edeaf1e83fea50312e2c480cb0e46cec6db218,2024-11-21T01:11:38.397000
CVE-2010-0154,0,0,4d1045514b566db04c9b1014e7fd94b6f6440751881908ade9445a62129e7318,2024-11-21T01:11:38.530000
@@ -42280,46 +42280,46 @@ CVE-2010-0561,0,0,6edd996f7e9249738c89ee5b004ed74e050817e9d14de7ce8718f0360dbffb
CVE-2010-0562,0,0,08243fca7d02e7f2c407157509e64d44dd68bc32b009084fd72e9ecbfb47d8ac,2024-11-21T01:12:27.440000
CVE-2010-0563,0,0,81d3798be3d877b4c4ef9fcaaa78cdea947238a547c82740b85ecd8d8b47a9f2,2024-11-21T01:12:27.580000
CVE-2010-0564,0,0,c8e0311666f4a13f8df765fadd594950e068d255db0012c0aa743a0b7f8906c7,2024-11-21T01:12:27.713000
-CVE-2010-0565,0,0,6ca9a4c6eeeaf477e0ceddd132ee80fc15f75f4d78ea7c3e3a6f6bb8bed29064,2024-11-21T01:12:27.853000
-CVE-2010-0566,0,0,a43d5b6336b6149eef45c4c469dee1a5464877aa0c2c481a734b458c2126107f,2024-11-21T01:12:27.963000
-CVE-2010-0567,0,0,5519996389dbd79f07438733d2beed40e15588059b4f9d66a2bb909737f0a168,2024-11-21T01:12:28.073000
-CVE-2010-0568,0,0,c88d6dd61ae96a4de52acfb01b96d8e838a5f6bd7fb1ca2b1856f18a0bdb5c51,2024-11-21T01:12:28.190000
-CVE-2010-0569,0,0,8e1dce640abdb837527a7bd095a4b7cd8dd31259a1d456913617a4709d39c232,2024-11-21T01:12:28.303000
-CVE-2010-0570,0,0,588ac981f12231bd2d8c788026569a0be433c22e3ca32510f3b19451970b437b,2024-11-21T01:12:28.430000
-CVE-2010-0571,0,0,80b3c35a7e01f1f6fd919fbbd8b210431e8ecd4b2a43f7a3e2225218d04a4875,2024-11-21T01:12:28.540000
-CVE-2010-0572,0,0,bbbf5e23c245c252e71d9f9f8d66536f1dc07468d9c0a2e0dce48e5fd910789d,2024-11-21T01:12:28.647000
-CVE-2010-0573,0,0,3093b8c178175ac13a12943593c33c556033051839c12f395f79bc0d98337ec3,2024-11-21T01:12:28.753000
-CVE-2010-0574,0,0,4cf4d8c7aa9d5b4a0460410c6405b566b414bc2be82ef67b968bc554669abc56,2024-11-21T01:12:28.863000
-CVE-2010-0575,0,0,1331dc4b867a64410c337f1c569858b23f0887d64e17957a642a6b9ca37595e2,2024-11-21T01:12:28.970000
-CVE-2010-0576,0,0,d0ae44167c66973e26b6d3301522bf42a4dd6b5bea773b377b136a82ea8870a5,2024-11-21T01:12:29.120000
-CVE-2010-0577,0,0,62fcedd4f2ec7fd7827b45dfea42c973f5386f7f77568914ba24ec8255e59d5d,2024-11-21T01:12:29.243000
-CVE-2010-0578,0,0,7a89a98a124ce25d1e9126ba91c756a411954e0889963cf5b7af25d9382d6646,2024-11-21T01:12:29.387000
-CVE-2010-0579,0,0,d0d03fb76a91bd1d7519eda2d46e98530ba413590f60148b872fbb3a234dad5b,2024-11-21T01:12:29.513000
-CVE-2010-0580,0,0,bf40f3fcc74512bcd261c5fc7b9b2d3a5f003a98bc7192f60be44db0ecea002b,2024-11-21T01:12:29.627000
-CVE-2010-0581,0,0,7bc4037e576a9aab73b798057ec9fa0e3fc9336707b53c56fb5130f619ac2d2e,2024-11-21T01:12:29.737000
-CVE-2010-0582,0,0,084c0aeb304d7ef58df5b961fb583c76b3893267ca4002d10b561259778fca58,2024-11-21T01:12:29.853000
-CVE-2010-0583,0,0,180956a77927904a453919561dfd6a01df581484db9296807f9389d8eefa01ac,2024-11-21T01:12:29.970000
-CVE-2010-0584,0,0,3789bc423f88fba7ad65367e7c0790812dc662427d0033f27152d2c0ee3c5507,2024-11-21T01:12:30.083000
-CVE-2010-0585,0,0,d2c80217dee94cb3bc65d017c34582a16d7bb1217a9a2a7cd884781de8f892e8,2024-11-21T01:12:30.193000
-CVE-2010-0586,0,0,8090db9db535af349d56a261afa31f40d5d285736cd75ce1a9f49c391a330a5f,2024-11-21T01:12:30.303000
-CVE-2010-0587,0,0,88b49db45b085c1e3b90e3714dbc74e9e6ff237b536260bcf6ceb2f641dff736,2024-11-21T01:12:30.430000
-CVE-2010-0588,0,0,6fb693b9109c59eecbeb7b13dcb1f96f6da7c8393bbbe46f404f150a8dc7da88,2024-11-21T01:12:30.550000
-CVE-2010-0589,0,0,c591cf55c5fba483e4f397d0502abad5c33ded4d8399d7a3b14fc103e21279be,2024-11-21T01:12:30.760000
-CVE-2010-0590,0,0,b72b865a229f3979233dae7a1967e56878a4529c00639d4c997b2f0877976837,2024-11-21T01:12:31.413000
-CVE-2010-0591,0,0,902364f4dafe4aa9d8e706f4541a22f677f98d8498a7362a946e194b1ac1703d,2024-11-21T01:12:31.940000
-CVE-2010-0592,0,0,f55eda4d8d656f81289a7a94c91b15241918374b30f2a15f5dc53fe8a537591e,2024-11-21T01:12:32.130000
-CVE-2010-0593,0,0,4fdd4f6a9f8db470cd315efd6f184e67b21511da3e202693ffbef76e40914396,2024-11-21T01:12:32.250000
-CVE-2010-0594,0,0,f174a5b95debaf31d1b0441ac89ff29b7ace897f6a2b3c47d44f3c50783bf6a0,2024-11-21T01:12:32.370000
-CVE-2010-0595,0,0,0acf82fc2486de65fc4c5fcd9f0d153f84b76b50ab193904a115344e7566ca56,2024-11-21T01:12:32.480000
-CVE-2010-0596,0,0,6f5282fd0cd6f74cb2fc44a2c8bf9635549dd362f459ba1b6faf234cbef7f2c2,2024-11-21T01:12:32.600000
-CVE-2010-0597,0,0,4367d12e5451c6715dbefeacdd9621962cd1bdee76b303accc0d61b244808f11,2024-11-21T01:12:32.717000
-CVE-2010-0598,0,0,ba6ce5a14cf0f7d44110b262992da28b5182ca66c933658b48bfb06255f7fa9a,2024-11-21T01:12:32.830000
-CVE-2010-0599,0,0,ce47eddac9360c11be5470250dfeb2a6f8707b02e370f1a6fd954c64d10f0061,2024-11-21T01:12:32.943000
-CVE-2010-0600,0,0,de8c5a4ee6b11baeb8b823a65cfcc75fc9e6e3edb7c7f9af798cebc75a0833d0,2024-11-21T01:12:33.067000
-CVE-2010-0601,0,0,66b88ae07231f00f240446c9c19934641ca1f4a1e4435a7f3b93c700112023cc,2024-11-21T01:12:33.183000
-CVE-2010-0602,0,0,16069a4cd75d25abac403c8299662ccb0627b20d337fe7e403f53942de880b51,2024-11-21T01:12:33.293000
-CVE-2010-0603,0,0,c8d5c17a08a6a926394cc3484a64600fcfa80e6196df09343ccb3acd217c9765,2024-11-21T01:12:33.397000
-CVE-2010-0604,0,0,17a1424e512edd3403401f803da44f0f3e0e19461677919087f24c9143974290,2024-11-21T01:12:33.507000
+CVE-2010-0565,0,1,d8dc8331c4eb6a9624d899c5bf8a9c7a5d22fdaa85b52a81e2ce66249f20b3d6,2024-11-21T01:12:27.853000
+CVE-2010-0566,0,1,be10c2834e1ae58b36740716397c6a93ccd175ed68a5c07e08a472175c57e922,2024-11-21T01:12:27.963000
+CVE-2010-0567,0,1,3722af71316566dc31ae7c2362a025c1848da84aced64cad0fa9f66f72aa5ec6,2024-11-21T01:12:28.073000
+CVE-2010-0568,0,1,067fda662540665b333586b8e063d27c0f4e39916b098a1046102c5d76fab97a,2024-11-21T01:12:28.190000
+CVE-2010-0569,0,1,fabb313c90c86fdee204abe8af4e4b65bc94115c62e47cf03330c10a57b56e59,2024-11-21T01:12:28.303000
+CVE-2010-0570,0,1,a138f2bdf8d3e29893b2bbe88e96e6348df304545c5953b12b0d7541bcf59535,2024-11-21T01:12:28.430000
+CVE-2010-0571,0,1,a5a7d2a6f323fd64713df624cbc0a69e9c6f90d4d389afc662c6c4fe55d49190,2024-11-21T01:12:28.540000
+CVE-2010-0572,0,1,857be9dad38ecaa6e358d54659cddf577bf98364ddb9fba7c87bea66287ed510,2024-11-21T01:12:28.647000
+CVE-2010-0573,0,1,17270fa5e7a2544cff07a693a75712ed142bb4ae5ba280bdfd32109b11867a1c,2024-11-21T01:12:28.753000
+CVE-2010-0574,0,1,fab6fe3975829923271511bd01dc336ba5ead0d03f008dfe70526bdaaa5f008a,2024-11-21T01:12:28.863000
+CVE-2010-0575,0,1,02aa5e9c38744c29eea89a7826a61f708fe1e6bda5cc2b242a591acb784d43fa,2024-11-21T01:12:28.970000
+CVE-2010-0576,0,1,eac3ce31db2b2b271def1e51dbf1b33c3063908c9ce4124192300074e52d1127,2024-11-21T01:12:29.120000
+CVE-2010-0577,0,1,98c00dd9cec1130876b4bffa833226a9281248553449c58ffe0987b8d19b3f22,2024-11-21T01:12:29.243000
+CVE-2010-0578,0,1,a6f3ba28972d9cba49c4a20167a1d31983bc875051dc9a02d8e5022757e734de,2024-11-21T01:12:29.387000
+CVE-2010-0579,0,1,a59781e39ff152d5c0c4eee3f3c7880e083ea3482682be7e687cf0ae6322986b,2024-11-21T01:12:29.513000
+CVE-2010-0580,0,1,fffee4ea30f00407597dbf2a22f93cea0c16c405fdfa70074547c339863fdb85,2024-11-21T01:12:29.627000
+CVE-2010-0581,0,1,c8f2bb5becae6c64b909bcb89da66ad23564fb16fabab4076276ff5448da0867,2024-11-21T01:12:29.737000
+CVE-2010-0582,0,1,0f5364264623d1ad8bf7088b7e108288c65689cc7e076b2c2b6bba574f3ad9e7,2024-11-21T01:12:29.853000
+CVE-2010-0583,0,1,4eb1ad1d2bfa4850746782c11c034a9142d42b6492326d60a7bd1af8bce3d596,2024-11-21T01:12:29.970000
+CVE-2010-0584,0,1,5381136b0f674da98ae061daa75604cd129ce93425f47f3ce7b248c7bc774ab4,2024-11-21T01:12:30.083000
+CVE-2010-0585,0,1,7483ceaa8998e7aacb548eca95aa527b48573eaba2c3fde1e89eb0f5178027c0,2024-11-21T01:12:30.193000
+CVE-2010-0586,0,1,73010ede2b5c580eebc4c129bb3ace430649d3713410126ecae7c2e1ee406932,2024-11-21T01:12:30.303000
+CVE-2010-0587,0,1,1836cde24568e205bcad39132a0b1207d128676c5433393a72a9f8edf7929218,2024-11-21T01:12:30.430000
+CVE-2010-0588,0,1,11e95a460e049b84f5d30b68038ff11de800758aaac630cb58a622f15bdde393,2024-11-21T01:12:30.550000
+CVE-2010-0589,0,1,9428e37e3ce56e12ee706956ba6d8b9ffac2b838d608a7c4f01eabac4149e2d3,2024-11-21T01:12:30.760000
+CVE-2010-0590,0,1,6737e87199d70e7e45525c0c4f688ecf1e9a796018325b638ea7f307fe9b0cbf,2024-11-21T01:12:31.413000
+CVE-2010-0591,0,1,62d66a5a60d99d0da136c7f66dc3b42d175113ea412ba40a20e2cc55c5a394a2,2024-11-21T01:12:31.940000
+CVE-2010-0592,0,1,5939efe38c4ba926f6efc93425dcb716e0a03af7c4017baac52b2d9288bfea2f,2024-11-21T01:12:32.130000
+CVE-2010-0593,0,1,604f01fe0de85e452638133f0d425576d35b910ed845339122d0250fd2353520,2024-11-21T01:12:32.250000
+CVE-2010-0594,0,1,8c92c4ccf6b54b49a90805465ec85acfc92e8d4df325044666c831ea886b096d,2024-11-21T01:12:32.370000
+CVE-2010-0595,0,1,dc50e3d5048ff73bdc413d9f80fc91b7ea0e30b91d31ad025691ed2949eeaa91,2024-11-21T01:12:32.480000
+CVE-2010-0596,0,1,e75a2aded2fcd6b5f4d92341b61da150e620e5731a1bf5306249e1a0316a2567,2024-11-21T01:12:32.600000
+CVE-2010-0597,0,1,44eab8395d3ee33f5430ef6d3cf1aacc1d5d32e11468eaef6e79f3cb02cbafe1,2024-11-21T01:12:32.717000
+CVE-2010-0598,0,1,57c9327e8d92d2ddd65020963c20fa109d7b36cf816ceb436018e265805f33a5,2024-11-21T01:12:32.830000
+CVE-2010-0599,0,1,2de6ee69a97f9af0a8731c5b87bba0d8fca113000b6b70e5ca1a1046a91c4d92,2024-11-21T01:12:32.943000
+CVE-2010-0600,0,1,2472614571f203de1bc14c0758014365702b2358f585542fa504551144cee83e,2024-11-21T01:12:33.067000
+CVE-2010-0601,0,1,7acbd512f45a5a0a2623407e6b8e5d48fccbd5badab08240f2ff1822fba70422,2024-11-21T01:12:33.183000
+CVE-2010-0602,0,1,23a16bb6622f9525e4affbf6450290ca080f193c803d49294449771192029ba0,2024-11-21T01:12:33.293000
+CVE-2010-0603,0,1,dddd3a577acfaf7bd7d73a7bcb15c1bfe82853b16519af09171b05a0abb1d1ca,2024-11-21T01:12:33.397000
+CVE-2010-0604,0,1,4f871b8695c8fa10191999f817c89eeea33ad41f6986d7b849659781b93d2ecf,2024-11-21T01:12:33.507000
CVE-2010-0605,0,0,f65a675df01b4bdd58a12fc6b0966861578b20e75c812470d9cea02ca9166c59,2024-11-21T01:12:33.617000
CVE-2010-0606,0,0,d860036fd2ad57bb20d322d884295fcb22f5aa2dd579924a496e347a6ce82ed8,2024-11-21T01:12:33.757000
CVE-2010-0607,0,0,ee99b6e031dbe8d03dd1f414645fe55e5f042aeb9dd6c29edc054121bc9e51fe,2024-11-21T01:12:33.897000
@@ -43273,25 +43273,25 @@ CVE-2010-1557,0,0,045387badc99d37c7e3de89053bb6ca5df5577101cd299927d4d648c8d280b
CVE-2010-1558,0,0,7077c684d250028d6acd0bd0195607d82b2eeee467fed707db8a7174995fe519,2024-11-21T01:14:41.657000
CVE-2010-1559,0,0,e5cf63c787a91714de6bd73cc1a76991318974ef860af67c7d9c9aa5d5a82b94,2024-11-21T01:14:41.767000
CVE-2010-1560,0,0,54d9d395f6fab0876a783cd37d05f0a5a3458c6e91eacb2e86d59c5ed739ba15,2024-11-21T01:14:41.897000
-CVE-2010-1561,0,0,d1e3e2161f480c0c697989c89396004e4edb27b04ed1404a49d47feae81894b0,2024-11-21T01:14:42.040000
-CVE-2010-1562,0,0,8915c60ae0d83a1e9dd3153198749f71ae393d9ec7de9b043a9372ccfc7e47c4,2024-11-21T01:14:42.143000
-CVE-2010-1563,0,0,1a4e6f4afc2f2b443084596832fde270831563029c8762483c6a256b5892b2cd,2024-11-21T01:14:42.253000
+CVE-2010-1561,0,1,1b869e38d46645b5eec19ee902ef94e1d9e9dc8ed4f9ff5c299ad7a44467e32c,2024-11-21T01:14:42.040000
+CVE-2010-1562,0,1,f91ea45e8606dff32aed3636e094f98d5e0da5bb428efc82118692cc89a30133,2024-11-21T01:14:42.143000
+CVE-2010-1563,0,1,226caffe6202a871f5f341afd0e9c5072aaf4a7d3aec73abb854fdc3663ac971,2024-11-21T01:14:42.253000
CVE-2010-1564,0,0,7b1eb3144a1567b6931325112406d3a51ce3f71b051aeffed8314899a75c132c,2023-11-07T02:05:21.707000
-CVE-2010-1565,0,0,7665a3e6a7069c01b95f3f3b4455907220b7e90337d46c9db328b0e13603d7ef,2024-11-21T01:14:42.373000
-CVE-2010-1567,0,0,0c12c8d2b9fb8e032b5156f89ca4c663fc22d8b3072ed036b7a3ccb16afdcaf5,2024-11-21T01:14:42.480000
-CVE-2010-1568,0,0,29499cec1c0a2dd03023b5e53c624243194106960dfda373830a016de50dff69,2024-11-21T01:14:42.583000
-CVE-2010-1570,0,0,d2f02c003fb95bcaf3da85f7f8f5e8041bd94f4828fb4c9afe29bea0c2d1c326,2024-11-21T01:14:42.680000
-CVE-2010-1571,0,0,3cc6d112b6dd6a5796cceacc609a05c4e991a0c736462c910992779f57f2fd13,2024-11-21T01:14:42.797000
-CVE-2010-1572,0,0,000532522d8f060fb8a0b9345666b52553d31b97ecabbb9a79a013c5e21012ec,2024-11-21T01:14:42.910000
-CVE-2010-1573,0,0,3e65b1c7954f4a1d77326a76ebcfd7eede451296f11410b6dae74241ab30ad3a,2024-11-21T01:14:43.017000
-CVE-2010-1574,0,0,58230847e01dca302c06f99a44b8efe79c32b208b562dc0f29e070bb6094baca,2024-11-21T01:14:43.150000
-CVE-2010-1575,0,0,0d783c5d3c263eb2f6d302c250b2e471db7650cd4381c65c9901a4c21a11f264,2024-11-21T01:14:43.277000
-CVE-2010-1576,0,0,3bace8b2804498dc5b76093ad3f08d374bbeef6d1fc377bb84af54c971edab72,2024-11-21T01:14:43.387000
-CVE-2010-1577,0,0,7c8478eab4a163558afcb1430b338d332bba8baf60c59524c12dd3ff8354472e,2024-11-21T01:14:43.497000
-CVE-2010-1578,0,0,db1e324e737d4fc90ea0080ae23b777a05f7873717cbcae42e84c920711834ef,2024-11-21T01:14:43.610000
-CVE-2010-1579,0,0,3bf2ba3663f15bc97bc6ac624c67989fe5b1beaba369cf410730eebc6296c4cd,2024-11-21T01:14:43.720000
-CVE-2010-1580,0,0,79d7f8910c2fa6daa251c1787a47aef00051c4ce148d7e7de864b1606b8dd5b8,2024-11-21T01:14:43.837000
-CVE-2010-1581,0,0,07014ae8da585e219ff656efb38450fb75384ef3867972d82d99a9f247e16cfd,2024-11-21T01:14:43.947000
+CVE-2010-1565,0,1,c151bfdc9955ba9539436ab533030255dc3ccb8b08bd49569fdd1acfefe73576,2024-11-21T01:14:42.373000
+CVE-2010-1567,0,1,cf34a4d7e7fd277b7dcc908f1956e91810957171c42b42f94fc1d6984ac1e5f7,2024-11-21T01:14:42.480000
+CVE-2010-1568,0,1,2a6f5523378c3789147d3a469136ff4b71ebe9dde3d1c1a19ac9ff4a817dab1a,2024-11-21T01:14:42.583000
+CVE-2010-1570,0,1,def58d5a41c5d44da3ecef0b3fab0aef59330c1b72df2c3c5f4180dc250fe5f3,2024-11-21T01:14:42.680000
+CVE-2010-1571,0,1,dda08bbdb59cf045daf15b6f1197a5784dcbabf5066b34812da83b015b9ef173,2024-11-21T01:14:42.797000
+CVE-2010-1572,0,1,b2da1dcdadb1ef530b8903c9f5a671ad817fd7044cbed45c3ad197669ecccc14,2024-11-21T01:14:42.910000
+CVE-2010-1573,0,1,4c9d4c2274250dbc429fd04f95ac4291a1870060ce05c01d84545de05723541f,2024-11-21T01:14:43.017000
+CVE-2010-1574,0,1,e85d10548a0d8a17a9b59c8d6c43863b0cc7b4ee7851a3728521003ffc39f063,2024-11-21T01:14:43.150000
+CVE-2010-1575,0,1,8e9926e6b21ff60e73e83f2d1f8575b92ffe29c779fb152d2ebac209ed09dd65,2024-11-21T01:14:43.277000
+CVE-2010-1576,0,1,b8ae993643802b6a1c3d377aebe7cce16d459ed9e57318c1ecf01575670592e9,2024-11-21T01:14:43.387000
+CVE-2010-1577,0,1,fcb642f2921bf0cfd09e601a92e5ec7011496bb83b1f88d61ce59f4189891484,2024-11-21T01:14:43.497000
+CVE-2010-1578,0,1,6a493b20c3927cf1da0881cd1917deca2425405855a79b83f28470498dffb94b,2024-11-21T01:14:43.610000
+CVE-2010-1579,0,1,28468839aea7a188d1b9101ff7e1a30e8cdce3ad2bd76782276568644f9a5cc9,2024-11-21T01:14:43.720000
+CVE-2010-1580,0,1,10c325c98444545927a0a1739b373a779848d835e308ce1649ee6b47cec9f3d7,2024-11-21T01:14:43.837000
+CVE-2010-1581,0,1,378c52e58c6759d00d3e457628652e37c71c1e0a91376817743658d0636d892a,2024-11-21T01:14:43.947000
CVE-2010-1583,0,0,dcbf85764e54694003f79b013f0e59d5597e895e4b074c1f912da9994871d627,2024-11-21T01:14:44.060000
CVE-2010-1584,0,0,81e3e09141fc8bf1f70371a2d9f20223976ac5e1c1b07dafb38c45d833a3fb01,2024-11-21T01:14:44.223000
CVE-2010-1585,0,0,0656af31ed1811e2a022ce4bca8b863173f7cd76867f96746dbe960ac67c7003,2024-11-21T01:14:44.383000
@@ -44494,36 +44494,36 @@ CVE-2010-2810,0,0,c7ca13b8928dd87a6142ac1c97962bc3dd17b02ea964e6d5c8683ed571b47f
CVE-2010-2811,0,0,6bc186eb17b0d69de28895f563c2e82b3507f1bde980af2b11dfe65812c26179,2024-11-21T01:17:25.340000
CVE-2010-2812,0,0,e89ad590d342ece4a38694b2ff582b874315acc5456a3a5d3e4cd16b6d8b37f1,2024-11-21T01:17:25.460000
CVE-2010-2813,0,0,7f3bb431dfe1b524a1400674e48510318cc20c77c6f6a2f647f27e0d4a61be15,2024-11-21T01:17:25.580000
-CVE-2010-2814,0,0,ce1f1127426855db2f5807e322589e279b5511574d1219dea20ece3e02cf0001,2024-11-21T01:17:25.740000
-CVE-2010-2815,0,0,995da65e54a5ce70c1e7be1a3f47952ec3dd537fe1d6be7318dc75914c496a1f,2024-11-21T01:17:25.850000
-CVE-2010-2816,0,0,a9ffffd411d9adb43122e9ca55521431f95127fc69c88a614965f6b8e80d21cf,2024-11-21T01:17:25.953000
-CVE-2010-2817,0,0,99feaf3cd331b9122d7cd28bb82b68a8119cbf4712bf659fa44f91a23ffccd84,2024-11-21T01:17:26.057000
-CVE-2010-2818,0,0,35e92299c3155cfb5935e750b148b298b885b677d02f4cb2fb9c508e47932961,2024-11-21T01:17:26.167000
-CVE-2010-2819,0,0,aa6148dc94773f4a3d57613a9081ff0a36b309241b4256f186eac33b836177b0,2024-11-21T01:17:26.270000
-CVE-2010-2820,0,0,12ebc80b9751fb1623fe61eaea3425885efddcf9e45fd2d2c1fe81470d238787,2024-11-21T01:17:26.367000
-CVE-2010-2821,0,0,87e142a7b7a7bad7c6df9325a78358b327658fabb71b05a86ffc704c1947e51d,2024-11-21T01:17:26.467000
-CVE-2010-2822,0,0,3e0aa33cb423db96128d291cc1516a3abea1426962520eb43090588571d01b6c,2024-11-21T01:17:26.563000
-CVE-2010-2823,0,0,76778fc14dcbebb04455b8b8964bd79b645062bd51107beb4c3fa2b6cd7dbb63,2024-11-21T01:17:26.657000
-CVE-2010-2824,0,0,bf40dd7490c0ab112bd6918e386c8adfa686dc5820c6c56f151cb8a5c0e33b65,2024-11-21T01:17:26.757000
-CVE-2010-2825,0,0,168351443566b19714dd6f837d1bb83da05824c48a1da38eb06a76a626694786,2024-11-21T01:17:26.860000
-CVE-2010-2826,0,0,bdea835fff77e1ad3858894f197441cb267abecafce88fd229af8d0b3b592e31,2024-11-21T01:17:26.960000
-CVE-2010-2827,0,0,d0d95ced64c4d0da07b4f2b9eb524ff28bba2fe84c25942f5e0ff336d327076f,2024-11-21T01:17:27.060000
-CVE-2010-2828,0,0,614cdb9d201d94cf6d70fa43cad82d18dd8966bf7d0c9b5d0b9031522a19b1c6,2024-11-21T01:17:27.150000
-CVE-2010-2829,0,0,1dbab5b819c25fc83349bf2d025f11631251e1fb0e6e261e9e7908c3012f17a1,2024-11-21T01:17:27.257000
-CVE-2010-2830,0,0,6b014c73707cb3c26c8007f95db01c1227a95b9d42f1cdd01031babdeb9aca41,2024-11-21T01:17:27.377000
-CVE-2010-2831,0,0,284ef2007670b154ddadefd64b78f4bee78a024623889f20eba3da239c753fe0,2024-11-21T01:17:27.483000
-CVE-2010-2832,0,0,9b1e2495bf77fabe7ac7af82e430e9185d6abcff426d15c06445b6a540e05d86,2024-11-21T01:17:27.617000
-CVE-2010-2833,0,0,79305db8e95e9500bb3a1d9c91cd7dbf44665ceb08782bbf5a4fbcd9ad6617c3,2024-11-21T01:17:27.743000
-CVE-2010-2834,0,0,c5722a247425c0c3d6dc11b144bb1a17030e5e7daf8279c1e591ffa58564a513,2024-11-21T01:17:27.867000
-CVE-2010-2835,0,0,f59f93795a6cc2442e6c6a006b161c199187c6bc87d53ee13c5768011df01360,2024-11-21T01:17:28
-CVE-2010-2836,0,0,5e36ce1091386a1db299469b21da8634d254f847c6927bfe98bdc8d40858e725,2024-11-21T01:17:28.127000
-CVE-2010-2837,0,0,b8466e1a8f453fcca4428df89981dba3a3c8836f1033aeec39b9440d9092621c,2024-11-21T01:17:28.233000
-CVE-2010-2838,0,0,c6d93d730ea153ce650f874c09ab513778fa63a301229179af8fcf1bca2c0478,2024-11-21T01:17:28.337000
-CVE-2010-2839,0,0,de0cb03078e1f593ce18a4483a5b6b8b0feca8e207ddbadf50223618b556f782,2024-11-21T01:17:28.433000
-CVE-2010-2840,0,0,7cd114a66c63d4e9fffb58e7aa61e3fbddd35db2d3150e3230c34d8f7800b881,2024-11-21T01:17:28.530000
-CVE-2010-2841,0,0,8b29ccbd7f63251c63530778440f9125e6efbf1771184625aaefca75383fe243,2024-11-21T01:17:28.627000
-CVE-2010-2842,0,0,ab5b1eb85807246e46e460084074823e6ca8c937e99a597a64559b693518dee7,2024-11-21T01:17:28.727000
-CVE-2010-2843,0,0,3c8cbd24a4c33495b3b1a1c1bb3635179cf2bec06f4bb1e7c6c2fcee722014c7,2024-11-21T01:17:28.823000
+CVE-2010-2814,0,1,162f7ab32f64e3f68903fce5393ec45c9cb0390a4d61a8e83396b10d3fddee51,2024-11-21T01:17:25.740000
+CVE-2010-2815,0,1,a49a466a580f0d165335ea580062c0e666f9ae3740717d34687610e549c15abc,2024-11-21T01:17:25.850000
+CVE-2010-2816,0,1,ac85fe2f96f8c13a34bb95c6f0bfc6944d78e3abc2af730c8acadf0d66e64d33,2024-11-21T01:17:25.953000
+CVE-2010-2817,0,1,da4b3b7d9338aad174aaaee485d30b1d2a741b4c216ac8fbf70ebc2b782e6bfb,2024-11-21T01:17:26.057000
+CVE-2010-2818,0,1,5399a73215a3f518f7e700132013bf27bc562847d4bec8175d283c39825b9376,2024-11-21T01:17:26.167000
+CVE-2010-2819,0,1,36b657908f2e4454540c9052c003097ecad4eb6937e04a22d37015bdce5c6f7b,2024-11-21T01:17:26.270000
+CVE-2010-2820,0,1,4689e5a860d9592ad7b2be23c4b663ca84bdd507228df5848e0d191321f5be4e,2024-11-21T01:17:26.367000
+CVE-2010-2821,0,1,211b47ae939dde617caf8cd8871d5da659569f7fd700b730cedfa7a4a4dd2b2b,2024-11-21T01:17:26.467000
+CVE-2010-2822,0,1,8cf86b30ce7a2c9b0450a5357109844dfbd31d9b9085a0e958c76dabe834a5bc,2024-11-21T01:17:26.563000
+CVE-2010-2823,0,1,24ba47d60017eebccc25aeaa6a7d0504a0f4e52d8c4780271fe8b861932f4ecf,2024-11-21T01:17:26.657000
+CVE-2010-2824,0,1,e153aacd0ddfe4953152faf0e79cf50d0a4cdf28dac54a27d6dbd120e26c3e81,2024-11-21T01:17:26.757000
+CVE-2010-2825,0,1,673fc8a9faae344c9eca09cbbfa030d03e0a39b15cda28e412537738c532924f,2024-11-21T01:17:26.860000
+CVE-2010-2826,0,1,4f3f0c1ef061f186d154cf91542f85103f605ac453c389be7c037f536cb00139,2024-11-21T01:17:26.960000
+CVE-2010-2827,0,1,a68efd1b174f870d3c8a35ccaf468ec1c2a88868fa5347f2880184eb4f0273c8,2024-11-21T01:17:27.060000
+CVE-2010-2828,0,1,74e92025a3eceeb3accab2f4d0a67ad4eac01d69f5221b30e838f9009d9caa27,2024-11-21T01:17:27.150000
+CVE-2010-2829,0,1,79bada67a53574f6ebed9c38d77a5d69d67c4a7db177e06bad21aa2136ecb463,2024-11-21T01:17:27.257000
+CVE-2010-2830,0,1,9675a43a4fc554e462d898a6ce316988a634dc8e3e7a7128220d83d69e85955c,2024-11-21T01:17:27.377000
+CVE-2010-2831,0,1,6c4c75b2db522ed123fbbdd54309a9fb4b502bc6f65f1c707fe7ed717b786d01,2024-11-21T01:17:27.483000
+CVE-2010-2832,0,1,fe08924037b03e1b766264fcd96bce41c490cfd7265f79819d80bc1763111481,2024-11-21T01:17:27.617000
+CVE-2010-2833,0,1,2e5bd5858e15248a72c9917b955062d3ec1abe76d91b197bb37a8606a600a9d6,2024-11-21T01:17:27.743000
+CVE-2010-2834,0,1,4490d7e995109658ec21f0062bb2d337f584f186c9fea406fdbca992627a157a,2024-11-21T01:17:27.867000
+CVE-2010-2835,0,1,b064ac2fb3008f00af66ced5a7cb000153959bb14a8fb5df7940bbd23d5fa609,2024-11-21T01:17:28
+CVE-2010-2836,0,1,d36406f7d7ead19123fbc0b5ab69d432bd10653dc94b5b1e8cf2e972dfcbdeea,2024-11-21T01:17:28.127000
+CVE-2010-2837,0,1,3726333f4f6e776d3d26980557588318cce1372e6fbf35c5bb6a63c67f721355,2024-11-21T01:17:28.233000
+CVE-2010-2838,0,1,20c0ebd79ea4f298bffa4b2ce6c353448b13caafb21497459e2232049c30de4a,2024-11-21T01:17:28.337000
+CVE-2010-2839,0,1,ee1eb814dac0a84b1a51f8db71cd2dd6f4953abbaf86ed72108414a35910f69e,2024-11-21T01:17:28.433000
+CVE-2010-2840,0,1,6122b314707f80a98e0bea999371cfa94e0b568f6370dd85e6a684e781f58d4f,2024-11-21T01:17:28.530000
+CVE-2010-2841,0,1,4729808b23dab5658fb6f4541d916e048b52c079a82997748c5758f987233827,2024-11-21T01:17:28.627000
+CVE-2010-2842,0,1,017a6a9646ce94c55b3ad16734eeaad3a7d452ac76816450b4a1c1cadebbe9b1,2024-11-21T01:17:28.727000
+CVE-2010-2843,0,1,4ddf9b6e8c13694124798314c9a5ecf3b7b8e4da9c75c1ebb231485344e1bf34,2024-11-21T01:17:28.823000
CVE-2010-2844,0,0,4fcd34888042fcf9690e208a1801f6b817ac8850f01064c7de65a49b3269271c,2024-11-21T01:17:28.920000
CVE-2010-2845,0,0,0f46b97411382d469d59051bc7abd29cfee7250d7c16e5e7d73fa73c6c6e5f8b,2024-11-21T01:17:29.053000
CVE-2010-2846,0,0,51a3c64f7aa98a68c0f686b63773e43f27bf1c09f88d2dcd664cf8910c42f06c,2024-11-21T01:17:29.187000
@@ -44709,21 +44709,21 @@ CVE-2010-3029,0,0,9a36ef0ed866e82c9344a85ce2dff77456c22ffb8d7eec9c512262b71911f3
CVE-2010-3030,0,0,f0a721949debeb5eb0128f706ba6468848c37aad9fa6108846ef9f708718571f,2024-11-21T01:17:54.487000
CVE-2010-3031,0,0,74a87860863453ae58a827504d2f04c793789d857e5dfcc664254d12c48ef4f4,2024-11-21T01:17:54.607000
CVE-2010-3032,0,0,3c9b88d3c17875fc16aaff6e801133f2548e93345a550a281447eb69e129afae,2024-11-21T01:17:54.730000
-CVE-2010-3033,0,0,fad47618f6940796624fdc8fad724b919feee3eacb032dabc80444c864c3b00d,2024-11-21T01:17:54.860000
-CVE-2010-3034,0,0,0449d02d228ef7a9ace335c79173c80b00b8b681f512246a275a4d0efb4c713a,2024-11-21T01:17:54.960000
-CVE-2010-3035,0,0,10cc14d554e5fdd61906c06fe410a44a6d24b511a472259a67e48176f35c9289,2024-12-19T20:09:31.583000
-CVE-2010-3036,0,0,b9e571dbb2f9334f9ea4736ac17d1e12e0bd4c2d6a63aba96c94ed7f6b2498ff,2024-11-21T01:17:55.163000
-CVE-2010-3037,0,0,625d3627c42952c0e2312edcd0e68d269d891e5aa541a857eaafac8d68132af1,2024-11-21T01:17:55.263000
-CVE-2010-3038,0,0,aff2cac1f88d01e9f936b4b9bc065126ddd2655ed00ddb207cd508a52568694a,2024-11-21T01:17:55.370000
-CVE-2010-3039,0,0,57e3cdbb2393e0db256a19be9088733595ba60ef132c6c32b49900099325c552,2024-11-21T01:17:55.463000
-CVE-2010-3040,0,0,b5db608662984bf284835beaf0c20aea741e5846c833e17f519709d010b061c4,2024-11-21T01:17:55.577000
-CVE-2010-3041,0,0,b214d6957681c739e5f3d5496182e3de2d22e3c60245585a1fad8cd612b811fc,2024-11-21T01:17:55.677000
-CVE-2010-3042,0,0,822d5925547fc29ebff546b3aabec2215201f5ec84a0d027ae3fe2d7dae5a56c,2024-11-21T01:17:55.773000
-CVE-2010-3043,0,0,47e7ed4c1062a8fd6d6f002d08d5d9305028e6eabac2e3163517ea6b8a1ae687,2024-11-21T01:17:55.880000
-CVE-2010-3044,0,0,c8461c64bfe6269e3d94e6a8b0650f4b609d5feed803cbf2e568e09774043574,2024-11-21T01:17:55.977000
-CVE-2010-3048,0,0,3ff94419643fb82ffe2085ca5dcc78af104e0d2af02c58abf3e8788c27bad858,2024-11-21T01:17:56.077000
-CVE-2010-3049,0,0,e76026c9941b071b6bb1851ecce8a18a4ee792bd953cd326d9381213ae0e8960,2024-11-21T01:17:56.180000
-CVE-2010-3050,0,0,17be920e7bd119efd55b993963bb00a4666fce9967fb531880c7f35f4fa7eb54,2024-11-21T01:17:56.297000
+CVE-2010-3033,0,1,b39cddef52817687c743e403a81f7aaacf1256794123286bdadf325a93e05093,2024-11-21T01:17:54.860000
+CVE-2010-3034,0,1,22675de9191b5a41a5fe80e1a354ec872eb78e82a2bfc8b061838c100b6977d8,2024-11-21T01:17:54.960000
+CVE-2010-3035,0,1,ca9ecf382d6003bb2cfa1c6e0d704e1dc00f4a5ac488ec0cbf802b956432896f,2024-12-19T20:09:31.583000
+CVE-2010-3036,0,1,543e41df53b00bc9ab244a71f94296c2c766140f9d4f2fc882c1281bd6ff031f,2024-11-21T01:17:55.163000
+CVE-2010-3037,0,1,4378011cba1bf586c530438b40bfecf69ce195425f38d581507d113bcdd2238c,2024-11-21T01:17:55.263000
+CVE-2010-3038,0,1,dfc6933b4a43c0df247184af5b09ebf59ff9109ec48804aec82a7d072c0a8d15,2024-11-21T01:17:55.370000
+CVE-2010-3039,0,1,a814e237faa7a7293ea9a0ecaab3aa665645965c30515c3ce22143dac832d584,2024-11-21T01:17:55.463000
+CVE-2010-3040,0,1,246fcb3c1800bb1f55fbf64ddeb67a7d3f3de1791532cb3931365169a43fdb82,2024-11-21T01:17:55.577000
+CVE-2010-3041,0,1,4f81fb00a69bd6f759e15f322cae6a7d3e66ad748a17ba79875b159a97b8ba69,2024-11-21T01:17:55.677000
+CVE-2010-3042,0,1,ad53fdab75c5bc4482c826028875e4d66071f76f6b38148142f83eb537482ec4,2024-11-21T01:17:55.773000
+CVE-2010-3043,0,1,fb5406ceedd58ca8819a9eae92c747148e1565510ff9243fb6a6092c0aed672b,2024-11-21T01:17:55.880000
+CVE-2010-3044,0,1,280ce732e80cb4d359d6616d34122f1e12399d453e3df67a85cf4aa3c02633e6,2024-11-21T01:17:55.977000
+CVE-2010-3048,0,1,01826760741f92bac5245481ec1fd5bb4134caa6e95cc654dbadd8ecf704b817,2024-11-21T01:17:56.077000
+CVE-2010-3049,0,1,c841cf7947752a145b7c1c01979e513e4ef44ba802f8515ae0b3f3982fd80d8f,2024-11-21T01:17:56.180000
+CVE-2010-3050,0,1,7dab707448f6a49ef9906d65dc63628246b388ae2b8bd0b2ca9b11a240c816ec,2024-11-21T01:17:56.297000
CVE-2010-3053,0,0,b3531ad47fb690808e7d4067efdb5914043d001d7681dd28180f00fbc329158a,2024-11-21T01:17:56.400000
CVE-2010-3054,0,0,97673cff052682558e1f369bc681a1187f5d3431cd1e862a111f8f4bdf04f905,2024-11-21T01:17:56.527000
CVE-2010-3055,0,0,829dab5c817cf7adb25067513fbd8927b2358aabe4103e114e54bc36cb045662,2024-11-21T01:17:56.663000
@@ -47266,38 +47266,38 @@ CVE-2011-0344,0,0,d01f8bfeb651f213cd16143b98898292af5acdd67f04ff23339f166c13d7da
CVE-2011-0345,0,0,78398b851ffa9ba66620f811797a6567a3478f01b6ce663a03cde18ad5033973,2024-11-21T01:23:46.947000
CVE-2011-0346,0,0,05dc03e50db547867c8b17a8e62b5d4b18502d72a3fbb3aa47daf38c3d04a115,2024-11-21T01:23:47.117000
CVE-2011-0347,0,0,b0944419d8f6538c1be113acc47645d22fecc21b56ff0aec1c609bf8e0e5c919,2024-11-21T01:23:47.367000
-CVE-2011-0348,0,0,7215db633196924591e802f4fcc7ee2395c53a569dd3dfd9719099cddca10ba7,2024-11-21T01:23:47.813000
-CVE-2011-0349,0,0,6ebab15156c18341bcc89dd5d30c161a7c2df8a689312e8490466ba3315e4f84,2024-11-21T01:23:48.600000
-CVE-2011-0350,0,0,d3ff5fa0f2853b89c117bd4a8239bec440ea19b619e150f65b97b31985caec4b,2024-11-21T01:23:48.730000
-CVE-2011-0352,0,0,788f7874ef496862e2866bc426ba276486492ee989f928213aa8af743091a98e,2024-11-21T01:23:48.923000
-CVE-2011-0354,0,0,8ad3bcfadc19dc4a7059758b655917d9bd1d9cd92c0dff2127a485bba8466f57,2024-11-21T01:23:49.123000
-CVE-2011-0355,0,0,a47cd89585279b7c15b0f1bff1744cffd677379636fac7a49b18a68e42c59e83,2024-11-21T01:23:49.297000
-CVE-2011-0364,0,0,dce53113f45f0c049b2264b56376d3e55e1bed27a46c82a72792208a7acc6419,2024-11-21T01:23:49.443000
-CVE-2011-0372,0,0,5dfdccd79300c4b4328a22cd52362b629eb55424dfd6728af176d99028063572,2024-11-21T01:23:49.580000
-CVE-2011-0373,0,0,514b4020b2177513b5c2789197eacf33dd7948e08a42c0059b08504826316f23,2024-11-21T01:23:49.803000
-CVE-2011-0374,0,0,fa1f028f313183f390cec7ef2ae2aa8c1103e43d81133476816a15135ef53435,2024-11-21T01:23:49.970000
-CVE-2011-0375,0,0,a2709df8e0218e90c37daa555b9a2b3147286d561099fd30d7804222863aa0b0,2024-11-21T01:23:50.127000
-CVE-2011-0376,0,0,39a660df4fd78d8cf1b43cd044382747f937bcb478c52d76e666c8378748f2a9,2024-11-21T01:23:50.300000
-CVE-2011-0377,0,0,420fd737f754e55a2af5d0e281deaf4d5d7d2926caa29383d5472daf0ff0ba65,2024-11-21T01:23:50.457000
-CVE-2011-0378,0,0,4a9d2e5d488dc370e023a9c8f490ba1ee7f34bc2fcecc65d2f9f6e46c8bf6e9f,2024-11-21T01:23:50.693000
-CVE-2011-0379,0,0,396d2f714a1e15233624921e532e9b54050ab63007d09bc2d96abbba2e69606d,2024-11-21T01:23:50.823000
-CVE-2011-0380,0,0,f674eb07d35b8a3f6b81710ad08d2cb356d41a5926695252515123f83f7e7726,2024-11-21T01:23:50.957000
-CVE-2011-0381,0,0,f81f1e2ad191786ad7c96cdacf53c61242a3a256e5734ce0e2f62ced1d3f9525,2024-11-21T01:23:51.073000
-CVE-2011-0382,0,0,c78aea237102dab3b3db76d129970694224ade08f21245a2b4d6bb99b59993b0,2024-11-21T01:23:51.180000
-CVE-2011-0383,0,0,99ef5a9e399bd7dc241143bd45c129618530f5c69b320ba1eec9855324bdd6b5,2024-11-21T01:23:51.297000
-CVE-2011-0384,0,0,c1b34e8431e929cdca3d3444a5ace5db3bdc5a1868976857a6989a4b8498e654,2024-11-21T01:23:51.413000
-CVE-2011-0385,0,0,a52f8b04e238b97a734a3c2fb10b71556c31c1ad6a4ec0508cd8c34c80e335a5,2024-11-21T01:23:51.537000
-CVE-2011-0386,0,0,8d13dbae495636f32fb2e49960cd5b8d5d572db0636f1cbad424c788e1b5fa49,2024-11-21T01:23:51.660000
-CVE-2011-0387,0,0,db833ea9c7c9ce10e7c75b3186257ec0909a21eafea24a2fd57612c99864b24b,2024-11-21T01:23:51.780000
-CVE-2011-0388,0,0,a1c6733abd743e3928df2868f22686af6fbeab761f51836ff40078c19ddf76d7,2024-11-21T01:23:51.907000
-CVE-2011-0389,0,0,1774cd4443d35e3bc5d510556c2e6ad3d0b0b79d33c2b051ebaac49827b9d76b,2024-11-21T01:23:52.033000
-CVE-2011-0390,0,0,8a34be4b3b1590c3fcc80a3036b12a3a9c7e7bd4411a23fd06bd2ff3df3568c7,2024-11-21T01:23:52.153000
-CVE-2011-0391,0,0,2eda5b369c1b3fbf48bc649224a28d2c0d95fd57b3ce9269fd051285ed020713,2024-11-21T01:23:52.280000
-CVE-2011-0392,0,0,b5b31f86154576a3c27fb9f43b2f50b11651bf5b3ee8d9765a1965d6f303e1af,2024-11-21T01:23:52.407000
-CVE-2011-0393,0,0,78f103e2d834f259721516a6f26072de4e7d77c6e65dd5229283beab1643046d,2024-11-21T01:23:52.510000
-CVE-2011-0394,0,0,5166eecbd8a88a76ee2bcdcec642f0043f214492d08f19c4d34f446009a2bb91,2024-11-21T01:23:52.650000
-CVE-2011-0395,0,0,2347299e43f1be601cb9ba91727420920416321c50e2c4b9e2fa1a6311fee77a,2024-11-21T01:23:52.790000
-CVE-2011-0396,0,0,60298b241d6cafb6eba2f35c1f06966345637574fb1a887b441d77a12b535e51,2024-11-21T01:23:52.907000
+CVE-2011-0348,0,1,da66ba17112e4b1b68f1197785773079de957fb668073c2d265c0588ec2fd803,2024-11-21T01:23:47.813000
+CVE-2011-0349,0,1,7dee2cd5f0d102bfcf8e93f28d168b32edddebf473a62fae08f44387cc3edba2,2024-11-21T01:23:48.600000
+CVE-2011-0350,0,1,7433fef6fc3410dde5543f35fa074b5a2ac995a319a4af96a00d9a5988858fbf,2024-11-21T01:23:48.730000
+CVE-2011-0352,0,1,372c6e84d6b38ad2ac866bca6071dd90d90c9ba5ce2edc234314ed62a4e7e4e6,2024-11-21T01:23:48.923000
+CVE-2011-0354,0,1,1857e21d0a461691f0dcf53b501b18afe305240d21163dc79f935c5dc948b919,2024-11-21T01:23:49.123000
+CVE-2011-0355,0,1,2ff714382d7950f30194d0cdf193323c199e7f8deca41438c9fc33906d14c922,2024-11-21T01:23:49.297000
+CVE-2011-0364,0,1,a8f7db6aa1a9cc9e46bf5d1851b790d2cd6b2040c7224bf8c3eb468fa8b9a55f,2024-11-21T01:23:49.443000
+CVE-2011-0372,0,1,36426ad2aab0cf28cf3ab5a7b3b9af115af8652ec1181e02ef77d361a9aa5578,2024-11-21T01:23:49.580000
+CVE-2011-0373,0,1,78850b7fc6e25d20be9c368c43988e000de63482ca314ba44f0a2da598614bb3,2024-11-21T01:23:49.803000
+CVE-2011-0374,0,1,78d56a710e0dc52bab4bd7544dade47ae87afcb5a467ebf4eb4ef8b1bfedc741,2024-11-21T01:23:49.970000
+CVE-2011-0375,0,1,6a29170194df016af5ac7fe8d0cda814a5ea6858b25ce066ee9fb0c29ccd6715,2024-11-21T01:23:50.127000
+CVE-2011-0376,0,1,7b9ff6e03ad5279a026e9049a277fcc7e5eaa60e7a103b108d3f14bb23d5c242,2024-11-21T01:23:50.300000
+CVE-2011-0377,0,1,ba854ad783c0bf7e76426ba03082c06ff5435205b088530f490b788f6c116ffa,2024-11-21T01:23:50.457000
+CVE-2011-0378,0,1,9b6f11282b56c6cd7b44e05f0b85e27379e318b67dc90bfb323a3d96cce58d21,2024-11-21T01:23:50.693000
+CVE-2011-0379,0,1,81d1030e806917f47df18f61e47513300661400e3cf723da3e484f18c929b15d,2024-11-21T01:23:50.823000
+CVE-2011-0380,0,1,7febd1dca2429cf7120d16cfa73510543ef5ad4daf049ab57709c5473c03f6a3,2024-11-21T01:23:50.957000
+CVE-2011-0381,0,1,0d7abe8de434605da98ff1abf4765eb93caabc4f3ef31447e35360f585171f0b,2024-11-21T01:23:51.073000
+CVE-2011-0382,0,1,79ab2f3bcd9379d56347a390f0f6d496750224e3ef0c2d9b08fe8d25da98f54c,2024-11-21T01:23:51.180000
+CVE-2011-0383,0,1,e90301483f99d5c0dd7131464a81c0cf98cdb01973833f6b353d505878dc91c9,2024-11-21T01:23:51.297000
+CVE-2011-0384,0,1,fa8dc395480b11f40a71fc50b4e64b0d5ef0658c58ede2df488567e462d8e012,2024-11-21T01:23:51.413000
+CVE-2011-0385,0,1,d199949f44c6c203b1319768f5c4b43723bad330571bcab6fde833209158fa63,2024-11-21T01:23:51.537000
+CVE-2011-0386,0,1,71c4edf151b1430dae2054f23f38a0a13d2f57777ab2512394a7448cd6ba3951,2024-11-21T01:23:51.660000
+CVE-2011-0387,0,1,06667d8bd75d96d3738053667080ce1928fb3d236bc7ffe1474bcb8cfb47de7b,2024-11-21T01:23:51.780000
+CVE-2011-0388,0,1,6b1bc6ead463a49a2498dcb2049b7f6bc924a3160697c639d70b26408646f10f,2024-11-21T01:23:51.907000
+CVE-2011-0389,0,1,82e3e5271b1fbf1fab6024c92ce06ffbbbd179d36db8abf078a2a29b059fb36f,2024-11-21T01:23:52.033000
+CVE-2011-0390,0,1,b97d08b9ebff258b79e5c3023be31cc1d132a16ace04d161ea0dfffb91451ee6,2024-11-21T01:23:52.153000
+CVE-2011-0391,0,1,076a8df091270021b9e7abc2bcbe50fee5b5804795db92840038276978527132,2024-11-21T01:23:52.280000
+CVE-2011-0392,0,1,b851b0e8c68ce237284e899debc6ec05d377a0db29eeec8a166181b8c5bbf73c,2024-11-21T01:23:52.407000
+CVE-2011-0393,0,1,7545567a81bdeec5cd0f80fe2a30a87eff172392a363be0c636c4fc7add74514,2024-11-21T01:23:52.510000
+CVE-2011-0394,0,1,962436558b8d7f3519f10de0ba11eeb0c182d542482886ced518175f4553e518,2024-11-21T01:23:52.650000
+CVE-2011-0395,0,1,ecb5e2c1d5823b8c1d3880f8fe7b64809e80b163b89e03c98eeb028647394843,2024-11-21T01:23:52.790000
+CVE-2011-0396,0,1,38ab7498ac5bf7bc328ada548104bf1ff4b316392ea621e09c9718c3c52c1c31,2024-11-21T01:23:52.907000
CVE-2011-0398,0,0,d7cda33a68333467f2b3172fa1a86ca9ef62811b338e389e54624849c44d06a4,2024-11-21T01:23:53.030000
CVE-2011-0399,0,0,b405fc66557490bfb2c8c1fbd75b6501f6e2cef5d8205bbc80f68c3293275448,2024-11-21T01:23:53.190000
CVE-2011-0400,0,0,cc441abd6bba1f10f9b077f2b5e47ac02bb5ba2cd950df87bde06189e1fd2206,2024-11-21T01:23:53.363000
@@ -47797,23 +47797,23 @@ CVE-2011-0921,0,0,13fc37df86e03ffda97be3bd40c3df778df929f145158addfb8af290ecdfa4
CVE-2011-0922,0,0,24f6e8abcd3d608274d4f96369a29fb03d9db72fb1179e5626463dfd6c0f55a3,2024-11-21T01:25:10.463000
CVE-2011-0923,0,0,41e9196bee7e7eb90081580f8c5f200427f55a847f49cfab696c8174e902ea48,2024-11-21T01:25:10.627000
CVE-2011-0924,0,0,a0b12fbb83e863dd4a51e17d7f966ab6d20b306de3660c67f5bf91d5c65caff8,2024-11-21T01:25:10.790000
-CVE-2011-0925,0,0,153f0aa2f4acc06a43ba700b1ce32f8ed94079efdd3fbe1f72c60ac16c2fac24,2024-11-21T01:25:10.940000
-CVE-2011-0926,0,0,8270433c9c01fa8497e082511fb42c63031b81658640077d35d21e651d42a122,2024-11-21T01:25:11.073000
-CVE-2011-0935,0,0,7b1afdc8fc7be3abcb0c3c7ea52e85f89b8b77d992475fde809540560e595cda,2024-11-21T01:25:11.193000
-CVE-2011-0939,0,0,d30360bce7ecbb02bca052ed9ed7998b517d9da1e39413d13c52fc15b9e6dcb4,2024-11-21T01:25:11.317000
-CVE-2011-0941,0,0,cc88d0646e108fec82995eb742141451092623e72c45e1dc0ace2ea216838215,2024-11-21T01:25:11.437000
-CVE-2011-0943,0,0,15751a9e2849f61728bc9a6c6d27ea8e1d38f387cf2ec620ede922d651422758,2024-11-21T01:25:11.570000
-CVE-2011-0944,0,0,096c7c04f7d718feeb7546cb752f2e49a48aa8f4be61179e2083c4ca834bd457,2024-11-21T01:25:11.700000
-CVE-2011-0945,0,0,4c982e118c56034999cba9999ec90e97da78ecceb4510cf1343ddf994956c86e,2024-11-21T01:25:11.833000
-CVE-2011-0946,0,0,aa331c6e69bff655481152b7944a136dfe7e6d5f3c5b9dbb87c0fa4102297ab8,2024-11-21T01:25:11.980000
-CVE-2011-0949,0,0,766792fbafe668a48a98d600ea85fbc903e757f2c786fcbe8471a26acf390c1d,2024-11-21T01:25:12.110000
-CVE-2011-0951,0,0,bbd9285139dfea7249a59581891f1bb1a1e64fad686ec04d0d6482d2d63e482e,2024-11-21T01:25:12.220000
-CVE-2011-0959,0,0,9eec7fab046603c97ec2cbad20892dcefb6ec66c2582cc5a050dbc3db7301403,2024-11-21T01:25:12.347000
-CVE-2011-0960,0,0,704f95dae4a35ee795972cc1ce7fbd9aa66d9ebff5961958368703f48cf9db52,2024-11-21T01:25:12.470000
-CVE-2011-0961,0,0,f4e08923f702945e71262cebda48f677796acd2e78bf9f76e60971503801615e,2024-11-21T01:25:12.593000
-CVE-2011-0962,0,0,30c0f0facc629601ca2231d6fa5ae587325c00e79bd3d1df710d1594459476ef,2024-11-21T01:25:12.723000
-CVE-2011-0963,0,0,5c52e0ec10648ec074112499e201ce6f61168feeeaab3fc88f0436dfd7d4b737,2024-11-21T01:25:12.847000
-CVE-2011-0966,0,0,704efa1e5f729cdd0232683deb692db2638275a6d6b0472834ece38929dadf7b,2024-11-21T01:25:12.973000
+CVE-2011-0925,0,1,b97eb9a70d5ce8d2306f5866b4a621517a59789d5cbe00ea0c90c62ee1bc2209,2024-11-21T01:25:10.940000
+CVE-2011-0926,0,1,827af3f6fd7f252bb38e7fb6fa75afa2d14c192210a5939e08b427708411120e,2024-11-21T01:25:11.073000
+CVE-2011-0935,0,1,f20dd8983a90c1113c05f86cf32227da1d362a90d69c73dc907264fcd706b3d0,2024-11-21T01:25:11.193000
+CVE-2011-0939,0,1,ca1ce58dbe0130e168a4b97b4c09490116ba05f3df3040a98262aa0e6326c5a1,2024-11-21T01:25:11.317000
+CVE-2011-0941,0,1,27a3371e78ae854c34afc4bebba3388ada1c51e481b2204adb7b318bc8e81869,2024-11-21T01:25:11.437000
+CVE-2011-0943,0,1,7b38146e8d8a7dc5427491fafd185083203e723735610a23b4258c94942b9e25,2024-11-21T01:25:11.570000
+CVE-2011-0944,0,1,c71659a8d54d0d399061872cebfa359aecacf3db7bb23db456fcbbde6b81b33f,2024-11-21T01:25:11.700000
+CVE-2011-0945,0,1,e662f68a4873ccd051b877d3e561fdb4bdccc97c111e8f2540dc8aedcbb8c175,2024-11-21T01:25:11.833000
+CVE-2011-0946,0,1,4bb1c685696b68ef919844d0d019e31ef6e665f632e1f5245511652b7c017522,2024-11-21T01:25:11.980000
+CVE-2011-0949,0,1,7dd1cbb4ea0426faadd2dd9d4f965c7456e9605bac9658aa4353067b38dec7bd,2024-11-21T01:25:12.110000
+CVE-2011-0951,0,1,989c764ca69e4c1984b35277cacb75aa0bf80cebd478a156e2b059bfb76fee7d,2024-11-21T01:25:12.220000
+CVE-2011-0959,0,1,67713b42964971907e2ac53cfeaacac020bc4375286deeadc04f2f1f86025f02,2024-11-21T01:25:12.347000
+CVE-2011-0960,0,1,3824c61f3a8180f602937222479fe5ff9a04309bbc3ea96e883cb854d2b6bac3,2024-11-21T01:25:12.470000
+CVE-2011-0961,0,1,709045d11c3f40ff4cd1832db5a7fab8340f84394a53e4433d15b435ab0828c2,2024-11-21T01:25:12.593000
+CVE-2011-0962,0,1,8fa31e3a19c52d394e5619ca34743611b369e00b2873865bc2b6ddc08ec4a430,2024-11-21T01:25:12.723000
+CVE-2011-0963,0,1,eb0b6e0f8381d51fc2e7130d50c1720380f658afd414f3696d02bc2a5cf86d3a,2024-11-21T01:25:12.847000
+CVE-2011-0966,0,1,ea495aca53516efbdc6f00c353b0e51e2e92c7cea9cd8d4d001f19a1bb606a7d,2024-11-21T01:25:12.973000
CVE-2011-0975,0,0,1cc54d5bc8c21cc7df19989b7eef47e230433a93e31b375f5f6e9da682b413e1,2024-11-21T01:25:13.093000
CVE-2011-0976,0,0,3c520647207dc3044c446d807fd95c423828485769906121c2568c31cc61969c,2024-11-21T01:25:13.270000
CVE-2011-0977,0,0,3119fe6d2f163507b6797d25dcf489a12f4d7d6e903e2e563dec2643e4323f06,2024-11-21T01:25:13.433000
@@ -48412,26 +48412,26 @@ CVE-2011-1596,0,0,dfa7eca9b0ab5a20fbe5a2791a2e7c3cfa07dc364e0314be28d806a3baef5b
CVE-2011-1597,0,0,21a6f996244d0bff95dd27d3672390efd811a670acacc1239feaddf6b361a78d,2024-11-21T01:26:40.783000
CVE-2011-1598,0,0,1fac4bdc680ed6b16667eba6f4f6ce70b8585701d524d1e089970e33e881af67,2024-11-21T01:26:40.887000
CVE-2011-1599,0,0,9b4abccc9d98421636aad2a274054170e52a963455ca37f7ce05c0a9d01d668a,2024-11-21T01:26:41.010000
-CVE-2011-1602,0,0,75f04c6f40fed5f42202d82ba74982705986ee83a7488f0093f573c36ff2d21c,2024-11-21T01:26:41.150000
-CVE-2011-1603,0,0,ce0f3a6dfdd276c18043123cca7977c070c143e2b3431cc1d7288091b7c97186,2024-11-21T01:26:41.277000
-CVE-2011-1604,0,0,453ca9a0b580a38fc5dfb978e2f1e2d383275601f30a07a0dbcacf12c93b1e9e,2024-11-21T01:26:41.397000
-CVE-2011-1605,0,0,ed5b7f3bc9b17cc9c1878ad89bfff96bf1a7c5373b4e2fbbf683f238add77c87,2024-11-21T01:26:41.503000
-CVE-2011-1606,0,0,58b51c6c71ccadc24f51431b0f3900d29aa8f331967048e7074bc616fcbd439b,2024-11-21T01:26:41.630000
-CVE-2011-1607,0,0,daf4341d36c1b881080a830b653ad08c3964c35aa00809ce45b6940dd302d096,2024-11-21T01:26:41.747000
-CVE-2011-1609,0,0,d12bd889f510948a6b62b994ba6e9c5eac23edab89485df5b4c7d13427d21c96,2024-11-21T01:26:41.853000
-CVE-2011-1610,0,0,47a65fc861b9e80f256e218bd1cb41819a4739d3b9ad49f4bee420025f3ab2cc,2024-11-21T01:26:41.970000
-CVE-2011-1613,0,0,6651bac04367ef3205050cdb54b5781cd9712dbd3e1eec7711c2b5124e303369,2024-11-21T01:26:42.090000
-CVE-2011-1623,0,0,1b0b5e7dc3751bbc97bdc515938d11f3eda4ecd615dd0f9e323daecf47370f31,2024-11-21T01:26:42.193000
-CVE-2011-1624,0,0,f336f65f0dfae46bbc15cfe447bd95d29854bda0874e96ae48f985385a9ffb91,2024-11-21T01:26:42.300000
-CVE-2011-1625,0,0,f81cdbfd9dd9ba146ffc3be312f86ebf21bfac16c203ebdb572d6dd568dfcc98,2024-11-21T01:26:42.397000
-CVE-2011-1637,0,0,e480e68a4ee795da5565881761610e1db255700db4d587b03dc584c99ba4d77d,2024-11-21T01:26:42.487000
-CVE-2011-1640,0,0,d6f003ad14c26b12b5fa9762588a7e9b2e454beff19acae2dd9d1fc717b149ab,2024-11-21T01:26:42.613000
-CVE-2011-1643,0,0,f58f4d93586a653f0e06f96f545b3b7c7b7faf4ff492426fd9741742cdc2e84c,2024-11-21T01:26:42.713000
-CVE-2011-1645,0,0,18174171677bc948f9c957f293bed2d4d55e7ae5dfda46a7677eecd2dc289cc7,2024-11-21T01:26:42.833000
-CVE-2011-1646,0,0,327bab51d91272bd09ad157e90a82162dfdfe4aa04e59310b13787e3158cb052,2024-11-21T01:26:42.947000
-CVE-2011-1647,0,0,6545c428180779901ff9dfc3ea182ef6be653ba14eb59f8c07d2bc66c5ded77c,2024-11-21T01:26:43.053000
-CVE-2011-1649,0,0,a666f86ee6a86e1880df53863e8429a67a7009b27b719debf0f68fee0fcbdea9,2024-11-21T01:26:43.160000
-CVE-2011-1651,0,0,4c560086beaeb58a719d231b504788dbb5bae683cfcd0c3fe305ce7e52f8716f,2024-11-21T01:26:43.263000
+CVE-2011-1602,0,1,57b273c8f1612eb32a82d672fd33dba6a6b0364b007b5c4484b10ee9646c6135,2024-11-21T01:26:41.150000
+CVE-2011-1603,0,1,cd8cbfa7fa70a008cbea94bc8f7319dfd0bc5c0b3b264e1fe2d3b7e2ef808495,2024-11-21T01:26:41.277000
+CVE-2011-1604,0,1,97524a110aaa79429b8786090067b07d440ed6ec274004f99d4ee0c2c8161dde,2024-11-21T01:26:41.397000
+CVE-2011-1605,0,1,b4df8b48f0e13e5377e123868232652e17f9e226d3280f13b2835fc74a85c9ed,2024-11-21T01:26:41.503000
+CVE-2011-1606,0,1,98df41ff36ba5e4d90a0a2cba23cfb9d8b96375f57b6abf3d59bffd4535fe9ee,2024-11-21T01:26:41.630000
+CVE-2011-1607,0,1,61ffa0af2e9a21e036ba59703ca4e85daca4165813e7d3e80460129ffcfa37e2,2024-11-21T01:26:41.747000
+CVE-2011-1609,0,1,7b079562715d3c5a4bfe8da4b9494ddee6b454e57690f1350ece14e9160c0010,2024-11-21T01:26:41.853000
+CVE-2011-1610,0,1,2d96815b49214c0167c1c3f01ec91154f8c34db6949da556b87ca9778c428691,2024-11-21T01:26:41.970000
+CVE-2011-1613,0,1,460920cda9e7b950adc2b8106bfd9c8efdca28c943253028699e90d61c641df1,2024-11-21T01:26:42.090000
+CVE-2011-1623,0,1,c0082b0c40d145a700a7e8f34f929075ea6076c9b51c9935111a5315dfa52419,2024-11-21T01:26:42.193000
+CVE-2011-1624,0,1,4172c2c453a8744fdb12ecae0eab94d7150443322faca817ce1855ae7c3e75f9,2024-11-21T01:26:42.300000
+CVE-2011-1625,0,1,fac3064fb1e756d330f9aed3e845abe98edd5d77e09123dbccd272b7b41e1f19,2024-11-21T01:26:42.397000
+CVE-2011-1637,0,1,25176acb3e0a4e1636510d008451bd0276a542efc2e1472bae7d1d265e7a05fa,2024-11-21T01:26:42.487000
+CVE-2011-1640,0,1,abea426538d7befbdd1962cb7b286041cc675362cbe6b793be9497c34286f33e,2024-11-21T01:26:42.613000
+CVE-2011-1643,0,1,978b70fd6663e5a14a83ba6358ea608acd53e473be5caa8f76dc1a5a2b52cf45,2024-11-21T01:26:42.713000
+CVE-2011-1645,0,1,6232e8c1c79cb18223d5c72766696f49cf83297a09fda7ab2e4f99033a3a664e,2024-11-21T01:26:42.833000
+CVE-2011-1646,0,1,3044c0d155ebcc552ff76ade0b64bd872e0281a8776b64eb08cb13f9027a4d1e,2024-11-21T01:26:42.947000
+CVE-2011-1647,0,1,2a091765bcb14a60ee9cc2a1836a45cebf41a21237b9af6f57bd8df10095e166,2024-11-21T01:26:43.053000
+CVE-2011-1649,0,1,22efead2d8bbd0d01f9869e6203550bf2d430fb975d46d06a061cdb56b13ba69,2024-11-21T01:26:43.160000
+CVE-2011-1651,0,1,b7267cf3507e36d34f197c1334f76c7509781766daa0d77399d08ff3b00186c4,2024-11-21T01:26:43.263000
CVE-2011-1652,0,0,f52b694562b0e1d3d8cf30c9eb215f3609276defa69c2fcc4227ada8ef41fe89,2024-11-21T01:26:43.370000
CVE-2011-1653,0,0,1ae0226baee9e2368b549be093542ac4fdd69b0636ff42ae453f745bef1cd280,2024-11-21T01:26:43.500000
CVE-2011-1654,0,0,471344adbd6470c90679b124496336e79a795f2a35948a81ce6268272afb37b4,2024-11-21T01:26:43.667000
@@ -48790,18 +48790,18 @@ CVE-2011-2020,0,0,22611a99f3d159b54edd5f009627f3a9ec69c2a083bc998d2cee686eaa451d
CVE-2011-2021,0,0,04f6be4b97e6623d4279da2fb689a6866ffdf80ea63fabf390848c571132b2f8,2024-11-21T01:27:29.840000
CVE-2011-2022,0,0,64a9f4e0e777a2778739df9f5bc9810ae7431d6012cf75c73d4b982f19fd7aea,2024-11-21T01:27:29.987000
CVE-2011-2023,0,0,0742df9156a4bed5b3377443b6cd65008a5f200844016f46efda5c549c75f85f,2024-11-21T01:27:30.143000
-CVE-2011-2024,0,0,82f08544124207de98afd784582c1e2b3d8c127a483b45a5a091cf814b27016a,2024-11-21T01:27:30.300000
-CVE-2011-2039,0,0,24333068ca0d927d54434423c7f19d76f6af951ef461a4e555c31aadbc71d344,2024-11-21T01:27:30.420000
-CVE-2011-2040,0,0,8d65cbcce642b1da9d5921c4e64ec6e5758082a2ef4a213845731973cde85066,2024-11-21T01:27:30.533000
-CVE-2011-2041,0,0,b7b3d39da6284fcedab0f2a5ad722ef2a83d09a0a0370bfa81580085b284beeb,2024-11-21T01:27:30.643000
-CVE-2011-2042,0,0,4353cf5883f453d24a6c8eb8ccc0ce8dc24e01922e75f76fab949d61b8cd7933,2024-11-21T01:27:30.750000
-CVE-2011-2054,0,0,1d761fdf64a3ca1fd02e4560833a1af0a7455067fffb1268048b6dd434fa84fe,2024-11-21T01:27:30.853000
-CVE-2011-2057,0,0,f618a875246245fff92bf44fe834c7a75c8f2e12bb38276f1eca6e0bc0afed9c,2024-11-21T01:27:31.007000
-CVE-2011-2058,0,0,dc1701e1621ae48eab344c148d647fbff84d38a93206da1e1f812b0aba49e2d9,2024-11-21T01:27:31.120000
-CVE-2011-2059,0,0,76e886ebc636c4916997690c59ef36d1e0347e3f575e526bd616f17150201d01,2024-11-21T01:27:31.237000
-CVE-2011-2060,0,0,8aeb77dda089f3f30445c59b9673b7243bb64d97c12b08608a9e5b8c80192084,2024-11-21T01:27:31.360000
-CVE-2011-2064,0,0,a647b877b0468257d1ddaaad0cc94b6c47c7c0020f54dfcfd5f58ecfeaa85863,2024-11-21T01:27:31.493000
-CVE-2011-2072,0,0,7d6d804b0b91c749bc29e46e77b92987758ba70bdf5febaf0424f41d580fe503,2024-11-21T01:27:31.617000
+CVE-2011-2024,0,1,cbbd1cd6a6f544b3278003a2812482eff4ca79267be44f2862afe97aeac22a55,2024-11-21T01:27:30.300000
+CVE-2011-2039,0,1,93ceeccff52c2f1f5ecdea9fd8cd63136f24330e8eec8ef698d50d1b391f8c37,2024-11-21T01:27:30.420000
+CVE-2011-2040,0,1,2af85c56f0d8e94e7ad89ffdbdfcbdc7e52186f657b0f62223e3e77ae202df30,2024-11-21T01:27:30.533000
+CVE-2011-2041,0,1,659a3f4a97e721d2cb5bd1d167a339ea1f502eb0277cfe46a320caa986310223,2024-11-21T01:27:30.643000
+CVE-2011-2042,0,1,d12e67d8cff72e86858acf36b9d749805da1fe7d6d9f31f5b91a76e37125361e,2024-11-21T01:27:30.750000
+CVE-2011-2054,0,1,c1a5ec452cf030bc992288048ecf131c97defcdb7017d0787fe49e30b567eb8f,2024-11-21T01:27:30.853000
+CVE-2011-2057,0,1,e6a7804ace92d12819eb109823885ad17523dc46a0ca85479215ee3abc506328,2024-11-21T01:27:31.007000
+CVE-2011-2058,0,1,04c7ccc93d1652d9ef728f7af93f9446ba67722c8b9ba542400b60760e5fa3cf,2024-11-21T01:27:31.120000
+CVE-2011-2059,0,1,9c980a1801fe0b12dfa29644610324a45abf4bdabf7fbc04ff2d64fd4b4dfe94,2024-11-21T01:27:31.237000
+CVE-2011-2060,0,1,a1a5b41ddeff98bb15d50698efe4cd90dda7cd27bea5dbd0284939384aeb0efb,2024-11-21T01:27:31.360000
+CVE-2011-2064,0,1,fad8a3f50c2ff0c94b8985dac58e20d907c29e22de29628edcb6c6240e7f47c0,2024-11-21T01:27:31.493000
+CVE-2011-2072,0,1,ffe3819465bf995a7064af632d8312e5b0dca33650020a9604d518637feaf904,2024-11-21T01:27:31.617000
CVE-2011-2074,0,0,181e01e13e4bb2502eaa21b22a439b0c71d1a013c5697866d212ec7a572aedfa,2024-11-21T01:27:31.757000
CVE-2011-2075,0,0,82d644aaefa18940b0c95c2ee0dd9db3011aa5a5944bae14e2b3f68b05500d69,2024-11-21T01:27:31.910000
CVE-2011-2076,0,0,4649299651356a3313486eadc3236b88fedd67091f2a64b7ffabe80ad3be10ec,2024-11-21T01:27:32.077000
@@ -49249,27 +49249,27 @@ CVE-2011-2533,0,0,858563d11bd10d6d5b4e0948788d04d95344f58515b2d039a4963622e03c95
CVE-2011-2534,0,0,8876ba10afc7dd20f0eea5c313aba4544b6db7e327ae7e521029ce44921822aa,2024-11-21T01:28:29.173000
CVE-2011-2535,0,0,cad9db5f0f81d62124c044e441f4df03958f05bea55ab7ec387f9386a5c5624d,2024-11-21T01:28:29.320000
CVE-2011-2536,0,0,b8c552745ade25cf976748daf4900a61bfad685b62c76e011bb7f622a901a4b6,2024-11-21T01:28:29.493000
-CVE-2011-2538,0,0,0034ce376d4bdae24975ec90f21490248603a67bac06f5dd2050c5dbb0b05a58,2024-11-21T01:28:29.643000
-CVE-2011-2543,0,0,80d733fc327064f5a24848c823755bceed6a15b900a6a7c2de76c074ebc86245,2024-11-21T01:28:29.757000
-CVE-2011-2544,0,0,5d265fa1e0815da642d3e20bd4c2ef1b95fb7bad0e8c6aea34bc1e7a8af54275,2024-11-21T01:28:29.873000
-CVE-2011-2545,0,0,a06f3aa7ebde1d01b71bacfb5f24521f218f6c7ec320f852b5f001621be68c52,2024-11-21T01:28:29.980000
-CVE-2011-2546,0,0,a2543752e0fc7146cace972ee389ca460f8e6bbce9050154374cb743b1a7d559,2024-11-21T01:28:30.090000
-CVE-2011-2547,0,0,559fbcc176ee4459610fc6dab5daed0fc91e4b3ecc64ee29c112742f8b5721d8,2024-11-21T01:28:30.200000
-CVE-2011-2549,0,0,136a22d213c25fa83fc877fb92921c32b8138513874d1480cfe96ac3c990c4ee,2024-11-21T01:28:30.317000
-CVE-2011-2555,0,0,e018d42d9f33c0adc90db3dc73cad7086d35d08f9e26cc6ed4b7cb79a28ef814,2024-11-21T01:28:30.437000
-CVE-2011-2560,0,0,63c51f530c88f567ba1303368cef89aa4655cb9d2d3a3af2c5d9933ef65d8533,2024-11-21T01:28:30.540000
-CVE-2011-2561,0,0,2659d5b3973edd455814232c75f95176ec551951b577885dcbee47e0b397ccea,2024-11-21T01:28:30.667000
-CVE-2011-2562,0,0,811b332bec6908dea98224ab9469a8faa90b062bbcc33d8690f5f160491a6508,2024-11-21T01:28:30.817000
-CVE-2011-2563,0,0,bc27344256434afb53eb5b387166930fa1a44678e151850c91c211e17f1ddac0,2024-11-21T01:28:30.933000
-CVE-2011-2564,0,0,ff80e286827714d5c17279ffe461856ff1fdcb06535d45bf4d44b5ce166ea4dd,2024-11-21T01:28:31.043000
-CVE-2011-2569,0,0,2a086f4d033941d66a0243d22d45fb7cc38da4d82f56bb74d58ab90575d47a95,2024-11-21T01:28:31.170000
-CVE-2011-2577,0,0,629dc80da6e0b011ac9f042456bce9cf6487efd02edddb04813b58afb8fb9fdd,2024-11-21T01:28:31.283000
-CVE-2011-2578,0,0,faad993226615c10e049d00aed2d8bad4583bfb83331edfab5d36b2a760a4935,2024-11-21T01:28:31.420000
-CVE-2011-2581,0,0,99b34e06e18910aa0f0d662ac5b63d7f7ea0affc52b56926a2615353cc3f4431,2024-11-21T01:28:31.550000
-CVE-2011-2583,0,0,068a1383bddf194454494cf885a33974a4f5fe30daae8d85c26a2e009f42db08,2024-11-21T01:28:31.670000
-CVE-2011-2584,0,0,970342dd22fbaac7783497e849eecf5c0fbbd1f573f9137552cc583d93301bbf,2024-11-21T01:28:31.787000
-CVE-2011-2585,0,0,34be68492603106f558848169f59965cbb61593b33306c6b7d6d901a905f3568,2024-11-21T01:28:31.900000
-CVE-2011-2586,0,0,f16bfbd91aa5a5654ad5fa8736f39c4a5c05dc2ccc1100c3dc9a092c9bafeae8,2024-11-21T01:28:32.010000
+CVE-2011-2538,0,1,f94485872d1f9f1a4d532137d752f15c3c722c7f1bd4b537d6c8a10be0fa25a1,2024-11-21T01:28:29.643000
+CVE-2011-2543,0,1,7f1f95c2c94504988cb5b235cd01973ca14e5769d7771fd95a782b7416bf69a0,2024-11-21T01:28:29.757000
+CVE-2011-2544,0,1,cd0d6b40ca0f21873be4a73685d127f86cba4d9278356ec8a7d8e5d364cde6b5,2024-11-21T01:28:29.873000
+CVE-2011-2545,0,1,f5e2a9e56ae33daa8fc02daac85d1c43d4e9ac06784b00820b541f06b8e86248,2024-11-21T01:28:29.980000
+CVE-2011-2546,0,1,6e6ffe4e011d666e65e1ef78f1916e9c7fbed44776239395b609f82efe29d56e,2024-11-21T01:28:30.090000
+CVE-2011-2547,0,1,dbde6a7b2ab47c9976c2697ed65c372669969f55b18e54c2c780f2e437423c25,2024-11-21T01:28:30.200000
+CVE-2011-2549,0,1,da7019bad9d5f13ba85497c5fbe02512fd9ac636e0afedb510a34e7cdc5f0664,2024-11-21T01:28:30.317000
+CVE-2011-2555,0,1,7f8f6ddfb057f4809ce681e979f201f5cf0d4407455a8c9e3a95f2a5d8c0b96c,2024-11-21T01:28:30.437000
+CVE-2011-2560,0,1,5c6a1c1c192bbd87846caf5c9146d917daef11e5b486641d1ad2619ceaf435a5,2024-11-21T01:28:30.540000
+CVE-2011-2561,0,1,7c353e1ce258b1f4555075930e85a685e566a46df5b209b84174e6640ecd4fcd,2024-11-21T01:28:30.667000
+CVE-2011-2562,0,1,358d1ba53696f84019cfd2ec5f16a71e0bb486b34bdaa1e221628fa899fdd07d,2024-11-21T01:28:30.817000
+CVE-2011-2563,0,1,d5ee0fb79a2f55774d5470530a4897601f88e341b919b066570e232458bf55e9,2024-11-21T01:28:30.933000
+CVE-2011-2564,0,1,c21c996006b7be58220d55f2a3fcbeaaffc061c7373c46b519f66290732c9835,2024-11-21T01:28:31.043000
+CVE-2011-2569,0,1,944f2c82bd73acd8ac6e7bc2c45c42853df781338268c865a78683867356b4ac,2024-11-21T01:28:31.170000
+CVE-2011-2577,0,1,5df8f3395d397391ff979b1f67fc2dcfe62144130cf4d7087d2226bacd449850,2024-11-21T01:28:31.283000
+CVE-2011-2578,0,1,a8f628885179788edf89c503d004b3e27707c6a398e1e8cb01d00e0e3c8fbc3f,2024-11-21T01:28:31.420000
+CVE-2011-2581,0,1,7d068b142d80628cbafaed8c31b0379f7755064562e9da1612a54cb33e400b45,2024-11-21T01:28:31.550000
+CVE-2011-2583,0,1,ca65ddeb93c3455feba2242c85455917e84ef514dcd1210c84b9a472a8ea868c,2024-11-21T01:28:31.670000
+CVE-2011-2584,0,1,9c834f5600c150f6aebd6d0315bd4a69baa1fb3d9c3b5a9ed70b28dd9ab1da88,2024-11-21T01:28:31.787000
+CVE-2011-2585,0,1,500d66f358031900dff29e768a6f1098e508f61fe6b708d11a31a13af5678f5a,2024-11-21T01:28:31.900000
+CVE-2011-2586,0,1,a581e5efb58ada02f5ff4a4b6f7f13ae40b857925ae4e4abe9683b7ef9f5c537,2024-11-21T01:28:32.010000
CVE-2011-2587,0,0,d2e5b3ab9ad37f9ee2251f9821ca6e606068c674001184a4682fa027d93e7302,2024-11-21T01:28:32.107000
CVE-2011-2588,0,0,4f30fa81419fa3451706f86b9861a11c22e566b070a6c4a5c460966eda0bb52b,2024-11-21T01:28:32.240000
CVE-2011-2589,0,0,fceaf5a9467bb2c45a96be21ba3ee73c2f750349521501c6e3ac4b41850c6739,2024-11-21T01:28:32.373000
@@ -49940,44 +49940,44 @@ CVE-2011-3266,0,0,738a9ce3bac3aa0a4d5de5f8051446f88e1aaf4334d4401c992355978dee1a
CVE-2011-3267,0,0,21aed4d298d0012ee8d24165378f414175dfe01f8cae3135a9639f562124e7c9,2024-11-21T01:30:08.837000
CVE-2011-3268,0,0,65dd788fe1c50bab1213c3d89dcfc69ea97833dc8ee058bc64a8e4c442e1a5bc,2024-11-21T01:30:09.027000
CVE-2011-3269,0,0,b3a2a6c5faa4a35b0c99cf8923a2c65365edeeb69ed889c3a0a183de4917c62e,2024-11-21T01:30:09.270000
-CVE-2011-3270,0,0,e9a5de539e006bf84cbd241a473080012cc120f3334444ac686a1353bad5f52f,2024-11-21T01:30:09.570000
-CVE-2011-3271,0,0,b61d130316e02e0a9b808d90414d9ed8e288ac1d94eb8ea71cee823be4178516,2024-11-21T01:30:09.710000
-CVE-2011-3272,0,0,8a7b05a81c4037c07e17a00eec80ccbfa7016c40d2aaf9642344c5eaedda2218,2024-11-21T01:30:09.843000
-CVE-2011-3273,0,0,05eca3f61f8d636f5a05c81ce478de70fd7ee9306b3e5afc1ca7b587eec1eac8,2024-11-21T01:30:09.980000
-CVE-2011-3274,0,0,18d2bd3fe35c8baf0c9c55436d1aeec2900e205a93654e4785b7abdf57e14f63,2024-11-21T01:30:10.130000
-CVE-2011-3275,0,0,a284e306059d8adc8b6c150b5aebd464cfdf70847d47d54d62ab642922e64200,2024-11-21T01:30:10.270000
-CVE-2011-3276,0,0,837b66535f5a4bb5c0ceaf748767ef5ddeb241f4beabeea62f364b19fb801092,2024-11-21T01:30:10.407000
-CVE-2011-3277,0,0,cc537f02aba2a1b70f87add4b033204d985882b89779bc0e22c1d66883b42316,2024-11-21T01:30:10.573000
-CVE-2011-3278,0,0,b1270390a8d85c99848367a2d28a9f1b106e85812ec06dfbccd98240d75d9908,2024-11-21T01:30:10.740000
-CVE-2011-3279,0,0,f205cb4ceba0267aedb1662d2ec6675e2c0c506b948c98c321c56e2988185060,2024-11-21T01:30:10.913000
-CVE-2011-3280,0,0,9efb15e67c7c0a6a235ea9996a3833c2cececb8372e33de73443c03252707283,2024-11-21T01:30:11.053000
-CVE-2011-3281,0,0,ccec7cc4c7c2a1799a58b98eb6a545c1ed22c1950062bc484df08e603e09f405,2024-11-21T01:30:11.220000
-CVE-2011-3282,0,0,f87479549a9a94d5fcaf64ac38cc9c445a94ca5f779b41257fadf8f271a328c4,2024-11-21T01:30:11.363000
-CVE-2011-3283,0,0,5f73bc2ecded59f1cde682a2d19e2c987b9caca22a098224a3303927a415ed64,2024-11-21T01:30:11.520000
-CVE-2011-3285,0,0,76df681527fe15930a16d4b77681e214314f2590231254d45cd8dbf18f7342eb,2024-11-21T01:30:11.657000
-CVE-2011-3287,0,0,9c8dd7ef1f22a4a1bcad540fd3b29caf6ac9429e958bc79633cb3c81fe4c719d,2024-11-21T01:30:11.800000
-CVE-2011-3288,0,0,18df908ebf93da86d028b8c9312378994517d3986c9327bb5bdfa780be2bece2,2024-11-21T01:30:11.943000
-CVE-2011-3289,0,0,624f003231aa14adb9fce6779e8ec4da610bab0c4391939f426f686a1a49196e,2024-11-21T01:30:12.083000
-CVE-2011-3290,0,0,6e3ba0861adcd1962884c76410c5e2ba16bf908e7baf75cc36e95acd6d6ba39c,2024-11-21T01:30:12.240000
-CVE-2011-3293,0,0,2400924d42041cf2d75c2aeaa9ba2cdd80c9aa49eed08d1cb49c84c75fac8f78,2024-11-21T01:30:12.387000
-CVE-2011-3294,0,0,252cc6ed44f075beeaa7a69209f4572bde0bbaa82d94bf3101305455c9cb0a1b,2024-11-21T01:30:12.520000
-CVE-2011-3295,0,0,c97f3d2c83d8abefb9ec2865bea55e5e97e95c9e1c3a1198e10da55cd1a386fd,2024-11-21T01:30:12.690000
-CVE-2011-3296,0,0,199db662931ceead24b3c95674581ef60e08f9d6185853f16cd38477f4cb64f2,2024-11-21T01:30:12.860000
-CVE-2011-3297,0,0,becb372d22114a658771d8d5035095389a3a2cdf4df96f31fdbc5a752d03c895,2024-11-21T01:30:13.013000
-CVE-2011-3298,0,0,87fc5d91d2700864922a745f9fe805fcb36a3133589bd4b6054ee402d057bdaf,2024-11-21T01:30:13.160000
-CVE-2011-3299,0,0,958fae39d84098d80cc174de8efb02fdd30613217934cabca235e9fe311826a7,2024-11-21T01:30:13.320000
-CVE-2011-3300,0,0,4f53de74d7c939b9c691b75c66b963e98ce20f5382eb4ae222f431b387917365,2024-11-21T01:30:13.487000
-CVE-2011-3301,0,0,249bf23af3bc88fead91a6cac77323b58ffe4557b0e281e912a2c6189eb2a3cb,2024-11-21T01:30:13.660000
-CVE-2011-3302,0,0,0cb240939b876dee411c2819a2512870bc851ac4999b856f672cffb2dc9e387d,2024-11-21T01:30:13.830000
-CVE-2011-3303,0,0,5e25fd5247115c202bdc495417a4d1871223728b0b69bf82972e27cbd02cd213,2024-11-21T01:30:14
-CVE-2011-3304,0,0,8f3a01de71b9f6b4475155854646a921c5956ec174a483d9283618aeb162267d,2024-11-21T01:30:14.177000
-CVE-2011-3305,0,0,4b17d37c4fd5f88e68f6c18127f1f583194b0748c63e8cfc1acce7683063dc32,2024-11-21T01:30:14.333000
-CVE-2011-3309,0,0,b2ca2df0386fea94e17d517e560457ea17cbb965a7701d498198191defe62058,2024-11-21T01:30:14.480000
-CVE-2011-3310,0,0,d3baf3cdd99210566842f415c954dba82292c9982c355e18086164e5290186ea,2024-11-21T01:30:14.630000
-CVE-2011-3315,0,0,c7cd7b25a1698fc8057e7bbd380d10307052aa640bb2a06cdad8d24c772ef919,2024-11-21T01:30:14.773000
-CVE-2011-3317,0,0,6d0b9bf9bcd37a37ce8cd102cd187b55659197cf8ed77b53cd1404dae108cb6f,2024-11-21T01:30:14.950000
-CVE-2011-3318,0,0,36417bd3798b9518fc2a5832c1c7c2d2d45b9f742bfac9a6093cc41b72caf16a,2024-11-21T01:30:15.113000
-CVE-2011-3319,0,0,1cb8f3719dfa6b73d25b2b1f897b338e72899c3431efe2b3b78a793d615046af,2024-11-21T01:30:15.253000
+CVE-2011-3270,0,1,a9207167cc6baa48269276e192558a322ef42eb492b5f9088a5977ac0a7a8673,2024-11-21T01:30:09.570000
+CVE-2011-3271,0,1,91e8b2a6e901ef4321a6a5912393d0800f217aa1b491129a16bced65fb581b20,2024-11-21T01:30:09.710000
+CVE-2011-3272,0,1,d9c715b7b6e325ec7a58a92a034db579cab070c4759317e20449af3eee50db80,2024-11-21T01:30:09.843000
+CVE-2011-3273,0,1,933d72cb8a264f8a7b14e04e897333d9a65534f1ddf5249e65ce9639df120eab,2024-11-21T01:30:09.980000
+CVE-2011-3274,0,1,0055e7965215c472db46af12f029c4e003cd0854ddb4d74a7ec2050176491050,2024-11-21T01:30:10.130000
+CVE-2011-3275,0,1,fe70484c404ca6a45c839724f3c1b7aa0e1ad92451676109f1424e189356074a,2024-11-21T01:30:10.270000
+CVE-2011-3276,0,1,f0d29167ec3aad82955e45dd5da19dccee2300c7d6870fd1f1cc15252d0e23a9,2024-11-21T01:30:10.407000
+CVE-2011-3277,0,1,dce81d9d1f69a3af7523caf5c1b3d6c4c90aaee4ed778198bbc5388ac4456d71,2024-11-21T01:30:10.573000
+CVE-2011-3278,0,1,91735b154f15565874460db411dc8f38c17ef9b4008e6c75de7ffb75b69b36ea,2024-11-21T01:30:10.740000
+CVE-2011-3279,0,1,9cf354ab966e80be17a8c1ea12c39c1eefd7c7ccfbf59685be67906a1ce3f6fa,2024-11-21T01:30:10.913000
+CVE-2011-3280,0,1,65e61a93536bb4de55b2a88018278428f67e5b335d95bf1ae3d263faf8bfe76e,2024-11-21T01:30:11.053000
+CVE-2011-3281,0,1,4e651c080cb09e58eaafe57f681778f7e17bc4d60ee71aae00997a26fce90985,2024-11-21T01:30:11.220000
+CVE-2011-3282,0,1,11e06afb374902a297c16ea773f202baf5aa89d5f3caead72c97e2e61e18faa3,2024-11-21T01:30:11.363000
+CVE-2011-3283,0,1,e6f0c7201337e19ccd4fe001084e549a15ec424a17a051b392bf64f6a9a56362,2024-11-21T01:30:11.520000
+CVE-2011-3285,0,1,9690b2244be253d39f1e3707b20b30026e99b5b52ba28621b0c4e5ace8f80ae1,2024-11-21T01:30:11.657000
+CVE-2011-3287,0,1,a9b0872dbf5074b3a546068fe19b1b7e7bd5615c7bdde918854be9a93f7e0b8d,2024-11-21T01:30:11.800000
+CVE-2011-3288,0,1,7fd70db495260b6cf784ee1fd7ecfcf9465f1b071c49d3499098b45e47bbfdee,2024-11-21T01:30:11.943000
+CVE-2011-3289,0,1,50956c77ef6485636cfa977674a173567c059d4a9c8c102c4d57231693942993,2024-11-21T01:30:12.083000
+CVE-2011-3290,0,1,a615f5c6b7d08ef9ceac49f0ead86a7cf57597f4641b8bd4cf172f6b0ee32d77,2024-11-21T01:30:12.240000
+CVE-2011-3293,0,1,23ee8a11e05e10f18d93cb7cd4381ea02040cef3ffa8769ca809d2468eca6797,2024-11-21T01:30:12.387000
+CVE-2011-3294,0,1,305af41fc3ed5b84878f3d80cdf740a4ce574d8ca56413bd8785b5df789df36b,2024-11-21T01:30:12.520000
+CVE-2011-3295,0,1,e72062f6f0b93e2b92ec6e97acb18506bbd3e2d341f6a92d0bd9e0b05c746bc8,2024-11-21T01:30:12.690000
+CVE-2011-3296,0,1,d47066cbe5ed2666896be31ab8e31dee866096c8ae58fd9a577a2609c8dcccb2,2024-11-21T01:30:12.860000
+CVE-2011-3297,0,1,0d860fa298f87313d0619c8893edcd6c6b3abffc20a3affc8f6cd3fcfddfcd7b,2024-11-21T01:30:13.013000
+CVE-2011-3298,0,1,de610ae568cf38389f4120ae2b8e21c9465009152a10257fd7e527780e6e6453,2024-11-21T01:30:13.160000
+CVE-2011-3299,0,1,71c5ac9bb5e477e18d3bcec6aed60ab00abd71b2783acc96fd64e2d04a16a9a9,2024-11-21T01:30:13.320000
+CVE-2011-3300,0,1,660fff1cd8fdbd6227b8306e3fc43a98d678fed764ba1cdac4c1d1c58a74b060,2024-11-21T01:30:13.487000
+CVE-2011-3301,0,1,19cd9e1c16fa3378f3499081d1cd4168b13384c5d5b2232e537db3893693d01f,2024-11-21T01:30:13.660000
+CVE-2011-3302,0,1,c0f05310a9988366042d7be991cb07692825f4dea20ad7c74a5ee3e6b6ee7709,2024-11-21T01:30:13.830000
+CVE-2011-3303,0,1,4a97389527826536b253ec4af2f1f1c5e3bfc99373e09356a6819f467aa43341,2024-11-21T01:30:14
+CVE-2011-3304,0,1,2ab261293f9c8ad8cc7eac74533156ff1bd88bb4f73732dd63c97273d261f22b,2024-11-21T01:30:14.177000
+CVE-2011-3305,0,1,984660970313a5e10f6526ea5eb5a9447b3d073f64f87ab587be354a8eada4a7,2024-11-21T01:30:14.333000
+CVE-2011-3309,0,1,567d6057f75f57e1d4b458065fc48ebe30b612d7c8557d385ddcf1ed610d6264,2024-11-21T01:30:14.480000
+CVE-2011-3310,0,1,630f27d6d4fe5b7b3b6a7b8f2529d8c0c2d1c2ec71af17becedfa9a3ffb6aeb7,2024-11-21T01:30:14.630000
+CVE-2011-3315,0,1,432b4334f37278234be9725d90639ede379b5636262606b67213e81c41a1a302,2024-11-21T01:30:14.773000
+CVE-2011-3317,0,1,a1bbb2b1bed1752bf5b989e64c62630bc4ef3e55b5ee5b82a69a2f1b3ae548dc,2024-11-21T01:30:14.950000
+CVE-2011-3318,0,1,6bfe5dae6dad3f53662856186c2396956b47328b9cce975e9cae130a7247d6ae,2024-11-21T01:30:15.113000
+CVE-2011-3319,0,1,2663b5ab23359b5d242ae48654182693683e3b8ef17c9336c695a5f9e7c39c18,2024-11-21T01:30:15.253000
CVE-2011-3320,0,0,ae4d611ca698decdf7b93f42f1fe98bfeb5ec1865d48987eb4bc6210ee7472ca,2024-11-21T01:30:15.387000
CVE-2011-3321,0,0,7aeb8d453d8cd261e77ba7e114b70ddc2ece39566f656d719cee62eeb91a00a6,2024-11-21T01:30:15.513000
CVE-2011-3322,0,0,7dc931e669f147e3d6bfc698912f83e98910d150736e70f64a875d31c96cee51,2024-11-21T01:30:15.657000
@@ -50631,17 +50631,17 @@ CVE-2011-3999,0,0,1f15024de5cfa0ca770994cdb0abeef23c80b093378b9848eaae6c9362577b
CVE-2011-4000,0,0,76cef4e382ff179352e9aaeaab128bcace0c62110b3eaefc1e850314729934b2,2024-11-21T01:31:41.347000
CVE-2011-4001,0,0,dfb0db6a81bfc2c825381a87fc7f621959a1b23b6a82dd2f57c767dad530bce9,2024-11-21T01:31:41.457000
CVE-2011-4002,0,0,de8810e0a9d5c6f2b6055075cb413f79db3e54d0b6a0cc44152a318b82039174,2024-11-21T01:31:41.577000
-CVE-2011-4004,0,0,9e844a15b465d5e92f9ece6d1f410fa2d89b83d6f9de17073294cfc8859f25b9,2024-11-21T01:31:41.710000
-CVE-2011-4005,0,0,644b6a8f0e0636a16e76f5b60b9950eecbe2eabfd5abd3599310e78600be4b1e,2024-11-21T01:31:41.820000
-CVE-2011-4006,0,0,cc5889cdbad62c5b397175f5a41bd6d7b58f10752d194a42ca5aff0e40f3e6da,2024-11-21T01:31:41.933000
-CVE-2011-4007,0,0,82222a47c262defca44ea02a95a12bea4bc93af98a9d3d7f4af249a46b7dd911,2024-11-21T01:31:42.050000
-CVE-2011-4012,0,0,4125fab11b4b9ae121bea8f231389b1b8bc640966f7acaf007c536e7b22035b5,2024-11-21T01:31:42.160000
-CVE-2011-4014,0,0,6f0878eef5533e5878d9c70734810cf9bdb9f94672e6ffd0f4437fc988d6cc5d,2024-11-21T01:31:42.277000
-CVE-2011-4015,0,0,190e57ce6cdf159533fe2e4de1b972b63c8f325bc28f54b969059cdb66bffb7d,2024-11-21T01:31:42.387000
-CVE-2011-4016,0,0,6271209120f06b6287a9db931ca86c85e2d6eeb22542a9f1f0ba846b7fa7f478,2024-11-21T01:31:42.490000
-CVE-2011-4019,0,0,b1335a92300ebb81527764897787ea9292cbb4943c6bce9dfd5f53adec9d4cbe,2024-11-21T01:31:42.607000
-CVE-2011-4022,0,0,6df4601eed2c2114c328d1bf276b5b57100ffb6379de76722ff0d9ce5032f511,2024-11-21T01:31:42.717000
-CVE-2011-4023,0,0,2a0b3e14f1b130987f8feca5da117a89d0bda80ef5fcd597f6bb54f24be16dc0,2024-11-21T01:31:42.820000
+CVE-2011-4004,0,1,e6b72978903f3e9b37ca86a9d2dc1076cdd9130b44b3593e6203a135efb1becc,2024-11-21T01:31:41.710000
+CVE-2011-4005,0,1,49480568dcd087d3192a568170b391f16ac0530d1f24e17770f652a70267d68a,2024-11-21T01:31:41.820000
+CVE-2011-4006,0,1,05800edd54a217317c148d2bb305354a7d411070919f9679afee21ac14445829,2024-11-21T01:31:41.933000
+CVE-2011-4007,0,1,21df589b38449a5c34a7a2d175b6b08562ddd0a5a2714b2309fbbf975dad22c7,2024-11-21T01:31:42.050000
+CVE-2011-4012,0,1,3ca9ce6dc24acec314efbb0a8781960eef7c3d280aa59f748e336eb38075072c,2024-11-21T01:31:42.160000
+CVE-2011-4014,0,1,4269443b059703f14c68b0bb1e40263ee6a0706f814895ae377bb64ad9766f69,2024-11-21T01:31:42.277000
+CVE-2011-4015,0,1,211fc8efa99130d96082fb75fbf423893ab95dbd93f5adef024f94cd518e21f2,2024-11-21T01:31:42.387000
+CVE-2011-4016,0,1,dbcad791bf3e0ee902a30e8ba29ac8cf7c3b23404157e8cf3fe9147da31bc5ea,2024-11-21T01:31:42.490000
+CVE-2011-4019,0,1,a96ca6e905f1995710f220be3acf7342016e666776cc50434c1e2928c18093b4,2024-11-21T01:31:42.607000
+CVE-2011-4022,0,1,eae424ce888cb7fe902e3ea651d9ad0394b1f84c67cc1a961ad8dbccfef128ec,2024-11-21T01:31:42.717000
+CVE-2011-4023,0,1,efe8346d55c2b64720525d86664be292f29bc680f1ddd266c9ce01ffd8582ff5,2024-11-21T01:31:42.820000
CVE-2011-4024,0,0,bfc9a1309fd14feacbb9c0a9c448299b87ce5ebfda01e20945b9dbbf80c042d8,2024-11-21T01:31:42.933000
CVE-2011-4026,0,0,4b01de93511b5b895e75aee78462c37b6ecb718ea2154526c1ce2c7a0613e972,2024-11-21T01:31:43.087000
CVE-2011-4028,0,0,fa602d26f7892d1c17767e98e985270439fd2ee0c433482fd43390224504d240,2024-11-21T01:31:43.230000
@@ -50811,9 +50811,9 @@ CVE-2011-4220,0,0,705bda7443eedd1b168cac6f306986ab4d9d64811cf4bf5d1095b53fdc35fb
CVE-2011-4221,0,0,e402f899f334ab97ca95bc91c65c2793571b3008fcdc23053dc29e5795fc812a,2024-11-21T01:32:02.827000
CVE-2011-4222,0,0,bfc1bb74a1f6b27180dbbfe602ea76d29e999f4f9f7bbb92bd3529e0b454a36a,2024-11-21T01:32:02.960000
CVE-2011-4223,0,0,4c44c461ac568878dc33174c3c584033a2e036d1446a6e2ba076248041e787e4,2024-11-21T01:32:03.103000
-CVE-2011-4231,0,0,98b4434a7871aa51ac28c6a0e5197a50ea1067d32d1697ee109a49e643bd11a3,2024-11-21T01:32:03.250000
-CVE-2011-4232,0,0,33e490a933fa0c8e34e3469eab4906a33dd3f6c3b1216be8514572536a34a295,2024-11-21T01:32:03.380000
-CVE-2011-4237,0,0,2a773b520869ff3a9260d7eeaa44044a65676a2f0b8d184977e9da41af550139,2024-11-21T01:32:03.500000
+CVE-2011-4231,0,1,7906ebad363c3a6839491230c622911f0040de5a9fc293dc70018d50e29ed922,2024-11-21T01:32:03.250000
+CVE-2011-4232,0,1,4b62b2f16452eb2b3094f75506744f5c684c1aa3226463623e6354e1c0340a8b,2024-11-21T01:32:03.380000
+CVE-2011-4237,0,1,fc11278df07093634483ab1c18c1c3e976bd8d0297947f24c701f81dabf97ef6,2024-11-21T01:32:03.500000
CVE-2011-4244,0,0,9d10d699740fd270abbf00faa93e90662a16d6a5667dd19594993a3b52a87ae9,2024-11-21T01:32:03.610000
CVE-2011-4245,0,0,ce56776df5accb4d0e5cef302cd5c179370a2d6254a2e9471e0a57dfcdbb3706,2024-11-21T01:32:03.760000
CVE-2011-4246,0,0,b0988934da409f1739e16de6a110cce5989c05bedf9e2bafcb3cb11a416c9396,2024-11-21T01:32:03.913000
@@ -51024,8 +51024,8 @@ CVE-2011-4460,0,0,ae85a5380c434c830afca966591f4d05e1fe3966079c857548099c0695a3f7
CVE-2011-4461,0,0,2cf4753068ed637c1743001af1d37d279a4dd41abaa46b70760f28638a86ad38,2024-11-21T01:32:24.347000
CVE-2011-4462,0,0,25c98e4ab08b07783e043a389dc05ec2ff48934adcf901bc6510bcc3c181baba,2024-11-21T01:32:24.550000
CVE-2011-4465,0,0,7cc4e262bca6be640e9acebff0c3ebc4296ef153104f0b58aaabe84e7ac27d11,2024-11-21T01:32:24.700000
-CVE-2011-4486,0,0,0dbca087e33e527ba0aea319784cafe0fbd8d4372a2ac82fdef20482eb27322d,2024-11-21T01:32:24.847000
-CVE-2011-4487,0,0,27f64046326fd24d2d7f74d4cc70cd9a9d1e5e7a4cb787bd9cb5bd0e81f477b7,2024-11-21T01:32:24.970000
+CVE-2011-4486,0,1,5160115991574a9df387cf01a0d7bb07a93cbcb99dbe9e199f6fdcdb7253efaa,2024-11-21T01:32:24.847000
+CVE-2011-4487,0,1,64a931ab6a7df558995f7b55865d1e913ad1c58053aeba0ff7f0d547c56869ff,2024-11-21T01:32:24.970000
CVE-2011-4496,0,0,d3b8246c26f0fcd79d36f396abbec7abef44493a7e40709f5f8ede1e14559a70,2024-11-21T01:32:25.090000
CVE-2011-4497,0,0,7ac5e7c0041f72a7f6ad0543e7fccea1ef9c5bef49ce06812778f692d7614dcd,2024-11-21T01:32:25.223000
CVE-2011-4498,0,0,ce2368a5516a8ce36ef1ffea8fa46e0cc4ef306e0e9a4ac512be654eb3a2b5bb,2024-11-21T01:32:25.353000
@@ -51166,10 +51166,10 @@ CVE-2011-4643,0,0,135a07990a6778964c799ef1e0c61671b20e8b2219f9951c5ed2de3b2448b0
CVE-2011-4644,0,0,e922f639a9b5a154d47d071413ef3c3d845a0d6418e687c46b004619594c2b4f,2024-11-21T01:32:43.203000
CVE-2011-4646,0,0,86e1541edfb0f5f8392daeeb3ebb14900ae96789f72f62339d98143282fc3043,2024-11-21T01:32:43.360000
CVE-2011-4647,0,0,a02d93fa50b94a538c476dba3cfd6ee6b5dd16a97b7e695526440cad726db0ee,2024-11-21T01:32:43.503000
-CVE-2011-4650,0,0,3e821a701eeee967fb306160a2a5ec6f20e852e3aa8a22131489e0d61550d264,2024-11-21T01:32:43.650000
-CVE-2011-4659,0,0,f9932baf52f0208a887eef4c9db5ed8745bba7ec2c803eb53e5a7a7a10040cf7,2024-11-21T01:32:43.777000
-CVE-2011-4661,0,0,737bb80d74e9cd72c7f5e3d9abd5badaa7c045803dd3add134164b36bd033079,2024-11-21T01:32:43.887000
-CVE-2011-4667,0,0,4330de516281f41b389bd6633c8b9aedff873d8ea461080e40bf8250bc13468c,2024-11-21T01:32:44
+CVE-2011-4650,0,1,b0bbbd264d361d5b68840ff7fd322981b583a376336541f00ff8272ee57cd9de,2024-11-21T01:32:43.650000
+CVE-2011-4659,0,1,466a9a43cd644013546975bdcdfb436f30a745e0502241da807257713ba78d50,2024-11-21T01:32:43.777000
+CVE-2011-4661,0,1,388652e951d2caa01aec1234d3610fb625454e407dc6976b6d188d519d117594,2024-11-21T01:32:43.887000
+CVE-2011-4667,0,1,6ec4b9700b437927c407897220b6a5ba7ed9d9afc60925d5670cbce1784341c3,2024-11-21T01:32:44
CVE-2011-4668,0,0,3cb3458fde4640ecf3f54779bc28a68b368377aead5a95ffebc8b4bb9c128374,2024-11-21T01:32:44.117000
CVE-2011-4669,0,0,f1e8ffe99cacb605310e30a48aa4b0501b71125e5aa4295d6653498d9814cca9,2024-11-21T01:32:44.270000
CVE-2011-4670,0,0,f451b24c0c98b8cef0d822ab88199b8f0d3ac4650567b69a5228cf3a6230b3a1,2024-11-21T01:32:44.423000
@@ -52132,45 +52132,45 @@ CVE-2012-0325,0,0,54b71bca485e553449cedd3606c330217af82ae034ea1e8bda730e131bdaac
CVE-2012-0326,0,0,ba52f16debbb031707b2ca5b9d2e904d7bd059c0319eaa5cab28db6b40997eac,2024-11-21T01:34:48.393000
CVE-2012-0327,0,0,8dc65a796d8cea9e69abffb3a0268c872965994af6603ee3d953cf1453cc482d,2024-11-21T01:34:48.510000
CVE-2012-0328,0,0,1a2186d340ceb67ee16190553a3c7a78eec5b0b05cbfe3205cfe1bbd2434779e,2024-11-21T01:34:48.613000
-CVE-2012-0329,0,0,c2ab29bcc3d211e2a063c96e395d88ce172732d5f2cce4f97cad9b7e30245760,2024-11-21T01:34:48.720000
-CVE-2012-0330,0,0,2285977fe66e440d771f6ed81501ff9ec487a8942e5a124978cc709be034ffd6,2024-11-21T01:34:48.827000
-CVE-2012-0331,0,0,790232331738c04bf771d4ea2a8ce57bf69baef9879705fed0e6a7cbf1383e31,2024-11-21T01:34:48.927000
-CVE-2012-0333,0,0,f749300fb2b5c78b60296f36dd8ab79e7998ab3cb0a15a600aee5d7eccf99cc7,2024-11-21T01:34:49.030000
-CVE-2012-0334,0,0,9e0bb4fcb641974010a443b5131e3aee41a201a13775c7d5b5ee3df5bab67348,2024-11-21T01:34:49.140000
-CVE-2012-0335,0,0,aa72350cc1619f699e6d939938b21a849a2ad237b9a6a99fc96033e490b0d38d,2024-11-21T01:34:49.253000
-CVE-2012-0337,0,0,7be94e61ade56ed78de21f69bbfeaff9efb5bf6998ba98a2cdce91812f89a26e,2024-11-21T01:34:49.373000
-CVE-2012-0338,0,0,5874657e1b1a43ed44725679441db84915e8908462bcba6b7a3a852a87ff6174,2024-11-21T01:34:49.483000
-CVE-2012-0339,0,0,bdf83f361c50302e68fcb97f26ec2709527cd187ca82616f593bbb0a3ca8434e,2024-11-21T01:34:49.580000
-CVE-2012-0340,0,0,c095c8dd559df7b3236eb07fde2fe35cdddd98f01f2035525815bbbb8381d175,2024-11-21T01:34:49.677000
-CVE-2012-0352,0,0,921240b96858d0eeb57222a0eefc6531df3a663de56a160ba6496264646a47b3,2024-11-21T01:34:49.787000
-CVE-2012-0353,0,0,f7312f73e67d9957749d47f5d2c83d99e66910d25928b8fd0557860617b7169c,2024-11-21T01:34:49.903000
-CVE-2012-0354,0,0,8b864c8ca5b314a1defccae62ea1097425c9b4a0b228d4aec58b16b795376ab4,2024-11-21T01:34:50.033000
-CVE-2012-0355,0,0,1a3e9b2b9e1374264b8eab91cfde67651e860195b6db11033bf185c85291f52b,2024-11-21T01:34:50.167000
-CVE-2012-0356,0,0,7ac6af4494cb781943dd8052e34d3779da1f304688ac4b655a628a398e1db71b,2024-11-21T01:34:50.280000
-CVE-2012-0358,0,0,5f8d38a284aeb0234149efe1c074b8e04b81c74b143decd0d0cc4f6c8366d3ab,2024-11-21T01:34:50.410000
-CVE-2012-0359,0,0,6a48b22674f376f83611f53ebfc5748b3d1a957e62f29df0efa5057cccf94c74,2024-11-21T01:34:50.530000
-CVE-2012-0360,0,0,d6989d3ca76f7b845fa3f101e65abedb81bc53292c6e0ec8419cc00f2e5d1957,2024-11-21T01:34:50.633000
-CVE-2012-0361,0,0,cda00d4ebf9868740b1faec118258aaef75875eb4a881a8a83ff4f03bbc58372,2024-11-21T01:34:50.723000
-CVE-2012-0362,0,0,e167a6446bb51e8bfa5a976bac3acea192b892bb7d20c6f01fb36367d3bc7773,2024-11-21T01:34:50.817000
-CVE-2012-0363,0,0,8be0e12945c5cff7b8b5e980821a77f5ba1bd64b261cd563cd569444c89c78d9,2024-11-21T01:34:50.907000
-CVE-2012-0364,0,0,fe1a2d8bf91738aa4c2adc8128b49cb73637fb4557ecb61ff03d88c203f96d06,2024-11-21T01:34:51.010000
-CVE-2012-0365,0,0,2f5097bccc5fe6a734e89453ecd1126d9fb53ae779fa3b4da93f2f002f1aee0f,2024-11-21T01:34:51.110000
-CVE-2012-0366,0,0,cf9b56d3bb87732b01629635c3b0a1cbab1a59a52e39e632377f101df51da469,2024-11-21T01:34:51.210000
-CVE-2012-0367,0,0,3f3efc44cc2b6370591b9eb3f5946a75c79837683c5b5fc1586754f410d2e60f,2024-11-21T01:34:51.310000
-CVE-2012-0368,0,0,bbd34437033b7c9ada0b7e53e7a7fdb459f6ae8221c5347d354344defd5dae7a,2024-11-21T01:34:51.413000
-CVE-2012-0369,0,0,e1d96365b335101edd17e98d728e2c96bb39e41fc5aa3b1f19c21fc37728f229,2024-11-21T01:34:51.520000
-CVE-2012-0370,0,0,c39b0392ab94953e17e099426f91af6754d102969f1989e67899ae9c820e55dd,2024-11-21T01:34:51.620000
-CVE-2012-0371,0,0,74c7a953f5c05d2d80e36e55b9c4f10bc6b40aa45ad6f830cac8ab786d893a20,2024-11-21T01:34:51.727000
-CVE-2012-0376,0,0,067f43281f282898144bab7db6d80dc14f3b30d0f96c47d42a2f28f3cdaeef2a,2024-11-21T01:34:51.837000
-CVE-2012-0378,0,0,41bf09178ef0d89bf4fd17791f64f38b4bde0e60c08c876b4721da3386c20d11,2024-11-21T01:34:51.930000
-CVE-2012-0381,0,0,519902c3cc00e5c3f5336a07334e32e5c37e3fe59bf23f29f485d2c8fb54b15e,2024-11-21T01:34:52.050000
-CVE-2012-0382,0,0,cdd3ca1694d7c21bf4eeb9e6b3bebfd666b9ec7d1abd32e4d4f99e78f55022c5,2024-11-21T01:34:52.283000
-CVE-2012-0383,0,0,7855ac740da243bc857aa562776986bb3f54ca450b266c499f4198798b3f8ef6,2024-11-21T01:34:52.483000
-CVE-2012-0384,0,0,411af19b95f032a3297dd70bbd53f03d28ce6a632a0dba7a3f297fd6a39f02a0,2024-11-21T01:34:52.590000
-CVE-2012-0385,0,0,5ec998844020861e805664b2c075bb466e16a2ae67dbbaf5ff5ac87ff2534b16,2024-11-21T01:34:52.780000
-CVE-2012-0386,0,0,415e2ede1bb919845528aafeb19e9475fe2c2b953492920078a4af5200814fde,2024-11-21T01:34:52.880000
-CVE-2012-0387,0,0,63b0c8da20366380a945433534cd3db6ac38fcbe5ed1a4a3e894d46849aac171,2024-11-21T01:34:52.990000
-CVE-2012-0388,0,0,90720878ee907ed948aeaa12355b41de61b3c4cfcdd0e8baf5613ac2089dde5b,2024-11-21T01:34:53.103000
+CVE-2012-0329,0,1,34e60988a1765415883a31689838a8aacb7fc70880137a3c6fa50eb50367dd47,2024-11-21T01:34:48.720000
+CVE-2012-0330,0,1,72e2f926cacbd31df5d5db51bc846d82e8eb14a891451de40efc87959373d184,2024-11-21T01:34:48.827000
+CVE-2012-0331,0,1,d37a7e87370803858d4c6fc8ebebf070c595091c6c3f9b88dc87b3c61c4b715d,2024-11-21T01:34:48.927000
+CVE-2012-0333,0,1,ed190507d2983e6eb4d0576fbc18b0d0191facb0616854d0d001ed08ee83d3e5,2024-11-21T01:34:49.030000
+CVE-2012-0334,0,1,69e1c7b92470797330ddac1119c1d23c45c0368264923b7a21d6f8494f15d918,2024-11-21T01:34:49.140000
+CVE-2012-0335,0,1,c6a7a3f8ca31e4e88c922b31d3c8fd51e55c047476a865be28ed8786f6e4c817,2024-11-21T01:34:49.253000
+CVE-2012-0337,0,1,14988409dd549ab61ba2906be4fb6708aba6d65f1967bc6b17a910911817e7f9,2024-11-21T01:34:49.373000
+CVE-2012-0338,0,1,77b38f448fd7a00a14fdc3c352025c5251c9c6c0a20d7a860e6e3e2f7d034620,2024-11-21T01:34:49.483000
+CVE-2012-0339,0,1,639a10317b8dccd41f7eada04f2b2322f3320985e9166007994a891e51455988,2024-11-21T01:34:49.580000
+CVE-2012-0340,0,1,bd50b3122e6aa1c3886687848bfe8727bf249a4153991e3138661cab91516192,2024-11-21T01:34:49.677000
+CVE-2012-0352,0,1,59dd78ca60cff65538f8e4cd5c2735046a96577afb5dfa855af409116b404266,2024-11-21T01:34:49.787000
+CVE-2012-0353,0,1,ae79859065d0071871d53d6f9a50fdefb9be49f53d5928e929c193c81dc6aefb,2024-11-21T01:34:49.903000
+CVE-2012-0354,0,1,671562f6ee304c333df9a284822b23489ab964be7764d0625f766e92963b53df,2024-11-21T01:34:50.033000
+CVE-2012-0355,0,1,b786f12e85cee9b759438efd2021f63b791eb3aa4239b73348e336e4d6d98d05,2024-11-21T01:34:50.167000
+CVE-2012-0356,0,1,75c750c446d6b0d0555abefcaf301f46d8cb440b59b22663e3c09f5604836b8e,2024-11-21T01:34:50.280000
+CVE-2012-0358,0,1,01ca70b58ec6e887f3adea9e6f94029a72220b13ddc93cedf8bc9c5c99b08520,2024-11-21T01:34:50.410000
+CVE-2012-0359,0,1,4fcb86254928f7a885d0418d0660a2016e0ff3ead178c246c7ebfd29d2b1e8e7,2024-11-21T01:34:50.530000
+CVE-2012-0360,0,1,7dbd5c422b09d56024e57d6f691dd988cda7794468b55a5c49d0b53e3aedcba8,2024-11-21T01:34:50.633000
+CVE-2012-0361,0,1,2d916732529cc1484e77de00c649b5a3c20d8ad460df63d11c9491f4ae9ba963,2024-11-21T01:34:50.723000
+CVE-2012-0362,0,1,bd38443b37f14723ca8bcb7d71d103c8e5a0266255b1b2160f3c11d51fa1574b,2024-11-21T01:34:50.817000
+CVE-2012-0363,0,1,0a9fcea56f610be7ba93b2e86bcefa41cd138e782bb34cc6d3ebe337f0702451,2024-11-21T01:34:50.907000
+CVE-2012-0364,0,1,f13d468346d3fc67741ed9792e0129d347959ab05976ee5eebdcd84b96c54880,2024-11-21T01:34:51.010000
+CVE-2012-0365,0,1,eae5b413d6f52742e63095a829132d7407b1dd6f6e4e59870f05e6974baa2177,2024-11-21T01:34:51.110000
+CVE-2012-0366,0,1,7d18baa7533e649b9f41f2255212065c66a8bdbf40fe797e519745e4390a64bd,2024-11-21T01:34:51.210000
+CVE-2012-0367,0,1,bac7e73c640894643d5615fb17a55958a7a6014aa5603c28e54d2bcfeab8f2d4,2024-11-21T01:34:51.310000
+CVE-2012-0368,0,1,c7728c86b0186ff49b8cb63e0fd701fd80f7ef631577c93d64e933db84f4a875,2024-11-21T01:34:51.413000
+CVE-2012-0369,0,1,8d95631784c29192427c5a59fa5cdb21d72124cbe19ce5389f71ff3978a807eb,2024-11-21T01:34:51.520000
+CVE-2012-0370,0,1,ec15971a7c3ae9e836843abb39959d70cc3b7a653063cf5315661bbc11cf98e4,2024-11-21T01:34:51.620000
+CVE-2012-0371,0,1,5b32ff7c34d698cf94edb48432899354472f647ffd1469713bf8adb1fea38964,2024-11-21T01:34:51.727000
+CVE-2012-0376,0,1,27633bf2387bdace65ee00e1f2f58e79769e87bd735ecb79d2e8c9c797b21c72,2024-11-21T01:34:51.837000
+CVE-2012-0378,0,1,683237bd3ff1c65334682931925d30066acc54ce06329d73969a0002692d692f,2024-11-21T01:34:51.930000
+CVE-2012-0381,0,1,f067194d9757476f03bc8ccd795890402e2d9188f3254a4894197d27b55a9188,2024-11-21T01:34:52.050000
+CVE-2012-0382,0,1,00cae1abccfed8bcadaf1efa901f3dc35df50ee8f617e639dc6a9e68c48864a1,2024-11-21T01:34:52.283000
+CVE-2012-0383,0,1,576b83a9d39db426aa740da954bad3d0ae91ae9c5d044c8e4f59e686fbc1967c,2024-11-21T01:34:52.483000
+CVE-2012-0384,0,1,ce64408e1840224ab00ab3290792b47db6bc73271d408821dcd77880dc09a0a0,2024-11-21T01:34:52.590000
+CVE-2012-0385,0,1,68351473e3cba1e4c4f20b23139635269fc890ce21c61b0e36a6072ecf0bb2b2,2024-11-21T01:34:52.780000
+CVE-2012-0386,0,1,2789eb313a66bc82feca1e9ae8c150cf525e44566aaff2f5ec56503109767056,2024-11-21T01:34:52.880000
+CVE-2012-0387,0,1,624a8124510c59101bf25d738c1e4759ae73cf4a75d3904ee6de9db55d362b59,2024-11-21T01:34:52.990000
+CVE-2012-0388,0,1,fd61089affbc101b9479ccb2889d4da60fc15b0d3cbc5006958ed32b1bf6c2e6,2024-11-21T01:34:53.103000
CVE-2012-0389,0,0,17e03df6dd95a275ed8bb5951b390831bf73288df735c8aaf19f2325b4f29267,2024-11-21T01:34:53.210000
CVE-2012-0390,0,0,2a0e8dac1d0148b04420232b80812ced77cee940e0491aea5716b6b6f5531ac9,2024-11-21T01:34:53.377000
CVE-2012-0391,0,0,99eb384a96dccbb964d2f01671e2b707e5fa7291f71849ad0ace693a260a53de,2024-12-19T20:11:52.633000
@@ -53028,36 +53028,36 @@ CVE-2012-1301,0,0,a5ea3283c7a76654049b9d53662d87086f1308af2dc29a0c4a27996c9c5820
CVE-2012-1302,0,0,06608babedd30a6d0721fcbd339ea11d7cd9a96be42e6771351a5035c23e4e91,2024-11-21T01:36:47.893000
CVE-2012-1303,0,0,433fb463ad5693801c001495f594cd68873e63237127127bbc74b2c6458ce6b9,2024-11-21T01:36:48.080000
CVE-2012-1308,0,0,52669dcfb71bba322026d8a4d2bb343e0bd58dfbe4f429f7555375d49e6aa5d1,2024-11-21T01:36:48.220000
-CVE-2012-1310,0,0,7d312cd455577ac393b220ede724a082283adab4f542325f7058a8e5179650ed,2024-11-21T01:36:48.360000
-CVE-2012-1311,0,0,8c15b6df2c075a4088bd7de415b124ec6972eec9cb396951dc8d2ae4b4268b01,2024-11-21T01:36:48.470000
-CVE-2012-1312,0,0,a3187c047ed2b77716a3bdc4fcf4cb3e3c3c9abce821dbd22af67c99b2f4b814,2024-11-21T01:36:48.577000
-CVE-2012-1313,0,0,b8c2bc651ffe24261f9cf2d1ac6fb640b611c6069d1cd143e00e545542d86b23,2024-11-21T01:36:48.680000
-CVE-2012-1314,0,0,a2c6663b6976f3d62fdd47fec4a6f0795aa2e8230c6d46bef91ef6082ec1b6f6,2024-11-21T01:36:48.790000
-CVE-2012-1315,0,0,ae51e4873250353b4b755ae2012645bc7225aab1426816001655966e607648b0,2024-11-21T01:36:48.903000
-CVE-2012-1316,0,0,def06c39019e8b47436ddad953a546760ecae8b3a659f6937aa75831607dde28,2024-11-21T01:36:49.013000
-CVE-2012-1317,0,0,f5e28f542e927ec5e37846dd127fde5444969f69db3b10be98ed9d3792d69b1c,2024-11-21T01:36:49.130000
-CVE-2012-1324,0,0,5cca044a96a48b3d7fd89f8cf4ae18380d0fab447de94e4bc3a8d41624b93c7b,2024-11-21T01:36:49.227000
-CVE-2012-1326,0,0,a81a4692591f1635041685573d271f59ceb37be943c320d7a3fa120b6768275a,2024-11-21T01:36:49.323000
-CVE-2012-1327,0,0,982eb81ea6ee4b2c30e5d96cd8349f832d9a1bacf75498070a620e2f39ba3dd5,2024-11-21T01:36:49.430000
-CVE-2012-1328,0,0,b540301ac29b301cfd366e0ac37015a1691b9516e4c5d5a9b0b56f03fd499f58,2024-11-21T01:36:49.533000
-CVE-2012-1335,0,0,f42d3c70123682e5dbc86abd7f9b89ebc646f12a7889690f0fd5b6ba514c002e,2024-11-21T01:36:49.637000
-CVE-2012-1336,0,0,0d8ac9f5814bd98c92020c2e8fd6912c8ac580f68df2d409fdf746b0a6face8c,2024-11-21T01:36:49.740000
-CVE-2012-1337,0,0,a76bd72c26f659f2315b9f2fd218fd5ead1fd38c22a6621c98f9022b689e5dda,2024-11-21T01:36:49.850000
-CVE-2012-1338,0,0,45f8420abc0711d178e39256019fa92ef131c159ddb86f75867358e3fb2b77f3,2024-11-21T01:36:49.953000
-CVE-2012-1339,0,0,debffb98ad2328102c91866b1d249c5d35e34854dd8f516c814f444955111e4f,2024-11-21T01:36:50.053000
-CVE-2012-1340,0,0,2d68b2593f8c7f023eeb5c8e4a1edebb0829e9d7f24111093ca9f4eec5c7a5fa,2024-11-21T01:36:50.157000
-CVE-2012-1342,0,0,561f104c463c3211585c54acc14b5a69a5c9f24d05399b77310752b91c5e74b8,2024-11-21T01:36:50.260000
-CVE-2012-1344,0,0,f1ef0f2b7a0d378bb999d1e76c749eda76cc6a208df345bf15b6b04aba152e39,2024-11-21T01:36:50.363000
-CVE-2012-1346,0,0,f29a1577bc00e755cce34e58d6dcd78e2ea66c92b1f49bf6fb487c5bea730f4e,2024-11-21T01:36:50.463000
-CVE-2012-1348,0,0,645bf5f4e8eac3d74f7d92f0bf44b34ee3a8850bfac6a742c1b5c53cb749d2d4,2024-11-21T01:36:50.563000
-CVE-2012-1350,0,0,f500fc76f7ad9c64d9632b04f40bf302ec1048df9e7d8c05821952b72fe221e1,2024-11-21T01:36:50.663000
-CVE-2012-1357,0,0,01830715dcd55c8652375101d7dfa4e7e3c139d11d5293c7f64f1654c16e088e,2024-11-21T01:36:50.800000
-CVE-2012-1361,0,0,2bdeaefc0efb2ee9053e2db2e6e3b27f5e537022fb351ac4e5206d532a700cf3,2024-11-21T01:36:50.910000
-CVE-2012-1364,0,0,b41406e798206244dfff271ee0800a6c6029c74ac8d4d617ca67d358678bba10,2024-11-21T01:36:51.010000
-CVE-2012-1365,0,0,78140781861430e47148915e9949410310c76239acac5cf43482dfd98188a567,2024-11-21T01:36:51.130000
-CVE-2012-1366,0,0,0977774dad3d7583916e9a2433b2223c52d67854cbd766dbef56a61ca39ea9cc,2024-11-21T01:36:51.230000
-CVE-2012-1367,0,0,ebf550f2ac517e78681ad1bfea8d57420fbe2ebc52c59d9392782f9d56d26a1e,2024-11-21T01:36:51.337000
-CVE-2012-1370,0,0,b110aa790b7b1e3c5164dda704dfcdd9aa90357562318ce605f76ba04683be17,2024-11-21T01:36:51.437000
+CVE-2012-1310,0,1,7ae3858c79a5046e8d2924c11971496cde2116d01a2953a197d3d1d5aca8ad26,2024-11-21T01:36:48.360000
+CVE-2012-1311,0,1,4a38a57eac56b45868701962a1a0d29c0973abc7347b1d242ca8bd6d431c9b6c,2024-11-21T01:36:48.470000
+CVE-2012-1312,0,1,79a3b7e895ffaaf4efd23372afa271d9889101b0dd0cbbfa9cfab3b207c63837,2024-11-21T01:36:48.577000
+CVE-2012-1313,0,1,1f7c9deebd703f28d6d02d1684ca8b6f130c8f2452e4f5565b9513389c623037,2024-11-21T01:36:48.680000
+CVE-2012-1314,0,1,264a9c6b7a25c51bb40475f2c9e518b87eab8a17e69ba060c3b98f93679acf95,2024-11-21T01:36:48.790000
+CVE-2012-1315,0,1,c2c6e7a0bebf7d43881a16dbf11cef8659d90c30a70ee4c8296c8b438e2ebe64,2024-11-21T01:36:48.903000
+CVE-2012-1316,0,1,9f6ae8d4c2a4e577283a66577b72b8723e4b06a386054f19f876578889ae735e,2024-11-21T01:36:49.013000
+CVE-2012-1317,0,1,7f0f50c3bbe5d5f1ecd9f9851f7c204a58ae8be797ff359fc70cd6c4aa4f1a69,2024-11-21T01:36:49.130000
+CVE-2012-1324,0,1,5d92d4820ba0f69c25005c528380affaff099ddfc914505d476fc31da5657c37,2024-11-21T01:36:49.227000
+CVE-2012-1326,0,1,a8aa9780ea4c69e586259bbc7c101d68d945523671d2cc8a21b775bd61557c1e,2024-11-21T01:36:49.323000
+CVE-2012-1327,0,1,057aff9a743e4888e2db7f411903e8a3b3620acbb829eaa34ca0d60b0d4d26b2,2024-11-21T01:36:49.430000
+CVE-2012-1328,0,1,1d9738db7c9005290538a2a367a21342005a3cfe2436287d28e8e82c9917e3a1,2024-11-21T01:36:49.533000
+CVE-2012-1335,0,1,86823b84023180ea5a05ed33a8bd94f2d73badf8555cec774212d4e2ff59d4f0,2024-11-21T01:36:49.637000
+CVE-2012-1336,0,1,799f7c3a096916a508dbbba06edf4b9b08d2bbe27d755dc6248ca1d12777c7c3,2024-11-21T01:36:49.740000
+CVE-2012-1337,0,1,d4e4bd4422e54f2d738bf2d15346eafa648ab5088e5fe812624e8b84cb13fc10,2024-11-21T01:36:49.850000
+CVE-2012-1338,0,1,a3d6c440f3406f73689f6c94262b1fe649c2c309079606577196569fdd57e775,2024-11-21T01:36:49.953000
+CVE-2012-1339,0,1,66cf3b9d2e673ca1cdb41ed533a6864c15d8e6283687dbcf5626949d708b7615,2024-11-21T01:36:50.053000
+CVE-2012-1340,0,1,84c4af3ee2570ce3206d0b23fb1993e2ce5a15d2a8a537622ff1003f6ed328b0,2024-11-21T01:36:50.157000
+CVE-2012-1342,0,1,5d54a9cc72eeb8c5b0e836b565292de4b4995b04740820bbeddb9b3508e98309,2024-11-21T01:36:50.260000
+CVE-2012-1344,0,1,045cac004b5e886726c8ce775d7dc69df4be5e4105573a455681ca012f4ece1c,2024-11-21T01:36:50.363000
+CVE-2012-1346,0,1,a0b6808179f091a39cd474772c7120f811ab00735c02bf2b2d41b48fce08a715,2024-11-21T01:36:50.463000
+CVE-2012-1348,0,1,1fa723da8c0c64da54c38c82ddb962c443c29f778eb64570a67848899a711a3c,2024-11-21T01:36:50.563000
+CVE-2012-1350,0,1,0d607141651e0f41026191c5fca700cb51468325bec568670943859bdbd016ce,2024-11-21T01:36:50.663000
+CVE-2012-1357,0,1,47b7487c10ff865c0508894f31145c9b04f9b14e3b98d273fff9342ae4b970bf,2024-11-21T01:36:50.800000
+CVE-2012-1361,0,1,5c02a9b61b7aed152195bb36ef82836d05978e13b28aeafe5853bc609f176297,2024-11-21T01:36:50.910000
+CVE-2012-1364,0,1,28fa22a4cb88bad2709f661afbf5af88a0c595d6effd68f164f88282efba13bf,2024-11-21T01:36:51.010000
+CVE-2012-1365,0,1,4419ab4b23e07b58d770df06af48dbb1d7667cff32fdf75f70416381cfd4e17f,2024-11-21T01:36:51.130000
+CVE-2012-1366,0,1,24441dbc70011a3111e4e0c6dd7092f1e0c606283fff3e47370ddc4fd4de0774,2024-11-21T01:36:51.230000
+CVE-2012-1367,0,1,24979416974fe3982313074db45862bb42a64a1d99811155db07a72073d0d5f4,2024-11-21T01:36:51.337000
+CVE-2012-1370,0,1,a81d741b62ef022a8a46832fe96e3de5e78fd892a3ac487dee64e6076d4737d0,2024-11-21T01:36:51.437000
CVE-2012-1380,0,0,b46c6e0613b6ef866d3833de17ee4b9032824028a4f7a37150b3a57cf0008afd,2024-11-21T01:36:51.533000
CVE-2012-1381,0,0,a747c87fd3204510ae5690433d44520fa9f49292726d86f8dd594398220b6397,2024-11-21T01:36:51.660000
CVE-2012-1382,0,0,706def0e16e1d946ee5eed1abf75dd018c4c52674e83eac9a0406b161c1e648a,2024-11-21T01:36:51.790000
@@ -54068,20 +54068,20 @@ CVE-2012-2452,0,0,2567323965584dfdadb6a56d513e0bcbd45bdeb33e2193d5d7665468f2746a
CVE-2012-2455,0,0,e4ea76498eef1233f4a7a12e365cda49793e118f7ef9f4d6b4d73380c7a1bef6,2024-11-21T01:39:08
CVE-2012-2456,0,0,35df1923d402f8e23fb2b0ec058448ba1a5a962adaf78c6c1b4b2f0bfa3539d8,2023-11-07T02:10:34
CVE-2012-2459,0,0,070deebef5b27d21b66a1dc568f5b02f251f91ca362e02b3a6c2f71775fb42dd,2024-11-21T01:39:08.147000
-CVE-2012-2469,0,0,47f50909cfabc849057c0bc5a9132d9bac4f0c861cd4aefe67bdb443e540cdd5,2024-11-21T01:39:08.293000
-CVE-2012-2472,0,0,4dfe9f99c73f7874abaae4dd8625331809bc6d7cf2ed43d5462beb43e28853e5,2024-11-21T01:39:08.403000
-CVE-2012-2474,0,0,4af3fcd108a98f13fc2239000b88fe8e99832e9546bba205322412b46e5c05da,2024-11-21T01:39:08.510000
-CVE-2012-2486,0,0,c0da4f8f7288deefb90acc85a86dfa3ca1d55bd1a8c5f015c4a1548e34e09ef6,2024-11-21T01:39:08.610000
-CVE-2012-2488,0,0,bd467c7215216a427840b62c4fbc52716ca3e3faeb27d69a8a9ac81fe6dfb8c2,2024-11-21T01:39:08.737000
-CVE-2012-2490,0,0,6d0a8eab81787ad9ae930345b6564219f5681285856812c1cfb0caae1e35befb,2024-11-21T01:39:08.847000
-CVE-2012-2493,0,0,87f4ea6272d5b5184ad044bec1b0d899d8c60f3fed805a65a957eca2457a24b1,2024-11-21T01:39:08.943000
-CVE-2012-2494,0,0,f36b9330aed6d99d8b21187f1864f961a3bdd7e07266219ede81af53b0d80d14,2024-11-21T01:39:09.047000
-CVE-2012-2495,0,0,d5ef2c820c1c2751c44aaf4a37906dc4d0f25d2b9a657bd4a2cd38587773a50a,2024-11-21T01:39:09.153000
-CVE-2012-2496,0,0,d3e9bffb112a708d3e559cd7e9d8cde83072438bd6e27d1b138fe2eba3da7976,2024-11-21T01:39:09.257000
-CVE-2012-2497,0,0,785c6056e214678323e6b202096af00acce4ebe4fc75f2be0f6a508b078c4a54,2023-11-07T02:10:34.120000
-CVE-2012-2498,0,0,6391208dca4d64e9f0278b38a65a4f33bb2ec268a366abeffe1657f2b2264b50,2024-11-21T01:39:09.370000
-CVE-2012-2499,0,0,f2e5eaefde2910235bb9fca265e788170ba55721c700b04645ecabd365ce6831,2024-11-21T01:39:09.477000
-CVE-2012-2500,0,0,de2c0b4fde8a2a24ed21c67fb9e52559e7c64fae55edef710780d03f5cba2686,2024-11-21T01:39:09.580000
+CVE-2012-2469,0,1,18928c8f405cfa9cf08f0cccb584b877aa854f6d68ac757f58991723298ca097,2024-11-21T01:39:08.293000
+CVE-2012-2472,0,1,28e3c119980e40db8dc2d55ac854ab65e506603218f2a97f043057d6c524ff9f,2024-11-21T01:39:08.403000
+CVE-2012-2474,0,1,415d0c8328ee13f1f117ea68d8276fe5a3a893b4879751ff34a75c9be5bdf04d,2024-11-21T01:39:08.510000
+CVE-2012-2486,0,1,b8acb4f28fed491468d5a35cc4030e59a53615e90f94c71cc94514ea9e99dbbe,2024-11-21T01:39:08.610000
+CVE-2012-2488,0,1,af5950d4149c5542bc2e621bd79a239dfa18fc334eddae11ac64234828dc3c33,2024-11-21T01:39:08.737000
+CVE-2012-2490,0,1,4a0cb1acf194cece25b3ef1ab26cc60ddabc7d5fb4d0c5149795689748e62e2f,2024-11-21T01:39:08.847000
+CVE-2012-2493,0,1,5e5f67211fce6f437c52a8fa5abe05d4eb2be899ca8f3160d15fba3bb38b6e7e,2024-11-21T01:39:08.943000
+CVE-2012-2494,0,1,2db36c9f1b7f1750be9796ef2e96fdffefdace1be54e0f714dfec8de9d0486f2,2024-11-21T01:39:09.047000
+CVE-2012-2495,0,1,8b1f0a37a8f5d171072256cca9f1977efd36cd637eb188d7a3ae79cff021bb44,2024-11-21T01:39:09.153000
+CVE-2012-2496,0,1,611144ba012a21f6a6e8322b51b98b379e1b955fc7ff45fa3655bf7b2c742517,2024-11-21T01:39:09.257000
+CVE-2012-2497,0,1,d8f808e7e9cab72d1d5f49aadff868360117de8c516c035760ed5d847d1f6a95,2023-11-07T02:10:34.120000
+CVE-2012-2498,0,1,034a86150842a64addbabc8c700264d8d991357df9cb4996cb5df9565f286ea4,2024-11-21T01:39:09.370000
+CVE-2012-2499,0,1,fbc757e86f2cdd88055609937dbd5f324fd3d4c4936b71cb5873612a7b00ba2e,2024-11-21T01:39:09.477000
+CVE-2012-2500,0,1,11b11b63f601951d242a3080bb6a484861dd5ac643ff5b06db7ac0b33fd18aa2,2024-11-21T01:39:09.580000
CVE-2012-2511,0,0,8354d01a77bcddeac13e1951eb8ba789de7801903add6c4ff3ba6985b4be9add,2024-11-21T01:39:09.683000
CVE-2012-2512,0,0,f4a48f5b19e987b657ed40abf83faa5d610dd0417c233761534b3537ab23b7a3,2024-11-21T01:39:09.817000
CVE-2012-2513,0,0,f3a8f11cfc7338c2604abe92d1e7f6b8579f1d56411b195dd837ab4acec2f8de,2024-11-21T01:39:09.950000
@@ -54565,26 +54565,26 @@ CVE-2012-3037,0,0,03831a9233ebe1d862b9458eea05c7354c661f4f31ade79d6fdffefc6af2f2
CVE-2012-3039,0,0,151ff774ff5ffda83500de1765f6768141e2c75291358d7cf73400aa5a6067b4,2024-11-21T01:40:09.747000
CVE-2012-3040,0,0,3e32501201870066e92343e63595223735fa4bd6bfac7b72762f9446ddbfba22,2024-11-21T01:40:09.877000
CVE-2012-3042,0,0,7e532d4785a69c2bfb567d685a3f13099ad619ec5ff5b23a454e81d8aa01e51a,2023-11-07T02:11:30.130000
-CVE-2012-3047,0,0,cc68f862e8914fb063f9063e7192ec5d59979dfd9e42d7cc2c7f02fdd58bc5e0,2024-11-21T01:40:10.027000
-CVE-2012-3051,0,0,e101c8e9ae8830adfc2e60b6a3c090b5de73752d7b32270655d6265e7717f0ad,2024-11-21T01:40:10.157000
-CVE-2012-3052,0,0,3a0fd9c57eb700fbadef0321f88603554edad879b2f0bee02a690c86894b6038,2024-11-21T01:40:10.280000
-CVE-2012-3053,0,0,0a1caa103bde4320af2a269d8f5d483f07f9f007dbe3726af28e925187b2719a,2024-11-21T01:40:10.403000
-CVE-2012-3054,0,0,00fdce90bb4bda7f4313323e0c99529c8f291304cf22c91ffaf7ca8de6518e9a,2024-11-21T01:40:10.527000
-CVE-2012-3055,0,0,a4c9a31e3c4173d79b270dcd5fc7757d2b99eacde3e589debeb619f78706f1ad,2024-11-21T01:40:10.643000
-CVE-2012-3056,0,0,d9938a228ee030d2ff0c4f1fd5d954940a9612f675a52e89e9678e771a103e42,2024-11-21T01:40:10.753000
-CVE-2012-3057,0,0,d688de95836d67da68547a44e877862c4dda9ae3e451b9512df3a0db12b8704a,2024-11-21T01:40:10.873000
-CVE-2012-3058,0,0,db1a89fe9c590fd144c274768bfae844a30bda3a0c6115ba94c6b1ccabc302bf,2024-11-21T01:40:10.983000
-CVE-2012-3060,0,0,94c916bb3a491fca08399bf20db8a2e7987c30fa9dbf61f40737485b0e683561,2024-11-21T01:40:11.107000
-CVE-2012-3062,0,0,b7e8389ee82d44016b00876d8b9fe69fccd84c2c56f30dedd014e819f084b0d3,2024-11-21T01:40:11.227000
-CVE-2012-3063,0,0,b8b8ba59272a9ebb059999f4639822bc2cb9ff8078021014e91186c0797d45ef,2024-11-21T01:40:11.340000
-CVE-2012-3073,0,0,b040e74981e02b618d18e58daa0a0339ffa980a323ec41ea297b8c865c5a62f8,2024-11-21T01:40:11.460000
-CVE-2012-3074,0,0,5a90bfb433d7c83e1eb3bcc1fe7b053d727b613e83bdfc45286ace846e069d65,2024-11-21T01:40:11.610000
-CVE-2012-3075,0,0,faae70839ef9025083c9b8414020f2f0f5fb72a5433ca8cadb5d0eb373ef3be1,2024-11-21T01:40:11.740000
-CVE-2012-3076,0,0,22fea05d9a1f62cda36d39c6ebedeab5a8c9e9d00df88c66d5b8035b2b8c3b7b,2024-11-21T01:40:11.880000
-CVE-2012-3079,0,0,f9ffdde4b164957de2826489e554a02fcf0e47fdf5477fa804f959e93102742f,2024-11-21T01:40:12
-CVE-2012-3088,0,0,fa2a53454feb9e0ec8f2c63b39f1516e53d03b4bc6b7aeb1eaa824a0d4657585,2024-11-21T01:40:12.127000
-CVE-2012-3094,0,0,97c5542e5b232aea06276d42114f5a618a9531d7f5b63a0ea323159fc5e756af,2024-11-21T01:40:12.240000
-CVE-2012-3096,0,0,4dc61455a6feed48ea0aa7c96a1c09a38bbcbbff8328b8394606da9461de9edf,2024-11-21T01:40:12.363000
+CVE-2012-3047,0,1,c23dd441fecd789a819743de517091f061f6ff6b8acb3a4e01a54f7bdcd2bfa9,2024-11-21T01:40:10.027000
+CVE-2012-3051,0,1,ccce144edfcecac9119199943ba871acde943ab445642896c751f4911f766233,2024-11-21T01:40:10.157000
+CVE-2012-3052,0,1,da48beaa58fc1385f41917d7bea092e20f3d46235b76b80db6f33fcc8d91079d,2024-11-21T01:40:10.280000
+CVE-2012-3053,0,1,4104dcbeac4d2225d818a7db9697c1e2109b33aac3a0dfa1e2ba98ff305401d5,2024-11-21T01:40:10.403000
+CVE-2012-3054,0,1,7f205747edc2e0b4970c92731ba62e838d3cc65e0ea382ec0724e71f36ec1be4,2024-11-21T01:40:10.527000
+CVE-2012-3055,0,1,246c9281313fca8410793abc969bb47b21738775a38eac1bc2eac08c1a487d56,2024-11-21T01:40:10.643000
+CVE-2012-3056,0,1,97c9daba73d3ff3fffdb1cdbe4205184f961836d54d78edb1eb3db0b22d02de3,2024-11-21T01:40:10.753000
+CVE-2012-3057,0,1,5a841e54d6decb139f6a1ec28d3d4de2c671757d2970c1d1470f3e392bf4e9dd,2024-11-21T01:40:10.873000
+CVE-2012-3058,0,1,0df828f97b2f8661d83ef72b54211d429c0929dac66f228f4c867424367d28d0,2024-11-21T01:40:10.983000
+CVE-2012-3060,0,1,6059967a2b1b05d0bb594580e11235ad4a602f105c8b741d0e9cbfa085f22818,2024-11-21T01:40:11.107000
+CVE-2012-3062,0,1,aaf4cde8fa9c1d5b36fcd29873fb6e84195c39d71c10d4dd8dd80cdbfbae0975,2024-11-21T01:40:11.227000
+CVE-2012-3063,0,1,ac6ff8233a29e6483ae057ae7e930fb04aa6403bc5a2add43ae798dec7128188,2024-11-21T01:40:11.340000
+CVE-2012-3073,0,1,25b3dfe89131201078f02a1ed4c3de1c89ccebe20762f1c1a75b7b40b6da09eb,2024-11-21T01:40:11.460000
+CVE-2012-3074,0,1,f7910784d1e60355e6bdd5e07c94f12b4343b143f7fd022b0bcd72369b41b5e6,2024-11-21T01:40:11.610000
+CVE-2012-3075,0,1,da78ff47a42755be384f1f6f3b1b71d2152ee36d10d1ebdbeeae763a6ef36281,2024-11-21T01:40:11.740000
+CVE-2012-3076,0,1,ab1ce266135233bca9c02aecb930b705b7377f1fd196651eb2773f069885ea17,2024-11-21T01:40:11.880000
+CVE-2012-3079,0,1,d802cb943ef6e101d3bb80e6fcd65e9a8547116288c1e363723498cdadbffefd,2024-11-21T01:40:12
+CVE-2012-3088,0,1,d6e61523b958d275ce4d19b29d1365ee43b068a3f7ec9f4744ffba0c785bb0e7,2024-11-21T01:40:12.127000
+CVE-2012-3094,0,1,60ff5a858164d755bbd2eefdcb8ae6d3468a47f88cb9e79a8833cae593485dc1,2024-11-21T01:40:12.240000
+CVE-2012-3096,0,1,4b602593435765dbd40c72c350bb34f708a81efef30d783f7a5cc35efe0c3ece,2024-11-21T01:40:12.363000
CVE-2012-3104,0,0,563a33e257c8753e4805bbd884a8558e12339b5e201f89353ea70b478543cd87,2023-11-07T02:11:30.563000
CVE-2012-3105,0,0,5e43f0d5e11810eb1250fc1726f533ce4ce2a0131cf13f0e347020e8a93dc26c,2024-11-21T01:40:12.503000
CVE-2012-3106,0,0,a66fc8439ce53127af3661ae45e009d3cd7731524836970dedc902bedd1976a4,2024-11-21T01:40:12.690000
@@ -55325,27 +55325,27 @@ CVE-2012-3887,0,0,055f9b15a972cd340c7034b8de5c7f328b13c19c892fdd40c6770b0335176c
CVE-2012-3888,0,0,5563770fa1d0e0c3a8a7bc9336686e964e7e36b3b0a112526f3b2fc30f08021d,2024-11-21T01:41:47.873000
CVE-2012-3889,0,0,ca6bacefb8b89ce0212d88ffb1efd9385e4a0fa8d7b78d7501369b63346fbaae,2024-11-21T01:41:48.017000
CVE-2012-3890,0,0,945ba3a0837864ce5f5d0ce5c628b69f464600b4cff202bdf3a868abe5bbb4f7,2024-11-21T01:41:48.180000
-CVE-2012-3893,0,0,d7b08df98fb77116e17f74ce443f2a61e3df2a9c511f6b7acaa435c572615087,2024-11-21T01:41:48.337000
-CVE-2012-3895,0,0,3f447cff047abff8ef046f59a37a2481f0b4bdf90c7c565c44540e6ba09c1f33,2024-11-21T01:41:48.443000
-CVE-2012-3899,0,0,4cf4a6d4f3ffe7b29be26a861c112fe04ec26569b214c54f0b6cd48aadc96e2f,2024-11-21T01:41:48.560000
-CVE-2012-3901,0,0,828bdc88a3066f11a68c9f156e78a128254b1c8acc2b389f6aabd36c1fc8a3e5,2024-11-21T01:41:48.667000
-CVE-2012-3908,0,0,5aef065991396dec4e41d7d8606d34005e8310b8680e32927c2b7df0880916c5,2024-11-21T01:41:48.777000
-CVE-2012-3913,0,0,9eb9286b089e9bf1730ab83be10ff3ec97f5ce32f28afe401a58e9e727f9605d,2024-11-21T01:41:48.890000
-CVE-2012-3915,0,0,d8666d2dfe79395a542745af75716dec3f458d1e7a6b9e0d1c59a8173e0f942b,2024-11-21T01:41:49.003000
-CVE-2012-3918,0,0,a8aaae2139e2e28cc530b470a72d1cf4af1dac2003d2d4ca7994d57ad94f1ad2,2024-11-21T01:41:49.110000
-CVE-2012-3919,0,0,48177f9d1501e7de652c3476d4c64fda366fc9d3d565b918547e5b57e101ae4f,2024-11-21T01:41:49.233000
-CVE-2012-3923,0,0,18fe39c5e83b1962c14e130d3993d3222a4b3f98070dd57d51c17f66fd0e877a,2024-11-21T01:41:49.337000
-CVE-2012-3924,0,0,e210caebd0c332408549d18be38c778d7f7b5e2ee456bfb955f7da7f2a4ba42b,2024-11-21T01:41:49.450000
-CVE-2012-3935,0,0,d73e5a904e4eaacae4459d8574f3b73d63d4e88892c0f1d17d46fb1d635884d1,2024-11-21T01:41:49.560000
-CVE-2012-3936,0,0,46df8b6f26f92fd0a1f48602ce0b95b5123093c541fa9335ee9b41296f353cff,2024-11-21T01:41:49.677000
-CVE-2012-3937,0,0,58c7f76034b39d61af4ba21a1da36d20314c9611f588c97a41982ae398a1cc26,2024-11-21T01:41:49.793000
-CVE-2012-3938,0,0,68acae7d83de52a133bb10acdf480bbc78b6f9dc0190ca40ef1d450127020082,2024-11-21T01:41:49.900000
-CVE-2012-3939,0,0,a2e6eaf906dee545bd8e0d31479bef8355448295dc2b82223f7358a9b976d0f8,2024-11-21T01:41:50.010000
-CVE-2012-3940,0,0,d1eeb7b566e9aa4de65c9470223be6246bbe38aca0a2eca22c08be61a2c305ce,2024-11-21T01:41:50.127000
-CVE-2012-3941,0,0,1634386d0ea13b706a3a106186295502d6e0035763aa5aa00932db27979381dd,2024-11-21T01:41:50.253000
-CVE-2012-3946,0,0,960aea7b14bf29b5af3ea849d477574b696c99b0c96684ff93a38beda7a2be51,2024-11-21T01:41:50.377000
-CVE-2012-3949,0,0,616421a8424a8b3f88638f00265a09e2ee8b129b1fc1caece83a3357d6927fea,2024-11-21T01:41:50.487000
-CVE-2012-3950,0,0,f27f2e068a6e4b168448e876d13bf26ae11e2d5a8f676c04a89dbedeadd4dc2a,2024-11-21T01:41:50.630000
+CVE-2012-3893,0,1,a5f713499b50dbfaf065d489ae7dd7aff2a6d04638319aaed44cd44771194ae3,2024-11-21T01:41:48.337000
+CVE-2012-3895,0,1,94e2b33afd51f47d03b58ce6c2c7eca4a43a532c255e1eac9f38597563593098,2024-11-21T01:41:48.443000
+CVE-2012-3899,0,1,ceea5a0aaac9aeaabebd38f9d97768d05ae6b7817bf3c2c5a65f387103d7f102,2024-11-21T01:41:48.560000
+CVE-2012-3901,0,1,ebfc0cf11a19311d7cab51840f696fc4e385e344f0bf98268683e22c358f4c34,2024-11-21T01:41:48.667000
+CVE-2012-3908,0,1,9d7624d53863c382d2c15a9b67d0c7a597a1597f432fb26c3b506c693b9d48e6,2024-11-21T01:41:48.777000
+CVE-2012-3913,0,1,ed35042388d90d307e13cbe2c525a4e1f8e064c4feba40265dac74adeab681db,2024-11-21T01:41:48.890000
+CVE-2012-3915,0,1,6a33e84e6dae470128fa00b6ca6313c9583ded7c2fce16b1d5ba4084fcc80f40,2024-11-21T01:41:49.003000
+CVE-2012-3918,0,1,4e1a2c231c71076e5783789d9ece1b445e56ab304062ad0adbc501ee84aaaa3f,2024-11-21T01:41:49.110000
+CVE-2012-3919,0,1,b76e102c44e4778e22314fd9cc841d40c2a0b22c116707562b0a38842bd7fb5b,2024-11-21T01:41:49.233000
+CVE-2012-3923,0,1,f4d579951b495a31c570db1d4aec49539d869250589bbadcf6cb8b99fa94c7ac,2024-11-21T01:41:49.337000
+CVE-2012-3924,0,1,ea833c73a3560e78a9532335197201cea7edb0dc77cf253e490c94f05eaaa382,2024-11-21T01:41:49.450000
+CVE-2012-3935,0,1,c10e49768ba79f0fbe7fe6a9eb1e00d6577b2c79a0399c87f1c7ce638a96ffd0,2024-11-21T01:41:49.560000
+CVE-2012-3936,0,1,fdf9fc17bc971b7d0c8c404fca9359b72065dc4cbded9dacad263bd9bb62f47d,2024-11-21T01:41:49.677000
+CVE-2012-3937,0,1,ba14fa5c13f743ed70d77707843e37539dbf20d242bfe96b7d1b89cc4110359e,2024-11-21T01:41:49.793000
+CVE-2012-3938,0,1,a4efe315dd9e9cb93fae2f80745b0506f90807383259241209fbce52e0fc6bd9,2024-11-21T01:41:49.900000
+CVE-2012-3939,0,1,b2ed0a84815f8d2d29944d7ac2766362aadc6f9cbd459247be544a25b9ce75cf,2024-11-21T01:41:50.010000
+CVE-2012-3940,0,1,ef13b05529c00d43bbc4b28b68d5f1eddfeb1b821aa5d01f552bddbeafab7f7e,2024-11-21T01:41:50.127000
+CVE-2012-3941,0,1,5fbc6f8d55b9aa805b23e91400c1b9a8d6b6b62957a91d53102706766d1a993e,2024-11-21T01:41:50.253000
+CVE-2012-3946,0,1,f6dfe520055e78e784144769c8c7d030f67fcb3191b7ff817a7b6f60212e9036,2024-11-21T01:41:50.377000
+CVE-2012-3949,0,1,77054ed3fe472dd7102ba57bd901505b62267ec5656af9937df075f66b1fef1a,2024-11-21T01:41:50.487000
+CVE-2012-3950,0,1,18d3b0a7e4cad026fa995762d7f4cff5368ad508a3af21cfcc8a614597ce3b7d,2024-11-21T01:41:50.630000
CVE-2012-3951,0,0,7ca1dd12b8b6a4331ecf67dc0dee9e863f58419327a7f0eb38b9b0d122d1a6c3,2024-11-21T01:41:50.787000
CVE-2012-3952,0,0,59f2dfbe1df5f3ba5e037b663ed627edb87dfc62915f1ffc7d0cc540a0f73769,2024-11-21T01:41:50.923000
CVE-2012-3953,0,0,5d6e8b46bf4645e1791656b086202d6b1c9575b3cc41695339add208627cd570,2024-11-21T01:41:51.067000
@@ -55459,76 +55459,76 @@ CVE-2012-4068,0,0,b959e2e7e27a0285328b839e7ff3a0057936475da0690be02aca8f097b2ed4
CVE-2012-4069,0,0,c3b3278b07083d2625d5cf5129f1d0a9b80e9021914540bd27d55731419cbb10,2024-11-21T01:42:09.593000
CVE-2012-4070,0,0,02ab1240dc6c94710466ed20e44d4cb65aabf620812ce2e5315e8999c44ec4eb,2024-11-21T01:42:09.753000
CVE-2012-4071,0,0,79437d3b7386661c025092a7468e780c12fc600dbcb7fe1874db544fe17b735a,2024-11-21T01:42:09.897000
-CVE-2012-4072,0,0,a767ac7895d4432a34af16a68a5315e149ff10c4f0492197eeee69b6b7c90282,2024-11-21T01:42:10.040000
-CVE-2012-4073,0,0,cf6c0832f9ae30c5839bcdaea6fe946df894440ad5eab0125600b90c78f11ce6,2024-11-21T01:42:10.153000
-CVE-2012-4074,0,0,2b492dd293169cdd8d08c20c9c40a7fe0918851f87a05156e97607c65155c235,2024-11-21T01:42:10.263000
-CVE-2012-4075,0,0,f12d7b5e757dd8fc0c655a28c10613e81b00a45eb69a25c1d276ce1949877e91,2024-11-21T01:42:10.380000
-CVE-2012-4076,0,0,f0c6d0319d31898e3cdf853565384bddbb7ae01b61eb783aeea74d8043524cdb,2024-11-21T01:42:10.483000
-CVE-2012-4077,0,0,2723d0a5aa9a341004ed839a474d3cfac035437aa00777df4152ef88f321fa64,2024-11-21T01:42:10.600000
-CVE-2012-4078,0,0,19c2001c0fd5b02894fdc334cc2e334c37c61a72b1d05a9d69bb5fb9f3395c0e,2024-11-21T01:42:10.707000
-CVE-2012-4079,0,0,21d13638f0e841404f873b7dbb6e2b39d6a453b7be3b7a5794c40323190d0926,2024-11-21T01:42:10.817000
-CVE-2012-4080,0,0,b4d35625d110bff1afb3b4ff6758b2ebc39aad4ceb34497f9f5025392e086944,2023-11-07T02:11:42.833000
-CVE-2012-4081,0,0,f34a691073f384876fd6e0d74e4f3ce31bd17ea04ce58bf4bc7c6f6efec6af5e,2024-11-21T01:42:10.937000
-CVE-2012-4082,0,0,cce5fffb863c6833580fe5d1ca24252e98b0b61526068df97793b80611e4bf7d,2024-11-21T01:42:11.053000
-CVE-2012-4083,0,0,3c814466bf57679d9277e583a76df75936c6551358afaf38922b5ce0c0ea8334,2024-11-21T01:42:11.160000
-CVE-2012-4084,0,0,63124bf9aede5e34aa13b28fcd37ed3ec966357d3b8a43008eec45da6dc1822c,2024-11-21T01:42:11.263000
-CVE-2012-4085,0,0,089ec4a8467b2b38e6b1de1928e2d8fe3134e02c825ad3cc05b56232dfa2c41d,2024-11-21T01:42:11.373000
-CVE-2012-4086,0,0,caf229d45c7f9979f3bc94eb36a57d17d8b60a8fd4b2a2605dad0ee15898d9ed,2024-11-21T01:42:11.480000
-CVE-2012-4087,0,0,6e0df1c3d37dc46b6175f736717c1cb4ae51eb9bc38f3d8b7cd35282274df4ae,2024-11-21T01:42:11.583000
-CVE-2012-4088,0,0,4c72615ac6ddd4e6d3d072921b8fa0a39390db6bca8df902da9301152cf5fc48,2024-11-21T01:42:11.690000
-CVE-2012-4089,0,0,f1fcbc68418f2539749abd1e20a66c29517ba9d023aba0271d88b932c259d719,2024-11-21T01:42:11.800000
-CVE-2012-4090,0,0,299d17b8709a7781c69921b6b55c735fde0cbfd9af71411057d860e1daa40c3e,2024-11-21T01:42:11.907000
-CVE-2012-4091,0,0,22b1d021a3e0fb29f2dca494ce277ab36b7d9ec9cb35cc58a282564ee77706e7,2024-11-21T01:42:12.020000
-CVE-2012-4092,0,0,326ef5a801c44cbb5aad13753660fd0db113c6915a21938e980d0f8c8f6764e0,2024-11-21T01:42:12.137000
-CVE-2012-4093,0,0,d2b4252d1008d700c163eae453aa6f8d4d878d00d7733f3df0d131c4cda6756e,2024-11-21T01:42:12.247000
-CVE-2012-4094,0,0,77b01bc700b02c0e8a31a2b095bd2d342ee2cef58472d6c71b4b561b78bc2007,2024-11-21T01:42:12.357000
-CVE-2012-4095,0,0,82a7ba0ade9b66f0bae9f34823e2d4d7ba9a51422dbe33c7c6e61b8fe99aa069,2024-11-21T01:42:12.470000
-CVE-2012-4096,0,0,cd65ce2ac786deb1a13d52dd65a336136d9517914841dc616806c8d340b4f8df,2024-11-21T01:42:12.570000
-CVE-2012-4097,0,0,2ec2da9ff1a77e7355396e0322ec08fcbb55c604543136dced325b557c984487,2024-11-21T01:42:12.667000
-CVE-2012-4098,0,0,c1cbc6b52eeb2d7147403eb1b0d4ce668dd681301824d01df328f02788b7af17,2024-11-21T01:42:12.773000
-CVE-2012-4099,0,0,936c3b112e462b6268be453b530f9dc0df45b9a5738e7f27e79e9cd5b00ea112,2024-11-21T01:42:12.883000
-CVE-2012-4100,0,0,3868995635c038a7c51c33c23887024ad6c26766712a1093dbe660bdaee4f1bc,2023-11-07T02:11:43.193000
-CVE-2012-4101,0,0,dedf06a009204f87582dc53d01759d61ca9901ea32c4d5a386209c3a25d3547c,2023-11-07T02:11:43.400000
-CVE-2012-4102,0,0,11c22927165a5ecf89c305f3d3bbbb1d68c3a4bacfcc968b192f31ccbe2e4582,2024-11-21T01:42:13.047000
-CVE-2012-4103,0,0,db47e858f3f616909e40ae953fb1d75a4d1e2241ff6aa33c7dcc51f424f61313,2024-11-21T01:42:13.153000
-CVE-2012-4104,0,0,f9669357efdd153d1db92a789f2eedf5ad8edb79f95a0d261ea7d3397f814762,2024-11-21T01:42:13.253000
-CVE-2012-4105,0,0,8dd8bfd79523a6942e8610d42ea8ae2ce201e41c613446ad219659699b334ae7,2024-11-21T01:42:13.370000
-CVE-2012-4106,0,0,43932ef151e55d4fffa27d31b562543a6e1aa6aa126394096b1b6809f7d055de,2024-11-21T01:42:13.480000
-CVE-2012-4107,0,0,40abe64ca1cef38e96139c61916d7c85e22a9af81edbb58e33828232a96e74e6,2024-11-21T01:42:13.583000
-CVE-2012-4108,0,0,eab4135ed36f3645bf252fc932c2e67ccf7d30777867113b7549af7eb89bd5dc,2024-11-21T01:42:13.687000
-CVE-2012-4109,0,0,49aefb32ac2ccf6d5d701ca61f8c3c4144e178cc1a6f33cc4f427fb7ea745d36,2024-11-21T01:42:13.787000
-CVE-2012-4110,0,0,a5051fd33f30bf6908f3d8ddb0ad6cc0b40aaac38857ae464b4f4060f9c1eb26,2024-11-21T01:42:13.883000
-CVE-2012-4111,0,0,5d047e75b7aad60791daff6ad67ac9d669e918424dfc705044fbaa53c778c515,2024-11-21T01:42:13.987000
-CVE-2012-4112,0,0,179957150e5874b7e04f639e3045b0c8f709eeac86b14c6f7c3fc1945f94b62e,2024-11-21T01:42:14.097000
-CVE-2012-4113,0,0,94f4ef28c9914bd3fdb0c26ef28a964af5281b4c8633fce5586195f8c46cefce,2024-11-21T01:42:14.197000
-CVE-2012-4114,0,0,40d1c51ce3bd8233aac57d10a7d1abff199e066c57107b1acb3695df28c9d5f9,2024-11-21T01:42:14.300000
-CVE-2012-4115,0,0,d4d332fe90ce5e1fba18f9f6155ac14579132b381d9d839a91b44e74ea1be355,2024-11-21T01:42:14.403000
-CVE-2012-4116,0,0,db814f63cefbaa209b33d172acb35ea59694bac36e4838bd59800980aa542b7f,2024-11-21T01:42:14.503000
-CVE-2012-4117,0,0,9123d9ef0aa82e453fe24c9a0db3a77c1286eb93eddb3508a180d94fca8ac025,2024-11-21T01:42:14.603000
-CVE-2012-4118,0,0,ea3be5980514519cb762187306808befe4e924e1400075736e39299c15b35db3,2023-11-07T02:11:43.710000
-CVE-2012-4119,0,0,154e957bca2cf884d0c168b36c5b4285d7968ef98cb3aa38a5aa91980b54307a,2023-11-07T02:11:43.920000
-CVE-2012-4120,0,0,239c44bd422e04a02fd80f6cc7b4a5343a128ac81bb0a8f9b94e7f152a76b719,2023-11-07T02:11:44.200000
-CVE-2012-4121,0,0,b4adaacef319404d0cf77a937c1223d9748cf1beed4d3dc30bdc194c56c291e8,2024-11-21T01:42:14.767000
-CVE-2012-4122,0,0,398db2287bbbc1a0e68fc91a608badb2781ec12c2a8483a48c2978059784797d,2024-11-21T01:42:14.870000
-CVE-2012-4123,0,0,1519c15aec2c4e08f4bf5b24a785480dc6d224c5dddfed44c65403379a9f9c4a,2023-11-07T02:11:44.487000
-CVE-2012-4124,0,0,898bde7843a6644143eb0313423436de54089d5161f11a478b56f4082e6507a6,2023-11-07T02:11:44.700000
-CVE-2012-4125,0,0,20492ed0aaae76f5a18500147103b5d88aa6c7b2f34d1b721cad1181241306a0,2023-11-07T02:11:44.917000
-CVE-2012-4126,0,0,ae4ee1477027fa110e8bf7b6668a40c7b318e15e0289d506cb8d9b31504f18d7,2023-11-07T02:11:45.190000
-CVE-2012-4127,0,0,de2e1437690bef489962d5e465debf079b1c5076f5bcd48f8a80845ad25d7d07,2023-11-07T02:11:45.410000
-CVE-2012-4128,0,0,556b8900cd6d988de6e24994500c6c77ab9e8288dd5fcb62b0090467327f91cd,2023-11-07T02:11:45.633000
-CVE-2012-4129,0,0,1542084f87c18d4bd6ad96e3ccdfa995feed139404ce299aa623b491a7376548,2023-11-07T02:11:45.860000
-CVE-2012-4130,0,0,5f0dcc66d1518b674ff244ce364f4d0e5671ca25f4232f13e478cb15e387323e,2023-11-07T02:11:46.077000
-CVE-2012-4131,0,0,e2e7c10100be1c78649c313f85279b6b6e50d5106445911997263327bb3d21ae,2024-11-21T01:42:15.070000
-CVE-2012-4132,0,0,de26a07ca8affbb49c0eab7b7dbd5552fa4136774b3cceefa3a07e157ff74bf9,2023-11-07T02:11:46.310000
-CVE-2012-4133,0,0,313ca750d690e04ee579e9ded226a8990e20ad9a9e3ce75b504bfe2770b0c75c,2023-11-07T02:11:46.527000
-CVE-2012-4134,0,0,6a8e71285f6b73e1d145d34a8a1a648ef20275e21e6c6abedbd3601c4d360c6a,2023-11-07T02:11:46.743000
-CVE-2012-4135,0,0,15261f4f0dbfc731dcf5ea81102124c9bc72e50c9a42b7e886fcc1151918eb94,2024-11-21T01:42:15.210000
-CVE-2012-4136,0,0,757194f3702a5752a26c005e7f1f488ba8acf1b7580bd40246bd0798072ef0c9,2024-11-21T01:42:15.330000
-CVE-2012-4137,0,0,37f2543aa6abc544a122fe8dc8226e4e39c69c38cbdb686f5c44e7c1a72519bb,2023-11-07T02:11:46.977000
-CVE-2012-4138,0,0,b3b96296e2de78be5e2a415d08654ff05419a492356d932c8b1563f41b072e4c,2023-11-07T02:11:47.197000
-CVE-2012-4139,0,0,7b787d47740e6ab1b6b6c4dde2beddffea2df7a046db20ef9c3568d83965868a,2023-11-07T02:11:47.413000
-CVE-2012-4140,0,0,9b439be132ae49b253f972c9ac136d71b2c7d489b264b544b2780a91574fdea9,2023-11-07T02:11:47.633000
-CVE-2012-4141,0,0,8ba2e79508146b263363237dfa747361595022ddd6c1639fc027a1c87a37d756,2024-11-21T01:42:15.480000
+CVE-2012-4072,0,1,240551a56674e5163265bd1417b590b5e6451dd4e920ba4fc12a084196896fd9,2024-11-21T01:42:10.040000
+CVE-2012-4073,0,1,6e1f1f1b7e148dbc39a24a97360fff281d8837fd3d3a1f4274d06d61cdf4d0dc,2024-11-21T01:42:10.153000
+CVE-2012-4074,0,1,94f1ac9cea73fe0c27a44fddef093ee65498c0ea1d693789522bec8c832782db,2024-11-21T01:42:10.263000
+CVE-2012-4075,0,1,b44240e8d900b7e56d05614af368e4b521b3bf1d65b8158ecf290fa9180f44be,2024-11-21T01:42:10.380000
+CVE-2012-4076,0,1,d91dd2bf1321b12e631e60f19c3a89449540e53ae813e6b25aa8e0a93b73976e,2024-11-21T01:42:10.483000
+CVE-2012-4077,0,1,fc60bd53c5241307a11ff4e23e1e9b7a3a340d7ef371bd37c3fdbba2077b5625,2024-11-21T01:42:10.600000
+CVE-2012-4078,0,1,9362aad85777a25bea1f1534bd283b2d2fde97a441e0b4cf01e96fa6bcc58fd1,2024-11-21T01:42:10.707000
+CVE-2012-4079,0,1,728e677f750d657710382e4175b0994f092dc273d947ad54a47128d67f659cc2,2024-11-21T01:42:10.817000
+CVE-2012-4080,0,1,210f336862c3a14af790ad605663011bad61819f79c4b9839dc688ff49fe49f7,2023-11-07T02:11:42.833000
+CVE-2012-4081,0,1,d6885016d56b3125283dc6ba85cd220a37b9f7fdc736c8dbdd2f55861143afc7,2024-11-21T01:42:10.937000
+CVE-2012-4082,0,1,a8b4fd53cd58abe235b8a23f9201a9e41cddf8983dfd6052bfdaeb01e4bb2ff0,2024-11-21T01:42:11.053000
+CVE-2012-4083,0,1,e9029b057ff7a782ff53b8d61bb5aec6e9852639716f3b26ab2939678a549f13,2024-11-21T01:42:11.160000
+CVE-2012-4084,0,1,2f9def007322b67eb0ea7442580038ff0172bff38b9ad3075ab9f7f4d0022786,2024-11-21T01:42:11.263000
+CVE-2012-4085,0,1,4524da4bfc7cfb5ed02c4d8c7567185b7fe56987d85b140a3194758cfacbc41d,2024-11-21T01:42:11.373000
+CVE-2012-4086,0,1,fa7b13e6c0a1cd8982b2afdf9b00a20169fe48cbf85d66fb1699f3d897984cc9,2024-11-21T01:42:11.480000
+CVE-2012-4087,0,1,48aaf79a23d38e7c1a1496260bc3a240ec44b5f4809583a1b6877026f9dde34f,2024-11-21T01:42:11.583000
+CVE-2012-4088,0,1,5ec26126092b6d36c88e661f0808231bd389cf0e412d8faf540e3a848bc6bcea,2024-11-21T01:42:11.690000
+CVE-2012-4089,0,1,65d77afe279cfd81ad180b101003670d8fdc0b7b7c97beda52d287f99df415ec,2024-11-21T01:42:11.800000
+CVE-2012-4090,0,1,5eec3f3e1142ccb961a8a6be4801445d24c1cd4eee04e36a2355812b9f308735,2024-11-21T01:42:11.907000
+CVE-2012-4091,0,1,f2ad4de0a64ccbe4a086151f7f686166a69e401fab1f9581ea131fd41040981d,2024-11-21T01:42:12.020000
+CVE-2012-4092,0,1,c08becf9ccde354106ae0d0cf80bf1fe073b6218b010f7b221be0a80f688dabe,2024-11-21T01:42:12.137000
+CVE-2012-4093,0,1,f2ae9839b3afaca741e50f133a836631caa8c96c53cca478e9cfee57a90610cd,2024-11-21T01:42:12.247000
+CVE-2012-4094,0,1,3369079608da7af44e21d74f5dd34b5a9d04e4906b9f3af0f1fe8ec424dc72ef,2024-11-21T01:42:12.357000
+CVE-2012-4095,0,1,7fb1dc26fdbdae3fe71e8f11913d2bd7be6e18c1e28713e329efea0536e335d1,2024-11-21T01:42:12.470000
+CVE-2012-4096,0,1,65848a4044eb7f7a40a57d23725230650ce465cda11ef5cc9de990baf39644b9,2024-11-21T01:42:12.570000
+CVE-2012-4097,0,1,19f0a8a3a1b5057f142ebe6a542467fc861b68eb8fb850703cd28dfd348e23a6,2024-11-21T01:42:12.667000
+CVE-2012-4098,0,1,904c8128dd599234d8707d6b962ae1d9d2f2e5c86aa1ea97df90aa8ae51e66bb,2024-11-21T01:42:12.773000
+CVE-2012-4099,0,1,58c82479437d31bdd39ce7250900ca6f364045e9206e00ef9dcd50aac806d6e1,2024-11-21T01:42:12.883000
+CVE-2012-4100,0,1,3b467fa2e62fe11a4f1bc67e6986c093def22cee41305e672b5a97016e6eaf69,2023-11-07T02:11:43.193000
+CVE-2012-4101,0,1,e479f564743abf34b0b4131f30355b43eef574fd0388901ec80bdb1318d19d6c,2023-11-07T02:11:43.400000
+CVE-2012-4102,0,1,551a902b9af84f0c68ce08f5bf3f6caa75c9a2b23d14e4d85aca31f2d6f28e93,2024-11-21T01:42:13.047000
+CVE-2012-4103,0,1,0f070c8c2ef1fd7160fd00c11d10be378ae0448665a6363b4f8781a9da7cb227,2024-11-21T01:42:13.153000
+CVE-2012-4104,0,1,efcf8851af01588f9d41df4457f868ffd146d4ccdf50afb00c711cd5fd963368,2024-11-21T01:42:13.253000
+CVE-2012-4105,0,1,4b251800c8543043c117d3e1b944354ab70348af3d3850808715c0c76e0e6f8a,2024-11-21T01:42:13.370000
+CVE-2012-4106,0,1,5bd60f0890d4065c1c6546a7c0434de830ff71f33ab5f6b31ca978d2be2543b4,2024-11-21T01:42:13.480000
+CVE-2012-4107,0,1,409688e11b1b30723c1f9949f96de15fd3ed91d54a6329c9c0009dfd6376a3d3,2024-11-21T01:42:13.583000
+CVE-2012-4108,0,1,1511c252ffd9803e12da3d96184ec57165c73c60b34db28402c76b2ddd7db69e,2024-11-21T01:42:13.687000
+CVE-2012-4109,0,1,a87e4adac1de9dfbe3c0c7f1546d5851161c950d8715c7c3e8128a712ec531ac,2024-11-21T01:42:13.787000
+CVE-2012-4110,0,1,6b84a253ef709be6e7e099b165a5597a45dc6eb2a7d25f6712ba02c05ed9c0c5,2024-11-21T01:42:13.883000
+CVE-2012-4111,0,1,a3d1be85a973506c64a070081744bca80700fb6ddeca7e299bce4feac413e28d,2024-11-21T01:42:13.987000
+CVE-2012-4112,0,1,6029ec67273d99cd8e106309d922c3713b954ac209e68173db0af8e2e088cad1,2024-11-21T01:42:14.097000
+CVE-2012-4113,0,1,4025d699bef28cdc63d3766a9b92245dca949c52107ed6ec2b2843e52406f7f4,2024-11-21T01:42:14.197000
+CVE-2012-4114,0,1,acf0777639bd386c997a5fbb8f24bce3dce3d8b9c4eec7dca88b39121bb70e37,2024-11-21T01:42:14.300000
+CVE-2012-4115,0,1,3d0ef4fd3df345cc06379af5b1de17df78bc9c1f21b1cd231a46ca82cb61c834,2024-11-21T01:42:14.403000
+CVE-2012-4116,0,1,1e7669dfc3ea63fd6eebc179244b738329d249edf410efeb258ecbaef1cf15ae,2024-11-21T01:42:14.503000
+CVE-2012-4117,0,1,06d238f5ca73a4479d6ecf6011edc48dd64d0ce4d37f7e2faf06bd790242eb7b,2024-11-21T01:42:14.603000
+CVE-2012-4118,0,1,f5195a27196f27cd672400d97d85df420f7661b2dba62d8a382548e8b746eb98,2023-11-07T02:11:43.710000
+CVE-2012-4119,0,1,aa05620d32d40c8749b81a6e3671d8f82a0d3cc680528d6ee0a82e2ac3c7980c,2023-11-07T02:11:43.920000
+CVE-2012-4120,0,1,198be9033c3043da8af538298bdc5b125720987780f7f7dfb34a4b6304b32e56,2023-11-07T02:11:44.200000
+CVE-2012-4121,0,1,2c9cf226aebb057dcb583fdbad2b1d3ab1ab4b145a16cb88626a84a625c6836c,2024-11-21T01:42:14.767000
+CVE-2012-4122,0,1,d7fb3bf5ea71b420941b55acb066cbd40ad5c0ad89ffe28ccae4b54b0a8b1639,2024-11-21T01:42:14.870000
+CVE-2012-4123,0,1,f7ed585a609f9a142f8767ea82210acec972f32b1cdb59d0628128682556f7cd,2023-11-07T02:11:44.487000
+CVE-2012-4124,0,1,c05fb52a51365945fb37750b52e4400bca840eebf83922cbf268530ad58243e2,2023-11-07T02:11:44.700000
+CVE-2012-4125,0,1,ce7070c504a9fa4e9b4e934427e1483248c6bc57d7e908629585aca363005d39,2023-11-07T02:11:44.917000
+CVE-2012-4126,0,1,88688f21130287204629258e2cff2038a23a4951288d2dab8c4948c8c3dd9c30,2023-11-07T02:11:45.190000
+CVE-2012-4127,0,1,76d1f8ac34c1a70b3751a9543899be7f337372cc754cab45f7faed57b390ae42,2023-11-07T02:11:45.410000
+CVE-2012-4128,0,1,b55dea911fc00a453baa0c32fa48223be12da96f923d569eb3f4ad738911e485,2023-11-07T02:11:45.633000
+CVE-2012-4129,0,1,0f54b36fd12ac778167c0c770a0d581a0430e3bd1b600e53154fca4afb897519,2023-11-07T02:11:45.860000
+CVE-2012-4130,0,1,d53c40e496cf04b56dd1c85f5d2ea43a63765f404aca32fc6d1ad07e55231abc,2023-11-07T02:11:46.077000
+CVE-2012-4131,0,1,92141a28ba4bb1768e8afbdb3a813fd659121425b1d79902f7f95fc97d8f6361,2024-11-21T01:42:15.070000
+CVE-2012-4132,0,1,78fbbfdf2369c0927028722728124b472ff32b7c465d825a7875de08f9317e5b,2023-11-07T02:11:46.310000
+CVE-2012-4133,0,1,511813914b27a6e7c7f9e88853989a336827773a546c6ec21e753600acc68ac9,2023-11-07T02:11:46.527000
+CVE-2012-4134,0,1,f03b9e3cfee8b3ca481963556b71c6a1c2d65a7890804b7d7d9ce9c529238ffc,2023-11-07T02:11:46.743000
+CVE-2012-4135,0,1,d4a4e351eab3e0444565d9181c429f083f71c886040a571c23459364bcdc1e03,2024-11-21T01:42:15.210000
+CVE-2012-4136,0,1,9095caa52d453d14b25fac44036b9c16682981139ba90a1a180f22d15bda22f5,2024-11-21T01:42:15.330000
+CVE-2012-4137,0,1,9105356b02ef5a208489ce7219dd9c8ff16e3b747cbc9d4f3de1d512ccf0c0f8,2023-11-07T02:11:46.977000
+CVE-2012-4138,0,1,d293f3a4c50a68bad03bbd98d10e6a8ffa7de674c0643f0bca4c7d972c0099f5,2023-11-07T02:11:47.197000
+CVE-2012-4139,0,1,aadb0da0fd015b012ca061a1fbb79f0cd61f226ac94e32352fcacfa78e750775,2023-11-07T02:11:47.413000
+CVE-2012-4140,0,1,57d5b92271cbb5c2f6f2403c4abb5f663542ab0a50542be4f3ae861f72b1514c,2023-11-07T02:11:47.633000
+CVE-2012-4141,0,1,6ae9efbb4bc86049a848f931cfbc3f4965a909ca62b8ea5be9418873d3a4c696,2024-11-21T01:42:15.480000
CVE-2012-4142,0,0,3963668a327caa6bae7834094b680e40f04b9f6dbf27bd20fc1c9b07578cb301,2024-11-21T01:42:15.587000
CVE-2012-4143,0,0,9eba2b160063c3663dc74d29f8e95efaaaef9bec325e645694eb9a5ef243b411,2024-11-21T01:42:15.740000
CVE-2012-4144,0,0,2a3de9a60a4fe0fb5c9972e8ac27920230f0feedf813b836ac3bf0329b8955cc,2024-11-21T01:42:15.890000
@@ -55961,24 +55961,24 @@ CVE-2012-4613,0,0,b0576f837a16ed4c29023695b62dbef516e4eae05a4125ebd60bd392cd915a
CVE-2012-4614,0,0,254540e6071dc2648901fc358adccd829c3c52c505d602b3f407daeb09122917,2024-11-21T01:43:15.863000
CVE-2012-4615,0,0,ec21054d6a2a408ce8d858b6cbb12081644cccbdef90166c79e680946c0e9ef5,2024-11-21T01:43:15.980000
CVE-2012-4616,0,0,6f93c880ed9167c13ceafca3fd12081f32cb63fa97ad9a1be07d9527dc480523,2024-11-21T01:43:16.100000
-CVE-2012-4617,0,0,f3893cf29f454da1cf4ebd0af16050e2ee22140847baa5be8cf224ce26eb3c61,2024-11-21T01:43:16.217000
-CVE-2012-4618,0,0,628f7edf1565ce2d12d1f36322482435fe6c1b0e61e9e9aaeda4f87e77c9a7fa,2024-11-21T01:43:16.337000
-CVE-2012-4619,0,0,db154811cc3878cecfd439c7ccc77e81e56528c566975c5640f81cfd73805deb,2024-11-21T01:43:16.453000
-CVE-2012-4620,0,0,4be227a0609a7e876357415b03ac693aef195a86d469e5cd24133567b9382e0a,2024-11-21T01:43:16.573000
-CVE-2012-4621,0,0,6507b55b21fd3280d800930ea4085d6f954e32efada90f2cea1fe0e494ff94e8,2024-11-21T01:43:16.690000
-CVE-2012-4622,0,0,817d389c34c072f173a00ed80ec610d990dc845914d01e97c692f64f94656232,2024-11-21T01:43:16.803000
-CVE-2012-4623,0,0,fc1505e008821456860a8ec8081e0880cd68cf79ffb800912a56f53b5733666f,2024-11-21T01:43:16.927000
-CVE-2012-4629,0,0,e0511c8ab63e83f667ccb831100eed3f6107d131c3be73b04b700b0d9ccafb14,2024-11-21T01:43:17.077000
-CVE-2012-4638,0,0,f3460b81ae88a103f07d965918e007903eeb1166aaf46bd1758103e939da79ba,2024-11-21T01:43:17.183000
-CVE-2012-4643,0,0,d81346ccdf93258e5b8f179e27ec4315e1c8610d99ae2933b06508f7ed47259c,2024-11-21T01:43:17.290000
-CVE-2012-4651,0,0,2ffeded72ad9d9ee78c423dfd44c6d4172cd2cf879451c563b087359b0e0ad0a,2024-11-21T01:43:17.440000
-CVE-2012-4655,0,0,e70f34190390ce6aeec72a2f58942d1a21c08fcdb87931086ff81cbbbdb8edc7,2024-11-21T01:43:17.553000
-CVE-2012-4658,0,0,67577e775dc72eaaaf7ad69af5dd304aa3f321559c2079a81c5408c5a7352d1f,2024-11-21T01:43:17.677000
-CVE-2012-4659,0,0,a5ec7838693b839a6087a98521f973b81d71e4e0e4d7790090c24368e27b799a,2024-11-21T01:43:17.793000
-CVE-2012-4660,0,0,8e9bff7c26863272039150ec2306a7628c241aceeebbc6c7ac46834581cc7577,2024-11-21T01:43:17.910000
-CVE-2012-4661,0,0,850e3b48191841df55e8566e494308b85a2918f4dbb5ad3cf9478212387c3a09,2024-11-21T01:43:18.037000
-CVE-2012-4662,0,0,0f4d11dda279c843e7419b22443390ae3e594a06e22ff49e3d1889393b56838b,2024-11-21T01:43:18.157000
-CVE-2012-4663,0,0,f35b468bb529db350984b375da340594a4e4225404c2f681fa5c5d9bd52a5a2f,2024-11-21T01:43:18.280000
+CVE-2012-4617,0,1,5fa03595fb5b1e16d3a266edf8c38f7aede97a46260a60e42f77e0aebbd057e2,2024-11-21T01:43:16.217000
+CVE-2012-4618,0,1,9de2eb5ddd85f7e8f086e6e234f70d8d09ed7cbdd6bd4c010ce39805511e4828,2024-11-21T01:43:16.337000
+CVE-2012-4619,0,1,5ddcb9eaca675d3071569915f7037126b4ccc4277b0acc0045b8fde492694248,2024-11-21T01:43:16.453000
+CVE-2012-4620,0,1,376e686ba6ce3e706689cc46c11ad41e4521fefb325769356b3b26eafb35d6cf,2024-11-21T01:43:16.573000
+CVE-2012-4621,0,1,153a7bdb4a52014aec348c269c50a7b9094587b1b1874f5ea4a2b580a28929a9,2024-11-21T01:43:16.690000
+CVE-2012-4622,0,1,d051177a54fccbd62f70c1f06ddbf58a986feccd8fd79f1e82ed60bb0940d901,2024-11-21T01:43:16.803000
+CVE-2012-4623,0,1,319257d1c6238f1dda1b657df248084f99ca8326ca4ac50485f4ff9e2bd7ca85,2024-11-21T01:43:16.927000
+CVE-2012-4629,0,1,0a28e4c5431a467b497c941ad18b385f7d4ae82eb7d86b7e595777753433ae54,2024-11-21T01:43:17.077000
+CVE-2012-4638,0,1,914a5ee2457b833f607524713456e21a0a36e31fd08fa4fd0e890f315f231347,2024-11-21T01:43:17.183000
+CVE-2012-4643,0,1,cc1efccd4411ee3d36a59114325972649d880b2fcad756ad66d2da78a2432567,2024-11-21T01:43:17.290000
+CVE-2012-4651,0,1,10f69ea103e0d51b4dcc6c55e4f9b54400e227189e76c5e9acb41fb5c0324832,2024-11-21T01:43:17.440000
+CVE-2012-4655,0,1,a46bc7bc91edeabe7bd9168fdb5d5e91542281393dd8f7e567a3bfc6081fbc4b,2024-11-21T01:43:17.553000
+CVE-2012-4658,0,1,44f0649c3b5be5907e7704e41e993332b893d701c63a3ed97ae364f2d167528d,2024-11-21T01:43:17.677000
+CVE-2012-4659,0,1,e1185f217c65d671af8da24db74844d794aecb3def71d37670653a85aeaee59f,2024-11-21T01:43:17.793000
+CVE-2012-4660,0,1,59bf100bd9fb6ced74f590782fd58b75a24ff10497e06e8f6570e966976fbdcc,2024-11-21T01:43:17.910000
+CVE-2012-4661,0,1,94ba1ed1399240674abb9ffc0d1a925665d98a3ae52e9a2184222d670b3f5e93,2024-11-21T01:43:18.037000
+CVE-2012-4662,0,1,96c128b50a3e641bd3542d4f9f4609d8f765025fc837cde5c6ccf000ba7cfb72,2024-11-21T01:43:18.157000
+CVE-2012-4663,0,1,dc7bc649525eb36ec684dc54c614b6be60915d41b190e96a1dfd4f0951e54c41,2024-11-21T01:43:18.280000
CVE-2012-4667,0,0,6f06b3585a8e9b265e4c4c2a99de054f264fa5d4f0790d6cba29896b71fcf1b0,2024-11-21T01:43:18.430000
CVE-2012-4668,0,0,e775b9b729643307f383ffd2f03beb3ba5a234b1cb800db7764f2fb148f589c3,2024-11-21T01:43:18.590000
CVE-2012-4669,0,0,c4c73452b928f4a569b7a05001fd7dd0315aea20985e740db1ed1dee66534694,2024-11-21T01:43:18.747000
@@ -56286,15 +56286,15 @@ CVE-2012-5004,0,0,d9d2c5dadefb096facfeab30f76425b6d05a7a5ddde85ccef8f1707523ae24
CVE-2012-5005,0,0,42155a93a2cb111e3c9ae8b2e920e395b683f5271422abc2833ee86095591a15,2024-11-21T01:43:54.260000
CVE-2012-5006,0,0,d2b90e8de3f67db6ea5cbaf38903b0d36d28391073644f720aaa669015be5d4e,2024-11-21T01:43:54.397000
CVE-2012-5007,0,0,bee720f0452ea126a75b5ccf80067aaad37657e48ba215d1c219192b31748dba,2024-11-21T01:43:54.550000
-CVE-2012-5010,0,0,5782848415856f5dcd7fca036450a5f68a41df9c7ad4a6ea3303cfab23760bbb,2024-11-21T01:43:54.720000
-CVE-2012-5014,0,0,ce20f0f3144bc7b619de9696a6261b40e34b6248774a720bff25a1a1c61529a8,2024-11-21T01:43:54.837000
-CVE-2012-5017,0,0,a3365730b52f91fa2efc957c272a57a19343b2c15dffef33eeac3f057bc04f72,2024-11-21T01:43:54.940000
-CVE-2012-5030,0,0,4f50ff485e3fd1d6d4599fcabf80fa7ced4e35e5b2c633880ffca0c210602fc3,2024-11-21T01:43:55.040000
-CVE-2012-5032,0,0,c67efc8ffdc33a70acb3e1553c33422df6ed4a2e1d039e2add3d31a8a2ac2b03,2024-11-21T01:43:55.157000
-CVE-2012-5036,0,0,9ba597ccd1409a66de0fac257915c251ef6022ebca76928c4a777fba70ea753f,2024-11-21T01:43:55.263000
-CVE-2012-5037,0,0,13d6e288cabb4bf70798107570158f1ed73d5652f8b44207b5eea40b82410eb6,2024-11-21T01:43:55.370000
-CVE-2012-5039,0,0,c0b450cc734c1a24286f7c660d0e44aaecfbbe177f1d2a94ba7eb7b571be9fc7,2024-11-21T01:43:55.470000
-CVE-2012-5044,0,0,60b4eff8f2e59b41fabf658b1eef6a14aa96241696d3ca581c55eaa6115b911c,2024-11-21T01:43:55.573000
+CVE-2012-5010,0,1,9c43f58903c46df8211cd46bd90740450a28f66341e49e21870e213ea6531567,2024-11-21T01:43:54.720000
+CVE-2012-5014,0,1,5f583bb79528696f3a744a983be477d88664d47b432bfa6e77723a120c6dccf7,2024-11-21T01:43:54.837000
+CVE-2012-5017,0,1,1f3b50667e57a6205e10636ed0b89c125cfebbdc054fdc6fb9107f9779840edf,2024-11-21T01:43:54.940000
+CVE-2012-5030,0,1,63669c13e7a9dd858d6b483f1a109faddf22b54feffd4e3cff6d16e8624a770b,2024-11-21T01:43:55.040000
+CVE-2012-5032,0,1,8069d813f12ef9268322c7e33a24eda388a7a87200849984c4f84cc7e1f36ac1,2024-11-21T01:43:55.157000
+CVE-2012-5036,0,1,4a55d932bb096f31551195fec19c9c47a8918a836a077602155f368174e060d0,2024-11-21T01:43:55.263000
+CVE-2012-5037,0,1,22db948fe0de1ac2aebf3193a6ff7ce51553d7552c60babaf4d4df8a1d26db55,2024-11-21T01:43:55.370000
+CVE-2012-5039,0,1,e1ba467cce8fb1c131550f29e01fb973a88be0080ecdd714dcb6dc22518b588a,2024-11-21T01:43:55.470000
+CVE-2012-5044,0,1,f0fc8044c68977ab3ea48eea0d5f9009faee9b37ab81e6780afeedc62701a443,2024-11-21T01:43:55.573000
CVE-2012-5048,0,0,0fbe34d33c710d33bb19d22ce394ef2436a300780865fc6ca1d0d1d5aa0fcbaa,2024-11-21T01:43:55.680000
CVE-2012-5049,0,0,7fd32f369cd8cffd468db464fdb9ced249c7bae116a3d088e5e02cbf89604222,2024-11-21T01:43:55.827000
CVE-2012-5050,0,0,d4fb96b4159216b89addb9b28261379dcd8c52abcec546204707f199f0a9959e,2024-11-21T01:43:55.963000
@@ -56628,16 +56628,16 @@ CVE-2012-5391,0,0,66a18b2a2008f32deed003f8c0a38f78f421c98a90e09d45f047e749b2f87c
CVE-2012-5394,0,0,aa5d7c057ca8c5464ce28cda5e51898955525bd697e8cdca33dcb550de665c56,2024-11-21T01:44:39.807000
CVE-2012-5395,0,0,aed2a471b100cb1a786479645795be82cd5f544ccc1b23d7373717753eb437b4,2024-11-21T01:44:39.940000
CVE-2012-5409,0,0,8937c612ec911e8fc3c6267fbb8b509a5818b43e4b8ecaf98b283e9c6080b7af,2024-11-21T01:44:40.070000
-CVE-2012-5415,0,0,f1774ee95e33dba13c5a25fa901ac620a19d338e4a635510dbb3504245e7ff26,2024-11-21T01:44:40.197000
-CVE-2012-5416,0,0,5c6d5ab31f1fdff2ec3eaf7910c87ac62716caab8855f9411046cde2a247e0c3,2024-11-21T01:44:40.293000
-CVE-2012-5417,0,0,47dce2d40f9659cab07626f5bee2d082b683c10abfcc1044b76d08b39c180450,2024-11-21T01:44:40.393000
-CVE-2012-5419,0,0,e4a188569cdbdc425a69fb93eb5cd21876b70efa88b3d6eac8907df1d546d5d3,2024-11-21T01:44:40.497000
-CVE-2012-5422,0,0,48a0e65a181f7c0ff589a8a648700fbfbed3f6de5a67d7578b788e5f4136b838,2024-11-21T01:44:40.593000
-CVE-2012-5424,0,0,5c9f6b8d120edf7e63d9917086a2e342aadade8db8f5391c51a7d98199b8690b,2024-11-21T01:44:40.700000
-CVE-2012-5427,0,0,60919bd2d4e5f6f6dd81f25d0ebdf9b5807bb1a4aa8a4da8450148af64de80ee,2024-11-21T01:44:40.803000
-CVE-2012-5429,0,0,dad13709d761d833e5810e2355d6f3602d1658aa99e3fc31616943d2f674a3ca,2024-11-21T01:44:40.900000
-CVE-2012-5444,0,0,4f543374a0050f32f8b8e153c0c8a5ba1f75aa4b50ce04ed2915eca80fc29b74,2024-11-21T01:44:41
-CVE-2012-5445,0,0,739f30578d3bfaa9a66c58e9d09cab4ba443a127a68af5cb33b67571789504a7,2024-11-21T01:44:41.100000
+CVE-2012-5415,0,1,ff476ae6ffe6b810a47013588335000f6951959fc93d9c7634d4749621a9f7ba,2024-11-21T01:44:40.197000
+CVE-2012-5416,0,1,faa9f1855377499ff79dbd3edc3900933d31dfde7b5f3f69f3d48d8a1c2f8049,2024-11-21T01:44:40.293000
+CVE-2012-5417,0,1,828f2f34aee13dc00308a39d2978ab989949ca859f6b570102c93f46e740699e,2024-11-21T01:44:40.393000
+CVE-2012-5419,0,1,90a1340b57e4952df9d6f0dc5a8cfb89da68775aca00765d40f68b4d87bcf2fc,2024-11-21T01:44:40.497000
+CVE-2012-5422,0,1,686dcb87b081fefb679bd5b05ed0f4414ad5b6fb6d9b443ca42ddc4b9667e6c4,2024-11-21T01:44:40.593000
+CVE-2012-5424,0,1,41d4d8e421fc36b0b8e2e55bd25ee2d3849a601fac934b328036884986175f58,2024-11-21T01:44:40.700000
+CVE-2012-5427,0,1,3a83d4ad4a5bfafacfd4613e0a4223cbea2bea3326337468d925f8d00814c8f1,2024-11-21T01:44:40.803000
+CVE-2012-5429,0,1,84e70b2312135a5ad4fd18c5fc1e6e600061895593f18d80e9201d0fa18fbeb0,2024-11-21T01:44:40.900000
+CVE-2012-5444,0,1,a753d16a67f961d9fe88ff2a24a6e1aa8bcb3f48245641509a77041286e48cef,2024-11-21T01:44:41
+CVE-2012-5445,0,1,132de888020935ce6efcc0126a71a4eafef0225ea4bfe274a462f13b1ddab49e,2024-11-21T01:44:41.100000
CVE-2012-5450,0,0,6b93a217374be47e22ecf780f15585601db6d926033f7d792682482d1c061152,2024-11-21T01:44:41.220000
CVE-2012-5451,0,0,b6910a8eb68f8ebb9d5aa2d18142113b69f7de0bcdbb43d6cabb03ab809bff01,2024-11-21T01:44:41.370000
CVE-2012-5452,0,0,4f6ebaf7a630d66ae36d163d7535ccbeaf452cb29b0873f174fef5860362b054,2024-11-21T01:44:41.497000
@@ -56886,9 +56886,9 @@ CVE-2012-5702,0,0,1aefec9dc16ce4cf01a0994e411c77d96a6f89fa9a458402c654bad0ee09ce
CVE-2012-5703,0,0,13e11a1095cbd07cddc3d8b4b9292a419b223361d572cdae285084ccfc3525ec,2024-11-21T01:45:09.793000
CVE-2012-5704,0,0,0bebdc92b1ecd633c4288c6cb58203235ed1e0f8b6ddf22c53d805923cd06908,2024-11-21T01:45:09.937000
CVE-2012-5705,0,0,79732323e926198ed4a2dbe35c6d087c48318031fa38ae66230875e1207287ba,2024-11-21T01:45:10.073000
-CVE-2012-5717,0,0,736e56477b1f6a14d78aa0b2ec982c0dac027d100acae97a2cf63237130ba164,2024-11-21T01:45:10.223000
-CVE-2012-5723,0,0,3e0a914f18558582ab87784331a18d5f296b5ea87e43400d0c0531463ba6fe28,2024-11-21T01:45:10.337000
-CVE-2012-5744,0,0,66635cc590d335e07719a9bf00404f3f23d211b6ffa67c0d63a56a6fc69496bf,2024-11-21T01:45:10.450000
+CVE-2012-5717,0,1,b67bd82e27fc6533f39b71eb4a1191f95cb79db5a76a6118882c3751ad9d9646,2024-11-21T01:45:10.223000
+CVE-2012-5723,0,1,18622b79f92573a42684389723a1c84c1e107ea9758ce5558d265897e93595e8,2024-11-21T01:45:10.337000
+CVE-2012-5744,0,1,b1da600693708b6b325ec2a4c9c6872222b93cd463737245b6bb0e8e114e2469,2024-11-21T01:45:10.450000
CVE-2012-5756,0,0,b08b98fe04169538942bf124701c8f4a3e80098622dab447bea82b9ea1d98886,2024-11-21T01:45:10.553000
CVE-2012-5757,0,0,2143a41c2f13c807708763d257082ba0750ee58d5e5ecc75ae186c7fa800c661,2024-11-21T01:45:10.663000
CVE-2012-5758,0,0,bed6f23f768b2b91cf13f15cfe407cf0689f8b4aa0c08c08aafa2735b9e2b7bc,2024-11-21T01:45:10.777000
@@ -57085,12 +57085,12 @@ CVE-2012-5976,0,0,7a3dda43e9aa07e0e59befe4851ce1161c7b2135a616fc3aa9b9e92368f4b1
CVE-2012-5977,0,0,dfe1f64ca81f3a13cfe06d9a4deda5f4abb41e4ea462442fe6086a3413288990,2024-11-21T01:45:38.077000
CVE-2012-5978,0,0,6189d23a81e3487459f70bac0b7b34893ee4b915b4ac54c0ad9d7aa841a32000,2024-11-21T01:45:38.250000
CVE-2012-5979,0,0,5e884af14ae1aa4407cf8ee38946f8399146bcd553e8b3c83123b4fcd73dfbcc,2023-11-07T02:12:44.943000
-CVE-2012-5990,0,0,5877402661303218bd327cd1ac83aad562ce2f939a7b4595287a1aab374e4328,2024-11-21T01:45:38.420000
-CVE-2012-5991,0,0,387ad4b5faae109815272e77db6e188aa00e34af894c573a1cc7c365e8dff442,2024-11-21T01:45:38.530000
-CVE-2012-5992,0,0,558fe0c2bc136896add26fb908d78afae0ba177257fc2422ae38a48389c4d89d,2024-11-21T01:45:38.653000
-CVE-2012-6007,0,0,c2c0bda2f3049c6826fba3febc38c14c59294e6dd937fe7d853006ea90e0c13c,2024-11-21T01:45:38.773000
-CVE-2012-6026,0,0,ecfccbb59a82d53327485f59f50140c8e69e915e529c476682f5a2bc58403ef9,2024-11-21T01:45:38.897000
-CVE-2012-6029,0,0,24cdd04c458ed11ed56fec5fd412a7aa4a7e1e0f1faa8254bd864ad8356a7c4f,2024-11-21T01:45:39.020000
+CVE-2012-5990,0,1,84b2e99ef8913496fc2fb1e3273fb52ba192692da91adc5c09f48776b32833d6,2024-11-21T01:45:38.420000
+CVE-2012-5991,0,1,dbba8ad8925535ed98f25f6546990db3dd10124ab558bd6624a5c323664843d0,2024-11-21T01:45:38.530000
+CVE-2012-5992,0,1,01bcf620fbf2acf97a2b0709eaee622e041fea667139afd09168e0d7673fed53,2024-11-21T01:45:38.653000
+CVE-2012-6007,0,1,bb11252cd975cdfdf698e231707c6b30106d12260d0dc9c4bd5b0eef01610ab7,2024-11-21T01:45:38.773000
+CVE-2012-6026,0,1,2599283c337695d865b4992a33fef2f2b2bb4005d47cde1b043bc3eff285fcc2,2024-11-21T01:45:38.897000
+CVE-2012-6029,0,1,353e89ba18bc4d0bc3af9466ece3095c4f5d2120bfedeb11efd6009c282f425b,2024-11-21T01:45:39.020000
CVE-2012-6030,0,0,f92393f9f8a8739d55495215bc61a8f9bb8f5e818d086e06dfe8323824a85c24,2024-11-21T01:45:39.140000
CVE-2012-6031,0,0,5499ef52fbd86d3cf8ed5c4187744fb3d7d4f47ae89ae58016e6b61bd6744738,2024-11-21T01:45:39.330000
CVE-2012-6032,0,0,b7c6ebf3fec12e7e0b34ba1768cdb3f63766d6c4016f7b3e2c25bb38ab8153ea,2024-11-21T01:45:39.500000
@@ -57405,32 +57405,32 @@ CVE-2012-6367,0,0,f6d6decb25e7c979b3f2032eec4f53248d61a6dfaf181d77e5e9b9f3461526
CVE-2012-6368,0,0,95161f09d3e1206c2b83d38504a4f8f77451925ef4bfc9efa91849f9b0898b37,2023-11-07T02:13:17.970000
CVE-2012-6369,0,0,688fac2b496c77d7f65979871839f6693c571e536ba02324cf3f1c4396b80e0c,2024-11-21T01:46:04.577000
CVE-2012-6371,0,0,aa5d0244c10b2cb101798e0da6bd973fc1ebccf19261f1924fae4b92d7d7b33f,2024-11-21T01:46:04.723000
-CVE-2012-6392,0,0,a77a9206949057b5130a37e8c61daa5b14dd605f28e746bf60194449660795d3,2024-11-21T01:46:04.873000
-CVE-2012-6395,0,0,c01b343488286cf4d5785783400da36a70771f7ff84b1bab2f6d702100179a7c,2024-11-21T01:46:05.030000
-CVE-2012-6396,0,0,0c6fa26f69e60d521880ba71b74ca46f7bb6799bf63b2ffb04a6ad203ded0f04,2024-11-21T01:46:05.167000
-CVE-2012-6397,0,0,d2b03df040deedae5ebe88a610c38d20f524fcf6b0de7fefd25d8c3632c70ff3,2024-11-21T01:46:05.290000
-CVE-2012-6399,0,0,40378f09edf03dad0247541800003af55809240d0822081aef6660b43dcbefeb,2024-11-21T01:46:05.410000
-CVE-2012-6401,0,0,d94580d3f38cf33346c45a1d2ffa04809374685fd91e655742ce686aa34e19da,2023-11-07T02:13:18.250000
-CVE-2012-6402,0,0,9e2ce90278ee228dd7df37f74adbced30e9c20b8d243413eaa08017bdbb8794f,2023-11-07T02:13:18.587000
-CVE-2012-6403,0,0,75c77500768a7758a9993ff2d91b2fb4356de74ef4f58522b29ac5ff08f6dc6a,2023-11-07T02:13:18.817000
-CVE-2012-6404,0,0,f9295d49d2ce36ae950b3e472653b3af5bde1ddcc0c989fe0a3e755c888447a1,2023-11-07T02:13:19.033000
-CVE-2012-6405,0,0,1c4be92396bfd49296172ee5077ea109cf230365b1a0f36e7233e5bf8fbca94f,2023-11-07T02:13:19.243000
-CVE-2012-6406,0,0,1ea8fd3309343a7aa20c35c0d94145371ec387fe42e3cd71821d256bcf733953,2023-11-07T02:13:19.470000
-CVE-2012-6407,0,0,6f1d66573cfe867a0ad92e1040cf111861b9b09b63b911a3a3ca90a3c3512b5f,2023-11-07T02:13:19.683000
-CVE-2012-6408,0,0,a12fb65d8de022e4ebde98d6d732e7dc51dc7731a455af26223d8cca4d3ad499,2023-11-07T02:13:19.907000
-CVE-2012-6409,0,0,08893a2b8bd6333249c4b61deed2c722a3d992c3982fb110c362acda2e4fde84,2023-11-07T02:13:20.133000
-CVE-2012-6410,0,0,282ae6af84e1315e2219b0bef12f37239df5a7fa30a15edfbcff3845c536a356,2023-11-07T02:13:20.380000
-CVE-2012-6411,0,0,a99f05f0120b5210a477d382c5d6083d2e83957117996ec4022ee78922fb9b78,2023-11-07T02:13:20.607000
-CVE-2012-6412,0,0,83d4d6c0eb9d931bae3f452dbb2ebb94085efafe255a7c8b1a7f9f12be37772a,2023-11-07T02:13:20.827000
-CVE-2012-6413,0,0,1c32974142642b0d832f684e1683f38776ee4a73632a9ce29816807f7729d947,2023-11-07T02:13:21.047000
-CVE-2012-6414,0,0,05b911ea9d1f1d3d8d539ed42ef17ddfe6531a5fbaf91a8dcf627d9c383c7101,2023-11-07T02:13:21.287000
-CVE-2012-6415,0,0,a81c979eac0e38ed1f910fee7b97c794845f82c563f309ade5d4d3c6dace13e8,2023-11-07T02:13:21.513000
-CVE-2012-6416,0,0,e0c5045afea7de11863849b941942c4e7471e7590b6c5db8a8c284650edca1bb,2023-11-07T02:13:21.730000
-CVE-2012-6417,0,0,ebbbcdc860a5280da5de51982dd1944c03678bf70debfcdbb2b2c20b9c428461,2023-11-07T02:13:21.947000
-CVE-2012-6418,0,0,7d1235a48ab7975332f214a8863c6d4ce5a21eded60c03a77108545f22d48cef,2023-11-07T02:13:22.167000
-CVE-2012-6419,0,0,02137fa40a155c2d8cab0151c66bf48f362e7787ef36ac08c0e743e7dbca60b5,2023-11-07T02:13:22.427000
-CVE-2012-6420,0,0,dee1d156a3a649f87c9f181594908a2d92b2e8521dbc9f936c6eaa7fdbbd0044,2023-11-07T02:13:22.650000
-CVE-2012-6421,0,0,fad5eca6c4e9ddc11f119e7d858d1acc4e742e1572162ba660d2c2030c2d6319,2023-11-07T02:13:22.873000
+CVE-2012-6392,0,1,332a5afd46645f2e30370aee9f9243b0adf989c7305965901eb5f71dbe4da599,2024-11-21T01:46:04.873000
+CVE-2012-6395,0,1,d65e396456f098ea3af8ce3358390c00161ba47175e935cefaf51acd38910484,2024-11-21T01:46:05.030000
+CVE-2012-6396,0,1,e1df6295eb6825290e1d49c2d75e81795b24ccf2c97cfe4a2e84a3a3fb654967,2024-11-21T01:46:05.167000
+CVE-2012-6397,0,1,639a7768d314468cdf372ac1457cbcd156650547f46af3043f5e7020d17c9737,2024-11-21T01:46:05.290000
+CVE-2012-6399,0,1,55a7c15ad77bc4c68b7b0663203c13c0b40b61b34c2994cbe0854e37b34717f2,2024-11-21T01:46:05.410000
+CVE-2012-6401,0,1,43910ba30959a71b2f9992cd4355ae9789175b1dae0230a71a1ee7d702766770,2023-11-07T02:13:18.250000
+CVE-2012-6402,0,1,cd62a8a13b5693772dbe8516fa27b37534a8a7d0f88f7e451d08a5a71d2112d1,2023-11-07T02:13:18.587000
+CVE-2012-6403,0,1,517523046a6af89a99c29c4c8b3302400afd7f761b84f9b798313812d7c31454,2023-11-07T02:13:18.817000
+CVE-2012-6404,0,1,f1e563c543c4fa5aa563cca532779341a77899df411d37a38329dfa003ca87d5,2023-11-07T02:13:19.033000
+CVE-2012-6405,0,1,6a23a40fd7495da3b577219731c1f5ead1719d2638fdb44ff4d4fd3dc13acac7,2023-11-07T02:13:19.243000
+CVE-2012-6406,0,1,3fec5fd888c8116f7634e72cddd27060b442a7bc51a01a48bebee86ab9da0a06,2023-11-07T02:13:19.470000
+CVE-2012-6407,0,1,eeba9f2e095505aab3206a5e0b286a45501d9023c99a002346b7cd71a97d3cb9,2023-11-07T02:13:19.683000
+CVE-2012-6408,0,1,1a6aaa23eca521b211650886556227161a61447318d3074b841ec638beae695c,2023-11-07T02:13:19.907000
+CVE-2012-6409,0,1,ad1d3e7f37a51fbd2eb11c8f72ac242a61cca1e0e3008d999d02db67acafa23d,2023-11-07T02:13:20.133000
+CVE-2012-6410,0,1,8e43db07034c8e62e41528c69cc8310c559c51e20ba1348ee873a019064793f3,2023-11-07T02:13:20.380000
+CVE-2012-6411,0,1,0f895fff5231d9f8f4422319f293f2d410e36267bdef580a57f857d766d12e00,2023-11-07T02:13:20.607000
+CVE-2012-6412,0,1,54d33ef10f5ae0c2caa10d63131435f1341e7684dc9f87f7c26a507b1ea23f78,2023-11-07T02:13:20.827000
+CVE-2012-6413,0,1,eb2cea9726d6d63b2e4ca446d9aa260f052b52fd2da48ef2b38d99032bb66aee,2023-11-07T02:13:21.047000
+CVE-2012-6414,0,1,dc607e19dea76e4636e90adb7122a758414637559a0f5c96a4c1a0cdd359e895,2023-11-07T02:13:21.287000
+CVE-2012-6415,0,1,fa773dee6ea671638d210c6d67fc28d08a3dd0eb4f04aba0b6db589af34399ef,2023-11-07T02:13:21.513000
+CVE-2012-6416,0,1,9b21ef875a83a43be58da2a95670e3b189f649b6b8776bda74479a30ccbc1a5b,2023-11-07T02:13:21.730000
+CVE-2012-6417,0,1,e67f4eb39f39ed36e93bc6816dc9e15fa1bad75371b4337152cec9d7a5909db9,2023-11-07T02:13:21.947000
+CVE-2012-6418,0,1,7368377e1f4cac0aad1737bbd701868470e41a39f50a0fba4ca9d98a1357f7c1,2023-11-07T02:13:22.167000
+CVE-2012-6419,0,1,aa486e4ca1ca31fd048e0ea349f6e3fd5e10fc3a51f11e8bb952c761b92c8db5,2023-11-07T02:13:22.427000
+CVE-2012-6420,0,1,ac2808d753e1c01d11f6d3cf91793cb22b946d14ea3b23e65a10de55f4549536,2023-11-07T02:13:22.650000
+CVE-2012-6421,0,1,dd60fef6b4ef765c93ae88669eba33bc8d15a1d3631519be9b3bcde4c1a0297e,2023-11-07T02:13:22.873000
CVE-2012-6422,0,0,8d9c09a1663eb1accfb16efb1b0e906c705c02dab4bcb78312c27c6e6040709f,2024-11-21T01:46:05.800000
CVE-2012-6426,0,0,e1860cb0c328e6bb2ac5b6688719472c224927051850e1cc29ab947cad4249cc,2024-11-21T01:46:05.963000
CVE-2012-6427,0,0,a85c08e747c4aa47567e224ec77c02308e5963760a58c02566e9b95bc50a8581,2024-11-21T01:46:06.113000
@@ -58764,145 +58764,145 @@ CVE-2013-1094,0,0,cec362cd63d285726c83e917528db785b6c19cc1ea1271dbed14272f378138
CVE-2013-1095,0,0,4b7a21861a2ffca6adab157a3dcdb4f89f550f6d00db852fd5d6b034b221d952,2024-11-21T01:48:54.120000
CVE-2013-1096,0,0,654ba2505b3a4f068708c482b5e2fc14a765fa8fe8a81228e2dacd0238733892,2024-11-21T01:48:54.270000
CVE-2013-1097,0,0,6035ebe898133b4ca74793d850eb7432bf5cb366fd6b8c3b3e586e1e934d3dc3,2024-11-21T01:48:54.423000
-CVE-2013-1099,0,0,e881ce095cedbab027c49a6bf61c56be2235b0af18df1097bfb75d6e64babd10,2023-11-07T02:14:40.323000
-CVE-2013-1100,0,0,9fa419bd95922565abc4691471147d5e93fe999c817c068f41f53c0027a86cb8,2024-11-21T01:48:54.600000
-CVE-2013-1102,0,0,1a61055428b32249dcdb280207ee4445d86a4dd4eb811a4a1f1c5b6423de8509,2024-11-21T01:48:54.720000
-CVE-2013-1103,0,0,8c97e8e2cc1cbbe3cd51777ba8b4ff3e86111105c15797cf13f3bc27a9ca96d5,2024-11-21T01:48:54.843000
-CVE-2013-1104,0,0,cf04dc2f5b769f1fc191f69539f10fea5f18ee5035737477439537abbc155bd6,2024-11-21T01:48:54.963000
-CVE-2013-1105,0,0,397402e9c84a0b9fa4b28dfeb568df5c6997477913c1f233a144f7d073bc3b94,2024-11-21T01:48:55.073000
-CVE-2013-1107,0,0,983451c4f2e7b8693e87deea52b7e1dc4e4c543663e277b1fcc1062e64654a14,2024-11-21T01:48:55.200000
-CVE-2013-1108,0,0,4b7e757cfd53678779dc207a43768b5b068e76a4f8e44e1a38e35d32812b992b,2024-11-21T01:48:55.313000
-CVE-2013-1109,0,0,43566d86f14bdebc1194901e7da955bba16b2ef4e4ced827667fc57c1ba8737b,2024-11-21T01:48:55.423000
-CVE-2013-1110,0,0,ae92903c98a8f56102c3a6204b857745fa40235bc9d386aa0becb45f4a0c9d6b,2024-11-21T01:48:55.533000
-CVE-2013-1111,0,0,96a8b83e35849f7be704295d54acd56171c50610a63e2db8ab7f3effe600d8cc,2024-11-21T01:48:55.647000
-CVE-2013-1112,0,0,d2c95d1a285848eefd4747694e1489dd34eb3ca99e9dc4e0fe5c8bf68e734e54,2024-11-21T01:48:55.760000
-CVE-2013-1113,0,0,6fe4f620467ca4d6b95c148f83007db5be3c33bb41af1a35b16d95d32adfd30e,2024-11-21T01:48:55.897000
-CVE-2013-1114,0,0,5f4a130998b676137c3d367729779ef8e73d969773d584d786ea22f8c73b1021,2024-11-21T01:48:56.010000
-CVE-2013-1115,0,0,996e57e1b96e36922294a5a254e91823785147eb788afbd99e9c8bba28bc8705,2024-11-21T01:48:56.123000
-CVE-2013-1116,0,0,99b46c7f0dac27995f7178a1e12acdccf227f84218933f55fac0beb2ebbc4f84,2024-11-21T01:48:56.237000
-CVE-2013-1117,0,0,ee693277ec071bd9fa5aa2d7345b4a9dba17073eca60007d006a1608cbdd13b8,2024-11-21T01:48:56.350000
-CVE-2013-1118,0,0,5f497cdacf3443a75072c203bd34ebde3dbfd8de8dd3c862b77b6221516034d4,2024-11-21T01:48:56.460000
-CVE-2013-1119,0,0,934fb557a5e8e79c707ebc222c6af3ec28ebf179170b3a260cd475ce2c575fe1,2024-11-21T01:48:56.570000
-CVE-2013-1120,0,0,8167ca61a3a3f66782af11e7855f1051bb559a997e1b6346cc4cfd7850bc2eb0,2024-11-21T01:48:56.690000
-CVE-2013-1121,0,0,a14d7749ba1aa39eb35e466a50ce4fffb29ebdd5521c818aae175d8a4f05ac3c,2024-11-21T01:48:56.810000
-CVE-2013-1122,0,0,f0969d5cad3b9b21038ee5e9ce41be54acf1d0a515c740a2b5505b64ef4a4505,2024-11-21T01:48:56.933000
-CVE-2013-1123,0,0,45f6ec5b7657d1a9104bb0eace9c93bdabc7227f3942ca8b2d32639580f1e431,2024-11-21T01:48:57.057000
-CVE-2013-1124,0,0,f3793abea533f3d441d24c1b6da822dd01d82fe3b01366ba8b4947140f303fa2,2024-11-21T01:48:57.177000
-CVE-2013-1125,0,0,dd0f3d36af0297c8cc5cd03b0f8f82c86c7de84c1c0004a625ff961426793ebc,2024-11-21T01:48:57.287000
-CVE-2013-1128,0,0,a791fc26bfe44deaae68be546716713406e2d0c11c91eddb8bd288e5cadb7313,2024-11-21T01:48:57.400000
-CVE-2013-1129,0,0,22502152067a95fd4b93b0f4be2dca223276ce4ef098281fc3a0de7965b334db,2024-11-21T01:48:57.510000
-CVE-2013-1130,0,0,88eb98a6936e6e8c841e7d9d49ca09d54a6ed50b2e6f72e1297ce4c87cd20aaa,2024-11-21T01:48:57.613000
-CVE-2013-1131,0,0,28220df67b50d81fde150b8e38bb953f7742ab4d9ca12d117bd41fbc0087cdc6,2024-11-21T01:48:57.730000
-CVE-2013-1132,0,0,bc788025e7a8f5869afbb75dd9bbc64e1d90712a5696ce3e51c324916da4b2fa,2024-11-21T01:48:57.850000
-CVE-2013-1133,0,0,e22ce5b5a8d0407771ea758a8c2c87f69c8110547c1f74e759712e13a830d42b,2024-11-21T01:48:57.957000
-CVE-2013-1134,0,0,78687a8efc8ed3bfb79206e200450a33fa24e449c8738cd6fd5a6e3b502db40d,2024-11-21T01:48:58.063000
-CVE-2013-1135,0,0,6cac8705570064f9122ac84454ac477116625284bd507559e28e34d1693b8b26,2024-11-21T01:48:58.167000
-CVE-2013-1136,0,0,0b59fd381ae517157bfe6f90eea6f5712ea99a835cee01c5994f38b61e7e36b1,2024-11-21T01:48:58.273000
-CVE-2013-1137,0,0,28137ac80e0a08967ad1ed981214f16b3eb784ccad947320e9f9729278cd284d,2024-11-21T01:48:58.390000
-CVE-2013-1138,0,0,21ca2f20db6b8dd30334e7c7f56477863ef9534b21df97a2f004ce1089ac353a,2024-11-21T01:48:58.503000
-CVE-2013-1139,0,0,71262e700d53bf314ac6c5297f6896cb59a82a37ee8c2614f3adf534a069312e,2024-11-21T01:48:58.637000
-CVE-2013-1140,0,0,a24eedf289b6aca3f33791049bc9fd9fcb95e25cfe75048723470e6d84bf5a5d,2024-11-21T01:48:58.747000
-CVE-2013-1141,0,0,91a33b6f2812a398d6c08da9abd7557b3e865d60f8e5e53f16e91cb762bb98f5,2024-11-21T01:48:58.857000
-CVE-2013-1142,0,0,d7e2e1747d5d6b28a304b8f10896f610c2cb5dab929fec6f3e3b6c140c723dd2,2024-11-21T01:48:58.987000
-CVE-2013-1143,0,0,fb19bf7ce2a2715b6bf6e8f84f58e35c1b71078a20f86930c8064d72d00d1b0a,2024-11-21T01:48:59.110000
-CVE-2013-1144,0,0,60f7977f658c4528da864c3bf092735eea559f9e073c48421d0ff25a2ef6749e,2024-11-21T01:48:59.230000
-CVE-2013-1145,0,0,c15bf908c31d8b1ed1906be674c28284b32e68952719db5872cd069d64dbb6a1,2024-11-21T01:48:59.340000
-CVE-2013-1146,0,0,052a7ec06fed441f0e27a5fe2f4ded48756be47c3638ca5d540535d40a7ae52b,2024-11-21T01:48:59.463000
-CVE-2013-1147,0,0,42a14197246061b308633d7ee1a957dc2d130ca87384a2a8bc4fa0ba0219b8ad,2024-11-21T01:48:59.573000
-CVE-2013-1148,0,0,0f099d59b6e8c02189ce74d82c80342b38346134746343fc9605cbf538442833,2024-11-21T01:48:59.683000
-CVE-2013-1149,0,0,5e52f9a25281b9b136177533452237eed7096e5ef8d04620b08383844cfd11c5,2024-11-21T01:48:59.800000
-CVE-2013-1150,0,0,b364d1667a39c34a6e582833e0b4c5283f240ac4c841726716370d658981aac2,2024-11-21T01:48:59.947000
-CVE-2013-1151,0,0,e4be96b200d71b14da7903b366fba8c3710a79b5377ff938862cbb8beb94fe26,2024-11-21T01:49:00.100000
-CVE-2013-1152,0,0,dca7415d4dd5fd18a7587761fc6ee4cb34dd74932625e6042a6831d884975212,2024-11-21T01:49:00.240000
-CVE-2013-1153,0,0,4240254750f582645ae15006a99621d1a12269af1ae557fffd9d01933c330d66,2024-11-21T01:49:00.357000
-CVE-2013-1154,0,0,94ee993ecd10bbdfe2b4b43cb8398509e75735491019953fa11869ac292abbdd,2024-11-21T01:49:00.487000
-CVE-2013-1155,0,0,56bbc08519c5a60433ef2fe7f594376ca29d63140015ac35379c12098c659aef,2024-11-21T01:49:00.623000
-CVE-2013-1156,0,0,7aeac90af3e9fabb7faf82dce1dd319885161fbdb5b58989d606ae716ec95145,2024-11-21T01:49:00.733000
-CVE-2013-1157,0,0,1c01ce8925a1833f50a0d7079b03dd1fdb46ba391b62887dac77dcc1199434fd,2024-11-21T01:49:00.843000
-CVE-2013-1158,0,0,48bca32bbda25f07696055b512ee7fb8c9cb4261dc6b6189a2199d8419331df9,2024-11-21T01:49:00.960000
-CVE-2013-1159,0,0,b4f2553d600b2d041cf7b0c65e30c8a92b05352e0b88163e8bc60e4fdab75985,2024-11-21T01:49:01.067000
-CVE-2013-1160,0,0,a5e05bc1c1defa234354eb8702f06a2744ef146cdae1ae0e5184fd528e8b7ce7,2024-11-21T01:49:01.190000
-CVE-2013-1161,0,0,b3b182d714301f4ac56f676e14fa4e757ecb61ebee5d086ca11a0e69a2539b31,2024-11-21T01:49:01.310000
-CVE-2013-1162,0,0,1b3c3665524a1cab0b007096265a0e350725fe37c7f3b5299546ad786d0f0c54,2024-11-21T01:49:01.427000
-CVE-2013-1163,0,0,b50690fc39613961d228173b29abc90694701e7f54255a9e56098f406c3629c1,2024-11-21T01:49:01.543000
-CVE-2013-1164,0,0,6a1107d845dd5457decfe25b4b9b4312d791cd70dbefd86f457512ec2b43827d,2024-11-21T01:49:01.663000
-CVE-2013-1165,0,0,02ec4cf6e653d20bdae794f7389124d657fdbe24cc6b02d419f1624c0edbe449,2024-11-21T01:49:01.807000
-CVE-2013-1166,0,0,eb542280f8765b43648f4dd5938ce88671b3bc22a4fe50687cddf69ad852cf1b,2024-11-21T01:49:01.940000
-CVE-2013-1167,0,0,ee5b6219c54b9a9d405a43960c54b0f8f8874de16549aa22286f4d84e29a000c,2024-11-21T01:49:02.060000
-CVE-2013-1168,0,0,3ddb081fd9b8f1a85a8b67de35e2192abdeb92887a48a1c17cf023fc33bc0fdf,2024-11-21T01:49:02.180000
-CVE-2013-1169,0,0,5be5b042a9d7a5eb7f25132062d86142a584c62f4c06d198cdb7d292b9ac15a0,2024-11-21T01:49:02.310000
-CVE-2013-1170,0,0,b7da9ee9dc59e56e251d972c73af1a8afb48ed032d8ee6d6c45cea683807ac55,2024-11-21T01:49:02.427000
-CVE-2013-1171,0,0,b38cc248b7ce609d7840130739c63e0d82e8e328587348fd25a1f75012a66dbf,2024-11-21T01:49:02.540000
-CVE-2013-1172,0,0,a4108eefe5e1723b987eeae11ecba1c0b4829dcccddbce26c1c32458502a0b07,2024-11-21T01:49:02.653000
-CVE-2013-1173,0,0,cab477ffef48cb8cd16ff87a6306ecf471ab4cd9bdf91efdd479a53f007aac0c,2024-11-21T01:49:02.783000
-CVE-2013-1174,0,0,f966dee5a069c33067b1c03cb752f7ae1bf194e2923b97332a52185b83737524,2024-11-21T01:49:02.930000
-CVE-2013-1175,0,0,bfb639c1421779ce64363fd1ef5de7f12d8ce0b1440ede4be160b00a8f6b502d,2023-11-07T02:14:40.970000
-CVE-2013-1176,0,0,0b4039cb07c1677246dd0d30b599bb057b57688129938f8a0c83219d938046a1,2024-11-21T01:49:03.067000
-CVE-2013-1177,0,0,219f6e046a72e34b3a89b37e161b04fa9d0fe258b29c8f2b83c4670f97cc2993,2024-11-21T01:49:03.213000
-CVE-2013-1178,0,0,8cd05bbb4dd66d5021e612665487515c9c0be53154c5d40867c772fe513a7794,2024-11-21T01:49:03.347000
-CVE-2013-1179,0,0,033a5dc769350c47c46021c765b154bff001437ec94c24c9547a008ab09f1776,2024-11-21T01:49:03.523000
-CVE-2013-1180,0,0,82fcd5b732698c8d4d2ca7af0e58b5a881e194c015ff8ad32abb06109e73cae2,2024-11-21T01:49:03.670000
-CVE-2013-1181,0,0,58a89f7b8247574a47dc91b3a34d05cf52d0af4d33963faf55b7eda895f26051,2024-11-21T01:49:03.803000
-CVE-2013-1182,0,0,e53c6760e2602c51464aebb3b431f62e3a1b21ef1899b5e8700e9f272daba85b,2024-11-21T01:49:03.947000
-CVE-2013-1183,0,0,19b76cca92594f3881e282cf371c39f943d876c8abdb7de4257dad275da3b7e3,2024-11-21T01:49:04.067000
-CVE-2013-1184,0,0,0ca2f81093f8e58e0ec430e7199ed0a79da974a5e7c30a2097103bb0586dc2c9,2024-11-21T01:49:04.190000
-CVE-2013-1185,0,0,83eae81bf473031548bdfb10a57ab78888fbfe42c3b5e787a997ea9b1a019e79,2024-11-21T01:49:04.310000
-CVE-2013-1186,0,0,48f889d0e4b4040858517e31ac92a4b60b33fcb13b9aba8e8c33bcadfe678629,2024-11-21T01:49:04.437000
-CVE-2013-1187,0,0,bf81a0456d47c2627b36b6bd4afd95f84ddec9f44b93d3bf8bfbc8a302b7d71a,2024-11-21T01:49:04.587000
-CVE-2013-1188,0,0,26619a9ab16cc32136c1e227494cff8e60dff27115196993a5a96108cf71fba0,2024-11-21T01:49:04.713000
-CVE-2013-1189,0,0,865e0250aa8b64d2241cc0f2830aa45c2c0d5b9dbe90c9a0313ef704874132fc,2024-11-21T01:49:04.843000
-CVE-2013-1190,0,0,b8ff1882ab6f4700b11e8960c872b7b3d2b969d5b93230304def35e45348c94b,2024-11-21T01:49:04.960000
-CVE-2013-1191,0,0,28da4ff25d804eb365cfd277cf9e84479f312eecdb9168c220d3d0dae886bd6e,2024-11-21T01:49:05.073000
-CVE-2013-1192,0,0,f24f391d8721586a63171f8e01663c0fb5304967e0e0ffd891c7c9cdccbd2bf4,2024-11-21T01:49:05.190000
-CVE-2013-1193,0,0,2b8f83010d532f8292348039a47e83e55bf23f40f01e1eb912ad8bb0d4c74b46,2024-11-21T01:49:05.330000
-CVE-2013-1194,0,0,3757de258f4df2248b16a62798543362d6947829d7c379e9e0b639ee83259fdd,2024-11-21T01:49:05.457000
-CVE-2013-1195,0,0,a71b663f9c29f8cefeacdb7fc36c4909146a4674324f8ec488f195d7b8610cda,2024-11-21T01:49:05.583000
-CVE-2013-1196,0,0,69d46cfb6fd6856dd52e66a4e95869f89c5d2e2688ec152311f5c45a118dba7f,2024-11-21T01:49:05.700000
-CVE-2013-1197,0,0,ca95b0cda1bfe6737094e73762856c8fef3dc07697cbe1276325bcd4abce2b56,2024-11-21T01:49:05.820000
-CVE-2013-1198,0,0,cab5097a01a7735324ee54fe7bbe1361fe344e88476be3d9a847b6396eedb514,2024-11-21T01:49:05.933000
-CVE-2013-1199,0,0,5e5b02cd6e98d44f02402a98c03132ff9752b25ab17084a64fbed527491fcc40,2024-11-21T01:49:06.057000
-CVE-2013-1200,0,0,72a1442a1412e4f5ac4077976ae0661ed92d37efea151bfef97351aa869fcece,2024-11-21T01:49:06.177000
-CVE-2013-1202,0,0,061d14b992c75a8e5cfeaed5be8124bb409c4c75fd4988607562863042990098,2024-11-21T01:49:06.303000
-CVE-2013-1203,0,0,e69a2d50b83c3568e1fa9bbb85aceffdbb559153629177320af8cc63484d837d,2024-11-21T01:49:06.437000
-CVE-2013-1204,0,0,bbfe16b7d57f5fa7d2908d65891616856bac2857857dccf03a465e613882b71c,2024-11-21T01:49:06.553000
-CVE-2013-1205,0,0,3ba6271a30182a6d0b84c8dca88d1caedecd1afec049d38036ad51f03d3bab1f,2024-11-21T01:49:06.680000
-CVE-2013-1208,0,0,ac3ea78d21c5d50f6493db2f2f3469d3b3f57135ec8e844d0664271b8bb812d4,2024-11-21T01:49:06.790000
-CVE-2013-1209,0,0,36b1d6681828231dd19239cf6b1c85126eede4b08b90289f8146e08ee7bbafb2,2024-11-21T01:49:06.900000
-CVE-2013-1210,0,0,6b8a69c3b9c1e1fc06de5b7f9d5f99050f1d8c11d4bcd71c8fbcb8387d477f96,2024-11-21T01:49:07.017000
-CVE-2013-1211,0,0,d24300ccd0d0dbf23b0393818fe2fb6482cae03f5e5ead5a5b8d14028f7f05bf,2024-11-21T01:49:07.143000
-CVE-2013-1212,0,0,71c0fe5f628b87ffc21bc3e9217e20c6bf2e2ddf2d26f44a070f81dd84425d9a,2024-11-21T01:49:07.283000
-CVE-2013-1213,0,0,c12922170c9cf8a94aaddd82e535c4fdda36e3dd56beab5b680c581f947e54e9,2024-11-21T01:49:07.440000
-CVE-2013-1214,0,0,5d5d65daa1746b2874a3bcbd48288b6437fb8e3e973d0ed828cdaa6666860037,2024-11-21T01:49:07.563000
-CVE-2013-1215,0,0,02bf8a6079b6467e942cf2426e8eed8dcc61245a1c1ee7f3dd94a3bf95cfe553,2024-11-21T01:49:07.693000
-CVE-2013-1216,0,0,b571f67c481ed325daf8b818aee0e2b3557da9ef74bf1f83782b0955f02290bc,2024-11-21T01:49:07.830000
-CVE-2013-1217,0,0,dd34350d2611e3d617c5297c53525620fb9350a3a9e70ee8f933584c0dd7dd09,2024-11-21T01:49:07.960000
-CVE-2013-1218,0,0,5de9f919a13f69c5796bc7cf2b05642c1d072cb5a3672f839e8add843a44809f,2024-11-21T01:49:08.087000
-CVE-2013-1219,0,0,009728c76f5f3eaa79f88fc46f5c191a4f38e4264f6f391245d4679b2524fc5e,2024-11-21T01:49:08.213000
-CVE-2013-1220,0,0,bdcfd9398d10c3285b113a8722c93422b6dbca5a86ea2259fc1dab119882f835,2024-11-21T01:49:08.370000
-CVE-2013-1221,0,0,c2b4a25fda66cb7a2165049e283821f628a1179640deecd65aefdfa3906bb3f4,2024-11-21T01:49:08.483000
-CVE-2013-1222,0,0,8c17c5d057731aa0316b37ff97d415887fd7c23ce1bb97ed015f436b99da02dc,2024-11-21T01:49:08.597000
-CVE-2013-1223,0,0,e8551ff15b28f902ce3a1144c92a12439636695b5ad81d1f6643198c136e670f,2024-11-21T01:49:08.727000
-CVE-2013-1224,0,0,6f8ce9069a9751b48fe37259671df944225d6cea5e81a36578026df166b4ceb7,2024-11-21T01:49:08.850000
-CVE-2013-1225,0,0,f15ada6ce8426cf364aabeb35164173a70fdda8e80d4fa63b6bb4de8e8b35422,2024-11-21T01:49:08.987000
-CVE-2013-1226,0,0,a9d39aa899d0b01bfaa7dd6b4fbe01d2322fa730c3024c92e3d3d264b1b02848,2024-11-21T01:49:09.120000
-CVE-2013-1227,0,0,886015a652fb54dec6c8e255904a226046867a66cf146cf14298d2394a760006,2024-11-21T01:49:09.247000
-CVE-2013-1228,0,0,efd6b4fdcb80d83cfe14364604b0d20387fa0596dac0a4905ffb1291bb7c34b0,2024-11-21T01:49:09.370000
-CVE-2013-1229,0,0,af889b962331fb618e47ad12cf8f4128fa93a7a3921632847e6ffc548d30689a,2024-11-21T01:49:09.490000
-CVE-2013-1230,0,0,b3b359d497f812ad2d91739be6249d86d329c517092ca63a7e54807b4decbbbc,2024-11-21T01:49:09.610000
-CVE-2013-1231,0,0,864d95fab3f8b255de0c0dd74a1e2033e3351df0434cd0233278bad8e2ac6d42,2024-11-21T01:49:09.730000
-CVE-2013-1232,0,0,a712d12ece6418aa582963f85b8844703d6966b69941b91ac6200d426e7004b1,2024-11-21T01:49:09.843000
-CVE-2013-1233,0,0,186dfc2d52399985890b8f051e26f0cb864b99ad63ddd8ce4be4a1ebbf0dd74f,2023-11-07T02:14:41.510000
-CVE-2013-1234,0,0,8a8a1d700f2b5c5dc6098fc41519656a63eeee22ec2cdf38162cdd729ece460c,2024-11-21T01:49:09.977000
-CVE-2013-1235,0,0,1b013f35ac4eb50d9143334c8f38a465856fd9a7003a253ea3e98967a71f5ba3,2024-11-21T01:49:10.087000
-CVE-2013-1236,0,0,e025f795ec1cdd64cea411d5e838a8d0e4ec00a9f333e0c4f893cfb4411561d0,2024-11-21T01:49:10.220000
-CVE-2013-1240,0,0,2c910c784246450e81ad71ac153c477059ffd818928d69325f54195c711008a0,2024-11-21T01:49:10.357000
-CVE-2013-1241,0,0,7cf5224b57455246b9d38845e0526fdbfafef56eb2b73e9819a7d416ee1d6a46,2024-11-21T01:49:10.487000
-CVE-2013-1242,0,0,281646f6e346fd02c97be59e640d68095214e2227f2bafc6b7996b9fcae05beb,2024-11-21T01:49:10.613000
-CVE-2013-1243,0,0,43e47e8a0522181ee84456153c31eb1c80f8bc2374ba2185a21398a3effab5ef,2024-11-21T01:49:10.733000
-CVE-2013-1244,0,0,fe7b6301fb80ee6675e5681c02f4dc567c8f0aa883ec514e798d7fdfaec8b534,2024-11-21T01:49:10.850000
-CVE-2013-1245,0,0,5169d1c544bc258250f6fe9b09500a2709059fe14de693f83797979d414a653b,2024-11-21T01:49:10.970000
-CVE-2013-1246,0,0,ec741ea97694a7a931369511ca3f81fc9d0e8c333fb7efbf86847a2cf9e4229e,2024-11-21T01:49:11.080000
-CVE-2013-1247,0,0,8c896ed5adb46cddca9ec112ef6fd1486e01821a5e0b785b623ce89838ccd4b9,2024-11-21T01:49:11.193000
+CVE-2013-1099,0,1,b9788f6c5a1235d4cbee3d9ae671fc9a15b8b5c9fa6abd7dab9e583d5c1effe5,2023-11-07T02:14:40.323000
+CVE-2013-1100,0,1,5edc68541334b641daaccdf8dae312a317b536762309b6426743635eea71314b,2024-11-21T01:48:54.600000
+CVE-2013-1102,0,1,b65d662e511e29846eafa2d9f102d320fcd50f4b798ea49aefe06bcf46d89611,2024-11-21T01:48:54.720000
+CVE-2013-1103,0,1,3eaaeb54998fc375439487e500681d8129cbe72a4492720e4b2f91155a3cbbf5,2024-11-21T01:48:54.843000
+CVE-2013-1104,0,1,83d1aa45bb7e7d5a8eb8408456e7aac70508e7a199e8411cb2c348565a0e6705,2024-11-21T01:48:54.963000
+CVE-2013-1105,0,1,9255259371d353db29a1a1de94e65d881859d5a55d8af176c3e0fdbd310ae40e,2024-11-21T01:48:55.073000
+CVE-2013-1107,0,1,3f4bd9796fe71d42a78c47173a689f565e2cd4af165fe267db52a02a9a3f9f38,2024-11-21T01:48:55.200000
+CVE-2013-1108,0,1,c8c25714021fa9d6361b6138b7c13bc8da7aaaa963827b69e4a6075d413c8696,2024-11-21T01:48:55.313000
+CVE-2013-1109,0,1,eabcda07b3482e93f0074fc77447e005d30be7d9bb1bbad3d48f1c5c89439361,2024-11-21T01:48:55.423000
+CVE-2013-1110,0,1,a4dd880772e68da7c014d1828a867c40d50b6568b595d823a1674685fca9a611,2024-11-21T01:48:55.533000
+CVE-2013-1111,0,1,733899263874999e52348417364977c2e08ad23de1b93a0d9f6342bc2894e630,2024-11-21T01:48:55.647000
+CVE-2013-1112,0,1,34031718fb13cd165d7e865d37dab0b21cad02607469cce1e96338ff13628ef5,2024-11-21T01:48:55.760000
+CVE-2013-1113,0,1,66458888a440569e90d9657ce3320149c7d8b8578aa88d52260f49e54e6f3b21,2024-11-21T01:48:55.897000
+CVE-2013-1114,0,1,5e18477dd9b9edcbbaec1fdf8a7478c2bf12683fec53fb676a9f220b716bf76e,2024-11-21T01:48:56.010000
+CVE-2013-1115,0,1,f78d08ae0c9587d7cff926f43de2997023d2c0dc78e751fe7f9d111c002c4756,2024-11-21T01:48:56.123000
+CVE-2013-1116,0,1,fb23a5fd80e220e97ffcc2d4d2ec99f0acbf7afae0a35f2e0359b88341c2f634,2024-11-21T01:48:56.237000
+CVE-2013-1117,0,1,252a0e73bbad0d0a09985a65c8445a94e5667ee2a9aba221999144361fd79165,2024-11-21T01:48:56.350000
+CVE-2013-1118,0,1,f4c57d3152660acb62cbcb144f2ebd440ee5c16b3a3c5a0618f724cd47a4230e,2024-11-21T01:48:56.460000
+CVE-2013-1119,0,1,cba8d8775060d28e9ef7aaa8ef050c6229c8ddbaeb47fb9fab8f785677aff46d,2024-11-21T01:48:56.570000
+CVE-2013-1120,0,1,6fc666821367608c53689642d11d953249e5b0f8e53b970721d12b649e2c1b9c,2024-11-21T01:48:56.690000
+CVE-2013-1121,0,1,a97ce8c5065a0a0fe5fca1d1bba8fe7393cd3e25ae0391eeb718159e90eb1c41,2024-11-21T01:48:56.810000
+CVE-2013-1122,0,1,7c44f6ff73d39dab56d56fa072414ae5479b084c2bddbf96bfa15fc83bb320fc,2024-11-21T01:48:56.933000
+CVE-2013-1123,0,1,21ec267a4ec29510323494ef353b73f3b4d9ec42558279517d33a85bd9b9ce49,2024-11-21T01:48:57.057000
+CVE-2013-1124,0,1,43164eb22708a2c32162e21c01d922ed2a7ee8f309aecfc40c443f4ff9236ee2,2024-11-21T01:48:57.177000
+CVE-2013-1125,0,1,c230fc9381f62e62d7f05ac72b4432072af39f6ca970a462916c0c450ff755ad,2024-11-21T01:48:57.287000
+CVE-2013-1128,0,1,66166f98c90ee1cbd390656c10e083010c5adc2bb4dd6075e42997cb1eff6f49,2024-11-21T01:48:57.400000
+CVE-2013-1129,0,1,3397098ce271f8988567d2a0e6282299277df4de0f833c0dd8bedb16ec74dba8,2024-11-21T01:48:57.510000
+CVE-2013-1130,0,1,f6257b03dae669af08242d447e21430d3560862c111e7ffb0c1a02924572ccfb,2024-11-21T01:48:57.613000
+CVE-2013-1131,0,1,e6060d3edaa98dfce74168407e55bbf3c235df8b53fac4c50b1222218409e307,2024-11-21T01:48:57.730000
+CVE-2013-1132,0,1,24c74bf8db9e0558c11a2cf18f786e799d31c564daaffe6d67cdec2360608226,2024-11-21T01:48:57.850000
+CVE-2013-1133,0,1,30d0a78e4e419f134a3fb10905b38506b9994ff7c69e114439b229225d72371e,2024-11-21T01:48:57.957000
+CVE-2013-1134,0,1,04473451071b8869e86543b7658d12642848e250cd843a6d6204fe390e6e6b3a,2024-11-21T01:48:58.063000
+CVE-2013-1135,0,1,9cce142e135ba29e187885269b05ceb070f01cb83367e1649710f8466b5b3ce7,2024-11-21T01:48:58.167000
+CVE-2013-1136,0,1,9f0b06c572ccd39021e79ae73e9429a1c536f4f2e3fbcf2be356cd3b2ad5f55a,2024-11-21T01:48:58.273000
+CVE-2013-1137,0,1,3f2f1a97b29449cc8f78b7477df0d49ed095bd2fa12a97a0e89741e99a983891,2024-11-21T01:48:58.390000
+CVE-2013-1138,0,1,6c7fd14450f0379ecbf27efb6c7ce26fe636ca7529911424d25f20b468244e9d,2024-11-21T01:48:58.503000
+CVE-2013-1139,0,1,8015b56cd05f6149ef7c86b48e37b873553b2ad2341b59794b51762b7537659f,2024-11-21T01:48:58.637000
+CVE-2013-1140,0,1,0bec6906bebb1c39f03c1e58ec2cf4beb799a94199b21ddf4f9a9fb33a823dba,2024-11-21T01:48:58.747000
+CVE-2013-1141,0,1,9f7fc1c0c6f878e5e140e7558748de2952b0f25837b5107b4d611d23a84cb3fc,2024-11-21T01:48:58.857000
+CVE-2013-1142,0,1,e8e0e96aa14b8539adc2782fe312f4b80d5abb7b73c8ba8659dc9d42b68e3610,2024-11-21T01:48:58.987000
+CVE-2013-1143,0,1,98e5c16e8c570a7583f22e4b3b58ecc303943f93adb026cb66ed59c6386a8018,2024-11-21T01:48:59.110000
+CVE-2013-1144,0,1,ef878af9b6a4fd34715a5502b1ebcc18e846c99b7b97abebc58f8dda61c340e9,2024-11-21T01:48:59.230000
+CVE-2013-1145,0,1,23f08962e19dbba43a030b229f9ddbd2f1868bed5c0e6393bb90eee4ae2a4900,2024-11-21T01:48:59.340000
+CVE-2013-1146,0,1,287d0788189b5a34bb865c789f4a3d92c084a16a7efcbb78cf839dbc9d03b42a,2024-11-21T01:48:59.463000
+CVE-2013-1147,0,1,e8b99902ef32a49abac3323d10acabfcff13144634dd2419433ca4b1787746e0,2024-11-21T01:48:59.573000
+CVE-2013-1148,0,1,f53d6c87dce0e9edaecf04a61bd09f6877f631b91b3946e6d69b894c8599d48d,2024-11-21T01:48:59.683000
+CVE-2013-1149,0,1,bf2731cf220576e0b0ec87308892a8caa641944e2b0a73f2ceb5390d86b9f73b,2024-11-21T01:48:59.800000
+CVE-2013-1150,0,1,edeb6acb8ba525d6364656a8e975794b7185f283fb35c4ab11e49f17e93a63fe,2024-11-21T01:48:59.947000
+CVE-2013-1151,0,1,a2adbb67514e051ffcf77676d33cca1ec7a27fd73314a3b28c4bc2613d6fae16,2024-11-21T01:49:00.100000
+CVE-2013-1152,0,1,378775be50f794105f05dac1439bd80b9e65ff31d7f8eabad155e9df7850da93,2024-11-21T01:49:00.240000
+CVE-2013-1153,0,1,25fb2243243f155c3e72c801b5023278e280e0e32624ffd9f0d7f4d724a47a0b,2024-11-21T01:49:00.357000
+CVE-2013-1154,0,1,b2d979f34cf8b83cdb2146f2350bb7ae663e94d6a17c809355620dfc73639a36,2024-11-21T01:49:00.487000
+CVE-2013-1155,0,1,b214210a1f7a1657f6fc00115a7ef03e105470450ae9e4bc8df3313b1ed1788f,2024-11-21T01:49:00.623000
+CVE-2013-1156,0,1,285eefa1afdafb42b9b9cfcceaed9a95616b9b5ef80fff8af7b9f5c4d10173ca,2024-11-21T01:49:00.733000
+CVE-2013-1157,0,1,ae4f56f298648938386bcd850b31275102facc5045dca512dec96776fee3bbad,2024-11-21T01:49:00.843000
+CVE-2013-1158,0,1,1e794526693fdf760a494eb329a5233bad73c86d400adbacc8ed8555b6a7a89d,2024-11-21T01:49:00.960000
+CVE-2013-1159,0,1,eb13c13c41bcf4264157d6eb5820ee3c7b8146baae42066af4759d22c6f62dfd,2024-11-21T01:49:01.067000
+CVE-2013-1160,0,1,c1b3cd651d27873444b25e0a467b03449e618a65d73722e7910ae380b4dfe84c,2024-11-21T01:49:01.190000
+CVE-2013-1161,0,1,50c5140497de452c0e0c32953589d4b17fb209f30fb136be227d23228d634022,2024-11-21T01:49:01.310000
+CVE-2013-1162,0,1,ef66b8187991ab5dd9e5ecd050f62fc15b68dc512c3791a064e3f78fa1e98cce,2024-11-21T01:49:01.427000
+CVE-2013-1163,0,1,2af0361932f4ea5d5e207a6559b3237bac4050b684da482d0e0841b01a89ab02,2024-11-21T01:49:01.543000
+CVE-2013-1164,0,1,d3f6de42d1c56091203c6b6bb1fb6e08c81c26c3f85af620f11463d393b07a75,2024-11-21T01:49:01.663000
+CVE-2013-1165,0,1,6026e80ca57db76f4d73810e9fab43174234e5512b217e4f2404d1f7f6bed3c3,2024-11-21T01:49:01.807000
+CVE-2013-1166,0,1,db1a31b34f35498d7ad66052327c44b636ceea45bb5d24f84c0e35902d0d5ae2,2024-11-21T01:49:01.940000
+CVE-2013-1167,0,1,227699888b2f9e407e5e2388bfdaeee8156b5224d85526c757b848972a4840ab,2024-11-21T01:49:02.060000
+CVE-2013-1168,0,1,3bbd892f0dcbe320790aafea9d6af14795724f5b5447094d9c5be890e72675a7,2024-11-21T01:49:02.180000
+CVE-2013-1169,0,1,872d998a55ccdb34ca1f1db0289ecec3d3d053689e18365736c4fb4273ab0b82,2024-11-21T01:49:02.310000
+CVE-2013-1170,0,1,4740a8887eb000895871d3993d4bd50742e2e38df23b1cef134d3f883fb7fd91,2024-11-21T01:49:02.427000
+CVE-2013-1171,0,1,7ec077fb33083643e4266ac78d811b95124cd7b73071d26064adfa815f266420,2024-11-21T01:49:02.540000
+CVE-2013-1172,0,1,6de708279b90f443341f672e2a5fc49bb054ce015f3659294c8cc1e32bb54d8f,2024-11-21T01:49:02.653000
+CVE-2013-1173,0,1,6f3068e0c735e62ed6bb15a4225516bf41e1efc29c6feeb5fdf17c84261cc25b,2024-11-21T01:49:02.783000
+CVE-2013-1174,0,1,6f367e7a0465cc730f4aef2c8fe2ea6b06261077632ec8685f3a98e17dedb1ab,2024-11-21T01:49:02.930000
+CVE-2013-1175,0,1,2062c5c96ea6612124c95bc4646c872edf6e4556d332092c3b0aaada38a6894a,2023-11-07T02:14:40.970000
+CVE-2013-1176,0,1,1abd2fe25544f6ae4911de7547013593ecc9eeb7a6649055184fca46df1b9483,2024-11-21T01:49:03.067000
+CVE-2013-1177,0,1,02e3ad3b7d7c8fe18ebb9c2d4adbcc6656dcd21990b3cfa8de0b897d31136bf2,2024-11-21T01:49:03.213000
+CVE-2013-1178,0,1,02b158d71b1c1f9629c3486685cf84fa65eef4abddf460d01a589a8123b416a8,2024-11-21T01:49:03.347000
+CVE-2013-1179,0,1,fbdcb3daad646bc306e5b03bff985597456f0251f320c5cc2911b88d4d6f9844,2024-11-21T01:49:03.523000
+CVE-2013-1180,0,1,0a0b89a86dfa07a9e1f54c3d068a99b55834294fe832973aca94d6c095f22f56,2024-11-21T01:49:03.670000
+CVE-2013-1181,0,1,d8528210864835347cd26fb71a7ce51fd7a80ab8b8521e00c53de0622bcc7c4f,2024-11-21T01:49:03.803000
+CVE-2013-1182,0,1,c6cc40d6c915e2cf16bc352fbdbe0bbfb3c51d9c8ad63069457df882e06c0ba2,2024-11-21T01:49:03.947000
+CVE-2013-1183,0,1,5f82845ba5c4c20689e3e4562ab82be4817b884742bc8bf4080e692d46392e96,2024-11-21T01:49:04.067000
+CVE-2013-1184,0,1,2694cdc99fdb5acb4e2f4548362950239f6c9c45c80002645d020a4a5f549a5d,2024-11-21T01:49:04.190000
+CVE-2013-1185,0,1,3e4181d98224697eb3e78d5fce9051e4f45bde2bd541d0d150b64db8d3958786,2024-11-21T01:49:04.310000
+CVE-2013-1186,0,1,ed7f4c467429906346f6d6197df2fa13e3b3a397ae1364024fa25da89de9825d,2024-11-21T01:49:04.437000
+CVE-2013-1187,0,1,ae6638231752eef6e62929a71ae8829e92dc5d14fa87a9fc776db7021af55dbd,2024-11-21T01:49:04.587000
+CVE-2013-1188,0,1,a01c1353eac57990534fa85e43031845a8e8832d2dc89c3c44c30dfffc9e0380,2024-11-21T01:49:04.713000
+CVE-2013-1189,0,1,763559604f875632ae91367779a290eba3286aedb92f1f2018a6c9fea01d2498,2024-11-21T01:49:04.843000
+CVE-2013-1190,0,1,cf8e5efa502112d050dcaaca11e18e4443b6b34e342331608019dfbfc4fb06ca,2024-11-21T01:49:04.960000
+CVE-2013-1191,0,1,71c8fb7602efc49a64f5d2502b02c0f2d27aad84ade26426d2ad265b0d65492a,2024-11-21T01:49:05.073000
+CVE-2013-1192,0,1,3d3feb475ece010fe61c226bcf944233eaf18ac6be0083351ac950abb75b87df,2024-11-21T01:49:05.190000
+CVE-2013-1193,0,1,f98499ada51dd5f6f3e0517628ef9286b9dd53ba38f9ab64db6cfafc79a32e00,2024-11-21T01:49:05.330000
+CVE-2013-1194,0,1,f807cf416897db655a9f6e75f6c4d0e5815fde7cbb0f87fcc5aa3a3cc26c0ac4,2024-11-21T01:49:05.457000
+CVE-2013-1195,0,1,80f8de97cd87734c09e749f7c0a5e7ed6bb9809e68426386749f2c8af8d9b077,2024-11-21T01:49:05.583000
+CVE-2013-1196,0,1,2487817c028e9a31e207b22b87b19a18baf790a93d29906e7ef1baf1bded836a,2024-11-21T01:49:05.700000
+CVE-2013-1197,0,1,f43df09f076ba4988764fa60368feb8a39028071bc0e0e862345ff0d11eb7fd5,2024-11-21T01:49:05.820000
+CVE-2013-1198,0,1,d2a46e5df502b5b81dd15dd318ff05e869e1a0dbbaeda82de788ab01f504b45f,2024-11-21T01:49:05.933000
+CVE-2013-1199,0,1,7f090fa737dffa111bbb0b9f7deae8d89d2cdc0999398143a91ac277ef85300d,2024-11-21T01:49:06.057000
+CVE-2013-1200,0,1,ea2d32acd390df0b7d24c80d14054f2831c07770364dcc475e59ae7a892a3667,2024-11-21T01:49:06.177000
+CVE-2013-1202,0,1,dd2a97fc81afcb757d1e17f99ea795fc2abefd3c81d47a91b8224280f3c64bed,2024-11-21T01:49:06.303000
+CVE-2013-1203,0,1,945c1f4a1ff7e7a0371f690de5d392315885fa9de33bb496333bfe60a489c2d2,2024-11-21T01:49:06.437000
+CVE-2013-1204,0,1,7269f332315488c2ecd0a4e97edc55cb68c72842efd492801cbe1e294e3d0522,2024-11-21T01:49:06.553000
+CVE-2013-1205,0,1,4e7f4fafe8a2fc9746a0a9b2116d19120a503e104ebbb24c48855ebcd2d086bc,2024-11-21T01:49:06.680000
+CVE-2013-1208,0,1,eb17ac95ee9f5f5753f21d04752aa277bf2ddd6869c7fdd54d37414b005a119c,2024-11-21T01:49:06.790000
+CVE-2013-1209,0,1,b10576a9e953ec15aa469846e41e003a8def134b1e894ad1160fdff5345a4291,2024-11-21T01:49:06.900000
+CVE-2013-1210,0,1,3d93cd5264654ce67f09af12f52465a3f489f8c07ea236e7ee50a6c8bb1e4026,2024-11-21T01:49:07.017000
+CVE-2013-1211,0,1,3d4a49069be85b16237ed2b9803690c61186077b7e7a20cd6c0cf390b77f4b70,2024-11-21T01:49:07.143000
+CVE-2013-1212,0,1,74e0902c4c6c6acaef94240c54b1ce65bb2690918c15d8b970aecea941a618e2,2024-11-21T01:49:07.283000
+CVE-2013-1213,0,1,9f29c01d264d5ab2f8bf86b70b04f5a266425118ad15db4c6bd9e85d6ca10da2,2024-11-21T01:49:07.440000
+CVE-2013-1214,0,1,c3f0a7cb3e9e03e142a4d7b02674426ff00ca83e9c3747d6dd4e739ae891fcd7,2024-11-21T01:49:07.563000
+CVE-2013-1215,0,1,17dd9fcb48d39165b2d6ece15bfc62dd16f3fd48bf0e8b2dccd0c29a63d4e533,2024-11-21T01:49:07.693000
+CVE-2013-1216,0,1,3b80fc54dc695ac574dde3094b126293afeec3c8b97c309aaa4acf95cd6cbd07,2024-11-21T01:49:07.830000
+CVE-2013-1217,0,1,65348c6fdec8d81ad84aea4ec8316e464319c1151fd00ac55cbd6bdca48f494c,2024-11-21T01:49:07.960000
+CVE-2013-1218,0,1,e89bd8854abaa594cb2f3fe0f72b0f1a2b6a81e0c4878695967b3fd77c13e36e,2024-11-21T01:49:08.087000
+CVE-2013-1219,0,1,d163af1876c5b394cbef191d7ba599d859eb760dd219e4186f62e26e690c2cdb,2024-11-21T01:49:08.213000
+CVE-2013-1220,0,1,55ed3eb3fc730cf0fecff15c76d49db61d41939b322ee00c4b074fd1e7dd80d4,2024-11-21T01:49:08.370000
+CVE-2013-1221,0,1,337495e9310bcaec7a9ed70a9827bb846e576e6586c2028e7ed58ad474662a41,2024-11-21T01:49:08.483000
+CVE-2013-1222,0,1,225c2b0eb276f19e16509922799082ac008f2e9853b2aa8db69de07151f04b4a,2024-11-21T01:49:08.597000
+CVE-2013-1223,0,1,224571d359521cac6a0d64e451729fa63a22a68ecc3de43064f507e1e6f0159f,2024-11-21T01:49:08.727000
+CVE-2013-1224,0,1,9af60c250cbf32cdc3a559d18578dc3c6411398efc8a6a6a73d7ead6d2651734,2024-11-21T01:49:08.850000
+CVE-2013-1225,0,1,417b54fce9f3ebb783ef83530bfdbc35f28c7a389bd0999535bd312a0238c27c,2024-11-21T01:49:08.987000
+CVE-2013-1226,0,1,a7964cef5eeebd1e0665e38f64c40809ef702c5ca7ce4d1207c0a6c46b75ab12,2024-11-21T01:49:09.120000
+CVE-2013-1227,0,1,1ba4045aa44e729b6896fecc48c6f695d71918bdd96f99983aabbae6927ac4fa,2024-11-21T01:49:09.247000
+CVE-2013-1228,0,1,cb6b853530295db35da70c9f6531c8a62fdd973a40ef91e57b26a28bb241e5ba,2024-11-21T01:49:09.370000
+CVE-2013-1229,0,1,6c683ccd163c6a8ed315d9fc7f0b483092af6104f014ca218632c373b1f0ead9,2024-11-21T01:49:09.490000
+CVE-2013-1230,0,1,71820a1ea6140f5b034283280f55a25286ae92cb4214d2246bbce5e2d9b0a9e1,2024-11-21T01:49:09.610000
+CVE-2013-1231,0,1,a0b4f4036106a2375bd5172525d724894d7db6105a8179521b07fbbe057e74ea,2024-11-21T01:49:09.730000
+CVE-2013-1232,0,1,510ea2133d609d84f90f3ada338cf36b5b1f1995885119837f2d7a7711711dcf,2024-11-21T01:49:09.843000
+CVE-2013-1233,0,1,a15095fc710858be85b044ec174e55109c92efa86d2021c35727ddaaac1ff439,2023-11-07T02:14:41.510000
+CVE-2013-1234,0,1,59ed6583d6bbd0cac2e27b0f1266c2a72c76f32357276bf3d57cbb665920f12e,2024-11-21T01:49:09.977000
+CVE-2013-1235,0,1,9b004fb5ca5c05fb7feac3108606d4458365853b42cb2980c868ce66b9d5564a,2024-11-21T01:49:10.087000
+CVE-2013-1236,0,1,f1a7cb8a189db52d80820ef02001a018614c306fa7204e3c8f32219f2a342aa6,2024-11-21T01:49:10.220000
+CVE-2013-1240,0,1,0ba7651552f22b061748ad511fa75a3eec6c376336feddcf68fb2fe1af06a711,2024-11-21T01:49:10.357000
+CVE-2013-1241,0,1,01b59a26f06bd6c664eec287d36f3076c59bddad12e7b3469951aaafb3b9a0fe,2024-11-21T01:49:10.487000
+CVE-2013-1242,0,1,14c86e8e84bb65e77ef5d3f8219f9def76b25949cc4ef4934cf4eb96c5143759,2024-11-21T01:49:10.613000
+CVE-2013-1243,0,1,109243a379c60f18bdf9dd4541b8907fe99dc39a0ed5b21ad25720dfbadbe5b4,2024-11-21T01:49:10.733000
+CVE-2013-1244,0,1,e0d0e34192c091b350f7e6cd122b09b396a4fbd13733d0db3a9e441966526b39,2024-11-21T01:49:10.850000
+CVE-2013-1245,0,1,a5624067af381cc875513ffb757a96cf929789ca8a7fdc477752718d940634b5,2024-11-21T01:49:10.970000
+CVE-2013-1246,0,1,c595db57e65859889137edd4bad5a4c9b18d06df36c914f0c54029640f2c160b,2024-11-21T01:49:11.080000
+CVE-2013-1247,0,1,a0317ce788fb54944a6e6fa4f74c13d671d7786104271d966f37a3d0544117c9,2024-11-21T01:49:11.193000
CVE-2013-1248,0,0,ac9f263bd15bbd5b296edf4221b5f3f4f1309a059e0adbc6107095941bfb08f6,2024-11-21T01:49:11.317000
CVE-2013-1249,0,0,d7449f9b4f3906f39c7a7d53ecb9b4aa5181e680e0094a8d6f7ee6f04910c6a4,2024-11-21T01:49:11.440000
CVE-2013-1250,0,0,e3613c6ccfeb12123f6635f11dc7f8fe55d5fb8485c24cf64dc27b36c6cbf1f6,2024-11-21T01:49:11.577000
@@ -60823,98 +60823,98 @@ CVE-2013-3371,0,0,81677096071f9cc2069a7ab76c87c3b20251d9fbe22f36f15c8f724e433920
CVE-2013-3372,0,0,94726eb94aa70211b7d808a14792bec634213f0272c054098d6e8b2020ed64da,2024-11-21T01:53:30.127000
CVE-2013-3373,0,0,54126c10c6dc213bacd8e3a1e2f29c998ce743bf142966900223bee30ed80ace,2024-11-21T01:53:30.300000
CVE-2013-3374,0,0,364f7dc5e66625979501728c132dba1c9c0f78cb7a0e9a93466c3e7991ce741d,2024-11-21T01:53:30.467000
-CVE-2013-3375,0,0,0ab8565cbae6cf091dc1faaeced7fc8c8fd93f7dde1c35b3e7bce6ffa97cd3f6,2024-11-21T01:53:30.620000
-CVE-2013-3376,0,0,23ba7bbb6ad09c1f1a8f8f50487b7527ad1b4afa62ed071ca814f495250d5092,2024-11-21T01:53:30.730000
-CVE-2013-3377,0,0,f0b9701cd7a0d812b3ba5fe3b788333ec76a83141f74fb5ad20e5ef68d6a543f,2024-11-21T01:53:30.843000
-CVE-2013-3378,0,0,4d0bb88529bff3289931ece01137785a3d8d216b5a3b7b0cfd8eb85cf2605ea4,2024-11-21T01:53:30.983000
-CVE-2013-3379,0,0,81c774c778f8bde481d7db80da077c3f9f6e34f1699bcf85b27fc9e4a5769a65,2024-11-21T01:53:31.107000
-CVE-2013-3380,0,0,e328f3330064e972f060a948966dc7355a82d982d1f4d6d5d61ee21602f7809c,2024-11-21T01:53:31.253000
-CVE-2013-3381,0,0,2d64d8f6daae02c6c3269b532f1cf12747917fb7dd76e10caeaa33503988fc3d,2024-11-21T01:53:31.390000
-CVE-2013-3382,0,0,9ed0b9455ab83d52bce42b00fd6fad0aed7b6c370e8e6a0c8739a2bc4a8b3f4b,2024-11-21T01:53:31.507000
-CVE-2013-3383,0,0,317d68a43419baefa73dbf57f78b30527d6f706401f8539135ac12edddcb9d54,2024-11-21T01:53:31.633000
-CVE-2013-3384,0,0,2479c25104a9153458f1249b85878b5eb1fba5dee15a1d1367b8ccd291cdd3c2,2024-11-21T01:53:31.753000
-CVE-2013-3385,0,0,aa5860bcb81ee5848b3891bb5ea3c681ceeef48a62a74eb02d0650c0ead9b4af,2024-11-21T01:53:31.910000
-CVE-2013-3386,0,0,e610ed17f9cee38986e5cbeac92c574512441c6fa8875a791470769272475e7a,2024-11-21T01:53:32.063000
-CVE-2013-3387,0,0,56f4c96e0a4709ac99a973f82d09625d1dafb4c77c93409e6f0daf3e1e013d1c,2024-11-21T01:53:32.197000
-CVE-2013-3388,0,0,48a3f65df8e370eefb6a3fac7bad409baddd526165f371c562f05956b2f886d2,2024-11-21T01:53:32.337000
-CVE-2013-3389,0,0,ec0ddd050209b8152116643f6ef07a8bd14e75fecf4f060800713ff838688aaf,2024-11-21T01:53:32.473000
-CVE-2013-3390,0,0,5273971e5532e300d916048398fa6a871daa236c4227a9771a0d4a45213cf336,2024-11-21T01:53:32.610000
-CVE-2013-3392,0,0,e645a407c02054ac43f5ffc97ffb6da8d2b8aff1784dbf4f569f61311b352915,2024-11-21T01:53:32.727000
-CVE-2013-3393,0,0,b37bfe029c7da0000fb56da35ed480522bc4925ecd58d3d0f145ad5743362f53,2024-11-21T01:53:32.847000
-CVE-2013-3394,0,0,488c01f901357976d929fa0fa5c5d2212dc4b3c37d9acf1e7326dc27fdaa4780,2024-11-21T01:53:32.970000
-CVE-2013-3395,0,0,ee205479b83d2b3a772d2f67be82eaf7a9e4c6333d5a78839a426d143a705b02,2024-11-21T01:53:33.100000
-CVE-2013-3396,0,0,9e3ca536d402b8b26e43e26f2f09f68f779cc227079914e6d509150721471aa7,2024-11-21T01:53:33.227000
-CVE-2013-3397,0,0,0aba6a178e1d1051e451333b7be8d220f274d6fd8173b27a5be872b7e328d04d,2024-11-21T01:53:33.353000
-CVE-2013-3398,0,0,25c2f071d32a40b5a3f7a2de02685467a002650b3e2637bf327b597b989abc85,2024-11-21T01:53:33.473000
-CVE-2013-3399,0,0,0aca77f1e0ad13c67b0a77a695db6816ab543957f378d5b94a87f78ae8d3c1f2,2024-11-21T01:53:33.603000
-CVE-2013-3400,0,0,683bea957bf07674de0cd6cac662a37bea07a775e91b898e55f3798908bcb0e2,2024-11-21T01:53:33.707000
-CVE-2013-3401,0,0,7a153971e4c9b368bd57bba8f83c9ab5f4a74a5831a4e83a97095a98d84df6ae,2024-11-21T01:53:33.823000
-CVE-2013-3402,0,0,63a7d2ed2e70dfc72cbe58d5d2007eb3fddc90d242260412a9d573b214cf5a28,2024-11-21T01:53:33.943000
-CVE-2013-3403,0,0,4546cdba8f3f1b819d46c0b7f93b39d173665167918ced15497394f2bbff466a,2024-11-21T01:53:34.070000
-CVE-2013-3404,0,0,2b69d75d8c393c03f76d903a28991f9e521f8eef84cbce032e555ead97402984,2024-11-21T01:53:34.203000
-CVE-2013-3405,0,0,8b976772cdc4774b71178a64efe098fdc4d7d0aa6d689c2d6a4b711cb8d080b8,2024-11-21T01:53:34.333000
-CVE-2013-3406,0,0,c7d1edc7e120ae3839562dec4ecc6f38a05151ac136e8b4fe590068f43ce224b,2024-11-21T01:53:34.447000
-CVE-2013-3407,0,0,26b50ad331d848dcf8130945ea2336de94acb74775a40e71a88c08af7610d355,2024-11-21T01:53:34.567000
-CVE-2013-3408,0,0,24209058b41e0d325a520742eb2f70503579077069f210bb42f06d9e74e85904,2024-11-21T01:53:34.677000
-CVE-2013-3409,0,0,cfd3884bb9f0aaff4cf8cf54c331002d429c2ad2d368166ec047c023fe240838,2024-11-21T01:53:34.787000
-CVE-2013-3410,0,0,f30a70587837d052099d26d9c6640c06075685ee97b97903e6de38c343779b65,2024-11-21T01:53:34.900000
-CVE-2013-3411,0,0,5627894b3da4099f7f67b279484baac5d23338c273de4e29b39b3760ca3b1047,2024-11-21T01:53:35.023000
-CVE-2013-3412,0,0,0d05dc6cc93f0fe8cd26d21748bf3600d5faaa95d5cfc53472973d718704e4b0,2024-11-21T01:53:35.150000
-CVE-2013-3413,0,0,eecba227e063e496eaa5d718fd34ae1c240d2589c91ea8c03e9a92c62f054548,2024-11-21T01:53:35.270000
-CVE-2013-3414,0,0,4f5a42c139a733a999944596b2397f66b44bf808d84e7799f5b41cd2d44acae0,2024-11-21T01:53:35.393000
-CVE-2013-3415,0,0,8c277245a25aea9bfbc044ddcb8a4c0dbc6bad43355b51b004f21d7825da7d32,2024-11-21T01:53:35.523000
-CVE-2013-3416,0,0,8227e3df8227a390abac01522fea1256b3272ff7acf7923bdf35d37e11dcfc53,2024-11-21T01:53:35.650000
-CVE-2013-3417,0,0,fd7dc7a0932fab5145351459ae50b51b96ba44049241aec67e0afe2c331c0f96,2024-11-21T01:53:35.773000
-CVE-2013-3418,0,0,399a15c7be434ac6bfbd5f06e92bd508dc62c6b38b1798a8c75462719dadf9cc,2024-11-21T01:53:35.890000
-CVE-2013-3419,0,0,534cf33b89de0fa0933cf25fcf122a4c2533aad62a11829936ecd7d3fca2b03a,2024-11-21T01:53:36
-CVE-2013-3420,0,0,066544121362faf79b9a5b1202ab142ca0fd978f3e7cccd488ffb73ddd050d40,2024-11-21T01:53:36.110000
-CVE-2013-3421,0,0,eabe87a69f60433d9daf922845a1bb33e856d370b1676412573f92ef484092f4,2024-11-21T01:53:36.220000
-CVE-2013-3422,0,0,9252f9be34ccd69a44e84f56d41ec3709e12731436f2de159ed59b84d62851e8,2024-11-21T01:53:36.337000
-CVE-2013-3423,0,0,f48ef36320fc6f4d807cbf3986e2cc4f93294f144177c38f4b7448a10edf5d2f,2024-11-21T01:53:36.453000
-CVE-2013-3424,0,0,2607b149d272146e509b75f997bb70dac1d11fa96b7e4b2d2b68cba3e2e2128d,2024-11-21T01:53:36.550000
-CVE-2013-3425,0,0,ac18f849748047511dacdd4506f532b8f22b4cc61be8c8c2bc6f20b0089ecd82,2024-11-21T01:53:36.663000
-CVE-2013-3426,0,0,a9e69f4230ea7fc53bc40013992b65a66d45e29c4636d7da6161181f690efb0d,2024-11-21T01:53:36.777000
-CVE-2013-3428,0,0,0fa1ea40a306ff2063d2dcb83d250a7f77fb40684b87e274423359706a0be07c,2024-11-21T01:53:36.903000
-CVE-2013-3429,0,0,b2d9b1f752a7f89015ab47d9e5eef4cef50efd8c3bc75352529984b9b6ce8719,2024-11-21T01:53:37.030000
-CVE-2013-3430,0,0,14d557b74a4febd46618cb7111b854f8fd2b450848572a830097bb7b745c8a89,2024-11-21T01:53:37.157000
-CVE-2013-3431,0,0,3b981b3c3c5bb118ebb3ce2621c379ca904108bfb6a0921cd43893bb35d65463,2024-11-21T01:53:37.293000
-CVE-2013-3433,0,0,4a6d611cd709c7d0e5437579c14a0abfa9c03b691e0d0f6c45a3f24066a885a3,2024-11-21T01:53:37.430000
-CVE-2013-3434,0,0,573a6309ab02d4d0d84f03073a900be69025216514ba0ee02fa5795f686a17b7,2024-11-21T01:53:37.583000
-CVE-2013-3435,0,0,81f3cc38b276b6bc31565e44bb82bcdaebac13eb083f599874ecaef93f09b33a,2024-11-21T01:53:37.723000
-CVE-2013-3436,0,0,f9880aa93471117481431c9f2dd5e0e4db23ed17f4287023a9dedb0e2d2911c1,2024-11-21T01:53:37.847000
-CVE-2013-3437,0,0,873177d682985ca42da39e36b825a9e06accc99f1fd05eabfee67001841aa087,2024-11-21T01:53:37.963000
-CVE-2013-3438,0,0,e7197e2efb5ccf5af8cbe3584351dab099b7306bd29f908afa1b54cf824026f1,2024-11-21T01:53:38.087000
-CVE-2013-3439,0,0,4e95dcfe17fb61c4844a4605457dd6cdb0ab448151fecfbbe6dd8c885e4b01ab,2024-11-21T01:53:38.197000
-CVE-2013-3440,0,0,39661b17488918ed0a0226067cc8cfd8275d5f12f72fdf652510870a4b27d9c7,2024-11-21T01:53:38.320000
-CVE-2013-3441,0,0,0e9adf734ca9adc5472fbe911d61b81bd71085fe6cca0367462c0f518dc67c24,2024-11-21T01:53:38.447000
-CVE-2013-3442,0,0,bbc01df0819b3c522a7413d3c5df06f94638009a158ae7eca5b41d1c105a0aa8,2024-11-21T01:53:38.557000
-CVE-2013-3443,0,0,5cc926c88260fe693df5404744ca425724c4df8b7959b2971fcbbfdad3789f76,2024-11-21T01:53:38.670000
-CVE-2013-3444,0,0,f4a21c3932933a70e2628f5932f5039285818a8510e60fd6c8cc24698241a5a1,2024-11-21T01:53:38.797000
-CVE-2013-3445,0,0,04b1ec1d033e5bf8ae36bba9de6d6d0f1396a01415161a5fc74567bbb035c65f,2024-11-21T01:53:38.953000
-CVE-2013-3446,0,0,fac8dc70f9740f6a756a45670b462df872205fd1f3903a166c697370c2bd862f,2024-11-21T01:53:39.070000
-CVE-2013-3448,0,0,9862123fd96b3d993e5f37d279f414e0c405959b702f46a7e52a8000021be280,2024-11-21T01:53:39.177000
-CVE-2013-3450,0,0,f0bd8f38be0b498d64178290598a0eebf3c8139d780b89417ce5edf0b6cba1a3,2024-11-21T01:53:39.300000
-CVE-2013-3451,0,0,b988c1889be749ad54623b56e41af10d41eafe5397ff4e3fca844898dd220991,2024-11-21T01:53:39.413000
-CVE-2013-3453,0,0,cb9dcad99d02218e460a335f379a84499b3869c2c40a308cc1cd4539514e577a,2024-11-21T01:53:39.523000
-CVE-2013-3454,0,0,cf2eafc9e583327d30d3b30c9887b3cd5d65091eb47d914c7321106c33a96c74,2024-11-21T01:53:39.660000
-CVE-2013-3455,0,0,79c5aef5902af6d49aebb37ec0d72a91e392e1ebc294d84fe09990d7d67b3989,2024-11-21T01:53:39.787000
-CVE-2013-3457,0,0,5779527567b4b8a73de7e51446a177e8533a956f7f5c4a6007a7665c0b388d91,2024-11-21T01:53:39.903000
-CVE-2013-3458,0,0,bddac4aa69b78a675f2c7ddebb5897d33e5787f0828477c51406e8efe7c022d8,2024-11-21T01:53:40.030000
-CVE-2013-3459,0,0,fb4254060268db2aa9fe402cab1ed381c25ef21c221848bc8a701ca9a34b67b0,2024-11-21T01:53:40.140000
-CVE-2013-3460,0,0,fe08996025907d0799c2c472be850385442cdda1e66d06af3dc7e841d36afb47,2024-11-21T01:53:40.260000
-CVE-2013-3461,0,0,69cb96892f7cc2b107b1cae1c79067b1bf00de49d4f0facc0c290c806d7f00d9,2024-11-21T01:53:40.383000
-CVE-2013-3462,0,0,6faad85b0a96f6118ed5f1018218f8e64b789543c86e7f11d1626ec85935921c,2024-11-21T01:53:40.500000
-CVE-2013-3463,0,0,5e8fc01c6df3160dd64932a51004d3acb449fd42f20b9ba80ad17977497d5baf,2024-11-21T01:53:40.623000
-CVE-2013-3464,0,0,cb685686f41edc025545c95f5fc813391e205ad80e733962bc36e6c459cbd8ba,2024-11-21T01:53:40.743000
-CVE-2013-3466,0,0,e7454eabc873635dbb0b81088e59d4d9070ecd0815cdf72e567a041d49c3cce3,2024-11-21T01:53:40.870000
-CVE-2013-3467,0,0,ad3ac5bcd472f350496060dfd5992df6409bb39d5cc731ef32ca451df991086e,2024-11-21T01:53:40.987000
-CVE-2013-3468,0,0,651f9ac7c7f5fd19223f9a900c6f6256b404190ce831115d2db4da4fd89cf405,2024-11-21T01:53:41.117000
-CVE-2013-3469,0,0,505117015255df2478906fa7c0f6ce3942e244d330695b70c2b007023ee28110,2024-11-21T01:53:41.227000
-CVE-2013-3470,0,0,eb54871a6265dc6572021f545ff6462b0333aff3226328cee260296bde2425c9,2024-11-21T01:53:41.350000
-CVE-2013-3471,0,0,edd5e6f80bf5057737edc631bba4fbaa70a3b908f5014bd5b9e9f091cb42fd36,2024-11-21T01:53:41.470000
-CVE-2013-3472,0,0,4a28609dd1856c51c666d687763db84f6fe1ae26dd1656605752142aff799a92,2024-11-21T01:53:41.580000
-CVE-2013-3473,0,0,c2b7b1ff463d825cba835f939d09323acd2e99bffd1c92b6c9477ad8aa019359,2024-11-21T01:53:41.690000
-CVE-2013-3474,0,0,d1e2f846bc779c3490975d258d35a71ec63d9b2eb2bcc721f64c958d54e50289,2024-11-21T01:53:41.800000
+CVE-2013-3375,0,1,d8254a4245d3c3644dfe3d4af9cb5df8de2c2c80da5c157c777f2fdf9c9fd490,2024-11-21T01:53:30.620000
+CVE-2013-3376,0,1,ec40a1d0d888901a94d398c85bfce7913d52a5ef1bba37ef755d3b839cdf0482,2024-11-21T01:53:30.730000
+CVE-2013-3377,0,1,6470f37bfcd9818fd94fdf257349d59c02a9263547ae1345b7e92928f514c87c,2024-11-21T01:53:30.843000
+CVE-2013-3378,0,1,5daec88fbb97592f8671f3bc261e621f8adc6b4386acc6fe945f2235031dd830,2024-11-21T01:53:30.983000
+CVE-2013-3379,0,1,b47b2959c5e2ad62a85dbb2b6277e1de2067b9c693ca5c84e809a3ff068b9918,2024-11-21T01:53:31.107000
+CVE-2013-3380,0,1,6a0aa207e84d9d77ac39a58a0dcc37feeb216e76b66b54c5cf4e012b0268cb54,2024-11-21T01:53:31.253000
+CVE-2013-3381,0,1,f4213169fcbc2fd77e97d7fb3bb4f351dcda4dc2c6a0d7dfb70c0fcec3d15343,2024-11-21T01:53:31.390000
+CVE-2013-3382,0,1,eb1aa209247fb7c7ad421065e1d18915c491a6f9b8e374f8d669862f22337801,2024-11-21T01:53:31.507000
+CVE-2013-3383,0,1,51f4d22e411805e6086445de21940c7786462d89c2a32ba3d423862121109379,2024-11-21T01:53:31.633000
+CVE-2013-3384,0,1,90936a04e686c4a51f44300d6bd4f87bbabc035beb96e16fec305f456f50dbfe,2024-11-21T01:53:31.753000
+CVE-2013-3385,0,1,bdec3d265dc98ae72a501cf41d07a4cbbaa1faaab5e80f683241dd8105c31a37,2024-11-21T01:53:31.910000
+CVE-2013-3386,0,1,15544579d7cae5367adfbb152167172f925d57b1f754dc545bad83834365241a,2024-11-21T01:53:32.063000
+CVE-2013-3387,0,1,12d3da30da956f300ffb9b576a2e1ca87fa8537f22a552f85ffe284999d758e0,2024-11-21T01:53:32.197000
+CVE-2013-3388,0,1,674ad52d45e6cf6a73d8cdd0e72beef107000136137f77cb6abb6f838dc699bf,2024-11-21T01:53:32.337000
+CVE-2013-3389,0,1,70854ee0a68e31bf3d2652ab3804024e4d383b734a005392edba34c316b9e1cb,2024-11-21T01:53:32.473000
+CVE-2013-3390,0,1,5c93d8c5358c0a98142fdfc6ffec895040ccbea02a64a38cde81b9ca5210b6c9,2024-11-21T01:53:32.610000
+CVE-2013-3392,0,1,e65d7ac04798238f56ef4ad04927d6419119eb0bf3282e6cc19b6ca1e69129ca,2024-11-21T01:53:32.727000
+CVE-2013-3393,0,1,cb0ea133c5fb6a1a2b362ff118812985f111f86ff2efd788a36048497cd58dac,2024-11-21T01:53:32.847000
+CVE-2013-3394,0,1,62bf7cd56336361dd0d214e046a17d78297934e2d91d4738e9aa2259c86559ce,2024-11-21T01:53:32.970000
+CVE-2013-3395,0,1,20da28093937beea1ce07a241cd8c495e5d916c0a6d28ccda91bb1de60ceb405,2024-11-21T01:53:33.100000
+CVE-2013-3396,0,1,f3b0ce74b51c81466095e0d46a889c17d18fa042c547b756f7d7cdec49bded1a,2024-11-21T01:53:33.227000
+CVE-2013-3397,0,1,9fcc2925eb4e8038254d1cdf6b855dfbe16c3e28a513e00abaf172b09e8e4467,2024-11-21T01:53:33.353000
+CVE-2013-3398,0,1,75bd0ec520bb24fedf1e6ee23fd8bfa8b0214752d0eb840e62bb4909c3c74f3d,2024-11-21T01:53:33.473000
+CVE-2013-3399,0,1,b863f836e787cb667b207edfa847d8dd08052f06dff6eddb0eb25493e551ba57,2024-11-21T01:53:33.603000
+CVE-2013-3400,0,1,865b8957f3c52fe690c2824c5a558222f4ee1c17815c76bc654cf0850929e3ed,2024-11-21T01:53:33.707000
+CVE-2013-3401,0,1,7f151075203eef66fa6db09d62ba7168af52347123d8300675dca56cedc58f5b,2024-11-21T01:53:33.823000
+CVE-2013-3402,0,1,ab15bc64886e8aa92b556e7d27dee7cef8d3ce7704e1393c0a9deec482e4dc74,2024-11-21T01:53:33.943000
+CVE-2013-3403,0,1,6be0f1ab098cc42a7f4e7e2d7445cede93ccd0c9ad499adf90cd74271d6b0442,2024-11-21T01:53:34.070000
+CVE-2013-3404,0,1,7ec3cf48ee4e13c0e80607fe9cc040ab6a9e28f6719d14d47d588607c9dc566b,2024-11-21T01:53:34.203000
+CVE-2013-3405,0,1,cc5ca6b7cbcdb2294f2f4fc1d09c85b216486e77b178242ae46377716504dc2f,2024-11-21T01:53:34.333000
+CVE-2013-3406,0,1,73189c45a5cda4305386861fd4ff5ee2546f83c6a159f6db1c6df4701648d019,2024-11-21T01:53:34.447000
+CVE-2013-3407,0,1,dbdcd5b8c502225516a7bf76b6894f466d86d8c5a3625cde7d2189c4286e4dee,2024-11-21T01:53:34.567000
+CVE-2013-3408,0,1,4d6310ea503649d2bbf8bb552f01a2f3181bcfe4649fa9fbec0b63509ca9f920,2024-11-21T01:53:34.677000
+CVE-2013-3409,0,1,c02d7cbefe0500354ded185e4b80b44e0d5400d08e77de8a1ff7fd146899f656,2024-11-21T01:53:34.787000
+CVE-2013-3410,0,1,8cf9b7fd67a69e605c7f4b16308fc33ce5586b9521249ce17eb60003d3a63030,2024-11-21T01:53:34.900000
+CVE-2013-3411,0,1,9922a6d624c5bfbdee28b2fa990a39d0fc9dd3b200fae2bb5176589a911e4784,2024-11-21T01:53:35.023000
+CVE-2013-3412,0,1,ef392a6b5335660396bcbd5af55d363b4e23da7ddb8f81ccd7bfd18079f8d47b,2024-11-21T01:53:35.150000
+CVE-2013-3413,0,1,0991c101d9fd8ff636ba611fba38b0ff12e699b29f66d69cd7de62d4b55ed11b,2024-11-21T01:53:35.270000
+CVE-2013-3414,0,1,3f2973d2dddcd9157b1a47318570ed7a296b632bbeb928d1c1c34086250eefab,2024-11-21T01:53:35.393000
+CVE-2013-3415,0,1,b0c004bef9351fd33445df9c726d5e7d1b556c645ee66f28feea81b0ad265095,2024-11-21T01:53:35.523000
+CVE-2013-3416,0,1,4c7066ba711adb3db90755a942fa20fd929463ce71885a4fe31c8b11c652fa09,2024-11-21T01:53:35.650000
+CVE-2013-3417,0,1,0c0e554de1362a6f39e24515c755e3ff4721a698d6f3927bccce4f44d2c5d61f,2024-11-21T01:53:35.773000
+CVE-2013-3418,0,1,b6d18e67325f6f36327b4f388f503c4db14c433e3194d9a200a3734729b84a64,2024-11-21T01:53:35.890000
+CVE-2013-3419,0,1,7da2989d023a22b287fce2deb96c06ae33ae2fe2cdfd44e4d4ee5202c4d5856d,2024-11-21T01:53:36
+CVE-2013-3420,0,1,f4313656a3401ebc2cf6752a8f82b461e0d6c072c2ae40e898542f9dcb5029fa,2024-11-21T01:53:36.110000
+CVE-2013-3421,0,1,3a60fc4e248c2e59ecb4a744342ac95405f84cfe7377c8228b369a7c0db8b7e7,2024-11-21T01:53:36.220000
+CVE-2013-3422,0,1,6c322d51f93abdf64f6089a937dca825f533cee9893a007f26a00d8cc99ca27b,2024-11-21T01:53:36.337000
+CVE-2013-3423,0,1,3dc813319e3efc312be35d269f6d471dd80916706bc3413a1e477c289fbdf61b,2024-11-21T01:53:36.453000
+CVE-2013-3424,0,1,9e07080cac8ea7beb468ffd0b2269e36d32a14865765ba4c6aa86587ec2e1bc4,2024-11-21T01:53:36.550000
+CVE-2013-3425,0,1,c5c40181abdc9bca4ae3a395dbef13a2c83642e87f973387ca8e029f4064acbe,2024-11-21T01:53:36.663000
+CVE-2013-3426,0,1,5d52a0a5d41b259201a20fcb57cb3747aea2101a4fbaccd8861a103ef4a85836,2024-11-21T01:53:36.777000
+CVE-2013-3428,0,1,e7d7f8072432c545fdcf834a034f31fb00902ce5d00953abf38f1250932c499a,2024-11-21T01:53:36.903000
+CVE-2013-3429,0,1,3f2c6a5817301a78ae9d1146f58b9049a6deb9427b1885c6b369e60533a859ca,2024-11-21T01:53:37.030000
+CVE-2013-3430,0,1,ef3aeb1c1c7071afdeb21c80c2cc5446d94c99cdf850ed5337fb9bfd53ac6af4,2024-11-21T01:53:37.157000
+CVE-2013-3431,0,1,3a7b38795549969a326e583fbad080e98f0b91ef80c67eb38f3877f8f81bcd34,2024-11-21T01:53:37.293000
+CVE-2013-3433,0,1,fef089b82e6bce80124a2064fcfef468290cbd8bbda65bc3242bf266cde08b76,2024-11-21T01:53:37.430000
+CVE-2013-3434,0,1,25f300e2d79994242fc9821c98ce799f9cb8fc1eab318159726ae6b5c61667ac,2024-11-21T01:53:37.583000
+CVE-2013-3435,0,1,2c86161b10b96164100257ecb029d45524de26ad33c368853155ceda044e77c2,2024-11-21T01:53:37.723000
+CVE-2013-3436,0,1,5137817975d6176d486cfe58ab953ea493c1884f1f1072990867db5a7c7003fd,2024-11-21T01:53:37.847000
+CVE-2013-3437,0,1,f54197c3599d014f927406312b5392ebfbbb148fefd100a24d4509c4a0181628,2024-11-21T01:53:37.963000
+CVE-2013-3438,0,1,3c31ab9f834746ff4768dc5e9fa3e457915132f8efefb449d34daf14f61de4ff,2024-11-21T01:53:38.087000
+CVE-2013-3439,0,1,2299f739d8bcc2ac6caad3bc2bd9dd6f7fb98c00ea1b39d2def020af6c36b5c9,2024-11-21T01:53:38.197000
+CVE-2013-3440,0,1,55172a1ad4b93e668657c0d5dfff50167ccb5dcf7d2402371d4d29ca3afbbe78,2024-11-21T01:53:38.320000
+CVE-2013-3441,0,1,36b611023e4833c8f28132149d5d88b7e8a2d8a4ec35d9d5776a1560d91f5e48,2024-11-21T01:53:38.447000
+CVE-2013-3442,0,1,e0ee2091af7ef205b84fb65509490c4d67701702811be1093a54db5d0bf7fac7,2024-11-21T01:53:38.557000
+CVE-2013-3443,0,1,c7b2bbe6bde741f768216df04417ffe5bd50b421b98217d43dc1a9011b08ef17,2024-11-21T01:53:38.670000
+CVE-2013-3444,0,1,7517d707dc5d56be76a8e346cf7ca23bd8c62a9bb47441edfce11c4ae6fd427b,2024-11-21T01:53:38.797000
+CVE-2013-3445,0,1,9b39882911fcabd0688d7306b740adf680fc23779f1bad30c2539709f926ee54,2024-11-21T01:53:38.953000
+CVE-2013-3446,0,1,05b317a57eedc4155471427e3573b6fe8d3e55b50b4cb0a81edc14b3cd4912b0,2024-11-21T01:53:39.070000
+CVE-2013-3448,0,1,7fb7a87d6d0e3116b5552f76bfb17512779d86c51706606022f0b9169fdded00,2024-11-21T01:53:39.177000
+CVE-2013-3450,0,1,9ee09562d20c098d1838e8bc798d77f61c16f35fec9a5b55d6c1a0c229944d0c,2024-11-21T01:53:39.300000
+CVE-2013-3451,0,1,6091e4ef351b0e1b29db3fea055a913b0d54abe92625fd48976a810b63326985,2024-11-21T01:53:39.413000
+CVE-2013-3453,0,1,92d082444f3cb519f848df61c8c2b0b673ebcf86a3952923288f37b8fb931177,2024-11-21T01:53:39.523000
+CVE-2013-3454,0,1,a8bf17247a44e5ac0c83809fef1814163f997235b914e659dad4dcc9c8ccd746,2024-11-21T01:53:39.660000
+CVE-2013-3455,0,1,adfe5b3d30005b5db8ecd4fc8adce112e8b181cb55e7c430b33631af329d62a4,2024-11-21T01:53:39.787000
+CVE-2013-3457,0,1,25baddd738f941e82a10088cb93281ac96d8d740850a1599dff141a23c80619d,2024-11-21T01:53:39.903000
+CVE-2013-3458,0,1,dd6603625e1989b50049681439bdd34df9d306705b894c8a51f1b98cd39ae413,2024-11-21T01:53:40.030000
+CVE-2013-3459,0,1,26c8504d2d420e958ce8d2d610b17698ddafc61190bbfb55c5cea3fe01f15c54,2024-11-21T01:53:40.140000
+CVE-2013-3460,0,1,a35799b484620136f85940e00b47209d09dcf04c7ea473efc43545d7757bfee5,2024-11-21T01:53:40.260000
+CVE-2013-3461,0,1,fb7e1801ae201d8d536f6d16d7631b7b539d4913908af797e45fbec610372399,2024-11-21T01:53:40.383000
+CVE-2013-3462,0,1,2ca955ff74b99f85a50706debe104cfdc1772c10b44d053a75a20cd237a6169c,2024-11-21T01:53:40.500000
+CVE-2013-3463,0,1,576961d51d96d483ca6266a49d7fc43d477d31597c8e0b411b7848e04ea41519,2024-11-21T01:53:40.623000
+CVE-2013-3464,0,1,eae6622e3f51b1b8606f20214b4f5e15cd8f996f4f93e7550de63572b6d36d90,2024-11-21T01:53:40.743000
+CVE-2013-3466,0,1,fb3639c995153fdbc17499e7713a324385da50bb36199db0cdb3ba1d541c4f0e,2024-11-21T01:53:40.870000
+CVE-2013-3467,0,1,abb4f6065bd13d5f351555438bce65e5cd45e6245ae86501d5936f4c16c55c1c,2024-11-21T01:53:40.987000
+CVE-2013-3468,0,1,637df434f9e0bd3fc901389ffc9326e81e12c2420464c615f5c0919aa9e315b8,2024-11-21T01:53:41.117000
+CVE-2013-3469,0,1,06513e32007bc83004ab4fd2d5333515222f19cf9c419ebba9b6df9572c80d72,2024-11-21T01:53:41.227000
+CVE-2013-3470,0,1,36d9c83180f4ea37acd3187190e01195f38f86db6f07d291298594690df09562,2024-11-21T01:53:41.350000
+CVE-2013-3471,0,1,bb098688273aa9f95e32dbbc9fcbdcfae58eb9384f15456d8c2b8666cbba9ab0,2024-11-21T01:53:41.470000
+CVE-2013-3472,0,1,2e087c025399102c00d2cfdac02dfd15fb66ae3f7f4dc3214ba253af68f4e54f,2024-11-21T01:53:41.580000
+CVE-2013-3473,0,1,2a2d94beeaa85bc57e4b562015bd917db7f756fb6616e9c312e395ccd0beae60,2024-11-21T01:53:41.690000
+CVE-2013-3474,0,1,276df5bd7707059ded4b7aa84b5d9bc16fe11a082defe67896f7a2bbc82f32bb,2024-11-21T01:53:41.800000
CVE-2013-3475,0,0,00f51034db5c31361c6021e3149ee15cf19825f9e4920b43965556bd965faac0,2024-11-21T01:53:41.913000
CVE-2013-3476,0,0,40a514cdfb86cd51bc832d26428672dba2b6667cd2508bfca4523d08e3d85431,2024-11-21T01:53:42.040000
CVE-2013-3477,0,0,a56b7915b234c2149a750ea33f9a49dff10c76e536792d57575ed6a70aa240d6,2024-11-21T01:53:42.180000
@@ -62732,100 +62732,100 @@ CVE-2013-5465,0,0,e7f8fcaca488fad76d8d01b580752ed55bc99cfb273639a7b43f41dbe85dc4
CVE-2013-5466,0,0,b5e5b07e9ff5fcc33e47884417ff73edf63dcaf913e840fa406e1be2ad04fcb1,2024-11-21T01:57:31.843000
CVE-2013-5467,0,0,872e551480e0ca96ceb121e33672e59fc2bae0a8511b9d613cfe0a773d8fb086,2024-11-21T01:57:31.977000
CVE-2013-5468,0,0,d0519e64b22ad4b941166ba04fbbe252b63ae325da507f511e22deea22707bfc,2024-11-21T01:57:32.117000
-CVE-2013-5469,0,0,d824784b057c99c80a4b2c77fe3d42f8c560a1801543abcc5a755a11d31d5d39,2024-11-21T01:57:32.277000
-CVE-2013-5470,0,0,eb49d60ca673bf52ab0c757169b1d2ab9c5a4fe21d51914ac7e644b88dd1debf,2024-11-21T01:57:32.407000
-CVE-2013-5471,0,0,67c9cfdccc1de001106f4ab7592cf5171544c4349a8f83bf6c2dcabb126fa174,2024-11-21T01:57:32.540000
-CVE-2013-5472,0,0,947bf29452d9d1140cd1605270c63c76a68b6d3a9e68dad84e782f2aa1920549,2024-11-21T01:57:32.660000
-CVE-2013-5473,0,0,cba105332a0cc65bc53e27f9c6916bcbf2e587001da480d0f6b78408371ba28b,2024-11-21T01:57:32.793000
-CVE-2013-5474,0,0,eda356bde8437c488aee6970004c78f3c21c95737d000a431f1afbb112baf51f,2024-11-21T01:57:32.940000
-CVE-2013-5475,0,0,027f7794c09f2d51f55dd9a9c5f79b2a63c381171c443af91ecc1ba88e1b6437,2024-11-21T01:57:33.063000
-CVE-2013-5476,0,0,b08fc3f988bf75d41c967990a3e474b589f32172b9c7b1b4804a9865d964a0d2,2024-11-21T01:57:33.190000
-CVE-2013-5477,0,0,28cbec524fe0f956553469bd5ac25387113723160141ddf632be27ba23a59c26,2024-11-21T01:57:33.293000
-CVE-2013-5478,0,0,ea720695470d940d4a6dfa125490a85912b9132a602337aceed8b7f41f00ab46,2024-11-21T01:57:33.417000
-CVE-2013-5479,0,0,5aa07b8895b921032dfe50c9e92079d93318aecad7267a76f74e10d9fbc5dd23,2024-11-21T01:57:33.543000
-CVE-2013-5480,0,0,8597c2de2758fcbe9329bd56f8a90674e7876a74a87dd95ea3358d4cb7edd669,2024-11-21T01:57:33.657000
-CVE-2013-5481,0,0,bf4c163f293679af33cc2834963fa43d3689a0f97a4704056ece48026d8b9040,2024-11-21T01:57:33.767000
-CVE-2013-5482,0,0,2f74d4a478bd4951b6148bcbce83a802720a865c0970bc8f6550becfffccfcf0,2024-11-21T01:57:33.880000
-CVE-2013-5483,0,0,4a8f88c6ee39696f45137d1d69c889d72845231f61c76ac192a13fc5fe63e8d3,2024-11-21T01:57:33.993000
-CVE-2013-5486,0,0,bd38c30b56626c7e777b8c4ed1e5d8c5785096889c1aef7622d38b595a31a121,2024-11-21T01:57:34.113000
-CVE-2013-5487,0,0,1b90c6a38bd5400b488e27b8b24775600510c6784d4dce2925646501a7672e28,2024-11-21T01:57:34.253000
-CVE-2013-5488,0,0,49f5a4f5a969ab2d59f95485e8b5b8af9b9fd33d678fb89669030be4cfa16f6f,2024-11-21T01:57:34.377000
-CVE-2013-5489,0,0,406ecaca14e96c73d99ffbdbdbf9388a558bc6f5a9afdbec4ecd5df890e60f14,2024-11-21T01:57:34.507000
-CVE-2013-5490,0,0,ceaac820fb33809cbe8f6e4b7fa87f631d28ac5d7e49deb8a5f6a300178ca2e7,2024-11-21T01:57:34.620000
-CVE-2013-5492,0,0,a151859d25c6610260f60aaa59544c957d6f8749a88933a2a8307bc502728de2,2024-11-21T01:57:34.740000
-CVE-2013-5493,0,0,988238b3d5f45698141fe700fc861b847d5cb7b8f57532ba8ce0089c40a587e8,2024-11-21T01:57:34.853000
-CVE-2013-5494,0,0,23c589b4ee4de5b87075be2fa695a5979f9545a2ff7b059b3c4218f6bfa33407,2024-11-21T01:57:34.970000
-CVE-2013-5495,0,0,1a146d58dc1f3a71a40bca6752c662008a8ee5114d7e2c744de13f2116b82d6f,2024-11-21T01:57:35.083000
-CVE-2013-5496,0,0,ba7b70d9c6dd664eeab1e7796baebf913671c37b249fa6d496d31c6964a579b3,2024-11-21T01:57:35.203000
-CVE-2013-5497,0,0,610dbfac96f6a348e8d3193fa8398c5dea52171cdd5cbb6f0cb9e69a54ad6292,2024-11-21T01:57:35.320000
-CVE-2013-5498,0,0,88bb39910a57ca121198582e2d219e652be078b5f2334c47f5c6c6ad05e5ba34,2024-11-21T01:57:35.450000
-CVE-2013-5499,0,0,87a035b1e73323b1bcd8a33b280c3ebf965d80e830a45d8a8b67c270e70fa5b0,2024-11-21T01:57:35.563000
-CVE-2013-5500,0,0,3684e604f5ce09840afe371d715be08574e6a029948dc05174bc19fd0aac144f,2024-11-21T01:57:35.673000
-CVE-2013-5501,0,0,6c5064fcffa999acf49e06361e2f5a59348e82f536b42ec6be48f06da0970bf6,2024-11-21T01:57:35.797000
-CVE-2013-5502,0,0,a6632657a5399842622d44314d3cf03274146ed55d6ea8f69c4d17a79316f395,2024-11-21T01:57:35.913000
-CVE-2013-5503,0,0,7912c336e9b908135cce7158293c3ec36d69f5a07df1bc6586a464db8c2c19ce,2024-11-21T01:57:36.027000
-CVE-2013-5504,0,0,5f812c7fc3abb80ee85a6b49f127ffd9b4e83073dd3aa7f0c0bf570ba5b571ac,2024-11-21T01:57:36.137000
-CVE-2013-5505,0,0,0ba87332210ba16f8c80db9fee656cef45d2aa9366160909472c7191223566ea,2024-11-21T01:57:36.257000
-CVE-2013-5506,0,0,76427f4325373080813e62051dd0c2794fe02d526d853ded7b6abaecd63e2d63,2024-11-21T01:57:36.377000
-CVE-2013-5507,0,0,fc6214721331f605594a716215d01b063be9b33703b5e2d4e7443033c21d5fae,2024-11-21T01:57:36.500000
-CVE-2013-5508,0,0,656dce64935d58e4d6e05efa42c80d51600a0c61ce9765653ff48a9726e6af88,2024-11-21T01:57:36.610000
-CVE-2013-5509,0,0,6651ff4a4255250f966c4c16eb10328678f679b2fdc630e34c6d3a56fb0843db,2024-11-21T01:57:36.760000
-CVE-2013-5510,0,0,ef76e8016a1d22149ee163a86f3a042b327be4d99bc049960c1bb20b398f39c7,2024-11-21T01:57:36.887000
-CVE-2013-5511,0,0,e76a83e97f166c6a2d2ed3f4d190fe7129918831f7a925a71717d7f3b0548194,2024-11-21T01:57:37.017000
-CVE-2013-5512,0,0,a618d4fd874d961d2e612c104ec1d16679bcfcadac4099126ce203b9cb70053a,2024-11-21T01:57:37.150000
-CVE-2013-5513,0,0,d0c0e5fa36d4c2e66be85b26942d8014b44cc4231d498c0f8d7ace8629186cb3,2024-11-21T01:57:37.270000
-CVE-2013-5515,0,0,448a628044591aadc273ce38996cfdb60ea4f6483d0986fc3b3dbd8c884a7981,2024-11-21T01:57:37.407000
-CVE-2013-5516,0,0,5a77451b79b70eac67927cb5477740f38c004d639dbf50c40b2fa8f66ae3919e,2024-11-21T01:57:37.540000
-CVE-2013-5517,0,0,fe979e2dd8c724a625e935d659ee439d8ee58ab4e23ba823f3a28f3f8ecb1e24,2024-11-21T01:57:37.653000
-CVE-2013-5519,0,0,3e3fbba7492859b0a4d0e77117e1f1c216940df4965aaa54a7e0c5120e7521cb,2024-11-21T01:57:37.773000
-CVE-2013-5521,0,0,cbd0f9607d5c44f723e8c9f724dfc92fb64787f42c4bf2717ec5ed5a80075a82,2024-11-21T01:57:37.903000
-CVE-2013-5522,0,0,d6412a04a11ace81e87fe8c35a50fbba4c5c06de5bea2468e8d98c896d14e878,2024-11-21T01:57:38.030000
-CVE-2013-5523,0,0,a613cf02ce4cf290f04d4ee0e834838b573b064999d3bad74242c2957b73d774,2024-11-21T01:57:38.150000
-CVE-2013-5524,0,0,48d5169d80889cecbd19bbc165bd301e3986261be02434df91501b976dd24017,2024-11-21T01:57:38.280000
-CVE-2013-5525,0,0,60c8a0b482e0baa6febaa71947dc26769e0ab2e77e049600092f06fecf36f6cb,2024-11-21T01:57:38.407000
-CVE-2013-5526,0,0,0dbcab6c5220f905f7b710c855cc12e42855f3df4a992b2590695fee073836d2,2024-11-21T01:57:38.527000
-CVE-2013-5527,0,0,330b6dd82debba58d1369683e82ee77ba7fbb9da67fe401660af8430572d372a,2024-11-21T01:57:38.647000
-CVE-2013-5528,0,0,d140f5b7dd779266c7de9d4694497fa713d4e808c3af0911e25e5ef083ef8fd5,2024-11-21T01:57:38.763000
-CVE-2013-5529,0,0,392b6ea67befc4fbda48fb13f7e47faa526941ca7a6d36ad6a17908822036fd9,2024-11-21T01:57:38.880000
-CVE-2013-5530,0,0,054fbe84292d65b68b6dad5c8e5fe34ff79510fae1f050ade6eec5fda29ca1c7,2024-11-21T01:57:38.983000
-CVE-2013-5531,0,0,cb47a7f9d17461a55a425e03c804d7f57c3541ebdad6b247ebfa9fae603aca9c,2024-11-21T01:57:39.097000
-CVE-2013-5532,0,0,6465f01acf2d8dd1f98a9aaa78eeec885ca39708cbda1f266083e2dd355649c7,2024-11-21T01:57:39.200000
-CVE-2013-5533,0,0,b1f0e91f3a44b668ba6bc3634e5bb0dbc510dce0f861ec5327c51d8c5c940063,2024-11-21T01:57:39.300000
-CVE-2013-5534,0,0,27c60bdf57ae370bccf8634aad783806cf9b88ac8f606e000cb22ce4862d58d8,2024-11-21T01:57:39.413000
-CVE-2013-5535,0,0,19b861243b6668b55807f0cd0f528350e9634ea078cd39f84a4922b2bdca10b1,2024-11-21T01:57:39.517000
-CVE-2013-5536,0,0,b45ea6a2d6710aa476d86603ff7ea9319b9bb1327da9318224d654af4f6d5ce5,2024-11-21T01:57:39.620000
-CVE-2013-5537,0,0,9e3d71f3a3076d37db175c4ae81569677a7299442454b6713695ece37029c190,2024-11-21T01:57:39.720000
-CVE-2013-5538,0,0,eb8dc7717357c6691785406e1d1680b02d22deb1aaff307dd305f3bc01b2efad,2024-11-21T01:57:39.823000
-CVE-2013-5539,0,0,971b05434a95f41b6494047860c85a6ce32ca13e94b06bd9a7341313822df9f2,2024-11-21T01:57:39.937000
-CVE-2013-5540,0,0,3b0fa9ba976dbd0b5d98ab524eaecddc81b12ac6296471033eb1e2c4ec3d53a7,2024-11-21T01:57:40.047000
-CVE-2013-5541,0,0,7c75f3aa24836494503df8e4a6db22faa8324b4507f3a97719e34a57d24d4387,2024-11-21T01:57:40.157000
-CVE-2013-5542,0,0,d35a66a00918d1583f81d3d6caf6b0e3df0942440b434c2fe4177735e42715d6,2024-11-21T01:57:40.270000
-CVE-2013-5543,0,0,86b55446536f477191de7e400365c5a819d95cf9a50c92a17305f0352b180e29,2024-11-21T01:57:40.387000
-CVE-2013-5544,0,0,ce66381e67f32c57336a5be6b70c236105042fce325463e98eb17a608d731d46,2024-11-21T01:57:40.500000
-CVE-2013-5545,0,0,5616302f2ad04e8ed7b53d6b0b44618eb52fe3ff110df61c73b484b1716d61a3,2024-11-21T01:57:40.607000
-CVE-2013-5546,0,0,b6ad6a9ac8f371841d41d44db4a46a763294ee66859af61a7ea68c43284254e2,2024-11-21T01:57:40.717000
-CVE-2013-5547,0,0,74619077c619d985a783d5ed09118ce9616a2050929f10ae2fecf5a89d3424d5,2024-11-21T01:57:40.837000
-CVE-2013-5548,0,0,77e7fe0ea48d00a8f16c7b57dac02752f60098e94cc4b9ac78d5f9415b64cdcd,2024-11-21T01:57:40.947000
-CVE-2013-5549,0,0,a497426b92b633e2b6af5bbb12deabdc8ddb19d364681ec4724f89f4b496941f,2024-11-21T01:57:41.060000
-CVE-2013-5550,0,0,719bdf7c9ffd17f5b0b39a0e56f29567ea40e5c266830aaf8f4c6f7090ed6cc5,2024-11-21T01:57:41.170000
-CVE-2013-5551,0,0,762411d764fee349d66151ed6a5517ec5bb072c50acff58906c01a369aaa1b68,2024-11-21T01:57:41.283000
-CVE-2013-5552,0,0,9a149f213704ae318650cf5808b354e3e64eb7e8c9c202c8630f8d2e887c628a,2024-11-21T01:57:41.387000
-CVE-2013-5553,0,0,226a3ebd7240664737da284b21c6e3bc7877287b8180f7f37ec1f16ce8bc037e,2024-11-21T01:57:41.513000
-CVE-2013-5554,0,0,b811188995b83965ccbdb392373c4e5a903764953266fb4a64d78558705b062a,2024-11-21T01:57:41.617000
-CVE-2013-5555,0,0,42fa7c12a2afe5feb572c2dc993e4c95cf04fc10b75e8b1037ec20ad6360e273,2024-11-21T01:57:41.730000
-CVE-2013-5556,0,0,88f511755773daa1abeaa04158834f276c6bdbbc3383bbfc0d8eb3cfd830704a,2024-11-21T01:57:41.837000
-CVE-2013-5557,0,0,2b5ebe3833a4fe893f8fa2a86127c75fda234de24594a5e4309c17da9dd075bb,2024-11-21T01:57:41.953000
-CVE-2013-5558,0,0,4c04bc6a143bb507f4b393ac255fdc089f23ae44511e6f7c7998067fd72fe583,2024-11-21T01:57:42.070000
-CVE-2013-5559,0,0,926e530098ced9c35dc77e787b41e4adfbff596c6806677d12a72580da459537,2024-11-21T01:57:42.177000
-CVE-2013-5560,0,0,2b94809345ad3a00380d66187d7f566c5114761509ebb2e4eabc1bb0fceaddab,2024-11-21T01:57:42.330000
-CVE-2013-5561,0,0,2edded7a381adbb685bbd8226d7caccd71f66b2ded5035498a6031b046566a45,2024-11-21T01:57:42.470000
-CVE-2013-5562,0,0,1f18f94af947b4f7f2a40bd09967d7a5065aa622c4e6c573cf06023a92197213,2024-11-21T01:57:42.570000
-CVE-2013-5563,0,0,1d94ee7ad548ae1422d7801e4213a67ba7cc91353660be28a149cfcd878bce07,2024-11-21T01:57:42.673000
-CVE-2013-5564,0,0,8908fe172bf78dfd829f5e8179f4b3e66e73d0d768c17af00d18ca8a0b22ad2c,2024-11-21T01:57:42.783000
-CVE-2013-5565,0,0,8ef124d824c22778343c066852594bce23b0317e12cbda4a3cada4e8f13e35ee,2024-11-21T01:57:42.890000
-CVE-2013-5566,0,0,d2d9b15413e81340c33f4f6b4fb80f1475c7c75fccc4865e556c4235f5ccde33,2024-11-21T01:57:42.993000
-CVE-2013-5567,0,0,6099bed0c4812829e97defd42006c796331a953dc9bd512abdd353be36f5b6b0,2024-11-21T01:57:43.117000
-CVE-2013-5568,0,0,589ad25f5b14d62c2104733b0c9faf56e6b7c85dcb510eee20872830a8178aae,2024-11-21T01:57:43.267000
+CVE-2013-5469,0,1,9bf537273b5f82ddd4b506860a3e0d6045181231c957d66758009adc47012774,2024-11-21T01:57:32.277000
+CVE-2013-5470,0,1,56b47e83b0269423f6e0c6206dff17fa1fa4a602d4f64c00fdacb61ca721254e,2024-11-21T01:57:32.407000
+CVE-2013-5471,0,1,4f49e0385110a287f65b67166d150fdec6b77e6d3c2731df5766dacf177afacf,2024-11-21T01:57:32.540000
+CVE-2013-5472,0,1,57e7505630feb5a046ba0641b40b1ca5c6eefb68bdac7f95d5994dbb0e6e7efe,2024-11-21T01:57:32.660000
+CVE-2013-5473,0,1,471a7836fda67c703abcceeb832ce2c7659475498d9a6ea269362edb3672811e,2024-11-21T01:57:32.793000
+CVE-2013-5474,0,1,6638e67a5d0e1b5588d8a1cf08b34a61f322ff369c73b3d4de07f7cd2df3860e,2024-11-21T01:57:32.940000
+CVE-2013-5475,0,1,1accbaa43026e1e5f06ddde36913bd3993e6c310d1e354bae2e52406c56b8780,2024-11-21T01:57:33.063000
+CVE-2013-5476,0,1,b67998eb2cd62e84b9e18170c5fa68a97cad2fdf9dc0efa90eb8a70b640062a6,2024-11-21T01:57:33.190000
+CVE-2013-5477,0,1,de09d7253bde3473923ed4cda9d15d5f045b9a43da7be2c1679b787626a960c9,2024-11-21T01:57:33.293000
+CVE-2013-5478,0,1,3c0f6526d5de55e844b45e74b512babf2965d1be094562b41265e15a5d38c43b,2024-11-21T01:57:33.417000
+CVE-2013-5479,0,1,e2167d3d21ab886eb8ce910dc3d67e6f8376be00b894999d203167c5d8b9acfc,2024-11-21T01:57:33.543000
+CVE-2013-5480,0,1,499a1b05a3c63564a99329b308fe456edb71a45e089a1bb0518530d742b86be3,2024-11-21T01:57:33.657000
+CVE-2013-5481,0,1,dd8cc71863b98377b1bb41443d25ffa4525ee0ea8e0528bdf9d1d6198321d193,2024-11-21T01:57:33.767000
+CVE-2013-5482,0,1,7bbd91c21f8b9cd921f30290bff44783ea35a440a72ae3f8134f74884671bb87,2024-11-21T01:57:33.880000
+CVE-2013-5483,0,1,ed9086c0cee4fa5f2714423d09ad18e395ca7dc34c583b6a96aa65759fff20a6,2024-11-21T01:57:33.993000
+CVE-2013-5486,0,1,70ac841bea6b9204aa5ed9df837c7311d743dcffa07aeb6446bfc8a87bbdbd9f,2024-11-21T01:57:34.113000
+CVE-2013-5487,0,1,a8837657e32e8bf383a7953729d199ec73788e5ea1a0f64f1c84000cf33c7c95,2024-11-21T01:57:34.253000
+CVE-2013-5488,0,1,b70251a6019c55d69a954acfb6075a5f399dda99dc776f40f379400bc3e3b294,2024-11-21T01:57:34.377000
+CVE-2013-5489,0,1,5b48013f378527e74ec0fa936894bcf7dd43801f21ff0a97e975ab3b4adce0e2,2024-11-21T01:57:34.507000
+CVE-2013-5490,0,1,fb50af43e65980ee1555b1fb86cb48c67dd033d19642b4467aa501ff80f5778e,2024-11-21T01:57:34.620000
+CVE-2013-5492,0,1,9c9a0429c3ee8cf2fdce2fa8c37110b2259771120b413d9a24c17da1494a12ff,2024-11-21T01:57:34.740000
+CVE-2013-5493,0,1,356c906ce29bce6563d3ad54768a4337290f54a54face088620a3f868da1df4e,2024-11-21T01:57:34.853000
+CVE-2013-5494,0,1,b8ad12f58c2dbb396faeb259abe45858dd7b24cbe48bd935bab82a826927b85d,2024-11-21T01:57:34.970000
+CVE-2013-5495,0,1,969efc1f60d57df8ee4743ffa0ede00e7edfe45d0359a8936bd488139556b2de,2024-11-21T01:57:35.083000
+CVE-2013-5496,0,1,92185238c967e062dc69a78dbae0ae5d1c6560c9f7098a29c3b3304deab27d80,2024-11-21T01:57:35.203000
+CVE-2013-5497,0,1,cfc6c3954789e7f492ae83bd27f915465b00b5849e1e6ce227c8083dfc86fd23,2024-11-21T01:57:35.320000
+CVE-2013-5498,0,1,6658013173ca06035b46ce09be1bae94a5a4e4c89054d6f46b23b4e51fd99537,2024-11-21T01:57:35.450000
+CVE-2013-5499,0,1,5a8a8df544a610ebf5b92c0df1b7d6456b9391412adf5872f4208ae2c36ca16d,2024-11-21T01:57:35.563000
+CVE-2013-5500,0,1,0233981398a8dab804ae94728fe3c246b005c19331f6cc5efe333a529f397e92,2024-11-21T01:57:35.673000
+CVE-2013-5501,0,1,6ca26578e2c7397922b75a0903b8ca2a293bcaa88cbbc7d26039977640f02b71,2024-11-21T01:57:35.797000
+CVE-2013-5502,0,1,aa0687274a3c0e82d81d353bb189f86efdf3917a172288d018a2026d5084ae50,2024-11-21T01:57:35.913000
+CVE-2013-5503,0,1,1fd3b8ad1e268e4bb9cecc95fd380ebc938a3dcf2121fea1fa2d6e4d3c240399,2024-11-21T01:57:36.027000
+CVE-2013-5504,0,1,1115c935a5315fff981b39128783ba4957a8edc14f4bde3b8be6fb839963a4c4,2024-11-21T01:57:36.137000
+CVE-2013-5505,0,1,50e9e16b3ba2d747342b9e6b228588aa6fa22ca9debe09db89fa01c00a3288eb,2024-11-21T01:57:36.257000
+CVE-2013-5506,0,1,3002aaa5320894452a3a38086c1a030cd3d8a990e04e9eddd569ae5e9a0cd2f9,2024-11-21T01:57:36.377000
+CVE-2013-5507,0,1,3e533850c251a30a2a76232216ded6c77c103ac4812a3c3fb3ef5e7c320219ef,2024-11-21T01:57:36.500000
+CVE-2013-5508,0,1,a70b67720130cc5098f201834f35286134641950d9e105f8ab06f71ec3957e77,2024-11-21T01:57:36.610000
+CVE-2013-5509,0,1,6bb3c0dd06a73baf82041d5612469f6487a10da6e6a0622be7667b82dbd9b118,2024-11-21T01:57:36.760000
+CVE-2013-5510,0,1,c963860e671f90352e3a9c44ff6296a286716ac556661f65fcb7d4b6d3af5ae3,2024-11-21T01:57:36.887000
+CVE-2013-5511,0,1,ec81e0e4aec6774223fe9f8a3ffb87102f48da708972ae0e2e5bdc078d9054f5,2024-11-21T01:57:37.017000
+CVE-2013-5512,0,1,9fd31743c67f2ec97a0806c873c6556d9f6d0597e10f2a409e10743ee9870e6f,2024-11-21T01:57:37.150000
+CVE-2013-5513,0,1,f7f981fa1fe70586669d70e4e523aeef484935419a8f9eafaa2bde3fff4ba5fb,2024-11-21T01:57:37.270000
+CVE-2013-5515,0,1,b602a391de6b33910053e44f9871f035be63d76dfbef5841c51a130c84b6d948,2024-11-21T01:57:37.407000
+CVE-2013-5516,0,1,c4ae01c924c9e2879dae96f33d5bc2e4335630de1fd7f4098e7bc58bdcccbf3c,2024-11-21T01:57:37.540000
+CVE-2013-5517,0,1,585b2107cbfb344c441b7aff6a6099bdc853845daa052b47d85269568cd1f373,2024-11-21T01:57:37.653000
+CVE-2013-5519,0,1,d0882b61ec84d8de1f45cbdcab0352e1bf12aa3d748d5fadf7afc082bc6dda97,2024-11-21T01:57:37.773000
+CVE-2013-5521,0,1,124b38048bf8f261c62cfb7cad83be4d14a499ebc1de9d4d199b8045619856ba,2024-11-21T01:57:37.903000
+CVE-2013-5522,0,1,e2d3cbe4c96d5b7119edd6b7766fa94eb3f4045e9ea3dc56fda249915d9930a3,2024-11-21T01:57:38.030000
+CVE-2013-5523,0,1,64f7214e936666241b1d7fc62356e870742f22971646fa5d9bab2c394b895cc1,2024-11-21T01:57:38.150000
+CVE-2013-5524,0,1,99581bc02e178fe4ce5d771195e0a98cbd11ce69595d69d8435b16022abf851e,2024-11-21T01:57:38.280000
+CVE-2013-5525,0,1,8c8d31f3a675e054ec238126e387a64b218a86237529aff7e9a44925a6dfcf24,2024-11-21T01:57:38.407000
+CVE-2013-5526,0,1,f978f0f4937638a4dfbf8ea214c049c9f6b4cb8a0e665effff45486c21165f05,2024-11-21T01:57:38.527000
+CVE-2013-5527,0,1,9db2feb7416a987bc28c978e8225c5ba45cf88e85498eb94effe301afac141fd,2024-11-21T01:57:38.647000
+CVE-2013-5528,0,1,010d7ff3ad44e12c730c041897b1c68819cad8b8700f800e6a651e84976b25e9,2024-11-21T01:57:38.763000
+CVE-2013-5529,0,1,bc212cfbe984e68eab2ae7dfb3377922037742fe81da456b88b4951ea0052d5b,2024-11-21T01:57:38.880000
+CVE-2013-5530,0,1,f883ea75e3dace9f41550cbedf53b1141c16bf4d81dcc323fbacb13a7fee24d0,2024-11-21T01:57:38.983000
+CVE-2013-5531,0,1,46255ce347dfa802af3b8548946b2db2e360c39007205f1954af0d6c7e1c6139,2024-11-21T01:57:39.097000
+CVE-2013-5532,0,1,cd3219ccbd079713b9adbeb14303764d73bef70e1aef770dae8c745ee1992086,2024-11-21T01:57:39.200000
+CVE-2013-5533,0,1,05fe0f4140cc4673b4fdd47d4ec71d85a867844ffb6226fe5a5d7b6bdafd0f7f,2024-11-21T01:57:39.300000
+CVE-2013-5534,0,1,5b6ceed8991c619314a26c30a5c0f04c2f5b3086f2d3c7883b168b2104884f8b,2024-11-21T01:57:39.413000
+CVE-2013-5535,0,1,b3e5b0ed16fc60ced7b3df59842ebdd149cab004a95947613124ad636f044b7e,2024-11-21T01:57:39.517000
+CVE-2013-5536,0,1,c984f92a6a9756bc0a3e9920e10cf2c2bb8760c34f269dada2229075ce4c9ae0,2024-11-21T01:57:39.620000
+CVE-2013-5537,0,1,b10198c09ba937d79a4147a5c1b8519806dfc479a23f2fc4567a6b975997be13,2024-11-21T01:57:39.720000
+CVE-2013-5538,0,1,1211d636f68cad303e024056bd23907ad97b415da2306a42c58830533e19ff33,2024-11-21T01:57:39.823000
+CVE-2013-5539,0,1,69250a7d2f3f5c764dcf199db15b15bdf185120d2ac421700aaf4472909f7490,2024-11-21T01:57:39.937000
+CVE-2013-5540,0,1,eb99e7d90c6ea8fa7a9b1da1c27a7fc9a5539d0ca21b620c36892f6d7f7d045c,2024-11-21T01:57:40.047000
+CVE-2013-5541,0,1,79864127ae7bced5b3ee1eebc725622eb76e7b48cd0d14dfbd8148c93fcc4aa0,2024-11-21T01:57:40.157000
+CVE-2013-5542,0,1,4f557b92dd5775a0c089eec4fb884f02534c4c976ed5269b8e5d770cbebb085d,2024-11-21T01:57:40.270000
+CVE-2013-5543,0,1,e9249c44438144a68fc2b53759db22cd5afe944ca610286700c7414d4eccb34a,2024-11-21T01:57:40.387000
+CVE-2013-5544,0,1,6b04ad4647e055504958dda2c06e56ba65e6713cb58bbc8ba40588ad02828ad2,2024-11-21T01:57:40.500000
+CVE-2013-5545,0,1,39648d9e41acb76f98a052612eeb263a87ce9340b95dfb1b5fd5404c4c9be79b,2024-11-21T01:57:40.607000
+CVE-2013-5546,0,1,a86f92fb027cb90e30b3b60fa0764d45ca6c665ac2c8f44c3fe25e3c56bad302,2024-11-21T01:57:40.717000
+CVE-2013-5547,0,1,360f6a563f55034e26864fcfd411c0c2746d753dd6f4b75338504a8972097ce7,2024-11-21T01:57:40.837000
+CVE-2013-5548,0,1,750d39e1e3e549ad248b6bcdb6a59e95f88cb8edcf0c93e3e698adce7251937c,2024-11-21T01:57:40.947000
+CVE-2013-5549,0,1,526d8fa59a8876a88440d86d4c115b111b1526c36998cb8989ec50ba9dfd8c36,2024-11-21T01:57:41.060000
+CVE-2013-5550,0,1,ccabe6d67c30376b460ebf4e5d1efcfcd5a41e38116334184bd247c3bffb3af8,2024-11-21T01:57:41.170000
+CVE-2013-5551,0,1,8d5ed3ec362e7846fb3cd053089b7f5d46421e16bca9d5eeefb251090dccee95,2024-11-21T01:57:41.283000
+CVE-2013-5552,0,1,652efcb64fe967e0ff8104583e5cdc3b91fca72d03098c9369c7ac69655014ea,2024-11-21T01:57:41.387000
+CVE-2013-5553,0,1,31326644e0138b5922a1fee5875f02a353122d752b2f0da703777ac4d913d292,2024-11-21T01:57:41.513000
+CVE-2013-5554,0,1,4c73c9bffc48f60192ceaf6ea3c6f221e514327b7e1262270a8fa0e61543da8a,2024-11-21T01:57:41.617000
+CVE-2013-5555,0,1,9c21324715d43e0eb7189b8e5f7619902f0633525a45f0d62a6405e2fefed1c1,2024-11-21T01:57:41.730000
+CVE-2013-5556,0,1,a8b82eb521747e4ba93154bd51dc32d9934bb7dd4358c4a0c5bf1004784d7741,2024-11-21T01:57:41.837000
+CVE-2013-5557,0,1,7584a2737812be92bd86ef0520acc355c089b0afcf3800da74165727b0f735ce,2024-11-21T01:57:41.953000
+CVE-2013-5558,0,1,af42339750e2c03df68dca2e5e4e1f7c79e09b0ba83f41f69c8b510fa9e9388e,2024-11-21T01:57:42.070000
+CVE-2013-5559,0,1,8008ea8f2342d3140435328c4ed7d01377af9fa75c75be7cd99a02343055549f,2024-11-21T01:57:42.177000
+CVE-2013-5560,0,1,946a65ad5d2bbdb024a9a826d21804a6dda02c78f1c956bae906d6bd478811f0,2024-11-21T01:57:42.330000
+CVE-2013-5561,0,1,4db6d69a97ce9cc61298e1275f45bbfac0245627238b44cb895299070cb3d980,2024-11-21T01:57:42.470000
+CVE-2013-5562,0,1,b07b76d9e127839a84ed9a73c2b25fd23e386f70cfa0b39fbc7fb3a43f9e59f1,2024-11-21T01:57:42.570000
+CVE-2013-5563,0,1,016994b3009446dec924a8fda5ced85ad47378107cd49f307e129171a2aa9ee0,2024-11-21T01:57:42.673000
+CVE-2013-5564,0,1,c4f5a9b3d1ffa5a9033f6c0869956f20311401cca42ee5f01fc0a333951642e9,2024-11-21T01:57:42.783000
+CVE-2013-5565,0,1,67097d62eb48e64873567568b7ecd5340c0dc0223d4cac14f3fba0ac037a907b,2024-11-21T01:57:42.890000
+CVE-2013-5566,0,1,63931935abd585e2cdab72367f817682ff9060c9078da53998eb06993b3cfa7b,2024-11-21T01:57:42.993000
+CVE-2013-5567,0,1,63ebb6ce0e0c576961122c5d414351c2a27cc88404b4df0d6af3b8df2d6b4620,2024-11-21T01:57:43.117000
+CVE-2013-5568,0,1,b9d90d8d3fd886c008920d639d1020bb1ea78f6bb81bb14ab720d14fd3e68fb5,2024-11-21T01:57:43.267000
CVE-2013-5569,0,0,feb7ef8846faa2bf714f928de6181619bc29078b91346ea6ef5eaf466d44e7ac,2024-11-21T01:57:43.407000
CVE-2013-5570,0,0,69e19ca302727c728d131af80fa6e1b7c28ada65f7321d88c80f06774b1759cc,2024-11-21T01:57:43.550000
CVE-2013-5571,0,0,b30ea60974236860c1763ed1be14ba54428d7904860e847a17ccf479f745c8ff,2024-11-21T01:57:43.710000
@@ -63801,35 +63801,35 @@ CVE-2013-6678,0,0,e3a1a4a05e44a2233c96cf5cc3c8035e6fa33444a794b5addb6d61913b6a17
CVE-2013-6679,0,0,6381ba5dde8c7a1ae10f30d796a6df7994f4037f1a45fe87e282ed9b38fa524f,2023-11-07T02:17:45.270000
CVE-2013-6680,0,0,5157e023c814b57095d90ee82e0c7b9ef560244751b815d416e1f715606fbfe9,2023-11-07T02:17:45.540000
CVE-2013-6681,0,0,88d7522c10fbd2f1fa7acbf70fc0c296b66c0e4f3d3e451340941031020d7b3d,2024-11-21T01:59:32.573000
-CVE-2013-6682,0,0,889e165815255675b496568aa3f72752a6ec3a1fac85c3b1f1eac8d43e961b2c,2024-11-21T01:59:32.733000
-CVE-2013-6683,0,0,8e57ed4f7dbd8e3e796e8716f6e076a2c8fbf0aade6fd8a45b88d00e3b07b2eb,2024-11-21T01:59:32.867000
-CVE-2013-6684,0,0,d2e6bcffd27cda138fa1ea79fcb6e80711ce722c9c01c2e540a69b7402fdc000,2024-11-21T01:59:32.983000
-CVE-2013-6685,0,0,91717fcf1c142b321d5193634db35437f2631cc79733283d5cd4702c6ff32e92,2024-11-21T01:59:33.093000
-CVE-2013-6686,0,0,c9ba529e59a72223909925c0f41a982bda981277d5e63564255d6aed5cba1912,2024-11-21T01:59:33.207000
-CVE-2013-6687,0,0,63e28ac1e6cdb0a668e74499c80d774892c7feac4d9afba71f162be66f43425e,2024-11-21T01:59:33.317000
-CVE-2013-6688,0,0,486cdcc01df0a878022fbba3d8d7f3a7e3dc68d045244444457298df686dc7b5,2024-11-21T01:59:33.433000
-CVE-2013-6689,0,0,cd9aaf770794d876b248af7d02d877042d18c84bd805a983c3f3ff849a77b82c,2024-11-21T01:59:33.560000
-CVE-2013-6690,0,0,7f9fd3c672d4c1c0278b7ac550031c1492d6a2e0ad9feba221e1def1bbc4a642,2024-11-21T01:59:33.683000
-CVE-2013-6691,0,0,fbc90887dc41491b08bcf14982ad644658f34c014296fb97bf2517fe7a7bc598,2024-11-21T01:59:33.793000
-CVE-2013-6692,0,0,67b892d7188d827e82038affd705f10366e100dce5360180bf7bd18317487444,2024-11-21T01:59:33.900000
-CVE-2013-6693,0,0,a6b2fbd5f7465f0de2e33b21aad68ac1da66365be46d5148b6e2580a4a6eb4e2,2024-11-21T01:59:34.007000
-CVE-2013-6694,0,0,27e02b9b5868ca5497a4ec2d6b12e97135f74dcbf4e93d105169bc8914b3472e,2024-11-21T01:59:34.117000
-CVE-2013-6695,0,0,8c7a4406e5de61da57f39dc4bce077e7683119e47861f79380ec2c59ebdbe814,2024-11-21T01:59:34.220000
-CVE-2013-6696,0,0,3bb6b5d514c665e2554c001269bd06569139f4df7da7594a7808197a57be4597,2024-11-21T01:59:34.337000
-CVE-2013-6698,0,0,7c2cd4810d8c036db9e06746d7f318cb58aed007350ef1eaee7bc40a36800806,2024-11-21T01:59:34.443000
-CVE-2013-6699,0,0,128f4a2e76e721d37382650501a970d15fa7a2dd100c8e3bcf052c2303f0d044,2024-11-21T01:59:34.550000
-CVE-2013-6700,0,0,1e51ab02a7caaa37e32d06613348519daee246aa616b89c7f690eb034b630520,2024-11-21T01:59:34.660000
-CVE-2013-6701,0,0,62b34e3256b13d566cfd3c8637183ae48f86a4c7387def0474cb85f82f3c6cf0,2024-11-21T01:59:34.770000
-CVE-2013-6702,0,0,1ab057dc7b45a8f728fe968e8b79bc42fc446b5054b0298e051c5db7823fbc27,2024-11-21T01:59:34.880000
-CVE-2013-6703,0,0,488f7f683fb29b2b8ffab3cff270582d1332c0f0a31095f484f1fa6b3df90adf,2024-11-21T01:59:34.987000
-CVE-2013-6704,0,0,64e93670e2bd1fd00ed04a0bd1c534befc1661ae94247cb27b5b88c1d333ebba,2024-11-21T01:59:35.103000
-CVE-2013-6705,0,0,17495f399c85f4339d826bc0ddc31cb2171ce3013e21c1d90ded8e8f79263a7d,2024-11-21T01:59:35.210000
-CVE-2013-6706,0,0,44e01200644f56b7851bd14f4dff6164015ae996a101b5f6c5b3d403e87bb491,2024-11-21T01:59:35.327000
-CVE-2013-6707,0,0,a389fcfdbbdb9ca6ce2dcdc61c90dbe9773951160847815cf18c8781301ea22b,2024-11-21T01:59:35.443000
-CVE-2013-6708,0,0,f6f43863f2af7eac3d67fd7c47a7de2f9780d2f994ae8204d61e0cb62b0e2abd,2024-11-21T01:59:35.560000
-CVE-2013-6709,0,0,2c52f5fea8a526800fbb506930203d73ded08c48abd55e00472915850ff40a67,2024-11-21T01:59:35.670000
-CVE-2013-6710,0,0,c3b06185830a97e7ea0a9d33143ea3ecd398d61bf41e26ecc1f508afdbc542b8,2024-11-21T01:59:35.780000
-CVE-2013-6711,0,0,f90541a0a2c81e2f2036781105a61216b84481b6d3bb07fc253c49d87f9f7ecd,2024-11-21T01:59:35.890000
+CVE-2013-6682,0,1,94924cb9ac9bc035d363e0897042ada452d47bba2e99732ebfa5abc0d915bf1d,2024-11-21T01:59:32.733000
+CVE-2013-6683,0,1,877a8f74d5005fc174030333585e42d19fa48ee02b03bc2da12cb598b06020f0,2024-11-21T01:59:32.867000
+CVE-2013-6684,0,1,aedb45f05bc11123acf0d6a9416cdb6cc044b0f753a688d6579bd66256bbc3c2,2024-11-21T01:59:32.983000
+CVE-2013-6685,0,1,2999aec843e53c2b9a9a9f056185b5bc08ff5d04aba2eba0c365fb9164988be3,2024-11-21T01:59:33.093000
+CVE-2013-6686,0,1,326e880aeac37ee30784fe965695d41dd0c014c96f7d140302c271506d889fb2,2024-11-21T01:59:33.207000
+CVE-2013-6687,0,1,b63d225d3832a6caa72c3d1e9bf9c5f88555e04acf2ec92a9c97ceccf4db1f5a,2024-11-21T01:59:33.317000
+CVE-2013-6688,0,1,430ed4e6d40e0d56ac95d6d0f0e774557adfaba345185ba0ecd9edcd25703efc,2024-11-21T01:59:33.433000
+CVE-2013-6689,0,1,f8b47ab16284def8b62fb36ce02e5d553484dab899a0a450be101542df0c9576,2024-11-21T01:59:33.560000
+CVE-2013-6690,0,1,9192454930d150d327fa2822e94c147deab295069e00857434355bd353500e4c,2024-11-21T01:59:33.683000
+CVE-2013-6691,0,1,4e9ba4e1b5d138e0e4a55fa9afcaaedd4466fabf0fb2ec9c955184476b1fa2c4,2024-11-21T01:59:33.793000
+CVE-2013-6692,0,1,992e0a7ed69572002a3113a5bc8c9e338c41f8e5c201359e45db728893328b53,2024-11-21T01:59:33.900000
+CVE-2013-6693,0,1,fd5d9f0965a326bef077e889de6d1704174c4f063c1314371eb9bfccfad7359f,2024-11-21T01:59:34.007000
+CVE-2013-6694,0,1,65b4b56963d088aa77ada2fce1dad7615b40fb6feb3b2b5f9440633c4d4adc3d,2024-11-21T01:59:34.117000
+CVE-2013-6695,0,1,0a279554d605cda32de9ed70167ef7cf7b952238a52e5d001646a77f428e6355,2024-11-21T01:59:34.220000
+CVE-2013-6696,0,1,1b093e33159eddbebc473b546e90873ef6bfca971585e45e7ec400041a66cf4c,2024-11-21T01:59:34.337000
+CVE-2013-6698,0,1,418bca80fe3a2a0ba995ff01332024f45b7cc9a6f1adae5c00cbb15121297082,2024-11-21T01:59:34.443000
+CVE-2013-6699,0,1,fd3d1066b6433646e3d6c721b76c7cab46652f687da86256b9493364dac23798,2024-11-21T01:59:34.550000
+CVE-2013-6700,0,1,b0bb56c8c001559dcd548211b25be55ae79491071566df1dd2408772a90a1b0c,2024-11-21T01:59:34.660000
+CVE-2013-6701,0,1,087fcc66b558b865a205e38094c33f73be02a77073f064e5cbeef2a5155be7d8,2024-11-21T01:59:34.770000
+CVE-2013-6702,0,1,feaefae451b4470c4f59b79859bdc043a6418e36ab63f7a3699bd017225ab1ea,2024-11-21T01:59:34.880000
+CVE-2013-6703,0,1,db58408fbdf8f7bb500943cbd754b7d66bf5ef43ec75cc06fe8008211e5b31ce,2024-11-21T01:59:34.987000
+CVE-2013-6704,0,1,3fc126e472ef01dca9e885b51ea2f769be38d71f7f6b85fff660cbda9139b63a,2024-11-21T01:59:35.103000
+CVE-2013-6705,0,1,cef87e184c50cf9800be02a7058d85f43ead6375daf80db9b510fe0d910fc629,2024-11-21T01:59:35.210000
+CVE-2013-6706,0,1,a10d903bdad393b860200dcc29b40477d0732bc5dbcedd9add8bb40147910d17,2024-11-21T01:59:35.327000
+CVE-2013-6707,0,1,88c295a474a60750d28ff4ffad9a661a1dc6de1b1240aebf293b73ddc9d2e233,2024-11-21T01:59:35.443000
+CVE-2013-6708,0,1,2634b40e9f999749b776b14124d9ce8a5b8962ac2531711b60008e9b1a11e335,2024-11-21T01:59:35.560000
+CVE-2013-6709,0,1,53c55458b47d31b6f4da35d3ca2b9171b81affc26867623ea52053c2127c9fee,2024-11-21T01:59:35.670000
+CVE-2013-6710,0,1,d2068587b571fb9c8ce5b2885ffa2a676f21f16def307292cdfb692914816498,2024-11-21T01:59:35.780000
+CVE-2013-6711,0,1,010ed54809085aea3ba7c4fae50fc84d1dc9cbaa0bdaacb5ecb951cb7b990d71,2024-11-21T01:59:35.890000
CVE-2013-6712,0,0,c98e28961c9f95afa7e8b49517113b554a5085f02943b127f9e9f2099c6b2941,2024-11-21T01:59:35.997000
CVE-2013-6713,0,0,8596adfe98dd48e5756c046afd6169a7061928fe3bf649e45245200b9b7518bd,2024-11-21T01:59:36.163000
CVE-2013-6714,0,0,240632df0ec898c2ce46d3f9022f505a7629f5ebe4a513488ecfe8fdbfecad8d,2024-11-21T01:59:36.270000
@@ -64034,29 +64034,29 @@ CVE-2013-6955,0,0,3e584750a4e777bd96308d0f3b03b6b2598b549ccaf58b699f939214e078d1
CVE-2013-6956,0,0,c08281658e488cb2837c8b84cc19631ea0cf14002de1e2f68526cfdb0845acde,2024-11-21T02:00:03.083000
CVE-2013-6957,0,0,783cc42831844316eebc1cfdfcb220f00e629ae26b01e6050c97d683f51ec6b9,2024-11-21T02:00:03.237000
CVE-2013-6958,0,0,35c9c57b4e8e3bd96c2c97c55f015c9636535d2b64fd311fb610efbd97eb731e,2024-11-21T02:00:03.410000
-CVE-2013-6959,0,0,d6f03f80b1dd6f018a07aceecb2c680b4b1e84ee7c5c23c2246ac508df69f9a6,2024-11-21T02:00:03.570000
-CVE-2013-6960,0,0,5d9d690e1d3657f7bba5fa6470d64148b7bf29808a3b0917f276ad53242db814,2024-11-21T02:00:03.727000
-CVE-2013-6961,0,0,06794dc6c0e6e794dcfb4e1bc7d0262c8767cf8c57d3f1b205b02c597e2eaf7c,2024-11-21T02:00:03.863000
-CVE-2013-6962,0,0,941be014f3e3c0b6cd389779f6bb843d87be30d32d2ac46e763b25f9192976d3,2024-11-21T02:00:03.983000
-CVE-2013-6963,0,0,e6617bca4ee554c29988caecf6c326ec2b6faa767bcd8ecfa36f5797e13ed592,2024-11-21T02:00:04.100000
-CVE-2013-6964,0,0,86dbb8ebf4e9a76919d7c888f97f3d083188a8e6582896cbb94b405b8ea235f8,2024-11-21T02:00:04.230000
-CVE-2013-6965,0,0,543d4d5aea77b5438b1be1ecec24671115fe21e80fbc6b4c25a9f0f95f9d0807,2024-11-21T02:00:04.350000
-CVE-2013-6966,0,0,109c124d380588d27531c16f45cf8b3ac8706e47e81814e7019d8ae75ca606f1,2024-11-21T02:00:04.470000
-CVE-2013-6967,0,0,dc9f9d8f459baa43dfdeeb03fc71d07952c3eb5f14e6a66f3bbe9f715eb4b86a,2024-11-21T02:00:04.593000
-CVE-2013-6968,0,0,6741fc4142e347771577087e69f282f30997cd6738a524148d9ca2bb3e135842,2024-11-21T02:00:04.727000
-CVE-2013-6969,0,0,f83b6bce241e145f7137ddf1557b8f81bfddf6998df2d5e13accb9382a9d9a19,2024-11-21T02:00:04.840000
-CVE-2013-6970,0,0,31c68c32e28b66cd9d755fb351ea89d726b2a24ecc6eb777fa21708291381ec1,2024-11-21T02:00:04.957000
-CVE-2013-6971,0,0,9b3db9e47a146a2cf7b3bd222aeade3064ffdfd43461b97bc26d65dd16d79728,2024-11-21T02:00:05.070000
-CVE-2013-6972,0,0,bc579473efe5fdb07074d158cbd64ec03c0c7bd831b8feff065216bb06c42021,2024-11-21T02:00:05.187000
-CVE-2013-6973,0,0,439ccb771bdddd634c0b70afe8d65acf4dc0232b5832bdf382a5ac537d7c5fa0,2024-11-21T02:00:05.313000
-CVE-2013-6974,0,0,1beb9d31be22556b376a78c8b0cfe3ea35cfc7ff11e2e75cef007ee295ea3b9f,2024-11-21T02:00:05.430000
-CVE-2013-6975,0,0,c65ab772088136c66e18ab76037b4c50535133ff26332f02b88c0fd74bf61011,2024-11-21T02:00:05.550000
-CVE-2013-6976,0,0,7f6f588f1a02172c6e4d4f74fc77de7acb4480f51cc03611c520d1bcb98fd7a7,2024-11-21T02:00:05.677000
-CVE-2013-6978,0,0,c38f09bc20f0967a179baf0eed05a9fc4e977e60449a3f1e95483a78c97f53b8,2024-11-21T02:00:05.790000
-CVE-2013-6979,0,0,e6b27d1ad13713cbe03970a4f7172e04a7023f50e9afc100d2a5a48e9d1eccba,2024-11-21T02:00:05.923000
-CVE-2013-6981,0,0,3b0f4363df3f4a8c48dbdf698e9680caac2514c4bf6175a13f1346e698a4367b,2024-11-21T02:00:06.040000
-CVE-2013-6982,0,0,6bbde4d91621c890e1599ddf25f40455a0f61d3e9f15e1496cb336de7b8520ea,2024-11-21T02:00:06.167000
-CVE-2013-6983,0,0,66ebd96daacced4a78e7552c215f8b6d48a852018b1c265fcd0a1599d53e3e76,2024-11-21T02:00:06.293000
+CVE-2013-6959,0,1,ec92947fcd7c7c0555e1ee2a3b414a38047788d2ef601431bfa33595ab976b10,2024-11-21T02:00:03.570000
+CVE-2013-6960,0,1,cccad454d071d0b257ffdd5b136e03ce12f359d0acf52895b626dbee09b2e8fd,2024-11-21T02:00:03.727000
+CVE-2013-6961,0,1,5af9047368fd78b574bb979410e4c89a8fde7c83ef8f52e7b6b586582a43278c,2024-11-21T02:00:03.863000
+CVE-2013-6962,0,1,58f57d3bb48a1886c10b725bd24ee568cc2bff2334b8cab19d7f8befd8a9a759,2024-11-21T02:00:03.983000
+CVE-2013-6963,0,1,39344ced2e41e363ceda7a4e900b6e5ec7764f4888c3ad4e4c02ef18eb2a83ce,2024-11-21T02:00:04.100000
+CVE-2013-6964,0,1,eb4aec99cf3e43af3a83ac7567ef3a0871b54adf971fd08aff7259a45689c0ba,2024-11-21T02:00:04.230000
+CVE-2013-6965,0,1,72321873483a5129b572e6530783f69297341e62f34d6a7cee8f8c4a979df21e,2024-11-21T02:00:04.350000
+CVE-2013-6966,0,1,257ab3ef30c073ce07c1d8b13c44a06d1a572d36be49f64bb5c142c5d857548a,2024-11-21T02:00:04.470000
+CVE-2013-6967,0,1,054098ace2f8dc252605bc9679814c4e2924655ed7571c41ed37b0cae363a1d4,2024-11-21T02:00:04.593000
+CVE-2013-6968,0,1,821bc4c7b84bc508260215551ea3cf643817a002aadb4b0f48bba4a2fde02c56,2024-11-21T02:00:04.727000
+CVE-2013-6969,0,1,c091328bd1a5ac54d1cab0b8a2c2d6b2f59b3479b2d5899a6f465ffc880ffe09,2024-11-21T02:00:04.840000
+CVE-2013-6970,0,1,bdfbbaf38194ed497e116b2fdbaf5ab2ca5ebad3da2bc10ea35a6c72d44a2181,2024-11-21T02:00:04.957000
+CVE-2013-6971,0,1,e522f5ac17efdfd0fc5dc962eda497068202a73f99e79e049342a272a4fbbd1c,2024-11-21T02:00:05.070000
+CVE-2013-6972,0,1,7ee0077e7d6a99f822011a1e2bbeca33db137c80be31e31eb2f7e463a557b1b2,2024-11-21T02:00:05.187000
+CVE-2013-6973,0,1,426ddcc820e41e00a07b0b06ceea536104da7c7af0c9591c12ce395face015e7,2024-11-21T02:00:05.313000
+CVE-2013-6974,0,1,92ab6ae10650b8dac4e11e759027dc9f71df19f4f11ce7ef20fd72635218486c,2024-11-21T02:00:05.430000
+CVE-2013-6975,0,1,de3dc84c9cc2f989c4291ea9602d3cd1ca5490167aa11c714823812b5e461ed9,2024-11-21T02:00:05.550000
+CVE-2013-6976,0,1,1a5333c23aa772fc11b0a8374d31c32efa4c4f11de24f0967416cd17c88ef97b,2024-11-21T02:00:05.677000
+CVE-2013-6978,0,1,bac490e2fe4a23ff250c5a42c95ab0e7e9533e2d4057ebc252e99e2e1ef09571,2024-11-21T02:00:05.790000
+CVE-2013-6979,0,1,c34f68345101bd67f82e7eb416b9ae85cd134b63ecb3926cf40d8fd6f2377a35,2024-11-21T02:00:05.923000
+CVE-2013-6981,0,1,50afea2bfb283dd48dff27c505ffe5bcc2e570b9cbc903b848284925188b7eb2,2024-11-21T02:00:06.040000
+CVE-2013-6982,0,1,6b3d7d757add36f969234c88a9367cd51229184b25434354bcec719cfb947327,2024-11-21T02:00:06.167000
+CVE-2013-6983,0,1,05d9b57f0e07110bca294c541e4064c5c1d0d1a467765e7f125365d6e145ec81,2024-11-21T02:00:06.293000
CVE-2013-6985,0,0,a49d4ac464cc5994d534e4035a429fbfa1398a6128bc9333efdcdc8f59267854,2024-11-21T02:00:06.427000
CVE-2013-6986,0,0,ac73fc29f5565482de3f8f2d9cbdd8b535d17518f3c367ebfd1c69d2bc8ac6cd,2024-11-21T02:00:06.573000
CVE-2013-6987,0,0,f2267c31a20c12597a74bfb5f89d3af54d55514415630462c2253e0fa103674c,2025-01-14T19:29:55.853000
@@ -64182,7 +64182,7 @@ CVE-2013-7129,0,0,22555ddc8e66426a72cdfb6698cdf05361c75cc4dadf784e112faae825561d
CVE-2013-7130,0,0,0ed14c8a74797a522e01aefbe44f5b9c34523f01e2dc2d4e31fda528a644254c,2024-11-21T02:00:23.563000
CVE-2013-7134,0,0,d0dbe9f6fd5382fac01cd6ff32414a650ddf306d17d917d6bb2f2873db565562,2024-11-21T02:00:23.730000
CVE-2013-7135,0,0,37307714b04e0e3a444f5bc9852afbeca50ce84577b08653083b4413efb8a06d,2024-11-21T02:00:23.877000
-CVE-2013-7136,0,0,badc99c63696a592fbe100910f51812a70c7f7e6d014a059241f269e6f9f8560,2024-11-21T02:00:24.003000
+CVE-2013-7136,0,1,703d8baf97012f002159968f0e507b0023de3889dd0974fc9d60444d5898bf0a,2024-11-21T02:00:24.003000
CVE-2013-7137,0,0,2259c20d6d9a3305543eeea93191d7451402e513a484d3693a42963a987f70e7,2024-11-21T02:00:24.123000
CVE-2013-7138,0,0,4b8f182bd8faedd144cb90204a81edf3176cc752d94e45f0faaa9bc8550de829,2024-11-21T02:00:24.303000
CVE-2013-7139,0,0,663fa01638d0927978b5f77fb57fd9c31ab8c9ce7125d86fea8b6e8bb985ea18,2024-11-21T02:00:24.470000
@@ -65124,86 +65124,86 @@ CVE-2014-0644,0,0,cbaf40f2a750af73058555e54dd6fa70df9ead0470f1d805b9bf3f4f5c1768
CVE-2014-0645,0,0,403cd972117104a94bd69ab34843552074fe5ca5f1d2376ecbebbf26f33b9e01,2024-11-21T02:02:34.317000
CVE-2014-0646,0,0,48ac44f46df5791563058ad734fce039622403ed988a49f78cf68c7a4bf874b4,2024-11-21T02:02:34.727000
CVE-2014-0647,0,0,a75fc39f4593c08f965260f9f9dfff52aff11e5282e00a59b79130dbb7e27a7e,2024-11-21T02:02:34.837000
-CVE-2014-0648,0,0,826591d657691509a2f939b16150ceee867ee0f0b4877b2acfeda6bcfc3725a4,2024-11-21T02:02:34.990000
-CVE-2014-0649,0,0,162f0d72223d8d35a4fbd8ab9ed77b283f6f34a2829ec046c0e6f44bcffd9b41,2024-11-21T02:02:35.107000
-CVE-2014-0650,0,0,f0672f9b1fd9c685489c0996a3d0bc8811f303eca71ad52b2218ece721852d67,2024-11-21T02:02:35.237000
-CVE-2014-0651,0,0,5ee88432df7243eb2f3b6b54211e0fa1ff733d3097d54f72c241ff5afbaba87a,2024-11-21T02:02:35.387000
-CVE-2014-0652,0,0,90acb9621cf93cbfb846ef8276cc1b6ac84f5e0098764e52381bc1700acf8f1f,2024-11-21T02:02:35.510000
-CVE-2014-0653,0,0,a55f3e2c7f63742a49abc6161193d9e0e5024d7c311df36789b3883c89e24221,2024-11-21T02:02:35.630000
-CVE-2014-0654,0,0,c723d3c3ef8deae621cb934e35d80f981c0b59e793e6273fce9b217434094de8,2024-11-21T02:02:35.747000
-CVE-2014-0655,0,0,e5759ba0778fe9d788704796357657a37c7f6c0c3dd58cde09e25d65c175b254,2024-11-21T02:02:35.893000
-CVE-2014-0656,0,0,4d943da107c5d7b1eaafb22cb8a83649dbcea44cc5c5c8eb9175aa47d360fa92,2024-11-21T02:02:36.017000
-CVE-2014-0657,0,0,0c0759673ee812ef864db0bb4afdc6f6a9c2258603760fb97faadf229123cff2,2024-11-21T02:02:36.123000
-CVE-2014-0658,0,0,e7ca254c7c0155510f12f00bacf476670cedca830c033e70aa1d3d6d44f25af7,2024-11-21T02:02:36.270000
-CVE-2014-0659,0,0,53565e43d0721705203b284be5472a46f7bc635f30b9cf62720608ab182b4056,2024-11-21T02:02:36.400000
-CVE-2014-0660,0,0,abf33c990bcc1e7377ae3ac9a65943927adcfaa46727919a5c00b074abf876bd,2024-11-21T02:02:36.537000
-CVE-2014-0661,0,0,89d0bfdb01d57885cc6660e4c9ed5a34d929d312c9cd699e3a89e9c760e38928,2024-11-21T02:02:36.660000
-CVE-2014-0662,0,0,0db5dfe15f7a079ac5e0b5980545db7fd20f23fdcb6a3a5939d0946b7c42b550,2024-11-21T02:02:36.797000
-CVE-2014-0663,0,0,2b331b107eb5a20dec6b23cf682b2e6fd8dcb556d7c1ca8fa60765576fce4c18,2024-11-21T02:02:36.917000
-CVE-2014-0664,0,0,e13db2e9b5628bb27d497adc8bc3bdd4dc7f4119f2e61f373477b7248075a2dc,2024-11-21T02:02:37.043000
-CVE-2014-0665,0,0,820b765d873ae85509f779e2742cabb5e572ef53f6562cb4c4643ec84cecf758,2024-11-21T02:02:37.190000
-CVE-2014-0666,0,0,9caa0677136132653ebc44608a475b1ae373375bc17639cc4ebb7b9a9cd3af03,2024-11-21T02:02:37.310000
-CVE-2014-0667,0,0,7c620506bec36a6c9a89b5cdb1e4420881fd36780eb3bcd26d76360c846f961f,2024-11-21T02:02:37.440000
-CVE-2014-0668,0,0,2c1d879fe51bb30c1878d8a30da2e93e042b59106f97d4f3fdbca914ff3511e6,2024-11-21T02:02:37.557000
-CVE-2014-0669,0,0,894c6494aaa98f2caf3e8e01312b0f04cae4e7ab296e40ea038dfc63ab3826b2,2024-11-21T02:02:37.680000
-CVE-2014-0670,0,0,91c001c40b6217555b358d8a2dceb5045f42deeb91b052dcdf445317a63f6b46,2024-11-21T02:02:37.800000
-CVE-2014-0671,0,0,25c33ed0a8cb77e230b7022a062ca2f9133ded9fc729500e5ef221716ceb74dc,2024-11-21T02:02:37.920000
-CVE-2014-0672,0,0,568781592a8d2ce26d6ea5b59f1f91136f2e82ae95c965b1ee4bee2f46724edf,2024-11-21T02:02:38.030000
-CVE-2014-0673,0,0,b873364b4444128fca1f8e2acce17895f832280344b6e9324f34d3f63352ded5,2024-11-21T02:02:38.143000
-CVE-2014-0674,0,0,7620011a43b71e1231b2114a3ff0903ca870a740375f9cc4baba8c0cb709cef1,2024-11-21T02:02:38.263000
-CVE-2014-0675,0,0,ff481840217411d56c069cdd51dc2b03d9f3a604d6a7d0068ce3abf9f58437b5,2024-11-21T02:02:38.380000
-CVE-2014-0676,0,0,9405ff9b86400fb895515fa5d90eac2f5deb922261f89c5e63686581895464d6,2024-11-21T02:02:38.493000
-CVE-2014-0677,0,0,7cb55857a31c597555bab60dd168755dc08dabb24ad334b250e8bfe435b6d563,2024-11-21T02:02:38.600000
-CVE-2014-0678,0,0,7b38b6ccc1f181fb6c4d4cbd73ab6f17f9cafc6f35453c31f4bb7cb39569491b,2024-11-21T02:02:38.710000
-CVE-2014-0679,0,0,c7dbcfa4e1927a39fdb53aa07079142be8bd6c4cd8ddc709dcc9d3518b64f1c7,2024-11-21T02:02:38.827000
-CVE-2014-0680,0,0,a7c55bba5f3d93fe02e8e2092b6c8291a3c1cfef051d77028676ac96fae98e8f,2024-11-21T02:02:38.933000
-CVE-2014-0681,0,0,084a9b2acc1addb4dd42c5c4cf50afc074cba41342a959f4a0967961ad83efe7,2024-11-21T02:02:39.053000
-CVE-2014-0682,0,0,bc137fce8865593ff626dfd4ad84df8d9c613fd930965a8404af37a5c8498546,2024-11-21T02:02:39.163000
-CVE-2014-0683,0,0,55c91943295e1741627d00888c8454c05137230e8f568b3d22771225218ff778,2024-11-21T02:02:39.287000
-CVE-2014-0684,0,0,5d9f0c6c123269c8c925a7d44e561877f2ce5f6eea398d868c0319b723a762d2,2024-11-21T02:02:39.407000
-CVE-2014-0685,0,0,65e248e3c332905c14d7bd45bf2414912037b829987c5b6f27e7fd988969b22d,2024-11-21T02:02:39.520000
-CVE-2014-0686,0,0,a8c4898fd6d41474edb232ec78e0c98bab4051e085cd175064d5d7276547b2f7,2024-11-21T02:02:39.650000
-CVE-2014-0691,0,0,a7e64f8a641f5ed5e57d373fa4c92d27e7e4a0c66ec6b133536eb13bfe1fb121,2024-11-21T02:02:39.777000
-CVE-2014-0694,0,0,a6b184b47c86681fcf0e98a2e17e1c1a0910235ceee31914489cb0d31fffe067,2024-11-21T02:02:39.877000
-CVE-2014-0701,0,0,2cc07b5fbf9ccad0cb8d79dac5ce1c61e274702d0c498c2855cd190544c7a34e,2024-11-21T02:02:39.977000
-CVE-2014-0703,0,0,628818c2c7a64146f98ab80d7bcc7c3fe5e6cabe2b17af0be57f931ee9c4a00e,2024-11-21T02:02:40.100000
-CVE-2014-0704,0,0,e8d41ceec230dcc12a09ef365d309b7c86705742aebbfc5eff3df2cf3bb0a282,2024-11-21T02:02:40.210000
-CVE-2014-0705,0,0,21d4ed7658da6247e1c6e506a014bdefe31ea6267c3ec318fdd1b3bb162e2bbc,2024-11-21T02:02:40.327000
-CVE-2014-0706,0,0,760c1758fe2bdba9a98ec1f7dbb31673752602f20139daefd81369ef1c6a886e,2024-11-21T02:02:40.437000
-CVE-2014-0707,0,0,dda448075f0cdfb385b27b61ca3cce1780bf26c6948ac9abee71815453ccdf97,2024-11-21T02:02:40.543000
-CVE-2014-0708,0,0,7dd93bb80f5004f6dd63bdec51415662c9051595cf8957bdbe922aee0b9e1892,2024-11-21T02:02:40.647000
-CVE-2014-0709,0,0,aff0bda7370ac51bebb3b9e7c001353bf82e95add6aedcc8d2a329df3026c2ba,2024-11-21T02:02:40.747000
-CVE-2014-0710,0,0,2d392a3e9df66629caeb5be142b4544aa2d2174eb8cf57f93143db8ea9be4342,2024-11-21T02:02:40.843000
-CVE-2014-0718,0,0,b04e7d6e98e47bc13d2637dac17335270e877cd754a2fc40dcb54ee9d173fe2b,2024-11-21T02:02:40.963000
-CVE-2014-0719,0,0,5886020dbc710710158fcf4639bc74a5cf844aa1f77288ec0b2ca9e296abcc9f,2024-11-21T02:02:41.073000
-CVE-2014-0720,0,0,996860f41270e29deb0bbeda101ef06e839a35b5dd0f9c14ad28dc916a443837,2024-11-21T02:02:41.177000
-CVE-2014-0721,0,0,7e6e8d6865168e31f1b5728aff8a22045c958c32cd65a2bc173823397f94d77a,2024-11-21T02:02:41.280000
-CVE-2014-0722,0,0,65381522db8b86d09abf53071c830399031899e2cee2347c0d64e0774808da26,2024-11-21T02:02:41.383000
-CVE-2014-0723,0,0,8c10c02fb49e8baa1bc471d9fbdbb2b2aea7c8ed90fb748651f73e6190fa9830,2024-11-21T02:02:41.483000
-CVE-2014-0724,0,0,6417ed546c1bee7762f5a91a91c623e666b0a1672ee841f0abcb05e98a70c98d,2024-11-21T02:02:41.593000
-CVE-2014-0725,0,0,651950cf93ea2b5ddfc118bed4e95672588762e558edab930f9cf6ecc76b8de7,2024-11-21T02:02:41.707000
-CVE-2014-0726,0,0,680d5e737b671f54dc5cd18a245a87b190d86b955cb333253a9f5fbd4d0719cb,2024-11-21T02:02:41.810000
-CVE-2014-0727,0,0,a8da6676a087207f70f0eb6f3e14710ab62d7ec54010753b5fa3ec72f5633ad6,2024-11-21T02:02:41.917000
-CVE-2014-0728,0,0,923741072870a8ecf4d6a88c1a87f3948432f540e4ed5f467d259ba5e2c46b0d,2024-11-21T02:02:42.027000
-CVE-2014-0729,0,0,c292a4e90d30282cf41e52d34302fab5b857f17419ea343e4c940fe9e560ab01,2024-11-21T02:02:42.130000
-CVE-2014-0730,0,0,fbba67c350192688499adba9c44ab51efa05ba1fe442373105dbd26c7e7802d8,2024-11-21T02:02:42.247000
-CVE-2014-0731,0,0,07f90a3791177711c54d9fafa35c438ccd895c6c303ae0325af5347c185c9ad5,2024-11-21T02:02:42.357000
-CVE-2014-0732,0,0,20fcfb0fbc1efaf8b360b6db09456a009d261cb6ce26df35c7a31be2af0cbbcc,2024-11-21T02:02:42.473000
-CVE-2014-0733,0,0,0e7881591c595797b8890a59254294d66bd85f0ca1dd5c8efd43ba6666292700,2024-11-21T02:02:42.583000
-CVE-2014-0734,0,0,e2b969cf300283feeecad76b5a5ae2dd352d915e6c8c0a3f73c8f23d358e58ce,2024-11-21T02:02:42.697000
-CVE-2014-0735,0,0,843b1628ea5790831b30bb55990ab133ea3c81d9ced0405476df4c4b2e328e6d,2024-11-21T02:02:42.823000
-CVE-2014-0736,0,0,ebed14b84c33cbffa1c5843c07e55425e66bf4d3ce35f98e8c3e95e89e8819a1,2024-11-21T02:02:42.937000
-CVE-2014-0737,0,0,9a654b1447504fe871dee32567f899317ea4c89c98e418bd0a06b891adec7a2c,2024-11-21T02:02:43.050000
-CVE-2014-0738,0,0,dc56fb0c239203c930609fe0c618b9ebc7129c07ccd2808a55aa7f12b22860a5,2024-11-21T02:02:43.157000
-CVE-2014-0739,0,0,79afaa6f00b4926704051a7330b7fc7e656ebfdd1c2da4735f6c986314585038,2024-11-21T02:02:43.260000
-CVE-2014-0740,0,0,992a7d04692fefa3d872bcb7797c05e09a2e98553c9c8ebc88c160cae428250e,2024-11-21T02:02:43.383000
-CVE-2014-0741,0,0,60a4fe0499ab0b7c007b1642ecfac663f8e604b401a1c5115c181576d4438a6b,2024-11-21T02:02:43.503000
-CVE-2014-0742,0,0,2f71a6dd09e01691a3370a7bcfb16e6ee45fc3006030f1f24453db4074aa5434,2024-11-21T02:02:43.620000
-CVE-2014-0743,0,0,c522a7989c0b4cfb25f1344a63c8f1d1b5bdb5d29da5425468cafd017567de90,2024-11-21T02:02:43.740000
-CVE-2014-0744,0,0,a6c5e4b7d95aa6ff5d680360f1eb1c5ddf0ba71bd955999ff25dd05ade6af877,2023-11-07T02:18:25.860000
-CVE-2014-0745,0,0,a8a679cd7250fcd7afcc3de3e749f70c29cb129a128b77c032b6c53da9844ec1,2024-11-21T02:02:43.863000
-CVE-2014-0746,0,0,f9791322fd3020b881c2a4f63e75ec090e5795f1226fc28785d937087f2dd460,2024-11-21T02:02:43.967000
-CVE-2014-0747,0,0,37ada97a159b717f23d943fe2c96a249b5260ce9d5cea52845d19e1f2a428ffe,2024-11-21T02:02:44.087000
+CVE-2014-0648,0,1,952945d614ceb2ef3dd813cc66878df2723296ece4ad79c6863a9b63a0c12dd5,2024-11-21T02:02:34.990000
+CVE-2014-0649,0,1,ba2846774d691a54d91af2d27cc5befe6f96d7be29dcb86db52d8c3296007f38,2024-11-21T02:02:35.107000
+CVE-2014-0650,0,1,5279defe76b7139710e916fe551ae322909be844278c8a1c02d99d34aca5a9f1,2024-11-21T02:02:35.237000
+CVE-2014-0651,0,1,e222b43c621f758fd73bdc3baedf19f0d6ce179b79140256dedd5fabc244e602,2024-11-21T02:02:35.387000
+CVE-2014-0652,0,1,218b46005063c3bfbe3401dce90f030ef1c98f01acd0ca3e3794d18fdb20afeb,2024-11-21T02:02:35.510000
+CVE-2014-0653,0,1,d805dfe698cabe60ec3000e7a9c95a409e9b3c02e8dd9f3e18eea7ceac294e4c,2024-11-21T02:02:35.630000
+CVE-2014-0654,0,1,9abd50584a9fa285871c02fd929cc1a30cc6c4b68603950c00cfe47fbe9db0d3,2024-11-21T02:02:35.747000
+CVE-2014-0655,0,1,68616506342522f9d2584e1b2ed29c1df207735314c6b993c23f9d6a23dfbb1e,2024-11-21T02:02:35.893000
+CVE-2014-0656,0,1,acc00a014d8559488a019858a4f5f4afa45e8f9cba37a3ccd572e642bb978b69,2024-11-21T02:02:36.017000
+CVE-2014-0657,0,1,9d64eaebc26c4ed49f4943b7bd18a77baeb037d4d7847ea84f766e0f7c56abe6,2024-11-21T02:02:36.123000
+CVE-2014-0658,0,1,d0b129093033aeb619e785e270e95654160c722e472c60f4593a7bfefc7535d3,2024-11-21T02:02:36.270000
+CVE-2014-0659,0,1,bef76fd601d8323495e6d45ba771416da8ec8b5722bd19677bd3b67f702c34d7,2024-11-21T02:02:36.400000
+CVE-2014-0660,0,1,550aa42ed96b97860c663af8520625a8eb5b10e850f70c2f2f3be238dbb8cbe3,2024-11-21T02:02:36.537000
+CVE-2014-0661,0,1,8111fd212020d77a0ec8075c0e0dca3fc9d07591e4062a782905f8b2bdbcbe86,2024-11-21T02:02:36.660000
+CVE-2014-0662,0,1,364b6145b2fad3ff36cbb124a0d8cbaaaeedbd3b48b34b5cde1e521595cbe814,2024-11-21T02:02:36.797000
+CVE-2014-0663,0,1,cdf8fd2d3c5f4e3c1a9ade202731ffa882302a963b3e2c6a3c0ecee108aa0bb9,2024-11-21T02:02:36.917000
+CVE-2014-0664,0,1,7af6c660c8cb40acf428f239521a413672dccb3b67ad5de82fdce2cb5d2feb94,2024-11-21T02:02:37.043000
+CVE-2014-0665,0,1,9574019d3e076c72927b55a5f57adda8eccd60b93f309860cfdd94ff09ee4f30,2024-11-21T02:02:37.190000
+CVE-2014-0666,0,1,5fac3e32532eb10877b4c80ce33459e5132c3b7401aac660796211cbf7a86744,2024-11-21T02:02:37.310000
+CVE-2014-0667,0,1,1acdb5398bb1a7a19fb24d6168ef55b7ad86f692e620457f1e04ab74a0a76019,2024-11-21T02:02:37.440000
+CVE-2014-0668,0,1,c31b11c23b2d448bf43dce35ff98b581e2a9eea7ead2f7e936ddf5c560001a34,2024-11-21T02:02:37.557000
+CVE-2014-0669,0,1,a500ea62a7d9bcbd6f87649087a61c687c874a0777be391f7f387db54d36c9b0,2024-11-21T02:02:37.680000
+CVE-2014-0670,0,1,c9bea8853e9fdbc999bca926f4dafb8429e4dcba4e6d73fa8913d2ff6a493c63,2024-11-21T02:02:37.800000
+CVE-2014-0671,0,1,986a55d90bb6e3d4d07edb01267836991e1ad3c07d62f5a380802fee48d399f2,2024-11-21T02:02:37.920000
+CVE-2014-0672,0,1,10ac4460dc62301088cd8d620649466e2b27e73a73d21ca683df1bfcf322171f,2024-11-21T02:02:38.030000
+CVE-2014-0673,0,1,2ea5e3a71e711e0420715fa4564ff0ad3fd61fff582f359a4a77b26394905f4e,2024-11-21T02:02:38.143000
+CVE-2014-0674,0,1,83521160ccf1a93e7052d255713d62eabd645b02809b96a3daadc818c57da62e,2024-11-21T02:02:38.263000
+CVE-2014-0675,0,1,ac2f16c04c5410bfccefa7fa933f0183c82eaa818bb062848d8f53c026e0e749,2024-11-21T02:02:38.380000
+CVE-2014-0676,0,1,975784efa52d1a0eb5f2b910ec86e2aae65f51eaa096a6293d704b98cb692b53,2024-11-21T02:02:38.493000
+CVE-2014-0677,0,1,fe9b232cdad9bd972e9a90fe63305380bb02d94036da201063719d500c041441,2024-11-21T02:02:38.600000
+CVE-2014-0678,0,1,e3f297747d7bbd8595ca0aab37e2b75d4a8e396a658793e5872f827fa08e4931,2024-11-21T02:02:38.710000
+CVE-2014-0679,0,1,65d5c03c17470cc8e0bf3bc529f8a8eac5dfe5f65daa460246771ff85a4a3b36,2024-11-21T02:02:38.827000
+CVE-2014-0680,0,1,09e4800cd8e17d44c00cad2ae06d2561f0051dfef21aac18fccfecd3d93e7a5c,2024-11-21T02:02:38.933000
+CVE-2014-0681,0,1,0b60cf22f914f57f41bdac4a372c4a47b74e2b4c05839732fb1aa79428c2e295,2024-11-21T02:02:39.053000
+CVE-2014-0682,0,1,919e5f4023df2147f9da7bd6e096d91e4689b55f11bd96ca0ff258fc945dc2ee,2024-11-21T02:02:39.163000
+CVE-2014-0683,0,1,9de79a17fff7fc90687c48b572f5c4faa9877c93a0f18ffeeda3a60c4fabc292,2024-11-21T02:02:39.287000
+CVE-2014-0684,0,1,734a2731330d66efe0a8d4a56d97c77f8613d65792a4d01a00160e5aaa54a304,2024-11-21T02:02:39.407000
+CVE-2014-0685,0,1,abca9da256fe81b619a2cf117224906c69403337abf0998ac415d5b216e9e0bc,2024-11-21T02:02:39.520000
+CVE-2014-0686,0,1,88553377568fd9da116cbff8ff796b046a9e67dfc5a368c2baf2775fb33efe0b,2024-11-21T02:02:39.650000
+CVE-2014-0691,0,1,40087bbb23de6df7fb33c2fd965363d76d84c00c197ec7791abb0a92da177bc9,2024-11-21T02:02:39.777000
+CVE-2014-0694,0,1,c075b90e12f699e1a0dcb52250cc21135d2a10809f99400a818e11dd3b726d98,2024-11-21T02:02:39.877000
+CVE-2014-0701,0,1,3524eb3f180e0728a5a9e81d6d4d2353dd94b0db78ed569e2098571e46eedfc6,2024-11-21T02:02:39.977000
+CVE-2014-0703,0,1,aaf648aa46e46d60be3e608eb445057fa56341869b9d7cff3b18e4be25dba4de,2024-11-21T02:02:40.100000
+CVE-2014-0704,0,1,87811203bc33fe1b3507339d498679ece80c31186ba87a84b3a8e918f012e245,2024-11-21T02:02:40.210000
+CVE-2014-0705,0,1,748be3b4fc8fd232ad8d37401d7ea78dc771434c02da567738f4d880e2033288,2024-11-21T02:02:40.327000
+CVE-2014-0706,0,1,fe4f9b80e225cb956c9ff71fac612ed829128231e93a966090b3298a17c423ed,2024-11-21T02:02:40.437000
+CVE-2014-0707,0,1,12990d74675b31047a8ab593ff31bc39ee1026c75a857e8d5e9d2488a6c1207c,2024-11-21T02:02:40.543000
+CVE-2014-0708,0,1,c382384afbffc42ab162144ba4eb3fea3bb5d403be43fea78af9127842be62f3,2024-11-21T02:02:40.647000
+CVE-2014-0709,0,1,f0dd3649f8e01deea500bf3ca945e35d2376995627576b65a7b79de2d4e5d115,2024-11-21T02:02:40.747000
+CVE-2014-0710,0,1,1ef9026beee420b5a60ae93b313ef03bb2617cbb3aa86624497ae2cf60673ee7,2024-11-21T02:02:40.843000
+CVE-2014-0718,0,1,6e2ddb1ddcef6d0d6aa1ec0c00b0824604681c8831621894a67bbcafbab72ca2,2024-11-21T02:02:40.963000
+CVE-2014-0719,0,1,3e2e096f9e582f4dc4a65692a0a2019e388d6918384a6f0a7f336b1b34497da8,2024-11-21T02:02:41.073000
+CVE-2014-0720,0,1,5411e1982fb30f08cf433fdbf6562a05b8d0ce4ee23343c46ac5c24dcc31f30b,2024-11-21T02:02:41.177000
+CVE-2014-0721,0,1,4439df09e5946687de31e6dadd57bdaf49b53ee8d3411d5eb43ad58e49994647,2024-11-21T02:02:41.280000
+CVE-2014-0722,0,1,c3aec3f11074b0bc1a28271c81965b6f90bb4e787ba60cc0b8cda2239761a55b,2024-11-21T02:02:41.383000
+CVE-2014-0723,0,1,76ebe7b91395bb2f5823518258db97b6ef736b7bbc95b94a1263496023f4a6d7,2024-11-21T02:02:41.483000
+CVE-2014-0724,0,1,f4ea9aed9d185efee3fa275c63b8f1bdaa12767e3baab4a48a03d2d73cfb9ac7,2024-11-21T02:02:41.593000
+CVE-2014-0725,0,1,7ab56ea184532f131e40d04874846a58e3da9ff4bbcf41da8060874e8bcc56d2,2024-11-21T02:02:41.707000
+CVE-2014-0726,0,1,c9003fe63e2bdc8bb2e711f1ba0d485c78513e5e267376446edd3190813a1568,2024-11-21T02:02:41.810000
+CVE-2014-0727,0,1,48b4b790e5c224e70ccc8f3d057b266bb49bda2e5e8bbfa47070ed8f40b771c6,2024-11-21T02:02:41.917000
+CVE-2014-0728,0,1,5dce95acdd9636228dbbed177731bb65c749b3e39d42c4da3c975ecce3a54a5a,2024-11-21T02:02:42.027000
+CVE-2014-0729,0,1,5ff9b3590fdd1db887488bfc72e342e794b13863bebcc170af717ef9ba0252a7,2024-11-21T02:02:42.130000
+CVE-2014-0730,0,1,40a970bd0c98f65e196fa0c29327117bf9e9472ad038206eb1c70e383e9e26e3,2024-11-21T02:02:42.247000
+CVE-2014-0731,0,1,1fbb5195e1096aa3af769918f3c728ad55758112547c594fca5578ce5c0561db,2024-11-21T02:02:42.357000
+CVE-2014-0732,0,1,8d09eb15bb805156aa438e5bc8940b3ad427e84ce6b6ae7614f1f684a9914940,2024-11-21T02:02:42.473000
+CVE-2014-0733,0,1,56fa78533960091e6845be9505b9a209d7a7bf5112f3654b0f960c261a05221f,2024-11-21T02:02:42.583000
+CVE-2014-0734,0,1,05af4a61ffe2654b735cda19d114eba077dbc5b4d6cfbc31fe73a5148c877bd4,2024-11-21T02:02:42.697000
+CVE-2014-0735,0,1,c232b097b633d0fe0ff5ed5baddc49ed9625975b6fd2b1bbdc0aa01c0897b918,2024-11-21T02:02:42.823000
+CVE-2014-0736,0,1,15fa3e2d559ccdd3f6dc123fd74b9b7d64676e59d502ab8be7412f21ac61a1fe,2024-11-21T02:02:42.937000
+CVE-2014-0737,0,1,09fa01ce685089251c87bf037ad5896c018a5d9d76df18282fdea546c40579bb,2024-11-21T02:02:43.050000
+CVE-2014-0738,0,1,37f0c061930584bbd7189710f6c82135444e9fa38ba0b3f4c3755d6c9adf9915,2024-11-21T02:02:43.157000
+CVE-2014-0739,0,1,d1789357bb961ae9238b7c5d46ff1cb4e2299beae59db945bea67686a7970fb4,2024-11-21T02:02:43.260000
+CVE-2014-0740,0,1,69d365480715daf624ff6284be9fdefe09d1cd0368107f269c50512b3919515b,2024-11-21T02:02:43.383000
+CVE-2014-0741,0,1,f7a758b01c87982af7ecc5a9d1a4775d52a458d2fc5d40a72976a31045ab7a0b,2024-11-21T02:02:43.503000
+CVE-2014-0742,0,1,7de593f9a155d59440041a6465c62fe86765eb95fad75e5200d7e9662827b3cd,2024-11-21T02:02:43.620000
+CVE-2014-0743,0,1,117d5ee83568bfe84043527225d9563b9245f4fa9bdd1dd56e227812f9369da4,2024-11-21T02:02:43.740000
+CVE-2014-0744,0,1,fe1874f50f4b8a0c4c9d9603480403c54c98d16148bdfefdf1687899012ee5be,2023-11-07T02:18:25.860000
+CVE-2014-0745,0,1,b6c69e1edc7fc42c94c0021dbab991e69bd103657baf064169b54d67b440d216,2024-11-21T02:02:43.863000
+CVE-2014-0746,0,1,c1234494337a1566a4417bae99ffb8461d659a1d04aea7b6415fdd1f49819d48,2024-11-21T02:02:43.967000
+CVE-2014-0747,0,1,20193baee66a07a5548be00a8aba9ac43cffd321f82552ee53be5446f7cde79c,2024-11-21T02:02:44.087000
CVE-2014-0748,0,0,9c5ec22bcd3cd644a929741af99c2ae02b49f0dc08707b9b8487d6f74f2a9837,2024-11-21T02:02:44.200000
CVE-2014-0749,0,0,a77dc891e1ece9f5a4d6af15613f336c1222b899462c7a094493e221d06b1592,2024-11-21T02:02:44.330000
CVE-2014-0750,0,0,231e4bdfd058e5fea042277556e28b1570cb440c537aac7e1050cb1af1a5e4b9,2024-11-21T02:02:44.483000
@@ -66473,101 +66473,101 @@ CVE-2014-2096,0,0,eff00a385ce083c54ea82f921b60cd2732f77ccb5374954e51f760b7f45846
CVE-2014-2097,0,0,18b1d387440f58ee8ef5185b6ea1c59337e998d8486b7c1d926596976aad4bc9,2024-11-21T02:05:39.090000
CVE-2014-2098,0,0,88e307d48d10e2985bb1887fb2865841421aa4439d707c7ff30887cc5fbab995,2024-11-21T02:05:39.237000
CVE-2014-2099,0,0,3ee47e6fc3bea7db9a60f22dd8ac8bcd464ce7923225dcda39a70ba394e94846,2024-11-21T02:05:39.380000
-CVE-2014-2102,0,0,bdd599b3a20256f687f0d76cf1a2eb0e092ec4e0d7a55856170a3bd52cf9a346,2024-11-21T02:05:39.520000
-CVE-2014-2103,0,0,98b8211023174a3fde2a5d54b004e9be7d8d570649d1552ff0b0925980ed9fef,2024-11-21T02:05:39.637000
-CVE-2014-2104,0,0,f1823a844a2d960baecac74b05ea54d9c2bbcceedcb2c1da0a3e978c70d78efc,2024-11-21T02:05:39.750000
-CVE-2014-2106,0,0,7c06ed39180b2eb99a6d7f0a183a58db264fc0e08290ede6a3c84f6f1ea8491d,2024-11-21T02:05:39.867000
-CVE-2014-2107,0,0,ffe0c44631af3cf3ff92a7b88b6dc8a7fd89c3ac25639e2fec65ca0f19aded1b,2024-11-21T02:05:39.980000
-CVE-2014-2108,0,0,0cb69ea7cf558c4ee96a324d2e61b6ad012a872e1f15645f9351e541c136dc0b,2024-11-21T02:05:40.100000
-CVE-2014-2109,0,0,3e801ba9372a021c74d2201ea7e6bae40c90eb45a7ee01f06a01b17f7217d80b,2024-11-21T02:05:40.227000
-CVE-2014-2111,0,0,78401bfba113ea07e6c8866ba8527296f5a28341a0b3a1289ffe9928e19b7bfa,2024-11-21T02:05:40.357000
-CVE-2014-2112,0,0,83848688ba7cc28809b1a679372698191b165ad1b3eae3c52306d1fda6830b2b,2024-11-21T02:05:40.467000
-CVE-2014-2113,0,0,349ee3df8fb854cba5a16650ae5e8e258f7978f2edd64aca79bf76a28270243f,2024-11-21T02:05:40.570000
-CVE-2014-2114,0,0,8bbfd7a0ea8d1078ba921080a7b737aa3344de930f19348e61976da5ecf8a729,2024-11-21T02:05:40.683000
-CVE-2014-2115,0,0,e1606330f8b0ad9b2d350f3ed27485b3d69ca64837006b5fe1bdb46e38ca706a,2024-11-21T02:05:40.880000
-CVE-2014-2116,0,0,1d01f7167c1433010cf08da7bc4f2a7d4fd6233e827adfb1d57f44b1879ed2e5,2024-11-21T02:05:41.003000
-CVE-2014-2117,0,0,bbe3b9177b8d39da183724b579d9cb4a9ea63274e137c92c65a92512ce032bc5,2024-11-21T02:05:41.123000
-CVE-2014-2118,0,0,0eebe894098bef526525580fcbeeeb8d38b0200d772b8e7fa2462933dece9c0b,2024-11-21T02:05:41.240000
-CVE-2014-2119,0,0,115087cfb3ea6ec369507172bdb25f903f8d62bcf8a0352bc586b9c12cafd82e,2024-11-21T02:05:41.360000
-CVE-2014-2120,0,0,610d2d5e25521232aa03063b581dd6689aeda3ad9a3769489afc669b7d10c076,2024-12-19T19:31:33.220000
-CVE-2014-2121,0,0,f876073fd9be3c18f3e9ecb55c73a8308773fb77cc83997fcd50aa89b471fdc5,2024-11-21T02:05:41.687000
-CVE-2014-2122,0,0,04d6565176d5a0dc1f1b2be6ff73fa9db72e28b600fca84b8b95994901fceff5,2024-11-21T02:05:41.800000
-CVE-2014-2124,0,0,54087287285c3fd978a877d876e8eb848e118daef781f7bb2ba84c52d81bddd4,2024-11-21T02:05:41.920000
-CVE-2014-2125,0,0,4c3e62f1bbc6764fdf4abd846bf70c6acf0eb7793d8c85d4b96e9e50202ad11f,2024-11-21T02:05:42.047000
-CVE-2014-2126,0,0,33cd68c8176dc061f30fa0422879e6b1a1c54dd685379096e6fa450585f1fd24,2024-11-21T02:05:42.160000
-CVE-2014-2127,0,0,1958800ead4caf15e04c418855ab7ec4ea2f3797b2bfe01a37f2cc0167c05781,2024-11-21T02:05:42.273000
-CVE-2014-2128,0,0,926171764560a1cfcca607c64c715aac32cb6a14967d1ff62d09a9dc8b95b19f,2024-11-21T02:05:42.387000
-CVE-2014-2129,0,0,b9e9541ec205c332cd0d8539614dd349965d0a52d6c24a61f37c6e4b74ae0875,2024-11-21T02:05:42.507000
-CVE-2014-2130,0,0,6919da4d2afdca43d49b9e56d6d9b0136f997ecaef3c994d1d5955cd6e482210,2024-11-21T02:05:42.610000
-CVE-2014-2131,0,0,c86a400407a62aba0cdea55324ab346cd092219e91a63e6dac1313a114010fa2,2024-11-21T02:05:42.723000
-CVE-2014-2132,0,0,f76a783b95e9946979fa8406f1e29046b5c9ad28ac66fcafcb5a992fc817ea4d,2024-11-21T02:05:42.840000
-CVE-2014-2133,0,0,2aa4a3b6412ceabc3e15d61207c1f5257afa3a9710acd0cf5564ad9e6c20f3da,2024-11-21T02:05:42.947000
-CVE-2014-2134,0,0,c782de23fd9d6113b3e9429a3854f42b59e6e4ae8044ce100ea8c66895b2e9dd,2024-11-21T02:05:43.060000
-CVE-2014-2135,0,0,0327bde39196e601c7330d529b82614d1e4089fe86b6f6d6cfb0f3a30caa7fb3,2024-11-21T02:05:43.177000
-CVE-2014-2136,0,0,a69184bc8ac81825729e1a389fb88c82785a6fc260923ca3c30393a934fc3677,2024-11-21T02:05:43.287000
-CVE-2014-2137,0,0,c42819084107b0c3fa179c49e3c1501d73f2cd6d42b0b7c52eb51c81fc3f1f6b,2024-11-21T02:05:43.400000
-CVE-2014-2138,0,0,ae6b2e035d4aa859ec4e10b513f2d43c63d14cbc188c69ff60d09ef477e5677b,2024-11-21T02:05:43.520000
-CVE-2014-2139,0,0,75773e0a471680e14292671e5e504c335f92a0614d5c3555a9f06080dacaff4f,2024-11-21T02:05:43.643000
-CVE-2014-2140,0,0,40b3eed2328c43eb35b2f6dccf91bbdad6592f28a03a3b3238646d182383a1be,2024-11-21T02:05:43.760000
-CVE-2014-2141,0,0,5f08f5cac249356d9e601ef3b9642543a86b50665c0e67c455a870a12be92d47,2024-11-21T02:05:43.877000
-CVE-2014-2142,0,0,cfe6d318d45ee7aa2bd1780c8e0689710d737b342bbd6d0f8c26d1920a072f77,2024-11-21T02:05:43.990000
-CVE-2014-2143,0,0,94f8fe78236c19bda2db49fb235b115331fb08b6824cc81d8034fb11f2d83d3f,2024-11-21T02:05:44.103000
-CVE-2014-2144,0,0,83994c7a2267fb559b9a7071adb15a4f7265e72434fb2ea378ad61e7892b5b46,2024-11-21T02:05:44.220000
-CVE-2014-2145,0,0,84e3bc74a6cd996488842bc42ae0f43370addec95243172953c1fa2c03165218,2024-11-21T02:05:44.330000
-CVE-2014-2146,0,0,55f79779348f71597b2e25328b44ca1cd6c070e8df7863e7e14f6f434999f442,2024-11-21T02:05:44.440000
-CVE-2014-2147,0,0,132d9d581bf16b1199ce5a03039d80ce3422de2baf61d8fda380ea7d9abe57ee,2024-11-21T02:05:44.570000
-CVE-2014-2149,0,0,0a40b8dc6c21af653851449987a7e555bcc74f765dc78af3638908c9c4920a02,2023-11-07T02:19:29.830000
-CVE-2014-2150,0,0,c330ea3184f9b4ca54e09774c140fe9df1a05b7c8ceefb04ad0511b50d9a7ce1,2023-11-07T02:19:30.040000
-CVE-2014-2151,0,0,3681b239dd7c5387d5526519d463df0beb9c52ff8583d558c80a7a1f11571023,2024-11-21T02:05:44.717000
-CVE-2014-2152,0,0,6fede09fe53200a470515d07c8306252d1395cce5132d6eaa7863bc2181ff1e3,2024-11-21T02:05:44.850000
-CVE-2014-2153,0,0,6f025f770b0ed8e37274a4b946acc1edd4348df23123f294ded9ed3ad963d652,2024-11-21T02:05:44.967000
-CVE-2014-2154,0,0,a90fbb7fec093a77a96dc736eb5d5441f74e64aedddaad907ad740e7acaa7223,2024-11-21T02:05:45.077000
-CVE-2014-2155,0,0,ca40eb209918f4167ad1b006e3878027aa2eeb548b70c56ea86c4929f88cbfdf,2024-11-21T02:05:45.200000
-CVE-2014-2156,0,0,46f90824ffc758cbfd5286b80cdfe638a7221883ffebbec7b123713c8b398c6d,2024-11-21T02:05:45.317000
-CVE-2014-2157,0,0,af347544237e7f722a433ef8c2f3ab5461e2df83debe33885cc3fcd78a221bec,2024-11-21T02:05:45.437000
-CVE-2014-2158,0,0,59dc3468b384e21a618fd5fceef676425ccc35383c30556d04caed86eb025960,2024-11-21T02:05:45.570000
-CVE-2014-2159,0,0,690241b339a57abd78f1dccb9f67133de813b846a7ed630fabfb93138f3fe208,2024-11-21T02:05:45.683000
-CVE-2014-2160,0,0,6ad0c7c418aadd177ee96c9975465fc38163b92d4033a674f94e71db13b66609,2024-11-21T02:05:45.797000
-CVE-2014-2161,0,0,6431db68034dd7e51cc0d4c991a4809d4bd92091504ff4b435062d23ccb4c806,2024-11-21T02:05:45.913000
-CVE-2014-2162,0,0,fe750813d01e2ad0bad765a9a1ebd8032690ca3951ca8b4cb05547f2ef94a76e,2024-11-21T02:05:46.057000
-CVE-2014-2163,0,0,17e72a82457d4e5603f5ca6592de83b0ae0f48728b6ba2bb417fe26d82da26e1,2024-11-21T02:05:46.190000
-CVE-2014-2164,0,0,e485c902b13f57390722857e30e0f3ff70f479eb7836b33ae03cb4de95b34993,2024-11-21T02:05:46.317000
-CVE-2014-2165,0,0,a4d0ea8d937bce0063e85ca928f1027393c18d3b4104227fa2ba114ac3a89c57,2024-11-21T02:05:46.440000
-CVE-2014-2166,0,0,f4248e122f363e4ab5edf5d6fb262b12583f03383ac0fcbf6993d86f0f4ccae6,2024-11-21T02:05:46.567000
-CVE-2014-2167,0,0,46f07a55d9ffaf283d2dcf15a18a9dad73c6df44995180e27ce1a4ef0e571924,2024-11-21T02:05:46.683000
-CVE-2014-2168,0,0,c8c88b341fd5c1ebaa309ab133dc061f37d95db6efad1a60b27d79af7196a65b,2024-11-21T02:05:46.810000
-CVE-2014-2169,0,0,99af3cd97c0e272a0d87038bfb00b46f40ba236185b0fda97e848426c1cbec07,2024-11-21T02:05:46.920000
-CVE-2014-2170,0,0,c217a7453f8081803c69c4bf2fe8d2864604e937ac777636f6cb1ab5cfac3b4c,2024-11-21T02:05:47.047000
-CVE-2014-2171,0,0,b56c94c114d6284fd6c9b9e115c9907005ae9e2aef88b03422283814799dbe48,2024-11-21T02:05:47.167000
-CVE-2014-2172,0,0,e9c03bb8cd19c77d76f3361d92a4377cfba686d08c74ead489f61f5074bccc39,2024-11-21T02:05:47.290000
-CVE-2014-2173,0,0,4836cf1084998926ea5a0c7a2abea7a81afc3ebd23c15991b6d2bbd01eabaf41,2024-11-21T02:05:47.413000
-CVE-2014-2174,0,0,b689ffad494708025c999fa3a320d11d207def2102b8c84eea909f206c20f554,2024-11-21T02:05:47.530000
-CVE-2014-2175,0,0,5e3401362c527dee99ba81ff50eeb4029842d43f9c3b25bb30311ff37d75f3e0,2024-11-21T02:05:47.653000
-CVE-2014-2176,0,0,74094927d950aadbc8669f2cd1533e46a9d438507f1e5dc504c51407f336a748,2024-11-21T02:05:47.780000
-CVE-2014-2177,0,0,5719dcf365425a1f2b094fe74a1422fd0ceb0eb88d3b7203821c07b230d68df4,2024-11-21T02:05:47.910000
-CVE-2014-2178,0,0,a90d184024f53c9b56dc86d2b56a5d3ebabce176c949ea4899ae0fdc3a7363d5,2024-11-21T02:05:48.050000
-CVE-2014-2179,0,0,77700da8ab81690bebc875f88bf428b5374b6ee7154d53aa844e0b4529e822bf,2024-11-21T02:05:48.177000
-CVE-2014-2180,0,0,f351a29853e9800d18c83be665887f8b96209c3b6de5dcd79239dd97084c41dd,2024-11-21T02:05:48.307000
-CVE-2014-2181,0,0,9f4f9bba74b50f976de65e97873313bbbb7915ae0f350a5b3c5a01a289d77964,2024-11-21T02:05:48.430000
-CVE-2014-2182,0,0,76cdb16cbdb9aca444c4ee986ae4095730f1b969e198236c5b2140e2deb70c71,2024-11-21T02:05:48.547000
-CVE-2014-2183,0,0,47697508d12e2a4cb6ece173d9f023ff71df34271c5ecc9c343c3f24e60f476c,2024-11-21T02:05:48.660000
-CVE-2014-2184,0,0,7851ee5f98eb49ab217ad764c275cacc83d0df9c8c1f286dfeeb29afec4dc950,2024-11-21T02:05:48.783000
-CVE-2014-2185,0,0,86cba9e496d8fe93a68ecd549b70e1fbc6aae9dcc83ef8f59f123494c9052616,2024-11-21T02:05:48.897000
-CVE-2014-2186,0,0,76c20b9948cf26fdbabfdaf00bd00bb6a669591df6572c2771858ca00b4c853c,2024-11-21T02:05:49.030000
-CVE-2014-2188,0,0,d876493771914805fc27ea4b1f40fa39e9b30ace4589c765cc2868f36e835d99,2023-11-07T02:19:30.650000
-CVE-2014-2189,0,0,eb3298bc12f82eb042b7c6e0077c88dfc0de4a5baec139adcf141e3fda43c428,2023-11-07T02:19:31.080000
-CVE-2014-2190,0,0,a9c12d16ae15d77585900169b9bce52a82f07e46a8be97d8a186741cde65b730,2024-11-21T02:05:49.180000
-CVE-2014-2191,0,0,3908de9a1f6bab55a7cc90e9dc193992b18f6a7554f2097188cb19971d793883,2024-11-21T02:05:49.313000
-CVE-2014-2192,0,0,9b4c3f7a87e789e51a9f72b150f6282d5ed18416310509b003801ec9eff142c9,2024-11-21T02:05:49.437000
-CVE-2014-2193,0,0,adf7a5a6758744e7d00e2c96e29875094a4a75a92b4215f9b476ea345cc5388e,2024-11-21T02:05:49.560000
-CVE-2014-2194,0,0,eace0716aa5b72d1f994b801607ee6b2ac3dba90756b7217053f764c6b8b164f,2024-11-21T02:05:49.680000
-CVE-2014-2195,0,0,f633829aa6d6c2fdefaf840ce63059f4413483e2e3c14bb81be2ea7ccaa0de5d,2024-11-21T02:05:49.797000
-CVE-2014-2196,0,0,9833adbfc02769f19fd68a492491b9c1b961573352cd0bfc9383ecf56abb7396,2024-11-21T02:05:49.940000
-CVE-2014-2197,0,0,8818d7d0c50ab59fd9777fa7c264feb7482d94725a0dbe7b3944e785751e0a4e,2024-11-21T02:05:50.057000
-CVE-2014-2198,0,0,4fbd8b31abeecbfa3f2933c703882436ca59d3486cc5cec018c1c7bdfd6f811e,2024-11-21T02:05:50.177000
-CVE-2014-2199,0,0,f25683121fa77f74e7b057fdff05738ab4f53573ca82d5a227b23f2509228601,2024-11-21T02:05:50.297000
-CVE-2014-2200,0,0,e454b0fefaa3978acf455a9c05ea145071b2d3645a970d315b42b61d220d5306,2024-11-21T02:05:50.413000
-CVE-2014-2201,0,0,cb2d83fcf16ca87cd2fbb1396ec1b975e4f8111662e17a833f7ae0ed91496f9e,2024-11-21T02:05:50.537000
+CVE-2014-2102,0,1,8bd6da6cde280757324cdb6c945660022dda5335a9613fd1ff62eb665b04b999,2024-11-21T02:05:39.520000
+CVE-2014-2103,0,1,59c79b423c94d2033aa8c10780fbc2d190df741dba24549fe2461af93f5159ca,2024-11-21T02:05:39.637000
+CVE-2014-2104,0,1,9835a58204952bdfc2cefa1df07b7ffa2d85186cb9fab35f8b119afbeb0fbbb0,2024-11-21T02:05:39.750000
+CVE-2014-2106,0,1,c6789b781a90963815c7942c052e4308b77df98b98798109262114f6c68007d2,2024-11-21T02:05:39.867000
+CVE-2014-2107,0,1,eedec3a32218de040cd1fbdd8992558231024ca8d54d8fd6b8ca06741b576d6d,2024-11-21T02:05:39.980000
+CVE-2014-2108,0,1,de8e1b65ce26f078063d428883ad519c9cd71c77072f37399e2688ef658cbc51,2024-11-21T02:05:40.100000
+CVE-2014-2109,0,1,315ad47d9be8d72c8e51d945d1b9d5a596c7acf168ee67ec3600e3a1357ed966,2024-11-21T02:05:40.227000
+CVE-2014-2111,0,1,ff8d78aa6eec7c7a56ba2377a23f2f6aeac864fab7811ae0619c7740379d71f7,2024-11-21T02:05:40.357000
+CVE-2014-2112,0,1,8211e510f12422785992dd6ee3c039d0737742b8feb706ec4c1c5e428b3ec95c,2024-11-21T02:05:40.467000
+CVE-2014-2113,0,1,13911926924e24498e53cda80bcb81ffc96acae783106bcb063e2380bca288b2,2024-11-21T02:05:40.570000
+CVE-2014-2114,0,1,5067c8095d6232420fcda9678c313cf640801e746ed3551b10bb92d4b3ba1341,2024-11-21T02:05:40.683000
+CVE-2014-2115,0,1,429346626c541eff62e20ea9ff65d509def750a901f119cb0d84d076fe4bb262,2024-11-21T02:05:40.880000
+CVE-2014-2116,0,1,47e89dd542a9ff88a278a9576fc392a75835587563799e41d0da9fef6beb0262,2024-11-21T02:05:41.003000
+CVE-2014-2117,0,1,130d6587ccfab23af18103310a3ed065e62ab4fe0d8dfe285269628d46722efd,2024-11-21T02:05:41.123000
+CVE-2014-2118,0,1,78a293f171291277874cc5e709c08f607593f6db13dddb35b1a57696e532df6b,2024-11-21T02:05:41.240000
+CVE-2014-2119,0,1,f7aca302ade10d4e5613cbb04faea765c96600a6629dfeaa48cb11e392fed16f,2024-11-21T02:05:41.360000
+CVE-2014-2120,0,1,5c3a7e8c2848c5da2593a9878eb39d2c7d4a982abfd15c4262a7ded5c9e4ca0f,2024-12-19T19:31:33.220000
+CVE-2014-2121,0,1,fe8d115765f4ce2b8d89285a137afefcd3a70292dd15fc7514ed4dffc07e2994,2024-11-21T02:05:41.687000
+CVE-2014-2122,0,1,8c8665eab1ae692425d264c9d505a0e7f642bd13e0bdd6d585f3199418c6b3b0,2024-11-21T02:05:41.800000
+CVE-2014-2124,0,1,98d9ab462a600fc8d606ffa225edbfc9c6c19c6d6afbbd9cf5b4bfe011b9c691,2024-11-21T02:05:41.920000
+CVE-2014-2125,0,1,d45f9d6fcd818d58187d5b02cdf92666b899aadfc35a32232516f85296cda443,2024-11-21T02:05:42.047000
+CVE-2014-2126,0,1,d82cb58c5075059a26e4f96fbc98ec1191f0539a01f508c13c6b40842767ee33,2024-11-21T02:05:42.160000
+CVE-2014-2127,0,1,b7a8cdec6f5ab067ddc7a8fc71a7f98c9023f3bcdfbb5fd0901913a1e077fefb,2024-11-21T02:05:42.273000
+CVE-2014-2128,0,1,43136b682eeb1d0c09df055d584e8ea25afda4df9221d6f6543a63e1bddff4d5,2024-11-21T02:05:42.387000
+CVE-2014-2129,0,1,5cc2ba30a29315da444b5c069b963ec8bae9c4c2c87474a36c106d805adbe0ea,2024-11-21T02:05:42.507000
+CVE-2014-2130,0,1,299f8a4fe8180cc78787c46ceb39812ed012c55d864c8e53872fec84988b6677,2024-11-21T02:05:42.610000
+CVE-2014-2131,0,1,b42eb9adb7b8645acd425e7536e8fd29170150416945507d364cf886ac328432,2024-11-21T02:05:42.723000
+CVE-2014-2132,0,1,406037a97759d2d3213ea1c2b35100cc07503e0fc22021a3d83edc9074b83c1d,2024-11-21T02:05:42.840000
+CVE-2014-2133,0,1,4f4a703056e00bc859e23d09d53f140b051f221e389b5e075394171b7c3ba515,2024-11-21T02:05:42.947000
+CVE-2014-2134,0,1,54cb9225d7beb316beb0a3c515229d5578e4dc66ba69ba5831d78a9572c23665,2024-11-21T02:05:43.060000
+CVE-2014-2135,0,1,0a23cd2a712a1ab5464cde1e23e30746835884546c17e40c6337ce39ce7d5d44,2024-11-21T02:05:43.177000
+CVE-2014-2136,0,1,c387e50db1af02c770583826f7fa4e61f6e2f1c437fc25e681793d04c62a9c23,2024-11-21T02:05:43.287000
+CVE-2014-2137,0,1,dd4c4970d1c07b2144e4d41f7ecd61123f340c5c0237600509400d96cffe83fe,2024-11-21T02:05:43.400000
+CVE-2014-2138,0,1,b87f669b7a52e3568396b01bb8cfa925e81399644f7ced79f36132cacab26074,2024-11-21T02:05:43.520000
+CVE-2014-2139,0,1,558f9f9ce30d83729587162d7793166fa09c984f21a978010be7d7685ec7a09d,2024-11-21T02:05:43.643000
+CVE-2014-2140,0,1,d3cc6c804202ae30d92c74410086decc8bd2eb67af06cbc28e7902ab289a4e9a,2024-11-21T02:05:43.760000
+CVE-2014-2141,0,1,769d27834b6e3522f07a67f607e835ab44c99b258d5bef8df45263d629702b8e,2024-11-21T02:05:43.877000
+CVE-2014-2142,0,1,feaaaca1bdddd7520ce4076023ef52397ee1c4564c0e1f585a4fdbf9c98fc485,2024-11-21T02:05:43.990000
+CVE-2014-2143,0,1,b3b56f5aa997397a21256becaa66a4919560c7050b5e58a1021a710284962ccc,2024-11-21T02:05:44.103000
+CVE-2014-2144,0,1,28283330f5e8090c14af01fd70adf211d8c92e53b958d3b7343fae760a2895a9,2024-11-21T02:05:44.220000
+CVE-2014-2145,0,1,be390cfeb684403b0d7d8ee6a2525ec5f348e74906f78bd3fe2b09cf8fb740ae,2024-11-21T02:05:44.330000
+CVE-2014-2146,0,1,1a5c293bc94575cc3b168dbc6902bfcdfdc0883ca95f75426658ae78748357ee,2024-11-21T02:05:44.440000
+CVE-2014-2147,0,1,5e079c056840e7981e80c227342c4ef179854eac3f966a8eb7c14d8e25d0996d,2024-11-21T02:05:44.570000
+CVE-2014-2149,0,1,382c5110047f16ee9f8bc94bc14d3e14eb9cc74062c15a406546be3729c3d73d,2023-11-07T02:19:29.830000
+CVE-2014-2150,0,1,cf1ac92ce58224c87787eaca73e47c9db550ca291a81a206a18f43243838371c,2023-11-07T02:19:30.040000
+CVE-2014-2151,0,1,40f08f60ca0c80eb71b8bc6b9b2ee8eb5fba5a7ead98e97023ec586f12381324,2024-11-21T02:05:44.717000
+CVE-2014-2152,0,1,e3c247c46b114cb85084d79afc35766c7fc7abd9f2e59166b3a8be8d8179455b,2024-11-21T02:05:44.850000
+CVE-2014-2153,0,1,0c0243a073bc7f5c418563286ed3c789b463f27551aa5b678f15badf1c4244b5,2024-11-21T02:05:44.967000
+CVE-2014-2154,0,1,d3f04946da58f83d9fbf068a220657cfde2d35a81df3839659f55e196b1b7ffa,2024-11-21T02:05:45.077000
+CVE-2014-2155,0,1,4fb6cfe1a3e0f6893651b4986c22b07f8906c55ecc183a15179eaa0a05295389,2024-11-21T02:05:45.200000
+CVE-2014-2156,0,1,b03810801581b1e6861cae83793e352a39836622091f267fe8fbc3dd93c3f841,2024-11-21T02:05:45.317000
+CVE-2014-2157,0,1,62be6e64795fc5e941a4381ed54a4259377afa93d0e7245b8bb7345d485fbbdc,2024-11-21T02:05:45.437000
+CVE-2014-2158,0,1,8219e2299a030207c10e57f34508cbc0d2e8cd3fca2c85d42be421a41a7faeea,2024-11-21T02:05:45.570000
+CVE-2014-2159,0,1,1c3e1f5efabb363c2d54bee55765a900c4ac9f784b6b264b5d9470e3136c1eb7,2024-11-21T02:05:45.683000
+CVE-2014-2160,0,1,c919af7b2a307d5ee8ca19d7607cc57ca63f6dc3193590f56a6ad49f16d35b71,2024-11-21T02:05:45.797000
+CVE-2014-2161,0,1,239046dda68fc248ccb91b77df8c89e2c0aea0bf8486cbeef0de0da548b63ef1,2024-11-21T02:05:45.913000
+CVE-2014-2162,0,1,b3e3b6926db8c11ccfab116c1929e06ffc3d2e5ee085a9864550286d357df4f7,2024-11-21T02:05:46.057000
+CVE-2014-2163,0,1,eb3b52bf77936e8711ee397bb85a253defb68ccf73f6a5dff36ebc8b8e5914e1,2024-11-21T02:05:46.190000
+CVE-2014-2164,0,1,27af1cf9211691c0f3db0e92053e05e079109b1474316e49730393c05c771aa3,2024-11-21T02:05:46.317000
+CVE-2014-2165,0,1,7be0fbefeda6144190f223ee9d171ee380b9bc08dc0c40b93b1422375b6479cc,2024-11-21T02:05:46.440000
+CVE-2014-2166,0,1,107c731d8dadad0e4ada8592df923a79b318cf00a85da984eb436456301893b3,2024-11-21T02:05:46.567000
+CVE-2014-2167,0,1,249eb535a9414eecc875a62e1762e4244fd16a15e688472a47b054d1c404f369,2024-11-21T02:05:46.683000
+CVE-2014-2168,0,1,a874a6c9d3a2f9c795fdea66d77301d5d2eb8fcf008795dd9d48cdd9ab80ddb8,2024-11-21T02:05:46.810000
+CVE-2014-2169,0,1,86a16978c3805a97e79263d29904cff810a517259f9fe61aa7bb2ca402120bbf,2024-11-21T02:05:46.920000
+CVE-2014-2170,0,1,3823669346458aeeea9894a069e865de5f2e137b36d7a655f6136bd967195b1b,2024-11-21T02:05:47.047000
+CVE-2014-2171,0,1,c00bb11ea4ce849e56c074c8ea3516a4a340c896792d8ecfee328a73f47e9e05,2024-11-21T02:05:47.167000
+CVE-2014-2172,0,1,b71a5da1918d83c077d88f1b7fd6bab089c219f1484548cf38f6842196f3800c,2024-11-21T02:05:47.290000
+CVE-2014-2173,0,1,7e2bcc7f9de30f85314de904216d9830711fa9102703c400de449e527065d025,2024-11-21T02:05:47.413000
+CVE-2014-2174,0,1,f48ba5fa5ae4a06e8a8e95d63c07eb978cc7a345f3d7767b1d479456ef4e372f,2024-11-21T02:05:47.530000
+CVE-2014-2175,0,1,5dddfc74ecefca824b5bb226305384bb18a11b1219093973e15221dfa543178a,2024-11-21T02:05:47.653000
+CVE-2014-2176,0,1,8603cc41eee95e0508cb8abc97f06289bfda62a28ed642584ed62094ea22886f,2024-11-21T02:05:47.780000
+CVE-2014-2177,0,1,9867dd654625ae28eea2d95b97d0434e6c0862a7c0e93fc6c043a68136098ec3,2024-11-21T02:05:47.910000
+CVE-2014-2178,0,1,041ca33f8f33cf62f15bb24417403e5d3bab60672e8d9b3f18a3f8bba3983624,2024-11-21T02:05:48.050000
+CVE-2014-2179,0,1,fdf323f1ae589e7922771d9050f56873c96b6214e2d528bfd802f809da4afb3c,2024-11-21T02:05:48.177000
+CVE-2014-2180,0,1,325380bd65898b3c44172951c0e440872f00d1cd65b188ef5f2f5164f0e75a7d,2024-11-21T02:05:48.307000
+CVE-2014-2181,0,1,4b20eedc3d0c7642f7ac9f4f723a5eafdd5c9c381d629e6ae895d758b6caddbd,2024-11-21T02:05:48.430000
+CVE-2014-2182,0,1,46f14d065a266fb618041dfeee539dac4fa4ac546c7f3fa1e6b0d8e8a6b21c8d,2024-11-21T02:05:48.547000
+CVE-2014-2183,0,1,cf49c00633890f6fbaa8839ec66d397e8ebf36820de180a8aa96c922ede3b572,2024-11-21T02:05:48.660000
+CVE-2014-2184,0,1,908c4b41ce55141bf3efe0692ed79a203417a43d256badb4231e4d060e360349,2024-11-21T02:05:48.783000
+CVE-2014-2185,0,1,171b49ad9d71d74bed9ca45635551e916f8d426ce812ee3be4c7e407a7ad9d42,2024-11-21T02:05:48.897000
+CVE-2014-2186,0,1,bfc6f97efb206ce3aecbec9daea08c8cdab1573de4e6ae3dfcf882bb920a4c1a,2024-11-21T02:05:49.030000
+CVE-2014-2188,0,1,f8786b59e12e7eea9be8c4f9b2746e211399342e94cda87eb3833c155dda60ef,2023-11-07T02:19:30.650000
+CVE-2014-2189,0,1,2e35431ff6a5cf0b3be3cb18ed89ed88b15a7649674f64c502630327e57bbc7f,2023-11-07T02:19:31.080000
+CVE-2014-2190,0,1,831e99747bdb1f0dbc17d7105fbf2efae8ebe0fe7364e9b2c6373bf71868a375,2024-11-21T02:05:49.180000
+CVE-2014-2191,0,1,ee6b45d9daadf1f8b2f3a0e623f0608db5b0812f06b27337d79cf1e877c1268f,2024-11-21T02:05:49.313000
+CVE-2014-2192,0,1,5c1b9bb01d2e24694fabfb0f704544d70531cf3e0a645dc17fa3bddb6930d778,2024-11-21T02:05:49.437000
+CVE-2014-2193,0,1,3ce453c7135b55c3059701b989094a2fc5b9b1174d1d7697c66f491fd0ad4d30,2024-11-21T02:05:49.560000
+CVE-2014-2194,0,1,921c348252ce9fbac76dcbe1d47751c3b1f87fa3eda6c5ac2fad4f090111e82d,2024-11-21T02:05:49.680000
+CVE-2014-2195,0,1,b85214ea8cedd56a992534aea80df0bba95175e18bed81a4e8ce82485dc5a649,2024-11-21T02:05:49.797000
+CVE-2014-2196,0,1,bd8bce0cc8b7c35c6b6db1a2d0cf1e4410de422f58738eb1c4f404a188349710,2024-11-21T02:05:49.940000
+CVE-2014-2197,0,1,21c8be696b47bc7598c3c00bba0c9179d2cdec8839d155b2de550a8cd53ae802,2024-11-21T02:05:50.057000
+CVE-2014-2198,0,1,bb41bc001515ed9a1927daf9cef2939de2d1dbb1aef2ad6b32f8946cdd543dbc,2024-11-21T02:05:50.177000
+CVE-2014-2199,0,1,655891825923de5d20106d7c1d0d31a96adf27d3e944b3c55f9024c11f9e439a,2024-11-21T02:05:50.297000
+CVE-2014-2200,0,1,4abd30d2ed098d4d4b81fadb3e7f4caaf97a317797f3f769cd1b571928b4d5b1,2024-11-21T02:05:50.413000
+CVE-2014-2201,0,1,5cc602b2a60cf9d43025f1bf780ce3a8cd2655118b23aade41381f6f9489c550,2024-11-21T02:05:50.537000
CVE-2014-2205,0,0,013e4f032b24eda32542d733bf7f046ea194a1fe3036846457d2800fb33fd356,2024-11-21T02:05:50.657000
CVE-2014-2206,0,0,a718577dff9d790aaf61e90805d6efa7682ee5872ace70e15ed9d73b2f031f69,2024-11-21T02:05:50.820000
CVE-2014-2208,0,0,c7b35ce5b71f7af09f8e3a4286d2b1a874169b6857cd62fb837a4adbf4c56587,2024-11-21T02:05:50.967000
@@ -67441,154 +67441,154 @@ CVE-2014-3250,0,0,dabda324d267ba7a7c1535254234f715c18102487dca3bddc9accea399836d
CVE-2014-3251,0,0,062922acecfc4e884432db529dfe18df46e01176c11ac9880717b36cca42b052,2024-11-21T02:07:44.570000
CVE-2014-32537,0,0,571c7e4a40e87388a8172d4b01bece3c4d583a891976c38464746b5efe06497e,2023-11-07T02:19:41.667000
CVE-2014-3260,0,0,68794b509629ddde8f4380571592441e8091b5011d14739449c2e7cdf4cef672,2024-11-21T02:07:44.720000
-CVE-2014-3261,0,0,dbb2fa7692e2e3d5db2d5746f31250d638af771d8e203292283ec6b39127fd59,2024-11-21T02:07:44.867000
-CVE-2014-3262,0,0,3474cdd117622454629cf4f417bda11ee301be11d090fbb2048aca2570e1b2f6,2024-11-21T02:07:45
-CVE-2014-3263,0,0,884d02f80bf0288b2c2399936ad6f66f171b212e76194584e5a1968b142896f2,2024-11-21T02:07:45.110000
-CVE-2014-3264,0,0,69ae7e637c32b1cb8d3702d5a5e7c98b6fb41b545e5aaf97d65c26de0c3bfa78,2024-11-21T02:07:45.217000
-CVE-2014-3265,0,0,1f56cc28229ebfa0810d1be75371eb1b0cc4028489c0ee424c9f7858c9d9ea76,2024-11-21T02:07:45.327000
-CVE-2014-3266,0,0,4d3d30cba0da922fb8d7dde4c31cf393ed4d6a06e7ed56afbb535e2fb71a1efd,2024-11-21T02:07:45.443000
-CVE-2014-3267,0,0,e0cd4c27bbb8cefa8ed577f6de6d47bf315c77d5c2b87a1481a615b36e222eb5,2024-11-21T02:07:45.560000
-CVE-2014-3268,0,0,b72454c4434e188d78926e9345c6c6f0df3f1262a3c84686c633ffd2493e66ce,2024-11-21T02:07:45.680000
-CVE-2014-3269,0,0,ecb6b9795dd6f908166eee4a56cdf6ca7d6aea250ca94fdf39445389aa4dc148,2024-11-21T02:07:45.790000
-CVE-2014-3270,0,0,8115aee9ecdbbb0f66633bc0d185b7ee7431c2862c04959567d253ffe6d52d5b,2024-11-21T02:07:45.890000
-CVE-2014-3271,0,0,70b7817711e9c790ccf051cd9b5964c0645520de7a5d73bf62c0e0024f4c9c6b,2024-11-21T02:07:46
-CVE-2014-3272,0,0,bb78cc6dc94df75c2495d26dcff619c792c85a362a397c1484790618cedce77b,2024-11-21T02:07:46.107000
-CVE-2014-3273,0,0,24ebcc12d5f65fcc099dd174de12e9de393ce8e7c11f11e365b1a2804946d37d,2024-11-21T02:07:46.217000
-CVE-2014-3274,0,0,d6d847451794af1dd02e6820d5bae0eda437461aac30631013f97db579477134,2024-11-21T02:07:46.323000
-CVE-2014-3275,0,0,380232adb629ee0aad8c1902661875cbbd8c44898ffdce4f513803320c91a027,2024-11-21T02:07:46.457000
-CVE-2014-3276,0,0,e5c7248983a75d800e142ca01034a64a0dbe525ac06e49dabb22cbc96d1af6bf,2024-11-21T02:07:46.573000
-CVE-2014-3277,0,0,f11061c06f17aede81347dae60175d24ba725834ab9ea8e8f76fc827c9c38ede,2024-11-21T02:07:46.700000
-CVE-2014-3278,0,0,4a24928e79e3c5dff5c8a0095e60e41a17c9b92e18a5294a7be7f42819b2cf1a,2024-11-21T02:07:46.827000
-CVE-2014-3279,0,0,b9c7dafb076be5994af8e1b18f821ff41378e05184dce825b23f1d8cb0e6a9a3,2024-11-21T02:07:46.937000
-CVE-2014-3280,0,0,c1ff1c4fcacced1e4dcad50075efd94c48ab89d585332882e730028567984b61,2024-11-21T02:07:47.047000
-CVE-2014-3281,0,0,cdff2dec3093d4b332b2a5d79fb515aa053aceea4c8eb3915d8eaeb2646a7b42,2024-11-21T02:07:47.163000
-CVE-2014-3282,0,0,8f3aa1e582773c3824e41cec30337c93800dce9ee5a70d187391dae71b135555,2024-11-21T02:07:47.267000
-CVE-2014-3283,0,0,c275c90af67e275c998e65fb90b090d0d4a3f0fa344f2e0b6d73748e7c7e0245,2024-11-21T02:07:47.380000
-CVE-2014-3284,0,0,4c38aaf925e7075748f72bc0a365fe79691fec77d8b3584796dbc83758c479e9,2024-11-21T02:07:47.493000
-CVE-2014-3285,0,0,b8d50ccd0c16a8c77434b338aac339ab67c48cd1d2c8b64f06b2854447ac2821,2024-11-21T02:07:47.610000
-CVE-2014-3286,0,0,848edbf2bd4e02ce3579024710d4ed76c2490ebf40feecb7a34f491bede484d2,2024-11-21T02:07:47.733000
-CVE-2014-3287,0,0,3d54e32f9e431fe9773fcd15e7623a241a61e983a8a03a078224018d82aee521,2024-11-21T02:07:47.843000
-CVE-2014-3289,0,0,676456d6bc7a0083ff21399235c7db5c0cba7b7be2ada2349c9646f903158935,2024-11-21T02:07:47.950000
-CVE-2014-3290,0,0,849afd226d46e0d74ebb8725b71d68587b953318acb2278364410ce2e1efb7c3,2024-11-21T02:07:48.073000
-CVE-2014-3291,0,0,00bb08c8e4eb463aab65cb972b1775d0ba5717f3cc5bbba0ed8cdb74182465d9,2024-11-21T02:07:48.197000
-CVE-2014-3292,0,0,2552fadec6ef787355edaf7c4c3662659535165775df5cb3b6da6991c523365e,2024-11-21T02:07:48.317000
-CVE-2014-3293,0,0,804c1796c50303e202edcc503b626f336cd8b7f64cf202f1bc052cbcdbd99672,2024-11-21T02:07:48.437000
-CVE-2014-3294,0,0,a406d92a593fdb0d9e8a99290037aeb3172b0d45338f4e308b05e07076edb097,2024-11-21T02:07:48.553000
-CVE-2014-3295,0,0,df15c6c1425fad863bcacaa98c3876d3826d86ce91cb1f99a5b93f113a401ddc,2024-11-21T02:07:48.663000
-CVE-2014-3296,0,0,ff931017246723beb6f2abca23de8f38305ff81b4ee65cd68a0f0a9accc56a43,2024-11-21T02:07:48.790000
-CVE-2014-3297,0,0,95db5b37b488c280542adf6a818e40b068e18a3d0327e9f0b4efe4c320d09de3,2024-11-21T02:07:48.907000
-CVE-2014-3298,0,0,59101a5bbb9bdc836817ce1486067be29038017d736d7d306992ea96f0981529,2024-11-21T02:07:49.020000
-CVE-2014-3299,0,0,50bbcf4209ff42798dd96a05f4ccb253f01944216a9aacaa8af1603f47d1d0e3,2024-11-21T02:07:49.137000
-CVE-2014-3300,0,0,e73785e1637b410dc5f864d4410898622fa1bde80c231b0e8e530e09f7da5406,2024-11-21T02:07:49.250000
-CVE-2014-3301,0,0,e7b5ec2853dcb542d104acee97e1f02739b55ee05e7011b6b5ed254145a41ee2,2024-11-21T02:07:49.370000
-CVE-2014-3302,0,0,9e4eead6492b4ec8fccf979aa6e8bb98b185793325a0417bc1522646af6b62de,2024-11-21T02:07:49.497000
-CVE-2014-3303,0,0,a94677d5ae070528f12e86d74463ee917c90be9a4c3cf431b0da2b1f2c501ecc,2024-11-21T02:07:49.620000
-CVE-2014-3304,0,0,5ca96505f53953f3a9c4b485aae27a5bb588a1f82ebc72deeea621a4b05a6452,2024-11-21T02:07:49.760000
-CVE-2014-3305,0,0,d924f81798688fa3c4982ca269dfc5ba3b87aa7adde5e8366036a10380922744,2024-11-21T02:07:49.877000
-CVE-2014-3306,0,0,57bf34ba31019c9689783b4acfa2b74e2287ab8f0591d388c54bd9e638f27ebc,2024-11-21T02:07:49.997000
-CVE-2014-3307,0,0,458ed7ce07c38a465a4941235181ca51c191d5510543c042af2e5dec00a65366,2024-11-21T02:07:50.103000
-CVE-2014-3308,0,0,3ea5b040ec4fa49e80ef5fc20766042cda10183e3b3d2ffe6aa6f2c4e3b8802f,2024-11-21T02:07:50.213000
-CVE-2014-3309,0,0,7333247da3e04d21b460ebb2066259491d2a9cdff12366786c599f8a29c5fcee,2024-11-21T02:07:50.337000
-CVE-2014-3310,0,0,556523177d45e851096dd709bf1c2952e3b72f9d47df8c65d67d5331689c4556,2024-11-21T02:07:50.450000
-CVE-2014-3311,0,0,647f7bb4cd46bb0dff942278753ebd2c22295526a1f334f36c5bed4aa9e6f551,2024-11-21T02:07:50.563000
-CVE-2014-3312,0,0,b52e854a5299fd1e68b86a58a0ae3cb4a199af62f3c296ffaad0097ba0f3b1a3,2024-11-21T02:07:50.677000
-CVE-2014-3313,0,0,f0af109a1c4199140c8a420f4c9fcaa5463d051667c7806978baaa55486aa329,2024-11-21T02:07:50.797000
-CVE-2014-3314,0,0,5e6b5203f8cad75052b066b542dc6f31d1c3fceba3d7f27f91b8f181975dc7c6,2024-11-21T02:07:50.927000
-CVE-2014-3315,0,0,d06e2710f1fd992d2182d13a325cd218495604eb0521f2a741529202c99cf274,2024-11-21T02:07:51.037000
-CVE-2014-3316,0,0,6c220322f98084c0a98a4feb947fe77105eb3c117677ecb7b10518e444a94e83,2024-11-21T02:07:51.147000
-CVE-2014-3317,0,0,f4b6ffc878fca549ead0ca2831e8674ca15ccfbbbea072e098c21e816a356abc,2024-11-21T02:07:51.270000
-CVE-2014-3318,0,0,6eae2382af00d576db8fe817c108944104f363b5f6e8103b518e25c86faba0c9,2024-11-21T02:07:51.387000
-CVE-2014-3319,0,0,6829aa53e1cb17d090f7ca59084134c2b11e4bf5c33a49921e8c65f489d94224,2024-11-21T02:07:51.507000
-CVE-2014-3320,0,0,8d59ba0c9fbcdf4d5df53592e55e3af37e033383825befa0e78a07d070f6e3ec,2024-11-21T02:07:51.623000
-CVE-2014-3321,0,0,e7bf70dc056e50300d291340d6f683310356a3966fd9d2f848cba19de131eaa5,2024-11-21T02:07:51.750000
-CVE-2014-3322,0,0,f1da7f9db0529cea5f041147681f10cc98e5116bdd03128681d0e3c185eb16af,2024-11-21T02:07:51.870000
-CVE-2014-3323,0,0,18e288254b0e190f7d6f5b80f437f51eefaf5f3dc8469b0e049a337cba225010,2024-11-21T02:07:51.990000
-CVE-2014-3324,0,0,bd6fb110cc9f74b4dd5512fa7dd3a734644e37ba01d3344076dc80a65b5919c5,2024-11-21T02:07:52.100000
-CVE-2014-3325,0,0,6d60283cde70b89e8672484311d3fcf3eab0d1bb2c7ec3dae4fd0d5712ce3f8d,2024-11-21T02:07:52.230000
-CVE-2014-3326,0,0,99fe37525fe3642937742c50cceb809c934a3b6762300224bb3427bc04fe3cc4,2024-11-21T02:07:52.350000
-CVE-2014-3327,0,0,642d564b6ccbdcb04e366d7848bc855066eb506f92b31e0750a446e6f1f63667,2024-11-21T02:07:52.463000
-CVE-2014-3328,0,0,672c293a029a061b72daaf5cc90d016ff9792626a0dde9f61559594c2be9f095,2024-11-21T02:07:52.583000
-CVE-2014-3329,0,0,0fd48b822af10b25cb1534bf31028975c845fe815642b4845e0bc6ab4d4fae90,2024-11-21T02:07:52.703000
-CVE-2014-3330,0,0,4905b5360dc11a23325554097bf275e998ebe74cb352434dc6433ded4523f000,2024-11-21T02:07:52.823000
-CVE-2014-3331,0,0,b0fa45a8436fadb872a089f49158a8110fe1661c1c83e11d78db207073895564,2024-11-21T02:07:52.940000
-CVE-2014-3332,0,0,f39af4c7bbdf2b16f383d40e1ab46047b00f0906dbc95a3a69f649c0dd4e4f36,2024-11-21T02:07:53.053000
-CVE-2014-3333,0,0,2deabc0ad0196263fcaa2176c5f34c9288ff4be0df0c921cd23ce4d7a44896ed,2024-11-21T02:07:53.180000
-CVE-2014-3334,0,0,e6dd5d1ffbf8bef8ceb9dee05a085b8de6522c0fe00cb3ca552d03967eeefe4a,2023-11-07T02:20:06.220000
-CVE-2014-3335,0,0,9bd5d6c4d5401b88df668f622c95a50ca2166dae5073543577704d8d7620b765,2024-11-21T02:07:53.310000
-CVE-2014-3336,0,0,93d4d2f74ec6144be35f11ff147665448c7b9692e89c7c596981f8212e200d61,2024-11-21T02:07:53.450000
-CVE-2014-3337,0,0,366082893719a8e03add148308e07b41586ede1e8505e8722d4a4554c03b86ba,2024-11-21T02:07:53.563000
-CVE-2014-3338,0,0,f7cf275334ca964057352a3d85631f65889e3fa557581e2571c2a8421569223f,2024-11-21T02:07:53.690000
-CVE-2014-3339,0,0,3d9402e02dc75b155338ef7d30bb6984fab0854584d08f801615a6436f3977bc,2024-11-21T02:07:53.813000
-CVE-2014-3340,0,0,f3879c99cdc4c686b130c9039f58a20d1f2b28eb4f8de3bf11721eccdcd6fbe0,2024-11-21T02:07:53.933000
-CVE-2014-3341,0,0,051007b7216d97429b1881b1de5779734a76551b6927bdc2a90450e0e243a5eb,2024-11-21T02:07:54.053000
-CVE-2014-3342,0,0,b69fb9e1e09eef1de20e3897f0cbdd0e6058572c86c91c22b687d8af75c402ae,2024-11-21T02:07:54.187000
-CVE-2014-3343,0,0,d9cfd58bf227864922a71dc82ebe660455d0493b8271715a5f9b349f120061f7,2024-11-21T02:07:54.307000
-CVE-2014-3344,0,0,8c72706aff680f3d63de39047109a0d4dee39d146baf90aea408d60bb5db35fc,2024-11-21T02:07:54.420000
-CVE-2014-3345,0,0,ba4036cb0430b4d15add90fb47e1f20599be051cc85c2318157386cb9849be1a,2024-11-21T02:07:54.540000
-CVE-2014-3346,0,0,cd4caa69e701fd962ef30310e5666f018d15807d8f655512120ede04dcfa2c58,2024-11-21T02:07:54.653000
-CVE-2014-3347,0,0,5af7a12a5225c93b6d2ed8886ef74e2aa7eb33a7f02c59973037343ebc2b6388,2024-11-21T02:07:54.767000
-CVE-2014-3348,0,0,78b4168da821209704f403c3310fb0b355181e5d3eed4f31c056bc340b31fd6e,2024-11-21T02:07:54.907000
-CVE-2014-3349,0,0,cb3c8091a5b35d930a9829304fc5693ec78301a451d87ee831c09b0d9ebc2e54,2024-11-21T02:07:55.030000
-CVE-2014-3350,0,0,0b1a35d946972572157b3581730f455621e5c8c004cb92afcb2945e53b415861,2024-11-21T02:07:55.153000
-CVE-2014-3351,0,0,e3b2a1167f6d1672282c36e8d7aab1d6db3927b9b98004b5692da5234248b55d,2024-11-21T02:07:55.277000
-CVE-2014-3352,0,0,0c3561243276d4756b7852c8b7547fc3534690b36fe722eb090b84907971f5ef,2024-11-21T02:07:55.400000
-CVE-2014-3353,0,0,e81df212be03cf16bc7d1243d389b461e707cd127b9163df61f7b93ccc9c6952,2024-11-21T02:07:55.527000
-CVE-2014-3354,0,0,931e6717e93f7d6eedbeb28fe5b30b6661fe0a6bd2b088e277a0c25860bd0f6f,2024-11-21T02:07:55.643000
-CVE-2014-3355,0,0,4757b3994bade9560e347eb3e3fc5c81bd697d0e7a0b0939036fb7c5c8bd5713,2024-11-21T02:07:55.780000
-CVE-2014-3356,0,0,b75b7525a6260f7101208e847927ce45c5effa88eaa803b201d2236e09fd54da,2024-11-21T02:07:55.903000
-CVE-2014-3357,0,0,07fdd6777e7772ea74a08dfe0f36f234c1d13bb04d98de32191b0aec0f4a1e16,2024-11-21T02:07:56.023000
-CVE-2014-3358,0,0,29d5c534e26d0d39af50c22b732ed5e8bd1e357e449c5fd146449414977b59c8,2024-11-21T02:07:56.143000
-CVE-2014-3359,0,0,e34f64a1ea1644b62926c5163953755b72bf088f2a3110fa9161eef39f705e16,2024-11-21T02:07:56.260000
-CVE-2014-3360,0,0,df9361a04ef6ae59188216adeb25236fd84d25578b958e82e44b894b7506f566,2024-11-21T02:07:56.390000
-CVE-2014-3361,0,0,fc83b42a2d2ae60cf9e32c65bc5b4d7a0b99cc5e5b2ace8eae0acd60a63a4cd0,2024-11-21T02:07:56.523000
-CVE-2014-3362,0,0,87c5297749faf9e9ad9ef81a26263373ec69e6218d379678d9c63192dc450551,2024-11-21T02:07:56.640000
-CVE-2014-3363,0,0,7e89055b21bc5f2bc282cd9e2c81ca10e09b25d2c9bdd3615a7c131a7aeb7f11,2024-11-21T02:07:56.763000
-CVE-2014-3364,0,0,1d5320ccd6522a4f8302b921ab4dcf99097133b9a35138a27dc1d17083c9e1cf,2024-11-21T02:07:56.880000
-CVE-2014-3365,0,0,21e88c7f1a75b5f48ff38bb3d81b3749955f35c57e678373235ed08c2b7ee434,2024-11-21T02:07:56.993000
-CVE-2014-3366,0,0,6a1e54c34f7e2a6cfeffdd4720a1d56a0fdc311eb86981e0e6504378a8e79bbf,2024-11-21T02:07:57.117000
-CVE-2014-3367,0,0,b872049828f438257c03c6449fd2b6eae992004d196c780e92fb17e2239e938e,2024-11-21T02:07:57.240000
-CVE-2014-3368,0,0,d3211834a97e6603f87c22383aa699cae018604f8518166b3ed26def3f60832d,2024-11-21T02:07:57.360000
-CVE-2014-3369,0,0,bfcd75c6d3f0341e4f1c85a3b15219295bd306cd3f4443fb26c67eb21ec82a43,2024-11-21T02:07:57.480000
-CVE-2014-3370,0,0,aaeb098f313e9531dc26f2ee26364e6a65125eda53c8e2221785f298c2a561d5,2024-11-21T02:07:57.600000
-CVE-2014-3371,0,0,4a16fb639dd8abece3bc568a63a62825fcd1f237cd2e1527dd3a546f25e1fd5a,2023-11-07T02:20:06.770000
-CVE-2014-3372,0,0,fd04c97da489e9018ccc8b1b537f134d4fc70d95a031a4139df8834fe04d12d2,2024-11-21T02:07:57.723000
-CVE-2014-3373,0,0,7b842725e4b63d2994211d64bbec74e7d57880da344ea5f3d3c3d71998f17ad7,2024-11-21T02:07:57.833000
-CVE-2014-3374,0,0,a23980f207ab043d926772aeaf0faa2016829769b220cd89dece4e48408f2aa9,2024-11-21T02:07:57.947000
-CVE-2014-3375,0,0,472924f64ec67c97c717670f8e717ede2bf8c37c85e77a097ef1a26ae4512975,2024-11-21T02:07:58.057000
-CVE-2014-3376,0,0,5e346196eff1d86021f9fd02308a25ab3d6924fc4b4ed591d2988c122324642a,2024-11-21T02:07:58.170000
-CVE-2014-3377,0,0,fda0327cd3a00010928635b71f5d9ed164d35b5e50c418da5a61cca90966e9a9,2024-11-21T02:07:58.300000
-CVE-2014-3378,0,0,086681faa9e6e0c2c03913ed874aea2c05700b45072b83751d446bb5d9587ad6,2024-11-21T02:07:58.427000
-CVE-2014-3379,0,0,85c6a89a00cb53b3fc1ac6090c5b79b7976595399f0cefd6155d1a97cbd911ce,2024-11-21T02:07:58.547000
-CVE-2014-3380,0,0,26da2597a114fa075486cf8709acb291e7f8744c7f80187af707ee566a26bd26,2024-11-21T02:07:58.673000
-CVE-2014-3381,0,0,d221d0c602514eb66c47d0ca62b1a6a2a29a8f0b5c0eded56d982ea5b827d14b,2024-11-21T02:07:58.787000
-CVE-2014-3382,0,0,cd54a9fd8523078212b1c1fe498ed53b95df32831c835c4832e28502152ca541,2024-11-21T02:07:58.893000
-CVE-2014-3383,0,0,66cff964b2f39529d688a0e70400c581bd51889d01b29f58a2950b341795d047,2024-11-21T02:07:59.010000
-CVE-2014-3384,0,0,fe8c3e7a67cf4727a4e2184a9c811810ba0225316275b06357417cffaf2698e6,2024-11-21T02:07:59.123000
-CVE-2014-3385,0,0,e037f3126e959b08010695833a6c5b0331659b0a6a9e1735460ac4778b4c9de5,2024-11-21T02:07:59.230000
-CVE-2014-3386,0,0,86fb29f352649f2561998d5f5ae9f01ddf81453e57863954f29d5a26c9f99d4d,2024-11-21T02:07:59.337000
-CVE-2014-3387,0,0,12612f2fcf1ca69dfa4e99430164f4bd8d691bcdf2ae901a597d87b3064ba904,2024-11-21T02:07:59.443000
-CVE-2014-3388,0,0,08eaa5df9ada168599149b57d5ab485b9b70a259e33fb3528ef4c194803a83a0,2024-11-21T02:07:59.553000
-CVE-2014-3389,0,0,2b76f59a15d5aa4e5edb1ed4f5fad805949f997e42fc8001be74c188a323c7d9,2024-11-21T02:07:59.653000
-CVE-2014-3390,0,0,665dbb8fb6c28ea19ff109959e7affc575233f8e91299ca6af5293238567c7cb,2024-11-21T02:07:59.763000
-CVE-2014-3391,0,0,39d8c893b701075e61efb91cb834819285add25bacb0038f812043f8f86a2537,2024-11-21T02:07:59.863000
-CVE-2014-3392,0,0,5ae6b31dd7caa448fb6c7a9a2c8a3ab44f86af2f21d793c56c57a56c945dbbde,2024-11-21T02:08:00
-CVE-2014-3393,0,0,03d99baa3d86b3f8fa20c7b39e64d3e52fe337cc21af2d3c349e0bfe379bec28,2024-11-21T02:08:00.143000
-CVE-2014-3394,0,0,476c00d5b06325d89b693769a128ff2affb6abffa899877cd800dc52364731b8,2024-11-21T02:08:00.277000
-CVE-2014-3395,0,0,675fe72c71fc91f6f5dde299eb5349b12a7080f0af2bf643d7b68f160f67a651,2024-11-21T02:08:00.400000
-CVE-2014-3396,0,0,8c947b5c79e1ecd1c0a655769187e52f55aa03efcf139b005eac135410bc6aad,2024-11-21T02:08:00.510000
-CVE-2014-3397,0,0,25d0ef2448cac9f00e5ffbbcb8fb32d516327fc25e5614e435cd8ad91315653d,2024-11-21T02:08:00.623000
-CVE-2014-3398,0,0,90b6d2aa54c717f2aa04146e373c31a70a71337f88bfb637b6b8c592ef25cd3a,2024-11-21T02:08:00.727000
-CVE-2014-3399,0,0,b06561c9bf852e7341d52a3bd5da1e75b2a9944decfdc29023800ce38075d9b1,2024-11-21T02:08:00.830000
-CVE-2014-3400,0,0,1d4ffa26734e8a516d154ff9d796a70c6fea840f59d066c343dd9d3b212cd6a2,2024-11-21T02:08:00.940000
-CVE-2014-3402,0,0,a1274416b747ea12b6065e4817e2e3978062e6d05608b5e45d597483ac71a949,2024-11-21T02:08:01.057000
-CVE-2014-3403,0,0,99ed822dd07aa592c7d9c250a58674763b6c23b1833a455bd0bc45eb9be2e62e,2024-11-21T02:08:01.167000
-CVE-2014-3404,0,0,5c49b1f2d5191456bb1d34ae24761c26305828353625ed75092a419f3d3dbd97,2024-11-21T02:08:01.280000
-CVE-2014-3405,0,0,e2aad39f5f7dc4735d5e4f9e105dc30ff202cf15cb9338296c796433e5ff9fe4,2024-11-21T02:08:01.393000
-CVE-2014-3406,0,0,a53d5e17010298046ee48f78c72260ed82e4a6f11febb30caa8f86cd6bcdd630,2024-11-21T02:08:01.513000
-CVE-2014-3407,0,0,494b255a1a5a31784fd8fa2b1cb415c9bc8968107499bb5a8553c26b2f27b1a8,2024-11-21T02:08:01.623000
-CVE-2014-3408,0,0,ea03f9a525029cb008b2fe242022a616cf0047c2a0f1415df8f513252c5afd4f,2024-11-21T02:08:01.733000
-CVE-2014-3409,0,0,aae476fbdc99202ec0ac79686e51a88ef7bd0cf574cd6b6d44d21d88e2591981,2024-11-21T02:08:01.853000
-CVE-2014-3410,0,0,a803a7b2b3ef065df7769b72f2434af2e8cb8a2948c685e92db51f220e099835,2024-11-21T02:08:01.970000
+CVE-2014-3261,0,1,49df8e0424e1ef60f6eb75ae419f41cdadbe1a7e75e8651e7b853c1bea8db545,2024-11-21T02:07:44.867000
+CVE-2014-3262,0,1,2231850fc245cc63d856affb1c458f2cfcd95642ec1464ff5229917ceab923aa,2024-11-21T02:07:45
+CVE-2014-3263,0,1,1dbfa8bf75038d190fb258e9a814300015dd2e12584f1974914e98aa3f090f52,2024-11-21T02:07:45.110000
+CVE-2014-3264,0,1,8f9e41c8d3407390a68e4a50cce8329871b383491ecccf042e2a86666a7776d5,2024-11-21T02:07:45.217000
+CVE-2014-3265,0,1,a94242e892818c5092af2c0a8b56770c9772ba36f6a1ef944bf7d76ece81e40a,2024-11-21T02:07:45.327000
+CVE-2014-3266,0,1,386130320115bb53d81644f67769b4fc585cc6b80e34594b0a490cfbc61dfc64,2024-11-21T02:07:45.443000
+CVE-2014-3267,0,1,4c873f16d6eb7704f76752fe020d3c1f0247621106980060c1dc138733bd4f1c,2024-11-21T02:07:45.560000
+CVE-2014-3268,0,1,e0a8685c716e9ca64ec4bbc98d5ee89ab67bb41f456c4575dfcb5e55bd7afe8c,2024-11-21T02:07:45.680000
+CVE-2014-3269,0,1,027a1aa90268586d55defe14722b775a78b9044bb8e0881c826b7697c1264035,2024-11-21T02:07:45.790000
+CVE-2014-3270,0,1,ad01821e112d54811ef2de1b461c66c065ba5cc59850800e9bf254c70613f501,2024-11-21T02:07:45.890000
+CVE-2014-3271,0,1,9b5ba80c8a1aa520b4c43a44478224288e68cad10ef2c2d04fb1da2d20ef86a6,2024-11-21T02:07:46
+CVE-2014-3272,0,1,3c5ed02eb0dc0302c01fc981b4dc830a08c01c4e0212d74713990d7e712e2ec6,2024-11-21T02:07:46.107000
+CVE-2014-3273,0,1,ed8075ac6a960558eb47b402c5d95e0c895178acad4d247c2074e0df824cb7d1,2024-11-21T02:07:46.217000
+CVE-2014-3274,0,1,3a8f38b7da1ad41e711519b5c0969d3ed0601c4bc6e2e84eb2d24158a94ef5c5,2024-11-21T02:07:46.323000
+CVE-2014-3275,0,1,044c8f7db01801463c3108729dbe818d37259e546916e2ae549f25e2be509f5b,2024-11-21T02:07:46.457000
+CVE-2014-3276,0,1,78abe403f2dc55716a7f5a75cf53f46e3612de1a06c7ee56ff225430ff8154bc,2024-11-21T02:07:46.573000
+CVE-2014-3277,0,1,0145268c8d4390edafa3f7c4be04f5fb33b05f854c7515a3dfb0816eadd8b6f5,2024-11-21T02:07:46.700000
+CVE-2014-3278,0,1,83dfdae63372b05aed53cc29288dbe3f234eb067eba6f7fea29b30ddebcd130b,2024-11-21T02:07:46.827000
+CVE-2014-3279,0,1,9eb5e79bcc7be4104617735f4ddbc354887aabf5d3124db04c84bb12cc8f0eac,2024-11-21T02:07:46.937000
+CVE-2014-3280,0,1,20ad6c4501211c97630223fda325d80e70593762a175543a519ddae976dc0070,2024-11-21T02:07:47.047000
+CVE-2014-3281,0,1,680f28490f6c3efdaf1559c123b233bc08e34b8a9c39936f200a37562621be51,2024-11-21T02:07:47.163000
+CVE-2014-3282,0,1,75b474b9f628f1b28d16a659fd836bc4978905b69e16a22dbc7d90e21fd94fb4,2024-11-21T02:07:47.267000
+CVE-2014-3283,0,1,eb84f946b2cadd809ed39addb13613adceabb6b5695a8e125b473e0aa2b7acf3,2024-11-21T02:07:47.380000
+CVE-2014-3284,0,1,dc0894f9f66f87a9b98566003ef2b74ba0d40e43cd878a9289393607586298e9,2024-11-21T02:07:47.493000
+CVE-2014-3285,0,1,193deef8c554b33a769c91b55caba5678c4c2050ecd1f8832553338b073b9400,2024-11-21T02:07:47.610000
+CVE-2014-3286,0,1,5273560dbdaf15fa9d31d55d1c35f4b426f10e8b602eb68131b709823044a7d4,2024-11-21T02:07:47.733000
+CVE-2014-3287,0,1,ae48eb56128b0bea06261eb066814a0f8b59cb3b454bc721934ea6176fcf0a17,2024-11-21T02:07:47.843000
+CVE-2014-3289,0,1,4b75e4ed88880af42659c72a44f9c50b790317265df0bc5fe5491cc3d66163be,2024-11-21T02:07:47.950000
+CVE-2014-3290,0,1,328faefa005118af418a48cc688e38219fc8059aadefbffd2c797e0b60b15cb7,2024-11-21T02:07:48.073000
+CVE-2014-3291,0,1,611f000e77ef6c4bf4a9c59a5e6c9f164d6ec96658d3c2aa0c90f8c94618c1be,2024-11-21T02:07:48.197000
+CVE-2014-3292,0,1,eb0fe4c902b859376c374874830946a4b4cfdaf59eb02c4b8674fa316fa2f95d,2024-11-21T02:07:48.317000
+CVE-2014-3293,0,1,6805e71c9bc059e783a1939665986b2a6f3d797ef41f9887d1d8645daf9f7d9e,2024-11-21T02:07:48.437000
+CVE-2014-3294,0,1,b1c8c13023d47d4c52d4d367e6fa87654202f1926f6bf7afd8db64f7c1a7dcaf,2024-11-21T02:07:48.553000
+CVE-2014-3295,0,1,5c89237d732d2274946d687568b8436b57e52cf59724e176ce54048cc3f04db3,2024-11-21T02:07:48.663000
+CVE-2014-3296,0,1,20aff26848458828be57cced257cf62d9ace863ae6f44aa2b47a305c390d5b42,2024-11-21T02:07:48.790000
+CVE-2014-3297,0,1,8afbf54654c40c9ec4624c63796171ccd69615933bd3aa49ab1d97ee2246ead3,2024-11-21T02:07:48.907000
+CVE-2014-3298,0,1,246b1cc000112761b7dab02850aa41c713585da04d6ca866f1d2632bfd319e8d,2024-11-21T02:07:49.020000
+CVE-2014-3299,0,1,6d08773397aa2304094b2fb4ddf6ba72628c7a8b88dcebe15583d29dafa9c8d4,2024-11-21T02:07:49.137000
+CVE-2014-3300,0,1,7581da42ef771f22942ca472ab77b3c81dfaced354b27bf07efae748fdd253c8,2024-11-21T02:07:49.250000
+CVE-2014-3301,0,1,f13a9d4dcc9d4951ef61f276f79e00d8f56103e2b6b1b60476891824bef9d20d,2024-11-21T02:07:49.370000
+CVE-2014-3302,0,1,e75a4622bb355dff104c7cc48a4637d977e74126fcf949ecab28a1112f5ea2bf,2024-11-21T02:07:49.497000
+CVE-2014-3303,0,1,b2673c67df04a7a1cdeab9543da867be96a7c59d1d3e9f7855150d7a4949dee3,2024-11-21T02:07:49.620000
+CVE-2014-3304,0,1,b9e7a2f0731ff9b1fcfc544f1623adf28f1fc748b7d9a5f765e872b7804ce048,2024-11-21T02:07:49.760000
+CVE-2014-3305,0,1,ef05b361adcab98374728048013ed26b0df29bb44b7dc166f8095cf914fa887b,2024-11-21T02:07:49.877000
+CVE-2014-3306,0,1,2ad3269dc9260222cb517b660723f41072c211ec5cfa181881353eb2881e5bab,2024-11-21T02:07:49.997000
+CVE-2014-3307,0,1,8f4971d892ebfa8a8e0b5092b193a1ab856969f7f7135772e0ac64160fa85bb4,2024-11-21T02:07:50.103000
+CVE-2014-3308,0,1,7a7b0d41e5ac8dcbb2014acb72ebd71195906bc1887f7e4183a7b8cad12cf7c1,2024-11-21T02:07:50.213000
+CVE-2014-3309,0,1,ed1ab6dcc47d4a27ca966ba94dd8bd2bbca2ef08125151971c9fd3d671895b0b,2024-11-21T02:07:50.337000
+CVE-2014-3310,0,1,45dc85e8a907de07e6dbcd9931f91150a7b7b344d150e1d8c405c887c7a75dc4,2024-11-21T02:07:50.450000
+CVE-2014-3311,0,1,b1b102c6578ae88597eed64091c03d9d50df7e8c8f2b68cfa00554157bf5b0a7,2024-11-21T02:07:50.563000
+CVE-2014-3312,0,1,f0eb7d561ad5adc50892c510112250d6156600f5fd8bda9bc72f9acbb41bf320,2024-11-21T02:07:50.677000
+CVE-2014-3313,0,1,56715b7b0cce0ba205052ce8e9a9cb6c227ca5ee0e6f8b356bf726a10222f5b2,2024-11-21T02:07:50.797000
+CVE-2014-3314,0,1,e9e8692a381e574c4abbf45e909aab4c080e838c373cbac4c7be9906520b8064,2024-11-21T02:07:50.927000
+CVE-2014-3315,0,1,702668c89b16048a160f3080da32999f92a3af064c1d866b40af1419931bbc97,2024-11-21T02:07:51.037000
+CVE-2014-3316,0,1,86f3e75f8e213a842753b08ff7050faddc08ae88dc9b55b2bbdde3b0393ef4cd,2024-11-21T02:07:51.147000
+CVE-2014-3317,0,1,2aade8f17d8646723dbe3501b564ebff22c1946c7db2e6d8779d46e5fc67e2b4,2024-11-21T02:07:51.270000
+CVE-2014-3318,0,1,2a05f50bd0bbb7afd82dca45f3cb7221ea1c0a4e0edbaaa35d90774b6887bc81,2024-11-21T02:07:51.387000
+CVE-2014-3319,0,1,b90406664a2a73672656da17c8ea8ee057f13c9a8b90f89f4624e4bcdc88a13b,2024-11-21T02:07:51.507000
+CVE-2014-3320,0,1,bde94973018a7705869ec8708fd4072f6e38a9a20f0eed14cd5cc9f9ac4b5ab4,2024-11-21T02:07:51.623000
+CVE-2014-3321,0,1,1bfa530f049b675f7c70135cf05fa4842b83890d97972ad9fc1256fd9a8f6316,2024-11-21T02:07:51.750000
+CVE-2014-3322,0,1,c0144a7b414575fd81da66d1573037eb2d4c77b43bc735ebd083f03df936203f,2024-11-21T02:07:51.870000
+CVE-2014-3323,0,1,facea12e40784fd271c5d2e5bc047cb8fcc08abad0426d3e2dcce47d8bb5f0d1,2024-11-21T02:07:51.990000
+CVE-2014-3324,0,1,ea39ef3249750a36ef7620a37b85afa71d81b3170db53d89619a6f26009d7f00,2024-11-21T02:07:52.100000
+CVE-2014-3325,0,1,d0edcb2b501dc1433d1f025db56c31273711da7ecf92d04c3f4d5dd385c7d03f,2024-11-21T02:07:52.230000
+CVE-2014-3326,0,1,19cd77768f8abc109f42059300f50e8dea04c1af774591fb99a48a7ff9210f54,2024-11-21T02:07:52.350000
+CVE-2014-3327,0,1,04620b5e2b3a556a14dc4438cc585e0cef2446ec436a51e9923ebaad5a6e9fe0,2024-11-21T02:07:52.463000
+CVE-2014-3328,0,1,2d1635da7af379ad32d7b278252714e27e143a384d183c5df7f07726c93ca78b,2024-11-21T02:07:52.583000
+CVE-2014-3329,0,1,00490a837007425a415e5525f0ca0eb101741108bab992e81ed55a618a6cd54e,2024-11-21T02:07:52.703000
+CVE-2014-3330,0,1,ace40f46d845897abad7474b904db804b6f101e082045feafd4cf3afd000e71f,2024-11-21T02:07:52.823000
+CVE-2014-3331,0,1,187536d57e33e439e4448dd2376aa5869c01dd71881038da4020f568dddcd170,2024-11-21T02:07:52.940000
+CVE-2014-3332,0,1,b226cfb2c1957d4a1ea26b160abc8c279fe9abac2c0be1484d7cd859915a3b61,2024-11-21T02:07:53.053000
+CVE-2014-3333,0,1,dc7836c45b8101d0ba35c2ff145255d52911a1562ec85e29033753477e7a33ca,2024-11-21T02:07:53.180000
+CVE-2014-3334,0,1,c17ae213855c4dcd202105eca5ada9d962be2ac079c4254e3eb1493ea5bd497c,2023-11-07T02:20:06.220000
+CVE-2014-3335,0,1,c571e3736a4e08d3579bbdb8828460d0e1eead00fda4a333f3856fdecd306abb,2024-11-21T02:07:53.310000
+CVE-2014-3336,0,1,7bf9d5906ba59c14c3e63459cbeefb9f5d51e4b7d6f9bb207ca872f058700462,2024-11-21T02:07:53.450000
+CVE-2014-3337,0,1,f2cfa9391e6deb33bb7b0d5265324b13336773e944e92d6df5114719e28bb595,2024-11-21T02:07:53.563000
+CVE-2014-3338,0,1,5d837ffd8442eb38f30b83b0d11c5b4fac89e28d2cdcd3df515df356cd799b62,2024-11-21T02:07:53.690000
+CVE-2014-3339,0,1,0f2b41ed015c32d60962292f1df68b846e535e7c04d0f5b2ce28a5d437ecfc77,2024-11-21T02:07:53.813000
+CVE-2014-3340,0,1,0460dadc0d8ec3902c0e5955e8932f904b9ef1533683658a4c8e5fbcde7d8448,2024-11-21T02:07:53.933000
+CVE-2014-3341,0,1,c6263c36bd5ac116e13ed04a52ad1f2e45bcf71dad8f036da3212bb3b8e57824,2024-11-21T02:07:54.053000
+CVE-2014-3342,0,1,2885fa430b025868cc6bceb87d0b4b96b93805ca00d3be384e8b0ec12dbbf21e,2024-11-21T02:07:54.187000
+CVE-2014-3343,0,1,22d03d0cde7e4c92331d6ded93d329c5377daea954051b3579cdb1dae7ef47c5,2024-11-21T02:07:54.307000
+CVE-2014-3344,0,1,8896cc947a56db7ca3039bf59466df3c0b3f414ad1807be09d6b70c02009b17b,2024-11-21T02:07:54.420000
+CVE-2014-3345,0,1,8df82ea4eaf2869f2a4ba230dde5ffb3ced6ce8a09ac1d9053b336e77fbe2e87,2024-11-21T02:07:54.540000
+CVE-2014-3346,0,1,3d3fdaaf4675897203d3857661f3fa3279715ecad2ca3fc982737dd428fb9ac6,2024-11-21T02:07:54.653000
+CVE-2014-3347,0,1,6472c309043bfc6fd3e7bb6904f95745d937c455c87af668a8da2ad1e190aad9,2024-11-21T02:07:54.767000
+CVE-2014-3348,0,1,2954660e6ee315bc4573a3bc02854457e4a214caced2ea484e112fd5b4499452,2024-11-21T02:07:54.907000
+CVE-2014-3349,0,1,2be1357671dc8ac22327d1aa80f9c3a055fac09091aaed36c4050f2ee22a2b23,2024-11-21T02:07:55.030000
+CVE-2014-3350,0,1,793d8a903a468bc302e59ac5aaf8db8862b492fbf51ef5999a09dfe468baaa02,2024-11-21T02:07:55.153000
+CVE-2014-3351,0,1,1ad3ab4bc50b80ad4d40a417d3cfbd855d2912d1c1cfe2ffc524d207f1296921,2024-11-21T02:07:55.277000
+CVE-2014-3352,0,1,c681d3da2ec7f401e50d9f6a007f9b4f1d560a852ab4aa761175d25450338a1f,2024-11-21T02:07:55.400000
+CVE-2014-3353,0,1,bd1ceab48f839e336a49571a491d5ea76f993ba3a1b015de9e7c3cb0436b11c2,2024-11-21T02:07:55.527000
+CVE-2014-3354,0,1,4b2d8f59657273b1ed11164f046d3cdfa58cfe235d2d4e6ff6942e408b96d30e,2024-11-21T02:07:55.643000
+CVE-2014-3355,0,1,021c74861518478f08dbdcf18067a34f3c12df0d92b4e3d1d34bb6b21ff19f06,2024-11-21T02:07:55.780000
+CVE-2014-3356,0,1,60aa62d59606aefa037e6bdcfc6804a846124303aec6726d62955a52b6d90536,2024-11-21T02:07:55.903000
+CVE-2014-3357,0,1,675c4239c438f7307717c637afd759c8189ac824c3ade14390b1db751518750f,2024-11-21T02:07:56.023000
+CVE-2014-3358,0,1,b06fdd60319748917913dfbfa886e51be285c1dbaff3ec19868ab6d7148fc9c5,2024-11-21T02:07:56.143000
+CVE-2014-3359,0,1,81c7f77526d2ca4394d57e682bb2bd3eb1b9a14b25c95a4fa44b49b10bb58f78,2024-11-21T02:07:56.260000
+CVE-2014-3360,0,1,7a9200fe02419c241eb52045084f67e6191381f758bcf87e80291df274e4e981,2024-11-21T02:07:56.390000
+CVE-2014-3361,0,1,359bcc5b810c8c4897acd96f67c5e5a252eccc53c0362fcdefa24e017208e800,2024-11-21T02:07:56.523000
+CVE-2014-3362,0,1,f55a7f65a3d52917e1a4e64a87d5dab01250ba000a5ca174333ddd33464c9d7e,2024-11-21T02:07:56.640000
+CVE-2014-3363,0,1,2dbc3e62763befbd340499bb9d2bfc51cb553b5f03d13e76b3faffdc5fa791f1,2024-11-21T02:07:56.763000
+CVE-2014-3364,0,1,6e82a8262507ee2c81b56ba8a9ca74d1629afe074cf309c64a78950bec8a068d,2024-11-21T02:07:56.880000
+CVE-2014-3365,0,1,c0d3e94e241c16aba3346d83559937e2dab0d696e0d69f8ba5e8ae77c1c47d3f,2024-11-21T02:07:56.993000
+CVE-2014-3366,0,1,461e6e1b2268ecf39ddf614686cc6f2a53573e9f94be136f53b8b0b76ab39e85,2024-11-21T02:07:57.117000
+CVE-2014-3367,0,1,c728a7e0e91a0c7e41a9d60bb92b0076c9281b3da61bb9bb59d3fc940a223c11,2024-11-21T02:07:57.240000
+CVE-2014-3368,0,1,55691d8653031ed9436396dada53b3d0c85a7188f6127af61221d8479a23e840,2024-11-21T02:07:57.360000
+CVE-2014-3369,0,1,cf978a6277f2ef29cba350314f2c1bd93c24c86063819421123f68faccc25d56,2024-11-21T02:07:57.480000
+CVE-2014-3370,0,1,5a12343c61d69f0df7dd0920aa0b62b2c26eff2bb1747a16b6ed898d57f58326,2024-11-21T02:07:57.600000
+CVE-2014-3371,0,1,5f0ae02990e46b004c23e90b222b796daa9af922c1af179e99c16a4a1d84ffe3,2023-11-07T02:20:06.770000
+CVE-2014-3372,0,1,7a212c6a6eae4f4bf812a82cf6619996d7835ba83e9e79bbfbac0cd4fff33522,2024-11-21T02:07:57.723000
+CVE-2014-3373,0,1,ca53256b026d6d3fd39ae737aeb38d40a984ba1d9980300ef97ae5f56306e9f6,2024-11-21T02:07:57.833000
+CVE-2014-3374,0,1,5f78ccecf7b2f610e03cb6e4a38abde5fa325fed6af920468a63878c0a4af47a,2024-11-21T02:07:57.947000
+CVE-2014-3375,0,1,666350dd8349688b6afc8894d2c4333956c7c473ae3a3933ebf28f7ba4680067,2024-11-21T02:07:58.057000
+CVE-2014-3376,0,1,0150d208b44f091caa86c3ae99a273a3701c8b0a0a07911cd670edebb0221994,2024-11-21T02:07:58.170000
+CVE-2014-3377,0,1,619f880347e60c765a6b37c1a54430937b9cb3dd0f46585f91dd907184bcc94f,2024-11-21T02:07:58.300000
+CVE-2014-3378,0,1,d2f72a25bb7449b4a2bc85551dbc70f314cb96c7e312d1c191e8c2288e22c296,2024-11-21T02:07:58.427000
+CVE-2014-3379,0,1,905ddb25f68542dc6c3003cfc3fadf5544a9ac04aa36cd66387115a1d55ab345,2024-11-21T02:07:58.547000
+CVE-2014-3380,0,1,7125f40977e70edce9fe4aeb8219b8253f1f935048da9bfc905ed9c23ee64a14,2024-11-21T02:07:58.673000
+CVE-2014-3381,0,1,1ac8036344cc2bdd6070039df5f928d3d80eb9cbdb6bb81995efdbd93a15bfcc,2024-11-21T02:07:58.787000
+CVE-2014-3382,0,1,97d264822f7202d4cd4aedac7afa1d160b00759ca91181523398e442d3b17987,2024-11-21T02:07:58.893000
+CVE-2014-3383,0,1,00f366557b4d5cba4ff8cf2239feb3f7c4ce239f3fd90bf171866f1a46d8206f,2024-11-21T02:07:59.010000
+CVE-2014-3384,0,1,af6bae37f791fa077b63b49b223d1155277430add06547249e054d9cb6c2ddf5,2024-11-21T02:07:59.123000
+CVE-2014-3385,0,1,4c1c62346c80f44cbfa238bbf8ae13e53923e2d701a2b1401fe0cea14949d5e6,2024-11-21T02:07:59.230000
+CVE-2014-3386,0,1,9324df085768b8d482d6015f404440be9f7e18287b61e04dcdd2fd430fbe9501,2024-11-21T02:07:59.337000
+CVE-2014-3387,0,1,98e635ba0163d99438a599ee93f1e00b0e749f8faf101cc193a63e58da4d826e,2024-11-21T02:07:59.443000
+CVE-2014-3388,0,1,a99fec3d2844bdfd8163cb59a7dabb0fb9582dd32d9f26ac4e05d79dee246879,2024-11-21T02:07:59.553000
+CVE-2014-3389,0,1,b08ba838a955e0b62d6e45238cfe8414a0558165593d155ad8adb9d312f6f90b,2024-11-21T02:07:59.653000
+CVE-2014-3390,0,1,970a349b9a9822edf7dac24e61d1878a76ba09883fe61fe7c061a2fe81ebcc15,2024-11-21T02:07:59.763000
+CVE-2014-3391,0,1,b43ad4dfc9c071de87474ba66264fd2b400ef39c40d1ae3f12a2aebeb63babdf,2024-11-21T02:07:59.863000
+CVE-2014-3392,0,1,1f12b561abca4ac556f460c764918a5a1f3dbd552f2d0505d823554bbb30e064,2024-11-21T02:08:00
+CVE-2014-3393,0,1,f8c5af58718b8a8a68571af9bdcbf7c6c547dd74b51eff082918c032bf2dfe71,2024-11-21T02:08:00.143000
+CVE-2014-3394,0,1,d9cf3a0bb3305a193d6a3fe316df5e60c0b18a09f9ea6f7c842b0b416930dec0,2024-11-21T02:08:00.277000
+CVE-2014-3395,0,1,a11caabd25de88a409844372bd51d12040b08e32253fbf632a360115baa77408,2024-11-21T02:08:00.400000
+CVE-2014-3396,0,1,53e7daa437a7bfaaae8e73b2d0bf5268e108c4c95f4071e8363a8de1b0d3fbf9,2024-11-21T02:08:00.510000
+CVE-2014-3397,0,1,ab766f7b0361d7e6663c3c4fcd88b42bbdae51f84ed148b9a38e88a43177feab,2024-11-21T02:08:00.623000
+CVE-2014-3398,0,1,ceb7a9e8bd160b392a2ab14837adc05d66ea5b36eedf2b88fa955dd1b0875fc4,2024-11-21T02:08:00.727000
+CVE-2014-3399,0,1,5440d8077f37a4a3ca3077f254fb996b4b3c5bdae1635eefa659ee090dbd9119,2024-11-21T02:08:00.830000
+CVE-2014-3400,0,1,a26273711e30b005322dafac1d874ce7aeef677293a7fa61720543d0d73bcc82,2024-11-21T02:08:00.940000
+CVE-2014-3402,0,1,96999936e00f56c5843e123b7c02abf4790e9836925b19a3f76bbf441662578b,2024-11-21T02:08:01.057000
+CVE-2014-3403,0,1,7a9ce9315a42ec92bc8088b78aa704288aa6f05caaac89ff7e5f82ec7ed6c3d0,2024-11-21T02:08:01.167000
+CVE-2014-3404,0,1,6671ace077a7a3d143f905fc33cd9bd40696f08628f4c0e710b01cc24cfa5b41,2024-11-21T02:08:01.280000
+CVE-2014-3405,0,1,ac6332e0b1cfb8a5d26bb74d01d5ab602c211dadeb09a2f6952846f759732f49,2024-11-21T02:08:01.393000
+CVE-2014-3406,0,1,d06709547be91cb2760c36fa2285fef32eff39f884c3d9f5dff9c32a93eef889,2024-11-21T02:08:01.513000
+CVE-2014-3407,0,1,a3d1388a6712e5f35c92d9c3ce5360e91b008bac93ad4c69207496ff94ca441d,2024-11-21T02:08:01.623000
+CVE-2014-3408,0,1,54d860035d5fc6370dcdfd6650783599dd06cac7e43bd7fd55d09bcf2728c948,2024-11-21T02:08:01.733000
+CVE-2014-3409,0,1,091268383123a3d97178f7d2a8b69d65a5959c13c7d5765fb2672b2440387672,2024-11-21T02:08:01.853000
+CVE-2014-3410,0,1,5345bdb5723c6f031c2e684ca39fa2a28b67214aaf09606c0a29b0690b7445c9,2024-11-21T02:08:01.970000
CVE-2014-3411,0,0,31e81ce33ebb03c5866abe5a5fbb2ea92c5c4b0e29699bbffa19533ecc4795fb,2024-11-21T02:08:02.087000
CVE-2014-3412,0,0,ab2e9d9230ca7d32582bdd3538e7b4e45c000dc3f23665170b28819a252bb87d,2024-11-21T02:08:02.230000
CVE-2014-3413,0,0,415efe30208a75374d22fa753a8c0c2c6246cdd881004ca90c76f59e51b9b75d,2024-11-21T02:08:02.387000
@@ -71732,84 +71732,84 @@ CVE-2014-7984,0,0,07f250dafdf1d68654497365732341c152bd4b03f144b0ae4b6f2af1fdf488
CVE-2014-7985,0,0,2d5573b32b6a9ea8c01e52bef09c5f375918841b540bd7576c1c81e28ba0b813,2024-11-21T02:18:22.643000
CVE-2014-7986,0,0,dd4d1e96a017c5163d74b43dbee929b368621e340bec9975e6144badbd22366a,2024-11-21T02:18:22.783000
CVE-2014-7987,0,0,1c34b25db886f16aa862ff6d25c2bf2fb3db9f37d1ea7010c90e16a29cc874b1,2024-11-21T02:18:22.927000
-CVE-2014-7988,0,0,7c21aac2ee2d50b986af6c17b8aa947de3e801c5bdcbcf223b2dd686d3bc1631,2024-11-21T02:18:23.063000
-CVE-2014-7989,0,0,543d81a26d950bf97e10d7c993043886b8f897a4687efbc423b75c1a13b5e041,2024-11-21T02:18:23.170000
-CVE-2014-7990,0,0,b3ca994de48f864e52252888a43a955a11400b1c321af5195f6142c56b9aa53b,2024-11-21T02:18:23.293000
-CVE-2014-7991,0,0,2c49806b4913f58625f1c16f61c11902d1d67a61e41dd12ae82ac5e0d71068ea,2024-11-21T02:18:23.403000
-CVE-2014-7992,0,0,d7120af8c8aeafd0739737402db231f287920e7c71bde6f11c4623711b3c81ee,2024-11-21T02:18:23.510000
-CVE-2014-7993,0,0,3fae99ea6136fdf85ec71ce5691634a1dacf5a788e8663604212e773b485123a,2024-11-21T02:18:23.620000
-CVE-2014-7994,0,0,580a8fe1739845799eaafdf812c8fb1c3173ca1baeabc56455c33462ee8c6166,2024-11-21T02:18:23.730000
-CVE-2014-7995,0,0,a94c6a20397da7fe6963793976dfe2483d186364d97070c30bd55c699768da90,2024-11-21T02:18:23.833000
-CVE-2014-7996,0,0,6a88c9fe43d942b674e8571e35816d00889419b06ee1d87c1105bb9e716f70a3,2024-11-21T02:18:23.947000
-CVE-2014-7997,0,0,0e424dac5154da00bfe59a0cbadf1c14a168c4c61e0571c01a1a3d32993b56ed,2024-11-21T02:18:24.057000
-CVE-2014-7998,0,0,20318cee5daf7b347f65363dfb08a9559cb57772fae73fb52461541c4d9746a8,2024-11-21T02:18:24.163000
-CVE-2014-7999,0,0,da2595d9b00391b4d1728f8a4b5fd08e86f741391fcd33a21ad9885aa0e47697,2024-11-21T02:18:24.277000
-CVE-2014-8000,0,0,6f214329e2ad8f7ced85d1114dfc1997a3bc388a817cb41b306887a21634b105,2024-11-21T02:18:24.383000
-CVE-2014-8001,0,0,425b10ab1fe904dbec8bf894b2315041769cc32980aeb309e78fb0a9485cc64d,2024-11-21T02:18:24.490000
-CVE-2014-8002,0,0,e5a4227d82572312f476225600669f45f350c83838eaa9b9e60583055bdf8c6e,2024-11-21T02:18:24.590000
-CVE-2014-8003,0,0,21e744eb2056509344963731b75297215893aab87a28dc0137cbac476b4a482a,2024-11-21T02:18:24.693000
-CVE-2014-8004,0,0,1d64d4638f0daa7e90992a5033888f875fbd3329fff0aa3eb70e441598be7382,2024-11-21T02:18:24.800000
-CVE-2014-8005,0,0,e57b78a8caf05d370acac90ae9ef848e3bfe3826bf4cc1446845b10284902687,2024-11-21T02:18:24.907000
-CVE-2014-8006,0,0,d930ad5f6e0e662ce9ef7015aaaed9a3ddaf0f6a95cffb0c9ec922d8042db9f4,2024-11-21T02:18:25.017000
-CVE-2014-8007,0,0,f1b8aa68cdf020ca61c5d34a64b29618d314558e04575a70ed592de099436eae,2024-11-21T02:18:25.127000
-CVE-2014-8008,0,0,49dc268a9b04ba77c6814fbff3ce486ec090926ab2d6082e1f2a365e21d32a62,2024-11-21T02:18:25.240000
-CVE-2014-8009,0,0,500b3a37ebb49d00504e1e8b75c537d20dff67404c8d66e0829247843fe7cf65,2024-11-21T02:18:25.353000
-CVE-2014-8010,0,0,45dd8c7f9c49620b9ee3182a80c7414af68c1f207c7b256b0f7fe296796683ba,2024-11-21T02:18:25.463000
-CVE-2014-8012,0,0,5b9f3ae77deb8156124584ea9f857af066e07402369661cf41eb6856b46e73ee,2024-11-21T02:18:25.570000
-CVE-2014-8013,0,0,4dc127d06f30e5eccc39f967e785d42a6b73ed21b4567a4367e528708d024fe2,2024-11-21T02:18:25.680000
-CVE-2014-8014,0,0,10b0942e02c101817526bdef4c24f1df37b13a84f4975c13763ad0ccdafa0191,2024-11-21T02:18:25.797000
-CVE-2014-8015,0,0,d971403d3e4deb4494179850bb0fde1ec5856bba544cea5f24d4be9311a424de,2024-11-21T02:18:25.903000
-CVE-2014-8016,0,0,dcb78570bc8a3c89cce4da1638dba3b7a95ca2ef752bd985aef2cc215f49f03c,2024-11-21T02:18:26.007000
-CVE-2014-8017,0,0,25d16487740d7efa6060427de69c1d6f3239fcc0fb06746ecc50abfeb2ef371c,2024-11-21T02:18:26.130000
-CVE-2014-8018,0,0,149c6cf1f529cfc1ac86a1259b9fb175ecaa873066b9388af93efb760d7c49a9,2024-11-21T02:18:26.240000
-CVE-2014-8019,0,0,e7c91f7c785857fb67183dfd2da9fae98801c13fda79e276d8f15a505d3c596a,2024-11-21T02:18:26.350000
-CVE-2014-8020,0,0,43db8f908aa77fd52538404ef8ab967c866a7f855d08d06520bec10bc40cb24c,2024-11-21T02:18:26.453000
-CVE-2014-8021,0,0,fafa1d20654422e48b375cbe2ff671ebf6a7ef45110b845a1bf2cb3399cabd4d,2024-11-21T02:18:26.567000
-CVE-2014-8022,0,0,519cc291d9e074999ab308e1037642404069d45ef88c1a930578e2290bdb053c,2024-11-21T02:18:26.677000
-CVE-2014-8023,0,0,e9600ea38add003fafa3a78efbe04f21f0124d85b77242abf771b5f9949851c6,2024-11-21T02:18:26.787000
-CVE-2014-8024,0,0,e3d5a12bfd10dc7d459ccff17e4a8067cef6ab29a4d7ed9abaa669dda90a48c5,2024-11-21T02:18:26.897000
-CVE-2014-8025,0,0,0545ecd524cefe25c8cd52067a454fd1130074ec6754a4e6dbe96f9928a6d60d,2024-11-21T02:18:27.007000
-CVE-2014-8026,0,0,3ac75ad399d875e1a584448e84bb760e2cc3a4ff992ecdc7e453a60989bc5aa7,2024-11-21T02:18:27.123000
-CVE-2014-8027,0,0,e58ba31fcdb916cad33cdc8fdb1189b264168810f45ff09c93464d94d06da421,2024-11-21T02:18:27.240000
-CVE-2014-8028,0,0,89edf17b3c828f46f83252ba5809de76458a5681bc8cde3715aa07163a3d432f,2024-11-21T02:18:27.363000
-CVE-2014-8029,0,0,5499abdb8d5f2e672363db6d833d16c2e0202de3eaa3a69b1cfbc29838daa8d1,2024-11-21T02:18:27.470000
-CVE-2014-8030,0,0,0ebe045f6d4ab9753c889ac3ab5b00956426e7891ce90cbf2c31aab0b982f733,2024-11-21T02:18:27.573000
-CVE-2014-8031,0,0,3f47607f43074f8523dafdea8463994fb0b31448aafd143cdc64d48b279648bb,2024-11-21T02:18:27.677000
-CVE-2014-8032,0,0,6bfa7e0b57d5fbd02406cd03b63c9f7832fb3df052fab1a2529c62da57fb91b3,2024-11-21T02:18:27.787000
-CVE-2014-8033,0,0,38ea24d208fa3250c53d8a5343ee935543705b59e7b2430c6f1a503e86ae0e1f,2024-11-21T02:18:27.897000
-CVE-2014-8034,0,0,cf1b674fce1997cd5576bf36bb98b2d89be24aae669c5a53dc156cc04c63c963,2024-11-21T02:18:28.010000
-CVE-2014-8035,0,0,1abd77b006581593f9b0db4ae74f1e1bd8277f0f3fe3bc55c772b9ce83a9150e,2024-11-21T02:18:28.123000
-CVE-2014-8036,0,0,38a968d623608f910377a4772c76fbf8f71bd3f4b6cde525e830d38a9152af1a,2024-11-21T02:18:28.227000
-CVE-2014-8038,0,0,8994a7386ce28bc0494d99684158bc211cb5527db716022c6e98553101a1325b,2023-11-07T02:22:07.033000
-CVE-2014-8039,0,0,b91fe6904f93c564d81ace32bfd7dc2b3d7cf834b7dfca3d783ce0c18a85fab6,2023-11-07T02:22:07.250000
-CVE-2014-8040,0,0,05f26626ad86f8d06f740ca85afe87628fdc2d32455d12730526168656bafc21,2023-11-07T02:22:07.537000
-CVE-2014-8041,0,0,073063940c236ef300f2a3c85cb7902a448aa23d9ec2869c2bcb56de9679b8e6,2023-11-07T02:22:07.800000
-CVE-2014-8042,0,0,d941df3ae7fb3d7e86ddda8c8a121e68487b32a05c9559600829a7db2b910f3c,2023-11-07T02:22:08.040000
-CVE-2014-8043,0,0,5a8efaa87c84c8e48eb338a1e104207c58bb1de34f7c3f076c34008b2677dcf1,2023-11-07T02:22:08.280000
-CVE-2014-8044,0,0,fd59afd79e1f46e77d92ff02d428e50f68074ae8c2173e00ece9a536311ae9f1,2023-11-07T02:22:08.517000
-CVE-2014-8045,0,0,79b91d5b27629b5383db92a50cdd447e7710acb9e5a0ec64d60ec37f2619b4dc,2023-11-07T02:22:08.757000
-CVE-2014-8046,0,0,a032d4595bb003cdce4df28ed204f56656c4836e578e5e494c3803531998b8c7,2023-11-07T02:22:08.990000
-CVE-2014-8047,0,0,f4f791f9941ec443cdd03554a84c19342a75d3bfdd52f7cd69a531eb8e12302a,2023-11-07T02:22:09.230000
-CVE-2014-8048,0,0,2819a73f0f65a50003e20703546048bc9f1804e4d95e3e28d496b80e8a2632e7,2023-11-07T02:22:09.457000
-CVE-2014-8049,0,0,9b85b863958d987c9d137d646f1661d10c8f01bc5d6d9b4d8ff21a094b534fdd,2023-11-07T02:22:09.777000
-CVE-2014-8050,0,0,c1e421895194df684770c1d104e205c3bd748fdfd19817c0d5a596ceae5fa2c6,2023-11-07T02:22:09.997000
-CVE-2014-8051,0,0,82a6c4723d8372910e4e42ee331874743763ff6813157c20318c08a5e06d299f,2023-11-07T02:22:10.247000
-CVE-2014-8052,0,0,bcdfbca9a161699a655b5cea699a81c38c2e75727c3d62831f01b0579378e638,2023-11-07T02:22:10.473000
-CVE-2014-8053,0,0,9f9c7ecbcb4c6628b39f6fee59d3b881af0397c02102acd2b2288d09f96bd252,2023-11-07T02:22:10.777000
-CVE-2014-8054,0,0,72779c9a636e8f3f759a12e028c403b51ec5408662d58b8742d2f758e5e505ff,2023-11-07T02:22:11.017000
-CVE-2014-8055,0,0,40194dd5af480d95ca9d4294c32049dcab5677d9a76d1b258cea3302331165a5,2023-11-07T02:22:11.253000
-CVE-2014-8056,0,0,966b978505e951d4102b2eb3c0fa8f2c8150d8f35efa2de784fdc3ea1800c0ad,2023-11-07T02:22:11.490000
-CVE-2014-8057,0,0,cb61fe817fa78918c5b09b733e721ee86fc54677df46f539969b82ae4a8a55ea,2023-11-07T02:22:11.727000
-CVE-2014-8058,0,0,faa395b251b01fde9accf22ba756428d20b5676acb6d0d5242de81a12da30488,2023-11-07T02:22:11.970000
-CVE-2014-8059,0,0,34ae7e638f379a534bcb8bf29e142d593f5c805ba63d7b2440eddb9f03509028,2023-11-07T02:22:12.227000
-CVE-2014-8060,0,0,869fb70b480c4f0bcdfd0fbbe6d10f19daa3806377cf361198fb9b324d6f332b,2023-11-07T02:22:12.473000
-CVE-2014-8061,0,0,937dd188ae8cc2df44f86f8d76c385af0bb69df34714b20079177f16f4349464,2023-11-07T02:22:12.733000
-CVE-2014-8062,0,0,313ce3dd316d417870a641bcfbac53b37213bf91ef3680e9c907c38ce5c5d8f2,2023-11-07T02:22:12.967000
-CVE-2014-8063,0,0,6f827d5cb8e6a3508448cec4990caeeca4b3788bf61d7906270c24f2557f2bed,2023-11-07T02:22:13.207000
-CVE-2014-8064,0,0,47cbaaf47d17ce99afae9643961e658925804cf13496d34acd91b03491de0395,2023-11-07T02:22:13.440000
-CVE-2014-8065,0,0,eb1738f70c1429fa221a69ff1d004f9c09124803de8404fca901bd2e8907b2f7,2023-11-07T02:22:13.690000
-CVE-2014-8066,0,0,9cc225dffc072c1db11eb8596ae3bfc030a2832975ad8cf1d02060b31da16925,2023-11-07T02:22:13.960000
-CVE-2014-8067,0,0,50144b52c5e0bda90d310454ad432b72888539f4603a9d02b8a81b6e45626eaf,2023-11-07T02:22:14.193000
+CVE-2014-7988,0,1,126efebdb059ffc3d8e2e23f717b4ef8144dc6761aabc723f932b21c1d6a5b44,2024-11-21T02:18:23.063000
+CVE-2014-7989,0,1,80b08d2f14a7fd8d7d5d0550839fd6d69f9cbb5c10da56655562bdbe978c89e2,2024-11-21T02:18:23.170000
+CVE-2014-7990,0,1,f992a8528e55de524dc0ff624cb649fdf6f13b671df96c663932b776abc6b2e3,2024-11-21T02:18:23.293000
+CVE-2014-7991,0,1,e19a696eb473a36fcfcba71bddc949d876186fdd40bff3bb516abc687f25cc11,2024-11-21T02:18:23.403000
+CVE-2014-7992,0,1,b5d012e09058f249bf1cef95d5258b37f14c1a7dc41cd2e9afa2ef88ad5b340e,2024-11-21T02:18:23.510000
+CVE-2014-7993,0,1,34025f2cf467fe7765216e69d85af6dba24feb050b1cfcc86d17e9605fd7a379,2024-11-21T02:18:23.620000
+CVE-2014-7994,0,1,ba73ca2017dec8ecad3e41e6c4320b73a56ef61900243bcbd74127043e3279b6,2024-11-21T02:18:23.730000
+CVE-2014-7995,0,1,2bea5733fd59b984dd2ae5581389cb29670bfdfc54626b3630ef6a129e5947ea,2024-11-21T02:18:23.833000
+CVE-2014-7996,0,1,0bb62c6c121e3b8527d5a16a50c18698881e4962a0f818e421a850792d3f5cbc,2024-11-21T02:18:23.947000
+CVE-2014-7997,0,1,729d5ef22b3e4089a09d2a5671076810ac378b3455ac07269ab912fa6d860a8e,2024-11-21T02:18:24.057000
+CVE-2014-7998,0,1,e0cb0c201142944057f104ac1c9544d0857341d9aa35b1a6450aaebe959e1255,2024-11-21T02:18:24.163000
+CVE-2014-7999,0,1,8f71736b7549aefc255e4350f8dba8c098c123b830093ed5d6ddb73647855998,2024-11-21T02:18:24.277000
+CVE-2014-8000,0,1,e7afa87272d82980f7dc0bf958e63f7e38d1061fd9435adc8e3e9b88a6452236,2024-11-21T02:18:24.383000
+CVE-2014-8001,0,1,d8da229bca53a892662b7b390656e6825a177067f9e88643374e75beeb4c476b,2024-11-21T02:18:24.490000
+CVE-2014-8002,0,1,6350b77902fac08cb94999c87a575d33634e1e4b83d0c19600b4c4e171b0376a,2024-11-21T02:18:24.590000
+CVE-2014-8003,0,1,5559cefbfa01b6acd922e3f7d272c6c7df8390019ec62c698fad30c8756f63a5,2024-11-21T02:18:24.693000
+CVE-2014-8004,0,1,7882582a05fe56306a71fcf12ba0a73bd69c2bc318f0976403545b2ea3f11500,2024-11-21T02:18:24.800000
+CVE-2014-8005,0,1,644ece446b5ce2e17fdfc66b9ecfd4dcbbffe5808784708215f71b4bc93dab46,2024-11-21T02:18:24.907000
+CVE-2014-8006,0,1,63d4d18f848ac847e4d909890ec46be12688bb9eacb13bc58f137a11a3609045,2024-11-21T02:18:25.017000
+CVE-2014-8007,0,1,db175582c60479dd0ceaa19fbc1569326381a309a41d052dc0976c2e953444a2,2024-11-21T02:18:25.127000
+CVE-2014-8008,0,1,7b5093d90b4fd67bb57e104e21db1357fd23bf64892a52bcc9fdaa0aeeb618b7,2024-11-21T02:18:25.240000
+CVE-2014-8009,0,1,9b60876c65bd3c2643979be7c32fd57ae2da40e16e023a30843efba899f15091,2024-11-21T02:18:25.353000
+CVE-2014-8010,0,1,435dfe41e0fb36bd6d0ffddc3a9e6b7d235a9107875fc85186f71e6a3070b0ee,2024-11-21T02:18:25.463000
+CVE-2014-8012,0,1,716a4488b157b2ccea57d8d7bbdd89b4eddeebfceadb8a2bda3034b8fb2f3fce,2024-11-21T02:18:25.570000
+CVE-2014-8013,0,1,c0f60ee806d3ee749b23541fd4933d01114aaaba3805ca760cd521c1fb49400c,2024-11-21T02:18:25.680000
+CVE-2014-8014,0,1,383cd07fd18d10c6d76b22d1c9109ba3cac0c816fc899060cb89ae3d1ecc2cf0,2024-11-21T02:18:25.797000
+CVE-2014-8015,0,1,553c6364558bdd6ffe0444b9fa6add5816fa375be2a33cdf1927dbe65ec41906,2024-11-21T02:18:25.903000
+CVE-2014-8016,0,1,7ebf6affd1944e85f3f18741091924146f1d20fd5d03210d89d764a263a62cc3,2024-11-21T02:18:26.007000
+CVE-2014-8017,0,1,36fe88d9017b0e3c8ebf3901fd65cb2f6537ce4f046eb92f035a6e70ee224ba3,2024-11-21T02:18:26.130000
+CVE-2014-8018,0,1,f75d27f5104141816bec480822733ff4109e91de7d7cb0cfa2ccac86a382f100,2024-11-21T02:18:26.240000
+CVE-2014-8019,0,1,4ab8c018b604234da87e5e60389b5cf14e712589ffae61713a9a169405a31a01,2024-11-21T02:18:26.350000
+CVE-2014-8020,0,1,7488022eb022a640f309bace8108cb3b48b6cfaff36ae3ada66103c28649aba9,2024-11-21T02:18:26.453000
+CVE-2014-8021,0,1,e29e7a36e0ac826e6a4bdf4bd1913a7c8395042495c75b954cd5f93fb567d4a4,2024-11-21T02:18:26.567000
+CVE-2014-8022,0,1,71ebd2af4419a7bd1f449c27f0d7bc52a5fb5af158dd7a4d2163c9a9c7b7be98,2024-11-21T02:18:26.677000
+CVE-2014-8023,0,1,2684c00a7a6c58c699da54dc8f77ea24ff57ae333d5100357a86b22a0c225669,2024-11-21T02:18:26.787000
+CVE-2014-8024,0,1,46278e454bbfdea2146c8133de58ef9e9790a9f8c4619d8d3417a298958dca37,2024-11-21T02:18:26.897000
+CVE-2014-8025,0,1,df894152833deb208596cdb3777df42926a06da90f9241bcae21590cd7cb1e9b,2024-11-21T02:18:27.007000
+CVE-2014-8026,0,1,c3970da0f2dbfb97464e2ab4aebaae0adc3a31d8346ede6991cf59a1a911a2d0,2024-11-21T02:18:27.123000
+CVE-2014-8027,0,1,a7f8156ec19e992cecd32d5e8644bf41fba2e6f75aabb77710f575c80cdc0c17,2024-11-21T02:18:27.240000
+CVE-2014-8028,0,1,84adfba567c3b735b64c253c280144494bd53a46cec8608d5e27d15fd5e3e4aa,2024-11-21T02:18:27.363000
+CVE-2014-8029,0,1,013ad6264c76ff20064ad9d026554510f2de53f981ea200463167a8d860b3632,2024-11-21T02:18:27.470000
+CVE-2014-8030,0,1,e7173d2afe4f7343cc255cf8a27de3b140176e944d585681ed2da61f4adc6c58,2024-11-21T02:18:27.573000
+CVE-2014-8031,0,1,e9519e2430fa0f11ed339a97e588e1453641f31cebba374d58b98f93925b75c1,2024-11-21T02:18:27.677000
+CVE-2014-8032,0,1,383839ba85775d25c9f940ba0963fa106548e4ae55caa35263205893611250c6,2024-11-21T02:18:27.787000
+CVE-2014-8033,0,1,bab94e2447aedd4755efa518dc6004b983fe0dd04e9cf7c1060d50500375e202,2024-11-21T02:18:27.897000
+CVE-2014-8034,0,1,6deb51fa3254ae5e153d7b4f05b4c8ec2ffae3401745548f6fe56552f8f302d6,2024-11-21T02:18:28.010000
+CVE-2014-8035,0,1,70b06bbd46f71bb6093056ffd3d392fcf69170de567da02f427a509d624f1185,2024-11-21T02:18:28.123000
+CVE-2014-8036,0,1,c362d39ad67014b04cba89bacaad5faecfc3c12705339d60ab3d2024a9b8bd48,2024-11-21T02:18:28.227000
+CVE-2014-8038,0,1,5fc195f33ebe0251afa4f2d2cad628c080b555009164ba4e05307e22125dc646,2023-11-07T02:22:07.033000
+CVE-2014-8039,0,1,d89b1c508d2de75c379d48b80a8501ebb4eeef8b659f3c53b9bba3ad840be668,2023-11-07T02:22:07.250000
+CVE-2014-8040,0,1,53ce2b970d77c5aa3566601968d955b04ef249a1173e48d9616a9e26e4fb7e92,2023-11-07T02:22:07.537000
+CVE-2014-8041,0,1,69a58dcb4d5a9f195e642eb67b6b8b6750995954bb983fc0a07893a329973272,2023-11-07T02:22:07.800000
+CVE-2014-8042,0,1,490799524378c861b4a913cf84839f51f7dfbed1747e0c855b40e94a771097ed,2023-11-07T02:22:08.040000
+CVE-2014-8043,0,1,237dff29c00da40f064e124f4827436462a6c96f88c048dd4515d4cad10a954f,2023-11-07T02:22:08.280000
+CVE-2014-8044,0,1,abdb5401fd5ad757efab93b6f2ec82a80050ae69e20a612d17310214ce155559,2023-11-07T02:22:08.517000
+CVE-2014-8045,0,1,8b845fce9b520c4a4db858219eb81be3c8b5f70867a721c0e5c7ab28b6d9597d,2023-11-07T02:22:08.757000
+CVE-2014-8046,0,1,3b7b0980ae11cc18e09e000eba6fe67eb543ee2c8adc4d3d2f8200a9fe18bf22,2023-11-07T02:22:08.990000
+CVE-2014-8047,0,1,275586bab7a1153a04a4cd3b09e919c9d6c2a5a12410122220ec9b3380b2cb22,2023-11-07T02:22:09.230000
+CVE-2014-8048,0,1,ada2397f5bae5712c53b62c622f911e4000229e20e6984c8e02d4db0f193eb07,2023-11-07T02:22:09.457000
+CVE-2014-8049,0,1,13282c7fb8e208c190c88a81df52a6cc2a23c356d1154927f9c16c3f30663f08,2023-11-07T02:22:09.777000
+CVE-2014-8050,0,1,078e47799638b69eb710711e294c74ea8294cb1383969120c44a46f512743a0c,2023-11-07T02:22:09.997000
+CVE-2014-8051,0,1,f80633ee4e40662dbe542db35a89f9be8f39d50a3fac031aeb0f80baf6679314,2023-11-07T02:22:10.247000
+CVE-2014-8052,0,1,6064739037efadee4bd01365d73a614e958285747f519b964fc20c3adcce5c3a,2023-11-07T02:22:10.473000
+CVE-2014-8053,0,1,0a7b9a0c96af575ee97cba4a697850b9242afff68de7456b21836f471b703456,2023-11-07T02:22:10.777000
+CVE-2014-8054,0,1,0e3a09a001a35162878748cfba53fdd5267d8c78395af5d75af9ad3b7c2f622f,2023-11-07T02:22:11.017000
+CVE-2014-8055,0,1,2cf1cf6d9e006f51c30de05fb5fe5d586407c7c9e74563a1a6f880d5b0433050,2023-11-07T02:22:11.253000
+CVE-2014-8056,0,1,37e8e186d23702f574b8af9cf9ba4cd074f36e46cd06b48a5f30b6e99e9f4518,2023-11-07T02:22:11.490000
+CVE-2014-8057,0,1,86979d64b155b5565d730ab5e35357351c2fcbac3f41208955198037c9bc29f0,2023-11-07T02:22:11.727000
+CVE-2014-8058,0,1,fc5138c8e1b797f3019e2ac21f3494973e58ae436a0237a8f1db86a2cc61db87,2023-11-07T02:22:11.970000
+CVE-2014-8059,0,1,186cd1ec316ea936637a2262386439101ae639ff82851ee115125dafefc3c6d6,2023-11-07T02:22:12.227000
+CVE-2014-8060,0,1,042976615478d292129aa60cb4c5b5a7fd6c7b449c5a6284ab09232975b67549,2023-11-07T02:22:12.473000
+CVE-2014-8061,0,1,011b88b23e6f7f31f6712b52018dded555e9a8cee6d611df0f2bbde74c69191b,2023-11-07T02:22:12.733000
+CVE-2014-8062,0,1,d110e6ff69f72e2c57cb57cf21d76e45fa08f089b7c707ef322692f61ffed285,2023-11-07T02:22:12.967000
+CVE-2014-8063,0,1,d056d1e31135a53369013e2e408caeea7c88ba6621485618d3c00de5af958e0b,2023-11-07T02:22:13.207000
+CVE-2014-8064,0,1,7b661ac72fe9a7e06d8124f560acb82ece5643b840a6ca352b3385500ff23290,2023-11-07T02:22:13.440000
+CVE-2014-8065,0,1,a73d4a78e975d6db970c582e3985524c0edcf8a7dcdf3c834d5fa9ea949f1f17,2023-11-07T02:22:13.690000
+CVE-2014-8066,0,1,1cbc15894e65dda83096d69184870b10979c4168180f9a93b31d557d4f425387,2023-11-07T02:22:13.960000
+CVE-2014-8067,0,1,c5825479dd8a8df1678df3496824da30d00141d56f3f1b12739a31cddbd63727,2023-11-07T02:22:14.193000
CVE-2014-8068,0,0,c61e49f2572aa43dfe26bbf6ac1a530910ad866fff920591fe42d5a83610188b,2024-11-21T02:18:28.743000
CVE-2014-8069,0,0,b97a994be920d3abb5f4885002ebb4d39dc1bf0a059fa5f0db69047eb7b198cb,2024-11-21T02:18:28.850000
CVE-2014-8070,0,0,63613e7df76febbae02e776091f854e9efc4565eb8cb8d617a05e938b9396134,2024-11-21T02:18:28.980000
@@ -74029,197 +74029,197 @@ CVE-2015-0573,0,0,d7e1ad6b3a75918e22bd578d64dc3c7ab812405f6be7bb569e80196faeab86
CVE-2015-0574,0,0,4350b8ecc6ea7cd7353ca505ab22645a89fe948eb0228cc4fb5810a5a898b667,2024-11-21T02:23:20.673000
CVE-2015-0575,0,0,82fb4a28dde8c639c23664272618d0b41691fed9373c002a98b417f1ac9d88a8,2024-11-21T02:23:20.797000
CVE-2015-0576,0,0,f6d7f501c7f62735fb7d9cd7a8794467bcf244603c3adfd3779d5bd50a4602a6,2024-11-21T02:23:20.910000
-CVE-2015-0577,0,0,1d384dc5e0b678d2ec649fc5410542c0dfdbfa1e2bff83e8d03aa7a05fc03196,2024-11-21T02:23:21.030000
-CVE-2015-0578,0,0,ceec357593f725a30a649b24a24d23bee9c60cc53e86bfadffcb428bcc89cb4a,2024-11-21T02:23:21.140000
-CVE-2015-0579,0,0,2863673c5243b2cd21fb7c67f6ba1815d8fda3109d0a119da377abf848e94d27,2024-11-21T02:23:21.257000
-CVE-2015-0580,0,0,90aef0d61fb4ea869bbda086b455dee42583e00b4382480b0a72821daa9f5e9b,2024-11-21T02:23:21.360000
-CVE-2015-0581,0,0,308dc484644bad44a6f3fcdcf7bd186660603b8b14d7f0379f0e00326744e8f7,2024-11-21T02:23:21.463000
-CVE-2015-0582,0,0,6a1a6c2d111ddf8b2507e2982ab4096b4eee0a8e01a28e302f6a6668f7ec8c02,2024-11-21T02:23:21.563000
-CVE-2015-0583,0,0,4caae7473729fd9030189edbd04e977d1771976124f9e44eb4aa5e243519a77c,2024-11-21T02:23:21.670000
-CVE-2015-0584,0,0,0ecee08cc03543285655e523ff20416ad4827f0b2787f37800a8af14692e0b66,2024-11-21T02:23:21.770000
-CVE-2015-0586,0,0,128348bab0369f4e6ad488010f212ad9bf5caaa8da36519aff736ba89b3eb2b5,2024-11-21T02:23:21.873000
-CVE-2015-0588,0,0,ab07545d025c8018f9f124ddddf51cc411e18136556bd448a9d27d2e61c5b9fc,2024-11-21T02:23:21.983000
-CVE-2015-0589,0,0,f745ff6f5277bebfe631061d7af3d064d3c020d6b9d080b64db530cd79b2fb7e,2024-11-21T02:23:22.090000
-CVE-2015-0590,0,0,74341bf9bfceb33d9d28aea1606f94160574cb50e8f367484729156428c4947a,2024-11-21T02:23:22.197000
-CVE-2015-0591,0,0,7925631121f7198c94daca15d8bd2e334f99bf027147ff0b15134a07782ef328,2024-11-21T02:23:22.303000
-CVE-2015-0592,0,0,c94396eac0f8008bcdd273c57110d0d11e35958ac9de967a499eb1d5e9854241,2024-11-21T02:23:22.417000
-CVE-2015-0593,0,0,db555097c30171881700c9392263e126a71b60bcb1bfa2b554fd66b49df7ddd7,2024-11-21T02:23:22.523000
-CVE-2015-0594,0,0,051a188fafd0e0932b2617e0b2836be83b535be0e7072ec28de1ab540ae40499,2024-11-21T02:23:22.630000
-CVE-2015-0595,0,0,485da6fa41ecc8f587a5647359ceef4940f3c4803f118e0e5a5981e80744a9f9,2024-11-21T02:23:22.737000
-CVE-2015-0596,0,0,c03a463815f33ad08ef1ece53739780517dd064565a4ffc63ed575701b63e5a0,2024-11-21T02:23:22.840000
-CVE-2015-0597,0,0,250f3820aecc201373bc26181e0a75faf660e4bc6b280ca35978f465701f5d92,2024-11-21T02:23:22.947000
-CVE-2015-0598,0,0,46807df1da114e6461c13d6df9b9f5e7c218074a67e1fe342746ce2547376479,2024-11-21T02:23:23.067000
-CVE-2015-0599,0,0,a779b75dd2e03aacd6547cadfdd7a3cdf8af9916d9fa34da801c0107152569fb,2024-11-21T02:23:23.187000
-CVE-2015-0600,0,0,c377d441d4e0c665eee447aeb22e957de77c05d13710ac93b6b12c8080ca32e3,2024-11-21T02:23:23.300000
-CVE-2015-0601,0,0,290f1d5b0092f947e95e021897946f85663efe8a91eae54e36c445a8998b080e,2024-11-21T02:23:23.423000
-CVE-2015-0602,0,0,74714ff8846ea43f8dca1360ef7b5d1ba2fe19b888c0e3fb8a1bf86d6f6b389e,2024-11-21T02:23:23.540000
-CVE-2015-0603,0,0,2eb652483482fa3c52942d86c528cf3612096e438d1a094bafe2c229ee391a7e,2024-11-21T02:23:23.647000
-CVE-2015-0604,0,0,a6438acf4c25cc917e652edc17ffed9641bf2a3345e0900b69d4c4061c45f89c,2024-11-21T02:23:23.750000
-CVE-2015-0605,0,0,fdb079ae3d57e095d2bb19be39c0609914d228ae2b50f6c8fc99064f3aa7c2b4,2024-11-21T02:23:23.853000
-CVE-2015-0606,0,0,edefd549ae9f6dc63a1a1ed13fb3b24135efdf5f1603746262db0494993ac0fb,2024-11-21T02:23:23.957000
-CVE-2015-0607,0,0,6d34fb245ecf6801aad1618c324fd8ea4a8930c1c51d384e465fb421284c32b5,2024-11-21T02:23:24.060000
-CVE-2015-0608,0,0,6b2c73ca46eaff15e68da6cc84f5d0ff0c58f18f756b1809ce5206d3b93da37f,2024-11-21T02:23:24.163000
-CVE-2015-0609,0,0,8e4bc7ec6e75005dc20885fa563b3560f3963c2a390dd7b675686f279565c424,2024-11-21T02:23:24.277000
-CVE-2015-0610,0,0,a711bd0cdc5c50db9e1a1fb001226b6e5b71f289c205d63af706c9e36345d5e2,2024-11-21T02:23:24.390000
-CVE-2015-0611,0,0,d6f4f238a233ef6ed1e92a8c29ada669856775957861f9bde9f09d20267f0dd6,2024-11-21T02:23:24.497000
-CVE-2015-0612,0,0,670fb25289df221f7f6c3f8e051c2f6491adeae081a88f68b337b88278f28536,2024-11-21T02:23:24.600000
-CVE-2015-0613,0,0,baab9185439b7502000bbacebf9766f36cf2432b116aed956e88b6162be27958,2024-11-21T02:23:24.707000
-CVE-2015-0614,0,0,1a31ae72455edb0a5ab1ef4b20d3b7abe45403ad7e051509e467eac5eae73d89,2024-11-21T02:23:24.810000
-CVE-2015-0615,0,0,257acb7af1b502554c792eea5cae1f85d046f2562d4e1ec11312a8f0caa416a3,2024-11-21T02:23:24.920000
-CVE-2015-0616,0,0,95e41e9e471042b905db5b51bca1a3efe5aca87d46c51228c69668ac52914a98,2024-11-21T02:23:25.030000
-CVE-2015-0617,0,0,981bf0ac5318b62c0dcff30f4dfdd02283d71f79f93065f5b45fda41fbdc4698,2024-11-21T02:23:25.140000
-CVE-2015-0618,0,0,9a3532d18f68b2f234881fb17fd389d9306a8c896fc0b030c5c413eeee2fb055,2024-11-21T02:23:25.247000
-CVE-2015-0619,0,0,4ffe083032490842fbc0ed741b1b59b9e358d2a08117a147b4626b47b32ab9b6,2024-11-21T02:23:25.350000
-CVE-2015-0620,0,0,baf0c020c1c122b2dd874133b4715f3b0038a4e77ba2385c6bb4865dd590b6cf,2024-11-21T02:23:25.460000
-CVE-2015-0621,0,0,e1949ace92cc5a0e06dcaf06f69488b06e0a575445940b3524028b6e30b5c144,2024-11-21T02:23:25.563000
-CVE-2015-0622,0,0,d8155481b4d4c9a4c46b6eb3a5636ef74eb651e7cf476ce40edaca5254f5de13,2024-11-21T02:23:25.673000
-CVE-2015-0623,0,0,c0eb2a8086aa4263fbceedd03b4080742c1ad7f9e308a808ed5485495650f7e6,2024-11-21T02:23:25.780000
-CVE-2015-0624,0,0,c1c4a8d852aed48676ada2117b0028eff7165f555310c64bbf0c4ed5b1e2eda4,2024-11-21T02:23:25.880000
-CVE-2015-0626,0,0,915f1fee0a23d02df6d03a3773e18291a5e632905ebf3f1bf73079be1733a33d,2024-11-21T02:23:25.987000
-CVE-2015-0628,0,0,0263e28106899abe95f917c5ebc0eb61f6c348ba3c431f72ced3045dd5e3bb1c,2024-11-21T02:23:26.097000
-CVE-2015-0631,0,0,231f38a7f2527401881f39e8649ce440d7714b90f13084f498b318df56349ceb,2024-11-21T02:23:26.210000
-CVE-2015-0632,0,0,86164d519fe92e05f66607f8b5a9f817c712b6e3a1531759e4a71b19e696ed1f,2024-11-21T02:23:26.327000
-CVE-2015-0633,0,0,0054daec2f277e45794ee35a27b5f19fb8c95f8dfd2643caf54b63761e22dfc2,2024-11-21T02:23:26.437000
-CVE-2015-0634,0,0,e42a04c6e1985a0ae20d2306d76b6a983b622a6c41e4f5c7bbfef4273ccab0bf,2024-11-21T02:23:26.557000
-CVE-2015-0635,0,0,d292d76da7f5e2a66c93bc070ee60035c1fd7e1ab180f7376184408689abea55,2024-11-21T02:23:26.667000
-CVE-2015-0636,0,0,758b8dd8ce2cb7f22fd1545ed8727b363694aaffa45403d490a2e4a08a2aa560,2024-11-21T02:23:26.777000
-CVE-2015-0637,0,0,1e296432cd9fa55ed29422adca91e2c0de266b28e4a5f72c560d94c9c0d43527,2024-11-21T02:23:26.887000
-CVE-2015-0638,0,0,3bf7ed27000072b34ecef3ee827cdf276d82bcdb22087bcc6678be63edfb9693,2024-11-21T02:23:26.997000
-CVE-2015-0639,0,0,d2f7defe883b6e065798c3b6e461f40b5835876e98e176c0dde66043786d5839,2024-11-21T02:23:27.110000
-CVE-2015-0640,0,0,04dc8c81a579393159a9586d9873a207e99e9f50c81b2c41d41308f87fbf6b72,2024-11-21T02:23:27.220000
-CVE-2015-0641,0,0,8c83b9f972eaa6e938a0fadebf18ab95e3a6307b04c05a455108dcbf759da8b3,2024-11-21T02:23:27.337000
-CVE-2015-0642,0,0,ddb7a64aa69fb48df25ffde76a15a57b3e5899d11aff4c18a33c8bd7a10bdb80,2024-11-21T02:23:27.457000
-CVE-2015-0643,0,0,79f4ffa2bfd28da9e34576704b9cd7fd6fcf9a2188208f150b4d90df546eac9e,2024-11-21T02:23:27.583000
-CVE-2015-0644,0,0,e3c0fd4ceb4723a299dde4af707b929ed0e5296c30ab3e67cdba3bde23559ccd,2024-11-21T02:23:27.710000
-CVE-2015-0645,0,0,22f21917dd2a1e860cc8a7bd201df1da327906ece832f4913e040e5012676c97,2024-11-21T02:23:27.827000
-CVE-2015-0646,0,0,3bb996967ec0c98eb4447ea74475886f53fc3300b48307e64f1f1db324a741ab,2024-11-21T02:23:27.950000
-CVE-2015-0647,0,0,bd20cdd05142f27a7c44b307eb344fc5c50bdc118192857ceef43b9153bd76c7,2024-11-21T02:23:28.063000
-CVE-2015-0648,0,0,a4d90a6713eeba61cb592eb2e694b2d30ad5bcc89b65e60d52cf8478e8e4558c,2024-11-21T02:23:28.203000
-CVE-2015-0649,0,0,543cb0739195d9036cb29415352b5cbe36fd912baec67778d603d4e17d28e041,2024-11-21T02:23:28.323000
-CVE-2015-0650,0,0,a874ae9377d98c33f0e450a597d945976bae47b63f98f30ec31dd0383a0e6cfb,2024-11-21T02:23:28.430000
-CVE-2015-0651,0,0,df0af991ca5ecc19df4c3ac87cd594f811a256a65fba17321a3dbec8504042b0,2024-11-21T02:23:28.537000
-CVE-2015-0652,0,0,a5bcc2db37637703ec82c2875a4b2e07dfe5b121a9d2c2fa4fbd3566b3901b53,2024-11-21T02:23:28.633000
-CVE-2015-0653,0,0,ec23b78809e62fa667de1b9a8c78d73604e19d12c18453698293b4528c92aa84,2024-11-21T02:23:28.730000
-CVE-2015-0654,0,0,8b891a7a0aa3076d20d52a2eb2397ce78ada62e3e3a1887cacc8dd589830df9c,2024-11-21T02:23:28.830000
-CVE-2015-0655,0,0,ecc8a0fb462b25867517952b7df43e21aaa06b78e15edf76ce8c6b2e76635d1f,2024-11-21T02:23:28.920000
-CVE-2015-0656,0,0,f30b1560b722f178a43386a0fbddf289bcfede21a0480b8b5db00b020b4eb992,2024-11-21T02:23:29.017000
-CVE-2015-0657,0,0,2c05fb4d249ef854467f426a67b0246a30253b1b85a2095cfbb63cf18c6dd28b,2024-11-21T02:23:29.117000
-CVE-2015-0658,0,0,62e8c7b87de671a0b2bd55d894ea431e0c481c6188e9eccf37139ce755e703f8,2024-11-21T02:23:29.213000
-CVE-2015-0659,0,0,d923a1019ce590eeadbeb45e786946b28caa70c0b61e1fcff63efbe78ed69bd9,2024-11-21T02:23:29.320000
-CVE-2015-0660,0,0,4760b79f7423a8ede90f77f10d40f649d10ea56572f0958d7723132bdcdc5aeb,2024-11-21T02:23:29.420000
-CVE-2015-0661,0,0,c96d320393b218f9edf2fab0f42727b82d64f1d1a7bdede9c26fdb57b2a93f6f,2024-11-21T02:23:29.517000
-CVE-2015-0662,0,0,a57825d3554c4b4054ae42d31fb1132bc8220cc70cdf576bb89a1900b66d7048,2024-11-21T02:23:29.610000
-CVE-2015-0663,0,0,7f1e5ced311ceab5890be7c41133d8a2bc852b9a7a60837f20ad594aea5a7445,2024-11-21T02:23:29.710000
-CVE-2015-0664,0,0,7ab9cd3b0b1b63eb79ee261d41d958e1b92b01fc1e5497d37e26b677005ff147,2024-11-21T02:23:29.823000
-CVE-2015-0665,0,0,8b1ae2ca7ed80cd1cab25403ca8ee4b47840e5a16e003f24fcddda97570994f5,2024-11-21T02:23:29.930000
-CVE-2015-0666,0,0,143b6e4c9099d99fb2fc73f7cb8113d846df6bd2de7bb19aab7f2e651cb42ded,2024-12-19T19:12:51.923000
-CVE-2015-0667,0,0,60273adc019196332b6e5252c0affbd93150adfa6fdada50b811fd0e4c41830d,2024-11-21T02:23:30.150000
-CVE-2015-0668,0,0,06feb8279d159051cf6484c2291547f5306d63efdb68de0cebf6f2f904a24ca1,2024-11-21T02:23:30.253000
-CVE-2015-0669,0,0,ba9bfbccc5303974142c2d1244dcb9a4b8800c6d34932e6f83525ff4eeff942b,2024-11-21T02:23:30.360000
-CVE-2015-0670,0,0,734cfae6a2036bf7b84e42aea2bebeb4d618fcae85e1244a3f0a3f585a23deea,2024-11-21T02:23:30.467000
-CVE-2015-0671,0,0,47bec77ebf1f56be65a9abb51e4b7346bbb3e4fc833242a90366e2dd01fcf913,2024-11-21T02:23:30.570000
-CVE-2015-0672,0,0,4878d5540c6d1292e2c1fba48fcd76a56266c1a34bfa21f59fe73ad6d3f57991,2024-11-21T02:23:30.670000
-CVE-2015-0673,0,0,72480fc4aa201bf2c90c390cc7a1ac370b8f944a1aab5f2d198595a24bf57bea,2024-11-21T02:23:30.773000
-CVE-2015-0674,0,0,933c14e7eb7ded3c84b4ee934436ef60159f60127a0b618087868f6c7c41f599,2024-11-21T02:23:30.873000
-CVE-2015-0675,0,0,dbed78d071c44205d6ff5206f72b43212037fbf0dddfbc9996bbfdd17197e2a4,2024-11-21T02:23:30.980000
-CVE-2015-0676,0,0,a35ac42a80079ea9d35ceda84592541ce1846547fbc827f161804717a30cd577,2024-11-21T02:23:31.090000
-CVE-2015-0677,0,0,db8035fba1aa59597a4ad33081da5ab946faa6b25fdf6aa17cce167a281a3055,2024-11-21T02:23:31.243000
-CVE-2015-0678,0,0,dc765c9a48d6d43ae64b328c076a878d6db89bf2a31c6b942051c71c58b2c6bf,2024-11-21T02:23:31.367000
-CVE-2015-0679,0,0,4ca14193dd521fc69524a542cebcab1b71dee9253fd0bfbb12be214564338f4b,2024-11-21T02:23:31.480000
-CVE-2015-0680,0,0,c0954409a8aa7db01d46f01c425c364f758ef8325040336983359a2fb2d3cb42,2024-11-21T02:23:31.583000
-CVE-2015-0681,0,0,d883356148a04fdb124d84e2306c00e694ea9f53bd130913f0ddb70ecbd0eb48,2024-11-21T02:23:31.687000
-CVE-2015-0682,0,0,760895c2b357a2595b3da80b21e2019ac07d1287172520737d67590eaba6dba5,2024-11-21T02:23:31.810000
-CVE-2015-0683,0,0,9549b8717b84f4c773b61ef51342a95e2b3127863e87ea1853e9085af301efd4,2024-11-21T02:23:31.910000
-CVE-2015-0684,0,0,155616d3b1a0b52d0d5079b303fe3d44063c75b5d32be41566b866fc4fabec43,2024-11-21T02:23:32.010000
-CVE-2015-0685,0,0,979ef80e7c5eec551d328ceab5453bff657aaefb593d0c8cd222a52e28b30775,2024-11-21T02:23:32.110000
-CVE-2015-0686,0,0,6d3baa7bf87a21f55aa808ec23622c579f3285a7846121cb5a6bd303f873c444,2024-11-21T02:23:32.210000
-CVE-2015-0687,0,0,da459e4f6af93e68c944c796760626234b241ebd68ffebb43b1422d3d54372cb,2024-11-21T02:23:32.313000
-CVE-2015-0688,0,0,64c7375d671ec722f92af54bef46f2e6cbd1acf4a9397e5d1406a231bd894961,2024-11-21T02:23:32.420000
-CVE-2015-0689,0,0,b15fb307e0bf27b2e11f9a984d8825ddf07d3f5b136265664d2255ea94d4c140,2024-11-21T02:23:32.527000
-CVE-2015-0690,0,0,3bc95c6521b9cc5a1dc46b9c69775b9f2f14dc29445440b46c694b95f7893837,2024-11-21T02:23:32.647000
-CVE-2015-0691,0,0,3b28d9bb7299599a21f3569cd25ca4d568d20add225ae8a9f0235492ce86b057,2024-11-21T02:23:32.760000
-CVE-2015-0692,0,0,1ce1e66338ed25fae89109e281b3747b4b196b21cbd254deaa56426adbcc3356,2024-11-21T02:23:32.880000
-CVE-2015-0693,0,0,70bc55a1b915a56a3409816f3af4590b47298ba0d88629edb5934c797b4b63d4,2024-11-21T02:23:32.990000
-CVE-2015-0694,0,0,ce0e7b13f0a17dd1f880e1f649f0be7df0400c81ab882664a28f1ada59a16b80,2024-11-21T02:23:33.090000
-CVE-2015-0695,0,0,b5d0b999136d7c7116ef57d596978a1ea502b333ad773e5a37f6de4fd273a87f,2024-11-21T02:23:33.193000
-CVE-2015-0696,0,0,723475ae4bcebcaf795d3df3519bb5d9199d133e69112a67a933a5fe565cd793,2024-11-21T02:23:33.337000
-CVE-2015-0697,0,0,483e74cd6ae24969bc723cec84b53165265e5c55d8b4241c44227b119200e7f4,2024-11-21T02:23:33.450000
-CVE-2015-0698,0,0,92c3d77f99cce2360a25286cbc47ce5c92af9ec081a1d90046393513a1ae17d0,2024-11-21T02:23:33.557000
-CVE-2015-0699,0,0,35fcf4a4f720cdfb85f4bff9cbf05ba9388203a145e6ca7f14b305fb0956f9dd,2024-11-21T02:23:33.660000
-CVE-2015-0700,0,0,4d1ab04488387e7c9b1b7410e4f1e00207bf4475c34f6c9b77b0d2cca0b04493,2024-11-21T02:23:33.760000
-CVE-2015-0701,0,0,3c97ad681f72f87b150fdcb242a8ebc3a2f4177127e0e67e10ce1838da97b9ad,2024-11-21T02:23:33.863000
-CVE-2015-0702,0,0,801d408c56a0fc4e00be9b131581f9cc53673926df0b62a2e36f4eb5b1aa1363,2024-11-21T02:23:33.963000
-CVE-2015-0703,0,0,ba8b111553891aa4939172acb5a467856e761951b3a21d52a501038cedafc759,2024-11-21T02:23:34.077000
-CVE-2015-0704,0,0,4b901a6ce9f0e3b4b69107dde3c67ec83d83901e975a805f17ec9697447bc9ef,2024-11-21T02:23:34.197000
-CVE-2015-0705,0,0,dbfafad5944e6e13b1fd28caac9e3828eec5131e20804cf534a9e66cf80a8795,2024-11-21T02:23:34.317000
-CVE-2015-0706,0,0,0d760902be0cad70e01619191bac3c9e74d48637d331c33aa4592a073fc4d64e,2024-11-21T02:23:34.430000
-CVE-2015-0707,0,0,8b0bfb1ab3e6ba1f26254d2dbf9aadf458f6c4cc9c046827b6fd0f98dd53300b,2024-11-21T02:23:34.537000
-CVE-2015-0708,0,0,7562b07fdc90d84a4b279d22f2cedf22a3160e36f24da260b6acca3473b5fe8f,2024-11-21T02:23:34.637000
-CVE-2015-0709,0,0,6696269f22659ccd57377088d07230d3be396c9e2c8dd21eab80b7d680ad3dde,2024-11-21T02:23:34.743000
-CVE-2015-0710,0,0,da7f1a7d46276e9dbee096f552e369134726d232503d135f645899352ab62965,2024-11-21T02:23:34.853000
-CVE-2015-0711,0,0,0184f0092100f50d22bac6c5b0b3f02c813a1b07249a219e3e366438fe95c2f3,2024-11-21T02:23:34.963000
-CVE-2015-0712,0,0,f5b3d2a5e12f1325ede7120060fed6c88429c8e08e70e10b33be06a66b4dfe08,2024-11-21T02:23:35.080000
-CVE-2015-0713,0,0,38a6b01f93996dc81ebd205853a5bb9b658e7b7e05a442e14bd6140d0385bf7e,2024-11-21T02:23:35.193000
-CVE-2015-0714,0,0,5e1d03e94b2421204aaf99f7b1f36585766599b08da15ddca0bac8c0c5568524,2024-11-21T02:23:35.310000
-CVE-2015-0715,0,0,70b8c7d446139cc774a0a77dea8bbe47580054a96d57dfde044be6d1381a5b8b,2024-11-21T02:23:35.410000
-CVE-2015-0716,0,0,77b74c856ca4bbaf439814b8d58ff9892507558e88954a496696f31ca240b94c,2024-11-21T02:23:35.520000
-CVE-2015-0717,0,0,7ed9ef513ce57d004bfe30297c2fd980ea0e2bd5f3ba19347948af97d3788155,2024-11-21T02:23:35.633000
-CVE-2015-0718,0,0,90aa8fe74132d2e963471ed4b408301ea77503a5f9df3c931655eb68909b1396,2024-11-21T02:23:35.747000
-CVE-2015-0721,0,0,9acf54b363e031dce9e4c6349c164588d84e1675ba8a758efa082826d6168758,2024-11-21T02:23:35.893000
-CVE-2015-0722,0,0,14ec2ea042df653cd71c4c343b293acab3370c184e97e03cef454c6447dc40da,2024-11-21T02:23:36.057000
-CVE-2015-0723,0,0,c6d49945af32711e5ae8701811992fa633d97d6b8f93cf7ff357688e6871d617,2024-11-21T02:23:36.180000
-CVE-2015-0724,0,0,7e9675acc0e013194df46e1072ea12aa0febe7b8f3994c7a11570d8cda015eb7,2024-11-21T02:23:36.293000
-CVE-2015-0725,0,0,4495da88342ae6796a4eaf9d54c8e1004f83095176c74bff669a4b18e219d54c,2024-11-21T02:23:36.413000
-CVE-2015-0726,0,0,8cd1c4b837e61712871aeab1a1eea4fd9d9f4d253b35446ab8ec58842780a754,2024-11-21T02:23:36.530000
-CVE-2015-0727,0,0,b09079e7bdbc0b927b1852ec0c65bd0a8f077b11efacff4fc6728bbf4bbad532,2024-11-21T02:23:36.637000
-CVE-2015-0728,0,0,8925b367627c836c9df1c0e4b33885bb69a239b0b899f4ba0a0104319a1611ed,2024-11-21T02:23:36.740000
-CVE-2015-0729,0,0,49d5285a6ea50b04c6dbe49233e4eb1ab7c522546bfc592b48a57d9e76df1425,2024-11-21T02:23:36.840000
-CVE-2015-0730,0,0,43b979b5dbfd94c204509bd00aafc9e2f31cafeddbaa6bf7944b12cebfa22c27,2024-11-21T02:23:36.943000
-CVE-2015-0731,0,0,18f22c642be69e7e26d6197754004066d55073809cad8b67b8378d8ab208cf70,2024-11-21T02:23:37.043000
-CVE-2015-0732,0,0,0a8c8bfef308a3aebf062643b3fb5ea2bdcba6541914737b0df173d59bfa40d9,2024-11-21T02:23:37.150000
-CVE-2015-0733,0,0,2d07db98b623bac21ccc94493127e5dcd4029cd0d3252ed58cf9b7f65abc7254,2024-11-21T02:23:37.267000
-CVE-2015-0734,0,0,c2f3271db3b4dc5381acf9cd896ab63c6698e466ea6eaad82c79a80b538e43e4,2024-11-21T02:23:37.377000
-CVE-2015-0735,0,0,edf81e15cc72f362ae4ae04899ea23e2da6a0cb008c074f5607048349243d150,2024-11-21T02:23:37.480000
-CVE-2015-0736,0,0,c6067265096b0a96a46350a29361d3045ed859ef63cf57a2318ecbf486299a56,2024-11-21T02:23:37.583000
-CVE-2015-0737,0,0,1085c83ccb956690a3829cca1674199278d007f3e867209a9f71bdd0eac8533a,2024-11-21T02:23:37.683000
-CVE-2015-0738,0,0,496f6e976f0c18adc79875af62ae6d3776f4ebd15ddb1b72bc34e8305bb85f71,2024-11-21T02:23:37.793000
-CVE-2015-0739,0,0,9df16cbd4a0ea8657a7036fbc583d2ecf0e2c2932f5de9a846b94b4a942e6879,2024-11-21T02:23:37.900000
-CVE-2015-0740,0,0,a4d3b32cd444ba1b12c24601b480e5f3502c973c595f32b377320547cd54120a,2024-11-21T02:23:38.010000
-CVE-2015-0741,0,0,eaaf848ed7e3d93c2cfc434e784e6e6967f26d616cb0b74a8e0ffad69ec7bae4,2024-11-21T02:23:38.117000
-CVE-2015-0742,0,0,73b8e09df4b4ddc2e50eb677f8ec0796341712799a187cda938ef5bdc748c89e,2024-11-21T02:23:38.227000
-CVE-2015-0743,0,0,51d32b06acf6bbb040dd1ea22c29ed88c79d1356d5aaf5b7c033c4106f94575b,2024-11-21T02:23:38.337000
-CVE-2015-0744,0,0,e35074d5b24e5e1c4e66c3fbfc741a1f2d9ab5efd8888b05041cf3fdf6a58a3b,2024-11-21T02:23:38.467000
-CVE-2015-0745,0,0,650e05879761fb14eecbb7beb622ed0a46cb6068a6a2ace827c8415cf76f004b,2024-11-21T02:23:38.570000
-CVE-2015-0746,0,0,722689e281d373fc6e3c4d130829abd2f52e3a7f2ad612c4cd0d6a15779bd832,2024-11-21T02:23:38.673000
-CVE-2015-0747,0,0,c659743d9d7af7d71a4d82b1620f1dfc6ddb7c520e62107799a0c5d9966fb4d7,2024-11-21T02:23:38.777000
-CVE-2015-0749,0,0,80ec9dffd613a58e618638315f4690435c679d93163a2d2b076c1e8ca78c9dd7,2024-11-21T02:23:38.883000
-CVE-2015-0750,0,0,2e6f536ca3ee6ae7c6f62329303c9a2338b5ad8bf46b1cc12fcf3e5429243af2,2024-11-21T02:23:39
-CVE-2015-0751,0,0,ed77608778528df1c8e25e850afc9d70cfe70fb612352384c5b0a38d87dbe39f,2024-11-21T02:23:39.100000
-CVE-2015-0752,0,0,d54131921d919a773a0fad548a5ad38f51c7f8c662f9dda44f26699b07acf77f,2024-11-21T02:23:39.210000
-CVE-2015-0753,0,0,6cf3da6ce2e1a0f28f82a870f866b0e66c3ecbb0d00a77a3439f1f2350511719,2024-11-21T02:23:39.313000
-CVE-2015-0754,0,0,2ea664906c328807c1db2d9c4d51a8f5d8725edb84b32d44797cf9abb40f3aa4,2024-11-21T02:23:39.423000
-CVE-2015-0755,0,0,ef545784621b85473ed44ba072a4d77ca1cd763d14bc8bf263c4c491359a034b,2024-11-21T02:23:39.530000
-CVE-2015-0756,0,0,61f0c000d1fc5bb3a4c817314cdb94b0e4f8306e47ef5137154dadd158c01bb6,2024-11-21T02:23:39.637000
-CVE-2015-0757,0,0,2e04d6a32f63b0521e97f65d01c048433ccd9608bcc88638c15d9b0d475bed32,2024-11-21T02:23:39.743000
-CVE-2015-0758,0,0,f6c138f47a2e5bf31e3b1102821baa6e2234a77579e1b7387cf9416a659028fd,2024-11-21T02:23:39.850000
-CVE-2015-0759,0,0,c8f6187b1fb3daa780b83259593f46bf9b3d0ee58f7569af73cd8b5b7e19b988,2024-11-21T02:23:39.970000
-CVE-2015-0760,0,0,98124aa4b7345ff7f2bbae9f8b42e8e1bab9cd1e0434a38b5270c9e1861ec090,2024-11-21T02:23:40.077000
-CVE-2015-0761,0,0,175b87bbed7be1100535a3ab5004897227a5d50b1c0753c79206e1c5901e7bfb,2024-11-21T02:23:40.190000
-CVE-2015-0762,0,0,8a61677916e560f784b5572174aedd137b45765b1bbf0202157c045c648b0844,2024-11-21T02:23:40.297000
-CVE-2015-0763,0,0,c0ff055ea2bd0c3c3627c4e2ee70e8c6a78002b69eb55767430d5d0dfc5378a4,2024-11-21T02:23:40.410000
-CVE-2015-0764,0,0,558dd55c76ff1f378cbe3a52031e3dc52643798ee0c34322e1d20fef6de32099,2024-11-21T02:23:40.520000
-CVE-2015-0765,0,0,b3bdffe1e28324775e1396c9d0005891c5aebb58ca9c1e77a4b423938b4f3b65,2024-11-21T02:23:40.630000
-CVE-2015-0766,0,0,6ce3e12fc2acef196f011dc6f956b99e8d66c9c401532b8ebcd3d69cde105719,2024-11-21T02:23:40.737000
-CVE-2015-0767,0,0,84c0b636fc31e7cad3e03e7ed49fc3042b891b9d1061bf9dd6638d9a22fd71e8,2024-11-21T02:23:40.847000
-CVE-2015-0768,0,0,90de684ff7fb305e6eb63b8562d39ec791bec1e86d74ccea9ba79f201d1b0b32,2024-11-21T02:23:40.957000
-CVE-2015-0769,0,0,ef79628b9905608d9936a0e57e347c0387708341029d42e4dca168cab22ca1c5,2024-11-21T02:23:41.070000
-CVE-2015-0770,0,0,2f78cb67236b08512afb4b243148abeea6c90f4e4260412d37902a8c4f7358a6,2024-11-21T02:23:41.200000
-CVE-2015-0771,0,0,fd11bd8a68dd6acf778123d3472261fc74faf219c6721fa4cf79741edb99d145,2024-11-21T02:23:41.323000
-CVE-2015-0772,0,0,0395f4332be99a21413b5b8a0d10efdc935e63084a3ad76b18450f408b2d68f9,2024-11-21T02:23:41.433000
-CVE-2015-0773,0,0,cd51270fa4888a54069ef0932db878c36d7ec59517580d56977b3650d5465888,2024-11-21T02:23:41.540000
-CVE-2015-0774,0,0,704a05b47f5dfbaabbde620fd20bb05fd0ffe8c9ccc582440d4b72da69293624,2024-11-21T02:23:41.653000
-CVE-2015-0775,0,0,e77679a578959a73db0e80b94dda1c6e2680026280f3a78191f49c78bfe3f436,2024-11-21T02:23:41.770000
-CVE-2015-0776,0,0,7692fef09bdf416f3e742a66c7c83e4b72ab09f2d6a2e493938ec8616d8ff5f4,2024-11-21T02:23:41.890000
+CVE-2015-0577,0,1,d21dbeead3467a69ec4c003ccfbb9a24a4b0b3e6f942ec332da2f6d5af2a3c6f,2024-11-21T02:23:21.030000
+CVE-2015-0578,0,1,8401e1dfe614e99badbbbfa56e67f6ae635c11c609fd563cdecce5d47a4227ec,2024-11-21T02:23:21.140000
+CVE-2015-0579,0,1,4da1272a34bd5ae1275240af731a3ee5cba6dcfb8ca4f7a4e00dbeddafbcd23b,2024-11-21T02:23:21.257000
+CVE-2015-0580,0,1,eb220bb5491afc8b6f96757c4370ca01d482acd656cad9ca873475c79f4aebeb,2024-11-21T02:23:21.360000
+CVE-2015-0581,0,1,8b35cae5c58088c5f24df1e0376693ca30c04ccc2e5fdd98d22bb208905e06bd,2024-11-21T02:23:21.463000
+CVE-2015-0582,0,1,4894252addb99d9d8f95bcd271a5117dc116d944c3c99292e04e8f826789bb93,2024-11-21T02:23:21.563000
+CVE-2015-0583,0,1,ed01af6fafbf28032301e5384a8b6fdcfcb6608a6b671dd148176b8b46d7fe94,2024-11-21T02:23:21.670000
+CVE-2015-0584,0,1,6e61cf4980cb21e6925359aca000e9205ee251b92c9000fd22914efef318910c,2024-11-21T02:23:21.770000
+CVE-2015-0586,0,1,7d68d5786cae6f47a0a06fdbeff1391f95df2b275ca6b39892c5172eaa293299,2024-11-21T02:23:21.873000
+CVE-2015-0588,0,1,1cc458c84f6da5efbb2c6dd97363004ca02873ac92aa4023cd3b9e746883b256,2024-11-21T02:23:21.983000
+CVE-2015-0589,0,1,00e46c85fb547f40e83be12602ee3b8815008f2c84098f5ca00945a255e9c77c,2024-11-21T02:23:22.090000
+CVE-2015-0590,0,1,cabacf6cf77a46679b9c654d84b7dbb37242525656847fec17d1f48fb238d2b2,2024-11-21T02:23:22.197000
+CVE-2015-0591,0,1,46e9fb5ad0aa1415dfb021f685132a5acbbc3402ac4a0ace2754461a261c2b39,2024-11-21T02:23:22.303000
+CVE-2015-0592,0,1,38d00f4eabf0f7ff2fb3f732b061ee60fde6cf02175ef3e5fd03d1d0a2200844,2024-11-21T02:23:22.417000
+CVE-2015-0593,0,1,8677dad130c5cdd164a3c373c5195c6b4f4eff04cb9d8e9569e06cb111dc1076,2024-11-21T02:23:22.523000
+CVE-2015-0594,0,1,58d16639cdb4717fe560b891715911e39c5a4896b97d48d37c51fdda2104bdd4,2024-11-21T02:23:22.630000
+CVE-2015-0595,0,1,ac8bf1a69f670810f87a43fd454f38e8d85183686180f34508cf23e4bcddfb96,2024-11-21T02:23:22.737000
+CVE-2015-0596,0,1,5995ee07e2a8134fd6ff2d5d7e44e609fd219f29d3329d378f0b6fe4b0e73d91,2024-11-21T02:23:22.840000
+CVE-2015-0597,0,1,166d62ff5d04eb08f7274cd1ab5894b40a402790c5641a7b5d657150d60636dc,2024-11-21T02:23:22.947000
+CVE-2015-0598,0,1,65bb70a98b5eaeefbf943da7c98dcff20d96666609f0ebb98fd4a40fb2be6bee,2024-11-21T02:23:23.067000
+CVE-2015-0599,0,1,add4e3a5519857fa988f5befd3ec8d7a08d2a1570ff9f1228cc3864c729abf6b,2024-11-21T02:23:23.187000
+CVE-2015-0600,0,1,2e788605289a05343131656baf34feab6c5b77904727a991c0c24bef4e999eb1,2024-11-21T02:23:23.300000
+CVE-2015-0601,0,1,40e5c2fd6c16437f628907c4f6a2f6259df9e682cd0a44030c45ad75355ab921,2024-11-21T02:23:23.423000
+CVE-2015-0602,0,1,132c7cc4be9941683f4f1536bfc93bf01c5c4faca58b77409d0dd62de61b6794,2024-11-21T02:23:23.540000
+CVE-2015-0603,0,1,ed50e00a54178ff2426b8f9703ebe5865d8ddad0c0eee960903dced16607747f,2024-11-21T02:23:23.647000
+CVE-2015-0604,0,1,8b7817f927afe4e1c48fa5a24d6f5c0c1aa0f16cd8ca503f6ec61a94283fc029,2024-11-21T02:23:23.750000
+CVE-2015-0605,0,1,73390b9e22d23d0150b6628095a4a2f30160deb97d8dee5ec4601e2c2aca6460,2024-11-21T02:23:23.853000
+CVE-2015-0606,0,1,30051d559bba96629633b70504457fc5094f1e07315078844883d26180f402aa,2024-11-21T02:23:23.957000
+CVE-2015-0607,0,1,ad1cc776c5e7b82268ab9bdf6074be1ab7b63c05d1cb267ca56be98c26179620,2024-11-21T02:23:24.060000
+CVE-2015-0608,0,1,213029383bed8a2467d780923768d0f7e301ce515a18bd56c3404a421c43dfc7,2024-11-21T02:23:24.163000
+CVE-2015-0609,0,1,72a6114c6ab91900f0d435ad9dac3398f59877b52f498c2075265f64c486e27b,2024-11-21T02:23:24.277000
+CVE-2015-0610,0,1,ef854dea7b614ee03a10efab6294091656de404543731c2c72e70cf64976bcf7,2024-11-21T02:23:24.390000
+CVE-2015-0611,0,1,aac975d26f8e2d19501be8a63060930c040a5edd5d177e52479d1f0afee17a57,2024-11-21T02:23:24.497000
+CVE-2015-0612,0,1,1f18da504b479e8710184db4b9fd0650e8ba5817745dd41392f04d0b24120bed,2024-11-21T02:23:24.600000
+CVE-2015-0613,0,1,221e5631a6c9d6aee930d186c12c3fcbc52acd67e9ed9cc1d710339a24cd8919,2024-11-21T02:23:24.707000
+CVE-2015-0614,0,1,0822551f3ff50a3aab7542019edae5b18558d3c68665feb75c91f2acc4ccd7f9,2024-11-21T02:23:24.810000
+CVE-2015-0615,0,1,54e58c3846096cf8cc6ac11d5f4fa526ce5bc6c6c7d6bbf266589acccde24a36,2024-11-21T02:23:24.920000
+CVE-2015-0616,0,1,5d0f6e4d803e90c5dd3c6df36df63c4cabe4d8ea6c3335e46c4040737238cc6b,2024-11-21T02:23:25.030000
+CVE-2015-0617,0,1,03f7d02d61e6dbb15bc67c0fb9d1f503e15703a980550c0f014f050ec0987bdc,2024-11-21T02:23:25.140000
+CVE-2015-0618,0,1,6dd76acefe86a2b3f445129a91fe0e540047718b9aec64dd5ee1a56eb336cde7,2024-11-21T02:23:25.247000
+CVE-2015-0619,0,1,43eadfee44adfc236c59dde370f6c91afbb282610145b5f343f875acd010fc83,2024-11-21T02:23:25.350000
+CVE-2015-0620,0,1,33275ce21a96b186d5cecdc4d9c53cd67b8dec71b8cfad69b73cfc59fb1ccaaf,2024-11-21T02:23:25.460000
+CVE-2015-0621,0,1,aaf5dd6a76262a7f34b1a04bd7357166f72bb134fd66bf6f631766816a4808d2,2024-11-21T02:23:25.563000
+CVE-2015-0622,0,1,a2cd495aeb0df176962ec3f33008348abb8ab21f4b9a2a596511516adf07d73f,2024-11-21T02:23:25.673000
+CVE-2015-0623,0,1,8ee6cc981c82f5e04a761bbd43c887e7fda1405b39ac52fc9aeaac1354aa9bb7,2024-11-21T02:23:25.780000
+CVE-2015-0624,0,1,5bc94cabe1c1edf1a42cf89fc2a1abf10d37dfa01c35f5b8f6dc4676ff99a516,2024-11-21T02:23:25.880000
+CVE-2015-0626,0,1,6405a3022d0f431c5f18027676f66b864f7a451bb1faaed3e12f8d101558df30,2024-11-21T02:23:25.987000
+CVE-2015-0628,0,1,ac571356e2daf75383fcfe952101dd06e8f8095e9669fd3c4f81653e1a1b13ad,2024-11-21T02:23:26.097000
+CVE-2015-0631,0,1,4eedf1756217a4546a0957111cd230702f54c0ca3bb34f933af2b3061b80aa1d,2024-11-21T02:23:26.210000
+CVE-2015-0632,0,1,a39971c86fe9175c2822e6f87566829e01141e0c0986e56449d9deb35d36f2be,2024-11-21T02:23:26.327000
+CVE-2015-0633,0,1,29082ee5ef13ebe2c3db1671c6bc52b0af26a2084d89635547c50e7d7ea590bc,2024-11-21T02:23:26.437000
+CVE-2015-0634,0,1,248da1e41195e74902df323e2df99b30c9d9c0dc7f33a9b551ad8bf6784ed16f,2024-11-21T02:23:26.557000
+CVE-2015-0635,0,1,fc3b0f2c3c63b52af418859843b488b1571401bc2d07f61b67dec2630247dc91,2024-11-21T02:23:26.667000
+CVE-2015-0636,0,1,9e7443acbcf0c0c32e407a3f1e498932442b40d4094a49e40ceb7701c2e6b109,2024-11-21T02:23:26.777000
+CVE-2015-0637,0,1,14a01ba2c7150e208691793f756640a7abd247d4e5406ef5ea57dd964dd12dd8,2024-11-21T02:23:26.887000
+CVE-2015-0638,0,1,91f817000b298fc586056d079d3feef666dbef1b4c71b338567af9f461f8c914,2024-11-21T02:23:26.997000
+CVE-2015-0639,0,1,7b89301a015bd57f9c5ab5e14cfd89fcf1b2fc2794ed3fdeda0f1bf45c015642,2024-11-21T02:23:27.110000
+CVE-2015-0640,0,1,092b4b9e45aa29422c7c8ed0c83bf9d3bebeee97f1e6267e4ebf9be014537679,2024-11-21T02:23:27.220000
+CVE-2015-0641,0,1,f2073750924fd02bf598d3963b623625b0d0aaf2a675671e6c032cf427024f79,2024-11-21T02:23:27.337000
+CVE-2015-0642,0,1,7f49436f3a1f31ef0779dfcc254c8a04a66c01fdd63bbb23e4760bfc5e9087c8,2024-11-21T02:23:27.457000
+CVE-2015-0643,0,1,3e3a4fa6fc944a2627d76eb5a832f70814eb7241e8d0c4b00853d828975d729a,2024-11-21T02:23:27.583000
+CVE-2015-0644,0,1,df37f1ab046006cd234eb5b2494d1895da556774efa4eee7335b0dc1ccf6415e,2024-11-21T02:23:27.710000
+CVE-2015-0645,0,1,216a418371e4cb32e926810de02b42cadd08f75ed804ef7c5798d545c17fa0b0,2024-11-21T02:23:27.827000
+CVE-2015-0646,0,1,805aff6154783e7f7c7a0bf77e19edc50ae69d1a536290c8dd86838c06b6afa6,2024-11-21T02:23:27.950000
+CVE-2015-0647,0,1,1466180b2af9f0c502c6759718f14a8cebdca515a7474e7501ff7dceb16fb539,2024-11-21T02:23:28.063000
+CVE-2015-0648,0,1,c663e175b532af04dc33f18e41634212819733d1967c8b30e8becc7cbd8cd56e,2024-11-21T02:23:28.203000
+CVE-2015-0649,0,1,d1f89e34caadd185feb39dc74f1467936a832bb452f722ef184cafdf8fe62dc8,2024-11-21T02:23:28.323000
+CVE-2015-0650,0,1,c384264cac4c11dc72f2a0e51a337cd7d3997214812d0941f32816c302bb743f,2024-11-21T02:23:28.430000
+CVE-2015-0651,0,1,2dd75965bcad5a2c59a7ea462f819bcb7bd0117f656eb997d4e2beab17c0d4fb,2024-11-21T02:23:28.537000
+CVE-2015-0652,0,1,39974cce4eb6cb6a3334bd11dcabb5f4ffc9f646b435143510254810eb64691b,2024-11-21T02:23:28.633000
+CVE-2015-0653,0,1,a04f756da5890de4c8023a6a01c3b4e0327eef3909d6bdfc3d93da241c1bc3db,2024-11-21T02:23:28.730000
+CVE-2015-0654,0,1,ef76fb3623a29944d2082fe1dbeb4412080d093bcdc71205c4f8f12731cde6c0,2024-11-21T02:23:28.830000
+CVE-2015-0655,0,1,b87b24d429aba99a6238f2587e223ddc99e8227814dfe74731000b3c62841414,2024-11-21T02:23:28.920000
+CVE-2015-0656,0,1,f6a0f1f28eab7a14a223b87dfafb1714952f3e39be423b3bb4b7450c64cf59e3,2024-11-21T02:23:29.017000
+CVE-2015-0657,0,1,ad07d9e13016e7a921ec09c86c35b3226df8e3fe7a9b5c4bed8aee1205f8378a,2024-11-21T02:23:29.117000
+CVE-2015-0658,0,1,4f80003c8ab18316ffb475fc1564fb15f17dcfdfd550977802096b3a6160df1c,2024-11-21T02:23:29.213000
+CVE-2015-0659,0,1,f6ce8fb56370166e15e86887f6d37a107de252787cbc822be61c29e505d49526,2024-11-21T02:23:29.320000
+CVE-2015-0660,0,1,20c7d5a06e0d41732da6dd5c9f19db3ec23e997755fdae011f63ef6f98f0e193,2024-11-21T02:23:29.420000
+CVE-2015-0661,0,1,229a85b1b4ecf40dee5a8d0315637d60dc09685a852e69c2c814d943f3e1b8a4,2024-11-21T02:23:29.517000
+CVE-2015-0662,0,1,f55d876cf799d63b87dd025e2c19431c2cfb712299b7a60e5424914f25e688bb,2024-11-21T02:23:29.610000
+CVE-2015-0663,0,1,31a4b60701d1f1640555b53d2939789ec3db9a71847cae6f9628531c984e50e8,2024-11-21T02:23:29.710000
+CVE-2015-0664,0,1,2898da0efdcca868dd90270fb6aad36475740bf4533641123600192864f33cee,2024-11-21T02:23:29.823000
+CVE-2015-0665,0,1,1eb127e3684252a4972da221e25e9151f9b8570fa3bad878af37c8b71304f4e4,2024-11-21T02:23:29.930000
+CVE-2015-0666,0,1,1b5e49ce2212b13c4af9100ee2f24530cc505bf78fd1f1ab1ba6151cd5a602c3,2024-12-19T19:12:51.923000
+CVE-2015-0667,0,1,39fdf05dabcb8ec8ab6cf4c4849cd2931bb678d57c63f8102d722407a656ae45,2024-11-21T02:23:30.150000
+CVE-2015-0668,0,1,301b5ff524e517c125535090e51b9f6dd5da6cbda19707806159d7af9f09961b,2024-11-21T02:23:30.253000
+CVE-2015-0669,0,1,32f0a16bc311bf68ceb9c10c04fabcc11b8ae23d7ae253190244201c07b5ab41,2024-11-21T02:23:30.360000
+CVE-2015-0670,0,1,7c23b100df78dbcb91383ebc0ff1a5105676d8c1a5109a302e1533dfa1ca6cc3,2024-11-21T02:23:30.467000
+CVE-2015-0671,0,1,44676a42fae5df7097ad0cccc091cecad2d8e1a11154ae3746daa9c9d54cd84c,2024-11-21T02:23:30.570000
+CVE-2015-0672,0,1,764eda508b05a3a14ec1bff47530940063bbcbc5818a6d5983064d83062ea5fa,2024-11-21T02:23:30.670000
+CVE-2015-0673,0,1,9cf696144fb8710525fdff76683ecdbe855b855556dc8556bb9f7af817a6810d,2024-11-21T02:23:30.773000
+CVE-2015-0674,0,1,4d72df843718c910a2aa28a65a370082c1386f737f19c5ab07a7879038731a4d,2024-11-21T02:23:30.873000
+CVE-2015-0675,0,1,d9de094b7ae44fb6fd7c694080917992599d82a216a5965f1b20b6c3912e130e,2024-11-21T02:23:30.980000
+CVE-2015-0676,0,1,f0af287966f405aa6c148db447ee5e1e8d9ca29a8d938e16505cd18271a67533,2024-11-21T02:23:31.090000
+CVE-2015-0677,0,1,f5505ed854fb88552ceb0066f72c75a7db2fd84d243e786ee520426d3918c9d7,2024-11-21T02:23:31.243000
+CVE-2015-0678,0,1,61d13770deae9249e79a0d0c26a5b573c6dd1ee0b83c77f7c893ba81dd657b03,2024-11-21T02:23:31.367000
+CVE-2015-0679,0,1,cf885081ee4180e28a30cd11f4726eff4fcf482105ee9511b474ed4cfd99f374,2024-11-21T02:23:31.480000
+CVE-2015-0680,0,1,f13a5eed48f50b839986932fc052831afdc238bcc0323cb525096c7ab9aee9c5,2024-11-21T02:23:31.583000
+CVE-2015-0681,0,1,391158051095bf551e23d74ac9f5fbaaf43589fdf141178038a3f6180f1cd383,2024-11-21T02:23:31.687000
+CVE-2015-0682,0,1,b0a9f782a1299cb1994668c9c6c92b521b9742bf5f79f98b63c46701960cde7b,2024-11-21T02:23:31.810000
+CVE-2015-0683,0,1,3863cbcf2843e2b572b95cc80781c5e881d6d26df0adaec328acbf673c1efd50,2024-11-21T02:23:31.910000
+CVE-2015-0684,0,1,2ff168f17c0e1592d28a8c99974dd3304ec6b0d2219e759a42ec09f8aafff73a,2024-11-21T02:23:32.010000
+CVE-2015-0685,0,1,06ff1e7d30e1361fd44d6e986f2a13fec2065efb22083852478b5a9cbc61182c,2024-11-21T02:23:32.110000
+CVE-2015-0686,0,1,81e980d3f6e2bf76ee3083fdc388ab5d8da51d2efa39d76f329db63653de3485,2024-11-21T02:23:32.210000
+CVE-2015-0687,0,1,c0c82884a8c01551401457947ca2fbfa7325a1426609f5f397ecbebd6907918c,2024-11-21T02:23:32.313000
+CVE-2015-0688,0,1,2a06140583112112d5bda9f7a4b533f7d519370edc4496b3891cc240e437e85f,2024-11-21T02:23:32.420000
+CVE-2015-0689,0,1,5e9039e39969966d95337e29a40c56fffadddbf80163b3cfc1980830ec2ab71d,2024-11-21T02:23:32.527000
+CVE-2015-0690,0,1,0b983ff15b5682368376b5b715403538ec5fbdf22d3b76150e3691e12335c134,2024-11-21T02:23:32.647000
+CVE-2015-0691,0,1,1f744046907714af5d0b298c3ba5464df7322fac42796fa084f2842169f2b6aa,2024-11-21T02:23:32.760000
+CVE-2015-0692,0,1,f9402145587b937a2e9fa3f07e60d96f3aae6c22ff1a8f3beba573aab0adfe86,2024-11-21T02:23:32.880000
+CVE-2015-0693,0,1,02956cb9b6e8dd5d205221e663936c7712b3c77ebb7c214dbac966e35bdb1649,2024-11-21T02:23:32.990000
+CVE-2015-0694,0,1,7d5aa54257938c5b81643b3c9d7d44de00447ceeb1b5591b5a259206fa1876b2,2024-11-21T02:23:33.090000
+CVE-2015-0695,0,1,3e8f2a2053a63e1ff354fbe71219feb943e0c33bb50b06ee148abfe48ed27b75,2024-11-21T02:23:33.193000
+CVE-2015-0696,0,1,24875863113238ed5677cbc6be50ee43f0e84eea724348619685cf6e059c00a1,2024-11-21T02:23:33.337000
+CVE-2015-0697,0,1,755fc3f41dbaefd59460f4e12d4d6e649c3fc64987f00f7bfcb43911c69f170f,2024-11-21T02:23:33.450000
+CVE-2015-0698,0,1,6c478412a0b8cc690c40d3f2969ded35a46ba1831f994a9fe7badae1c6af9db5,2024-11-21T02:23:33.557000
+CVE-2015-0699,0,1,09ce293727dcf4413ee177526f853a8f62aee6597b5a817ec6dd79ae3ffccedc,2024-11-21T02:23:33.660000
+CVE-2015-0700,0,1,7fba985cb7d15991ddb7b189cfad451898f2e094e2ed214a60959f0adc54a322,2024-11-21T02:23:33.760000
+CVE-2015-0701,0,1,581c72ea57a226356c2fced58a50ecfbca5bbc33df59567d98d97d81a65f92aa,2024-11-21T02:23:33.863000
+CVE-2015-0702,0,1,f99e2e135230c9348652b1243c33ee33c762a6498a227526f13363e6984a40c7,2024-11-21T02:23:33.963000
+CVE-2015-0703,0,1,42838e1d6130f8e9901cc5938e5ba2492b63d7b26810fb8d6aec34720a1b87b9,2024-11-21T02:23:34.077000
+CVE-2015-0704,0,1,8634fbe4c54483d4246ea03a010147dbb3d3af71fe00f02d507509c778095d88,2024-11-21T02:23:34.197000
+CVE-2015-0705,0,1,c521c60ff11ca4b8ad90a5c6dd4edd64cb3a49794d72e95b67e26be47cc92349,2024-11-21T02:23:34.317000
+CVE-2015-0706,0,1,c81480be70f989241a73900ee10db0fd77f73bd97a5f7a9729b04f9d0612ab50,2024-11-21T02:23:34.430000
+CVE-2015-0707,0,1,9e7bf11bd61f1aec74eb8e7d4b87621ccdceda0c7c1316d98c6f1bcd2ed30b0d,2024-11-21T02:23:34.537000
+CVE-2015-0708,0,1,8906f1fbd27ded4177366bcba7d877a7bb00d26e8d9080349183f73c68cb7e75,2024-11-21T02:23:34.637000
+CVE-2015-0709,0,1,29a751f0b5ddb3688270a55c56581940774ff9a806c012e94466db8ebea15d10,2024-11-21T02:23:34.743000
+CVE-2015-0710,0,1,af72d4276aa99db1203f190777c9e075ce00b31d317cbeae17b8ad0f9ad62ae8,2024-11-21T02:23:34.853000
+CVE-2015-0711,0,1,6841d4d517137133a2aa98d6517870b63bd50de8ac22f0a21918c09e8b1a4f08,2024-11-21T02:23:34.963000
+CVE-2015-0712,0,1,ce330c72052d8ffe6d6b50c6ea5b5e289b23f353f74c89f34daff07af5180071,2024-11-21T02:23:35.080000
+CVE-2015-0713,0,1,80d043e2bfe4ee1c0f73a9d8ddc75b2e97df60bc0ba486f4b45a12857c249863,2024-11-21T02:23:35.193000
+CVE-2015-0714,0,1,56eeccc444e91ec054980cdd122e73dc5249baa9dc5e85479a4f440a88082d8d,2024-11-21T02:23:35.310000
+CVE-2015-0715,0,1,54d1636aad81a40ba39c0073ea49f7553305033e88ce2936ef09ffc6b36d034e,2024-11-21T02:23:35.410000
+CVE-2015-0716,0,1,55ddcbd3edbe76db7f4da732f1c6e504576aa86c70b90d0d01b56d278873e93b,2024-11-21T02:23:35.520000
+CVE-2015-0717,0,1,3aa4144d827826e040c6b7b91ad7cf23635986d54667b31bb4639f3e9ada8085,2024-11-21T02:23:35.633000
+CVE-2015-0718,0,1,5933db5ab05a437200841bd0824e61a2f910a419bea0731531f2efbc6259c0a4,2024-11-21T02:23:35.747000
+CVE-2015-0721,0,1,ed3e355aafbca94c7106dea209bd36751df59ea7373c76e00e4800bfe979861f,2024-11-21T02:23:35.893000
+CVE-2015-0722,0,1,fc537c37ad44acf8801b078a829931c058e376c634c94fe0097e86a80333acc3,2024-11-21T02:23:36.057000
+CVE-2015-0723,0,1,67fa5c83f890e9b66ae6f801f76b0a0d8de790f5d71ae7f63d0338d030a4bf94,2024-11-21T02:23:36.180000
+CVE-2015-0724,0,1,4c72c8823080626c8cc499923c6ea93cabeac2ff30dc82b10d0dce9c083c3a6d,2024-11-21T02:23:36.293000
+CVE-2015-0725,0,1,f8a05eb201d754b166b07b1f51f6c5eab8123afbabfca2e9183c96ba6cecc44b,2024-11-21T02:23:36.413000
+CVE-2015-0726,0,1,adf19f84c5c5dbb8911bb55f0388a4beb39bef77647fec8e27b932b0c8631217,2024-11-21T02:23:36.530000
+CVE-2015-0727,0,1,b33dc75455cfd33f9af06772b74d385301a75ab0b8c7183c7a19b2f1d0420cd2,2024-11-21T02:23:36.637000
+CVE-2015-0728,0,1,2ea8cf5a265b24632652446cf5438947378f55788e4f2ae29378c9850a6367c1,2024-11-21T02:23:36.740000
+CVE-2015-0729,0,1,febfb39fbee7d5ad6bd4d32f851c9e7c04581965674d34575a4f9a5c06710dac,2024-11-21T02:23:36.840000
+CVE-2015-0730,0,1,42a61a46179174e206b0b31633c51215a6a7434528e4362585144a536941911f,2024-11-21T02:23:36.943000
+CVE-2015-0731,0,1,8f4562be7e67833814f20e1faa730ba8743635a45256613568233d60186e981b,2024-11-21T02:23:37.043000
+CVE-2015-0732,0,1,1276f5a29cf45a22416899d5a039ac0b12e18266eda57cef333b11f2ac98fbf5,2024-11-21T02:23:37.150000
+CVE-2015-0733,0,1,82abadd13e24bd654d6ef9e6d8501144e1c22e954a8be7910cc3e2d5178f5608,2024-11-21T02:23:37.267000
+CVE-2015-0734,0,1,bc741402a2befa296e08273c338532460eda0867b93aed59d3098bbed79191e1,2024-11-21T02:23:37.377000
+CVE-2015-0735,0,1,bef21354aab363d159dd3f1816c66a8629a481cbb6550492d8b92cb89461e885,2024-11-21T02:23:37.480000
+CVE-2015-0736,0,1,b7cb4504dd15e3cd00680d4f274f4b4f764ab7bf8a2391aac790e58c965b508f,2024-11-21T02:23:37.583000
+CVE-2015-0737,0,1,5e7428887437909a0bbe04be4737b16205136122ff0a0df27dd353a0df18773a,2024-11-21T02:23:37.683000
+CVE-2015-0738,0,1,ba640750468e01299169356a33cb9a880307dfc76b2f7cb58579f4a94b3349c6,2024-11-21T02:23:37.793000
+CVE-2015-0739,0,1,51202ba93a873ee5ab15c833e8879ca878f86e5c81f071eb8c0232415e8a223a,2024-11-21T02:23:37.900000
+CVE-2015-0740,0,1,7e57d0e76012eff9cb5ba17d6a600f3db8713e153d1fc7ab8f5a23f0b43207ac,2024-11-21T02:23:38.010000
+CVE-2015-0741,0,1,aa8a2f1646f22430a4179ac50d36cd0f66f17ee5316ff525b90109e4726c7ecd,2024-11-21T02:23:38.117000
+CVE-2015-0742,0,1,c638cc0a63a9e6c575440b5e5e5324887b80cc0666b0ba960ec5b211a1c3ba65,2024-11-21T02:23:38.227000
+CVE-2015-0743,0,1,feeac7ddb01153fb51a25a00463fd6aa917ee53e1c0e59110f35459d09eb9c8e,2024-11-21T02:23:38.337000
+CVE-2015-0744,0,1,d9ca77ec236200b8d19af1ae034582c85eee5956a9700e4e227e442b9fb261ff,2024-11-21T02:23:38.467000
+CVE-2015-0745,0,1,c0e47667459abfc9d78ef9d44a62be4036f73b6522786f6e162d394e5f821578,2024-11-21T02:23:38.570000
+CVE-2015-0746,0,1,f9f74a3b5b53ac07d4409d41282dfd561d520f35dbd52eb353dc6aa86b45f9b1,2024-11-21T02:23:38.673000
+CVE-2015-0747,0,1,141fd4425d598c02c895faca8e3dfc88402a35b7ad997ea9e5f1b694e22d188b,2024-11-21T02:23:38.777000
+CVE-2015-0749,0,1,da3064f14f6c9ae6a1277821204457cb6b532fc68591b43d22aa12882c9f758f,2024-11-21T02:23:38.883000
+CVE-2015-0750,0,1,4e53a6998bbac6c6e1022d3da386a44bfd2c9593cfe0157b61202fa428c5cb9e,2024-11-21T02:23:39
+CVE-2015-0751,0,1,dc65787946aa0a6dc3c8693c60bcb95fbcee8bcb54e0d45699a5112a025916dd,2024-11-21T02:23:39.100000
+CVE-2015-0752,0,1,1d357046f707541671c15cddab293646350bead43f2d7f29f8d4f06d1792125a,2024-11-21T02:23:39.210000
+CVE-2015-0753,0,1,d118738ca78709d1f12fed9b9983fed9947491468315d74dd89195adc7717893,2024-11-21T02:23:39.313000
+CVE-2015-0754,0,1,b8ccd94e7492cbf0646dd2074c0de4f2241a7c52f62df48415be31be294cc0d3,2024-11-21T02:23:39.423000
+CVE-2015-0755,0,1,eacac0aad6f933d6d72b5fa4f2fea1b60eb38ec3c558bcdbe2fdd52ed89a48cd,2024-11-21T02:23:39.530000
+CVE-2015-0756,0,1,bcc85e18dd4de88341356d3a056a4fc96f3aac5fd9f947cf9db8a5f61a013cfa,2024-11-21T02:23:39.637000
+CVE-2015-0757,0,1,a28973e8527a71f2214c6ac2d193066b3e2df7151d2283963d04b0d36f653feb,2024-11-21T02:23:39.743000
+CVE-2015-0758,0,1,da76f6b8b2997ac2e745d0df1d6113114336f05842c69b0146850f17ee3cf821,2024-11-21T02:23:39.850000
+CVE-2015-0759,0,1,0f1e568f4e56ab97c020d3cdede0ac192634d7d249bf03f31479473d0b7ed2a2,2024-11-21T02:23:39.970000
+CVE-2015-0760,0,1,cdc3d042188164090f464c1c1d537fa3eee4cf69a4b0c0aa816c60b5e9eccae2,2024-11-21T02:23:40.077000
+CVE-2015-0761,0,1,be3a6cbb6c2555b5c869d0d5cc06fd38fa3ed4690686bcc34af8d41d7d8462d0,2024-11-21T02:23:40.190000
+CVE-2015-0762,0,1,fc5428d48db1a29f97e58e7cdd9fa065bd85e7d7b968401642ba55f5db933fac,2024-11-21T02:23:40.297000
+CVE-2015-0763,0,1,81b8a70549975a1bdcc5c3cbefd26e7e3bd74dcbd26480e7ca28cceec98f9821,2024-11-21T02:23:40.410000
+CVE-2015-0764,0,1,9dc65c610337d3667eb929727ea615fd13aa5305f8a3cd2571fb2d7da14f7c58,2024-11-21T02:23:40.520000
+CVE-2015-0765,0,1,44f160a39f8aae241feef27c04d1f41cc25154206297733cea3e0c0a62a543ae,2024-11-21T02:23:40.630000
+CVE-2015-0766,0,1,78c7728d4fb3368e93fcf3168645b65b4f5584cac72dbd1c78d04d0f5149e5f8,2024-11-21T02:23:40.737000
+CVE-2015-0767,0,1,c1cb9518993d332b6932ba8596a4c8b98e502d37407d131961f658b682290f93,2024-11-21T02:23:40.847000
+CVE-2015-0768,0,1,d3f89356a369de776a0b9057456d9d8dd8e5a675f4d314d2c8089cbc09d964b7,2024-11-21T02:23:40.957000
+CVE-2015-0769,0,1,84a4d73beb019b577582319f01310a1ef24d85156906df66746f9c2a50602288,2024-11-21T02:23:41.070000
+CVE-2015-0770,0,1,831c5cfacb291c109503bad6441c61e91ac75ba25b34ecda1a8b944eeac32c41,2024-11-21T02:23:41.200000
+CVE-2015-0771,0,1,437f78e1c91fbf57edef7976835b3306c34a316d47097b86c5a1109ab38dc7c4,2024-11-21T02:23:41.323000
+CVE-2015-0772,0,1,7a9166535198b9accdb0eba1773fcef7ccd3c601f07400592404bfed42e6cbc1,2024-11-21T02:23:41.433000
+CVE-2015-0773,0,1,e64b906c4b71f26f1fa283b815387e993892a89a4136b3c4a06c27150a682f2f,2024-11-21T02:23:41.540000
+CVE-2015-0774,0,1,5ebf495158cfedc7c4344d3b5eda91520467f9b0828b9471628af4c328217003,2024-11-21T02:23:41.653000
+CVE-2015-0775,0,1,e50d176b01aceee5a1ceb2ffbe36136727b17698f85b902c1d1c0dfdc9bdd9a0,2024-11-21T02:23:41.770000
+CVE-2015-0776,0,1,89893e32c932d1aec0fe6dd6655b3a0652df6c6798eac4e0ae00fb9a6ee192d9,2024-11-21T02:23:41.890000
CVE-2015-0777,0,0,0b1c4b91a91919a206ddd8ffd5ea9f473ef4998719c18b1f2f2d51f104f101b6,2024-11-21T02:23:42
CVE-2015-0778,0,0,b3c3da105e1f2ebe2a57f990d62c8848bd9a433f4692c39c51a6a76b95a24cfb,2024-11-21T02:23:42.110000
CVE-2015-0779,0,0,8374067f0b46a3ac150a6af76e126cee28d3f3c8f908808c4a1eeaf0231fae7d,2024-11-21T02:23:42.230000
@@ -77278,147 +77278,147 @@ CVE-2015-4178,0,0,40dfbecdfa981a404adc46bdc59e88970c2ccfeccc438e6bf01c9efcd41e42
CVE-2015-4179,0,0,f727662275ae8fdaeea67b6a4fea04c30d9bc8c513d7561cc9dc84c2df5235fa,2024-11-21T02:30:34.830000
CVE-2015-4180,0,0,7922d6e9ff79211739b729861182d14b425a885e2138c94aad51bf971ca723c0,2024-11-21T02:30:34.977000
CVE-2015-4181,0,0,ecc245e3993442aa372c9790858aa8026e0141eab3afa167cf3a597ed6bf0b08,2024-11-21T02:30:35.180000
-CVE-2015-4182,0,0,cc40074f046aed90b35fddf95294a1d95963942bcd5cfce4c0d79cb79597feb1,2024-11-21T02:30:35.333000
-CVE-2015-4183,0,0,055ba9f98d9df0d330de46b332593b5347e7256e3d221e6164715d32e49b3005,2024-11-21T02:30:35.457000
-CVE-2015-4184,0,0,1843af6424823ad3f496c0900eb72878d95999374dabfc5b0da594b52d22be35,2024-11-21T02:30:35.583000
-CVE-2015-4185,0,0,a514826eeb2b89c2ef777189b15123ead045131e02152c0d97af2bcacd93b531,2024-11-21T02:30:35.707000
-CVE-2015-4186,0,0,98d6de73ad031dcac54c8d75abc05acf01d745d4e9723c886c6ee4adcb6dcd2a,2024-11-21T02:30:35.830000
-CVE-2015-4188,0,0,f6c4e7bc0f0ecc56bda554a74dbe63c001e6874368f44df839a9cae865ca0897,2024-11-21T02:30:35.947000
-CVE-2015-4189,0,0,953b33a37339503add2880389068f56fb327e5ba7b5399d7e2333b3fd7e1d3ae,2024-11-21T02:30:36.067000
-CVE-2015-4190,0,0,0d5045b1742a00a3ada305aacebdc5a4167398f766d30e65340dbe77f38b8c6f,2024-11-21T02:30:36.197000
-CVE-2015-4191,0,0,b8d5b103d8a66923d00abb9b39d0c794f097aee3e84c947b899e0d8fbf41e753,2024-11-21T02:30:36.320000
-CVE-2015-4194,0,0,b98fca2d54873ea261c65f96246b0e7b3d91c2d3d086d56579ef822fbac7b397,2024-11-21T02:30:36.453000
-CVE-2015-4195,0,0,f66e3e57f173a059768ccd6a9140d166a02348e6b03e4a07aa531d5e6eb22014,2024-11-21T02:30:36.573000
-CVE-2015-4196,0,0,b336dbc5ecd0849ced930ceefce9f2b00d7d64a60a6d47c64f2339157cf1e9bd,2024-11-21T02:30:36.697000
-CVE-2015-4197,0,0,bfaca5e2b9dabaf20f90655c5c83c1d8f86f61bfae6ddd5eac6cc3086e7d46aa,2024-11-21T02:30:36.807000
-CVE-2015-4198,0,0,01d1f331a7bf3d3d1cde9cad2530c7dda484ec2928f6c3963ed4b1f1a3e35102,2024-11-21T02:30:36.927000
-CVE-2015-4199,0,0,cfc76af9d7a2fb57d546ba1e9160d8e06f72021866f0c3d8ee72a0479c9e5e72,2024-11-21T02:30:37.050000
-CVE-2015-4200,0,0,47978c0a57e5513b593bc5050abc72c43f54506e1ff76d90f897dc57f3eb216c,2024-11-21T02:30:37.170000
-CVE-2015-4201,0,0,094cd246b38d704eb68bb2fcb9a13aa3fd1e30b024feddc1e5a652c1f8c73b83,2024-11-21T02:30:37.293000
-CVE-2015-4202,0,0,b07be0508fe5b5a413d625d20726781f12fd03a35de44b80ed46d9d8f88e6a44,2024-11-21T02:30:37.410000
-CVE-2015-4203,0,0,97350977dd5dde99d361d38f72474cf4270d0904390db761c1bff4434b5e0004,2024-11-21T02:30:37.540000
-CVE-2015-4204,0,0,0a25db11e5cb00d30cfc6b8f333552708dd2dd89f09bbe0902718125d778ad46,2024-11-21T02:30:37.660000
-CVE-2015-4205,0,0,ca3d75514cc4db2dcf5a769c6bc621aa4209cdf1d866da39f0ac72137a0f1ead,2024-11-21T02:30:37.800000
-CVE-2015-4206,0,0,03505cd844e1ba8edefa5bbe38080a10d7e715988d4ae20fcdd89f89241d1688,2024-11-21T02:30:37.920000
-CVE-2015-4207,0,0,fd4571c0ac1ac6c686b072c6811102e48f359bb33e98e1f608a564ec5ae5248e,2024-11-21T02:30:38.053000
-CVE-2015-4208,0,0,d5bbd0691c810b199259d002e7a8e96e27502b195fba9ce559ef66a38e710fca,2024-11-21T02:30:38.163000
-CVE-2015-4209,0,0,405cb03704cf038b5268cce9b82b8650b61d2a6fdfed925e12926e48d42b3c6f,2024-11-21T02:30:38.293000
-CVE-2015-4210,0,0,d819246319055b5d70490ccb7227ec6ace0cb426932541a14d49d77f768bb460,2024-11-21T02:30:38.423000
-CVE-2015-4211,0,0,ad27d400ffd09d8466a9a3a0d8ff41ba5e1839859529aa2c4a9b12930c43703e,2024-11-21T02:30:38.537000
-CVE-2015-4212,0,0,ce61708b1231f9ae1fd8cc614a7694c3723ac7111aa94996feba9d6d4f981f0f,2024-11-21T02:30:38.660000
-CVE-2015-4213,0,0,20f01ca400220415ad2d57944c68a4fcaba1cac692e168ded0cac06189631465,2024-11-21T02:30:38.780000
-CVE-2015-4214,0,0,a7e7fa35ff8cb9fd2cb1a65c1a7913949097d9c2fecd1c19dc4c58a0a7a8b254,2024-11-21T02:30:38.897000
-CVE-2015-4215,0,0,fd5688504157ad34a46c5c754bcc223e3fc95dcf79d04a7fd93d4fce466287c9,2024-11-21T02:30:39.003000
-CVE-2015-4216,0,0,b8583d3f818f95f88751a1db253ab879ba992f6cd18576e0cac47fda8d6d41bb,2024-11-21T02:30:39.123000
-CVE-2015-4217,0,0,4b7c28c1009ed807c56be58b6b9f36b4ff8e66ff5cea5e5556ca2ea1f75b66e9,2024-11-21T02:30:39.247000
-CVE-2015-4218,0,0,8c58497bcb0a04b310a768b1bb8a91722710ede57e1587ca66db4efaab7db03f,2024-11-21T02:30:39.370000
-CVE-2015-4219,0,0,e91d6e623efac6245b585cd36e8a2151a5d8e1e94ed56f4054357311bc12e083,2024-11-21T02:30:39.487000
-CVE-2015-4220,0,0,78f1ca7fbffad91403c05ccd5ef9af7a7bc6c1ad8df4c3101d621891232222e5,2024-11-21T02:30:39.610000
-CVE-2015-4221,0,0,9cb1b82a02ba7c4aa295bc0cfcd6578ac7f772fb882a06f522eafbf18b54ed11,2024-11-21T02:30:39.727000
-CVE-2015-4222,0,0,06bbb4e9209ce32dcf6dd27df4dfac7fc5f7ac66d0680e30709d81e270c9cf95,2024-11-21T02:30:39.837000
-CVE-2015-4223,0,0,8c44d1c5f25043d17c69cd05432a4c185d29859286d624e8ff4c60f1724a05e6,2024-11-21T02:30:39.947000
-CVE-2015-4224,0,0,52fd24384e81d7c1cf3ae7896ced22f2ac5a125dfb382b39d64221b0c24b9bbe,2024-11-21T02:30:40.060000
-CVE-2015-4225,0,0,eb046318789eca1fb50b659a1769e433a7feae128f41ff0b1c789d9f968dca5c,2024-11-21T02:30:40.183000
-CVE-2015-4226,0,0,0da977622aa706dddff4a86e563468feeea021e0a0b42abd95c37b7f59ee8396,2024-11-21T02:30:40.300000
-CVE-2015-4227,0,0,ef69da49653c1a570aa20aed7f8f2f6dd9629bbe61b529a5312e08b4adddf8c4,2024-11-21T02:30:40.407000
-CVE-2015-4228,0,0,62ec000b563a4cee34e2e61364a0521237e846c6b500b0c4c21091057e7a6462,2024-11-21T02:30:40.520000
-CVE-2015-4229,0,0,ead7060f9ae7548c9f8463f56346ff3e195d645b8987ef6d7dcb0e0e887e4cc0,2024-11-21T02:30:40.630000
-CVE-2015-4230,0,0,e4f969b840e6539f475c00eec25f8fbe6887738b1ddaaf7c35dd49aeff3d2190,2024-11-21T02:30:40.737000
-CVE-2015-4231,0,0,0a7cff7289ea92cad9d8095be2ff4d418ab5908490c35cd901b724babdc166c6,2024-11-21T02:30:40.853000
-CVE-2015-4232,0,0,ff0ae9d86dd345c1374c4790f385444ad4770dfd4ed5025dda09cbc8a7e08adf,2024-11-21T02:30:40.970000
-CVE-2015-4233,0,0,09f84a7120dc336bca856145f3c599d01be54b986429fa610393ecd5da7730a6,2024-11-21T02:30:41.090000
-CVE-2015-4234,0,0,bc489552b3ef70951f74426dc2e7000b08c42b955c5abdfb256077e9fc10bb8c,2024-11-21T02:30:41.200000
-CVE-2015-4235,0,0,4d072d2d63484fad36c6ff5c1119322ea4bbd8719a89f4d5c91774595f9d0d5b,2024-11-21T02:30:41.317000
-CVE-2015-4236,0,0,ad4280fd0ff05055943c10cf1466622c1dbb9c238d45ac6903ace8796f6ef8b7,2024-11-21T02:30:41.437000
-CVE-2015-4237,0,0,314e517e8b17745d730c4a0f2e4a3540b15fc6ae704a038ff29af2ab971a3c6b,2024-11-21T02:30:41.570000
-CVE-2015-4238,0,0,3d8dd8fef733690fe65c99f4ca70e325fcc7f12afb4337e3509effe1aee899b9,2024-11-21T02:30:41.707000
-CVE-2015-4239,0,0,31800c1c75cb411f4b0e51af6cd6790f2c32ad2f68d6afbd52712411a899ccee,2024-11-21T02:30:41.823000
-CVE-2015-4240,0,0,d03552dbe59f04c526ee0912d0232b902ddc74270cff3b463b3cd6172fb56132,2024-11-21T02:30:41.933000
-CVE-2015-4241,0,0,0e70b3edc75c51b6cd48adffa24fa57df34dd35c308a282c5ccef2004dcdcf2c,2024-11-21T02:30:42.040000
-CVE-2015-4242,0,0,6cd22a4a9e80c89febe6de231ee5565a700e3faed3908675ddde03d7a88bc6dc,2024-11-21T02:30:42.170000
-CVE-2015-4243,0,0,13b46a315ad9ef555f3deffc1836e1c99e05f3ee2c9acf4305ec7d56af8d69b6,2024-11-21T02:30:42.300000
-CVE-2015-4244,0,0,1e40be659b1a5a29825a05f840df824ba46eb920627854f13647c407a3595d77,2024-11-21T02:30:42.423000
-CVE-2015-4245,0,0,9491a0f85263ae2af69f28d9577964dcb5a88c1b7425e37b5c41e98d7a2cc10f,2023-11-07T02:25:48.133000
-CVE-2015-4246,0,0,737ed5b92f005a2407fe04db822c3d1c0418b308235187b9722b7a369f85fff7,2023-11-07T02:25:48.347000
-CVE-2015-4247,0,0,b93e7874a2a2f4b07415407c19b7855b3ebe144daf84df1a83c1cc5faa2f1844,2023-11-07T02:25:48.580000
-CVE-2015-4248,0,0,1acf4cd285f36b4b708ad3512bbcac9a00935b609b17a0acd1430ada44fa4858,2023-11-07T02:25:49
-CVE-2015-4249,0,0,8e7e57d7c8aed943f61f86935e19c08e73357316fbdb33ff18d247cd68c2db38,2023-11-07T02:25:49.483000
-CVE-2015-4250,0,0,6e849c32fd96a24214f77425e1d0c9243a609acc8a19c8f904dc84f620b67cb0,2023-11-07T02:25:49.750000
-CVE-2015-4251,0,0,ac0ee168aa11fdcf3097f8cd458baa0ba6af6494908331f6faa75512c78ab70c,2023-11-07T02:25:49.987000
-CVE-2015-4252,0,0,6baf9c44a61200d40f68be2c8193058e56c6da7aa548be9068d7aa33a1c3b406,2024-11-21T02:30:42.627000
-CVE-2015-4253,0,0,589a4c846d8a3ab4ce55fc90ca3fca8b23cd68fe8b009cffe7ad60a1e535251b,2024-11-21T02:30:42.743000
-CVE-2015-4254,0,0,a8cfab5f2d4cffc3f6ce72a3fae5995d934b3ba1d7f03816cd40bce57400f4dc,2024-11-21T02:30:42.890000
-CVE-2015-4255,0,0,1063ff17b162c196218e242b98eb1a4f7e5d524e72f9819316d603a1e7e6bbc3,2024-11-21T02:30:43.003000
-CVE-2015-4256,0,0,9b8afdddcf59eacc0b18b9fd9a717c512c44b0898840874f35dd96b3c213bfff,2024-11-21T02:30:43.110000
-CVE-2015-4257,0,0,165f752195e7d0d6e2de2485864e0cf9f3612b7f92916e507c29dffb537f3d17,2024-11-21T02:30:43.220000
-CVE-2015-4258,0,0,1d5300714cdd74bfa62464c250f06a745b15d579fc5f95125007b897ad89b568,2024-11-21T02:30:43.337000
-CVE-2015-4259,0,0,ca1d70bd6bae19bf0b7c55744ddc37494a84a089a10a1f374b74678e24d96e40,2024-11-21T02:30:43.450000
-CVE-2015-4260,0,0,026f39bdf96b328d24ec48f5a2ab5c3fca56ab2123689f8afb98d83ee3003492,2024-11-21T02:30:43.557000
-CVE-2015-4261,0,0,adce4a06cd2b7b3739455d01297294ed4305f2fae71a160c61e4ebd25c052442,2023-11-07T02:25:50.293000
-CVE-2015-4262,0,0,c4dbf9ab48d62735f8964a963010c58a704d7c864b9c936cff43a48364e979cf,2024-11-21T02:30:43.680000
-CVE-2015-4263,0,0,f1e27078534c6bfde5ebcae9c9ad0fc96f501efcda370fe9ccc3397563411512,2024-11-21T02:30:43.790000
-CVE-2015-4265,0,0,ce39157ae03c21eb66381af8f719854e870a8fb3c6ceaa35d15e3a62ffaebec5,2024-11-21T02:30:43.897000
-CVE-2015-4266,0,0,4c7ad2ab91b1878557730bda29cabf9e9b7fa17f2dc13fcd3702f64563ef4b4d,2024-11-21T02:30:44.013000
-CVE-2015-4267,0,0,948e67ac7a3da6e315c323ae5e2b68cc4f590d89f372b70c5577809130748938,2024-11-21T02:30:44.120000
-CVE-2015-4268,0,0,29eea3e0188c78c6ab03a7dc20cdc875279783d65f9255cf110ea7d15fcb408a,2024-11-21T02:30:44.230000
-CVE-2015-4269,0,0,afc6aebdbd283e4df38621bfc06f563ae20b033a97964b789f1021224f4e9526,2024-11-21T02:30:44.347000
-CVE-2015-4270,0,0,7d2191aec3466ed1a3d3115a11378114f7ee86d202058dc969834edd97b86a52,2024-11-21T02:30:44.453000
-CVE-2015-4271,0,0,01090dfd18110fb2db63cce345ee3d059fa939cbb10a95a7448c01613b029635,2024-11-21T02:30:44.557000
-CVE-2015-4272,0,0,38d521c9bd2605210e49d6ddc05937fe2f879f04e191b4e80abf049996dc2639,2024-11-21T02:30:44.663000
-CVE-2015-4273,0,0,c482471baa5128cd73ecccadf3e8fca8ed630c882f1601eeabeee7445fe9dc54,2024-11-21T02:30:44.777000
-CVE-2015-4274,0,0,815bde465d92b6df8b712575917f5b4c21f97c01683bf350d027353e10ee2383,2024-11-21T02:30:44.890000
-CVE-2015-4275,0,0,e2cee0af8864bbb521d33c21f30ed3386710fea73ca90e140a0feba39afda578,2024-11-21T02:30:45.003000
-CVE-2015-4276,0,0,48a42b8869a33a02caf91080b4e217eecb6cf5f41f5e0d94720e9dc2f2dc9659,2024-11-21T02:30:45.110000
-CVE-2015-4277,0,0,8725029126b8cd31d1f4d409853348b43ce01277c29d09b5dd772b12153a4b22,2024-11-21T02:30:45.220000
-CVE-2015-4278,0,0,a7c4b8bde8ef56500d47ab9d204cd31273d0b16b04b531835d4c66525205671f,2024-11-21T02:30:45.330000
-CVE-2015-4279,0,0,bd880985d6949b0a24ca050e9c510a10968d4144be46b1bceed5913b22d7e870,2024-11-21T02:30:45.433000
-CVE-2015-4280,0,0,6785958e621d09aa469b60ef5f0e04aa942b7ec33de0b8b7bd349e0a8abeb5ac,2024-11-21T02:30:45.540000
-CVE-2015-4281,0,0,d4091ad227711f836c2fe46092d60e7c2d3eaa505f8c1ec32ad8e54d40795eae,2024-11-21T02:30:45.643000
-CVE-2015-4282,0,0,0af827afbffea46f85dac5a2b3183fabb0bfa0f9f11617b120d1078b7183d11c,2024-11-21T02:30:45.753000
-CVE-2015-4283,0,0,95560546c42327f375a31b47e91de5c0e155f066ed65b70ad2b2341f93932bd1,2024-11-21T02:30:45.873000
-CVE-2015-4284,0,0,3ac156f61bbc635eb9bf40620a07c9630aa660d7fe8de1dea42a4b81435c7a22,2024-11-21T02:30:45.980000
-CVE-2015-4285,0,0,6d9b7b1949eda97cde0a29739c3b84d46bc0aef638b0e13c248721e0de93ae98,2024-11-21T02:30:46.097000
-CVE-2015-4286,0,0,92ac8fd94973af8435337f9b735269058b4dd0fd755d9580948d77c82614282e,2024-11-21T02:30:46.220000
-CVE-2015-4287,0,0,f4554fcea1d6e05efb74472e8d159e328c32fed3e92032e3adca2e6d918a607a,2024-11-21T02:30:46.353000
-CVE-2015-4288,0,0,0871d984ead87467c95b8a51870a894204473c0392445c903bdf23426dd395d9,2024-11-21T02:30:46.463000
-CVE-2015-4289,0,0,efa0615c34b4f39ec1c06671b90af7ff4d585c9a2dc9a9b029461d055eb2c559,2024-11-21T02:30:46.593000
-CVE-2015-4290,0,0,e73cd2a396a3fd0f30e1d4f93d7250f4b7c40c0afd000b603110b4ae42520cb0,2024-11-21T02:30:46.707000
-CVE-2015-4291,0,0,74230a18f2aaa185372454d55a0e82aaba6270162869a4db863e979977f50480,2024-11-21T02:30:46.827000
-CVE-2015-4292,0,0,cfde4fe65b864f4d79d5d9f3a8109c7c9ced870d419acf8d16bbaf669f21a85f,2024-11-21T02:30:46.937000
-CVE-2015-4293,0,0,a211f4c6b9a65fe94d11896ba0ece0477c2094bb91f801b677dba1888a0b312a,2024-11-21T02:30:47.053000
-CVE-2015-4294,0,0,c966cd08989184c5a813bf71ba34076e2fd342c16c54c21afbc199669971f81a,2024-11-21T02:30:47.170000
-CVE-2015-4295,0,0,95542486b740cbe69c321414a1b4b91381719a7b3158ba5fbcc364a4c99dab48,2024-11-21T02:30:47.283000
-CVE-2015-4296,0,0,c2fa8730845038e60b034675b8bf81baaac7db0f352aeebc7517b5756e5b0bca,2024-11-21T02:30:47.397000
-CVE-2015-4297,0,0,3b61c452f1b62de40d76285d48afd07d0d19a562190ca76436643572e58adaf1,2024-11-21T02:30:47.497000
-CVE-2015-4298,0,0,b580cce9739219a52db0b968052252299259538580bd06ed6650ee569cdb0fc3,2024-11-21T02:30:47.623000
-CVE-2015-4299,0,0,7813c51192bcbdeaf6be0a39f0040e4d6bacda442a195bbf4616967c0ed31ac2,2024-11-21T02:30:47.740000
-CVE-2015-4300,0,0,bcecfe95e2f0acda1f6b594b7fdfc119ab677cf750a4a4ff0d31182a36559fca,2023-11-07T02:25:50.760000
-CVE-2015-4301,0,0,d210b663bebb8a809eeff82664dfee55f8bd45a746dc9d127b40df00f7e327bf,2024-11-21T02:30:47.870000
-CVE-2015-4302,0,0,f423ef5f24127670cc50890dfdaaf7186f4634e4af8af2173be30056b4474a95,2024-11-21T02:30:48
-CVE-2015-4303,0,0,6bc47e76ec06c1e42230adfeaefe3fed55b95f94604d6d675ff2c454336deef7,2024-11-21T02:30:48.117000
-CVE-2015-4304,0,0,1f5e2d7dd28e42bb01eb91f0e2e3913feea5d9e9434b4d8979f65a87a9d3377b,2024-11-21T02:30:48.230000
-CVE-2015-4305,0,0,545d2b80b948e5038453586d8d28f1bc7ee718d0c48a3f34a2f0a5e37fb31ee1,2024-11-21T02:30:48.340000
-CVE-2015-4306,0,0,6c9df251727ff389a037e8e248cc955cc2c3abd565c8c49c652cba43f0ca9809,2024-11-21T02:30:48.457000
-CVE-2015-4307,0,0,ac7a53c005b0ff12b63640caccb1a900037e29c68daba96ba8850299c1a18589,2024-11-21T02:30:48.580000
-CVE-2015-4308,0,0,89f86786def5670014797e10c56b0f1e14e1ca194b9acb3ae6f393fa124a5d5b,2024-11-21T02:30:48.683000
-CVE-2015-4310,0,0,2128fd6e0a362c89e707170075c20bd7f8b898772b1a82e2cf1e0dce071d3fae,2024-11-21T02:30:48.800000
-CVE-2015-4314,0,0,c0201581ed5d0fe64a1ca988e989c44b872e3b7bcc50107365b46bef01e9d64e,2024-11-21T02:30:48.913000
-CVE-2015-4315,0,0,304f06002728194660b65d6643ce747a01a35e7d511285ce5fa967a7e5e85880,2024-11-21T02:30:49.030000
-CVE-2015-4316,0,0,060698f601c755353895e589cf4f12ea329099f865a77deb333c5cfdd673e344,2024-11-21T02:30:49.143000
-CVE-2015-4317,0,0,85c703262dd059a3d1f974dbe7731497596f34a37cc6b879e02fce5ebc56a775,2024-11-21T02:30:49.267000
-CVE-2015-4318,0,0,300247217e5fb0e1864f0da84f06943e0b7d1c1c4d41dae9a7e4ec80b8834309,2024-11-21T02:30:49.383000
-CVE-2015-4319,0,0,9b74d11c4c352f609e8bfa7964430e18664709df6a4c7d4bbdda7c42feceb1e2,2024-11-21T02:30:49.497000
-CVE-2015-4320,0,0,ab22a85bf01d7582eff646882037a81072d11dc046a0aa2775ebbb6472603f60,2024-11-21T02:30:49.610000
-CVE-2015-4321,0,0,4553156a372105ef4b0d820ae241758a551ce98f1e7d75f6b6f13ae0a8cc37dd,2024-11-21T02:30:49.733000
-CVE-2015-4322,0,0,191fcf8edff5bda24358067f19d73621bc1f0c7d2996908002c3ad8962b38cb9,2024-11-21T02:30:49.857000
-CVE-2015-4323,0,0,8b5f4e1fc7e81de34bf2dd80f6559d63e26c104b96417e88a826b248158a593e,2024-11-21T02:30:49.973000
-CVE-2015-4324,0,0,a0cbef071da7a367286a2ab83896d72a8a15672bc981392fe523e4279548833d,2024-11-21T02:30:50.107000
-CVE-2015-4325,0,0,d63a9647492a929a22800a69a614bee938a820b6f2ce3266475b7946b8ffdcb3,2024-11-21T02:30:50.240000
-CVE-2015-4327,0,0,118767018eec06eb515c573126acdb9a7ce54771761ed6e9cdf108396d152dba,2024-11-21T02:30:50.357000
-CVE-2015-4328,0,0,46d3e4ca80047c23dce83b1fffa1ce7de190cd90dafac2a57e3c73d0b39439d2,2024-11-21T02:30:50.470000
-CVE-2015-4329,0,0,ef3f8ed70e88455d52f0c046013149c50a4c00b936eaa5ee7c963e428b99255e,2024-11-21T02:30:50.587000
-CVE-2015-4330,0,0,952842627a10514dea3ceeec07d5e60763f05ea898411ffb5e33afe2c95f82ae,2024-11-21T02:30:50.700000
-CVE-2015-4331,0,0,999ee58fca440662354b3c752de67819186537ea4f4a27362756ad3d5369f696,2024-11-21T02:30:50.813000
+CVE-2015-4182,0,1,654c70d2e2f623aab526279f7bc2edfcdb0e6f28b0b17343e58d947dad55e9ce,2024-11-21T02:30:35.333000
+CVE-2015-4183,0,1,ad9c2bcc33da60780895317d129288a691433e41bb4d5755475410280fb889e2,2024-11-21T02:30:35.457000
+CVE-2015-4184,0,1,9d274c2795e5b980f1b3fe14c9bc10523c75d86eeb670134410aa8cf0c2b9363,2024-11-21T02:30:35.583000
+CVE-2015-4185,0,1,89efb8622728f58afca5ae6f9620df5b7523ae11c75ed9b92961b46f741362dd,2024-11-21T02:30:35.707000
+CVE-2015-4186,0,1,726ea06c6d45955c5d99560deb7e1e9939f00951e82f94f874780c22ae8927d5,2024-11-21T02:30:35.830000
+CVE-2015-4188,0,1,d0a41950a4b830081aeedd593663a050a22aabe33f81c7ce8ce8b629373f35a2,2024-11-21T02:30:35.947000
+CVE-2015-4189,0,1,5cc62accded57d43a42e6d7ab4ccd49339d105e23a08af08695802f3b7470f41,2024-11-21T02:30:36.067000
+CVE-2015-4190,0,1,62e9117226b1da15d69b880592f40265b4e30a2feb31fa884fa28130f1d85d67,2024-11-21T02:30:36.197000
+CVE-2015-4191,0,1,dd8ec404a133f7b03d81f0731d97ad716efbab35f67ec933339d89681780eb77,2024-11-21T02:30:36.320000
+CVE-2015-4194,0,1,62deeb75a881e2ad88c62b90fa9597a708c98ee757dcd4f00b9220666a079bf6,2024-11-21T02:30:36.453000
+CVE-2015-4195,0,1,b58faf3a26cadabf2ec96ae08aef4899d9809f60f25117a76ba86a0da9149867,2024-11-21T02:30:36.573000
+CVE-2015-4196,0,1,aceda79eff80702c8bd2b4a85b8cb7147de46fd8f986658f145bc395d6814eca,2024-11-21T02:30:36.697000
+CVE-2015-4197,0,1,a6fe252f4486b778d84cc40a14aa27e132961409ae42407b731b9d8d9fe3a569,2024-11-21T02:30:36.807000
+CVE-2015-4198,0,1,b7b97d93867a769ea4e5b6324954619125da4c200d04d620d4ce7135d7e5ec02,2024-11-21T02:30:36.927000
+CVE-2015-4199,0,1,f76b38cc77df5e0cbf6a1a041745c704d7420c9481f9c742f7f1db9be6e7b218,2024-11-21T02:30:37.050000
+CVE-2015-4200,0,1,84f661777b18e68eb3297a68169f075ed32ea6f0d96ae9de2587bbc9b9df12b1,2024-11-21T02:30:37.170000
+CVE-2015-4201,0,1,a10f9eceaf6ca6943d27f7959c2c83c821299247d6929dde13e2ff5707f660c5,2024-11-21T02:30:37.293000
+CVE-2015-4202,0,1,214527e2c68e8da7f2745bcfbe8158a64ba11607eeffad2944c93e7a13562613,2024-11-21T02:30:37.410000
+CVE-2015-4203,0,1,2a60fcd9b6fc2deeb2bb97dc3a7dd2324a0c4346327f36de72a03b1b89fe89e2,2024-11-21T02:30:37.540000
+CVE-2015-4204,0,1,48ad7fd4b10f870c9633c72dda9d2da0816da4869fa756ebf79af050061f51b7,2024-11-21T02:30:37.660000
+CVE-2015-4205,0,1,550086e9dec39c2dc7e00f0a8ac918b280f853bf61bd8c0b8d12e7dc823059a4,2024-11-21T02:30:37.800000
+CVE-2015-4206,0,1,812cfe2129d61bc429a42b7790e2164c89117d51defc8e39aab8d12fe5e0e2d5,2024-11-21T02:30:37.920000
+CVE-2015-4207,0,1,6171c416435be35f9e3be3d5786b91d79d403440e1654006074111b1a331caff,2024-11-21T02:30:38.053000
+CVE-2015-4208,0,1,67719f2a23086be9110368a6c3fbbbfc8411efeeeedab558a0c3f2b0f88e2c6c,2024-11-21T02:30:38.163000
+CVE-2015-4209,0,1,89c1c77ea0a276052cded8044012e2fdb7fc3a40dde4bc21330ccc461ea828d6,2024-11-21T02:30:38.293000
+CVE-2015-4210,0,1,34445d780568fc380bc5f9a3e6f641f19b47e67d92e2c5780dc6e64dd8a1e08e,2024-11-21T02:30:38.423000
+CVE-2015-4211,0,1,bb7051d615102c700d90a429c36efe77e1f032fc47c6d34f1967479c9e333030,2024-11-21T02:30:38.537000
+CVE-2015-4212,0,1,e01dd2bef1895199642384a162e95dc49512afc8b35157b4c226b8fe2e61a847,2024-11-21T02:30:38.660000
+CVE-2015-4213,0,1,491d629023538e0617c9cbaa8dd34e08cfa42c9ffa881cc1669603af5c2d6d2e,2024-11-21T02:30:38.780000
+CVE-2015-4214,0,1,fcbed7f76bfc4dbd11d0fd68e377cf8c69261328e6b5eb624bda465c4bb0a825,2024-11-21T02:30:38.897000
+CVE-2015-4215,0,1,68058fa43e84bae9fc84904335fd2d4e228eb945398b9becf11c7fb19dbc2777,2024-11-21T02:30:39.003000
+CVE-2015-4216,0,1,170683fa900dc5f3741e23c2130dbeaec4ee5e7ee0069484d85e8e14c2d9bd63,2024-11-21T02:30:39.123000
+CVE-2015-4217,0,1,f72be7d82d59ee9d1d4b34c3110bdfd423a4dea0a8ef1451587f5fcceb029e9e,2024-11-21T02:30:39.247000
+CVE-2015-4218,0,1,fe068ae4cb580360587d7c57b5565b816be1de69a7930d1a18393a92dbf41e47,2024-11-21T02:30:39.370000
+CVE-2015-4219,0,1,0794a8f1dc9a889d99582f8c2743c7fe324cd23de76427c31d5b7616a6170a61,2024-11-21T02:30:39.487000
+CVE-2015-4220,0,1,20cf39d90ebb478505481f286045bfd77b538a92b15f3fef61b5e3f430552ecb,2024-11-21T02:30:39.610000
+CVE-2015-4221,0,1,a8226010f2b3a0d99b2f445fc90afa3df70e9bb0e3d49299749a0ac81e8f9486,2024-11-21T02:30:39.727000
+CVE-2015-4222,0,1,5def90a2d0c42e37afcc9034e5ffe786b0c9a28cfbccd17dd27a39534623640e,2024-11-21T02:30:39.837000
+CVE-2015-4223,0,1,7dccbdac8d530effc75f7ea9a104a144d5b9447055cfbd8130892cc0c62ae0c3,2024-11-21T02:30:39.947000
+CVE-2015-4224,0,1,c6cc6a1991118975dc8b772beaa7ba1c53ba676e162705bd9e8b1d94f6ae9906,2024-11-21T02:30:40.060000
+CVE-2015-4225,0,1,0df1352b66d95897c6881b304b4f3dd94a463ba4738b62d30c4503c5e28c2104,2024-11-21T02:30:40.183000
+CVE-2015-4226,0,1,359eb0825a8a746c972c3c954a636a2e5949ccb919225d86ed5466e36c9c1c73,2024-11-21T02:30:40.300000
+CVE-2015-4227,0,1,877bf8513b1dbe9240041166e4a84ad8a78148ab5acd609a7c3299d2bc225a35,2024-11-21T02:30:40.407000
+CVE-2015-4228,0,1,04d6c347c844a022730b291312ec5215814f56496bb8c9d7e39f73822c1b44fe,2024-11-21T02:30:40.520000
+CVE-2015-4229,0,1,387ec0eafc0ce9a029502e0bbacf22450b37d59d82e6334593c7e066606667c0,2024-11-21T02:30:40.630000
+CVE-2015-4230,0,1,96dc5b45d0883739d72417b2be8fe18c921b887c1e0a6abaa5ed7628b8622087,2024-11-21T02:30:40.737000
+CVE-2015-4231,0,1,219241fd482fb82fa51922b4bef1ce7e848e5960bf34acd4b753f458c4147458,2024-11-21T02:30:40.853000
+CVE-2015-4232,0,1,ba43cba684f9015f6deec38e1d1ddfb26caddacb57b21eea3e1b958bb5b89d76,2024-11-21T02:30:40.970000
+CVE-2015-4233,0,1,8ca02654e2168d2a75ddec1dc462095784c2972484b41ea1e934413b5a02ba46,2024-11-21T02:30:41.090000
+CVE-2015-4234,0,1,bf235ad2a4a2280beb146236ff90728a4c301532aeb1226f54b379f98f6b3cce,2024-11-21T02:30:41.200000
+CVE-2015-4235,0,1,02ce2b69ec2a37ea1ad36513b57e318b9cd887ff68d9093f81d139945f078afa,2024-11-21T02:30:41.317000
+CVE-2015-4236,0,1,72af0660d9b641a527981edbd6ea2c6734018b192a540553a560c02be5de90f6,2024-11-21T02:30:41.437000
+CVE-2015-4237,0,1,82443aa5607c2c208a6ae4d19f3dba3ff3370b94c6324faadfe12b9674131188,2024-11-21T02:30:41.570000
+CVE-2015-4238,0,1,c59fde80788af5d95ca362e14351609dd4fff34e49e3218c665938f7a2e703c6,2024-11-21T02:30:41.707000
+CVE-2015-4239,0,1,a00679bd8167be66a973c67e89f79eaebaaeef3a61bf068deed2ac43b709aa91,2024-11-21T02:30:41.823000
+CVE-2015-4240,0,1,e5ec56defc0bae493eb9c5b2adf8ec578da47b7a79921c6958a61229c6a4acee,2024-11-21T02:30:41.933000
+CVE-2015-4241,0,1,469cef4841712f0b5ceda8bf9e068747e9dabea2cf8f983d41152050f0a99593,2024-11-21T02:30:42.040000
+CVE-2015-4242,0,1,5ef45967c30c03de47ec148f22ff99da2c1c02189715ad82161d1972db3d95df,2024-11-21T02:30:42.170000
+CVE-2015-4243,0,1,4d044ddaf19b621d28591d2f416458a57092fbf17270431419425ab4f5972dd4,2024-11-21T02:30:42.300000
+CVE-2015-4244,0,1,dc5209a6744ac9c30661df23531855be2492d8888593ed9cf1dd46dfb220441a,2024-11-21T02:30:42.423000
+CVE-2015-4245,0,1,9c82b412db4a2ccfc2328420d98be6670c023d659d827bef5c706524ab5711cb,2023-11-07T02:25:48.133000
+CVE-2015-4246,0,1,3451088a5410e0050a58966727044a4b47c579b31210d0086b193c5d15f7f601,2023-11-07T02:25:48.347000
+CVE-2015-4247,0,1,6f19994fcccf5cf42a59089385edf6f82d6d8b5374b2d4753de313eb7d02b10c,2023-11-07T02:25:48.580000
+CVE-2015-4248,0,1,9fff37bafbfc70247217ed2cbef8d4650f837621c970a0340d231ab4cf766577,2023-11-07T02:25:49
+CVE-2015-4249,0,1,9ad9628b700f056005da21b6fe54726f6cc5074f06f7284ac4ff521df4db4f83,2023-11-07T02:25:49.483000
+CVE-2015-4250,0,1,56f74009aed38f5309be37a4fb0a50edeea6a12e482c5a175511326dab1e9eda,2023-11-07T02:25:49.750000
+CVE-2015-4251,0,1,e4a1b20d6d7aded2dd19df8e2d5c1b3717f516f9e967160c3a9c26aba1a2ecd0,2023-11-07T02:25:49.987000
+CVE-2015-4252,0,1,2eeb2eb7e9ca3d7126dbbe8c51ad0e448b6bea11e28c90d9111357e4fd68ab42,2024-11-21T02:30:42.627000
+CVE-2015-4253,0,1,5a9e222751f32ecc79394e7cdf28837431b4f9e0dbf1fdc3fe7220a00da10388,2024-11-21T02:30:42.743000
+CVE-2015-4254,0,1,10bedbb13c66ca29da35b87c24de68b5599c4b9d8f547bac6df71e522bb93502,2024-11-21T02:30:42.890000
+CVE-2015-4255,0,1,6f767f0099c364203a3657a71eb40d7d45cfbf28f67e7fbd6f777ce29f09ace2,2024-11-21T02:30:43.003000
+CVE-2015-4256,0,1,9e40ae14abbaf1511f2527546fc024875f172e1f83685f9cd40a250b58b6b575,2024-11-21T02:30:43.110000
+CVE-2015-4257,0,1,9e9348f8b2b4b54aabef63e57f3347256a0557266eaab88b150d10d01e25b837,2024-11-21T02:30:43.220000
+CVE-2015-4258,0,1,b69062fc2e7fa6079daadb08d2a6084b5aff240092ad6d2c1fbbf985d756bf0f,2024-11-21T02:30:43.337000
+CVE-2015-4259,0,1,14e7324423d163cf9a313d3f4c4524e31d5850ede7e6e9b673c68416e6e503be,2024-11-21T02:30:43.450000
+CVE-2015-4260,0,1,42a1f230c5bb4babb3fcc46eea423c51f12eab451ccbba5039e72738a3f6e14a,2024-11-21T02:30:43.557000
+CVE-2015-4261,0,1,6ac51688043076bbcd0721b364cfd07a1a7c31e07448318236693dc5ac003ad6,2023-11-07T02:25:50.293000
+CVE-2015-4262,0,1,cd88158f40a511dbb37290532d720505ad9f6d30d699c3db4b53577c04b39cef,2024-11-21T02:30:43.680000
+CVE-2015-4263,0,1,8c8e21dc6980ea47902401e626c0ed7ace24d9d8821908ab5ffc84f8717ec481,2024-11-21T02:30:43.790000
+CVE-2015-4265,0,1,d2e28cd91c791733fd3d07dadb8cf36f60528bf607a01573a5a77602ba0f977c,2024-11-21T02:30:43.897000
+CVE-2015-4266,0,1,90f1f98167184db7b3fd6af32eb09c19f37b8ebe47c72530bda3fc491b6c5016,2024-11-21T02:30:44.013000
+CVE-2015-4267,0,1,e2ffabcf14e38488595ed6a5658eebb1feefd8ef8202c98f3bf4116c8ad48c36,2024-11-21T02:30:44.120000
+CVE-2015-4268,0,1,c1bf71ee29fda95e289d1840735d65d4038c61664387f9dd806b50bbd654e5f6,2024-11-21T02:30:44.230000
+CVE-2015-4269,0,1,9a93a226db9c9099a907f1a63dc21135ecbe0ae47ea1f8026ab5d54fbfcb79bb,2024-11-21T02:30:44.347000
+CVE-2015-4270,0,1,acdf3b63c64a702bbd5080e3bd3ddf3d29670ef06556b5c4644a2b738ac4d0bb,2024-11-21T02:30:44.453000
+CVE-2015-4271,0,1,c2287769a66ced87753008590c369c4405bb658011d9f406eda9dab366e702bb,2024-11-21T02:30:44.557000
+CVE-2015-4272,0,1,b2024ad17a88fd069dff750d031752e1dd5a0350658b8a2c55b59440f1c09e76,2024-11-21T02:30:44.663000
+CVE-2015-4273,0,1,9004f7ee616542900a5a5c71e5d05e398f6a5647ac0b04500d9b3d3c6289e142,2024-11-21T02:30:44.777000
+CVE-2015-4274,0,1,f67194c7b2dfec44e01882f90acfa8883735111cd8f990222616dedeaea47318,2024-11-21T02:30:44.890000
+CVE-2015-4275,0,1,8ddefe45f510c2f326e12e9fd733c832f3e6cc33f77dd2ce5457d52ceb8ffd8f,2024-11-21T02:30:45.003000
+CVE-2015-4276,0,1,9f9255abdd1926bb5ea5a9b56781502c34cdc7e3bf381ff3ff20510bce2f7bad,2024-11-21T02:30:45.110000
+CVE-2015-4277,0,1,cbbdf130499cbd360bea520387057e1c58bd84825b0173d6d5733994cc0d1f38,2024-11-21T02:30:45.220000
+CVE-2015-4278,0,1,682fcbe6667a88774523473bd22cc147dc3793b62c10808883ddc471e1eedc0e,2024-11-21T02:30:45.330000
+CVE-2015-4279,0,1,750e4b02b512835efdb81070ae336ae0bb80a51d3eff9b13eb50f92d6802167b,2024-11-21T02:30:45.433000
+CVE-2015-4280,0,1,1326b6d3eb59887491398aa7666fd99e7d5ab2084c4d6b0a6b08ed6b325953d4,2024-11-21T02:30:45.540000
+CVE-2015-4281,0,1,83fdb4be9d3918947596cea6555622ea2a324a18b5014f68c2fc8de038b0290f,2024-11-21T02:30:45.643000
+CVE-2015-4282,0,1,22a9b3e406d155f52e221e45b0e82d20f8697da7ed66ca2f66262861c5ea4fff,2024-11-21T02:30:45.753000
+CVE-2015-4283,0,1,9ecdc4f745dbd3a550ad4ec812c381f43f21f706126b83d021451e87a7a9c326,2024-11-21T02:30:45.873000
+CVE-2015-4284,0,1,a3c084258035ea55a02376ed086997013f1f717787b54e3943180b2f543790f2,2024-11-21T02:30:45.980000
+CVE-2015-4285,0,1,3b8ab7961ad60652603db2819f27115afa594109ef07d42d20da774287dbec7e,2024-11-21T02:30:46.097000
+CVE-2015-4286,0,1,8eb972cd90f26f98a5f8fcb7c57fcfc82e9835d06cc4acc278839b77d83269e1,2024-11-21T02:30:46.220000
+CVE-2015-4287,0,1,cd6d272083ba35da4e99a6b928c47fdc0a5e918ea4ac5351aa809980ecd9cdb5,2024-11-21T02:30:46.353000
+CVE-2015-4288,0,1,dc2bef99e142b201520d0e06c94402e1704ce473dbb02eb87c8da00ec6e39e78,2024-11-21T02:30:46.463000
+CVE-2015-4289,0,1,6b1b1eecd46ecf78a1d15558975ec7e6c97e75190b1a386b28374948e91ebc7c,2024-11-21T02:30:46.593000
+CVE-2015-4290,0,1,026fb7daded4e11381b91492b197f0c6f074d22b0b847848e738f404ff7463d3,2024-11-21T02:30:46.707000
+CVE-2015-4291,0,1,df540862dd286630f81c49d2605ec07db697cc1c8ed86038cc706d516d5c506c,2024-11-21T02:30:46.827000
+CVE-2015-4292,0,1,fb1a39fda4ac3084ddc0666d70ff84b910773693152aded38b6ff649003f77fe,2024-11-21T02:30:46.937000
+CVE-2015-4293,0,1,67edc3297823042a7057ee4088866ab94e6968889c60d8a1c3b8e1248dfe116d,2024-11-21T02:30:47.053000
+CVE-2015-4294,0,1,6e96ca89de86d266ab0a0b49a62cd7221bf5f4a9cc805367cc8bf3ac35ef20bd,2024-11-21T02:30:47.170000
+CVE-2015-4295,0,1,7ad4a3a8f90815ea0de7df8eb408978284a19a1f500e1179f0ae1f1569a18d1f,2024-11-21T02:30:47.283000
+CVE-2015-4296,0,1,b9e8a74d413e89dd66e80a2fc9d5aa7587f436420aaf943a0cdbfe0a77140185,2024-11-21T02:30:47.397000
+CVE-2015-4297,0,1,fd3c188309f9d2d0d1952b62aa994ce85a66567e8a0594ff3ec72b71bcf6fc62,2024-11-21T02:30:47.497000
+CVE-2015-4298,0,1,563048eccad8359079a3d3569107f26f3a446461abecb739b5a8daba7cdcfb93,2024-11-21T02:30:47.623000
+CVE-2015-4299,0,1,2e79c8e3666b1d4b934d71fe8c4aa04ce843926b2261914281cf9640cd118cef,2024-11-21T02:30:47.740000
+CVE-2015-4300,0,1,95aa8aa81ac7b941bf8e671ff4d677db60030f4b17061a1109555e5f8079827c,2023-11-07T02:25:50.760000
+CVE-2015-4301,0,1,73709d6b416adb04b15acf728bc13705a3d1e588dca3d3c73c89121dea513471,2024-11-21T02:30:47.870000
+CVE-2015-4302,0,1,d08321dcb57bae45ffb3082fca7e66dea238382a84455fbd74101a9062435498,2024-11-21T02:30:48
+CVE-2015-4303,0,1,9d29a65bf03b9741f34145871a1820d00a02e22634788fd9c90d1c1c2fd5909c,2024-11-21T02:30:48.117000
+CVE-2015-4304,0,1,cb228ed60b1fc5e0cfbec39a58db413f93fa2717127bf7fe37b57ba795132114,2024-11-21T02:30:48.230000
+CVE-2015-4305,0,1,a21cf40d10e0c768ead318c08a68128faef14af4dbdc2f964a354364c7f81b20,2024-11-21T02:30:48.340000
+CVE-2015-4306,0,1,5f5444a72f16377a6279fffd1f895728ad77281798ce47bada89d337d21e018e,2024-11-21T02:30:48.457000
+CVE-2015-4307,0,1,4bfa6bcf7d59aecad79fb7b49be9d26fbbf4f415d18825f54418aa9272b032ac,2024-11-21T02:30:48.580000
+CVE-2015-4308,0,1,7a676d6f754e9043e995b17badf0021b826c21a3108e5a2fb595dc1d546094d4,2024-11-21T02:30:48.683000
+CVE-2015-4310,0,1,c93a40bac44fc4fa0e403fe438635472d5bb0f7ac946579b53a2c959bc4229c0,2024-11-21T02:30:48.800000
+CVE-2015-4314,0,1,ce0e219e686d3bbc679d8df50b67d1bc81c5385ac116c9b23c26dc36198c4d68,2024-11-21T02:30:48.913000
+CVE-2015-4315,0,1,0936cbe6347c4c1fc9631be2f828ecca395855fa534dc88b14b0baeadc1f53e6,2024-11-21T02:30:49.030000
+CVE-2015-4316,0,1,991c680b98813e3be6d3d422d63bbab3448fba37abba8b0d808c786c67ce70cd,2024-11-21T02:30:49.143000
+CVE-2015-4317,0,1,e246354bdb23939cc18ecdd9fec816438ce30f9cf11a0f4ab7fb07c2df2b1b9f,2024-11-21T02:30:49.267000
+CVE-2015-4318,0,1,9c9e1f7372cb89075a8c0dab4c818b1a21ef32c6a2d7ae657deea252b4234e8b,2024-11-21T02:30:49.383000
+CVE-2015-4319,0,1,fb161f8d3e963e21b4d63d821f354f4a7c4b651d92cb10d56ee361ff16274f9a,2024-11-21T02:30:49.497000
+CVE-2015-4320,0,1,bee5a6ddf927f3c64aa0e8dcd366a0dd9766e6680c8f3dadd39d53a4efc45590,2024-11-21T02:30:49.610000
+CVE-2015-4321,0,1,41322883340faa53a88dc24857c480c33c63dc01b05dc8489de222d6dcd151b7,2024-11-21T02:30:49.733000
+CVE-2015-4322,0,1,2738bd52563e32dcb3b0e003a7a0d860f4b064e7ed75f7e9f36c4dde74e7e29c,2024-11-21T02:30:49.857000
+CVE-2015-4323,0,1,749c77e1f32764bebda34dda1d8c5ddef4d07e6dec131f721ecaa9f9dc54b4cd,2024-11-21T02:30:49.973000
+CVE-2015-4324,0,1,e87ed8b112161adbe648860512ba52d3abaf227d179ee3ed7834dcb9fd56c26b,2024-11-21T02:30:50.107000
+CVE-2015-4325,0,1,cd0fb08c49e0fbaca47c06ad6fb519134c719d3b4a5c8756e6360a5db6a35021,2024-11-21T02:30:50.240000
+CVE-2015-4327,0,1,1829c1c65205106a85b0e9a1af37d1ab971f8f3edd84a9ce98d6879d3006ab61,2024-11-21T02:30:50.357000
+CVE-2015-4328,0,1,564c6c643fa833b6f1d5a000cdff3c14712bd0d50d08ba05e3963674565e0aa6,2024-11-21T02:30:50.470000
+CVE-2015-4329,0,1,5593a42717bc63acd5a1d5bb630b3849d0ba7f65c8195946d03288b23a95c317,2024-11-21T02:30:50.587000
+CVE-2015-4330,0,1,40c0e3cf457234f32f2d5d7734c29cb64bad17e60b3e83b978c8a6b557823432,2024-11-21T02:30:50.700000
+CVE-2015-4331,0,1,a863dcecfdf4e2f58a899348567153e0cf0ef8417c7db1b9d2c4ea391b8fdc83,2024-11-21T02:30:50.813000
CVE-2015-4332,0,0,33917d6b45a049046e594236ace8991867d225fa1f471321ccf94649ecf6bc91,2023-11-07T02:25:51.160000
CVE-2015-4334,0,0,a72dd526f47210d12557d2831c688d903c192560d2182ce4c0248c9be396779c,2024-11-21T02:30:50.950000
CVE-2015-4335,0,0,e20c554660ee8da06c337839c598594b45a2d206fbd7fe5726e591e0f4b2671f,2024-11-21T02:30:51.100000
@@ -79183,201 +79183,201 @@ CVE-2015-6251,0,0,3c33c1ed63f389c69d0baa4c957d0adeea538a15b794b4fbfd279ed72e1caa
CVE-2015-6252,0,0,a386c879c1fa65cbf6c3fc35873536fe0ebe9f007259e64439ee5e364d879b93,2024-11-21T02:34:38.743000
CVE-2015-6253,0,0,0e868966179ab45d0ca7e32fa7aca6f57e15177aa2aafdadbece628ce1d4f19a,2024-11-21T02:34:38.907000
CVE-2015-6254,0,0,b144dd8d53310b1369a449ca9cbfc01b1d0226535a87942f4f2b5011a5bdda9e,2024-11-21T02:34:39.050000
-CVE-2015-6255,0,0,e142eabbad6b749ab3a3ee412e1d0df3c5aa1d3a1d3313d02ea5eaa1e85a9a52,2024-11-21T02:34:39.200000
-CVE-2015-6256,0,0,40f66d97892400153f8248ecfa0c7de152a6a88a0f58784cff58ab78cde17562,2024-11-21T02:34:39.313000
-CVE-2015-6258,0,0,aa0eac15a7bc82d4742cb8d42c9e86b5381ddc38663a16e86a5425ebd6feafd0,2024-11-21T02:34:39.417000
-CVE-2015-6259,0,0,42edb1ae9803775614093635676ad011c3a1e3387030b032e895aa3f9db70501,2024-11-21T02:34:39.520000
-CVE-2015-6260,0,0,335d0944ef90d741a0332ae20be6b9501a04ba89dc854cba9ddd1b98e8f4854b,2024-11-21T02:34:39.633000
-CVE-2015-6261,0,0,f6b46f10c3be5722c496cf4e074e8285bf583a964e5f82f45e5c831e426ff344,2024-11-21T02:34:39.757000
-CVE-2015-6262,0,0,f2aeb5cc7a5510200154b5b7053a0a51ba41524d5105601956454ebb9e2906ec,2024-11-21T02:34:39.863000
-CVE-2015-6263,0,0,87456e9b7192aeca1a50f5473465f9418be7f086f04ff352313df31c74a3106d,2024-11-21T02:34:39.977000
-CVE-2015-6264,0,0,bcc4cdcd8e2e375589942b5075f1a3fae13f71be063afb2538801c62c04ede6e,2023-11-07T02:26:48.420000
-CVE-2015-6265,0,0,beee4fa777c08e986f7e66eaf6d005db1289570302ece143dacfb77ab95cb4e6,2024-11-21T02:34:40.097000
-CVE-2015-6266,0,0,5e152e404abf5973c4039c0fceac04b98d059948864978479d8a61e04e6d7fe6,2024-11-21T02:34:40.200000
-CVE-2015-6267,0,0,0c4dbca4ab3433536315576492ecb019ba58681ee55fff98abd7100ed2dedd6b,2024-11-21T02:34:40.310000
-CVE-2015-6268,0,0,66788f3cd95784b2369a3e45933aff1bb6edb0f711f0a0f5b09adc4da0148527,2024-11-21T02:34:40.430000
-CVE-2015-6269,0,0,2fa767f19a0a035d97c6b6627524dea549616beb7f72674202008604a31f0ae7,2024-11-21T02:34:40.540000
-CVE-2015-6270,0,0,119ac9754d4947ecd7d990c254fcfc13072e003a524b6ced83e5dbac5fd01248,2024-11-21T02:34:40.660000
-CVE-2015-6271,0,0,e8e2e4231d4b70834ee0df70097c012acdad54eb4585dd71ac4681e3349513a2,2024-11-21T02:34:40.780000
-CVE-2015-6272,0,0,5feb91d6d09ecf6a3c958cbb15661ada5099d85219c7f1ffe5bc2a9cd1645a03,2024-11-21T02:34:40.900000
-CVE-2015-6273,0,0,7f40c964f22a8b55e996732030e85e8db12752bebf427986f983e1d2bcee7646,2024-11-21T02:34:41.017000
-CVE-2015-6274,0,0,a6aae68197085308298d027dbdc8e4085b44c2fa23fbe9b1d1ce6b155962090c,2024-11-21T02:34:41.140000
-CVE-2015-6276,0,0,9e07f30a833e1cca59c0ecb1820c9c65219f4c23d25bc95d407bc1a34b7d0ed0,2024-11-21T02:34:41.257000
-CVE-2015-6277,0,0,be95670770e3d0fdef49f104200ed770dcece5e5a04b988accd71ec153ad7a48,2024-11-21T02:34:41.370000
-CVE-2015-6278,0,0,f7c1c16bf268633da33181a1ed530d37f11b6728e09f61bb097b65ed0d9e2f91,2024-11-21T02:34:41.480000
-CVE-2015-6279,0,0,1074f140b94c5fe624e6f993f736f186380f1ac10a764969c124a544553ce732,2024-11-21T02:34:41.617000
-CVE-2015-6280,0,0,4531f78163f7082fdbd9273e40f1d7bfd1cea0c6ca7bee9fc23ad742e95e698c,2024-11-21T02:34:41.753000
-CVE-2015-6282,0,0,944771e2053766ea4f2ffb6d71d9d1b6e820d670b8509d27797f4f666dfbcb87,2024-11-21T02:34:41.870000
-CVE-2015-6283,0,0,bc556575bea300861c7bf6fee7faef69e81b1d02b5ce125c5f2a4218d05eefd1,2023-11-07T02:26:48.740000
-CVE-2015-6284,0,0,8e43b80695e6d9b267ddfbe984ada9a238bb9921398c2fcbf5defea78ceca6e3,2024-11-21T02:34:42.013000
-CVE-2015-6285,0,0,ae4e4a2fa5dedbd994e1560e041909140dc12608849076a28e8286f6567a33d9,2024-11-21T02:34:42.137000
-CVE-2015-6286,0,0,db046dcbcfeb83e2c7f776480737c68cddf71aa645b071f282a01a726e129dde,2024-11-21T02:34:42.260000
-CVE-2015-6287,0,0,c82d92637bf536aec347e435568630cbfe5a3e8261ff2fca7e44de21b1b464a9,2024-11-21T02:34:42.373000
-CVE-2015-6288,0,0,771c58ae9ec99646128c05166bf796ee0849f387ac5c1b1b49057616ec5e835b,2024-11-21T02:34:42.493000
-CVE-2015-6289,0,0,b3b076be99e4604c23a690da1797c380239e44330972ff57b81405d54626cec2,2024-11-21T02:34:42.600000
-CVE-2015-6290,0,0,09c6fe8ea6b3ba9bd1eb5b8898cee49822f62388bbefc53d6a9bb32f1eca2d41,2024-11-21T02:34:42.723000
-CVE-2015-6291,0,0,da0811ba18e4cfd13af4f36ec6be3e5940a0cc347225cc392858a5ed3eb00ee7,2024-11-21T02:34:42.863000
-CVE-2015-6292,0,0,3d92cc36ecd2f11b3e8c89f277bd7382bebd17313612f2896bab1eeb726d5268,2024-11-21T02:34:42.993000
-CVE-2015-6293,0,0,4989fea9434475f8309c398fc9c1073284caff49e2ce9184cd7abee4fd7ba0d8,2024-11-21T02:34:43.110000
-CVE-2015-6294,0,0,60b55415a5ead7933e0857cb1811f67a637b2b21e92f913ecc08ac349d1d253e,2024-11-21T02:34:43.227000
-CVE-2015-6295,0,0,d8cf37c4e0332e9163a7ac13c3a04cd68e7d66f905472570c013e3fdfd58a5a9,2024-11-21T02:34:43.340000
-CVE-2015-6296,0,0,b1473c163fe4ae32eb21ab371494fbd19a7b44b03e4c181bd4810c12b9f6ce49,2024-11-21T02:34:43.460000
-CVE-2015-6297,0,0,03aec57fc65a5db0b65b6bbce08719ac9343e655b3e1a9ebc3d614b3d85d9df9,2024-11-21T02:34:43.577000
-CVE-2015-6298,0,0,671417e890578f936b69dd6c834998576b3fbd8c4dd36218658687877e9046cf,2024-11-21T02:34:43.693000
-CVE-2015-6299,0,0,ba74222f1cd0d125bb5c862487a4a01cd00ca404a5aaed7d8e6fdaeed471dd48,2024-11-21T02:34:43.810000
-CVE-2015-6300,0,0,628ae6c26467e09b1ddb579b74a3992fd169a510e616c969ae65d777b142c90f,2024-11-21T02:34:43.943000
-CVE-2015-6301,0,0,13d47132835c4991e3e747ec5af6f3d461e47f06f783f8636fc09c3822aa54bd,2024-11-21T02:34:44.060000
-CVE-2015-6302,0,0,d5fa5fc7ecd7bfa62efa7581d6f18e1ef5454793ebbeb1d824d1e1a03b18705f,2024-11-21T02:34:44.187000
-CVE-2015-6303,0,0,9bd8a176075502faa53fb04fb331ed4b593bb921aea80aaf1dd07dfb15874fb1,2024-11-21T02:34:44.303000
-CVE-2015-6304,0,0,9e1b26cca1ccef5967b7cf1bdc1f6187ccdf19360c7ff8a535d312c30490a65f,2024-11-21T02:34:44.417000
-CVE-2015-6305,0,0,acf22ef8b629a7dda44793be1d8f410cd7cdbbc0f8c45c49aade2ea11b4b8c7c,2024-11-21T02:34:44.527000
-CVE-2015-6306,0,0,9577d9fa2eea57962ae8d3cb9f0d765d656c49d25db58f6569a0d18300a18ef6,2024-11-21T02:34:44.670000
-CVE-2015-6307,0,0,5540f79946235ef9295035294462b23f1b4c92a1e3427970aac2071e97703d41,2024-11-21T02:34:44.803000
-CVE-2015-6308,0,0,2d9092fb792d5d1f11275926d547059b21e88f5a0c70dcc576c07f7d25ea33fb,2024-11-21T02:34:44.910000
-CVE-2015-6309,0,0,e6c536afe3af7169088766f7cf24513cfb956e8b200ced6070b6035cf0ac21cf,2024-11-21T02:34:45.023000
-CVE-2015-6310,0,0,76cd19b0e28febc804c71e1640a997817ab2c9275809ce898cacf54a5ac0885f,2024-11-21T02:34:45.123000
-CVE-2015-6311,0,0,5fd7c3a2a49369ec7135720129ab7ce8e6f6c605f6a133ce99fde5817c9f7104,2024-11-21T02:34:45.270000
-CVE-2015-6312,0,0,26db9c758ce44d5e5b398f4306ddd660ce16d4a47c2038f4a52475a4246a4c82,2024-11-21T02:34:45.453000
-CVE-2015-6313,0,0,3048a46bb702c0f6456eab07b012862020451401ffc7eaf2b534cea0897696ae,2024-11-21T02:34:45.620000
-CVE-2015-6314,0,0,cc3e2869256c167ffd96e51e6d0fc9ac71246e215aabfabd5bbcb750d78be178,2024-11-21T02:34:45.787000
-CVE-2015-6315,0,0,45e80bcb149e4fb7f52a2924761d6f77f415c7ee9577f977539ba33a571b3b8c,2024-11-21T02:34:45.940000
-CVE-2015-6316,0,0,eee5b73b84ab681e5bf5f8eafed1f9f89f215ba240f772320b417b354c7e0a98,2024-11-21T02:34:46.113000
-CVE-2015-6317,0,0,6f14f3c339179b0bf1694cbc9635698911cd4d6759ce41294693c5b11d01e7cc,2024-11-21T02:34:46.270000
-CVE-2015-6318,0,0,c011e1ea54a31c504703b1b52bb8a72c78ecc4012967e2596961e7b422c69310,2024-11-21T02:34:46.447000
-CVE-2015-6319,0,0,95f7162672d1eb1239d4199bc2086adba5f5625230aff838085aeec736b0c494,2024-11-21T02:34:46.617000
-CVE-2015-6320,0,0,717f0cfe34601560a86be45efd92387c74b3da2745343d66677f17e159a08ddf,2024-11-21T02:34:46.773000
-CVE-2015-6321,0,0,e4f076b6bbe0bd864258d18ea84435e56f8f0f9347891245bb0622cb0ef52521,2024-11-21T02:34:46.890000
-CVE-2015-6322,0,0,eff6b0060fb2bbfd646d5782f3a4c6c4c6402bacf7d7f3369527c4fac84a0140,2024-11-21T02:34:47.010000
-CVE-2015-6323,0,0,f17585799148cdbbe7855948240ea9779be6fafe2fc920029e9bfd3834bb179e,2024-11-21T02:34:47.143000
-CVE-2015-6324,0,0,c5b70ab7c375a79efd0217dd46312750894e40120087969299bd7c150e089349,2024-11-21T02:34:47.277000
-CVE-2015-6325,0,0,1dc32ac0d715ad43fca4eb7a01a66ab7ff4ac8f0131658bd8e61e1cfa4e2a3f0,2024-11-21T02:34:47.410000
-CVE-2015-6326,0,0,e57df6aa2c6799ee0677fb8c8ae4df90b64b0b33b5f35a320650fb434e329d62,2024-11-21T02:34:47.560000
-CVE-2015-6327,0,0,f13f84bbfeedb296af3dd3ea2e94228cb46b7f41ec24893e8490d1c607ea3dd5,2024-11-21T02:34:47.717000
-CVE-2015-6328,0,0,7a8dab834a469c1d1c9c36e71106b513f7816cc3354ac259ea6b910c9c6b8a70,2024-11-21T02:34:47.867000
-CVE-2015-6329,0,0,632794b5b46ff68292c13a5b709d9307c6b7d6f544f5dcd3ac488f08040562c4,2024-11-21T02:34:48.003000
-CVE-2015-6330,0,0,8b1e736e4bdd8d545b276e72f7535c723cd3a046afc9fd987981f52359ace081,2024-11-21T02:34:48.113000
-CVE-2015-6331,0,0,2992343853e4cf73a27c382e8764c9354be67ad0a9efd967aa24b80f7e95470f,2024-11-21T02:34:48.220000
-CVE-2015-6332,0,0,939c0380df96987a6f64d02e2c1ffb2d835149cb1968456dec045d7a16d79770,2024-11-21T02:34:48.330000
-CVE-2015-6333,0,0,fad7330842319396ab1029fcb329e197aa4d53737e601e4391411a5d40613dde,2024-11-21T02:34:48.447000
-CVE-2015-6334,0,0,1d00576955268e7e0e021322723db5afb26fecd5ad69a1942506540ef63b2eb9,2024-11-21T02:34:48.563000
-CVE-2015-6335,0,0,b9a7a016e944d213cc66fd558a9c90819000b0ef8b82b37278e1cab5eb958f66,2024-11-21T02:34:48.677000
-CVE-2015-6336,0,0,1f38e7c73a5e578dec7bb58eebc736893b5ecafc8148437f9e21c02bdd892981,2024-11-21T02:34:48.793000
-CVE-2015-6337,0,0,e737d46a4f6e98645c9dbdf6539ae22cf1e9fa5deb2194f446c4faebacd8196f,2024-11-21T02:34:48.913000
-CVE-2015-6338,0,0,f8c1a361790995d75ecedf6db98218e3cf7e37bb34930584b92d813b1d735ca7,2023-11-07T02:26:49.443000
-CVE-2015-6339,0,0,29528fc11bef2a98566aca6db27d990cc3075e65f79b3337c343d686deeeefe9,2023-11-07T02:26:49.660000
-CVE-2015-6340,0,0,11bd6a79678a9a9b1d74bba83b7c03c7e1146b98d540c5a0d8970a518f6958b1,2024-11-21T02:34:49.053000
-CVE-2015-6341,0,0,c470f290e7a60eecb92e927f8b508c014736024892553f520672a385266a600d,2024-11-21T02:34:49.167000
-CVE-2015-6342,0,0,92adc3df7756a82fdfd8d85cd1832f9849474e0e522cd77ffd49b7c143f6d890,2023-11-07T02:26:49.910000
-CVE-2015-6343,0,0,87480d3ad8fe8e642fcb8189eefd7f5165e0fe5b9efb84e78f2b77507845a957,2024-11-21T02:34:49.297000
-CVE-2015-6344,0,0,c088525a4675d7391e903592b3deb1a8ca026b796d477801e7886493b5b4cf63,2024-11-21T02:34:49.400000
-CVE-2015-6345,0,0,e9ea4ac094160e96164dbe54e4958bbdb2b80c4251c43564e7e7262da91d55fd,2024-11-21T02:34:49.507000
-CVE-2015-6346,0,0,c7911d0e57a80e30b17e8c92caf731e4e937960728a4b6759e8bfb0ff48ec362,2024-11-21T02:34:49.620000
-CVE-2015-6347,0,0,8e3651f779588155e5586f4f077d4679e551756773d6c002c4565f4e14371bb4,2024-11-21T02:34:49.727000
-CVE-2015-6348,0,0,dbd32422d0d3476da244fe1dc50fca5ac45c84e8c454680bf3baef4421a935a0,2024-11-21T02:34:49.837000
-CVE-2015-6349,0,0,ba47ede1ef1a726869712f5ccb8ce73e48069b3ccad9f330bb22d71f59898287,2024-11-21T02:34:49.940000
-CVE-2015-6350,0,0,d41a9fff7b5e90ceb991b1a00966e1d91687404a24e2ef33ead5af1efedfb73a,2024-11-21T02:34:50.047000
-CVE-2015-6351,0,0,708cec3ea3840e4559c3c3132e6925f7e02cd912463f30b92fbdbfe6c2193cc4,2024-11-21T02:34:50.157000
-CVE-2015-6352,0,0,4d615ec34fc765664f1db1d09b1685660bb6e8a48623e792f0f7f6942f24ac37,2024-11-21T02:34:50.267000
-CVE-2015-6353,0,0,aff2e8a4f67974ef761b85f9e556a7fddffa6d7c2976732bc8c08d3c47d77e74,2024-11-21T02:34:50.377000
-CVE-2015-6354,0,0,7120732b8f5af79c979fe1af25191c4bbee8f207639fa3a089cb9cb88901b1d5,2024-11-21T02:34:50.480000
-CVE-2015-6355,0,0,a91f865cf0bc96e3aa2fab94cd6f181c516c958b21d2d8202a74953e7307bec6,2024-11-21T02:34:50.593000
-CVE-2015-6356,0,0,5c69604c89d1e8dc981d2afa79a18f8a16a13fa11d7aa628df95a4c22664bb36,2024-11-21T02:34:50.707000
-CVE-2015-6357,0,0,f2cd620771d60c75a64dc98c200c2d68ba5ec18e614e00ad9fcea590ab250d9b,2024-11-21T02:34:50.813000
-CVE-2015-6358,0,0,da9b1182603cbcd1bf5c8a572d79d7c92e59a977c9c09a123736c01ce1ba349c,2024-11-21T02:34:50.923000
-CVE-2015-6359,0,0,a8ada6246d5bea9b211f05d12c62c5aa919b317e9ca4adb88e7f227b3dda8aae,2024-11-21T02:34:51.087000
-CVE-2015-6360,0,0,caa1c5e5797a1ea722afb4bbb99de6ad35c0f158de485513b7a733a0afba6b12,2024-11-21T02:34:51.213000
-CVE-2015-6361,0,0,c3f5c66d9c26ad3b089ba897a581e3f78ecc3bdea09f312130c4b8e01713225f,2024-11-21T02:34:51.393000
-CVE-2015-6362,0,0,73cbd0e25f8e44fc174530a0fdadaed6b230ebe8fea8782a2e121aaf873f4bbd,2024-11-21T02:34:51.510000
-CVE-2015-6363,0,0,ee5f7deefc7287c19bf74544d3d5a504ac8962867a03d4726eb0e4d2b77fa611,2024-11-21T02:34:51.617000
-CVE-2015-6364,0,0,cf36928603ab214463bb9c51534dacca3c959e12ac43a1e91d955b1819ce733e,2024-11-21T02:34:51.730000
-CVE-2015-6365,0,0,b235e53c1e51c8c1134df0f9c5482bbf518fc5589d30c3818cdd3539f2eebb21,2024-11-21T02:34:51.837000
-CVE-2015-6366,0,0,4b6ee5ebb0d8b6ecf88b7bb86b47e9cd39174b79dafd964e3dfd7d3e30f5d086,2024-11-21T02:34:51.947000
-CVE-2015-6367,0,0,7850a28c1ec6c59b782407ad850997ce97bd58527ed6bc5042e0bca933904fe4,2024-11-21T02:34:52.060000
-CVE-2015-6368,0,0,8b2373f6b13076aa4ae55dbf7c9372d22001b23ba171ec1def879635301ab7d0,2024-11-21T02:34:52.177000
-CVE-2015-6369,0,0,d6642b0df97ecc800d02e8d9bc947b73c6537945c6726671292c51c9a5c45955,2024-11-21T02:34:52.290000
-CVE-2015-6370,0,0,c0d437b01ff3e97761df868dcc72ef1dff88a025fb9d9161e07156892ad2a5b1,2024-11-21T02:34:52.390000
-CVE-2015-6371,0,0,8178cfcde4574a3fe832a227fb15ff4136349001ccb997c71fe284470f4b6680,2024-11-21T02:34:52.507000
-CVE-2015-6372,0,0,40a4d568db9d9404951ab3978e613c8ed275e28128b2345b116d556e7f2d49c9,2024-11-21T02:34:52.620000
-CVE-2015-6373,0,0,65d1e37b5e57d1431321350a58adf42cbed4b2a5020f5257dce4fd93d0bdb9e0,2024-11-21T02:34:52.730000
-CVE-2015-6374,0,0,83a407ac54987b3d4a58754fc356d6db5e790f6c0d35ebcae77fcdf72185d7aa,2024-11-21T02:34:52.840000
-CVE-2015-6375,0,0,9a1b981611bdc0347128bd329cacadc25ba20a0e11f518839c9ed089a99b4db9,2024-11-21T02:34:52.970000
-CVE-2015-6376,0,0,699b7a9305ebba23ee80384bb4df4ce2bdc90f191541a51a0f1e0d6e5f15282f,2024-11-21T02:34:53.100000
-CVE-2015-6377,0,0,8822a97ce9e2be25c9733ca1b2a7385399742a97029114ae63d981bf8be46a85,2024-11-21T02:34:53.217000
-CVE-2015-6378,0,0,8ecc999043e051daa737048663bee3a468b756675514cb21cff905b5f9e8eb39,2024-11-21T02:34:53.347000
-CVE-2015-6379,0,0,3da861b2a54ad4afd994d0ff184b2fcd8dd5feaad85c998d639dce514c98f483,2024-11-21T02:34:53.467000
-CVE-2015-6380,0,0,bb197df823ad6295217e5aef3207a0b56a515d4cf22cdb944e32c0f2a058f8d8,2024-11-21T02:34:53.590000
-CVE-2015-6382,0,0,c2125cd9cf0a51338f742773b621cb0f53162d35451185f8c7aca2b6c508c3da,2024-11-21T02:34:53.700000
-CVE-2015-6383,0,0,d03c4df433ccc30a0038b65b1aad3c7aa4e9edca6a20892dd09b17463957c8c0,2024-11-21T02:34:53.820000
-CVE-2015-6384,0,0,42c6a5b4559ebc84d987ee7a388eea02d2bb0acbdd941d0942cd7f526dfbc561,2024-11-21T02:34:53.933000
-CVE-2015-6385,0,0,2b1a1d1531be1d6ea5e93cef28220485a40f13994581d54d7c8289a20acbdc8e,2024-11-21T02:34:54.043000
-CVE-2015-6386,0,0,2ac6b093c4a1fd08e7700c0798fd7f41e4ce5f847da28279e15026b544114b30,2024-11-21T02:34:54.147000
-CVE-2015-6387,0,0,18226bb7d706608de71dba31e271a94608b790e43e58160981bcbbf7fbc489d1,2024-11-21T02:34:54.253000
-CVE-2015-6388,0,0,2e586f53c030104b6dbaf60c8276bba183c822d4f0b3984cf525878c96a7e0af,2024-11-21T02:34:54.363000
-CVE-2015-6389,0,0,9c9d789880bb37101102baada6f99b909c7df4514d07aa2d4d687da7c756809e,2024-11-21T02:34:54.473000
-CVE-2015-6390,0,0,2d8dd6b5e54b5b869e453ed05e4ec221787f4e4c4eebbdc413a196d9e857489f,2024-11-21T02:34:54.583000
-CVE-2015-6391,0,0,bfe564080c94d17f220018bfe9248a1bbf2fe2e4b6228179bbddb61c61ac4a01,2024-11-21T02:34:54.697000
-CVE-2015-6392,0,0,8f1c0ce7a1a530d5f9a4e9d1ceb1df5003707cf5cb02b974c468fc9db5558e01,2024-11-21T02:34:54.800000
-CVE-2015-6393,0,0,42c82618b393a8cf1edcd57a3b200e8073c637792d0e6b90f76107835823713e,2024-11-21T02:34:54.953000
-CVE-2015-6394,0,0,1e0ce566bf7270d5d69ce3b2f60922fc92f05b0b44ca0b4b192c6c3b4710d814,2024-11-21T02:34:55.097000
-CVE-2015-6395,0,0,8ccc5c7299e1703bc2d50bf3a10d1bf27c4d22da0f2bb2be7bd1259ab7c498ed,2024-11-21T02:34:55.207000
-CVE-2015-6396,0,0,c7e69f1720fc35d300d76afc5812ed6f88c091cdff1f2b943c392bd9dbaf072f,2024-11-21T02:34:55.313000
-CVE-2015-6397,0,0,656f55207033106851503810c38dafbc0c7bda8cd1bc797cfdfbf6fd935c3bcf,2024-11-21T02:34:55.440000
-CVE-2015-6398,0,0,7fb8b004205a29a31b1c998d1357c2fa94d68f441c2d62ec95742be0bd632a4a,2024-11-21T02:34:55.550000
-CVE-2015-6399,0,0,780d28c26ca6be5a136047f7e222e559c32ad7fc81daad9a50393cb6b10ded0d,2024-11-21T02:34:55.653000
-CVE-2015-6400,0,0,d59d24380ef18fe7a8f2ac97eb49388c08f227f1636d8f63b9b25332710baa32,2024-11-21T02:34:55.770000
-CVE-2015-6401,0,0,9787abdc517797d62878887d0b6f8cfb397d5054cbe3ec240aa98688d9d66c0f,2024-11-21T02:34:55.883000
-CVE-2015-6402,0,0,3c6cb913c28b4c9fee7bb10ec49891e28f2c9105c8a97dbc1428e0ebde7338fd,2024-11-21T02:34:55.993000
-CVE-2015-6403,0,0,9d2aa64ba96f0292aaa85bb454688fb64271ed75e7ad96dcd1916e559b2e7dae,2024-11-21T02:34:56.100000
-CVE-2015-6404,0,0,1d990bd644e49f1cbe6a86eeb32e9116819f4e6bc296c9f95068d32948ee59e1,2024-11-21T02:34:56.203000
-CVE-2015-6405,0,0,aad9d68349a02919ac6f172e08c19c8b2796e44425c606d5947cd8b52b6bd0dc,2024-11-21T02:34:56.310000
-CVE-2015-6406,0,0,71d75447f3c157117a1fff8ed94a992c616cda47ce985a8d26270d54af9739a0,2024-11-21T02:34:56.413000
-CVE-2015-6407,0,0,88b24d6ace74f991c82dd4e8a92afee3826d7fa5b777caccd02165b282d40d5f,2024-11-21T02:34:56.520000
-CVE-2015-6408,0,0,f7d9741145358707520839aa2c4318858cb353b9d0f90f500b6da6b45e514c1d,2024-11-21T02:34:56.617000
-CVE-2015-6409,0,0,e8efd4b6f534b89d1b27410b0752138fe0d94222313577c7e66bdd4c405049c2,2024-11-21T02:34:56.727000
-CVE-2015-6410,0,0,123a466da7b57f489577e19abe27770085d4c89e5d054ddefc22ddd32eb75e52,2024-11-21T02:34:56.837000
-CVE-2015-6411,0,0,b05d830da206bb0ca0cb071241e9d8a4d98f92c988b9e5abc2bd9b64a9c68252,2024-11-26T16:09:02.407000
-CVE-2015-6412,0,0,b58226c551f403592f75a10bb6945dd58dab7982e7ce738ade818be24c6cce6b,2024-11-21T02:34:57.047000
-CVE-2015-6413,0,0,fec804ff15d848538e4a61404af51cc42d7f2d126574221dc338e6eab3e880e1,2024-11-21T02:34:57.140000
-CVE-2015-6414,0,0,8cdabb93ae3cd621015cc6234f208d76f3cb472e1cfe789ac569b522995c9634,2024-11-21T02:34:57.250000
-CVE-2015-6415,0,0,ba53b9b6dd78f7c4c57a105596bacb87aeef35ef25520734483e02d5a7cacceb,2024-11-21T02:34:57.360000
-CVE-2015-6416,0,0,d0a8aee883e0032f3efee92d1273b0ac30a0a3bdc9bd81f0cbd925a224b36981,2024-11-21T02:34:57.457000
-CVE-2015-6417,0,0,c74b03c416f29fa0424320a5f626a8e3c58e46b934c79c29f3495a26d6cafc46,2024-11-21T02:34:57.557000
-CVE-2015-6418,0,0,3f99525d6914adbff37142c41c9470a4fdb84e85ffd63043f2454486fc600b9d,2024-11-21T02:34:57.660000
-CVE-2015-6419,0,0,43ad2be499cad3c17579d4422d02cdc7a3edcf213bf31524e55613c45181f672,2024-11-21T02:34:57.763000
-CVE-2015-6420,0,0,e5e4618f2d55229feb20b45400cb205dcb77471ff77a54fb94d071ef4fc7c5d6,2024-11-21T02:34:57.870000
-CVE-2015-6421,0,0,d3da3a5d79c967cfbee8640a21e0ffa79213b1e2dfe7fdd76128045c89d90987,2024-11-21T02:34:58.017000
-CVE-2015-6422,0,0,399987b748d7001b859f04a6617ab090e09cb626325df4c1d48cd5c388481d43,2024-11-21T02:34:58.183000
-CVE-2015-6423,0,0,365ba36b91390e847829ce162bdd05604095cf8c786c2a19483cae282d07592b,2024-11-21T02:34:58.293000
-CVE-2015-6424,0,0,5b02705a70371d87722c3fefd72dea43d7d8a6961c422074766d5a3ec7d16fa7,2024-11-21T02:34:58.407000
-CVE-2015-6425,0,0,851badcfbd87e0c14a8c6e62bdb5ee464dce71af66f9075f8d7e40cf5fcd671c,2024-11-21T02:34:58.510000
-CVE-2015-6426,0,0,003d1985c94704031b34137d1d04ec617858731509fbbaa1630c8d458308213c,2024-11-21T02:34:58.623000
-CVE-2015-6427,0,0,bf54383ec962600e1e3338103cd4a6732318da8c03b79a6f99a4cb77253aa14b,2024-11-21T02:34:58.723000
-CVE-2015-6428,0,0,b4eca1beb51d3ac492e059448da10bf069bf0bb8240a0a135fe94533514f601d,2024-11-21T02:34:58.853000
-CVE-2015-6429,0,0,f2cafe74690a0a490b30f49fe77ae07b582be6c0bf5cc6fdce7167512f2f284f,2024-11-21T02:34:58.960000
-CVE-2015-6431,0,0,b40b753ae2453f3f9919cb6b5fb8f72df017789267839e35908a2bf78ddca305,2024-11-21T02:34:59.063000
-CVE-2015-6432,0,0,150b89eb7def58c32800a8fdb0b2b555908ca46a14e7e3038b66bc1312b30187,2024-11-21T02:34:59.173000
-CVE-2015-6433,0,0,28b821225fc166cc09bcb56badcbf80fd002bbd59e00be561e0ad4b467e511fc,2024-11-21T02:34:59.290000
-CVE-2015-6434,0,0,ce738c4f8640d08f9d24ade8e67fe5a2e455c1f3d096ff2184be0076e593642e,2024-11-21T02:34:59.397000
-CVE-2015-6435,0,0,1a30cd75e21feea391aeedebcce277a700460050aeb0237bc95ede4eb8046ca4,2024-11-21T02:34:59.503000
-CVE-2015-6436,0,0,72e89269f3771d339af15101fec9253f2b3c085cae3fd94a2f8ad8d9cbfe2592,2023-11-07T02:26:50.840000
-CVE-2015-6437,0,0,36b93fd1b6d49433f6b2fea7ca00dd3108c255d10ee0a33bca5861c490bab950,2023-11-07T02:26:51.080000
-CVE-2015-6438,0,0,dcf016f9d5f520225cce34f916e60b59490c0d75eec4ac7e76ddbd5af53f5b86,2023-11-07T02:26:51.310000
-CVE-2015-6439,0,0,4d20957ea0a5922ba2bcfe1e3af6bbfa21ce5f75072f7c1099af337276589186,2023-11-07T02:26:51.533000
-CVE-2015-6440,0,0,dc0308e13283586ac82048d99f7662c1968967e432dd6cf647219f734537d8ab,2023-11-07T02:26:51.767000
-CVE-2015-6441,0,0,88a349487824d28d3fcdd72fcdd34f879b58c7b5e550e02fd77211834f0e2832,2023-11-07T02:26:52.010000
-CVE-2015-6442,0,0,2e60d4377bd791a4d7ffe12963b86372cefc9f8f1c891ee4cd2bae35d083aa9f,2023-11-07T02:26:52.240000
-CVE-2015-6443,0,0,baed2c1468a0d2bfafa14df45e22ee762b96886f52c5976e9dcce4691de2fa37,2023-11-07T02:26:52.487000
-CVE-2015-6444,0,0,7c3902095fec101b9487a36113f200a991156c70f880d6c0d3728d5b0a2f1526,2023-11-07T02:26:52.720000
-CVE-2015-6445,0,0,423ea4e08de3c0a03d2c1ff5b92d96c1758902c5b897dd38bb30fbc9f0642fd4,2023-11-07T02:26:52.960000
-CVE-2015-6446,0,0,e13fb326e6a7f6dd981ff5a30de7af0b5f9dbea3ee185b473b27ecc9f7913543,2023-11-07T02:26:53.187000
-CVE-2015-6447,0,0,798e24c05bb6f9e028e1ba374bcb89b738fbedf143900a53b30ebcfc29fe5bd4,2023-11-07T02:26:53.410000
-CVE-2015-6448,0,0,c5f85eea1ba5bd3136ee8182ece477cab5523d036b4fd3681a6d3d34e50564d2,2023-11-07T02:26:53.647000
-CVE-2015-6449,0,0,c53e284f4400bf92056ce83920cc2968644c7e6b10d67ce1ec55d3b411745b42,2023-11-07T02:26:53.900000
-CVE-2015-6450,0,0,7c5b99190d795b1f418ca22c94f38d87098a9fb22c4ed98ef8102a5d95e1c245,2023-11-07T02:26:54.137000
-CVE-2015-6451,0,0,bdaf0c197a9185c49546fb0cfa48786bc4095ac442ff22087ee3954b2bcc1682,2023-11-07T02:26:54.367000
-CVE-2015-6452,0,0,6e7d4bc730f5f4995dd13b4087d1e0268c3bf64b449b75e3f132f7b54f5fa796,2023-11-07T02:26:54.600000
-CVE-2015-6453,0,0,de8cd47bca2041133f3b5d5d2d4245aa646ed668fdbca7a78532eb59c1bc3089,2023-11-07T02:26:54.857000
-CVE-2015-6454,0,0,7e01b101332da278896dff4f82212884fd738bec7aeb3765e31b06b0880e7498,2024-11-21T02:34:59.887000
+CVE-2015-6255,0,1,5341d969fb17fc62a38d6abd5f61b92c57a0b7c185cb90a6057d2ad6bf0e8012,2024-11-21T02:34:39.200000
+CVE-2015-6256,0,1,d9e1bda4f9fcd2e1d7dd1fb214dc32b79b942e394746ee5544f266af346831f8,2024-11-21T02:34:39.313000
+CVE-2015-6258,0,1,ba4b2d47006f4ec2c3778642bdd5aac55c0caad7e29215d2a674c5d6553a2b96,2024-11-21T02:34:39.417000
+CVE-2015-6259,0,1,ede2e1eefd50f65ad3cce92a16ef1ab78018f8d82a75704a70935ef0a619da89,2024-11-21T02:34:39.520000
+CVE-2015-6260,0,1,5ca1ef874a2c4f452fb64b43e2c3c8dca9526a55c38ae54589ac5cb20c421253,2024-11-21T02:34:39.633000
+CVE-2015-6261,0,1,4411a172d36c61b8d408fbf67694696aee4edfaf3038421c8854fe1dd98f094f,2024-11-21T02:34:39.757000
+CVE-2015-6262,0,1,95a69763b926dfaebd508787fa11cc12f84e86c0b0fb70fbc2c8f3982bac90ca,2024-11-21T02:34:39.863000
+CVE-2015-6263,0,1,35179dabd740dfc7d9ddfad8d179a62e6f4869d89c28249414f3d92ae9a3f46f,2024-11-21T02:34:39.977000
+CVE-2015-6264,0,1,bd9b5b1f3354d8f1d90464686c24581f4f8d011802ccab81ef2b7b40017b654d,2023-11-07T02:26:48.420000
+CVE-2015-6265,0,1,ad4483e74eaf878da43a0e575d45cc0cf90994be9763c8fc143d8199dea7be7e,2024-11-21T02:34:40.097000
+CVE-2015-6266,0,1,24f98ad6971073f50555281d14e3bad0cf490c1072be5f1cae1940f350e9fe3b,2024-11-21T02:34:40.200000
+CVE-2015-6267,0,1,25d55087038144d218fd392358c071251c7c990496279602f221cb8cc9bd2814,2024-11-21T02:34:40.310000
+CVE-2015-6268,0,1,4aa23d3fa59ad0d016cfb5aefd17a4e630f999e7d6f22a06005b1951f8ac4cf4,2024-11-21T02:34:40.430000
+CVE-2015-6269,0,1,706fc870fb55b11d92ae617e8c6eaa859d95cfd173fee691c529b1d96878bc96,2024-11-21T02:34:40.540000
+CVE-2015-6270,0,1,399017c02cd37c18c13fdf99789c863006c237b413106279dfda87278e5270dd,2024-11-21T02:34:40.660000
+CVE-2015-6271,0,1,64f420d7f19721b0e4eeeab9435118cba3e5139c095636463c4b655f5e55e7f0,2024-11-21T02:34:40.780000
+CVE-2015-6272,0,1,3ee1d14274f03501b5eea2b11c546df19d2ff98595e2f80cb37407bffc9eca2f,2024-11-21T02:34:40.900000
+CVE-2015-6273,0,1,13d4b503a7e0fc5e804b86dbd900c6209a770e10464a9998493cca089790b3f1,2024-11-21T02:34:41.017000
+CVE-2015-6274,0,1,cdfdfeb9b22303478530483b69df5f2358cd3b27ab0c58f05d10cbb7e780bb4f,2024-11-21T02:34:41.140000
+CVE-2015-6276,0,1,0bd99bdca716a9bc6f83a0f120b8337fc2513554e025bcf1c55546d5fe812c3a,2024-11-21T02:34:41.257000
+CVE-2015-6277,0,1,151a691e8cf846da4f82df89dfb7ee570d3566a5200df1ef661098eb4a1be90a,2024-11-21T02:34:41.370000
+CVE-2015-6278,0,1,18d49cc356e572aa1f96319eb710ff60ff772cd2a24d28dfa7099ecb5233c2e9,2024-11-21T02:34:41.480000
+CVE-2015-6279,0,1,adc5c2a09d0609090ac91b3dee75d863ee2285ac0e02763ef2efb488a2c946ef,2024-11-21T02:34:41.617000
+CVE-2015-6280,0,1,81382443f35cc75e11dcc5399f71af78ab9d66b48735380de5dabf822a7187c1,2024-11-21T02:34:41.753000
+CVE-2015-6282,0,1,f0c15dbae1db2be5939f2aa715ee68ce04ff89561e7d618aef5cc6bfd5de8fb8,2024-11-21T02:34:41.870000
+CVE-2015-6283,0,1,cf7463eb198eaf27f01fa6ec4c19e91c3d95293ebc877c35fbda01f873c2290d,2023-11-07T02:26:48.740000
+CVE-2015-6284,0,1,22289f4d8c579e95115e29aaf3a1019b36532b132da754036d286e2618c6d61d,2024-11-21T02:34:42.013000
+CVE-2015-6285,0,1,7ee614013fb501d69996bde29ff342a298c18c0a0417551f74d64abe0b97bccc,2024-11-21T02:34:42.137000
+CVE-2015-6286,0,1,0c8b3da26d8d00d819397b150d26f06232dd59bce64d6a39fe45e704d231fd66,2024-11-21T02:34:42.260000
+CVE-2015-6287,0,1,0f7f7ae56856c182646249539ec2a9885c0353194c54c888b35e839ce44581df,2024-11-21T02:34:42.373000
+CVE-2015-6288,0,1,db0b764127f1ccf8248286c26938159a532250f044a8bd62823662542ef0b0e3,2024-11-21T02:34:42.493000
+CVE-2015-6289,0,1,9ebe0335383b0f02e511075523e63409afab74eaea96a134065cd0490ab01668,2024-11-21T02:34:42.600000
+CVE-2015-6290,0,1,982748e16b7985a55fc4eae07f7545a5779c7f3c1f77e88a85f9a0433b7719e2,2024-11-21T02:34:42.723000
+CVE-2015-6291,0,1,282a490378081862d1d56130e2d4f8b59ed3fb0820d0170a0af0cb89954b8206,2024-11-21T02:34:42.863000
+CVE-2015-6292,0,1,aa2014b7db215d47777254719c26d62e50f5c81c814515251402b57d2f268bd1,2024-11-21T02:34:42.993000
+CVE-2015-6293,0,1,ef27e3ae65ec5a5fe6d8b5767106c264c4f544d45b0b61e4557430864d3c601a,2024-11-21T02:34:43.110000
+CVE-2015-6294,0,1,4ffd80b0bcdd35d716fd17aa8443b4cad15902c9759571e36a21818c9c902bb1,2024-11-21T02:34:43.227000
+CVE-2015-6295,0,1,00e6c693962b29a6148603c7aec98ac5674a5771c95d44aa06affcc38f8cb2e4,2024-11-21T02:34:43.340000
+CVE-2015-6296,0,1,0e9c2a557809cad8512a641a64e2c421c41a185f2f48d59fbdc89686af991c7c,2024-11-21T02:34:43.460000
+CVE-2015-6297,0,1,5080a0ef3760b272d8ba4c64e08c98eebcc4f0e0813d2a786e7e7ff0a24bcf75,2024-11-21T02:34:43.577000
+CVE-2015-6298,0,1,c55f31ac85dd7f641b22322f8ea1cab9ec9a25bb35b431522a0c4ac5b92d7eab,2024-11-21T02:34:43.693000
+CVE-2015-6299,0,1,21f74c0c566b57f4ecbd4b7060ae65db75a3bc2227144aeea6476f001a577fd7,2024-11-21T02:34:43.810000
+CVE-2015-6300,0,1,400894ab19ba4805539cdbc1b229d51f593f105e369da1abfd1550a45edb68fc,2024-11-21T02:34:43.943000
+CVE-2015-6301,0,1,247f4cf34cf4ef0d465e43e56e53cbf8e30614cbaa74d43e5116307cdef1c708,2024-11-21T02:34:44.060000
+CVE-2015-6302,0,1,308a3e2adbfc915e99cd14b7b2535d4dd7aa29e43dfb951a5fd0a37ac619de06,2024-11-21T02:34:44.187000
+CVE-2015-6303,0,1,1ec3918a90c059e70d021cf35fd5e9151cab65caffcdfb335830676ff4386253,2024-11-21T02:34:44.303000
+CVE-2015-6304,0,1,3984d7f6b2a18e53e28c9446bb9b8066ac93089e8e6124b278a3efb800cfa189,2024-11-21T02:34:44.417000
+CVE-2015-6305,0,1,d9df3b334cda93407a3a258dd7b14a7e800256b801a6d63b9a55135dce66c013,2024-11-21T02:34:44.527000
+CVE-2015-6306,0,1,28e1862328fda635c18fbe7a6990a34d1387da6df2d91584b511f5fe05bb6273,2024-11-21T02:34:44.670000
+CVE-2015-6307,0,1,5eba88dfbb4d4e59ead3d061097a85106be15ed2748220a7ae9dec30bfc26c50,2024-11-21T02:34:44.803000
+CVE-2015-6308,0,1,9bdfbcf062dbc227623a8b5fef65252adf8dca0011f46894d820c7783f933358,2024-11-21T02:34:44.910000
+CVE-2015-6309,0,1,11262ded0ed676d747e8b26c62b2d06fe28226bbe79669f79cdc773b5355c157,2024-11-21T02:34:45.023000
+CVE-2015-6310,0,1,68c0ca31f233cc939d5d45f88fe4f7e0aff87c7e8700328a63077a488b57c76a,2024-11-21T02:34:45.123000
+CVE-2015-6311,0,1,be7fe055bcb80c15a55522b3aed87782cf33d6270ce9263f6acddcb486633d9c,2024-11-21T02:34:45.270000
+CVE-2015-6312,0,1,169983c6147ad417ee2c4ca6a609f4136935fdbda6ebcc0a0d26f2057ba95ab6,2024-11-21T02:34:45.453000
+CVE-2015-6313,0,1,1889f689a73cc85141bb878ba8eb4efbf3869124c6ef2abc9a983b7e99e32d2f,2024-11-21T02:34:45.620000
+CVE-2015-6314,0,1,a84d2c130bcb323b1e539e9de4e31fab746ea8c767ae8bad762baaa65d37e26b,2024-11-21T02:34:45.787000
+CVE-2015-6315,0,1,bf1badfe13b14b1e4be32c978f9a4bf2e8204e4a34c202e90b879d1ba78264d4,2024-11-21T02:34:45.940000
+CVE-2015-6316,0,1,1d13653c0e0e70e4778a2c4366b28446cdae7407d2c10c1ab417871d0add908a,2024-11-21T02:34:46.113000
+CVE-2015-6317,0,1,e1e4997ad974c0e381764e65e2f1a490450f0c9a1908eca1f79c313b38efd6b7,2024-11-21T02:34:46.270000
+CVE-2015-6318,0,1,7d0f8f8a2d5b72885a5fd6c19ea07a72991292e3e975fa802190a4a2269871f7,2024-11-21T02:34:46.447000
+CVE-2015-6319,0,1,c8f4a7d344e4ce9497ffcd61b6c3897b5fa0d90027924df3907b725f26eb13e6,2024-11-21T02:34:46.617000
+CVE-2015-6320,0,1,4737684391bbb505cbb15f4703da977df708b3080c5339259683cfba1ea3785a,2024-11-21T02:34:46.773000
+CVE-2015-6321,0,1,39075e45ae31b320ee1f90c62164e5d1421cc7ec029ec6ff6bf20637e134ef86,2024-11-21T02:34:46.890000
+CVE-2015-6322,0,1,0a3330a0d4ab568ebd5b67e717f4ae9b9a281a0b7c5b4fb139fcb14e680faf95,2024-11-21T02:34:47.010000
+CVE-2015-6323,0,1,c0fbbefadcc0ede640ade5ac87430841f844abd95f20a42bc0d3c47083471f32,2024-11-21T02:34:47.143000
+CVE-2015-6324,0,1,03ada0797018eadb8c46e0bdcb5c9a8f6c3ef2a5af12e75a73b4bf3fc63537ae,2024-11-21T02:34:47.277000
+CVE-2015-6325,0,1,cc00ef76aa03f989513b1eb7d809b250e21e66f0a4372d856a874e3a063cf51b,2024-11-21T02:34:47.410000
+CVE-2015-6326,0,1,0e3f3757770290d2fbd459fc2ee1a4b081213c891766d7843f74bc5c2dff6aa6,2024-11-21T02:34:47.560000
+CVE-2015-6327,0,1,75cc79da9d4311074512e301f890be2b8e415d7e4021007819c0d315d2d4721e,2024-11-21T02:34:47.717000
+CVE-2015-6328,0,1,02e2c6689cfb6a2b04bea73586b5a4e4a91cd7127750182d351b2540399b52b4,2024-11-21T02:34:47.867000
+CVE-2015-6329,0,1,99e4f4b17533e48dc9c585bf40a357ed21881eb860454404a88a632f86ee1ccd,2024-11-21T02:34:48.003000
+CVE-2015-6330,0,1,9de0b512ffff4c3f7951aab5f70d2935cb3af5834f90c9a6339530d26c370934,2024-11-21T02:34:48.113000
+CVE-2015-6331,0,1,abc28c6f7155b99f8b4735b2f364bb6ad8dc085d5e17078ba78f241b732e6c28,2024-11-21T02:34:48.220000
+CVE-2015-6332,0,1,f61ebbfe149cac0770d6c006af712b8c480cf9c699b0d104b57d3d96814c9375,2024-11-21T02:34:48.330000
+CVE-2015-6333,0,1,21619e0652e5eec370e355b055910c3e6375c50f7e8673dc902eafede1f73989,2024-11-21T02:34:48.447000
+CVE-2015-6334,0,1,ed1568ed7cbed1df4379603fa7bfa028ad82250bb10fcbafe96723a9e43150e7,2024-11-21T02:34:48.563000
+CVE-2015-6335,0,1,0b116c4d510cbe9265a173fc4cb39cf9ec3096d963d1a8b1ab76ec35d88c9582,2024-11-21T02:34:48.677000
+CVE-2015-6336,0,1,8ce38c77c5ecbc009c0bcf2f8710a548c2f217596850618ab7feb4c6e321ff2e,2024-11-21T02:34:48.793000
+CVE-2015-6337,0,1,f34c7475637dd17e12d91e50704dc6fe8b5c3d566c55afb95b77709b28383237,2024-11-21T02:34:48.913000
+CVE-2015-6338,0,1,141bc2e5af672729736091efa4da6680c6e1f2bc1d2de5e991730d6ab0092e41,2023-11-07T02:26:49.443000
+CVE-2015-6339,0,1,30066c802fbed923c7d46c203d6c99325240b2a15118a9938a3ca3f788a5481f,2023-11-07T02:26:49.660000
+CVE-2015-6340,0,1,4fe0ab81ccff1e70bad37500224becfe8b99275b20b0ae87db988480b0ee7edc,2024-11-21T02:34:49.053000
+CVE-2015-6341,0,1,c0a84760fc09e9e077a199a7967a46cfdc2cc918b5602436d69b7ca4b974fcc6,2024-11-21T02:34:49.167000
+CVE-2015-6342,0,1,18c747f294ca19457452712a348a15324065a82170eb701e16024b5b88156c67,2023-11-07T02:26:49.910000
+CVE-2015-6343,0,1,9fd8ff7b9c32c16fc9ae8757d1368f629a313523ac2f4558ce559d54abca6a6b,2024-11-21T02:34:49.297000
+CVE-2015-6344,0,1,b491495ed4aac1bf10e1a5a87cf1b3f95bf378ea4fcd82d085221bd0c05ef912,2024-11-21T02:34:49.400000
+CVE-2015-6345,0,1,ac4761d1392ad3ba6e1eb970fc444337adcc16131d4d42c8c87c1158b2b20e4c,2024-11-21T02:34:49.507000
+CVE-2015-6346,0,1,f1c5214ede5fd058bc47d48c858f2faf247019069d09e348efb87a511ea10b92,2024-11-21T02:34:49.620000
+CVE-2015-6347,0,1,236a08a89641454824d5dd78c6ef4dabb52e7bca30c31f78d4bece9341ef727e,2024-11-21T02:34:49.727000
+CVE-2015-6348,0,1,51469f342307c0b75795f907af6d4f1730f42f76816ee3c2678c46d82a9cedb3,2024-11-21T02:34:49.837000
+CVE-2015-6349,0,1,ab8016cc62abab547b9f3e319f7598739fb6abcbab0d56ad8823e5909c5c892a,2024-11-21T02:34:49.940000
+CVE-2015-6350,0,1,7b4259a61626ace7415d8d5dbdc5642937f189b8e148f7df20e3c0d9aeeaa589,2024-11-21T02:34:50.047000
+CVE-2015-6351,0,1,ff2ddb11507caec943f7e7bef577225e6de3dccba74557e40e20c11f5e81ad4e,2024-11-21T02:34:50.157000
+CVE-2015-6352,0,1,d3f5ade76f44c61cb99ffbb1e07ea7df2bf243443742771d99a3ad0e5523aacd,2024-11-21T02:34:50.267000
+CVE-2015-6353,0,1,5a7406ab6051987a4cab01d783564a51e93e51339cf72a28cd9218a32945581f,2024-11-21T02:34:50.377000
+CVE-2015-6354,0,1,5cd96a8a73fa7f2ecb55a12f6e3fa48d5403ff19c209f24951ae5e59258f8336,2024-11-21T02:34:50.480000
+CVE-2015-6355,0,1,abde553fb6fa972e14b4baae1849cbf167f1863de3e8b40a1c3550ba2140ad76,2024-11-21T02:34:50.593000
+CVE-2015-6356,0,1,2cea28c0f4a6c21b66c075536fd4896f1270ab83f8de80b15d2b683f65cc333d,2024-11-21T02:34:50.707000
+CVE-2015-6357,0,1,5886dd92b65f527651bce37ce600fbfc2a922f1b6b8203c72272fc9e5c444e59,2024-11-21T02:34:50.813000
+CVE-2015-6358,0,1,8a8267ce409e0442091d609daa4977257da58bce7681d7238cb0376d39fdee7c,2024-11-21T02:34:50.923000
+CVE-2015-6359,0,1,f01504fef076cf358ffb7872e6de82fe93c707545e47cae731eae2c3d914a938,2024-11-21T02:34:51.087000
+CVE-2015-6360,0,1,f9e86a24b9edab717f6b687e41dff87f8cd2f093fd49fc6fe89e434fa5d08e38,2024-11-21T02:34:51.213000
+CVE-2015-6361,0,1,8353f117b63d3c871ed17c062722ab3c5b9678a3cae4abff05de2f83bc3f8261,2024-11-21T02:34:51.393000
+CVE-2015-6362,0,1,b891e47a558aa0834d278a7ebfd35519c0246def36f19489d8922aa3874e15df,2024-11-21T02:34:51.510000
+CVE-2015-6363,0,1,55aa1755ce9c5c41d770d40414bfe401b0a75e045285ef681e2915497dbc99cb,2024-11-21T02:34:51.617000
+CVE-2015-6364,0,1,afff21b876024acdc1e339b015895fc17418bc3ff1e3b43ba8526de94a9e6a8a,2024-11-21T02:34:51.730000
+CVE-2015-6365,0,1,672c217c446432130901700853aeb33a863d7a765af1f3612ae92325258d9885,2024-11-21T02:34:51.837000
+CVE-2015-6366,0,1,8bc521448341a29103bcdd89e1fb0c02a79cbc76943ffe827e63613fa76c6cbf,2024-11-21T02:34:51.947000
+CVE-2015-6367,0,1,a8abb6f88bf03b1a0f79e41f25616e5d4c580ccb69679f35a9f0ec8b66119df0,2024-11-21T02:34:52.060000
+CVE-2015-6368,0,1,be49dd39b9d789e13797648c10f648a27748d8f6c5aecae9ec4b874428153a5d,2024-11-21T02:34:52.177000
+CVE-2015-6369,0,1,aa4e7230755082f015e81ff1f5568c3a42ae0fec094521a026cb6ef94380a6ea,2024-11-21T02:34:52.290000
+CVE-2015-6370,0,1,c0752b2b1744df52e9aefb2860bfc3a51a52dfb2ecda0ab838099f3059d43e67,2024-11-21T02:34:52.390000
+CVE-2015-6371,0,1,0c7790c946875051c8e85ea5c4d6185e59f35f736f2464b5ff2b923dbada9026,2024-11-21T02:34:52.507000
+CVE-2015-6372,0,1,bbd06762806959887ab698d883222f00a96ec2023b7960b8012291f7245d6e6d,2024-11-21T02:34:52.620000
+CVE-2015-6373,0,1,4649bac94b8ee42572440026eec4cb421b3cfefc1f3f0d7a5dc10c9de43be2ae,2024-11-21T02:34:52.730000
+CVE-2015-6374,0,1,f60453a086ab7012821feea74ea2b1469953f96cf06e73ca0ac6996116743f1d,2024-11-21T02:34:52.840000
+CVE-2015-6375,0,1,f75676a32abd6232e8ca486eeb3ea8f17df691f2767aae5f1d05e6fc70731b59,2024-11-21T02:34:52.970000
+CVE-2015-6376,0,1,7f1b0560d77de650e92c2bbe2a8dec98f07ae58f5a454047c445a5548659d6d0,2024-11-21T02:34:53.100000
+CVE-2015-6377,0,1,18e6a40fbafd5c442d495523b5abc926a4f5e332fe1abc1753a0481aed691369,2024-11-21T02:34:53.217000
+CVE-2015-6378,0,1,9f693d70b52f3ea99e78b747e6eee0cd669c7998444225e004e4114a818ba675,2024-11-21T02:34:53.347000
+CVE-2015-6379,0,1,7d02f017e86e48f0b660de531bc474e4bf30df5d6e7ec1d8b93cee3be8b02f2a,2024-11-21T02:34:53.467000
+CVE-2015-6380,0,1,37a0172a1b0b2e56d9f6dab1c788c86bf467e5df6b90543adc089682947ef07e,2024-11-21T02:34:53.590000
+CVE-2015-6382,0,1,79ba95daa0848838bb79aa414d2d1bcf9839ec8f434489f8b5bc357a18c1d7a7,2024-11-21T02:34:53.700000
+CVE-2015-6383,0,1,bdf9cce7d3929a8a15210a7f34669cc1013d8c30500737d6e25d17c01e5da631,2024-11-21T02:34:53.820000
+CVE-2015-6384,0,1,04811bb3796a6478d826af57eb1824f0e018ad312af8e8747627d310de975901,2024-11-21T02:34:53.933000
+CVE-2015-6385,0,1,0ee8ecaf52163fd94e0a670eda5988e1fc7408e0e54d9c1d38ddbb469e1b8789,2024-11-21T02:34:54.043000
+CVE-2015-6386,0,1,d78336ddd8e36ad5ed82b3937dcb539bb69ae24f749cee3eba8eeb0c29a6f134,2024-11-21T02:34:54.147000
+CVE-2015-6387,0,1,96fe4ab1e5bb2fd4d7d76218a76e1f92840b2b90fad08763a51dc3f8fad1fd10,2024-11-21T02:34:54.253000
+CVE-2015-6388,0,1,f9f96a5d4b895d6311d81b66b56f2861d9d4017017c621ab7e7ebb9d517b7a29,2024-11-21T02:34:54.363000
+CVE-2015-6389,0,1,5a1c5ce905a25b2a8fe71fce20f6c63cbc492ac19ee31fa6bfc4d6c91d526e51,2024-11-21T02:34:54.473000
+CVE-2015-6390,0,1,8a2f38a4e8c8c8e3a76041b3d4bd8ca579d1284d7d2e0a21da6c5e7638d91d34,2024-11-21T02:34:54.583000
+CVE-2015-6391,0,1,10b66e6773168e87eb19f776209b9096bf9715dad5b23166a8680b235eac4c66,2024-11-21T02:34:54.697000
+CVE-2015-6392,0,1,758f7b7e2a1f20ffb1e44d8d71cb788bd5189cff0be86c83971af9e42f320de9,2024-11-21T02:34:54.800000
+CVE-2015-6393,0,1,1195508e76a0d5743315848b790554d8590f553307545ade0f89f221600de69b,2024-11-21T02:34:54.953000
+CVE-2015-6394,0,1,2643a285c8886b3c0899529c4d00b89fc4fcd08fda38083d80cf874480bc3a11,2024-11-21T02:34:55.097000
+CVE-2015-6395,0,1,5d48e85019808d19cb24f0bcee779a29683c6364b488a552741a0dfe225de427,2024-11-21T02:34:55.207000
+CVE-2015-6396,0,1,dc1fc50e2131d5570950b2890df30c126cbb25cd8f596370d9611aff43aa0af3,2024-11-21T02:34:55.313000
+CVE-2015-6397,0,1,8197df4f2c318d844c0472f0f4e2cea4510e1fdf73183d679282ad52af7a0a8b,2024-11-21T02:34:55.440000
+CVE-2015-6398,0,1,1c343f670e1bdefa176a21a38a20f8caf5dfdb54f7ffae00df597b0a8082f999,2024-11-21T02:34:55.550000
+CVE-2015-6399,0,1,1d293186a0fd58967719b0ebf7ce0fd014c40eed7698706ca75a4251df98917f,2024-11-21T02:34:55.653000
+CVE-2015-6400,0,1,4a8b6fa35f5aa515ddda3a6bca02ae2c42693b02238a3d7fddfd14c67d340810,2024-11-21T02:34:55.770000
+CVE-2015-6401,0,1,efcef157df95826940f263de44158effd0e67dfa0de527a5822bacce38a4235a,2024-11-21T02:34:55.883000
+CVE-2015-6402,0,1,017783ae5d8487f3241de1477a476191472de239b7b13d35e779b0a9370c8338,2024-11-21T02:34:55.993000
+CVE-2015-6403,0,1,5b2fda4336244e229efc6301db75f81f3918927eb0ef0d61b412ffe19aef7d71,2024-11-21T02:34:56.100000
+CVE-2015-6404,0,1,5387a3a11e62f1df1e6bd509dc8ffc31a1ac48a60aed02542e279a85de9d6dba,2024-11-21T02:34:56.203000
+CVE-2015-6405,0,1,476f2b29ad064e6fd4f3a0b590e78b94fb1da0e79a688684586ab01a11c873b1,2024-11-21T02:34:56.310000
+CVE-2015-6406,0,1,c4867fde55a7700273e1feceda6a5baa3cc82c00c6ec580a24248812d83364e3,2024-11-21T02:34:56.413000
+CVE-2015-6407,0,1,d76b3e654ad187f2a1e9df8503831ae4fe2846301508d2c517fc1e8cdde8591f,2024-11-21T02:34:56.520000
+CVE-2015-6408,0,1,8f74da41ba695782b36eeb334bdbd48e03404bb7d4b4d9e1a7ca08ed53e03a0c,2024-11-21T02:34:56.617000
+CVE-2015-6409,0,1,ecf5e8720def48c6dc6ec971d93201aee5a7fcf9844536e259754d1def23412f,2024-11-21T02:34:56.727000
+CVE-2015-6410,0,1,6ceeaaf9393e8eacfdb553797d08522e0ff809dd67670f4c24777787622919e1,2024-11-21T02:34:56.837000
+CVE-2015-6411,0,1,4edf1769db4f9ba42df3b5a96b7627f318a6b7d4328c4d6009e38c3f21d786c4,2024-11-26T16:09:02.407000
+CVE-2015-6412,0,1,ae9e8c595030102f50fce16a492f28e72a539e6e6416d20d6787c6f9c0e4978d,2024-11-21T02:34:57.047000
+CVE-2015-6413,0,1,62b91bb470140651293f3445863a61747c2de84b374e4975b595ad98450f7f18,2024-11-21T02:34:57.140000
+CVE-2015-6414,0,1,ed2a38f296e831d4e025bb3e97a976d730b1d93e9fa2f013d5bc00f1b3794973,2024-11-21T02:34:57.250000
+CVE-2015-6415,0,1,1ecf999e05986b6af46ae0040386d22c31cbe95c273736dba1a80c65374270ca,2024-11-21T02:34:57.360000
+CVE-2015-6416,0,1,23a6376f17fd57a27693f034741c188962fbaf2466a7a77483fbf60932b8e9dc,2024-11-21T02:34:57.457000
+CVE-2015-6417,0,1,c5d6d4669e40ab778d16cd87cac3113b0350227e37998c198567cc1b3b97bead,2024-11-21T02:34:57.557000
+CVE-2015-6418,0,1,3076c75ea26b2b67c8891d166d621ae9028a4952f0459f47d4a3c1d04ed1e013,2024-11-21T02:34:57.660000
+CVE-2015-6419,0,1,5792126d848fce5d6c11d1e7b8cddf4f65c8f23bc26bfa5896d2fea4be6e4bae,2024-11-21T02:34:57.763000
+CVE-2015-6420,0,1,af0847e8911840b0d787879fe579ea5c4ab420bcb4605508646dfadcf07d6904,2024-11-21T02:34:57.870000
+CVE-2015-6421,0,1,f910dede2f77845deeb893f8fd5b1ec19c0cb7b56e0124f23816b9abf421e276,2024-11-21T02:34:58.017000
+CVE-2015-6422,0,1,28401113643263bf71eda8f1c5f2b8399ce59c81c9574a218bf87579dfe7aa0c,2024-11-21T02:34:58.183000
+CVE-2015-6423,0,1,a2c22a39f22c7d63b1f501b58cdc31d961c805434a50ee48da06d9ed1f5774ec,2024-11-21T02:34:58.293000
+CVE-2015-6424,0,1,9c4ca9ae001cd071e2cf0c66adc3fee7a7f8661db9a19e8dfe94a2917b651127,2024-11-21T02:34:58.407000
+CVE-2015-6425,0,1,d0fc4cf958a2853e89bcd7f96f5f07c74eb38cc192531839e0e672e2e20401c5,2024-11-21T02:34:58.510000
+CVE-2015-6426,0,1,b88eb6333a5722ed303881428924339154fd2fb445bd1c896a4204b650869b4d,2024-11-21T02:34:58.623000
+CVE-2015-6427,0,1,4051ae2a0264e6dba16c44bba6ff84887973fe897c3bf159a4e512e558e04614,2024-11-21T02:34:58.723000
+CVE-2015-6428,0,1,bb8ff704c237829675131b9442376dafc421bfc3e3e402e0f8f6b50e90d53636,2024-11-21T02:34:58.853000
+CVE-2015-6429,0,1,c6eb1de3255df4c57fdc637663100525e526d369368dff450202e49f1c4fb247,2024-11-21T02:34:58.960000
+CVE-2015-6431,0,1,94308d343c4bed1e8e1d4cd402f82ee33b7464baad8434706109b854f285f434,2024-11-21T02:34:59.063000
+CVE-2015-6432,0,1,9da9bc6739d7ace327bc13ce7d9d645a4075eb8b700bfc8aa88073b8c0e9768f,2024-11-21T02:34:59.173000
+CVE-2015-6433,0,1,0a6963ea504d0393d60d776248c78a7ae5a0479a5609a43b424915e245b70171,2024-11-21T02:34:59.290000
+CVE-2015-6434,0,1,c13b0556d9df931b394ee1eb4fde41b8b7205754b2ebee05dda7c4250a4e0745,2024-11-21T02:34:59.397000
+CVE-2015-6435,0,1,f0e7b7b1a63d1e6af2930497ece9775c010d409d754c333aa71603228f4a4f6e,2024-11-21T02:34:59.503000
+CVE-2015-6436,0,1,1bff7ec1b7cf774c2772ad00ae3c04be62397966a380bc31e4757fd4fdaafcbf,2023-11-07T02:26:50.840000
+CVE-2015-6437,0,1,d4cb539177a01129e7216ad0e122a903c7e8b70f37436f3aada468883bb808da,2023-11-07T02:26:51.080000
+CVE-2015-6438,0,1,42b5902212569229830afee598e97e765252c5c16eafddc28ee859c508aab750,2023-11-07T02:26:51.310000
+CVE-2015-6439,0,1,803ed4bdc29bb9593848d52f7039f2ff505000c7d0cac47d7cf7954c27964083,2023-11-07T02:26:51.533000
+CVE-2015-6440,0,1,42d5faec03fb83fd4d921c684fb808263b7fcecd680281db703e9d965ac9a2df,2023-11-07T02:26:51.767000
+CVE-2015-6441,0,1,4895f1005969d3ad0d3102e599376593bad2886a93b29cc3902165050349a5b8,2023-11-07T02:26:52.010000
+CVE-2015-6442,0,1,1608615cbdd78a94f7a41ae00774fd9eb0298573692439b070e1bfe16bb63a5c,2023-11-07T02:26:52.240000
+CVE-2015-6443,0,1,c1b0ffedd7a483b86c3887c5edc81369f96bec17de38f610690fd773f33974c0,2023-11-07T02:26:52.487000
+CVE-2015-6444,0,1,c4aa43334cbd4c6c17ae831231747187c8a90a75ca3ee7725a6217131ae0cdae,2023-11-07T02:26:52.720000
+CVE-2015-6445,0,1,5214d6e007819e97b39f5479adafb0c4af69736ed3d716795d74877b527d455a,2023-11-07T02:26:52.960000
+CVE-2015-6446,0,1,dfec94776061f366539c8731f3f4477ae038611342bc8c2087b8b1d92b78638e,2023-11-07T02:26:53.187000
+CVE-2015-6447,0,1,5b931e73ba9727d76891faea5195ab00349eea97c8807bb11c6490e2b1f36f85,2023-11-07T02:26:53.410000
+CVE-2015-6448,0,1,6338fe68bffd13fc323a8892737e86740927fcc7ca418a2eff782cfac605a793,2023-11-07T02:26:53.647000
+CVE-2015-6449,0,1,9983bc5343d3bb4a211813d6386884d07cf05bc6d028d5d48c34a6471a99129c,2023-11-07T02:26:53.900000
+CVE-2015-6450,0,1,6515545fcb02230d3776ee243ffd7d6b91b02a5fb42f7c4c721045ac75b3bde8,2023-11-07T02:26:54.137000
+CVE-2015-6451,0,1,1e4d61702d3f120f0e4eafd96f6ec3b3a4e3257725602bc9ca5822d01478594e,2023-11-07T02:26:54.367000
+CVE-2015-6452,0,1,e020bddc686d154d1ba2c86d7efa4c2e54c9c62368b02601fa6acd1fb8c797e4,2023-11-07T02:26:54.600000
+CVE-2015-6453,0,1,2e87f82cf432ccc68da30b53371fc4125be1ccc8eb650554dd39e652d130d80a,2023-11-07T02:26:54.857000
+CVE-2015-6454,0,1,acf4edbc656f645171e45d69e49196cc4aaa45e92faa9da988a08d83da7e653e,2024-11-21T02:34:59.887000
CVE-2015-6455,0,0,0edbff193994dd9fc3c20880eb5d377693c947b50ba3c3c022fe22497be17c8d,2023-11-07T02:26:55.090000
CVE-2015-6456,0,0,fc7c28ea1204a5c8822cbdb0027f4eac4e39c76aa91e56767d24edb3812fc67e,2024-11-21T02:35:00.017000
CVE-2015-6457,0,0,c61bb650de38e369adadd9b83832ae1d14dc96c7d6ea69a1ddaf0480ee52b196,2024-11-21T02:35:00.140000
@@ -84658,201 +84658,201 @@ CVE-2016-1283,0,0,873b69dfbf45b7969b997eaab88eb1f4152d8e862156d42f69f40651d0d3d9
CVE-2016-1284,0,0,6ce1240d30d67eab670d49b3abb27b8e6920e7a21f5205f9c03b696eee7431c0,2024-11-21T02:46:06.543000
CVE-2016-1285,0,0,3af61d389f16c79f9d8831c262749094d52a4a5827260aef5e96a2351ca48e5d,2024-11-21T02:46:06.697000
CVE-2016-1286,0,0,e1ed149966335b2377e97c1f7a934d698c3f5979d1ad28501cc7c9f5a0b3deea,2024-11-21T02:46:06.950000
-CVE-2016-1287,0,0,b5e50dfaf3499e8f0f53fdee2740f316df753abe375d10f44293fd95d37b3767,2024-11-21T02:46:07.187000
-CVE-2016-1288,0,0,7f63956f03cf52d974372ec4e43daefec71d94a520159b9aa764c0aedf25ca36,2024-11-21T02:46:07.367000
-CVE-2016-1289,0,0,f8f90a0eb58bb33d51d3c0278209389863f22101a0cf30955161fb5b45ff46e6,2024-11-21T02:46:07.487000
-CVE-2016-1290,0,0,2d3b9a886862f5678672d4199aac1c58ea8ab187afca8d48ef44129e3e7c1d08,2024-11-21T02:46:07.610000
-CVE-2016-1291,0,0,7e51384ec6822c9cd7921acd8c4630e96de2167b122a8edff7ac5b9db977d640,2024-11-21T02:46:07.733000
-CVE-2016-1293,0,0,751b5706a825a3d9bb3a7ed1c8cf6f84417eeaf5e3c076987f14bfb463f449c8,2024-11-21T02:46:07.853000
-CVE-2016-1294,0,0,4e49985aca52a9782be3248da4d809df0f159218ed9aca2819d8f1b38957496e,2024-11-21T02:46:07.973000
-CVE-2016-1295,0,0,f25d49d03e9e4017e5118d85fe70cef4f579d9e49215c46bb3f84c6da2de43cc,2024-11-21T02:46:08.090000
-CVE-2016-1296,0,0,4d6295e8f4a29d70ea410e3a9d36e57fba86ed0044988f50445e2c93f455e308,2024-11-21T02:46:08.217000
-CVE-2016-1297,0,0,522ee84eae12b2b58c836d56c6d4714a1a8558bdc8874da12f53387d8bea8473,2024-11-21T02:46:08.330000
-CVE-2016-1298,0,0,824cf398a066826fa56f8f42131d087c5c9b2389aebe602165824dbe48610816,2024-11-21T02:46:08.447000
-CVE-2016-1299,0,0,dd42ab48d39d7b3d1782594f1cf8b58a0770e4f03f2995354cd3a0a38855e846,2024-11-21T02:46:08.590000
-CVE-2016-1300,0,0,1b51d566bfe7e2cd1e3b4b97189d108b7976fe10fa2c2f2e1db188a39938e312,2024-11-21T02:46:08.707000
-CVE-2016-1301,0,0,5f9c1b6d40fd7a080174f631eafe1934a8983a3e0d1d83a1de1050b1fe808d2c,2024-11-21T02:46:08.817000
-CVE-2016-1302,0,0,687d87d324fc279039cacaa3226f30514436e2504228d6fe0b78979029a287fc,2024-11-21T02:46:08.933000
-CVE-2016-1303,0,0,db23078d8b03253f2936cf479694bff2ab24d81f1440a1ea9c44913d2a616278,2024-11-21T02:46:09.050000
-CVE-2016-1304,0,0,a29c2242b97be26b0600c7010e11901f29fc9c2978995be3eac8aba8cf7a6159,2024-11-21T02:46:09.167000
-CVE-2016-1305,0,0,30a216aa2f4bb0330ab60b18b7792eb85f86402de02fa8bf12a3cdded7b5b119,2024-11-21T02:46:09.263000
-CVE-2016-1306,0,0,6b1191bafcf0ef8ffc389415305ec93aaaa3e749ed0fd6e8da0a4246c5eb7cc9,2024-11-21T02:46:09.367000
-CVE-2016-1307,0,0,3b335a80231573a5577981f4971145f630bf0242ea5709c8b43cc7ef2896b015,2024-11-21T02:46:09.473000
-CVE-2016-1308,0,0,df532d3c4a93d80af4b06c471a7580caf0ba46a23b5a6291638b4a65064c33ae,2024-11-21T02:46:09.580000
-CVE-2016-1309,0,0,cdbab152aa9e44beb9815a5e837602d8bb82dbe63c130d116c667cb590531fe9,2024-11-21T02:46:09.690000
-CVE-2016-1310,0,0,4e13bc447d345461918f78cf1fe6f507c202a5898c558311a128640c858b0249,2024-11-21T02:46:09.797000
-CVE-2016-1311,0,0,f635dbeb8fc3b29975a9313acb58169caa35f80fd88d4ea6f3480974886767f2,2024-11-21T02:46:09.903000
-CVE-2016-1312,0,0,ae8356aec0057dd76367e043b35e80d616da7e80ba4f5e6de45ac11d30049517,2024-11-21T02:46:10.007000
-CVE-2016-1313,0,0,84162939064d89328a6e892c1cc76df9206a722e6405274ba7dfa04769b6369f,2024-11-21T02:46:10.120000
-CVE-2016-1314,0,0,9a5a37e3b023f1521c9b861923c36c33fab792d47bc57e9679e6b846d2d635ff,2024-11-21T02:46:10.243000
-CVE-2016-1315,0,0,2ad6a7f489b25dc48457390e4c3ee455bef83a507e7303d665e4be568ccfd383,2024-11-21T02:46:10.353000
-CVE-2016-1316,0,0,7b2dd0d4993a910077c832c0454d81b7a2695d847bc9ecd02829e14c7cfd9061,2024-11-21T02:46:10.463000
-CVE-2016-1317,0,0,a09d236ba0c4dad102f5ceae297d3577a2545c2156ca9d2cff5a4815da26d76f,2024-11-21T02:46:10.573000
-CVE-2016-1318,0,0,4f9a0769d9e87a194e5e7901561067a0cd35d0d6b5d3453c2de21b2dccb2b2f8,2024-11-21T02:46:10.680000
-CVE-2016-1319,0,0,3aa5cedfcba43b65dd3a147f9ab1bc19c966c2b896f424cccc1eaf85881ce828,2024-11-21T02:46:10.783000
-CVE-2016-1320,0,0,791d5cb83c8b5978a4632cf9dd39dfe7f2e70c0ec0260059760f813bc1c2f4eb,2024-11-21T02:46:10.900000
-CVE-2016-1321,0,0,4471d1742c8328afa4aecef073dbe85e78a98d1c8b4f97b643c55762c8b1ddb8,2024-11-21T02:46:11.010000
-CVE-2016-1322,0,0,5377f028b32604e673df8caef7a36c4d43eefa99fc83c4232c1b14f127cd7a01,2024-11-21T02:46:11.120000
-CVE-2016-1323,0,0,a15d5900f7b8fd80673b72eb086323731d594746fab5c642dc1a8dd2a5086d48,2024-11-21T02:46:11.233000
-CVE-2016-1324,0,0,1c4d1475d0b057bed9418eb9741e7066f4b512700bc209326feb02e74d85f60f,2024-11-21T02:46:11.347000
-CVE-2016-1325,0,0,9c84c924ba27f8d0b867e73bd9c49cb68b25096cc51e5777260c398226e93376,2024-11-21T02:46:11.453000
-CVE-2016-1326,0,0,55884667ca22407c25a7b141f2c40328209f24355cb79407526719b1b9103a27,2024-11-21T02:46:11.567000
-CVE-2016-1327,0,0,923f6c37f42f974205fc82fb0e36e1ccc71f1f5ea55214ee9e070b2cc1368e6a,2024-11-21T02:46:11.677000
-CVE-2016-1328,0,0,60781fb88c249167b235f3ed279b7943f88b12776aabae3c958d0581a429085c,2024-11-21T02:46:11.790000
-CVE-2016-1329,0,0,ab3c8df5d99149ef7512e87152fdc34fd0155cd2f7aee7433790e938b13b7b92,2024-11-21T02:46:11.900000
-CVE-2016-1330,0,0,8a3f870964bf0a99d7b2b8f204f4ebf2734f0c99ed88cd98a5710ca85daee0ca,2024-11-21T02:46:12.007000
-CVE-2016-1331,0,0,7505742bf155f79c33b6f7cf5a5cee78b7e64eead534f5c422febc168e0cbf5a,2024-11-21T02:46:12.117000
-CVE-2016-1332,0,0,5802460c70a8efa4db9251b2627918876fa5d49ea371fce9593ad8995b2bc7d4,2023-11-07T02:29:55.563000
-CVE-2016-1333,0,0,80894efac0501307c98a706c2ebb50ac0cbb15487f6075bd4654b94ce9aa322a,2024-11-21T02:46:12.230000
-CVE-2016-1334,0,0,1e5b733bcf3b206122d4383d6079ebb979d88648e11840635e20ae6220e5b0af,2024-11-21T02:46:12.333000
-CVE-2016-1335,0,0,5c74e93b8c5281ef32323784c55539f263ddccd90997ff271fcf9fcbcc130996,2024-11-21T02:46:12.437000
-CVE-2016-1336,0,0,ad6c6cc68262e5653da8a0463937c1717f097fab164d8bb2778b81e5ca39a838,2024-11-21T02:46:12.543000
-CVE-2016-1337,0,0,cb476934c7434be0eccf8e7b8b05d680d6ee14b823146661e0e09b3ef64fd4d4,2024-11-21T02:46:12.650000
-CVE-2016-1338,0,0,615430510f44ca83220dac675c423a5d1437c62974c8fac454ec7178c03a6447,2024-11-21T02:46:12.757000
-CVE-2016-1339,0,0,17cbe04bcba58f4c346b674b5a680b66993264db29db5da35ede22f3f8b18d26,2024-11-21T02:46:12.860000
-CVE-2016-1340,0,0,ce46e2e0b6b72503f4834b17fbff1324648826abfd421d11e7ada02fd6aefc2c,2024-11-21T02:46:12.967000
-CVE-2016-1341,0,0,91eec00f71488249a17366b165078fe0aec56a735abaf4deaef3051b5b0bce7b,2024-11-21T02:46:13.080000
-CVE-2016-1342,0,0,389a474461ec9fd013af9abbb1b2f69cb305c66aa11585a96e93cc22ccbd2b37,2024-11-26T16:09:02.407000
-CVE-2016-1343,0,0,dcc0f2a93c4255c71ce9e26af3270bc89e0a5e7dfbf9a893b9dc82db405e1cfe,2024-11-21T02:46:13.297000
-CVE-2016-1344,0,0,fcebae621b665534ac766b354c6435d69c0345fa8852021f2a9684611730cc0d,2024-11-21T02:46:13.400000
-CVE-2016-1345,0,0,60b135c59bb2013ff33236f88df8773a70abd542707b1f548a6f149cc99a81dc,2024-11-21T02:46:13.527000
-CVE-2016-1346,0,0,3bdad4c618303c03d845a3885e363adec590df07d9467b5b27cb59204541e5ea,2024-11-21T02:46:13.650000
-CVE-2016-1347,0,0,d101aaaf3569fe0cc1fef1d8f7ab04e0a51f06fe51ee22b893670f1463a4fb8d,2024-11-21T02:46:13.770000
-CVE-2016-1348,0,0,15ca12043716717947f06d7de340f914d0a339b214abf8c2d9a7496daf7cfc6d,2024-11-21T02:46:13.897000
-CVE-2016-1349,0,0,fab13b691e5f63e144ea373f7ae06b403ee550a4441e1a21e7ac3b9ce99f3d56,2024-11-21T02:46:14.013000
-CVE-2016-1350,0,0,5840cd319c0cb44248bd8e3273d7a6db2e68cc826a916d7fb217fd8784389520,2024-11-21T02:46:14.123000
-CVE-2016-1351,0,0,46e6890dd39f1011d473f9b32960ce927632e554f7078d53b2ef65ee651fdb65,2024-11-21T02:46:14.240000
-CVE-2016-1352,0,0,055fae3856765d4465de0a4ec8d746c5b27d36c10796927da45d179cbd6735a9,2024-11-21T02:46:14.373000
-CVE-2016-1353,0,0,e85f844e00c9e757d1ebc10121f4e9e58cde304e36266368e62395b01963d439,2024-11-21T02:46:14.480000
-CVE-2016-1354,0,0,4c4abae83766bfb2da2e1bf9ccd4bab3d19c27bf7133b7b8ce76e8ed62b8b613,2024-11-21T02:46:14.613000
-CVE-2016-1355,0,0,5d71a1681de0e43fb8a00293ec0b14695f3faac7bff87315b07e476ef6e09b32,2024-11-21T02:46:14.717000
-CVE-2016-1356,0,0,8920e77222b18e0999eb5843e72879e4c6617527ec54a60791f54451aca896e5,2024-11-21T02:46:14.827000
-CVE-2016-1357,0,0,eefe9a500d027c299ef58c593d62de168d3a3cc423c1f09fee948fbe6ce817e9,2024-11-21T02:46:14.933000
-CVE-2016-1358,0,0,de96fb8f8d2c2f17ad718821079e5cd74f6bba0cde0356cc97f7e654ed18ff90,2024-11-21T02:46:15.053000
-CVE-2016-1359,0,0,fd128088a4151aeb0dcbc38b9a1299396fe9cb11e388290f5adc79017cf609d9,2024-11-21T02:46:15.167000
-CVE-2016-1360,0,0,70223490a714497666d796be134dd1765b58d7537f616e8136df2a8eaa49fe76,2024-11-21T02:46:15.267000
-CVE-2016-1361,0,0,495229123a3bd86461f2f2a4b9f440c4ca296b6b12460b251e8e4207b38b2ee4,2024-11-21T02:46:15.380000
-CVE-2016-1362,0,0,9bc4b397a7e3b0b48b5c1d7eb7de0bdae7c59d816f8b2f53ccff9348c7152d4f,2024-11-21T02:46:15.500000
-CVE-2016-1363,0,0,add8df9652472582156d6d5ca86d98e000ad106ff70f05d33b287ef198d41403,2024-11-21T02:46:15.613000
-CVE-2016-1364,0,0,139bc7a676780498ec53c1bee624a220c31d65cd2d8793bffedb96cb837c61aa,2024-11-21T02:46:15.720000
-CVE-2016-1365,0,0,06fe22ce35864d343fafff07a6546d27fe06af412f25960fccff4c0aba7a1c1a,2024-11-21T02:46:15.840000
-CVE-2016-1366,0,0,e82ccb6db43cc0dbdff688f6d6c8af36f56add34e81bd6e2e1e530434697fb62,2024-11-21T02:46:15.953000
-CVE-2016-1367,0,0,1f3666ac249dc1c08c5862518d473443c614f1f2e5562375c5c75db4150c91b1,2024-11-21T02:46:16.060000
-CVE-2016-1368,0,0,430e1d0d425a3deb98ec71ece2385e29ddfa0c6e56f2ee58537eb7ec6dca922a,2024-11-21T02:46:16.167000
-CVE-2016-1369,0,0,511a11380e0affccf1e86f41931af918f0d0729291cd6e6a39048e885d033c4f,2024-11-21T02:46:16.290000
-CVE-2016-1370,0,0,7ab3ae75b8ae4f0599cd15318cf32083e1d14af68809f71238dc460b8279bb62,2024-11-21T02:46:17.180000
-CVE-2016-1371,0,0,56337c96769130085d16b7096823a6c1e13e988289b3efacbd7d3ae2e17f8398,2024-11-21T02:46:17.540000
-CVE-2016-1372,0,0,fc9fbb37fecab91835afabb32dbe7edd558f29fe779c8a8db96a4044fcac816c,2024-11-21T02:46:17.673000
-CVE-2016-1373,0,0,2057e580b2e5a2e7a5bdc08f7afd773e6df16e26a6f663c945d0d7c57bdaab43,2024-11-21T02:46:17.783000
-CVE-2016-1374,0,0,4d4a9b91ff29fdb38ce69013baa8498601574bb2be181669ac4e15904f32a371,2024-11-21T02:46:17.893000
-CVE-2016-1375,0,0,6a6539d33940c2a2115a75102a8a259c7efe66d6e0bafcbe16b71a548d69d8b8,2024-11-21T02:46:18
-CVE-2016-1376,0,0,c9afb94a57fc5aed403036ad7466e124bfc04b27d3fc7354694daff59bf6ccbc,2024-11-21T02:46:18.107000
-CVE-2016-1377,0,0,25090d7b8555064dc53b718f9721b43fb8a3c0d7cad9eaaf32ee81c85b80da6b,2024-11-21T02:46:18.220000
-CVE-2016-1378,0,0,8cb4706c4ba1da44d75d22dbde924441526dceb4d12ce28072f2e6a76bb17b1d,2024-11-21T02:46:18.317000
-CVE-2016-1379,0,0,a0fd19b59b806d1d69a54ce9f4efc1b36f2cc55b106a1e661efa408a1da206b8,2024-11-21T02:46:18.427000
-CVE-2016-1380,0,0,37bfa9b0e8957e64bcbcff67dcf22702108c37cbee715123f9019519b799b729,2024-11-21T02:46:20.080000
-CVE-2016-1381,0,0,fe4fd3e2b5bc568587586b1d97aa673adec10588f56cddc725d4895be2e6f029,2024-11-21T02:46:20.197000
-CVE-2016-1382,0,0,e8f2d70173fb42b659f027d849aa74c9684eaca74005350e5868a4dff85b6546,2024-11-21T02:46:20.303000
-CVE-2016-1383,0,0,48d1e1511855748db7f0018dc79cfad4011563d81ce4009142d13fcd727508ba,2024-11-21T02:46:20.400000
-CVE-2016-1384,0,0,d428e351672a647a603305b775560aa2620b4696fb0f46c1c9855a28730a3d18,2024-11-21T02:46:20.510000
-CVE-2016-1385,0,0,82335a9898b458f86bd7dfe239e15d9c4b80795beb3e7d35deae77aa1c8be6ca,2024-11-21T02:46:20.643000
-CVE-2016-1386,0,0,de078f4b84209b2f5ef3faffa8594e39c4f8460a75253b736218fbddf259685c,2024-11-21T02:46:20.787000
-CVE-2016-1387,0,0,16dcbf87d0a431ef421c7db554b8992126a030b4959d34dc4271a3c7ed5ef9e7,2024-11-21T02:46:20.900000
-CVE-2016-1388,0,0,c887fc9b6390fd5e352e0570ef0120c5ccacc5ced5c3cf414f8af2e0f59ef774,2024-11-21T02:46:21.007000
-CVE-2016-1389,0,0,4f2cf99471ec627ef076c13177338e42e7b06e4ce30629453a75bb467385210f,2024-11-21T02:46:21.113000
-CVE-2016-1390,0,0,1925acd7b336984d4129a8949f687d72329bc0240aa0a7fc3bb428227b0f97f7,2024-11-21T02:46:21.227000
-CVE-2016-1391,0,0,d91ce2dfa103769d6e3ce08d4d62cc65f15a476be721fe486ac35f4bceda63b5,2024-11-21T02:46:21.333000
-CVE-2016-1392,0,0,bb83ab095e42d5a21eaf8ffcffd217262ced3ac0838b9b8823ad363c36012d47,2024-11-21T02:46:21.460000
-CVE-2016-1393,0,0,4c3e539942e4e9a9b41ad1940754cade191bce1590749f1783ce09b8c8742890,2024-11-21T02:46:21.567000
-CVE-2016-1394,0,0,a88035616612b4deca87f303ba4360a5de5391664b1bcd940babea395e6c7aaa,2024-11-21T02:46:21.683000
-CVE-2016-1395,0,0,d2e476fda95e15f8b940356222f1d31567d7d5da55e9069a86a7b3b6a5bc51a3,2024-11-21T02:46:21.790000
-CVE-2016-1396,0,0,6d73bd93108a01ae23b45c2a436559d2decf918eff29e3f906d925bf81e4cc18,2024-11-21T02:46:21.903000
-CVE-2016-1397,0,0,5c8dd22d4639dda220fe6aa15d08ff3e2197cecfebc014bc3d01c9c2abab8d31,2024-11-21T02:46:22.020000
-CVE-2016-1398,0,0,a2e7fb351ff6398507bf00d83ae2b56f85670d76c02a9cffb9b5e25a9170be26,2024-11-21T02:46:22.127000
-CVE-2016-1399,0,0,6af00ae62dc8d8063f786add90a13e46d23e10c13747489412db5497eeaf7065,2024-11-21T02:46:22.233000
-CVE-2016-1400,0,0,99572b1c8079ad1b6cbb558f129d560c3ce694dcc748ce14a9b5de536761074c,2024-11-21T02:46:22.343000
-CVE-2016-1401,0,0,bfdf69162bbd0d96c1a3ce27bfd923c6ca744a3b6f9f173e656dff2c5912010c,2024-11-21T02:46:22.447000
-CVE-2016-1402,0,0,83262c8b145efcfdcaf7da2d1ad57fcd303f5ae635e8f63a07163c5fdbcfa64a,2024-11-21T02:46:22.550000
-CVE-2016-1403,0,0,dabfc768d99b85595f434d1e714e9a214d877c0ad55e056073dcec95c10364e6,2024-11-21T02:46:22.660000
-CVE-2016-1404,0,0,47629c219d8802a5dc52b3df28e38ed0a25f23da04c96f3d67de50c61b643580,2024-11-21T02:46:22.760000
-CVE-2016-1405,0,0,869dadfb2ff6310e134f0bf01ad580816094c9d4feabafe73061c7ac85e8f157,2024-11-21T02:46:22.860000
-CVE-2016-1406,0,0,c2c8b8961a9ae791392de408b98894cce0221629498f2667e2b2c69f3612fb64,2024-11-21T02:46:22.967000
-CVE-2016-1407,0,0,90529be998ba415849b6439aa3e0f8b29527f5b8593e10c075ea17878aa9cc3e,2024-11-21T02:46:23.070000
-CVE-2016-1408,0,0,dff63ff6a6796077997db7f02bc98c770a8ae67f23a5809a2a51f879f4bb19ce,2024-11-21T02:46:23.193000
-CVE-2016-1409,0,0,85b74d9de57e74e89cb205cd219a21b09175f32477e534e58f86be1932067eae,2024-11-21T02:46:23.300000
-CVE-2016-1410,0,0,1963e24cd2d8318686bdebbe1d4bf97715a8e52cce8c389b5fc03076d9ebb3f5,2024-11-21T02:46:23.837000
-CVE-2016-1411,0,0,484232947a6267015a1ce1b9d8e792fc4a6823f28fe514cec69cb0affac7f887,2024-11-21T02:46:23.943000
-CVE-2016-1413,0,0,7cf469a0a43f399fd181100696bb04477f52335a365b10823c0161d172830e96,2024-11-26T16:09:02.407000
-CVE-2016-1415,0,0,ae78c9bf4f862f0b8c3c522ff3804876b4e987e45962fc43527e708c57559fb9,2024-11-21T02:46:24.187000
-CVE-2016-1416,0,0,412839838d19cf088d1a1c52d4f0bab7a37b5de06a1908d8bc5a8ba0c03a29af,2024-11-21T02:46:24.317000
-CVE-2016-1417,0,0,8d283eb5c57f6dab34f3ebbb88df4d4312db796f2c32cd557fcc5c33decd453b,2024-11-21T02:46:24.427000
-CVE-2016-1418,0,0,4fa17d8b419a3fa30444fee7a1e7ecd6b7de850d4c174e6123ecd68e3ee5b057,2024-11-21T02:46:24.547000
-CVE-2016-1419,0,0,32e49b271cf90a6e55ea3ba7b1d996b911dbbd47d1a99d4daf04060f8e71e893,2024-11-21T02:46:24.653000
-CVE-2016-1420,0,0,c5be3996dfb950d5e8ab3d2784d854d161ddfdce1e115bfc2c59ab79cb41c24a,2024-11-21T02:46:24.760000
-CVE-2016-1421,0,0,1b40f06c52e707c4a29d650fe356a56bb8e3fd5203682a70391d6d328c9a2d4d,2024-11-21T02:46:24.870000
-CVE-2016-1423,0,0,c82eb092aa5e9eda44e55635bd0e50318ec23fd47f6bf311995c46e966b4bb94,2024-11-21T02:46:24.997000
-CVE-2016-1424,0,0,c43dd6394c7b55b23907580ee6c927caa110577d9867732bca4853e1d26038eb,2024-11-21T02:46:25.120000
-CVE-2016-1425,0,0,64083fa978f9fc2799f14318a28a00ace707ed5ea9796f6c8ad5b65476eea783,2024-11-21T02:46:25.227000
-CVE-2016-1426,0,0,d1276da2cdc7be3c1dc3dac8a9f4dc1b9b12b975eee57c3c4c527b2202c185b8,2024-11-21T02:46:25.337000
-CVE-2016-1427,0,0,6a098c6171fba581be4001f4c15185f1a5a543be77ac567f1787f1833e7202a6,2024-11-21T02:46:25.443000
-CVE-2016-1428,0,0,655323f0354b86ed8d3d384097fa34c229db12eac6f88db95c7852bcae4c63f2,2024-11-21T02:46:25.550000
-CVE-2016-1429,0,0,703f2e6818d0ed247eb39898a2589e1d65ea02bf3a24a042f5bc446d86ca8687,2024-11-21T02:46:25.653000
-CVE-2016-1430,0,0,a73a7ca046356dc0dbae07d9f4e65bf601fc3b2e8fd10469f2626ea61c2d3203,2024-11-21T02:46:25.767000
-CVE-2016-1431,0,0,66f253018a80030bea7d6760faefe2c6048a7903fe8370a00132d3b48be80295,2024-11-26T16:09:02.407000
-CVE-2016-1432,0,0,cb7395813c411a2ce5873b97373815380f16918dd9bf413853f88af029eb8e7e,2024-11-21T02:46:25.983000
-CVE-2016-1433,0,0,22ea92de239d0bf3d2f9f02fff693e26ce71244f90e13a1890b36bc05c880d34,2024-11-21T02:46:26.090000
-CVE-2016-1434,0,0,b1911359509934370d76a6fa19620fdd3b007cb4e25e12e1a60ab0f333a57528,2024-11-21T02:46:26.197000
-CVE-2016-1435,0,0,e63c847975c58b1753e93af30f89dcd42749b3791c07413eec201df7a61f1ed5,2024-11-21T02:46:26.307000
-CVE-2016-1436,0,0,932deb5d3822248736b268dcc8f1b369113d187284e57cb99ef8281dc7faa951,2024-11-21T02:46:26.410000
-CVE-2016-1437,0,0,3ff83a9ab6071a886ea2d2aaa574b0db9e751a9d2eef2571fd728b4d1db75219,2024-11-21T02:46:26.523000
-CVE-2016-1438,0,0,1b027c921ddf94ee7d0d6c20c47466035810b7d8d34c58f4d5d0277dc8476236,2024-11-21T02:46:26.630000
-CVE-2016-1439,0,0,dd2c7a4018cba4f74249d25ae588062e1fd7883ea718b063dfb932fe87468675,2024-11-21T02:46:26.750000
-CVE-2016-1440,0,0,ad06e9acd01517771955e324956e39ee033062bffa523eb5bd2ea18756f3ce9b,2024-11-21T02:46:26.887000
-CVE-2016-1441,0,0,c8ae71e25c85b82cea0851f882fdadff37f1b6e16c29cca08a2c4bc019ddcccb,2024-11-21T02:46:27
-CVE-2016-1442,0,0,927582a08532a8f5c2a8838066a43b771b5ccd260e03c0516d7f64570a625bb6,2024-11-21T02:46:27.110000
-CVE-2016-1443,0,0,3a9eb158af80aa03e361a98d40e2b53bc55feff9f5ce224a60fab37b8b4f6f28,2024-11-21T02:46:27.213000
-CVE-2016-1444,0,0,75f1277fc770c6524aba7b996dc262c845037c0cd202bc04b29f43e7ab555f68,2024-11-21T02:46:27.317000
-CVE-2016-1445,0,0,57a54086d62e8f1e04eaca5fd144eb808485397f4c7698e2edd959aef8793cab,2024-11-21T02:46:27.437000
-CVE-2016-1446,0,0,9046691f690ad2fbb46cb800970ca43505323356d9e4e491919ab8a88e45329f,2024-11-21T02:46:27.550000
-CVE-2016-1447,0,0,3bfe4d70e079fc2ee5fd404b13cd920ec597db16babe4c7a440702531c8891e6,2024-11-21T02:46:27.657000
-CVE-2016-1448,0,0,3e5a64147c903806ea917c268ebbc95c3737fc2eaad0efe11f9e2392e729fc74,2024-11-21T02:46:27.760000
-CVE-2016-1449,0,0,a214c8faa03f8f14160225d99607ac20f3ee41397ecd7836a1f5bcc10167d73b,2024-11-21T02:46:27.867000
-CVE-2016-1450,0,0,00f9ca5d167ed191875176f6f78a252e91565e0d48a526a173b04885028183b3,2024-11-21T02:46:27.970000
-CVE-2016-1451,0,0,0e01959af7f1acb7c9b77c2e1ec77a869f123207915f38919228ab9c05896a87,2024-11-21T02:46:28.073000
-CVE-2016-1452,0,0,cf615121d1549ec0c98645b9e1f8169d7ec2541c3485435e9201b7eb7b13ca05,2024-11-21T02:46:28.180000
-CVE-2016-1453,0,0,bcbc0079c474d581d2d8584b270af47c0d0afe8c022c3331e1c28389ccb747dc,2024-11-21T02:46:28.293000
-CVE-2016-1454,0,0,f7489aaef1ef2edfd7111c027eb0c23619bafa90f2248a4ab763a3b6f21491b3,2024-11-21T02:46:28.437000
-CVE-2016-1455,0,0,e6da60dfe70080ab6adbf6aba5a02962143186cb4ff3a589c0728e4075a2584f,2024-11-21T02:46:28.567000
-CVE-2016-1456,0,0,4a3d1fabf11ceb9795579c61f952c2bef06ca93147ffbe20d4f53dc59591301b,2024-11-21T02:46:28.680000
-CVE-2016-1457,0,0,b4038b24b685bff3443e3a8760252f40a88ddb0d5aca83893baf5e28f8fae639,2024-11-26T16:09:02.407000
-CVE-2016-1458,0,0,6d17250f63bbbd98ac4cb50a7c215572323a7f29fded09f71bf9d8431b729b78,2024-11-26T16:09:02.407000
-CVE-2016-1459,0,0,9ef7871457eb4d04882ed9d664c32aceda86127ddbf91f4f63df99a20cd0df65,2024-11-21T02:46:28.993000
-CVE-2016-1460,0,0,71798407b3da06894c50981034c00fb02d5eb116b1eb6fce1f5d80f7a3ca3cb3,2024-11-21T02:46:29.110000
-CVE-2016-1461,0,0,dc9840a36db660c18cdb95ccd11350a7ac0d5884bb178f1ed014ad9e4704fc60,2024-11-21T02:46:29.223000
-CVE-2016-1462,0,0,f9b833a3a21e9e099143d6251953a65d41af419feb7fbf5b93c4c6c41e16a88e,2024-11-21T02:46:29.343000
-CVE-2016-1463,0,0,f7340e52057e72481297f8f75d9d6a00a83afa7c0dd7fc17bb5b29b818666ec3,2024-11-21T02:46:29.463000
-CVE-2016-1464,0,0,f7ccb566aa85ec0b21b677e45e6839efa5b8752f9c7553e5fa925aa5ad60fd90,2024-11-21T02:46:29.570000
-CVE-2016-1465,0,0,67da177acafd44b6654cdec47df5798be0e412f6336c0fa125134e72ab5e5d6d,2024-11-21T02:46:29.680000
-CVE-2016-1466,0,0,5ba7b61e9b272842adf699c57c3a9e82ef25a8ece8d4c33a1d890e5ce7b6d759,2024-11-21T02:46:29.790000
-CVE-2016-1467,0,0,6ecfe8c39f58923c31296862cd76ad3e8bb680a1c023904a95383cc5d99ebece,2024-11-21T02:46:29.897000
-CVE-2016-1468,0,0,c92e2d1c57859a5c33f3582b40046604d5a9f80ab0fb09b2dbb9a583d880b70b,2024-11-21T02:46:30
-CVE-2016-1469,0,0,edc3d7c9708eec38aa178ce8996f53c081130df5dc97c094c9f4b6b550260dab,2024-11-21T02:46:30.107000
-CVE-2016-1470,0,0,93bc416687e53c7c39c2f7f2a20241b8744034eceb6c567988fce1aef21a11b4,2024-11-21T02:46:30.230000
-CVE-2016-1471,0,0,31bf204d875dd55d2a4a9b2a3552c52fe66cd30d7351bf9ad2feebd5458e93f1,2024-11-21T02:46:30.340000
-CVE-2016-1472,0,0,a727e3e50eebea5f8dcd9ed763bdfae53d72c8dd011b53668de5f1707d108388,2024-11-21T02:46:30.447000
-CVE-2016-1473,0,0,1c278b979010475ab3d8e46390e00fc816a20817e01b8b542393e4d1889a930c,2024-11-21T02:46:30.557000
-CVE-2016-1474,0,0,8be9e0657e9ea2fa08c3b1453515dbb63ba7b48fcd32e5784e49f5c9903dd11e,2024-11-21T02:46:30.667000
-CVE-2016-1476,0,0,f0bddd5536edb07bea2b7ba63beddd13cdef6e62fa2a83ea290c701c809ad700,2024-11-21T02:46:30.773000
-CVE-2016-1477,0,0,0b293ddd3ed5b950381b35031c1244ef76e58cbded4065fe793fa5c3976700fc,2024-11-21T02:46:30.887000
-CVE-2016-1478,0,0,9d63e61b3425f0f372510c247e16724bd120ef02c3561f8fb80f4113ed7a4297,2024-11-21T02:46:31
-CVE-2016-1479,0,0,1cf86cb2175532c66bbddf4b37b1d5d6eb10241d0c2a6dadfe9cd44a9052fe3e,2024-11-21T02:46:31.117000
-CVE-2016-1480,0,0,70d90472c82edf7c600d21522a65c8c412ae565d3fb769cc336227a18a5c6bf9,2024-11-21T02:46:31.230000
-CVE-2016-1481,0,0,35b8219b8a0c60d43121ecf7f76a779ea2eb27c557cc5f53e29433744b9bd3dd,2024-11-21T02:46:31.353000
-CVE-2016-1482,0,0,d7b6b969e66bdf88f8955461cf3287de84f5d91ed5ab998b4497ec18ed149f40,2024-11-21T02:46:31.470000
-CVE-2016-1483,0,0,3bab7068e39b186f3418f64a205d1b37aa8a1366e3ebcf01d397647eb3a90f10,2024-11-21T02:46:31.587000
-CVE-2016-1484,0,0,86c8128d9c9951619b176c40c89f2a0b541f0ef01406fd5d5ebf987a94716fdf,2024-11-21T02:46:31.700000
-CVE-2016-1485,0,0,6b8d1d3f36faa98bb6444c5a4d66acd0411451e3103cb3b195e22cd5d11485e4,2024-11-21T02:46:31.813000
-CVE-2016-1486,0,0,e6e77f5b6c2e76f11a5170ccbd24df1f8c113b4c53c23bcc600276c950a3a0b0,2024-11-21T02:46:31.923000
+CVE-2016-1287,0,1,7d4ea5ae59f742f7faa39addc0e2863fe755d3589883385145ed570ab52b0428,2024-11-21T02:46:07.187000
+CVE-2016-1288,0,1,5a74f2c8d9aac1f6b89330db83ee54f89559e4e051b92dafcfbe3802b8fbdabc,2024-11-21T02:46:07.367000
+CVE-2016-1289,0,1,8f433c8f11b1e2adf37bf84b3cacf0dabc9abb28b2cbf243977e6e817a3faac9,2024-11-21T02:46:07.487000
+CVE-2016-1290,0,1,0bb91708796683b975e130daf3247c02199d332c54d8db857ea8c510b9dbd3d7,2024-11-21T02:46:07.610000
+CVE-2016-1291,0,1,f1bee89e99ffab426a810310b9be89ba9abac4cd6a952e294630672bc987b89f,2024-11-21T02:46:07.733000
+CVE-2016-1293,0,1,19cde9da7f7819f42cf46055c65aa8a6200c29db710cc8852c81f41a88666aad,2024-11-21T02:46:07.853000
+CVE-2016-1294,0,1,fb44a18981336e8d1cfa03acee078275b512115fe62e36fe93cd58d4082d3d97,2024-11-21T02:46:07.973000
+CVE-2016-1295,0,1,8cde5d4d5b2297ed60015d56c7afd0d143da00fdfdd4282bb31609ae7119b741,2024-11-21T02:46:08.090000
+CVE-2016-1296,0,1,466ba69e3355d193d065f981a525447f01d69d37a8d50b053780d3fe0a224ba7,2024-11-21T02:46:08.217000
+CVE-2016-1297,0,1,290a50da4595d0c7e2ad8669215f79b8b026ff0de3a760b132f277ea9d9e328d,2024-11-21T02:46:08.330000
+CVE-2016-1298,0,1,f5fec51e30859d350fdec8fa2c09a8330cb171c9c094e7c9e62b4a22117dfda5,2024-11-21T02:46:08.447000
+CVE-2016-1299,0,1,81391e6546cc6680d62266f420520f0fa513a8e6fd08344c7a1e58b2650b31c4,2024-11-21T02:46:08.590000
+CVE-2016-1300,0,1,f0a9266c812d60bb6dfb0db9c7b619fd3c35ba7f02c270d9f2496f45bd618654,2024-11-21T02:46:08.707000
+CVE-2016-1301,0,1,dea73e53581b033bc93444ea2cbe1cbe0f5b7240f173ddf57c58f298b41080b6,2024-11-21T02:46:08.817000
+CVE-2016-1302,0,1,82b136a41f71397276e77832216630943ccd7cc8fea1c50b3baa7c3154b439a2,2024-11-21T02:46:08.933000
+CVE-2016-1303,0,1,94683b8a01eb34d14a87305b2190ddded6a612417fce750c4ff1609f9ba1034f,2024-11-21T02:46:09.050000
+CVE-2016-1304,0,1,6815fb855a303fdf0f5327f73d072478fc861c716219f10f5ada36e0a723a8ab,2024-11-21T02:46:09.167000
+CVE-2016-1305,0,1,e256f529124e5fb16c65270b76dbe96f008305eb2987a7bde236e8460af8708b,2024-11-21T02:46:09.263000
+CVE-2016-1306,0,1,db60b843318790ca12f2e135482269d5f4b47ec3f1cbd490462ad942423df554,2024-11-21T02:46:09.367000
+CVE-2016-1307,0,1,78950ee379205a0e16a4f7537fe41ac24c378adcf4ce7126ffafecf2f255cf65,2024-11-21T02:46:09.473000
+CVE-2016-1308,0,1,3b32cc56d99eb7b394d0c76033ede853d72bb30c8956ebd5dfa9b5d837acd00a,2024-11-21T02:46:09.580000
+CVE-2016-1309,0,1,048174fd6ff4cc91535d4bf5ef9955955da6442b355527e138d1b75b84f2eb82,2024-11-21T02:46:09.690000
+CVE-2016-1310,0,1,d9542ab0749e2ba822f56a13663becbc1bc6da5e881d7c00460b7c4a995f1509,2024-11-21T02:46:09.797000
+CVE-2016-1311,0,1,fbafea679085f77ab6bac292897218ea542fabcb81ca894bbcf8a424f277cad5,2024-11-21T02:46:09.903000
+CVE-2016-1312,0,1,b2be504028530afaad91bf6b3bdb09a083bb6b23c191f5eeb7d3a8466bfa283f,2024-11-21T02:46:10.007000
+CVE-2016-1313,0,1,5825b90fd73b857caff5f57c113051ba2d20cc48752c21c22e5c0d0063d68be4,2024-11-21T02:46:10.120000
+CVE-2016-1314,0,1,193929a8bdfb166f5ca4d7b6b585971d136d14c81484dc1648aad418662da31f,2024-11-21T02:46:10.243000
+CVE-2016-1315,0,1,45ea521013c12a113ccb0a4de442659a9bd29ed8ed2c1fc506528fb11d2bd90f,2024-11-21T02:46:10.353000
+CVE-2016-1316,0,1,e5e599c7daa193814392b0fe7c66f19b1a252effdea934af704739a5b723f8c7,2024-11-21T02:46:10.463000
+CVE-2016-1317,0,1,2f8363422a5043bf5ba377cd96601c28c89e523f19e59750227b6d924404c1ff,2024-11-21T02:46:10.573000
+CVE-2016-1318,0,1,40946b43cf82a9d06b0ec87f46e9961f80d2c2d982e92154051eb8defafacfe6,2024-11-21T02:46:10.680000
+CVE-2016-1319,0,1,6ad796fededcc6f1dfc6dc73ba8c56bce29c635a239815f8bb8058c1a7c8120b,2024-11-21T02:46:10.783000
+CVE-2016-1320,0,1,df6eaf3aade6e0a1b804beed2af36edd6775fd8f14c6e33080291b20d2d1c1d9,2024-11-21T02:46:10.900000
+CVE-2016-1321,0,1,7ec58fd3352eca21dde33481ada85f257304af23192c6322339f79f26d210883,2024-11-21T02:46:11.010000
+CVE-2016-1322,0,1,2a9778e9c0cdeb1858e50b262c141eda96ff161fddfe1c56d7cf25c50ad5f01f,2024-11-21T02:46:11.120000
+CVE-2016-1323,0,1,150b35ce0ecbabcec6d16729e2c978ca9ea1624811ff6b9568e82e6f80dfdbe9,2024-11-21T02:46:11.233000
+CVE-2016-1324,0,1,c3038edceb517d82af8c85d7bbc64e49683bc4d39ed587dae22ee2310cf7bd74,2024-11-21T02:46:11.347000
+CVE-2016-1325,0,1,6c61116c90c61711f4880f4e0431e1d80fde8732211b29f7e8978f7e76978d66,2024-11-21T02:46:11.453000
+CVE-2016-1326,0,1,bee1cbf961e83aaf14a382915a1cf726d77c8b654a1739172a2c77173042a146,2024-11-21T02:46:11.567000
+CVE-2016-1327,0,1,879100def71ac5c86303c2b8b8560f0a10ae8c49b6d84500dddb2bdf2d41ddbd,2024-11-21T02:46:11.677000
+CVE-2016-1328,0,1,b7df4a6b841c2d5bc7b4fc3af3b1b8afe0044d908057b4ca0911a683e83ce82b,2024-11-21T02:46:11.790000
+CVE-2016-1329,0,1,30c29d1647d8ccf85864cb4e4d6a2f955d18d7ab68ba74571ac1aa8a4f33f397,2024-11-21T02:46:11.900000
+CVE-2016-1330,0,1,df7cfe7f72d976503b9dd36e449067ccb43f13e1bf3fda7df01a4877d8d872e0,2024-11-21T02:46:12.007000
+CVE-2016-1331,0,1,5625d570ec749c96432645894a06c3cda9ac932b1169784a29ddf17332f43ee1,2024-11-21T02:46:12.117000
+CVE-2016-1332,0,1,1eb2c9aa2b3ad0c7c3b7e2666ce937ea4d0087493d6b3cbfc39fde5f9712ae8f,2023-11-07T02:29:55.563000
+CVE-2016-1333,0,1,5afb463d80e1917d56dc2cc94b28f3a2e41d67ab1385191c320c2e1d2c9491d3,2024-11-21T02:46:12.230000
+CVE-2016-1334,0,1,d23ed158e369a596f1dbc2ea89516487506fff0c71eb5acee23b2a033ec6f376,2024-11-21T02:46:12.333000
+CVE-2016-1335,0,1,544608c187b81b35b99a8b46b1bac2eb4b26925765ecaf876d10dd5b1a3117a9,2024-11-21T02:46:12.437000
+CVE-2016-1336,0,1,9aeb2023d868bd84d671f539f425da5ef2b2999faedb0d97daa214c8737300fe,2024-11-21T02:46:12.543000
+CVE-2016-1337,0,1,f5cbf6040362bc194132ee76cf94cb96268bd81d5309ecd8d5295c3b6bdf8e49,2024-11-21T02:46:12.650000
+CVE-2016-1338,0,1,5961a045a4d7038474a9854d22a2641dcc8363f5142efab9eae067eb17eb860b,2024-11-21T02:46:12.757000
+CVE-2016-1339,0,1,a13a470d0462d06e22dceea410bb14bff0d744c88c338d13274ebe6ce5921d8d,2024-11-21T02:46:12.860000
+CVE-2016-1340,0,1,e43bb31eac8682fdf3a56ace4d7c431dadb4eca53a811deb16f380205663c65c,2024-11-21T02:46:12.967000
+CVE-2016-1341,0,1,7f0372a6cda7ef33f8de31bca41d7be91a7c670006ae3b1519407e5793a12dc7,2024-11-21T02:46:13.080000
+CVE-2016-1342,0,1,27195e9498c90b945c8a4d8a46fd42e7571b567ee0e525fc29b74dcc17e815be,2024-11-26T16:09:02.407000
+CVE-2016-1343,0,1,6873645f22f533f998e0c870ed4c5ace65416335e5cc72aa1e75a140b1a2bd3d,2024-11-21T02:46:13.297000
+CVE-2016-1344,0,1,cee84c50b124d846b5657ec9a4c3eabfa1a24a1100e6eb10a3aff3659b528b9f,2024-11-21T02:46:13.400000
+CVE-2016-1345,0,1,127e620f3bec134fa096f843d9c5521b06e9b25160f543db0434027fc2a426c6,2024-11-21T02:46:13.527000
+CVE-2016-1346,0,1,3992290636b4505fe89e195984aac8e175d1e93cf1f71c489df8aa7a69cf82ae,2024-11-21T02:46:13.650000
+CVE-2016-1347,0,1,ae67c3c9c163619bebfd360049f42a28bc3087a6512ba91d2c8758d32550bc72,2024-11-21T02:46:13.770000
+CVE-2016-1348,0,1,d2b3dc57dbac42594e41981acd75e57304d6e102f7095d4cb4d4896730937774,2024-11-21T02:46:13.897000
+CVE-2016-1349,0,1,143b38f3f06d4cb3d70903cc0f9fa0f631b7e09f9ddc05f22625cc4bc64003a2,2024-11-21T02:46:14.013000
+CVE-2016-1350,0,1,f151f5dc153976249d2b8e78869c2060a585cf8e8a8c608fe1c8e37d52f8f49e,2024-11-21T02:46:14.123000
+CVE-2016-1351,0,1,184de4d75011f29c1a4ec194b8d7a9dd9c978f7df07d2c5e318ce861a57a6dc0,2024-11-21T02:46:14.240000
+CVE-2016-1352,0,1,bb123e951e212fd6d46f4a88597b9a6b056d3fbfa9da1bf05a8a4635113babc4,2024-11-21T02:46:14.373000
+CVE-2016-1353,0,1,433f4dc0826e64931bb44be36d276205494ff11b857f06e3b94b00cfdb855f68,2024-11-21T02:46:14.480000
+CVE-2016-1354,0,1,98d8d47c50c74494d1f74f2bf2bae5e32457f8c88f0fc626fe45bb6f68cfa872,2024-11-21T02:46:14.613000
+CVE-2016-1355,0,1,598f5251c0b7c72fbb2eeafebb4c3081d3d8119edb2760e058d5c3d85947ed0b,2024-11-21T02:46:14.717000
+CVE-2016-1356,0,1,ace33ee546b4e16ac5d6692f0d177f72d1911ac418ffa42b27b274f59cd1d495,2024-11-21T02:46:14.827000
+CVE-2016-1357,0,1,916e6c279413d8a831749d02b029e8c1fbf77183bdc727d9c484dac3c1839a74,2024-11-21T02:46:14.933000
+CVE-2016-1358,0,1,e8f5b3e6be0263b53290234f76ec223d118e4bfc8ffdbca661554ac491ffb573,2024-11-21T02:46:15.053000
+CVE-2016-1359,0,1,b7cf99921c126b00542daed21d69992890417c9bce96f36a254e5874a4c410f2,2024-11-21T02:46:15.167000
+CVE-2016-1360,0,1,0d799078a766f54bc8328a5bbc18329bdf48819993ccf8ce0b631b8420ce9975,2024-11-21T02:46:15.267000
+CVE-2016-1361,0,1,ab7026c531907d867e4bb30383c62f66a83b870cb15a77f352e0658a512f4090,2024-11-21T02:46:15.380000
+CVE-2016-1362,0,1,9be233b8063241008a02ac9106e30fb9ebe288ff16e2295456642dbf1d63a4b6,2024-11-21T02:46:15.500000
+CVE-2016-1363,0,1,acc5ce9d5e1b4ede823d01e9ad7e3073696293779c2335dff710cafbdefbb944,2024-11-21T02:46:15.613000
+CVE-2016-1364,0,1,40eb5b6b7c299aa2fc1e878ebc874016e6e36fbeac65161580378a343ee564c7,2024-11-21T02:46:15.720000
+CVE-2016-1365,0,1,4ade1fb5bb2dc9f7cbb22e6e12b38382ead418b4aa638a0617f299a1e2c20998,2024-11-21T02:46:15.840000
+CVE-2016-1366,0,1,8387b9cc89146294f1d88829bfecf12b24c1074f8a7e0d0296cde3732d64b3a3,2024-11-21T02:46:15.953000
+CVE-2016-1367,0,1,78d3ad4fcfb8e0321556109d81622635dfe32674acdd29319982bba6e8987969,2024-11-21T02:46:16.060000
+CVE-2016-1368,0,1,9ea37d66b6f0aa21b41b625955f88e9186aa5ac21ed1a5de468cfc6a3e2adc92,2024-11-21T02:46:16.167000
+CVE-2016-1369,0,1,74ad0090aae80edad9f1fb4755942cb7907605880a2cea1dc3a04cf71abf0c0b,2024-11-21T02:46:16.290000
+CVE-2016-1370,0,1,9a2535aa0c82ddc0ba3eaab828f6a824f6d52f4f819eb1c15fb027bd16c62631,2024-11-21T02:46:17.180000
+CVE-2016-1371,0,1,2053d1e32a11b5554f9952a6e1e00b77f1699534c1f47e5ba98efdd30feaf2ef,2024-11-21T02:46:17.540000
+CVE-2016-1372,0,1,3f16f4d4f87e5a0c67a1d836782ccafe79f678af6437e87f04be193949bb49c8,2024-11-21T02:46:17.673000
+CVE-2016-1373,0,1,2757452b3163144b9187eb0eadd4123fb6fabf021a153ac630cbe83ca1aacf59,2024-11-21T02:46:17.783000
+CVE-2016-1374,0,1,b9942a726ba57d45430e8fdc0533e04ee84b81f129e7d7d6d34a5679158c501c,2024-11-21T02:46:17.893000
+CVE-2016-1375,0,1,3f4ac36bf9dd4f762ff3afd40c94f22626b63143ef7126dc83538c3022e1b1ee,2024-11-21T02:46:18
+CVE-2016-1376,0,1,7210d0a942dfa6b0bab193259eece8ed619d68520a5bd80a7cc10e2a92eaa295,2024-11-21T02:46:18.107000
+CVE-2016-1377,0,1,f7349a4132f204005ec7a0ee3ece4476a0fd08935a5b4016ab304897aa7d0b2b,2024-11-21T02:46:18.220000
+CVE-2016-1378,0,1,711ebfcd997530ef19aa870c615cb7270fd30acb5a2b496dc9e07aadf3706faa,2024-11-21T02:46:18.317000
+CVE-2016-1379,0,1,9010234a9b42367c349138b1c84ccb0cd3d74e7ef89882e11b942959527306cf,2024-11-21T02:46:18.427000
+CVE-2016-1380,0,1,f7fea2b7b7d569b56053bb1a5909bd8c9885a8ea0e0300207a0328e078dc5753,2024-11-21T02:46:20.080000
+CVE-2016-1381,0,1,138c89bed27457abc04c2da52190f6414cb8b25633a0eb874201a04f5c2fa3b2,2024-11-21T02:46:20.197000
+CVE-2016-1382,0,1,3739e6f28eecac59485cda5ca588820dfbadeea0c5248f098997c8982e2b8ef4,2024-11-21T02:46:20.303000
+CVE-2016-1383,0,1,7b749a3f2d5b94f0393e97fa98bba61d44626b2617fbe534a5cd3cf0f9d10414,2024-11-21T02:46:20.400000
+CVE-2016-1384,0,1,c95ab33961f0903d43e5b1f91f6e7116c44ed74177c292cd7b723538f1a229a8,2024-11-21T02:46:20.510000
+CVE-2016-1385,0,1,30214d78a6cb7a26599b6b22fb04d0f34788d92ab3d2140097685a94998d03c7,2024-11-21T02:46:20.643000
+CVE-2016-1386,0,1,61a64162549cb1cb886f1b0c05238e5314d88c618e08a7ee374933e95c53ee92,2024-11-21T02:46:20.787000
+CVE-2016-1387,0,1,b67eba1c4e2fa15953c442c6d3531ba13b86f77b9805c98bd1739107ea28bd0f,2024-11-21T02:46:20.900000
+CVE-2016-1388,0,1,da84fead57758f9028bf89a30b0e7f0e46622cee617dc53fc64114b83b624ea4,2024-11-21T02:46:21.007000
+CVE-2016-1389,0,1,1ed7c7357e0f6a5612a04767e5af0dbdafdfe1e5e2478d33dd4f432fa902e1df,2024-11-21T02:46:21.113000
+CVE-2016-1390,0,1,e7afd97d6f2a6977ab7700932d8b90c80a49d0e0547237e4380cebd86f1de88d,2024-11-21T02:46:21.227000
+CVE-2016-1391,0,1,f29b9dfd1b62ca3fef424fa669bb4739fe50f284b34bec6d2c2132811a244fb3,2024-11-21T02:46:21.333000
+CVE-2016-1392,0,1,c9384ce4d51f4c233553af4420be83e2c9e4177b7dc9f657b3b341c2d00e8ac6,2024-11-21T02:46:21.460000
+CVE-2016-1393,0,1,db43ef015da8674fe8ffa4850552fb35930b642fd676d5c587d5d31c5e48f9b2,2024-11-21T02:46:21.567000
+CVE-2016-1394,0,1,0004961ab5ca7eb5226478622e0c00ffab900468a4f07d26085c4aa1f905c6c7,2024-11-21T02:46:21.683000
+CVE-2016-1395,0,1,011d9200e8ba3b68751b17a69bfe13c0642040a72345d212bc1c7bc6f11012a4,2024-11-21T02:46:21.790000
+CVE-2016-1396,0,1,ee15009b2d851674a74acf8f406a9b6cdbc06ce667088926d7acbc1e8cacefb3,2024-11-21T02:46:21.903000
+CVE-2016-1397,0,1,0763d3b92d2fa4b3a14827da89100b0231662a81450b873d46e357b3413450e7,2024-11-21T02:46:22.020000
+CVE-2016-1398,0,1,b2105a430fe66e2ec7d79e778c56f0393580f44be2f273992868cb1fd02e148f,2024-11-21T02:46:22.127000
+CVE-2016-1399,0,1,f017fdf9fcf28a22f7f1a04d12aca5c4cbd105b6b1244ea62ff61e27b398f951,2024-11-21T02:46:22.233000
+CVE-2016-1400,0,1,4cd5ba1288a5f3ffc843cb2942ec69ac44c92994853ea90166e8f16c6a6717d6,2024-11-21T02:46:22.343000
+CVE-2016-1401,0,1,de46a0728d477655cf5dcc3c7b8276d474ffa73e2222f3534df0086535b8f251,2024-11-21T02:46:22.447000
+CVE-2016-1402,0,1,c605abf847da4224f66810c400b83261c1d8bad5773207c5fe3a476f93e6c739,2024-11-21T02:46:22.550000
+CVE-2016-1403,0,1,0a32f293feb1f57116a761b426e585113fc93f9f49a20be15556a7361481858c,2024-11-21T02:46:22.660000
+CVE-2016-1404,0,1,593daf7b9165332a286a07f1a0261577599de59ee67b444afea4e3f79469fcf3,2024-11-21T02:46:22.760000
+CVE-2016-1405,0,1,ca14b8b3ca54fdf95f175682b5840733eac479cb9034d197a0646f79550a949f,2024-11-21T02:46:22.860000
+CVE-2016-1406,0,1,01d9112e78429c0cf3825c1432395ac23669057857a16277e1201b4ce9d5a07b,2024-11-21T02:46:22.967000
+CVE-2016-1407,0,1,0e2131f99b0dc28ce5b342cad75ecb14281dec95ebf3cc306385f60311dac820,2024-11-21T02:46:23.070000
+CVE-2016-1408,0,1,dfdd25089e2c8d84b2c886c7d5954fb98e105443806d859b9b4d4a15e83629a7,2024-11-21T02:46:23.193000
+CVE-2016-1409,0,1,6e37b09af7c7fa715ca00dd6a4f49db1c2981fe718c61dbd543d11d16cec5246,2024-11-21T02:46:23.300000
+CVE-2016-1410,0,1,32017db31135974bb50f8886b362072d1add6615a8625d01c87548471e74d275,2024-11-21T02:46:23.837000
+CVE-2016-1411,0,1,f6bd56d088eb0645a3615096dcbcef87e1ec5b8c249325cc820e381ed21ebef2,2024-11-21T02:46:23.943000
+CVE-2016-1413,0,1,fd844bddf0f6c52e05b848a5f6c14c23736ed14eb095334d019d2accda620eee,2024-11-26T16:09:02.407000
+CVE-2016-1415,0,1,1fc509afc86791e861a353454237c22a13bf6e50e29cbf23c4d47006cca8b73a,2024-11-21T02:46:24.187000
+CVE-2016-1416,0,1,bdb2f489304cb5caf9987725399cadba97ef8faeae758e7a02ad211f3311f9e0,2024-11-21T02:46:24.317000
+CVE-2016-1417,0,1,6277307930f6441a3d4078a9f0456a5e8ebeced5be477c22e3ab7de6ae82765f,2024-11-21T02:46:24.427000
+CVE-2016-1418,0,1,0e0b2d0e8e2373ed39fcc0953150cb4b59ca2504781522016d0b55b526956134,2024-11-21T02:46:24.547000
+CVE-2016-1419,0,1,b25fa302122d880a8a94493f489adc3a97cedc0a74aaca2e9fb414062ebc0e92,2024-11-21T02:46:24.653000
+CVE-2016-1420,0,1,e9a5f4593227b30458dfda781ca4eeffaef534546371060e9d5c0f815bc2de84,2024-11-21T02:46:24.760000
+CVE-2016-1421,0,1,1b62727948db5ee73fef747539e66bdef51e5e72b4745fb5ca34a49a4d396659,2024-11-21T02:46:24.870000
+CVE-2016-1423,0,1,238b1435e24ed0e37a7d5577f523b79f9659e3c1c29c646a6526184b3b9f7768,2024-11-21T02:46:24.997000
+CVE-2016-1424,0,1,e2341345e287d6f0adce3c79a1668f8ed555027dde1f95cfa3bf3a38e2d17f25,2024-11-21T02:46:25.120000
+CVE-2016-1425,0,1,79b6b965ae6775339c0d5d85d80605ec06d21c6e96d69958ceee760c4bd3850c,2024-11-21T02:46:25.227000
+CVE-2016-1426,0,1,6798b92ff9f9c03bda8d8666ba8e78146a4130a9eaa8f076056c521ee29e9d14,2024-11-21T02:46:25.337000
+CVE-2016-1427,0,1,32c41d92e23a6bb2a36940d4aa70eb3270f84c114427add88204af2c39340867,2024-11-21T02:46:25.443000
+CVE-2016-1428,0,1,3c1d8b7f9df7b0687470b152e3054d04c986527453b47c617d1c75ae8443bde0,2024-11-21T02:46:25.550000
+CVE-2016-1429,0,1,c37f2e49e85c57a438c5d0f6f7735ac06eec9fcffd137d9a0532393f2de40e21,2024-11-21T02:46:25.653000
+CVE-2016-1430,0,1,bc58e5daee8a0cf75242fecfdc9fae24535bd20bf929b0866cc93ea49599b393,2024-11-21T02:46:25.767000
+CVE-2016-1431,0,1,531bc080245b55415789d93eeaea10c863afae45de5b97f0b4b23f1e95d5f336,2024-11-26T16:09:02.407000
+CVE-2016-1432,0,1,c1cca00ed954f3b48a421319dbea5eccc6a4ea2b6e74464eb3d44437b41dc3bd,2024-11-21T02:46:25.983000
+CVE-2016-1433,0,1,32651c2aa264a09f747d2dc57653b69e274a42a9580e207a20f015f191b3dc62,2024-11-21T02:46:26.090000
+CVE-2016-1434,0,1,ae2cc20b4023c68e6b7d2860362386167334a8c14208e35132f4ba3bf689107a,2024-11-21T02:46:26.197000
+CVE-2016-1435,0,1,79017869f8f8f35191ebcfe4c978d78713821a3afa7076b03a9ff8c4d976c55b,2024-11-21T02:46:26.307000
+CVE-2016-1436,0,1,d5f9c5114799d91d2ba5f12b30723c043d324822b58bcc683a0f7bb5a2bfaf46,2024-11-21T02:46:26.410000
+CVE-2016-1437,0,1,53b2411c62b0bc979c6f67090e0770b389ff2c07e4ba238165f41cd794b816ff,2024-11-21T02:46:26.523000
+CVE-2016-1438,0,1,14db44563d3c9c17ae950cf3ba9329f632757c4f7264d67a3f1a48969c75035c,2024-11-21T02:46:26.630000
+CVE-2016-1439,0,1,78def028f81165b29ffb370d71069215693b09c5adc5c63ddb5c9983aa4aa947,2024-11-21T02:46:26.750000
+CVE-2016-1440,0,1,d7a1947efd4807bea5615f666d9364f76421d72ef4f6c92b251a509edbc76b32,2024-11-21T02:46:26.887000
+CVE-2016-1441,0,1,8631513400ebcdb55a58fb98e089761fee3ab387b1cc1a4499716bab9b90c255,2024-11-21T02:46:27
+CVE-2016-1442,0,1,53e1023032601a1d0f9a9de74fa7c2e13c787e95a6aacaa27f3c43120198f7fc,2024-11-21T02:46:27.110000
+CVE-2016-1443,0,1,a3f1bf2aaee32c517b76ac96fb80e721c04cb10e5e4305b19b904596135d83af,2024-11-21T02:46:27.213000
+CVE-2016-1444,0,1,e99afc6df85b26abcc4ef082809942b8a9fc946d9c01a0fb79b66b10a6b2bab9,2024-11-21T02:46:27.317000
+CVE-2016-1445,0,1,fc679d23c61971346d873e6c76e07cb93d8f336623b584a403d806e5b93848d2,2024-11-21T02:46:27.437000
+CVE-2016-1446,0,1,b25a87ad842f2a0f4441b02b2919449b0e5a653a398676f20bf538ab6a4b65bf,2024-11-21T02:46:27.550000
+CVE-2016-1447,0,1,4d7784bcd416573972f0b6f159a00367d137e64ffdfd7ce96c040292d1d24c34,2024-11-21T02:46:27.657000
+CVE-2016-1448,0,1,64ec0dcb86ca5b90a1cfd1f6de7b8fd4e86f8a936752a4337a2b7019ef9a677a,2024-11-21T02:46:27.760000
+CVE-2016-1449,0,1,6dea96f90eb47e04f574aac26a2d29cb45002ddf68fa23d3ba8338d114c876a4,2024-11-21T02:46:27.867000
+CVE-2016-1450,0,1,a97140e218adee03ec64fd71da6d52f513d35ce9e96996314ac4c818ec705331,2024-11-21T02:46:27.970000
+CVE-2016-1451,0,1,dd373ec3c640bf0324310d46ad983f183029c4c2c6f0c2a6453eaf38c6d8667b,2024-11-21T02:46:28.073000
+CVE-2016-1452,0,1,cb94a5ca552363264f4d5d1a9f81a52e2ed5044739105bf92ae0fd00bd5b0f07,2024-11-21T02:46:28.180000
+CVE-2016-1453,0,1,8a115711d5084a517124455f018875a40e8ac7e00bf6583a9255351d7b401b26,2024-11-21T02:46:28.293000
+CVE-2016-1454,0,1,8122744b3b34315b3c451eda811b29cedab9c807225dc10423a63d136496f057,2024-11-21T02:46:28.437000
+CVE-2016-1455,0,1,d561c6497c0cbbc269426f176464242d6b26e935c70f8d07259b50735d48aa81,2024-11-21T02:46:28.567000
+CVE-2016-1456,0,1,3fc8483cdaef34142c72251ad66c8be64e00b9db6f92f1c14b4bd405a1710d3a,2024-11-21T02:46:28.680000
+CVE-2016-1457,0,1,d450503ed10abe6d43822fab0f82b9cb728ca1c4a90e23ed33a4e035a4c2ee43,2024-11-26T16:09:02.407000
+CVE-2016-1458,0,1,563c2f15d6510bda3d715d73c2a244182959dfc7a2244b43cf466a4cd58336b7,2024-11-26T16:09:02.407000
+CVE-2016-1459,0,1,a1a8abaffbd34ff1f1d08c5129e3ae2d0f7de8d515c9e4956f3319081e7b492a,2024-11-21T02:46:28.993000
+CVE-2016-1460,0,1,c8bf1ea3fc3217e3c087a30ffb877c95ec044d2abe95f3cd6c4578eda55272a2,2024-11-21T02:46:29.110000
+CVE-2016-1461,0,1,a88fd4bc99a3afc2b7e00092f961f2f9c9901c3aa97dcc876e4acc3ea2611f85,2024-11-21T02:46:29.223000
+CVE-2016-1462,0,1,b30faa5137078c71400ab6cf30e8a506d266b8721d7cf61e6a2380f663080fe2,2024-11-21T02:46:29.343000
+CVE-2016-1463,0,1,514aa54b470cb6caa4e821b392141c97acaf827afe07edf813207d545060bb30,2024-11-21T02:46:29.463000
+CVE-2016-1464,0,1,7e2000d026425f8943f329658c8756f999242d2c7ace88dec412a0cc95af0758,2024-11-21T02:46:29.570000
+CVE-2016-1465,0,1,bd6ab7f8f6c5bec7858523b79fd876025a9647497714d4725b388d3b6f43e67e,2024-11-21T02:46:29.680000
+CVE-2016-1466,0,1,c13735f699267fb0255633b6fb9bb75ff81f52f10dd8f0ecd8ad35dcd01332d6,2024-11-21T02:46:29.790000
+CVE-2016-1467,0,1,b17ce32ee29dcc9deab0c8bf0907e03108fb3a71abee750f52ff9c45bf19b8a9,2024-11-21T02:46:29.897000
+CVE-2016-1468,0,1,312082c1cdf6d42154718e5d2807c3aa1aabfd9053ce78f58cd82911407576e0,2024-11-21T02:46:30
+CVE-2016-1469,0,1,31d974b33cee3faf6c2c9359748ce80ecee4404227aa421182bfc4e6807e759b,2024-11-21T02:46:30.107000
+CVE-2016-1470,0,1,04fb6383a246f290a4c8e8ea1ae1865861e75a09cc232723c8c978e81ca21137,2024-11-21T02:46:30.230000
+CVE-2016-1471,0,1,a31d0f17413ab85ae001eb7e7aeec93ec1f97cfc533c74e4d0e93d2634f934d7,2024-11-21T02:46:30.340000
+CVE-2016-1472,0,1,34bad8b6b34966f716b3e5847bdd5cfb737519cc5842305221c3eeb6a1c05b30,2024-11-21T02:46:30.447000
+CVE-2016-1473,0,1,c16a1d5469e8eb133f6db894c5cebf86aa7adcc0570bce2876f6a977b71efc37,2024-11-21T02:46:30.557000
+CVE-2016-1474,0,1,ede972fb5dec304902fbbb3e7e5369c38c82b2cff1cd57c56989b84c812d5c14,2024-11-21T02:46:30.667000
+CVE-2016-1476,0,1,031b7ffd3ed3f6e1d8bedab307eba68f666de580d025b1f5c83d97aaca8c1c76,2024-11-21T02:46:30.773000
+CVE-2016-1477,0,1,9414f89efb4db449ccb4f62e9deef169eec318f56c4f920f2382e4e85ab1f8cd,2024-11-21T02:46:30.887000
+CVE-2016-1478,0,1,2fee4cd61e046341feaa1332574fbeb4d8cb1a43a6f7d8da7e15d5defee2bcc4,2024-11-21T02:46:31
+CVE-2016-1479,0,1,3cc3e48043edbdedfb4ad9c683a6a1e76d78e78a65881509a135e7ba07669133,2024-11-21T02:46:31.117000
+CVE-2016-1480,0,1,0520b62fbd4c7127190ac6be069210ee01026219b55096a36f23068621248694,2024-11-21T02:46:31.230000
+CVE-2016-1481,0,1,98c5afd8c88282bac4ad99f73bc1b0d25d1167d1f4119c4e69b948a4bfdb5f1f,2024-11-21T02:46:31.353000
+CVE-2016-1482,0,1,fbcf5c521ae6c80c894d108c16040059b9588e35d368d456cdd000a1bac83a58,2024-11-21T02:46:31.470000
+CVE-2016-1483,0,1,1df0a02a876a314f763c52fc17b07aa09b58212518e4a9d6328dbb1a8e59c01a,2024-11-21T02:46:31.587000
+CVE-2016-1484,0,1,fb103a45625cc83b5102678f80b054ebe57a6e07bc9e2300e3dbe1eda0bb92d7,2024-11-21T02:46:31.700000
+CVE-2016-1485,0,1,efa0db624b16a52545b79ac93ac37fb5f736c852ba7e21ec42e2daa55ef0ddeb,2024-11-21T02:46:31.813000
+CVE-2016-1486,0,1,58f97f4d20b11fc395159dcd912ae6179dce0c285bde101c896b6f58936cdf4f,2024-11-21T02:46:31.923000
CVE-2016-1487,0,0,96b4907415d36a49866379356f2c1c4bd51a01890dc71d6bdfd7763bb0cf0d78,2024-11-21T02:46:32.037000
CVE-2016-1488,0,0,0ed1045aab1989d1eb196c0157e04d971116e9824d413d2af3771a434e73a741,2024-11-21T02:46:32.177000
CVE-2016-1489,0,0,c736cc9d8df17cbb899e71dc56ae9f205db63406402b183dd88a397f771e9d65,2024-11-21T02:46:32.320000
@@ -89374,124 +89374,124 @@ CVE-2016-6351,0,0,7289b22fb25a673b65e16aecdcb66b9182d9804e29309380dd8af0965a038d
CVE-2016-6352,0,0,fefec0cc66801d462bae679ab7941f8dac17efecb4b6cd9e179b7832fea6bdf2,2024-11-21T02:55:57.553000
CVE-2016-6353,0,0,a15557934d37997c52c2f86c482d98acaf0f2ecb1a177d41d05a0933e16c6913,2024-11-21T02:55:57.717000
CVE-2016-6354,0,0,c090d9350b266bc5e5fc1dbe8a5b36b8c5e02a349ca7a6525f57e8af9e1866ae,2024-11-21T02:55:57.863000
-CVE-2016-6355,0,0,212e75441d428d5913643be8727958036aac8a71e7ca566dde4e9ddf3ca48e1e,2024-11-21T02:55:58.020000
-CVE-2016-6356,0,0,c6389c6eb686afc80377ef19afe43ec5dcf40250c78ce35807358a3b1c31bfeb,2024-11-21T02:55:58.163000
-CVE-2016-6357,0,0,7c4f7db6477c3f3dbd4d86e232ba8ccab8f117e7311664d190966e27f226adf0,2024-11-21T02:55:58.290000
-CVE-2016-6358,0,0,e179c400c2f3ad9c7951eba8026914f076422c0e73192f6f2c9af0c932d88cc5,2024-11-21T02:55:58.410000
-CVE-2016-6359,0,0,f0958f3938b01b6a4cade7f3980e1db0029303350a54400d617ea93dc8e0a80c,2024-11-21T02:55:58.527000
-CVE-2016-6360,0,0,4673553261622615db01c5608a0ac7fd3d809f5d0690488036baa0a2131acea2,2024-11-21T02:55:58.640000
-CVE-2016-6361,0,0,b75188320b1c16e8b42d50d0c7004843beba5b2a84b1089ea21e4b957ffd0efb,2024-11-21T02:55:58.763000
-CVE-2016-6362,0,0,acf8484126a2b429d8f634e9683ed1a7d4499d370d812815bb880abe6e9020b3,2024-11-21T02:55:58.890000
-CVE-2016-6363,0,0,5ada98b42617fafa5cc7c74ee303747d45590b4df04acf60bb1342ba1778ea0d,2024-11-21T02:55:59
-CVE-2016-6364,0,0,b3a55b2da97f460069e58eca2e0f996b83346daf9c06f4b97b4112e09737c782,2024-11-21T02:55:59.110000
-CVE-2016-6365,0,0,6aa8b3f474f359fa370ec0a4f768115994f9709d5ec548bb002514f9b3e620e1,2024-11-26T16:09:02.407000
-CVE-2016-6366,0,0,c15b398ed378d4d051ea09e89143a7d6f2a7cdaef4e976d3156437868cf6a7eb,2024-11-21T02:55:59.330000
-CVE-2016-6367,0,0,6bfe2a5874a5f4aa5667e143fe4117622727294cfb097ff164c0e4c4bedf4305,2024-11-21T02:55:59.507000
-CVE-2016-6368,0,0,f442902792b633368f9577d020d6d8707f89e814488ceabe3d48441b7e281ae6,2024-11-26T16:09:02.407000
-CVE-2016-6369,0,0,93268cabc36fabec6220bc7478470f676cd847a49202e7777c507fe735c6e6af,2024-11-21T02:55:59.783000
-CVE-2016-6370,0,0,2910ca88a7055c71390cdd29376b29f022e5517d3357cadaeafd6c546b118a86,2024-11-21T02:55:59.903000
-CVE-2016-6371,0,0,5b106ab30f989cd5b4c647af055e51582409a2a88dff2606fd117736ecaf4d69,2024-11-21T02:56:00.017000
-CVE-2016-6372,0,0,9ebaa33eadadd31ad4b215f5c817d7184fa544956a6195c897aeb5ac062f4c70,2024-11-21T02:56:00.140000
-CVE-2016-6373,0,0,50e3387fa088bc02690abf9951baf66651a7f760cc1f6148fd236d9cfc14c16a,2024-11-21T02:56:00.263000
-CVE-2016-6374,0,0,ae2c7dc52cc7feff6f83e10ffc51a56ebd8f6550954fd680b8dad79a15bd15ef,2024-11-21T02:56:00.367000
-CVE-2016-6375,0,0,4238b3d569740cbd8c51ca9ee42ddc6ce8124446f6381d8b6144cb69e2aee909,2024-11-21T02:56:00.477000
-CVE-2016-6376,0,0,53c31a1782a933957e421e37956d06448619147fd828c04c168288e9e3916058,2024-11-21T02:56:00.600000
-CVE-2016-6377,0,0,ce739ba33f6fff4b690261b673e50db4b8f4cce37329024d74853b0a3b3c2c7d,2024-11-21T02:56:00.723000
-CVE-2016-6378,0,0,5db98981edce15886240c6b13df209b71de8b881c63285a38f49970d4ef4bb63,2024-11-21T02:56:00.840000
-CVE-2016-6379,0,0,e8175d3b01a77962f7568f467abb91f5bb1e3e1a00d06fccdf254846a632fea1,2024-11-21T02:56:00.997000
-CVE-2016-6380,0,0,b2b1e1fe45b1ac11ddd96ce77208d5e38c112b2cfdc2d414d5b217b18a552ce5,2024-11-21T02:56:01.110000
-CVE-2016-6381,0,0,42cf323268cee417b2d3e9903d44d41ba527de56b3e55231e2dbe8435f09dc92,2024-11-21T02:56:01.510000
-CVE-2016-6382,0,0,d41373f50760debc4c827acbdadaecc04d0fdf675386692600a4d3ff1c12856a,2024-11-21T02:56:01.703000
-CVE-2016-6383,0,0,36ead1a397255261b3c6d5dff459748b94330f2986ec2f3c96680ce77e6313c1,2023-11-07T02:33:59.783000
-CVE-2016-6384,0,0,65981d230445a9e0dc9c5b5f23a35e1a09f551dce2b3c4ea8ef85b75fb73a905,2024-11-21T02:56:01.860000
-CVE-2016-6385,0,0,2b4dcb699cacd9099de27e8d4ffcb44f6c448fa44a61d6e34c3787e0ecbfe0f4,2024-11-21T02:56:01.980000
-CVE-2016-6386,0,0,a2f59616c7ad7b13a3444cf14c2c0332be71abc92edde68b17e0c1567080f9f7,2024-11-21T02:56:02.117000
-CVE-2016-6387,0,0,6db5cfc9b5bcbdebd970a2d70e880b8714aa9c450bb4f000a265cae30592c747,2023-11-07T02:34:00.037000
-CVE-2016-6388,0,0,2e713afd3765299ee3d0a13f69603f2d86b907e196c7519ad063974788739624,2023-11-07T02:34:00.253000
-CVE-2016-6389,0,0,63424a3a4dfed0df76ab12bceed226c9d077929267bfea4c99b8544080a1d5a4,2023-11-07T02:34:00.510000
-CVE-2016-6390,0,0,3bc13308e38263b707ffd14f8218b30553f77b4b3fa1b62bcc52c1cf80a0efee,2023-11-07T02:34:00.760000
-CVE-2016-6391,0,0,1cfedd1e709b1445ac281ffb09d6770e8fe1a063f9bc7fd6ab3195691e95a79b,2024-11-21T02:56:02.303000
-CVE-2016-6392,0,0,6c805accd6cf82021faab5002b73358c98e55fc8af228fc59a77d4fbdef101ce,2024-11-21T02:56:02.447000
-CVE-2016-6393,0,0,d79cc4de75be7739c10f47d2bd4ca833eacdcd4e38da0e833b2a168866d59b25,2024-11-21T02:56:02.633000
-CVE-2016-6394,0,0,1638b261cbbb71a485df8911c31a1c203d38662e8ea1013491481b10ef91adcb,2024-11-21T02:56:02.767000
-CVE-2016-6395,0,0,0ec91a6bdfb823954b09298a9daaa162817a9f6102f5ca5b9ce262049b3ae83c,2024-11-21T02:56:02.890000
-CVE-2016-6396,0,0,f8550619b2b0230afc377b742fad030b0a82444496973c985a3e234e47c82c7b,2024-11-21T02:56:03.020000
-CVE-2016-6397,0,0,ca8c5d4f8973d78d0ca2bee97196785cb13d40bc783029e79f28f022b21b4102,2024-11-21T02:56:03.160000
-CVE-2016-6398,0,0,9a882d30e4979a73ca89848835d4e92a5d4e09a0d9b0af05bec0854b08723c98,2024-11-21T02:56:03.313000
-CVE-2016-6399,0,0,e0c78d58d8b6ef1963451cb6643620dbfe8d526a603345d35acebddd1f1960f8,2024-11-21T02:56:03.463000
-CVE-2016-6401,0,0,8435193f0606f7433c133ef727fe41d19e99355ee6891ba670a3f778e48a48b8,2024-11-21T02:56:03.607000
-CVE-2016-6402,0,0,e315c128f86a8b95403f6f977155b353959c37e883f1ee2058ed7509298e2aca,2024-11-21T02:56:03.720000
-CVE-2016-6403,0,0,f5a7f47f377b29749db98a6d83372cfe103430aa6ec4ed405cc67f9ab1657ab4,2024-11-21T02:56:03.833000
-CVE-2016-6404,0,0,0d097cfe2ad60def2816230ad28cf2c74a49ea1599ddfe3d9cf1924311e35408,2024-11-21T02:56:03.947000
-CVE-2016-6405,0,0,55def2bb7aac4bd1f0299e4fc3b8d6929e64a48d556b213bb54dac61c4474bf1,2024-11-21T02:56:04.060000
-CVE-2016-6406,0,0,cd64b80d73f94a6383f7196924d601a22ab6a5eccec73dd3e137e7c8204756e4,2024-11-21T02:56:04.173000
-CVE-2016-6407,0,0,76449f1fcdebc87de934ff35172e149def717b26cbbcc318696977f0c79f1b3e,2024-11-21T02:56:04.300000
-CVE-2016-6408,0,0,ddd15fc001aa5dd34f944946fd2c456f0cc8ff94bd73d0265136fb5fe96d818e,2024-11-21T02:56:04.427000
-CVE-2016-6409,0,0,005084e3390551ad33c231a6144f5e8d9bafe17ee156094b133ef485cc8f8d7b,2024-11-21T02:56:04.540000
-CVE-2016-6410,0,0,58792701b0d408adc68005bcff16eecd8d63bccefb1d7045d4b380a4897ace39,2024-11-21T02:56:04.643000
-CVE-2016-6411,0,0,678d73e5e30146e83090fc5ea2a0b83cda82bc1303d52310f32d8e19eafa4743,2024-11-21T02:56:04.757000
-CVE-2016-6412,0,0,94d6a84e996244e668d9885de48521550461644de073ddab0b550d6b6bf52df8,2024-11-21T02:56:04.863000
-CVE-2016-6413,0,0,81ad53df830946b115f79cfded917733e7c8bf16d746492628c56d8557a0248c,2024-11-21T02:56:04.973000
-CVE-2016-6414,0,0,272ab62386e9b16949434043d30046a778e298e177d7faaa992b227d71eb18ac,2024-11-21T02:56:05.077000
-CVE-2016-6415,0,0,6c9833cb2815560990e054095421e0f82279ef5a85eeb3215cf88561899cc4af,2024-11-21T02:56:05.187000
-CVE-2016-6416,0,0,2637e97e7cf6439cafea132214e7faac92866e77b8c675ddfdd001a5ed46afc8,2024-11-21T02:56:05.307000
-CVE-2016-6417,0,0,43ee75f6e1b5dd48dd03cfe1d989ead9f0df6ff693ee74f5e8448f431b4daa9b,2024-11-21T02:56:05.433000
-CVE-2016-6418,0,0,907589833ec7c018495139a7c8186e22de3f5cb887f3c27c4f4e9556aa246776,2024-11-21T02:56:05.557000
-CVE-2016-6419,0,0,9adc7ed9d44d35b1dc37e495c613cb8edfeb9e8938fb0ecf2221da6db5f125f4,2024-11-26T16:09:02.407000
-CVE-2016-6420,0,0,18370f7d43b58bcbe729da57462beb2e500a7130268e1fe0d26e32e2db00fda7,2024-11-21T02:56:05.770000
-CVE-2016-6421,0,0,9a1818ef3b40b3a9f60b664beb584a3d207d80480461e5a32079b77de1394484,2024-11-21T02:56:05.883000
-CVE-2016-6422,0,0,9c47eb9a28a3e2031359e5b2b43ed83b92edab73a2379f6e7c0331251981e423,2024-11-21T02:56:06.003000
-CVE-2016-6423,0,0,79a8da245568ad38dabed20772c2582b4f205cbdb48fa26346d5cacdb7fbdc4c,2024-11-21T02:56:06.120000
-CVE-2016-6424,0,0,d690fa06da3f35e2ab0835055b234e1d73eb24200f44ec816bce439c3577fef6,2024-11-21T02:56:06.230000
-CVE-2016-6425,0,0,0ee09fc23091c6c80858fdbc390ce9929d463ceae664dce41985c2495c4d12ef,2024-11-21T02:56:06.347000
-CVE-2016-6426,0,0,9de983b3de8cb0b6d4d2dba5a0e56f9b4bac86b3f83746e88eccd8f4f3b6e69f,2024-11-21T02:56:06.463000
-CVE-2016-6427,0,0,21deda0047df53f32506e7e4a2013105c35c0d28c057e92efec33b47b53bb29a,2024-11-21T02:56:06.580000
-CVE-2016-6428,0,0,7aedfcbf1ade124fd58fb10253a8a00133badfaac6a6c700bca8c0bf5026ccfe,2024-11-21T02:56:06.697000
-CVE-2016-6429,0,0,ab6ff1f6ac9943504302bbcc5f10dcf0fe98e3b7cefdc09993182f5a17851941,2024-11-21T02:56:06.803000
-CVE-2016-6430,0,0,908eebe596edc5659dcdf208cf1699184abdf04579476bd000f013fece05290e,2024-11-21T02:56:06.920000
-CVE-2016-6431,0,0,154ba7666e8ae82061288ae36e18f3e22316545ab50a827bda034d8355a80c66,2024-11-21T02:56:07.067000
-CVE-2016-6432,0,0,ce001a88f4e9902521a39a12f7c97412628648da009f8582ae076dd985475f86,2024-11-21T02:56:07.233000
-CVE-2016-6433,0,0,e9e533f77750d3fa7ebd64744f3f65d282b27557300a28f2ee4df5721c6956ee,2024-11-26T16:09:02.407000
-CVE-2016-6434,0,0,1939bc049baef6f1cd619fd5f46b4d694fda97a58b220ef5588094110167cc00,2024-11-26T16:09:02.407000
-CVE-2016-6435,0,0,4ab61ebf365d934e58a727ff085a7f67a336430eb7a83135cb34439355c3ff68,2024-11-26T16:09:02.407000
-CVE-2016-6436,0,0,c3851c09b26149129ee27821cae409680f5d797aa111194990af084a944b343a,2024-11-21T02:56:07.790000
-CVE-2016-6437,0,0,e0daa21e07bb1aa04710138f4931b15736e622936b2ed82e06877e4303e8873c,2024-11-21T02:56:07.920000
-CVE-2016-6438,0,0,533538743c7acbb76d7bf44042e3fa2fd4c7c01640ba4bb367d3198ba47346ad,2024-11-21T02:56:08.037000
-CVE-2016-6439,0,0,bbc71eebd098c6044cdf8f1956543deabb6d8b8bd1e4ef1703e7918f346f79fe,2024-11-26T16:09:02.407000
-CVE-2016-6440,0,0,d5789ad6f48712afadad8393bc7f56e31b7fd867c2c64186d468227c5f982a03,2024-11-21T02:56:08.277000
-CVE-2016-6441,0,0,1958f8f079e736533cde11d573c0ec0dccd690f60cbe64db7e877c12ec335a4c,2024-11-21T02:56:08.390000
-CVE-2016-6442,0,0,9e5d9c97b77131aa04467b2d7e572d59a2cb262373e8009f43ae71b1f353169f,2024-11-21T02:56:08.507000
-CVE-2016-6443,0,0,dc1d40b6308e64b5c27a32bf47e3a74fae3216be2b7ad190e43c991278f77f55,2024-11-21T02:56:08.640000
-CVE-2016-6444,0,0,b60a02019837bfffe8a67a16c8577c4ef6d3c99bb6555681268a0742046537d3,2024-11-21T02:56:08.763000
-CVE-2016-6445,0,0,9b3cf213db4f142156b28625f7b901b94969868cdd5fec7e93cc3cd7b42d8d4f,2024-11-21T02:56:08.870000
-CVE-2016-6446,0,0,78abdaec100a7dbdb4d59a9c07c67942c17690c9aeb95e83ae3037ff7b4c244c,2024-11-21T02:56:08.987000
-CVE-2016-6447,0,0,fed8e1fdf675e945c8415f0fcab127d855399803d54d4620a70399decb674aea,2024-11-21T02:56:09.110000
-CVE-2016-6448,0,0,043b7797a45f9bc169b524f643bed1d21dca35993d36b76e4c09e430406699cb,2024-11-21T02:56:09.227000
-CVE-2016-6449,0,0,9dbc57f77d842c03f5a2962cc3fe543f1816c548baa58a872a013846707d4084,2024-11-21T02:56:09.337000
-CVE-2016-6450,0,0,c3ba193c0f41c867d413d63c2a7633eb8527bd63485c0bd850417e774add0456,2024-11-21T02:56:09.453000
-CVE-2016-6451,0,0,ea3e7677b6b5fec2de885d9284a3b89f62a616ae32e8c2282fb317691cd5c2db,2024-11-21T02:56:09.580000
-CVE-2016-6452,0,0,c36c69221717e22f2ff2e073d4407d531286ef1534c008ce17e2e027fccda2cb,2024-11-21T02:56:09.700000
-CVE-2016-6453,0,0,8e0025e353d7cfa308878aeff75c4ef91f9c59615837ec693d0a40ebc728b41c,2024-11-21T02:56:09.813000
-CVE-2016-6454,0,0,63962fc3171c8f8346acb2ae50e7566ac858fe38ff2e16ccb51dd08b5862fd21,2024-11-21T02:56:09.923000
-CVE-2016-6455,0,0,c86a7232b35e020e4b59d26b41931f76b65905a7c541400f2eb9bca6611f7a9c,2024-11-21T02:56:10.037000
-CVE-2016-6457,0,0,e8cb8832582ed6c91b60c885ff6c5dfe835de833f8718cf40c40460f74714006,2024-11-21T02:56:10.163000
-CVE-2016-6458,0,0,b0e27a79dba42411921db814454c20af223cc5b78e34153b7542aa9bc98ae94a,2024-11-21T02:56:10.293000
-CVE-2016-6459,0,0,a00ef3e929c66e6a73adc2a0d9c09aac9c9f9d2d2d6f85c327c28fe4d3ba1a92,2024-11-21T02:56:10.413000
-CVE-2016-6460,0,0,7f8bf461f44dd8dc1a8b2652b488f5b9ba972b89512b10310221dd7f7ac89fbb,2024-11-21T02:56:10.513000
-CVE-2016-6461,0,0,7019f1045907ada324d491507e9f7a603fa82dced0d64daa64404c59200fa39d,2024-11-21T02:56:10.633000
-CVE-2016-6462,0,0,d0cfa5027b470416eefc171e542dc7e80554699b419c301f36708d9c84cf37e7,2024-11-21T02:56:10.787000
-CVE-2016-6463,0,0,f481a13123ce50013cc7f30a3a243fafa7d576cef7951a7954244e609d1f121e,2024-11-21T02:56:10.907000
-CVE-2016-6464,0,0,d2b431b7b37d1539bd8f2dd2a14df5fd267a83b35071f9237d573ec1b8737419,2024-11-21T02:56:11.030000
-CVE-2016-6465,0,0,259667e9c18e0cf6d05fea100906232854555b7e3610e9d0d834c9c2e38f3550,2024-11-21T02:56:11.147000
-CVE-2016-6466,0,0,d4f3e7e73839c67ed3a9e3e9bfa1ddf1c0e6c04947e494e322a932477da93373,2024-11-21T02:56:11.263000
-CVE-2016-6467,0,0,0862dcae9c81449426615ea6fc1e682106d932da43217480b462292f260923a3,2024-11-21T02:56:11.380000
-CVE-2016-6468,0,0,4bdff9c23d630c2da887cffeb986c80f1e5a289292cec2b6013cb0a188ce56d0,2024-11-21T02:56:11.507000
-CVE-2016-6469,0,0,bc5421ca5a2f25355c0f2bf7d5823d2160aa416653f6ec0afa1bfe6e874d11ee,2024-11-21T02:56:11.620000
-CVE-2016-6470,0,0,27cb4eb29020504cf2c43f67f87db009f0b929b75da625cab9bc71c7351acb2c,2024-11-21T02:56:11.737000
-CVE-2016-6471,0,0,515111fa10889939b6ca29b10ecb2058bcd4b5d206a1a7b96f5b9acd4e2bc2e9,2024-11-21T02:56:11.850000
-CVE-2016-6472,0,0,27000f4249070c1fd491df3ed37881e1ede273c8c054ffc3905f895fc5a4a3b1,2024-11-21T02:56:11.960000
-CVE-2016-6473,0,0,ab240b9e8f5db203dc107556c603e065599558df5785960b3c64118d3895a98e,2024-11-21T02:56:12.073000
-CVE-2016-6474,0,0,4e84b61b1106952980f3db3ddbcf1b19298af4ee59023dff669bb4e4aa37ae03,2024-11-21T02:56:12.197000
+CVE-2016-6355,0,1,d578803e861dd92ea898f9ca8b25715d56ed1f8eb67d98ccc7a890d583ecd3e4,2024-11-21T02:55:58.020000
+CVE-2016-6356,0,1,52449eab30abf503394bbf82d8ac9bea804549bd36008368775d950bfa28d2f1,2024-11-21T02:55:58.163000
+CVE-2016-6357,0,1,6c8b62fa6f4ead242373c99b2b34af5a44c064053098e1e7b510d19467cc9ec4,2024-11-21T02:55:58.290000
+CVE-2016-6358,0,1,dc39df572f924515d4dc299944d86093c178c6e41f04a9b2cf01ff276e235d70,2024-11-21T02:55:58.410000
+CVE-2016-6359,0,1,f4c1bbda25691c82ffda6fd8b390999b98858af4a5906ee9579330efe6bc330f,2024-11-21T02:55:58.527000
+CVE-2016-6360,0,1,8d41de07ef5780cd2a40d4938c1b6964e0b851bc966fae7b884e96c00f17c94e,2024-11-21T02:55:58.640000
+CVE-2016-6361,0,1,5d8ab3db43a5ee97c50b65ebb758e1db2b2ae45fe93114df63f7e3a8df4d1acc,2024-11-21T02:55:58.763000
+CVE-2016-6362,0,1,d0ee3ce446ba38d1edc19dd7b8d8c50d306e3b538a4d40557859b9da882e5c15,2024-11-21T02:55:58.890000
+CVE-2016-6363,0,1,9ddd391b335298911ccd769693d98909a06a1a437417509c4174ada8b48b0b34,2024-11-21T02:55:59
+CVE-2016-6364,0,1,263a30a9b4f5affd5d23d4ef38ab8ca1802e0da638e105353a061d5b9f3342d9,2024-11-21T02:55:59.110000
+CVE-2016-6365,0,1,8f0f78c6601509d49f542a9dbdeae42329a1fe84f4d85411997901b9866a2c6f,2024-11-26T16:09:02.407000
+CVE-2016-6366,0,1,20e8531bce2bf94f23544c0a5882789104d8d5c5a963e4eabc042ed2756dc270,2024-11-21T02:55:59.330000
+CVE-2016-6367,0,1,b290fe9c2bf3f234ff024149fcba338b5d1578141d38387ee1767474da7d9e2e,2024-11-21T02:55:59.507000
+CVE-2016-6368,0,1,9f50de71e54eaf6d10d2c5774f906471abc349f2a8085d145e2495ac2da355c1,2024-11-26T16:09:02.407000
+CVE-2016-6369,0,1,a127d0f68413d2ab2aaba95cfb6064ea34060e43cb3f8394e9b1fcd99da726a0,2024-11-21T02:55:59.783000
+CVE-2016-6370,0,1,7e3f65e82f6bec7f9441870438d74611df7014b8b97f91eaa2a511c40af8d225,2024-11-21T02:55:59.903000
+CVE-2016-6371,0,1,68f4e4ab12bff5fb88fa9b0484c4b3e4d80779ed76d419a52699796f7d961e1c,2024-11-21T02:56:00.017000
+CVE-2016-6372,0,1,1a4ed4e72f908ab4926e9baa87db4728969c670a318b9077bb616b6a36b15fb7,2024-11-21T02:56:00.140000
+CVE-2016-6373,0,1,83fac99965eec26eb6945ceebb4fe91d57431293d3343950ae59c442205b29f8,2024-11-21T02:56:00.263000
+CVE-2016-6374,0,1,199e27697ead1551c4a5c5554702a1ad6761f1448a20bb4c2e81729c1874cc58,2024-11-21T02:56:00.367000
+CVE-2016-6375,0,1,a7d852370ebe2a5e37f9feb0d5473c1c3cdb8a20a6385a1349a1a8df12942897,2024-11-21T02:56:00.477000
+CVE-2016-6376,0,1,56991e4306bd89ded1f251cfbb7326d43c76f8c7975092f7ac1bdb4884956801,2024-11-21T02:56:00.600000
+CVE-2016-6377,0,1,0ca82f621dcb1df31c593d349b6a4ce878c02e3f550d318cfc0aa927e340e077,2024-11-21T02:56:00.723000
+CVE-2016-6378,0,1,41e2280c9950a603e6bac1101d50dd28760db3d81efa4d2ea1adedb17c712cd3,2024-11-21T02:56:00.840000
+CVE-2016-6379,0,1,ef8cf783accb18281d82630b4e6f63e94dde0fc5b0e9283804d4021dcda9b520,2024-11-21T02:56:00.997000
+CVE-2016-6380,0,1,da5737dd75a3c5e81fa236db87b47490026995a4a9d5d0658825ed0d20fa7f4f,2024-11-21T02:56:01.110000
+CVE-2016-6381,0,1,716995c3c2bc98ecbdbb43a1680d1a3cd9e82b02741bfac37b8bac6f011acd7b,2024-11-21T02:56:01.510000
+CVE-2016-6382,0,1,f83e350899803ecf17fa39ceed9f6f17f6a2e384f561a427f94c89a7b6a28eae,2024-11-21T02:56:01.703000
+CVE-2016-6383,0,1,e5716e683181d74c223d915ed3089f03a5fada1b97d259c76beff9a274e6ebd3,2023-11-07T02:33:59.783000
+CVE-2016-6384,0,1,85677852722e71eab0542543fdd295f079d131eac79a79145753dda96991eeab,2024-11-21T02:56:01.860000
+CVE-2016-6385,0,1,416713bcecf3b493f9c44a7407c02f8a60ab66760186d1addf8f00995a75a3a7,2024-11-21T02:56:01.980000
+CVE-2016-6386,0,1,7f6c3603e0101acc65600946bff7cab6b0970bbcbffc039a3ba9ce4c57504f9c,2024-11-21T02:56:02.117000
+CVE-2016-6387,0,1,12cf31ec3559a7ee6f331fdf329e122d38e7203cd1599384bb45b61d045ac04e,2023-11-07T02:34:00.037000
+CVE-2016-6388,0,1,65fdbba1fe65d345c4d90aab8044ddcea579c0a1c36e9483afa6393d7d67c9c3,2023-11-07T02:34:00.253000
+CVE-2016-6389,0,1,d4de3ffaf4205f90eed2263446025cd39cec7869ef718a31f806513492b382d6,2023-11-07T02:34:00.510000
+CVE-2016-6390,0,1,8bdbc22db4bbf69c2fb95bf2d9caabee29bda255d214e945edb0069cc5b38704,2023-11-07T02:34:00.760000
+CVE-2016-6391,0,1,1e19aa45017ea263897da8eecc40448fb499c0f77e3ae2cbbeb3af2783499346,2024-11-21T02:56:02.303000
+CVE-2016-6392,0,1,97d13aaa1336c2c007c909c11fd675761f75a7153318da65e27d31cf27462c67,2024-11-21T02:56:02.447000
+CVE-2016-6393,0,1,c392eb6e1ef448f776d9e4a5854fbd7fec2e16de9c3a2360c8dec7ae29d8b64c,2024-11-21T02:56:02.633000
+CVE-2016-6394,0,1,cb0f84386a282d765c19f4024ba97175ce8d836edb9499f0f85741b486cf1184,2024-11-21T02:56:02.767000
+CVE-2016-6395,0,1,82be9559472ed3b89332bdf06b422e1ac81f241363a21b754dcd37dac978f1a7,2024-11-21T02:56:02.890000
+CVE-2016-6396,0,1,59834972b632e879d0af76c07ca4d2d626b29b2f43a3565d7236189a945ba444,2024-11-21T02:56:03.020000
+CVE-2016-6397,0,1,a190e6be3a4d9657375979840b1cff9fa35fd9d7fd5ae1a2c0c9d6f98d483bf5,2024-11-21T02:56:03.160000
+CVE-2016-6398,0,1,ad4c06e76d0ac32e3adf9d1359a0063671249301f9144c12c1cf152ffaf67fb9,2024-11-21T02:56:03.313000
+CVE-2016-6399,0,1,d830ad0a74318056a6ba6c3f83caf629ca6069a83ecdb89f739dc2b7d0d9d4b1,2024-11-21T02:56:03.463000
+CVE-2016-6401,0,1,d7fc3e885ec9075f6b9127fab5732f497eee386149c2cd6e9b5ba99f5a9828b5,2024-11-21T02:56:03.607000
+CVE-2016-6402,0,1,f5fba8304c4e994b311215d00b57430649e8ef1af61928224a1116368dfe887b,2024-11-21T02:56:03.720000
+CVE-2016-6403,0,1,5c0ab87c872717a76f96be087a884ae007e31c21600a55524197c919a2f28f25,2024-11-21T02:56:03.833000
+CVE-2016-6404,0,1,eefa46214182df1efde609a8e4194afd14787cc0347dcf5d7a2ee54463404d4d,2024-11-21T02:56:03.947000
+CVE-2016-6405,0,1,84efba7a2a66a8465245ad79183094ee93ebcc7c4563efc6712f54b28ffa063b,2024-11-21T02:56:04.060000
+CVE-2016-6406,0,1,942c09f917301c2c537403fd3b18df23d2915b9671c0c4a3feb1e01ffc190a7c,2024-11-21T02:56:04.173000
+CVE-2016-6407,0,1,4e5529d11f306fb277a6d8a013e4c95fe370f0b56fe8ed28af0c23e64528e19d,2024-11-21T02:56:04.300000
+CVE-2016-6408,0,1,99dbb8d8596f9c442ce651fa0c373a03702106be3502c85f2eac3cdc62437b1b,2024-11-21T02:56:04.427000
+CVE-2016-6409,0,1,206f14ddff4a956dc8632a02dc8d7dce6006854f2075c60dda69864257aa30ba,2024-11-21T02:56:04.540000
+CVE-2016-6410,0,1,306929c778de706cbaeee92d32d98b39d39c23b3a0ae0c74ee4277ecdfb258aa,2024-11-21T02:56:04.643000
+CVE-2016-6411,0,1,316263276d49700e1b65b8f27126da3d896cd6a55a59dcc5958ff7223c9512a7,2024-11-21T02:56:04.757000
+CVE-2016-6412,0,1,d942fcaede0cf2b21fe31c6b8ac961c3cb3b2fdac0b27be6ff923679d3bc4d58,2024-11-21T02:56:04.863000
+CVE-2016-6413,0,1,2edb310bca6e2b39d511dc599de6f2bd68e817d9a3c788744fab98b0889405aa,2024-11-21T02:56:04.973000
+CVE-2016-6414,0,1,a4b7e9dde14aaea9b52e5481dae2714b266a49359dc2c476a89a756430b3f088,2024-11-21T02:56:05.077000
+CVE-2016-6415,0,1,af56663f882853f568155b946e13baa5b7a55165014c4f09a5ce15873bd14f18,2024-11-21T02:56:05.187000
+CVE-2016-6416,0,1,a98ff4dc8c09eb62120f834465da56e974015a7c30c46d39cb1d9a368f01b573,2024-11-21T02:56:05.307000
+CVE-2016-6417,0,1,b78845f7d587d6722000276f1709d9d9109628487f02502480e59925e944f5d9,2024-11-21T02:56:05.433000
+CVE-2016-6418,0,1,03b697dd7e01e77f756507ba9a235e1c627086a960717d44e208772cdcdf98aa,2024-11-21T02:56:05.557000
+CVE-2016-6419,0,1,5d8549f5c7e47c67996ff1021c5f173248ba74c11426e24f3cd3a84bd4984f49,2024-11-26T16:09:02.407000
+CVE-2016-6420,0,1,249bffb55d65e06da20694b5585740378ce1b7b0f602e6c84204f450bf9346f4,2024-11-21T02:56:05.770000
+CVE-2016-6421,0,1,f166aac24246882ea52642b90698a839f089d3c092a33dcbb1b39550ad3a38a3,2024-11-21T02:56:05.883000
+CVE-2016-6422,0,1,7a1b980983f7a1c62342e32c49a4603ed73eb7792c476598a4df82860c456c75,2024-11-21T02:56:06.003000
+CVE-2016-6423,0,1,1f5271ba474c7c1b4aebfc83642e85e7dce85863bf4dc26b105a132a76291071,2024-11-21T02:56:06.120000
+CVE-2016-6424,0,1,4205243ab4fe78245b5a1e6b1d75b598ab7bb518b81345c63b279c95a1887d3d,2024-11-21T02:56:06.230000
+CVE-2016-6425,0,1,81267d5a8808fe96773dbee196ab076b411382e76be5379ca56f044bc0918a79,2024-11-21T02:56:06.347000
+CVE-2016-6426,0,1,7bec6ee3f3cf702a2b893dbfe92293be08768399f68304b8f0aa53dba63b45a1,2024-11-21T02:56:06.463000
+CVE-2016-6427,0,1,9f182830f6bf71020fd06fda7e76233baf57a36e2a243d620f62e66a4b29a5a6,2024-11-21T02:56:06.580000
+CVE-2016-6428,0,1,d910f3c20d18324dd8ca47613a2cfc1931edbd9bcd5b359fedb64ab01319581c,2024-11-21T02:56:06.697000
+CVE-2016-6429,0,1,d7f2d56a5a800400a772f97ea5bddaec0f544835e0acb8bcddccfdb013a19806,2024-11-21T02:56:06.803000
+CVE-2016-6430,0,1,fceff4528ba2e4f2269635917266de90f320583e744f9108428c5f1fd4fc532e,2024-11-21T02:56:06.920000
+CVE-2016-6431,0,1,303573eb213667ff454997b82934a54a790ee3b1efae5dac6d3ab973dd73a831,2024-11-21T02:56:07.067000
+CVE-2016-6432,0,1,ac77938c513f9a0a28c985f7dfbbe8df4f66118eba5fe50366519729f45e0a8f,2024-11-21T02:56:07.233000
+CVE-2016-6433,0,1,47243539bfa99435ccfc897f21841dd7aa41398a96af621bfc267af5c2e49bdf,2024-11-26T16:09:02.407000
+CVE-2016-6434,0,1,cfc290a35549ebdb481887bdf7afa5d023060e07efab123b016f6fe2114cb5ad,2024-11-26T16:09:02.407000
+CVE-2016-6435,0,1,0008a8ecc1c7cc0f219c8daa8f3072c8be5731c08e34ce22b8ba8f904db93b22,2024-11-26T16:09:02.407000
+CVE-2016-6436,0,1,265e835fdd4d0622d3100678e6356256ae41c0a2386be8c8970eb6d53cdba300,2024-11-21T02:56:07.790000
+CVE-2016-6437,0,1,17abbb3580d67852ca28a7d21072ce75db73738b090ac9874ec75a8945ecfe00,2024-11-21T02:56:07.920000
+CVE-2016-6438,0,1,6924b9974ad75804ce1e5827c9d32853e845d0ee8cd24c5b61576d030236e29c,2024-11-21T02:56:08.037000
+CVE-2016-6439,0,1,f7e94c540752343d44db61183e4cfc4a309524feb8aca62609d4d348d1bb1eb0,2024-11-26T16:09:02.407000
+CVE-2016-6440,0,1,40e16141ccf3362a301bf61d99e9570824227103d7595b6e02b67b3271cef86b,2024-11-21T02:56:08.277000
+CVE-2016-6441,0,1,ea9afe01d4b1d9348defcf169bc3946e6e2da75cac01f21dd5f9985dba2a0eaa,2024-11-21T02:56:08.390000
+CVE-2016-6442,0,1,e8e58b084cbc01a6343ff3979ace44094617ce85bfbd55bf9425627276f65c9d,2024-11-21T02:56:08.507000
+CVE-2016-6443,0,1,f812af2962f8bec71aa92def10a61b5ecea4e7967027c3b9592399e70c7f8922,2024-11-21T02:56:08.640000
+CVE-2016-6444,0,1,bc35102d1670c26362a1461314a353ee594b4c98238cf27c92b45e3b9e7e581b,2024-11-21T02:56:08.763000
+CVE-2016-6445,0,1,972e48d410ae0d10ce757393c7532cf7b08996964071edd31d8897f469615e61,2024-11-21T02:56:08.870000
+CVE-2016-6446,0,1,cf8cc6b962cde77f17b4e110d4122be8f10b43abc2e30478f8041fbe8fb7544e,2024-11-21T02:56:08.987000
+CVE-2016-6447,0,1,8c6e925f8fe22c49587371d7a8fb98b3cf763bc1c4aed95a55d869e77c262924,2024-11-21T02:56:09.110000
+CVE-2016-6448,0,1,02efb928b93e78cd5837f9a1da55b8ba3652acb507d3f527173cf3f4f4612bab,2024-11-21T02:56:09.227000
+CVE-2016-6449,0,1,d28fa4d20e6882cd161ea5675c365921dcb3c4c6b22d70ac0592c5fd99288287,2024-11-21T02:56:09.337000
+CVE-2016-6450,0,1,2be6e57907f8dc22f6c9017b783988e7590502f88c8b13abf972918ca5ac7c09,2024-11-21T02:56:09.453000
+CVE-2016-6451,0,1,f90b663d65ff360c5c03e2fa12fd19c6e63cdbda2fed7383c740b20688725005,2024-11-21T02:56:09.580000
+CVE-2016-6452,0,1,777c2b5bd0e8c6328744a3ed3549c6efd14d0e35bf49c724e0ae674e4a9f21d0,2024-11-21T02:56:09.700000
+CVE-2016-6453,0,1,54f81fb12bceb2217799b1b6f4de0c4f52dbc3319d1d59410b72f00478209aec,2024-11-21T02:56:09.813000
+CVE-2016-6454,0,1,0b7ca7616afb7d7b3e183a1d3b8bdab60314eaa6c2b2f17ccfd2bd1f5708b1a3,2024-11-21T02:56:09.923000
+CVE-2016-6455,0,1,3d951cae495521d07f508d646927f0d49dd13467d093962dabb97d1a66112d44,2024-11-21T02:56:10.037000
+CVE-2016-6457,0,1,fd7ff8805b6312d4919e4aa1671f0e61a9c1ac04383da19caa64ac59f17344a9,2024-11-21T02:56:10.163000
+CVE-2016-6458,0,1,c2fa3d7c5217ac7c9fa91b63775d16294e0c0894daf6942899565f0a642a179a,2024-11-21T02:56:10.293000
+CVE-2016-6459,0,1,3eeb35380d0148a7730fc1b6bf40a50ac4cc42fb89d1b9cc2659e688fec814e7,2024-11-21T02:56:10.413000
+CVE-2016-6460,0,1,f20bb9f716a304d7cdc3ecf2240b6e26f8aee24bc12986089234360b6c2e8229,2024-11-21T02:56:10.513000
+CVE-2016-6461,0,1,6710f7d4da31322bf80c40a94c8b9972179e9f29c88d65bd5f68dee1cbdbf98a,2024-11-21T02:56:10.633000
+CVE-2016-6462,0,1,8e8a620bcdb9859711d3bb3aaa5ef3dae2bab1380aaed8248726034c2d5c7b7f,2024-11-21T02:56:10.787000
+CVE-2016-6463,0,1,e2fb5dd32661ad7544b74373b982d1149f5234b7ca47a9e1926e8ce14d5bdb94,2024-11-21T02:56:10.907000
+CVE-2016-6464,0,1,4507f437168dfbe116c0017f21725ae9f1f90aec9718204ca5e57e302ce45fe7,2024-11-21T02:56:11.030000
+CVE-2016-6465,0,1,6fb2be81c8b30ba5e6390638ac9576558d4285dee61c539cc3b7369bf64b15a3,2024-11-21T02:56:11.147000
+CVE-2016-6466,0,1,0c86fe3d117dfd8e31563e58cf9e7f261b47a40fd5beaef2afb82f4b7d168224,2024-11-21T02:56:11.263000
+CVE-2016-6467,0,1,63c8e94c01b682cf849d00639dc94e0f2285dc0de46d8b6532df46857b8700b7,2024-11-21T02:56:11.380000
+CVE-2016-6468,0,1,d2acf57b8517ac50a266c2cd3c68df4dc1e1ab9f0d8daf12d20ef6124c8d3f97,2024-11-21T02:56:11.507000
+CVE-2016-6469,0,1,8e020f423003001d6e11e488a7c46e3703a1ecf071fce3fc185ec3d688a6405e,2024-11-21T02:56:11.620000
+CVE-2016-6470,0,1,eec2079c23536a3fb566e1472682108b9ac21ea3701347612f039790777c236b,2024-11-21T02:56:11.737000
+CVE-2016-6471,0,1,b39a7b2bdfea1856ffd7af27827b2a01eaa72792b31be06e5747b88165564eff,2024-11-21T02:56:11.850000
+CVE-2016-6472,0,1,a2c6a1b42f4cb1168c0ff0d51046aef2309cf4b7e3b081c02c93e59cf21855dd,2024-11-21T02:56:11.960000
+CVE-2016-6473,0,1,00c38505d8c2b30cb9b16616b6f68737d53b3c0a2f3ef6df77d7db974740c402,2024-11-21T02:56:12.073000
+CVE-2016-6474,0,1,792eaf70d9093473ab22b217b757310130592e6caace65efa28d839b7e011a79,2024-11-21T02:56:12.197000
CVE-2016-6479,0,0,4bc15c4918f37140746accc82614c84a08be9042719394af8cc94078feeeb186,2023-11-07T02:34:01.607000
CVE-2016-6480,0,0,8089db1c5c9aaac8134db127ec0178cef367ab434dd860549812e3a3dc65d5ce,2024-11-21T02:56:12.337000
CVE-2016-6483,0,0,e07d43f4dac7e934c3eb29010ef667c4090a91333fd3eccda1fe64bee89615ad,2024-11-21T02:56:12.490000
@@ -92028,56 +92028,56 @@ CVE-2016-9188,0,0,55370f462488361e0c88bfc30b7846297593403633be347e06b832400bd744
CVE-2016-9189,0,0,d3339f5b0dfb66f05522034c01900481c414239ddc5090c947a46bf0a0f5bfc9,2024-11-21T03:00:46.030000
CVE-2016-9190,0,0,1c26953bcc49f5dcdc6aa9e6708431061f336810b6083c195c26f3befae5ac5e,2024-11-21T03:00:46.170000
CVE-2016-9191,0,0,d4894088bae5d03b9a1f0e88ca528f5d5ecf0ee43467cd06b27f578671a17b2d,2024-11-21T03:00:46.310000
-CVE-2016-9192,0,0,fcf94c88261ed72a98287f8e50e409dae230f294cfe6673a2b03ce8331055943,2024-11-21T03:00:46.443000
-CVE-2016-9193,0,0,7eae82f713401a7ea07c7aa592813a7c84d2a291d6b3f2f5eaa51102d4e4caf4,2024-11-26T16:09:02.407000
-CVE-2016-9194,0,0,71b33cf8f8afcc02053d33590ab3377a8b369c5b278ccf36eed398a668431f4c,2024-11-21T03:00:46.667000
-CVE-2016-9195,0,0,c2e0193403a4bebb6965e948a0b99aec07d412efef20a41fc84d11a6dae86192,2024-11-21T03:00:46.787000
-CVE-2016-9196,0,0,f990abb624c6912f3a366091444ddd7cb16f3b2d129e23c6723900387afc4324,2024-11-21T03:00:46.893000
-CVE-2016-9197,0,0,550df3771c3d08b978fe16f5d49f83ada43d13c4a3cf1b04159d6b386b8e2a96,2024-11-21T03:00:47.003000
-CVE-2016-9198,0,0,9d7fa244a76c888628e172713273908f7ef8ccc29e3748e4e455bbe791be308f,2024-11-21T03:00:47.110000
-CVE-2016-9199,0,0,7ad0996163d11cd08e7e36fa8099b0253c3e25b3ce52404ee8fa65a0d41e523e,2024-11-21T03:00:47.217000
-CVE-2016-9200,0,0,640e11f1735a7cc58edc8862963d9642c5cfac73683890778c1518a92a2d9984,2024-11-21T03:00:47.337000
-CVE-2016-9201,0,0,cd2d7dc1163806b44bc548bb357863c00d4888dd54e4d0cb7532d718440be23d,2024-11-21T03:00:47.440000
-CVE-2016-9202,0,0,8acd2f1b3fd1157f2699df06c599c42cd5d0c6998bd70a26a7132b402a4901fc,2024-11-21T03:00:47.540000
-CVE-2016-9203,0,0,cdafaaf968a8b86c8b0ee58f66c69ae0d6b23f513057270658e72f4d7860da37,2024-11-21T03:00:47.647000
-CVE-2016-9204,0,0,81e2f18596ad2d46c625d0b191d4c64f07000733ec8c98cc1f009cf8b6a5a865,2024-11-21T03:00:47.747000
-CVE-2016-9205,0,0,032561be4d7c230b6bd248f18c048e9ef89af1685157a45f48fed4ecd013aea7,2024-11-21T03:00:47.853000
-CVE-2016-9206,0,0,617de1022c30b15a4a440bc5fb90d3e3eaa1265ad5076ceb1cc2adf34654bcbd,2024-11-21T03:00:47.953000
-CVE-2016-9207,0,0,ef25091d11ca0cc6ce0aa8909701d7551755991242ff3b903c7e532c97cb6cbe,2024-11-21T03:00:48.060000
-CVE-2016-9208,0,0,7fbd52c4519f4ed094eaa1ff3c008a2d5a2eb69362c5b5889026cf4e56b2fd7d,2024-11-21T03:00:48.167000
-CVE-2016-9209,0,0,7e24237975eb8dbc87eb1c9c07213076653e3ec93dd2e7bcc65f05d7890a1883,2024-11-21T03:00:48.270000
-CVE-2016-9210,0,0,34f7b3339c95b4baf141935c9a230a0c3b6e60261f0d2fa1b2be441a71140734,2024-11-21T03:00:48.377000
-CVE-2016-9211,0,0,ef27bdba146f49ee298fdd240f9fb01927a04504ff727529a8e551620e25059d,2024-11-21T03:00:48.477000
-CVE-2016-9212,0,0,80fb9ab6f3383a32ce8c19461e06b3ca5c5b02a60a4933c3261876be9d3ba721,2024-11-21T03:00:48.577000
-CVE-2016-9213,0,0,b03a1412cd64aaa21f809c1debe9b73e3dd723fd2e9e0022eebbfbeb2eac1823,2023-11-07T02:36:51.007000
-CVE-2016-9214,0,0,9dffc704dc5c971aa1040a1a4668e783780e51cdca4bf6816ade7a8220900646,2024-11-21T03:00:48.700000
-CVE-2016-9215,0,0,51da99cff9df4c2afa337cec7fec847628718598f577f5e2387246df76c4d35b,2024-11-21T03:00:48.800000
-CVE-2016-9216,0,0,7784fd5fafa7f8d8ba05a2d10e1ad916b4315042b3cbd65257d28802925968a9,2024-11-21T03:00:48.900000
-CVE-2016-9217,0,0,489fc7184fcb71eab71e4b0ae401fed12f3968be8959b8cdaf7fdb0d1f9b350c,2024-11-21T03:00:49
-CVE-2016-9218,0,0,c5917b0d802588169deb691a100f62245ff16e4f97098d342af2b6ddb22f9819,2024-11-21T03:00:49.103000
-CVE-2016-9219,0,0,01721d0c6640225f6b705577f7af45120188ce04109483eee3af27a35100b77f,2024-11-21T03:00:49.207000
-CVE-2016-9220,0,0,701091a57928a956340080c93ffed93abf89313cbf0332d45e3e16f9f8225bb8,2024-11-21T03:00:49.343000
-CVE-2016-9221,0,0,8f4c0779a730f4745c45547e4df5d42904f9c9765d117672e2dd1b75e71f7dac,2024-11-21T03:00:49.450000
-CVE-2016-9222,0,0,86c0a0bb148ff4fc19ec7945345851131d2f6bf223070a5082d67e6860e15aec,2024-11-21T03:00:49.560000
-CVE-2016-9223,0,0,75449725a795d948bbbde29c94579d86efc1c205a09313c105a679dca6cfcbec,2024-11-21T03:00:49.670000
-CVE-2016-9224,0,0,cb3185954b7afa2ddf327c67f2adac0076b76aa38c3ff1707a950b5195583ebe,2024-11-21T03:00:49.777000
-CVE-2016-9225,0,0,614ad052a9df471514bee6cf1729226873b7b2feafea3d140e2f8db5daf37009,2024-11-21T03:00:49.890000
-CVE-2016-9226,0,0,9a101d91cdb7e556d2296863a54de4a3f415cfd61c48aa866f83eb07776ddaad,2023-11-07T02:36:51.323000
-CVE-2016-9227,0,0,48859bacd6f76518b0b553a59b79f1386186af21487b699cf7f8277848bced32,2023-11-07T02:36:51.540000
-CVE-2016-9228,0,0,8834def1ac716b788098be2bb2be8253607f1a4aa6fd896d4e1983bb27284f1f,2023-11-07T02:36:51.763000
-CVE-2016-9229,0,0,0b9705b5e163f79e41ab791a623c6b6eca86b2caa0da8331801d454e55de8173,2023-11-07T02:36:51.993000
-CVE-2016-9230,0,0,eaebbc0efdb0ccb7fe3fa431c6b8b859a751a1461128f1d0ca2e8d18f133f37e,2023-11-07T02:36:52.240000
-CVE-2016-9231,0,0,5469d638f0330b5e740320b96c8125e41769c7a79bfefe24a711081315637fdd,2023-11-07T02:36:52.473000
-CVE-2016-9232,0,0,c72415efe49e1717333e0439f4e7a28a9da95a4bcd4666118efef21c54c1fdb6,2023-11-07T02:36:52.707000
-CVE-2016-9233,0,0,0192e94f755b37f22499f9f6631adf5d55d4a73a9076315109d300db828c964c,2023-11-07T02:36:52.940000
-CVE-2016-9234,0,0,89183acb6687823d95293449180fbbf89dc41c1708c04545f825633d16d89429,2023-11-07T02:36:53.177000
-CVE-2016-9235,0,0,8dfef899552a9650e78188a26d465e4382ec5f8dfa22053e840e61f567bf731b,2023-11-07T02:36:53.473000
-CVE-2016-9236,0,0,c1a06aca498b49449e80eb40e1c6b610a59c37358ce045736083b3e383586bb7,2023-11-07T02:36:53.710000
-CVE-2016-9237,0,0,9faa286e663b88cfc670499d9aea112b33251aa71dfb5ea585e519f0451c77a2,2023-11-07T02:36:53.943000
-CVE-2016-9238,0,0,547a9d1a423034d5de0a1d8453bd5e9683c760eb4e67578a450712937228cf5b,2023-11-07T02:36:54.177000
-CVE-2016-9239,0,0,d3be115919b0e67169402883571f45abf651ba3808c2f8db820d836a43fdec51,2023-11-07T02:36:54.447000
-CVE-2016-9240,0,0,f7e5b1e35a1f3dfb5cbef52644a80efa4d8a0c9a31589a2e4a9099e87c927821,2023-11-07T02:36:54.677000
-CVE-2016-9241,0,0,c4001c089fa522fc64611e88ff333536c8f150482bc5eda14d1b6f35128ad27e,2023-11-07T02:36:54.910000
+CVE-2016-9192,0,1,a38899792639c835f43c1f9deb8d81ea55971c326308f2a7444862157fb92020,2024-11-21T03:00:46.443000
+CVE-2016-9193,0,1,e1163324fe08c580be86b990f9c321de92719d02cecb293cd47dd4296d85c43a,2024-11-26T16:09:02.407000
+CVE-2016-9194,0,1,c93c42bdd438a78cb751bccaa2eb74f8903815dbd4434fff819fcbbecb2073b1,2024-11-21T03:00:46.667000
+CVE-2016-9195,0,1,87ef7d6605d0717a94c64cb1341aed81f5de225fabf1e8863bc15bb1e5c71e61,2024-11-21T03:00:46.787000
+CVE-2016-9196,0,1,bb389cb224c34df778ae2c031105f453368a5084a529529086ce3d7fd1469356,2024-11-21T03:00:46.893000
+CVE-2016-9197,0,1,b358e07e8420dd5c195b0966e5d8b78842431ac6b2486729f7b418b95aae2922,2024-11-21T03:00:47.003000
+CVE-2016-9198,0,1,edf07096e951094d7f7d07877a7705f1cefc778a4458cd66b6795c0b957a9745,2024-11-21T03:00:47.110000
+CVE-2016-9199,0,1,4762615eff9a0bad04f6068b991072336830bbeca1e2d482440113ed45db3c9c,2024-11-21T03:00:47.217000
+CVE-2016-9200,0,1,836620e52fad4a86264f7db95967e09ccd1ccee35d3d5e8b39fe97d31038e4d3,2024-11-21T03:00:47.337000
+CVE-2016-9201,0,1,6b1485187e1f79211f24da4a48721b66e92437fcfa394fc8e1f73aa3e985e729,2024-11-21T03:00:47.440000
+CVE-2016-9202,0,1,77b29951b7bb4297ed4cf914aa0d6826a9014b3177d6f6bac437f14cb2fdd503,2024-11-21T03:00:47.540000
+CVE-2016-9203,0,1,dda0ec3f5b16021c9d6ac7b01583fbfab4f2958177f9fa3ed2cbbd01130abea5,2024-11-21T03:00:47.647000
+CVE-2016-9204,0,1,2eb9cbe5c92cdb3214da542df30fa8faf5cb5c7b12e30178d3b94f7545da71ba,2024-11-21T03:00:47.747000
+CVE-2016-9205,0,1,65b26e1ce93d20c7664a06c6cb713c5670f14b400867a36d4429d16ee1b86c6b,2024-11-21T03:00:47.853000
+CVE-2016-9206,0,1,d391429a15308d52cf52b6416d3ccd95c4da73698d6dc7d78808ae4c0e430fb2,2024-11-21T03:00:47.953000
+CVE-2016-9207,0,1,f66e27ebe5e3b10e622ff7c13c142e99aa904781f5c858b2b2b6b911e239c4a6,2024-11-21T03:00:48.060000
+CVE-2016-9208,0,1,6609b9f5a699957a381bc9156e4870ee09167fd0d7e836f3c78b0e62d39e4eb6,2024-11-21T03:00:48.167000
+CVE-2016-9209,0,1,77be1f47e144a6ce375380be1d49513b802d3456d923033ab07930de7c1f4691,2024-11-21T03:00:48.270000
+CVE-2016-9210,0,1,630c6e040532d4069b8c95a1ddd23959496649a9c0203a38becd7f67fb1263fc,2024-11-21T03:00:48.377000
+CVE-2016-9211,0,1,979e0c579608818db55929dd416d6e16b720e61c70d03f9a53689a5c41fb3cd3,2024-11-21T03:00:48.477000
+CVE-2016-9212,0,1,6aeec103c4a33a795904331593af0d482d3ea152832ba7e58dd1ab2f2b1e2dea,2024-11-21T03:00:48.577000
+CVE-2016-9213,0,1,d616f6d2f70d5be9b66323768e4f83bb889ec0441a8260cf703005755d0a8e20,2023-11-07T02:36:51.007000
+CVE-2016-9214,0,1,b48ed1fc1cf73c8c576a9d39d90032a4cf0aa72d1bd898e68009144b573963b4,2024-11-21T03:00:48.700000
+CVE-2016-9215,0,1,38f04017f3aec0a9ca548ed4421d34e87f6ea977a40165cdddd2b6fcaf616e1c,2024-11-21T03:00:48.800000
+CVE-2016-9216,0,1,87744272c1ac329505cc01eea5ec48801b23bf6d1cdacd57dd1b316e63504c28,2024-11-21T03:00:48.900000
+CVE-2016-9217,0,1,fb99dda2c71854525d18bd49dc27e33cc81cc95f8065807d1b357c3dc7f5a000,2024-11-21T03:00:49
+CVE-2016-9218,0,1,f04c0b14577eed1ee39266fea0ae4dc6865948aace06d7c56dcb97cb5d333f44,2024-11-21T03:00:49.103000
+CVE-2016-9219,0,1,b50379268d5afd91c1028d863b3798e6963c6d38ca905d3bfc56dbc3c9f99eb1,2024-11-21T03:00:49.207000
+CVE-2016-9220,0,1,5e289ca755fb7f19a00235e77f20001956429a29d08178e535b7c9237173aa0c,2024-11-21T03:00:49.343000
+CVE-2016-9221,0,1,d212c12522becd877821b3fdc7a27fd019e293f481d0a02aaf702480ddf309ab,2024-11-21T03:00:49.450000
+CVE-2016-9222,0,1,a2bae5e62e88eb887762cdbdcb59940f26df0f58dfa100358bf5968ecc2afccd,2024-11-21T03:00:49.560000
+CVE-2016-9223,0,1,61f878046d393ad6c50d5ba558c35519945644cd16215cf37d341ef88e27710f,2024-11-21T03:00:49.670000
+CVE-2016-9224,0,1,04e327c2cc0443227fe946b1d41a4af80859c9a9e9e573c39e43cad7f23281d1,2024-11-21T03:00:49.777000
+CVE-2016-9225,0,1,c99771bdcf5d5d5dad66f51194d5432648c5c3d957d2734098f01380996a816c,2024-11-21T03:00:49.890000
+CVE-2016-9226,0,1,14fdca720c8c4e521a88a9ae69605674a59ad88b73e2ad6a5263c00fda983851,2023-11-07T02:36:51.323000
+CVE-2016-9227,0,1,c8dde393c72bd6198d5addeac705d0fd06e7fc97aec77f881c0c19d61ba77fba,2023-11-07T02:36:51.540000
+CVE-2016-9228,0,1,0387d98a9fba0d35f2cf34a1ca365cbfa558a5d2019e1447a75d0e87c1b7ec11,2023-11-07T02:36:51.763000
+CVE-2016-9229,0,1,210501634f95d3f9cf0cb408c88d349a030742844705ebbb6ae81361108b2b31,2023-11-07T02:36:51.993000
+CVE-2016-9230,0,1,2cd5905bc78f553ff338bdeb260d6b665bb277e203224b683d41b1a374562614,2023-11-07T02:36:52.240000
+CVE-2016-9231,0,1,41472345d64441d1bcf08763ec13d3d5af2b3f520414dd38e5f55d1d9dd54de1,2023-11-07T02:36:52.473000
+CVE-2016-9232,0,1,8c278406e490a73ad52947d046f3de72f9071baf367aecd5a8d3d5642883aa0d,2023-11-07T02:36:52.707000
+CVE-2016-9233,0,1,dd66604dc592679b811a10050d4f06664c6f441c71949023e09750d6e278a613,2023-11-07T02:36:52.940000
+CVE-2016-9234,0,1,0f4459c41a75a17d150d931812aef0065394ec7d4eed84c4edd42a4da46562f9,2023-11-07T02:36:53.177000
+CVE-2016-9235,0,1,cf82bb7144e30e4d81d0dab4c82397742c5a6757826aa5191c0c099554f0d6f7,2023-11-07T02:36:53.473000
+CVE-2016-9236,0,1,2cd6fb63a6fc266f2b91091edefc6ce818a89de34f5a9733adcbd7a71e268806,2023-11-07T02:36:53.710000
+CVE-2016-9237,0,1,0263e8a0ac4f82b48d05b6ee42bcdbc78d756960b8461b76b3cca3b26719ea7b,2023-11-07T02:36:53.943000
+CVE-2016-9238,0,1,582c3134138646d864a6b129bb8e2c674809cc1972e3257f857ed1d74106b860,2023-11-07T02:36:54.177000
+CVE-2016-9239,0,1,958a69144ffef82411931c47c2db93ac27231f1cfdae9e8e66ff917e00e517ca,2023-11-07T02:36:54.447000
+CVE-2016-9240,0,1,ab9b84cdbf6334c5dd3535ec8005aabf97bae0865f6453b9c04f462fd2d97957,2023-11-07T02:36:54.677000
+CVE-2016-9241,0,1,c842f09f3692deaaa99ab4cdb97c877b6ed6fdd9be208e81865c7bad2d1d14de,2023-11-07T02:36:54.910000
CVE-2016-9242,0,0,9852a6f02cd4cccd73633f324bf7a4b87e327f0f87bbca737bb28024aabc95c5,2024-11-21T03:00:50.220000
CVE-2016-9243,0,0,55d3e3aa9931fbf719350dea80775763606c8461f5f5d960ae11d52a624e1dc2,2024-11-21T03:00:50.370000
CVE-2016-9244,0,0,4607593e23469a009fb5e15f51464673fdb66328337069d3a6b3c6abe7dcec2e,2024-11-21T03:00:50.517000
@@ -96000,186 +96000,186 @@ CVE-2017-12199,0,0,9371efa6d76b15289b5d1920a2829d5cd8b5091a43afa5e9a286b6c50f14b
CVE-2017-1220,0,0,9b21a4c96ef29e2eaedffac4e0f7641f6735fabfcf700159cda7eea8d512dd68,2024-11-21T03:21:31.627000
CVE-2017-12200,0,0,93f578af2263d9bacd90af944bb06567d9774b15845c54f92f01a9ca45a53efd,2024-11-21T03:09:02.420000
CVE-2017-1221,0,0,c74362ea713d3af97cb87656e7e7eb905da8243cbe34378fc9893c1251d0da9a,2024-11-21T03:21:31.757000
-CVE-2017-12211,0,0,612227ea4959d61565cad9dd4069430c98a2efadc98e08b10e6bda37f85568b5,2024-11-21T03:09:02.560000
-CVE-2017-12212,0,0,8b4942e701965e4ad4bc9366b1b7c0889e8bb2dd1e83c08d0040fc452fdb4417,2024-11-21T03:09:02.687000
-CVE-2017-12213,0,0,14b311bd06d2d62ed022d87a32c97ccecc41269fdee87eeaa48e9909db6ac924,2024-11-21T03:09:02.813000
-CVE-2017-12214,0,0,f4e50155169bec89815e4ba5fcd82d60ce75b13ad26f77f220794417a72891b1,2024-11-21T03:09:02.943000
-CVE-2017-12215,0,0,4f2a8018f1ed5b5d572b2f52693355d049f4e6dd7db7223a9208f4e744b70ca3,2024-11-21T03:09:03.067000
-CVE-2017-12216,0,0,fe786c1a9e0a197ccec4e9b8b1e0553363300bc305061d25d976132e561db1ab,2024-11-21T03:09:03.193000
-CVE-2017-12217,0,0,6b7be394a91bdd504e4997a24b5c9071e3458b55eb8e8cd84a8781baebe84c47,2024-11-21T03:09:03.310000
-CVE-2017-12218,0,0,4e4975db9c22b09db12d9496d3562aa4d3cb19d1b56fc786f1da918e9f2a003d,2024-11-21T03:09:03.433000
-CVE-2017-12219,0,0,4e21b4d57e643da4877b7c65a3bbcba063d28aaf41a884535df91622473c1e0b,2024-11-21T03:09:03.620000
+CVE-2017-12211,0,1,d69f2c57732b7b16563c6460ceddce47e06a0d1a21e265f355eb192f1d82fe9a,2024-11-21T03:09:02.560000
+CVE-2017-12212,0,1,ba943ca580f5b93c8de115888a79eaf8f28310f2108fcd2f888e7ee77f953477,2024-11-21T03:09:02.687000
+CVE-2017-12213,0,1,b02aaca48937b99bf19d66b781484fd8ab311fe114f63871135c0668ad908f8b,2024-11-21T03:09:02.813000
+CVE-2017-12214,0,1,6ae99c65df500b5c1a2114116c4eb2778f871b3b48b9a534c7b10638f2effb7f,2024-11-21T03:09:02.943000
+CVE-2017-12215,0,1,161b7d42204ff043f6b7fcc5a01972f0f5863f2480c09e00793405a9ded64480,2024-11-21T03:09:03.067000
+CVE-2017-12216,0,1,8f45c59560e7076aed6f9ab17ded05a4337277788cdb14e39b9f31d0ed05888d,2024-11-21T03:09:03.193000
+CVE-2017-12217,0,1,8d62961ecb307707d8ff0b9ee5e5c84e84441718fb5e826f70851b93a6000de2,2024-11-21T03:09:03.310000
+CVE-2017-12218,0,1,738a80887240d03be384ae17388f999e21c43075cf4540ce9588ee9edfe2613b,2024-11-21T03:09:03.433000
+CVE-2017-12219,0,1,e57d8baa5131179e64d3da3ec34fae1facb6bee926814c9aca11b4e925f28ea4,2024-11-21T03:09:03.620000
CVE-2017-1222,0,0,7db4a33fb43fc5eae279c0c837a09af2adf43bec536e3370f3e370153faff02b,2024-11-21T03:21:31.897000
-CVE-2017-12220,0,0,1e00984e5d739432245fa5febbcf489d9e476b430d5817d18dd671ffa67c55f4,2024-11-26T16:09:02.407000
-CVE-2017-12221,0,0,78b050b499c2fbb5649a52e0394e850c31d90b55908aea651c6e48af325d4392,2024-11-26T16:09:02.407000
-CVE-2017-12222,0,0,cce4aeccb0a8c8ef99e949d8f59e692c5e51510db3fedbb5694077176855b5d6,2024-11-21T03:09:04.020000
-CVE-2017-12223,0,0,520ac7ace30e8af510a33e335253a034789dd0527b97cf03a44ed14cf776446f,2024-11-21T03:09:04.160000
-CVE-2017-12224,0,0,c3df38f113f9ca39dff4249d4875e1ae68e1462c69da4fbbc6f197a3f2e6d763,2024-11-21T03:09:04.280000
-CVE-2017-12225,0,0,5d7fc51a0cd1ba86ce65c4b99880c574b9e889988081a0c0d088dd2a29669c32,2024-11-21T03:09:04.397000
-CVE-2017-12226,0,0,b6ded12ebcce08bc5e6c91ee39b6a87369eb79062fca3065f37e25b90c6fff86,2024-11-21T03:09:04.510000
-CVE-2017-12227,0,0,5d9c314162c9c28785b3443329fd9e934957b296fb5366dc74baa6febcd95d75,2024-11-21T03:09:04.630000
-CVE-2017-12228,0,0,f9624688d5aa4312cdc1777ef04e8201c0e398d4cf5b0bc538a48355e07b510b,2024-11-21T03:09:04.743000
-CVE-2017-12229,0,0,da5a1847c0f373517ab565406a2fe43518cf697806774848b0000b60d806f0f9,2024-11-21T03:09:04.917000
+CVE-2017-12220,0,1,cbf8107d51855a260b4f870fd8398bd9ef185575409e87d43ae48c6b0f32865c,2024-11-26T16:09:02.407000
+CVE-2017-12221,0,1,bf1e6fd8919e8980011499bb189e34c4926c35883b4ddf516fcd9783091ca487,2024-11-26T16:09:02.407000
+CVE-2017-12222,0,1,a436a2c9ac5221e54ed661ab29da91dc323e5cdb96cbacfc14567d15e1114d57,2024-11-21T03:09:04.020000
+CVE-2017-12223,0,1,690798fc8a7e59b9b221fbffa969c6bd9b50ee6138afaa3eaa4e82d937ab4629,2024-11-21T03:09:04.160000
+CVE-2017-12224,0,1,b3c9fa924c02d411d8da8b75506673b29ad72e73ec288d1d2e64d5163b6dcd48,2024-11-21T03:09:04.280000
+CVE-2017-12225,0,1,2e27801fe1c25395518f1bbd1b2c270003fcb3a768350ff992b4d9d3ad589654,2024-11-21T03:09:04.397000
+CVE-2017-12226,0,1,371cc67744c0b4f0a62480f70023be9465fd6d1bfd98fcf527639e2a913096e8,2024-11-21T03:09:04.510000
+CVE-2017-12227,0,1,9e48b97f4087bb3fa9c16f9ecee761ee59e8d54c696946d580e76075ba216169,2024-11-21T03:09:04.630000
+CVE-2017-12228,0,1,a94b96395a185c7ccfa83436710c620656f0d2a4ba4231da2f78c92b1356641e,2024-11-21T03:09:04.743000
+CVE-2017-12229,0,1,f6ff893af3a440bed7d1ac6f2dbbf4e52edec5cbd934949348223a768a335137,2024-11-21T03:09:04.917000
CVE-2017-1223,0,0,5b8b0a6cbbf48148ada2d0dc2e20aaa67822d19e60059050ac95bc1af1f52ce1,2024-11-21T03:21:32.020000
-CVE-2017-12230,0,0,ab463fdfbe072524d220736b22158e9817ed47b9b9c837eb44ec7a6d640459d5,2024-11-21T03:09:05.040000
-CVE-2017-12231,0,0,7adc7f9c0125ab9db43d89154bc9247c5baf15cce71e123c17914f29913432e5,2024-11-21T03:09:05.157000
-CVE-2017-12232,0,0,e7554251efe05fc0d834d7a8d06d4b4e167a2c31ff340a71d7230ebe60dfa64d,2024-11-21T03:09:05.340000
-CVE-2017-12233,0,0,a8c014700a15a4a7e01973133120194a6b5d483505a1144d9d23f98e0af69437,2024-11-21T03:09:05.490000
-CVE-2017-12234,0,0,4b52b8efe2a8dd5eada9f0d4064967edc110f5260008cef23bd5139634be8c99,2024-11-21T03:09:05.637000
-CVE-2017-12235,0,0,5323ce9771d849e2cf20c3c011e55c5092706b63d2f7878b83effc76e2ca7170,2024-11-21T03:09:05.773000
-CVE-2017-12236,0,0,e640642761e1a7cd2c85d861a9ae7df51fa9d7495cc6c2e07c04b9f2bce248a9,2024-11-21T03:09:05.913000
-CVE-2017-12237,0,0,7bb1ad7bea1d01b6a7de323b2dc788cf57574e6a9f1b6a6caad32a2769b68478,2024-11-21T03:09:06.030000
-CVE-2017-12238,0,0,788ac287e907cca6c520b479a4679e699328e7534cbd910786981b7362daf531,2024-11-21T03:09:06.197000
-CVE-2017-12239,0,0,2603e8aa5928db5a2011fbecb4f02a5a346bd317dc1734094ed17fad799f2e26,2024-11-21T03:09:06.343000
+CVE-2017-12230,0,1,14b86b12d9dcd83f80c4be089d86af612d242701aa05308b19941c547dc562fa,2024-11-21T03:09:05.040000
+CVE-2017-12231,0,1,544b1c4611401b9bb5e409fbc12641cb8fb951a9fab3f5ea6167f6abd2f35f54,2024-11-21T03:09:05.157000
+CVE-2017-12232,0,1,924714f42ff84b79647fa508302532106d76e452dc41bc791c47b4c8aa262633,2024-11-21T03:09:05.340000
+CVE-2017-12233,0,1,8212c0d7ec6fc1ec2ca35af5df8b1b76c6667c4521ea6964bee6fc8bb42ebd71,2024-11-21T03:09:05.490000
+CVE-2017-12234,0,1,3b59adb569435ed3ce0967530657dffada46d8a9b7a44d379517d8e420d50951,2024-11-21T03:09:05.637000
+CVE-2017-12235,0,1,90bab106134e0c8c997f22657c2042597ae2c0f595f94bd8f743906d3da3ff76,2024-11-21T03:09:05.773000
+CVE-2017-12236,0,1,9a77dfe72bedaac732dcba583747a3b2269964cfdfc1febd018b484e88dac90f,2024-11-21T03:09:05.913000
+CVE-2017-12237,0,1,66ed1ce86aba229da728f169033035c0a74ac19eb5ac41cc8625712e124040ff,2024-11-21T03:09:06.030000
+CVE-2017-12238,0,1,c80a191c4562b59162db45727b4478fb19ff0f6233b6997d6e98b3582a7f753e,2024-11-21T03:09:06.197000
+CVE-2017-12239,0,1,57ac99522404812a7cdc04adb43a1841ba4f521098f602cb01e910eae0c7fe17,2024-11-21T03:09:06.343000
CVE-2017-1224,0,0,cbbfb0bfc94cc05aa78e395544e25f4eaddb387bd1a2f4323093288a6374d3ef,2024-11-21T03:21:32.140000
-CVE-2017-12240,0,0,96045c2a94bb36bcd64db3502143f0f244b5b6417ea744de7f2fcada61284b18,2024-11-21T03:09:06.497000
-CVE-2017-12243,0,0,af1edd7e749df31c1adab0ac4d928287e44eedce3f67660905b254d40abea6c0,2024-11-21T03:09:06.650000
-CVE-2017-12244,0,0,e2d4c1e8094e2a991cc4daaa5afbf7e3d3478bbeb20cf72b0d396c7e4066278e,2024-11-26T16:09:02.407000
-CVE-2017-12245,0,0,b6d508b2455704cffb67b6aaad65c89a13e1506df885630c4efce287fec97bb1,2024-11-26T16:09:02.407000
-CVE-2017-12246,0,0,6e4ed7ebb9630ac23ddcede7b7bc254b9c5ddd3781b825082067727b57014468,2024-11-21T03:09:07.037000
-CVE-2017-12248,0,0,da63f612427171a8e4575129a6a72708bd956741f066c3007d46153d869d8326,2024-11-21T03:09:07.163000
-CVE-2017-12249,0,0,558e1cd7f198511e612ed53aa259be47bd58fcfda6aa3361183d03981ea2a576,2024-11-21T03:09:07.293000
+CVE-2017-12240,0,1,6de777995dc7b99c83a293305d1176cdd11e7db148f0260f96611120d717ced2,2024-11-21T03:09:06.497000
+CVE-2017-12243,0,1,d09c0c246a3834eab7dd825e6c909c9c41ccb83375873d028c1ec64d9658d80b,2024-11-21T03:09:06.650000
+CVE-2017-12244,0,1,e93d04ff49fc6f7c8bf5222065a96f06b5afbe34e3dd5e5e4f9a52b09556cd06,2024-11-26T16:09:02.407000
+CVE-2017-12245,0,1,37e8dcfe25d6b2adff2669204db1aa8988ed61ad2b40f65ac09899c176a8d782,2024-11-26T16:09:02.407000
+CVE-2017-12246,0,1,c0bfb3dafd0e395a15f2797982dbca28ba8ccfaeddcdbf75258c28a6d3f659e5,2024-11-21T03:09:07.037000
+CVE-2017-12248,0,1,f7db80e2529c039f393bd5d6e32d51206f970846a81a75bdb506448c9afac978,2024-11-21T03:09:07.163000
+CVE-2017-12249,0,1,cda80c33457136169cd9d2faab7046fae49dd993dc982165336ca808ee5bd228,2024-11-21T03:09:07.293000
CVE-2017-1225,0,0,aaad3627a482c8f92ebf3a8a3b8157093f9509238ecaddb0c5ba0f4e07891350,2024-11-21T03:21:32.250000
-CVE-2017-12250,0,0,081c42acb6afe9ffdd1f29695ed1681b5cee847ede7140d4080c3f0088d96396,2024-11-21T03:09:10.090000
-CVE-2017-12251,0,0,deebabc891579bdbfcceaa716c76ae06470ca4f4dc9a254348996ed63ce18213,2024-11-21T03:09:10.210000
-CVE-2017-12252,0,0,2ca370353d2a08dee94d49defce91e43ffbd41304f5468d91bd8877c8c6103d2,2024-11-21T03:09:10.327000
-CVE-2017-12253,0,0,a904687c12e38892278bc5844a74fa0affd0f3e20c3a28eb5a90c0e5ef9cdcb8,2024-11-21T03:09:10.430000
-CVE-2017-12254,0,0,ce356f10406e938f22b56e8fbb064480f0323750b15528f01119186947fdc377,2024-11-21T03:09:10.533000
-CVE-2017-12255,0,0,e55060cd76f2641c2e0b5e6703553a190eb932daa4398e37151c385552604e23,2024-11-21T03:09:10.640000
-CVE-2017-12256,0,0,1c0d2b0e58d9ff4f61c6f05e60c721255f0c39453bfa3ee6f3aeb36ea4b046f9,2024-11-21T03:09:10.753000
-CVE-2017-12257,0,0,439e6a6736e4b01b88ead32c535ffcc21d32ac686762c36567ac67745811e9e2,2024-11-21T03:09:10.857000
-CVE-2017-12258,0,0,ca7d721e9c1ae9dd2029ecf53024c8244337d9b74d6f7b84b0b8b18ad890b89c,2024-11-21T03:09:10.963000
-CVE-2017-12259,0,0,ef964d750627296c0b069e8439a655950afb71da3d9f1201a6ccc8d9254e0092,2024-11-21T03:09:11.063000
+CVE-2017-12250,0,1,a1d5c984c5a8ef18dd5d80630ff34eafa9162f9ba57afda901e4416d939a5950,2024-11-21T03:09:10.090000
+CVE-2017-12251,0,1,4588dc70de429edbce07a241410ab6ca7d3e6998c5ea0d7b92daab5d1cf1aa4c,2024-11-21T03:09:10.210000
+CVE-2017-12252,0,1,147736bcdff07580d428cf35609b199942f3adde191ea6af847d61fb69b9e2c5,2024-11-21T03:09:10.327000
+CVE-2017-12253,0,1,9ff8f15b4392cf03ee6d734a2a238d269b4607f75df3f18cefdb4cc17a1d67bd,2024-11-21T03:09:10.430000
+CVE-2017-12254,0,1,ef7e6f76b02382b531073ec389b6ae573cfd3342e676e93cab1b879d626f8fb3,2024-11-21T03:09:10.533000
+CVE-2017-12255,0,1,ffaf0078977d336dead77cc2751c5eec781b853770bf0329bdbdea46cce31abf,2024-11-21T03:09:10.640000
+CVE-2017-12256,0,1,7079ce0c289289a0c6b0ae464cb5b36677ab4a814eea520f9e15ecac5e495cf5,2024-11-21T03:09:10.753000
+CVE-2017-12257,0,1,b67d25713745fe5d308c0ca6f0cbf5e77315bd55c2aea55abcf2dfa90654cf39,2024-11-21T03:09:10.857000
+CVE-2017-12258,0,1,828897e99e3005639c4d61888aece054f145772fec541bad47ba45bd6583fb15,2024-11-21T03:09:10.963000
+CVE-2017-12259,0,1,a8afeed50ac3fd73aad86241bddabddec15d4af4f8e6cd8fb70cdf30e25ebc29,2024-11-21T03:09:11.063000
CVE-2017-1226,0,0,209e9c4eedf037197553f4e1a2e3b8fc35580a4fcfce186527c9daed0199ebc2,2024-11-21T03:21:32.363000
-CVE-2017-12260,0,0,73fd1fbfbf7009ee32233b88f5add868f76185d859ab3152033dbdcc65c1950f,2024-11-21T03:09:11.170000
-CVE-2017-12261,0,0,a98f1a0b23b37a5cbb936443b125ec057ac04aa936944d3b008bbeafdb4c99c2,2024-11-21T03:09:11.287000
-CVE-2017-12262,0,0,ec26e0e8971faf2c0362ceb7ee94d687769f8607429a5108b98fbccc79762896,2024-11-21T03:09:11.397000
-CVE-2017-12263,0,0,d7054b53d99d0a1efd59e67dc35448986afc9220ba82ebf7249cf94c6e2a6bc9,2024-11-21T03:09:11.507000
-CVE-2017-12264,0,0,09e2a93dd1df2d533adc730a4fc3e7cdd86f9b8546a4276b003264a63c491ed8,2024-11-21T03:09:11.610000
-CVE-2017-12265,0,0,f3a0412833acf631051caba766dc11b8052227b60f31407883425f25beb9fcfe,2024-11-21T03:09:11.717000
-CVE-2017-12266,0,0,e60f072fe34d320f7d72f19da9903f0d94961bf0eddd4395fced6dd07795c784,2024-11-21T03:09:11.827000
-CVE-2017-12267,0,0,00143d10e0299ae2097ab499706669f9884a69fec91ddc550f029cd8d9de057b,2024-11-21T03:09:11.937000
-CVE-2017-12268,0,0,d30c91220287a8e6f9c9ff8a554cec9d0d620a6d1fe4072d2d547aa15f5a6c70,2024-11-21T03:09:12.047000
-CVE-2017-12269,0,0,593f87d905260e3be5a48e50db23780fa12ca8b95d21a37f5a73a30e5f4f608b,2024-11-21T03:09:12.153000
+CVE-2017-12260,0,1,864e4375242df98d339d4779473bfac9ade0c077bf005ab85dee2976e4f9f50c,2024-11-21T03:09:11.170000
+CVE-2017-12261,0,1,0c95e84c8a2518ea83427357dc24874b601bd0053a804fbe8c75f67f1039d82f,2024-11-21T03:09:11.287000
+CVE-2017-12262,0,1,154af2fbd94c2cf8abf74cfcfdda1a4e6a4c17cbd28d4663c8ce032fa3bc8d4f,2024-11-21T03:09:11.397000
+CVE-2017-12263,0,1,ac9b4fa7154e830cc0faeb6ad6d0cb6b77fd096fb840de7872c10655e5b042b3,2024-11-21T03:09:11.507000
+CVE-2017-12264,0,1,3cef42700567496241fa75dcf1e388b75b296755454ddf8d8ab821491340551d,2024-11-21T03:09:11.610000
+CVE-2017-12265,0,1,bb3f09c66428ae3c81a48d38c4613e39c70777a14b4a38e1859052201c709385,2024-11-21T03:09:11.717000
+CVE-2017-12266,0,1,029804f26b2ad04a392ecef4bcd0b88bca49ba4fee72affb5a18f798ccc94eef,2024-11-21T03:09:11.827000
+CVE-2017-12267,0,1,3bbefa8ffa11ce463b7958db81c766ab01a40eb286990a3912b3c1157661dfe5,2024-11-21T03:09:11.937000
+CVE-2017-12268,0,1,94c9f3efcb3cdac77c123bd323590a2a9d950683567bba59781ab5c0f8951cf5,2024-11-21T03:09:12.047000
+CVE-2017-12269,0,1,b4963a858b8a8697bd08370d59d1a0fe49168e600893402d629c5d3327e13ff4,2024-11-21T03:09:12.153000
CVE-2017-1227,0,0,fbb28b24acc9e915b343a91c771d6dd6e7dfd5833db61055c9e43c07c83b692b,2024-11-21T03:21:32.477000
-CVE-2017-12270,0,0,9f868b1f1abde718bc16eec69e0100f31c3b4adc5b92ab1bf8a71ee4f516877c,2024-11-21T03:09:12.280000
-CVE-2017-12271,0,0,c478ca7a307a1f8eedb5d234988ea008630bd3f3c40d01cd74a91c1bc7f08769,2024-11-21T03:09:12.393000
-CVE-2017-12272,0,0,9ed4fa1f554373fe6abf4ecdfb06967c54d8add4600c009eed0a4d3e8565a10d,2024-11-21T03:09:12.503000
-CVE-2017-12273,0,0,4bf8334d19232f9fbfa0d9185c651a51c9004be445c089687e82f5488639967c,2024-11-21T03:09:12.627000
-CVE-2017-12274,0,0,e1067fa079308966a0ad5dec1734feefcda8460775065d858aac4295f04af4b6,2024-11-21T03:09:12.737000
-CVE-2017-12275,0,0,1059b3661e1c5f3effb5d65762d45778485a572a0240c2681a7439b9ef71610d,2024-11-21T03:09:12.850000
-CVE-2017-12276,0,0,4d591dd9370fea2c7c0ef2f368012c98c392484265c58fd07e3e3f3c082b2541,2024-11-21T03:09:12.963000
-CVE-2017-12277,0,0,2f40b3a93996987dfe2d9b73e1623e9b185594671280ae0e76e8281e7f15ce25,2024-11-21T03:09:13.077000
-CVE-2017-12278,0,0,939849cdf03c0165638baac2950a4c6c45c9edf84ff0e20a237024a0472d74e4,2024-11-21T03:09:13.193000
-CVE-2017-12279,0,0,e37c9839891aeae7698e6f9471eacedbe00629370ec676a99b186ec313ab5f0b,2024-11-21T03:09:13.300000
+CVE-2017-12270,0,1,cb78eaeb765b73abae86845bf0a42581c65b1ad09b4fe69949d658ffe87585ea,2024-11-21T03:09:12.280000
+CVE-2017-12271,0,1,fdf51722cf2815c868556135e1d07e17d72cbf21d8e354434fb81b3e5217ebe3,2024-11-21T03:09:12.393000
+CVE-2017-12272,0,1,e88532ac78b683701050946f56763710401f77de5336b4a953d7c2109816b99e,2024-11-21T03:09:12.503000
+CVE-2017-12273,0,1,856a341a9f641ed187a0e18aa6de9cb6082cfd02679d415aabd12edc3b2d0583,2024-11-21T03:09:12.627000
+CVE-2017-12274,0,1,eea2edaf5883ad6f22fce30076c65b820b8ad4f9fd67cfae3ce55408552c2dc4,2024-11-21T03:09:12.737000
+CVE-2017-12275,0,1,cbdd9be8e3c0c56db401781edcf50cb981fb2d285eb754e8dd249d56615109d1,2024-11-21T03:09:12.850000
+CVE-2017-12276,0,1,44e71baa9ba20dd8fb6112f8fa17718292540c94d163a2ddbdc7df2e79a64d0f,2024-11-21T03:09:12.963000
+CVE-2017-12277,0,1,e9c3a447e1d9099b8cbd3fff9852b78ed38cad9edf8cc56efd9c75c72a9cdff0,2024-11-21T03:09:13.077000
+CVE-2017-12278,0,1,271e6938b1270b0f3f9f42b9f1abb6efe850c233f18620fc7ae24c16e4318ab4,2024-11-21T03:09:13.193000
+CVE-2017-12279,0,1,fd427142d412854a62acad92bcde3fa9bedee92d511b75e1204b3e1a08e2dae0,2024-11-21T03:09:13.300000
CVE-2017-1228,0,0,0c2f3446a2c417c43b4c26bad9c1e43994ade1951fa1e5d99d132ab18af278d1,2024-11-21T03:21:32.583000
-CVE-2017-12280,0,0,7f5d439b6e4e286aac1180da7eb9d2994c35286360be418ab12fc57f3549de1f,2024-11-21T03:09:13.413000
-CVE-2017-12281,0,0,955f2efcda6d3a4f90d3db336c8bdd377b50fee9c1bd67bf40ec8cf01930a12f,2024-11-21T03:09:13.520000
-CVE-2017-12282,0,0,d92e029bf7f5941d59bebdfa4168e052de6c643a5556c489fdf508cb24270643,2024-11-21T03:09:13.640000
-CVE-2017-12283,0,0,b19a464e257934b061e009360bef75544fab217e320ff9ce46d1b8b34fc92f40,2024-11-21T03:09:13.757000
-CVE-2017-12284,0,0,648f52e2ccf8470accc21acdb97fb1ee92b10d8c9c0321f3853b11f6c4342ea3,2024-11-21T03:09:13.897000
-CVE-2017-12285,0,0,cb0597db115591e606732d0f17dfd3fd764e7a7a3b4bf5e766f5231fa8edf483,2024-11-21T03:09:14.013000
-CVE-2017-12286,0,0,c3e3f41ffe630042d1135b11673904d9eb8a89a9e8c1cc2fe2bbecd632112704,2024-11-21T03:09:14.127000
-CVE-2017-12287,0,0,7fd4f5469440c9826fac501305341122fc6575f5b8a21b2d8c4e6d3a1ed53f9e,2024-11-21T03:09:14.237000
-CVE-2017-12288,0,0,b212e2ca9b63fa6c4806743e4498dc6f34cc334a01c66f5170b6b8eb6a5ccadf,2024-11-21T03:09:14.350000
-CVE-2017-12289,0,0,756a1a2bf0b82d84a13d34759bd0f980fab676373f49044dfa149aa74914a28d,2024-11-21T03:09:14.460000
+CVE-2017-12280,0,1,f90ef82bf3163c121cbe82e9e77b3c31fc702df85f3d571982fb1cfe1d75f47a,2024-11-21T03:09:13.413000
+CVE-2017-12281,0,1,e8b2acf61c627b94117ba38be0a90727a07728946047527bc6ca32a945790fe3,2024-11-21T03:09:13.520000
+CVE-2017-12282,0,1,e4fc2c55e4b72db01ff6cdb6b06a81afd0f483ae315ef86b5ef7dd20a2c5c053,2024-11-21T03:09:13.640000
+CVE-2017-12283,0,1,5d8646f0d62891e88ae2f1b670cd9ff7cd0fc4ddb455e0baf05f16c6230a2cd4,2024-11-21T03:09:13.757000
+CVE-2017-12284,0,1,7e66e6e85c6d39d6ff99f3921f08269e666f24d3f06b8258006762c0675d19b5,2024-11-21T03:09:13.897000
+CVE-2017-12285,0,1,fce81c8ba12c4e6696739aa168b530d26166f16c3fd82fc4a7ed025626354e8a,2024-11-21T03:09:14.013000
+CVE-2017-12286,0,1,489dcaddb92b14a00058215e686d297ffb4dfc1a42e12602d7558afca74895b4,2024-11-21T03:09:14.127000
+CVE-2017-12287,0,1,74d617fc04a695659810c6fd7b70f11cff2bf852b92e30dafd249d9696c64a5f,2024-11-21T03:09:14.237000
+CVE-2017-12288,0,1,1334ed183cba8d5030e8a943c70a617ec8b20f74881eb815590fc18c1128cd2c,2024-11-21T03:09:14.350000
+CVE-2017-12289,0,1,41c8626c9489f0665623e33b55bcd8e75a7cc27d29205f84a8f8e2671a7ed85b,2024-11-21T03:09:14.460000
CVE-2017-1229,0,0,ecadafaddb940f867c8b425569ba8f434e7f0a5b09f38be6793eefe6b7f0a091,2024-11-21T03:21:32.720000
-CVE-2017-12290,0,0,0692be02192f7991b017ae35bbd8d415e76bb49d7f3abb5ef64f322187a8f538,2024-11-21T03:09:14.573000
-CVE-2017-12291,0,0,8c00b2e7a7465ac4079480b1b686cdea0e58e2c2ba18ce79b819e26d87d3544d,2024-11-21T03:09:14.690000
-CVE-2017-12292,0,0,6a08e8c7d7d948561738a2f05bea07f647a7041fc10852341cfd80e30cef3715,2024-11-21T03:09:14.800000
-CVE-2017-12293,0,0,1e5202903119743f7889b43e600e770b2b8eaf27996fa484b41bcfcd9cb9f5df,2024-11-21T03:09:14.910000
-CVE-2017-12294,0,0,aedba9c98e69d599540ea5948bafa7c58cf2c838fcdc230fd7ad050bf35e7068,2024-11-21T03:09:15.023000
-CVE-2017-12295,0,0,ccc4bead473cf3f83f65eeb195cd9030477e68a74f8af65853957b53061d9374,2024-11-21T03:09:15.133000
-CVE-2017-12296,0,0,f5b326aa80bafca1b7d5140bec32f417469e0913cf5501733fb20df956f7a5c0,2024-11-21T03:09:15.250000
-CVE-2017-12297,0,0,d4f04d454eedaa3bb09526b424971d7ba7a7125a161119b29882b0b1426dd662,2024-11-21T03:09:15.360000
-CVE-2017-12298,0,0,fb90b5095977508343e77a900b589b771400b947659227d2c4fc8a20f6be7bbc,2024-11-21T03:09:15.490000
-CVE-2017-12299,0,0,a1523b9e751955fbd643236d971593a2c63713b6bec2cf808208fc6d81d0dedc,2024-11-21T03:09:15.610000
+CVE-2017-12290,0,1,51b21d70827dde05d51d3f402b8d461b0193510d58ef10bcb2ea4382fa1589b1,2024-11-21T03:09:14.573000
+CVE-2017-12291,0,1,2cb457b434ed9584d5abd1a341e76809afdb304dc91000ca95672ae9cd69999e,2024-11-21T03:09:14.690000
+CVE-2017-12292,0,1,96bb0dbe78988d2ea5982dfd34b0e8389833c88f8f8569e6d3d33c0528646aea,2024-11-21T03:09:14.800000
+CVE-2017-12293,0,1,a67470b8cdc5d10963db374b6d3e28c9ac09ae264fcabde3708ea5a663284ca6,2024-11-21T03:09:14.910000
+CVE-2017-12294,0,1,146364b5d41c3a4bd8edc09f204ed5f16f30bf35075178b72f9ca0390c472601,2024-11-21T03:09:15.023000
+CVE-2017-12295,0,1,f1e28c9c7756a592804d53851cf67b5d79333bcd6a63cb56a60fc971e1c05120,2024-11-21T03:09:15.133000
+CVE-2017-12296,0,1,a1bc22a0bf389a4db6e286c5f75a6beebf5e14a9738915a2314cd1f490f117ee,2024-11-21T03:09:15.250000
+CVE-2017-12297,0,1,1f9d57fc737696dc700e71c0d392b8ed8989ecf400b5e7d4c4eda6a7e171c87d,2024-11-21T03:09:15.360000
+CVE-2017-12298,0,1,bf079cb03a06383dec97adfc0d49ebbe2685066ea469e1995acf3c77a811eceb,2024-11-21T03:09:15.490000
+CVE-2017-12299,0,1,ec10f19f3c55d0cecbc23bf778be67f504d1530187e9c7271cf87febc177f33c,2024-11-21T03:09:15.610000
CVE-2017-1230,0,0,c96ea40a3b0ba3f4e6ef80cf7a841d410c80a862aa4b497b9c259b43e0706274,2024-11-21T03:21:32.857000
-CVE-2017-12300,0,0,d9ee0cf540de79ea7ab1d95c3e6f561fd1a7934bb3fc2c48bfbafa6fd82d5ca0,2024-11-26T16:09:02.407000
-CVE-2017-12301,0,0,d968dec93faaeec2c5b8d2e7dba08c7aa4b3d1064af0b8a59df5ee880c604193,2024-11-21T03:09:15.857000
-CVE-2017-12302,0,0,7e9339e1a8b4c3e5ea16844cc11e9564c54c9e2d7d759a5c0b386b06313271a3,2024-11-21T03:09:15.987000
-CVE-2017-12303,0,0,4ab94d23d4dad64cd8ccffb348303c2ba0f2ef1a649d31e075c2feddba3b6b46,2024-11-21T03:09:16.107000
-CVE-2017-12304,0,0,39c4070ff16fe24ecf3b6c51196db0d12a83811b7144241dfdeed858ae2be58a,2024-11-21T03:09:16.217000
-CVE-2017-12305,0,0,0a70078b81c9cc8e1b868c1bab06a85d2af4a0f74738512d1ad1c028db72737c,2024-11-21T03:09:16.333000
-CVE-2017-12306,0,0,aaf8f2e125e93488d185970af902d3dde1845f6c0a087ce5b31b5a163cb5864e,2024-11-21T03:09:16.450000
-CVE-2017-12307,0,0,ab528c66f9144d8242de681397cafb0cef1756f4d27426c52db1ee8c2ba95676,2024-11-21T03:09:16.587000
-CVE-2017-12308,0,0,5b2121d0092bc669ba7643dae583ea2eced49482c611037c0c2c4d99141a206e,2024-11-21T03:09:16.797000
-CVE-2017-12309,0,0,acecd64db39947520025bff2d20592e176db6e27fa79d8e101ddbb7da75899c6,2024-11-21T03:09:16.990000
+CVE-2017-12300,0,1,431d7d53b01d94c6b5fa54af1b45a5fdfe7036209edd9b31731ff372d07474dd,2024-11-26T16:09:02.407000
+CVE-2017-12301,0,1,301e74cad1ca1888042a84a39884ab2fb8d479c401875a3204c59dfe3fa3182b,2024-11-21T03:09:15.857000
+CVE-2017-12302,0,1,6ec9e6af5c70ce850e1edc429a3a25bf97f09098fc5e7d318861a3b262aea829,2024-11-21T03:09:15.987000
+CVE-2017-12303,0,1,bbf3d8555faf352d67a2e3b18224ba9f8705fa2527f9740fe91815a8a2ce797c,2024-11-21T03:09:16.107000
+CVE-2017-12304,0,1,e0ffd8e1af8f3a056ff20aeeaf9acb990bf6322153f0583d04f8bdf6c871a7d2,2024-11-21T03:09:16.217000
+CVE-2017-12305,0,1,32ce352ea57574243ace0f509fb13dd09e99f9e41996c9e0cbf210995d090721,2024-11-21T03:09:16.333000
+CVE-2017-12306,0,1,4a0a0b9fb5ebc9c5ee88c73f8d71ce22601ca4de569b43dbcded7038f707cda9,2024-11-21T03:09:16.450000
+CVE-2017-12307,0,1,23d44466a79083f2dda4d419922bdae628e064504c745c6345f0401db340a5a3,2024-11-21T03:09:16.587000
+CVE-2017-12308,0,1,b94faf73b13dd440ff6db674b1b3082fd89ddf5e65abf42d6a7cbbe819a60d1a,2024-11-21T03:09:16.797000
+CVE-2017-12309,0,1,255bf5469c41035af1b4f37f70510ae9237b60c02dfb943542ab4bd7c2d1753f,2024-11-21T03:09:16.990000
CVE-2017-1231,0,0,0cf49b856e2a542ba6fe2a46bbf74ce996aec1874584a2250dc045a808d31877,2024-11-21T03:21:32.977000
-CVE-2017-12310,0,0,a8abe41bed363da6c3028faaccf52088d95bf8cc4d8e1169bf40f6e901e4b036,2024-11-21T03:09:17.107000
-CVE-2017-12311,0,0,c6e0f675148421afcd1770c99f09ecfed62c99c2d1013c1aa11eca7e1a8dda7d,2024-11-21T03:09:17.227000
-CVE-2017-12312,0,0,b8862ded3eec13491d9babb52b1ad6efffdb7ccd61732877f3ff925fbbc6aeb5,2024-11-21T03:09:17.357000
-CVE-2017-12313,0,0,d5ed1f5daf4149626b1da760bdfa0a252367676e8af9ed35941f519fac141aee,2024-11-21T03:09:17.483000
-CVE-2017-12314,0,0,207122401badf74a9459afdf99ce7b8585f47bc43f529e34fa94610e073a6f9b,2024-11-21T03:09:17.610000
-CVE-2017-12315,0,0,d752f6fb5f855faca1500bfaa8145a40d49e1a9c6d336fe587b1333e9fcb6454,2024-11-21T03:09:17.733000
-CVE-2017-12316,0,0,c05f614a68c6a16f3f53d035aba43dafa7ec33146fe8fdafccc55383e4e8ffe0,2024-11-21T03:09:17.860000
-CVE-2017-12317,0,0,510e7853ee769cc72202781269f56037a0f7d8817f5440fab6e1dfd240d266e3,2024-11-21T03:09:17.973000
-CVE-2017-12318,0,0,ad497bbb73298255a66daac93762b25e1029d905d65d944fe44e05632f81206a,2024-11-21T03:09:18.083000
-CVE-2017-12319,0,0,7bd6ff61dacb5c80bbd94a24f1364a7935e452b22dd11487a87ae17891c643c8,2024-11-21T03:09:18.213000
+CVE-2017-12310,0,1,83780fa0304fae058308845d3ca4f9efffafddad4080f9b7e10dc52610a2d6e3,2024-11-21T03:09:17.107000
+CVE-2017-12311,0,1,dd3be9289c0b172cc4eda3003541d03e8f4bede19a00f55193c9501b206a1d88,2024-11-21T03:09:17.227000
+CVE-2017-12312,0,1,522c48bf972d40859995eec47a233cf4ac3432321e9e49d93939916b8241605b,2024-11-21T03:09:17.357000
+CVE-2017-12313,0,1,caec7664c489a127d59fc039aaffa58d46f27e80e8c30f4152b66844f42819a3,2024-11-21T03:09:17.483000
+CVE-2017-12314,0,1,f77dd3a1094fde6b5907f8d44fd662971a210c9d42bc0c494c454bb9702c76a8,2024-11-21T03:09:17.610000
+CVE-2017-12315,0,1,917b10a2a2f300dfca1823914f5937ed45d55793b0ed9bd3c385de198d0ba9f6,2024-11-21T03:09:17.733000
+CVE-2017-12316,0,1,f7e72cf9ee2e185d87f595e730b96995c99c3ac837d4e17185215afe59881f80,2024-11-21T03:09:17.860000
+CVE-2017-12317,0,1,368c2be2fddd513807b7279fedeb18d7d3d3480d8db1da394a4c8e95b27b46bc,2024-11-21T03:09:17.973000
+CVE-2017-12318,0,1,1101a00e169b61fcf656b12254b8fe688cd9723c08d64671053561e8e6403e0d,2024-11-21T03:09:18.083000
+CVE-2017-12319,0,1,487706148801d129981152c724c26761912dd371f25d73ab5c462815077f2345,2024-11-21T03:09:18.213000
CVE-2017-1232,0,0,d0693b386e90319e44092bea25b1b0057a2ff8726fc9219e53ccb88aeae8bacb,2024-11-21T03:21:33.113000
-CVE-2017-12320,0,0,bb1cf1b889406a629ed092aa6422f674d0a1867ac810998564b41b30f47dd350,2024-11-21T03:09:18.363000
-CVE-2017-12321,0,0,5a7b1c5b59e4b2adc65730ca2b670d305c676e9466774db28644bc091f38284b,2024-11-21T03:09:18.483000
-CVE-2017-12322,0,0,3417888fb7f36934deda9c2e3fb9a5953537c0e63fe46c6f4796da9a1ee87dfe,2024-11-21T03:09:18.600000
-CVE-2017-12323,0,0,34d43baf17e0c579a141c645f7dbed41abca77ff12d95859a0bde986313b9e66,2024-11-21T03:09:18.713000
-CVE-2017-12328,0,0,19e51c46f7522606af277d12a087a688b59dd42f246c8c9413936d63d470330c,2024-11-21T03:09:18.827000
-CVE-2017-12329,0,0,124fb90d2876ae5700f1e08fc5bbcf13d1314900c83d6891d26bfbf82b5c9f42,2024-11-21T03:09:18.977000
+CVE-2017-12320,0,1,ed1c60ff18ee251ea0f841935d0bdb1dbc74569ae0f89d502368900a180d3a91,2024-11-21T03:09:18.363000
+CVE-2017-12321,0,1,1c359080e1c19304efc1f21a943ace4d550209276e24aae792cc4b55be2c53fd,2024-11-21T03:09:18.483000
+CVE-2017-12322,0,1,8617ada1d36e6c7b70878d7b092bdad75f610eac909b9e92cf0056121a432d6a,2024-11-21T03:09:18.600000
+CVE-2017-12323,0,1,73b767553b5ec5b2ad083ecdbaecd0c52a9ba2378aa73f3cef878e102a816f8b,2024-11-21T03:09:18.713000
+CVE-2017-12328,0,1,7fee19b3a0e64f539bc2a70526198847a9174ba98a573097a21f519f88367137,2024-11-21T03:09:18.827000
+CVE-2017-12329,0,1,f6cdb3b23378237527c215a458378e08ac27d78f9b1c10175340abfc2ddbfac7,2024-11-21T03:09:18.977000
CVE-2017-1233,0,0,d942d812c47b24a1dbfd60eb89c61ae8d8442640450ce7e0572b56b1af45e59e,2024-11-21T03:21:33.240000
-CVE-2017-12330,0,0,b1e90413db4637a32546de0e3593084b3e4aa07261421071980b83c4a023faeb,2024-11-21T03:09:19.110000
-CVE-2017-12331,0,0,0353572e63889f7004bec4e57fbbd839c33d32453b23564ff3d028ac26f790f7,2024-11-21T03:09:19.230000
-CVE-2017-12332,0,0,baeb699e675d4dec7f7ccda48e98d4b38cb8782c21848de82a4bef495d82f2ec,2024-11-21T03:09:19.357000
-CVE-2017-12333,0,0,a57e315636dcc442f3d660bb98df81859fa34dcec5226854c66d41c76a805748,2024-11-21T03:09:19.480000
-CVE-2017-12334,0,0,449a9e8407fc9810e1edd1ff622c86d0213f63bf64c8a95f0d0c8a7be76b6c28,2024-11-21T03:09:19.607000
-CVE-2017-12335,0,0,ebbe0ac3a0e7c449633f6360d318f60bbae792f913ff5e7789bde3b51817c33e,2024-11-21T03:09:19.727000
-CVE-2017-12336,0,0,b8848e8bfe356b1a7afd915cbae3a6c20c821a04fdddab70e12547c1268a4dc8,2024-11-21T03:09:19.857000
-CVE-2017-12337,0,0,1545321302efb51f5e9f108da54825d7bd92650edbd2524ce2b402b6f80889da,2024-11-21T03:09:19.983000
-CVE-2017-12338,0,0,8dba98dcd81a48a17f10bcec06439f48b4c056d533ce6d185e2ab3095ff8c8ee,2024-11-21T03:09:20.140000
-CVE-2017-12339,0,0,7328bec5c42ee6968d29a3d8cfb0547b153ca792cf0721c92037d8202b21dd72,2024-11-21T03:09:20.263000
+CVE-2017-12330,0,1,8e9f0b55810c8bc0b5baea6eba6aa818f54a43e6c08f631ead6e34e15e36212f,2024-11-21T03:09:19.110000
+CVE-2017-12331,0,1,a36f734c207304283f7354a5010dc9dad04489e4c2f94cc2a78ad94d94a1126e,2024-11-21T03:09:19.230000
+CVE-2017-12332,0,1,1073a9041d3f98872f11b0dc222f4c873f21b5a48a86c18ab5f8c7514c941c69,2024-11-21T03:09:19.357000
+CVE-2017-12333,0,1,28278845ced7d7530fe2b25e1fc7570ec081a6516e11fb90d8d2a8a91a118ba6,2024-11-21T03:09:19.480000
+CVE-2017-12334,0,1,133f2f3b6b3ebdef55254bb9221ed3e2b680912a06cdd07ec08e68d5087d2145,2024-11-21T03:09:19.607000
+CVE-2017-12335,0,1,d0d724055dad2d8bec3225e697d5bedd1d8fa1bee43b9a61873e722c94f7aae4,2024-11-21T03:09:19.727000
+CVE-2017-12336,0,1,7f58f6b9c35a904a92cb1fdd553445ce8ab96c4b9d2a4a11f14c42d7c15bd70f,2024-11-21T03:09:19.857000
+CVE-2017-12337,0,1,44f2544649adf0d642ae0bb365f2209825a9d834df0511c7ea0d7f21c87a7e9e,2024-11-21T03:09:19.983000
+CVE-2017-12338,0,1,6e30309a338f9eea960f22c31ed7030034646f494da96ad13c1d281bd02d0dbd,2024-11-21T03:09:20.140000
+CVE-2017-12339,0,1,9739b273654e474e7c5aa8c5e417abc1b285cc2708b3e631ba0df3543a278510,2024-11-21T03:09:20.263000
CVE-2017-1234,0,0,11bea40c05cfbd141f9b092ecc49688dc7feac8da9e433f0260e11d8f9c0e7d8,2024-11-21T03:21:33.353000
-CVE-2017-12340,0,0,7f1e6b991b70cb61fc4e499cda129687d50ada040bb77dac1c77b8546233fba7,2024-11-21T03:09:20.383000
-CVE-2017-12341,0,0,5f97571a2bbb5736626dccc0f3a7abca397b80cdd66c0fd7abf5cdc2441f8e1f,2024-11-21T03:09:20.500000
-CVE-2017-12342,0,0,fba022775280f12e03712833c1b11e2fc973dd850f2e07ff9d30dcb7efa3af07,2024-11-21T03:09:20.623000
-CVE-2017-12343,0,0,27100d1d215b9cd29e6f85b85ec0c09099821eaa016f37e02bd33172cb6b0f6d,2024-11-21T03:09:20.743000
-CVE-2017-12344,0,0,ab30e3750341dba1585c4319d3aab266e46ab4506e3642595f2c1efbdcb8c64c,2024-11-21T03:09:20.870000
-CVE-2017-12345,0,0,e582348218ef6d28c7d1758a26c883ecb3e03394fca57f18c62c110640e81a7f,2024-11-21T03:09:20.993000
-CVE-2017-12346,0,0,4a72c85ed369b27ecb9890c7ae4210a6a5aee9b60c9897145a8c65c8276a9401,2024-11-21T03:09:21.120000
-CVE-2017-12347,0,0,9599b0d48f3c3c882f0b9107385449a603f7534eb4f1dd66a7dbe08c9e4c1223,2024-11-21T03:09:21.240000
-CVE-2017-12348,0,0,eaeaa4951a5053bb4d0ad41f1e026816b04359233c6bd6d59cfa9c6b2eadebb4,2024-11-21T03:09:21.363000
-CVE-2017-12349,0,0,3ba5abe98b2ccae9789fd2b62bf82e7590560966d03ff8902714949e36ff50c8,2024-11-21T03:09:21.487000
+CVE-2017-12340,0,1,3b7ddaad49594c1e0b944eb0566d0385ebcaaf959303794c419217e0c89a362d,2024-11-21T03:09:20.383000
+CVE-2017-12341,0,1,e6827856de1e07ea52331ef51330a55342eb38ca8e2764c421c2cf2150420001,2024-11-21T03:09:20.500000
+CVE-2017-12342,0,1,f9b483a02c74c300c99f5c1f47e56fc306b59c3fc57a0fa9eab6a8a5e763f629,2024-11-21T03:09:20.623000
+CVE-2017-12343,0,1,b4d811d7f9d2a5c0f3db0d9591b3c837e80bc52f7e6aa84fb98d8a29d1dbc5b7,2024-11-21T03:09:20.743000
+CVE-2017-12344,0,1,d05691e181e1c4f6058a192d811ccc9e53b5da59dcd05ef20c83f99d96c4d045,2024-11-21T03:09:20.870000
+CVE-2017-12345,0,1,9f6892c4f0fafc5a98177432cc429b1e9ef8250e853b9e5bc29c05ba1b74e2bd,2024-11-21T03:09:20.993000
+CVE-2017-12346,0,1,c8419a40075ae22f33302194d194a927cffb601cc8377e814aff2506768026b2,2024-11-21T03:09:21.120000
+CVE-2017-12347,0,1,e0763275688125a6f81ef6531f0449dc1200a9854e39bc77ddd495a69296d8bc,2024-11-21T03:09:21.240000
+CVE-2017-12348,0,1,ae1896724c73e895113b22f34f43d58e87ece7be17f7d2857d75de2a238cc489,2024-11-21T03:09:21.363000
+CVE-2017-12349,0,1,89caf059a2935a0f0af50c498d0b9133a39f0c13a4f15d3b18d90c8f77d5bbcf,2024-11-21T03:09:21.487000
CVE-2017-1235,0,0,923b2ca2c7bce12234599d6f684f5d9645e382099b36dfd8f1dabcff04c6edca,2024-11-21T03:21:33.477000
-CVE-2017-12350,0,0,5f879f82da5beac85cd66ede95d19f4d674ba1ec00b9e9d1ea70a06d147e09c5,2024-11-21T03:09:21.610000
-CVE-2017-12351,0,0,cedcbef1f8b311bf8123081733708b7acdafc7fb1674e8b143953f8c0eb55a93,2024-11-21T03:09:21.730000
-CVE-2017-12352,0,0,6df9ded0111ef50d9f8a46a2ddb038ba0554b76a2816889dbc228cf9269ae6f4,2024-11-21T03:09:21.860000
-CVE-2017-12353,0,0,455240baa897293c4b520a8e38f5691dbf660345d3e4df160a715548f118eb62,2024-11-21T03:09:21.983000
-CVE-2017-12354,0,0,ae617d5e067a68dea0cdfd372922ff9c7cce2d6353ff6d0e0ac03afec3db579e,2024-11-21T03:09:22.103000
-CVE-2017-12355,0,0,b81657507a11863595939323274325fef26425ea810d4a3faa8eddcd9be97ee9,2024-11-21T03:09:22.223000
-CVE-2017-12356,0,0,15ad288f2e6f0bc7e2110cf3f4e74975e47670b891002e084b70f7fb48e9b33a,2024-11-21T03:09:22.357000
-CVE-2017-12357,0,0,22771675a0bc7529a05431c989880b8630ddc7a982e190dce5ecaba0d24a0e4d,2024-11-21T03:09:22.493000
-CVE-2017-12358,0,0,d31e7ba0d3d052283c43ef9809928988c463efce4195b112b6504c119b40c110,2024-11-21T03:09:22.617000
-CVE-2017-12359,0,0,6bd356948a7ad289cad1f9b8912173ac6dbde3f658e339a28a3676e82381e957,2024-11-21T03:09:22.757000
+CVE-2017-12350,0,1,90260fd2e4cff7df8b2efb7aff6fd84507eb6d82ced0359af1f19be253cb1e47,2024-11-21T03:09:21.610000
+CVE-2017-12351,0,1,502e04480fbb362f303e8ae5eb3d882dd21af25bd7b0d61cc6a53392a259e3e8,2024-11-21T03:09:21.730000
+CVE-2017-12352,0,1,5490d7680e7f013e68fe92d56d832dc5af10fb481c3389883a8cb2d70596b720,2024-11-21T03:09:21.860000
+CVE-2017-12353,0,1,b02f20eb7c258a944582c54b5a83e7dddebad1407be19aff29e1eb04ed11f195,2024-11-21T03:09:21.983000
+CVE-2017-12354,0,1,129842ce51b5d747ee895b68a9677375325767191754c9c6bf9e0f8ea1066c4a,2024-11-21T03:09:22.103000
+CVE-2017-12355,0,1,b437018e110d500e10baa844eb2a8bed3910f40bc1f95f400f0f581cd19c925a,2024-11-21T03:09:22.223000
+CVE-2017-12356,0,1,b3bb09238d34389876b8eed4f458f3eb0099127e9dcd546350143f5bf6c06eaa,2024-11-21T03:09:22.357000
+CVE-2017-12357,0,1,d084e5e879bdd3cee715de1533e9b0c8b463a751eea9277ae97f42dac508467c,2024-11-21T03:09:22.493000
+CVE-2017-12358,0,1,d2a21ff8f8c8d76fee16a330a435ef3070b718a88a2fde96c3370a24131eb308,2024-11-21T03:09:22.617000
+CVE-2017-12359,0,1,7af2ee15725b8e7658f301526ea830f84156349e223ec0bcb9d18a49bed9b157,2024-11-21T03:09:22.757000
CVE-2017-1236,0,0,deff98d495d32598a202e8604e52f875655a656cee976e78f30c859af4729142,2024-11-21T03:21:33.593000
-CVE-2017-12360,0,0,02a0e583106b21a4e09177b12da8f83c4728b242ec0eea8364ae90486036c03d,2024-11-21T03:09:22.907000
-CVE-2017-12361,0,0,76193d802347d533fd902a7134887e8e7a20427398866f284bfa025a96f7237c,2024-11-21T03:09:23.073000
-CVE-2017-12362,0,0,7dce342c4403ae384117fc508e655474702a43d34383d4a3ae05efe1b9f6496d,2024-11-21T03:09:23.200000
-CVE-2017-12363,0,0,970ed8af9179ea273ac3f7fecee8e5e19cff81619fbca00cf3f5dde111b7d1e3,2024-11-21T03:09:23.323000
-CVE-2017-12364,0,0,0f722f63a1cab25c8ae0252f80685674454c8b2659f38455173a285109693f01,2024-11-21T03:09:23.453000
-CVE-2017-12365,0,0,40980b0a1c107af4225f754fe2579ccb96029e391b78aa87c6916922452d3b5b,2024-11-21T03:09:23.577000
-CVE-2017-12366,0,0,60941fa186a143b73fc98712b9ec251a844de32288c0526b8cc1fa532c48da5f,2024-11-21T03:09:23.737000
-CVE-2017-12367,0,0,00d93aca0b577303c79a15cc911a54a4af1ee2bcb7cb397d7623b9d0a8d963ef,2024-11-21T03:09:23.853000
-CVE-2017-12368,0,0,cb013fd10da594c6fb44e9edf6e2af72731de2c1ff3c2521652e04b65a940b68,2024-11-21T03:09:23.970000
-CVE-2017-12369,0,0,578ce5e23fdc1a5b384cf44270875ced5775b4be35c3821a9018da7cfbf35f7c,2024-11-21T03:09:24.123000
+CVE-2017-12360,0,1,9d941f187b306d8889df145426da81a927267a767ab3f2b87afd70cf2a4e642f,2024-11-21T03:09:22.907000
+CVE-2017-12361,0,1,97a7f6c58138a30633d5ed731d353f6e98f9eb818e190953c167b19376815ad8,2024-11-21T03:09:23.073000
+CVE-2017-12362,0,1,ef411d6d1a9478e2f6fcc7c7f7646fadcf9038ce81e1cea4397b67986ba86cba,2024-11-21T03:09:23.200000
+CVE-2017-12363,0,1,a9136cfd73dc3de4c58686273abc528c0b9ab7634957737f321f9e28cef7f36b,2024-11-21T03:09:23.323000
+CVE-2017-12364,0,1,22b4517830925a29625e722a717d5f89b0840825a0811cd3b1435a62c5112126,2024-11-21T03:09:23.453000
+CVE-2017-12365,0,1,3edafdbd2609503f7d14096509b5e4e2de0d9e230dc53ae91775a8f90cc5f12b,2024-11-21T03:09:23.577000
+CVE-2017-12366,0,1,512383ba0cfde71d6edbcaa4aea56299f62c81f2fe8443a17db9ce2b3dfd596a,2024-11-21T03:09:23.737000
+CVE-2017-12367,0,1,bcbf282bf372fb6ff9250faccec15ab2069bfb407196acf47b9fcda617a35b99,2024-11-21T03:09:23.853000
+CVE-2017-12368,0,1,e46d81898efd1c8e985dc0f105695a7437f3bf8e737a12fac801cc2ad44d7ac2,2024-11-21T03:09:23.970000
+CVE-2017-12369,0,1,c81bff3782997e75d02349826ce3b4e7989b3c3752623371ced3de00a19a7743,2024-11-21T03:09:24.123000
CVE-2017-1237,0,0,565fe7c458e8c07cdffbc1e22e7193b6837af8058254afdc5e72460f8160ae41,2024-11-21T03:21:33.710000
-CVE-2017-12370,0,0,6d5adf960d17e5e15bbfabd891c11673e8f2356b155693523ba948c534dc9326,2024-11-21T03:09:24.240000
-CVE-2017-12371,0,0,0109e80ed6c87786183d9d68c9a7c74366f2ce9d516415addf34438b4cf9f6b4,2024-11-21T03:09:24.357000
-CVE-2017-12372,0,0,bf968341e575fdfd8aa9b73aa179b63cdb0c10a8d8106ac544a55665b7ff9a4f,2024-11-21T03:09:24.467000
-CVE-2017-12373,0,0,ffab72f857883642284259313f4379895f936d06335f7676d0ddb7256f56acc0,2024-11-21T03:09:24.577000
-CVE-2017-12374,0,0,a521b4cc7d339dd487a872d5c8f7baece30c9ccb87f6fb955a83c8ee78bc0c1a,2024-11-21T03:09:24.693000
-CVE-2017-12375,0,0,fb7ce68971ed2978930ef8a55fc6590f8499eb00169382782ba5bbc064f63b8d,2024-11-21T03:09:24.807000
-CVE-2017-12376,0,0,edd0c63a7ca2adfb09b26670cd68a954878a9c8416ab1e151a4ec0c9e8256fb0,2024-11-21T03:09:24.920000
-CVE-2017-12377,0,0,e1dd5e5c8bb00e24b8414650ba6c00d19826c5c5765d88e5f16db1fc2ba3482f,2024-11-21T03:09:25.030000
-CVE-2017-12378,0,0,3b26bb3ea37418faabb09ebbaa5474b6034af617c19e521bc4e2d56ee4f6be69,2024-11-21T03:09:25.143000
-CVE-2017-12379,0,0,eba6ec752501f5d73c76d9d8cb1c83478e7c54ab95577a7480b831bbff586aa7,2024-11-21T03:09:25.253000
+CVE-2017-12370,0,1,04b3075a0c0d99e14a3f16ea2fe0a0b8cc8ffcd7e56e512ee7dc80b524b7a734,2024-11-21T03:09:24.240000
+CVE-2017-12371,0,1,834499d819be29e6b8d07cc181d8d9deb06abb3ff651133c034833bc095a0a80,2024-11-21T03:09:24.357000
+CVE-2017-12372,0,1,c14509d63c64a5b61299408548a50a99d0302f981082d6059555baf11366b8d6,2024-11-21T03:09:24.467000
+CVE-2017-12373,0,1,f5b624ae91574b28f536a9dd34ae0782f481dc563b2ffc78be3db2ac5112464f,2024-11-21T03:09:24.577000
+CVE-2017-12374,0,1,65f116f0e3ad54f20fe16feacefce063caa2a0a3c00f4751231e7b653a1d0006,2024-11-21T03:09:24.693000
+CVE-2017-12375,0,1,fae3204cba44fd2fdea06908b2076e283fdf8a46b21867c7495fe9ed8897e331,2024-11-21T03:09:24.807000
+CVE-2017-12376,0,1,85731bdba6edf2ac8cc9b3e0491cf3f635e98922247643d28e46dcd3eeb34e5b,2024-11-21T03:09:24.920000
+CVE-2017-12377,0,1,b27d88b39c9f87209b2b44da95d3cb4dc255ca845c782dbc094b6c3cf333943f,2024-11-21T03:09:25.030000
+CVE-2017-12378,0,1,9a38856bbce6650d0ecdf40af0642f893017d5651208c08e5b0c047f2bd20df4,2024-11-21T03:09:25.143000
+CVE-2017-12379,0,1,6dda90ed772488ea97358aab84c4abf0b5447ddeeb7ab2cd67d1aaff2be09120,2024-11-21T03:09:25.253000
CVE-2017-1238,0,0,457780f8885da4ad7018ef98ee8ebac1e88742d18faacb5c44aa0bdbf7fae3e6,2024-11-21T03:21:33.847000
-CVE-2017-12380,0,0,f8f63d9261b3c0e7ee8a6f175d71f9ca502822cdb7865d1d66848874142a7e0d,2024-11-21T03:09:25.377000
+CVE-2017-12380,0,1,59aab3b68aa1fc0eab4038d67d6e01cf11189940afe52d4f154cb4f3913962dd,2024-11-21T03:09:25.377000
CVE-2017-1239,0,0,a237ef65d1cdf4c81c7b4476b3051900d3ecaf3e1309015cd5182c9b76e7ca60,2024-11-21T03:21:33.970000
CVE-2017-1240,0,0,8b306bf7c4a5a66cf6a3e5581bc74ac0f6407f98f28f63cab3c8999a766a1147,2024-11-21T03:21:34.083000
CVE-2017-1241,0,0,e0ba278d11aa2ae21f9e5293d902ad6f1e12520e08ed9bc0af4f5b9126b657e6,2024-11-21T03:21:34.217000
@@ -104180,104 +104180,104 @@ CVE-2017-3786,0,0,8b8a69fa4721cbfb7aea25c8d6009e95f85102219d7e2d463e2ef2a4f84603
CVE-2017-3787,0,0,6a177d3953b81301d3c640cdb285aef7c7aee2b15ac80165a6f7ea393495376b,2023-11-07T02:44:15.893000
CVE-2017-3788,0,0,b5a814a6035b3c7e72d20a5c8e4f13ac666908de994334b863f37394ba4873ca,2023-11-07T02:44:16.130000
CVE-2017-3789,0,0,4274fdb7ed3b78b4fb5d0e72a149252d83a4beedeaa2fab88c22ee37d39cf9a1,2023-11-07T02:44:16.397000
-CVE-2017-3790,0,0,9a38393841cc6ec52b078ed74fb8c36eee5515caf44a8fa9894bd126c2758f8e,2024-11-21T03:26:07.160000
-CVE-2017-3791,0,0,665d65ed8c3beae2b35eb6f24a34c2e8d3321399aea7ff9fd6e62ce82c5adcaf,2024-11-21T03:26:07.290000
-CVE-2017-3792,0,0,5e55ab99f286906c5538695b7ac7068d1c868d9112cb15d74f590e094ee7cbf1,2024-11-21T03:26:07.423000
-CVE-2017-3793,0,0,c21febc47800ff11416c8249eedaed4d70d090b55fadd34303e239547bd7cd83,2024-11-21T03:26:07.557000
-CVE-2017-3794,0,0,3450ff5f46f0545d014f8334a9c48049ee1504fc0b1c4f041a24d90dfd964255,2024-11-21T03:26:07.733000
-CVE-2017-3795,0,0,7f505f6310bedad566400edb1713bc300222987224b8432a88e94a7d13a48ab4,2024-11-21T03:26:07.857000
-CVE-2017-3796,0,0,4b8509c379b5fb25d870bcf372c6049ca2fac71b6f238bf0acc3f487beed2985,2024-11-21T03:26:07.973000
-CVE-2017-3797,0,0,25c51e7525fb34d9926212198104942a1cbd5623743d08894286a616dfed0d0c,2024-11-21T03:26:08.093000
-CVE-2017-3798,0,0,560412b80b2cf06c10ec0c195681f97a0ee4fd87a359245d4a74791c950d9b60,2024-11-21T03:26:08.210000
-CVE-2017-3799,0,0,c87e8202ec0354cc6a35d8f04235714605ff2b17eb72a391241a980973fd69b5,2024-11-21T03:26:08.323000
-CVE-2017-3800,0,0,14823bfe3875e7b49feb3adb8439fbba6a135814465d42445599ec8af18e4d72,2024-11-21T03:26:08.437000
-CVE-2017-3801,0,0,0ad5f012283ceb5ad55deb2f4cea33706cb1bf569e77f5bc51fa97f341c7ccc6,2024-11-21T03:26:08.550000
-CVE-2017-3802,0,0,21f6ff5f086ae8f6db1dc241f1c54b51444895783f1221ab125791afeb449935,2024-11-21T03:26:08.670000
-CVE-2017-3803,0,0,5428fae7e3dd466e498174b473fefca4560373c1ca7cee6fd7487733660fa850,2024-11-21T03:26:08.790000
-CVE-2017-3804,0,0,13bf2b42fd16469bf6f2d74fab1122d9b0f0179bdbd4c6cd27ebe4266dac60d5,2024-11-21T03:26:08.910000
-CVE-2017-3805,0,0,b68b5ba74d57acb74460b431e49356dd5ceacf41c88678a5241b224b72d36841,2024-11-21T03:26:09.023000
-CVE-2017-3806,0,0,ce3b18b876dbedd612cb3892889aae4e3148d34e96d463d2e360094167b1a9dd,2024-11-21T03:26:09.137000
-CVE-2017-3807,0,0,c71abcd0911c840350f3c0790549daea7e8ab4e6b871c4fb3e483c69e43aa18f,2024-11-21T03:26:09.250000
-CVE-2017-3808,0,0,554a519ef37b17c64c8d78e0935e98689736171ffc17fc809e7e7082bd1db4a4,2024-11-21T03:26:09.430000
-CVE-2017-3809,0,0,1e7443d27ba4da5300e2cbe02e456e5340a1ac66da7f62afc2b3a62a5c30f160,2024-11-26T16:09:02.407000
-CVE-2017-3810,0,0,f75782da76e04d594ce5905090f324ed443a970ac88bd153f858b4ce000a5b62,2024-11-21T03:26:09.680000
-CVE-2017-3811,0,0,4026b45618dc2a715149cb718bff3eeb898ac6f8cc8f58de7d19edf25ad52438,2024-11-21T03:26:09.790000
-CVE-2017-3812,0,0,ad37bfbc4712b785cac9c17d87c5afd44c6f137c16ed9550ffbe169737c46b0d,2024-11-21T03:26:09.900000
-CVE-2017-3813,0,0,eae4544e08dd51cfe290c95dbe03dae7474b8739cd762eb0d0cba429ea9d11d8,2024-11-21T03:26:10.020000
-CVE-2017-3814,0,0,48a396e6192849109231cfefeaffabf02ccec35ec92b8f4fd0a0478a6b9d1d4c,2024-11-26T16:09:02.407000
-CVE-2017-3815,0,0,c21f43ad027cceda61ae3dab73b27ba4ec9d7425d130ae16b5db4613aa632d32,2024-11-21T03:26:10.327000
-CVE-2017-3817,0,0,cc579146551ac109c5e8bf9fdc7003905f22b33e2c94f90e37ca8db7fe87acf7,2024-11-21T03:26:10.440000
-CVE-2017-3818,0,0,f05ba8aae9ce6c1b1d42131fe6639770ee40765fbdc176ea940678596f49bd05,2024-11-21T03:26:10.553000
-CVE-2017-3819,0,0,b8c4aa2ec8437bc7db93cdfe4f41145a8811bd58be345d288aa43f1c0580c580,2024-11-21T03:26:10.663000
-CVE-2017-3820,0,0,fa2d15d46a7e5fe18fd47a999a54c272bfee7d0eb0ac9531da9c8c153f40204c,2024-11-21T03:26:10.800000
-CVE-2017-3821,0,0,54795b7e53c765196dd528cd6b1a15705736c0076d7da03ff30f89c36d564246,2024-11-21T03:26:10.920000
-CVE-2017-3822,0,0,69fc3deff802c3d2189cf5a78e8aef8cbaba0c7eb0769becd2c51dc4045171e7,2024-11-21T03:26:11.033000
-CVE-2017-3823,0,0,c6c25a29a26dbc843e89c2c191d9fdddfd1eab96848ec9eb54724f03201fd041,2024-11-21T03:26:11.147000
-CVE-2017-3824,0,0,1ee868665f4b0e7f901696f318589c832bbe234e40f49885914d2c5d90cf5355,2024-11-21T03:26:11.287000
-CVE-2017-3825,0,0,8bf8e8790b4670b44b9cc16acf1422896904b36fa6ebb88f0981796fcf75d401,2024-11-21T03:26:11.413000
-CVE-2017-3826,0,0,f73f32ed2d6b2c333d85a72879af4b6cded9f03fd8474388df77ff4b3750ef34,2024-11-21T03:26:11.540000
-CVE-2017-3827,0,0,73cff206bb22ae07f6e6168aeffbba8ab584c6eed7d766c4f8b8d4b46d16a59f,2024-11-21T03:26:11.663000
-CVE-2017-3828,0,0,e3f9400065db07abceac903be48e6cacd8a7b184058a2695e4df06810c216452,2024-11-21T03:26:11.787000
-CVE-2017-3829,0,0,ac0989f2aff8fb6705a597299e5693a4db35946ae6598d782d6473635fc11106,2024-11-21T03:26:11.910000
-CVE-2017-3830,0,0,83453f26871c98eb2184c368fa3020010a601f45ef910b69777529100a2a490d,2024-11-21T03:26:12.023000
-CVE-2017-3831,0,0,c3d9dcfbf11cbc36186bcaabbd1f9cb474a00a6df8d048459f46f21bbc5986e1,2024-11-21T03:26:12.140000
-CVE-2017-3832,0,0,ea4d50e8ab29329da9895fca37e23a2d4890e6a24d3bac9017b2f610cf82987a,2024-11-21T03:26:12.270000
-CVE-2017-3833,0,0,cc18c3659b3cbd96891b0be9fc0d8af14fba073d9ac91510216ef37e592f0d17,2024-11-21T03:26:12.400000
-CVE-2017-3834,0,0,3681f0d5add8766a3d229486df2b9b713d7c19dd6358c6c13e99b9e55e499022,2024-11-21T03:26:12.523000
-CVE-2017-3835,0,0,b74f141e49527808d9a193bba23fe38cdc656e4507abb6ccac36f4f8a6cbbeb4,2024-11-21T03:26:12.650000
-CVE-2017-3836,0,0,f6c6e0fc9ac73d22e963c165a8fe2e6abea57b84022f6f95afad43c2bfaee811,2024-11-21T03:26:12.763000
-CVE-2017-3837,0,0,68f5b123cd8f83c5d5b8e5ffbd4a2f77c6e31c570bed398023c7acb8705eb194,2024-11-21T03:26:12.880000
-CVE-2017-3838,0,0,fe86fffd800ee8a3f2c437f748518013f1a13fd7623e42534c00837ca9262735,2024-11-21T03:26:12.993000
-CVE-2017-3839,0,0,4fdbf6645b9da25cf4ed8e4965b4d58ce9eed3fcdc540e560513be7e0a4c5057,2024-11-21T03:26:13.113000
-CVE-2017-3840,0,0,2fd1654e146e4afb679f9615d41aa325e6f95630c7d5f2bada1ff12f586a1266,2024-11-21T03:26:13.223000
-CVE-2017-3841,0,0,b4f58c1fcee93000f7d13302784ae41ad5394bf8db9a3b27ad98631fa6fcbf24,2024-11-21T03:26:13.333000
-CVE-2017-3842,0,0,97ce15724b672eb288d49ed1a218137d430ccd973f7cdbddbce389bf2509b41d,2024-11-21T03:26:13.447000
-CVE-2017-3843,0,0,1feae35f2d010bc57495561aeaf6460960c03ce71c14262e158888ce92d7bde0,2024-11-21T03:26:13.567000
-CVE-2017-3844,0,0,bc13e944a5529cba5cce947f5559f5f580843835082b955f2c780a68a9161e51,2024-11-21T03:26:13.693000
-CVE-2017-3845,0,0,3a88e3790bc672ea54d76a6cc5203bcf220d4b33fdf8921f8935aa714061c045,2024-11-21T03:26:13.803000
-CVE-2017-3846,0,0,c4d212e07372cea321d6237a3da7cc0ab06eebf36ce88bf3fa15d5d5b8ccfcf1,2024-11-21T03:26:13.937000
-CVE-2017-3847,0,0,5ff6eebc7e6da55bf1da73b366ed8331aecc3e6d3150c259d29277f2f2d51234,2024-11-26T16:09:02.407000
-CVE-2017-3848,0,0,672271e3c2c2eb5fc4eded8f8a4c74623ec8bbef71793d65be74f719f40faccc,2024-11-21T03:26:14.170000
-CVE-2017-3849,0,0,0d1c300381af28c8148d4af125336eb12403b6c5bfd810a681c3c3d4bf149bd5,2024-11-21T03:26:14.290000
-CVE-2017-3850,0,0,58ca3bb488541d4485c1c79bc120abdaf8a4b82a9f92fc3445f3d16d3a8bf023,2024-11-21T03:26:14.433000
-CVE-2017-3851,0,0,9c30efa74bde0b3a624ea9054f9e914a35ee784782ce2eb2b3a3bc44cd90af34,2024-11-21T03:26:14.587000
-CVE-2017-3852,0,0,a1c12a83b0b63cd9e160aaa6dad43bb76d32663735e325b4adef410af53cf9e8,2024-11-21T03:26:14.693000
-CVE-2017-3853,0,0,c378e302275d002299cff7f68ee6499d4f0d1719caefac95aa074b6f6dc27226,2024-11-21T03:26:14.820000
-CVE-2017-3854,0,0,733e7e469e091430ea0607a3eb608d7cee3b21e672ec17479ed8f2087c48fe82,2024-11-21T03:26:14.933000
-CVE-2017-3856,0,0,d51e9e7462237ac993c0cbe40d7377619b07ff0d8873ef88cd1a97484e85e368,2024-11-21T03:26:15.063000
-CVE-2017-3857,0,0,0d01cde69e837c36390caa310994f5c70fa2a9378ee315664197167c9e8a27b7,2024-11-21T03:26:15.210000
-CVE-2017-3858,0,0,6d2228faec97a2e440df0ebef6db1bd69428f73f2b356d8ee888cd031c56b07c,2024-11-21T03:26:15.390000
-CVE-2017-3859,0,0,865708e297b7cb18249b46de74202d7ba047c9c7566624777738c889552fa9a4,2024-11-21T03:26:15.523000
-CVE-2017-3860,0,0,1dd8cc5f459a3b35eac38209cb9c726c5b66917782e3c45cc86303bf3cde44e1,2024-11-21T03:26:15.660000
-CVE-2017-3861,0,0,20247fde71017ae29e4f8fad09d37dd2e7b5edc94e64dfd91338a43b4dc6304e,2024-11-21T03:26:15.823000
-CVE-2017-3862,0,0,c07b673ba2013cedf430773825411fdcb2e8fede5bd29dd83cf56074ca3ca445,2024-11-21T03:26:15.983000
-CVE-2017-3863,0,0,8ee81278906bff81ae2a3559a8d22186637e2e146a7e8a9aefab8e7d3087c6e9,2024-11-21T03:26:16.147000
-CVE-2017-3864,0,0,783fc35dffe47e5f813a3a5c530346cfb67e7b9461fedbab58a049a51d42795e,2024-11-21T03:26:16.307000
-CVE-2017-3865,0,0,38a0e90527d062be161b3013c816f53ec3b0da6243a8a61b41569da9a429d982,2024-11-21T03:26:16.433000
-CVE-2017-3866,0,0,b59d85f113b1fd15743289d32c7661e6bb7c718a19a9aadd49c44effb3f379a3,2024-11-21T03:26:16.550000
-CVE-2017-3867,0,0,9c148bf68e2c04c36ef482d12dd0037e79bf9985c3afbf54e99f2a837159ac76,2024-11-21T03:26:16.670000
-CVE-2017-3868,0,0,1495c357155e00953f2f2df341adf89bba0b4faf0edd32385fd4b9be699d36f1,2024-11-21T03:26:16.790000
-CVE-2017-3869,0,0,514e9b1a0f081ab49b71fe461414bafbdbd76afeea329994d62c7b6de2bec513,2024-11-21T03:26:16.903000
-CVE-2017-3870,0,0,bd74f8e7aee2b030fbd97775d90dadd90ffa4bbfd83ce2659c6f6b860f6ba49c,2024-11-21T03:26:17.017000
-CVE-2017-3871,0,0,0ef2867695758866f79e8e0becc6d3d5dcf0cf00659dd27f719c5ff38b5baf09,2024-11-21T03:26:17.140000
-CVE-2017-3872,0,0,4870ee15b3fc3635257d896cc086b06136b2949081785d2f40f484a07c18541b,2024-11-21T03:26:17.250000
-CVE-2017-3873,0,0,dac2d3b85e009bfe7fd0eb7f878fb0e7b51175b315161f6fd30307a91669c7c1,2024-11-21T03:26:17.363000
-CVE-2017-3874,0,0,7131a238f46f163fa247680bb3461fa7a7a5f5f880d682aaf8717cb616ba191a,2024-11-21T03:26:17.490000
-CVE-2017-3875,0,0,bf6892875c9841048506de095ae8d2fdf96b983a570b30a32a0cb7ce6dbc81ec,2024-11-21T03:26:17.600000
-CVE-2017-3876,0,0,c5baadba0c40c9d8f7081707a2e6b74288ba7e11c717a954a6fa9ed630f21df9,2024-11-21T03:26:17.723000
-CVE-2017-3877,0,0,bbad2e8092ea6e9be8f9da598ef2af7b27a8ffeaeaec831d1486b86fb6f7726c,2024-11-21T03:26:17.850000
-CVE-2017-3878,0,0,869fdd6fece64e542b4fc48428894e038f30c5f09d416e53358dcd7b792c463c,2024-11-21T03:26:17.967000
-CVE-2017-3879,0,0,83468b277f73040876285fcdc24cae6134d3adbd9008039db523bfcd349315dd,2024-11-21T03:26:18.090000
-CVE-2017-3880,0,0,282313186fc226260e4ca097b6b3959e88c3fff3d77c3fac47fb8c334041a217,2024-11-21T03:26:18.213000
-CVE-2017-3881,0,0,40ef8cf5d643a68063d3012289de9d030502f03f84ce53628d4c7c6bdcafc102,2024-11-21T03:26:18.337000
-CVE-2017-3882,0,0,290c7341d502f78e889261bc7917a1dcf02554f11bc6b2f020a64833f3846a18,2024-11-21T03:26:18.513000
-CVE-2017-3883,0,0,2c3986ee4db8d31011deceab8dc1a465ae2841c9d7269b09cf7aa3ec548ab421,2024-11-21T03:26:18.640000
-CVE-2017-3884,0,0,fdde79613d59baf14695630eb1bef7cc79ee53d78c4c664b5137c7fb0b0aedd1,2024-11-21T03:26:18.793000
-CVE-2017-3885,0,0,9f5782c4b3aea99c17d9accde9f6917ca47bcf8c01472cef197cee15ff17ca2a,2024-11-26T16:09:02.407000
-CVE-2017-3886,0,0,0e08dabb9db8f50425391feb3294e0e3cd577ec8822a8ccb7010d1d479b00b15,2024-11-21T03:26:19.030000
-CVE-2017-3887,0,0,e8205e9fdc8c927e73001f24f2a235b9da8591417e6cce39de152d4f4e6e8e99,2024-11-21T03:26:19.157000
-CVE-2017-3888,0,0,da64067385750019a3b999120b7e355b7e1cc48fa5908822a817b95463e6eeae,2024-11-21T03:26:19.277000
-CVE-2017-3889,0,0,c13fc1bf095b23b7f7469476de9dd55746fd150e63fc15c9b268a27b35c48b1f,2024-11-21T03:26:19.393000
+CVE-2017-3790,0,1,3ad7a64ca64e040e3f9e2ac4cbc5e39cdd4e8d521ad521cb5451271ef5222ce5,2024-11-21T03:26:07.160000
+CVE-2017-3791,0,1,1868b82d990bf3d0d37b978ad7ad75952f9c62679719cbaa354e4af89f9454b2,2024-11-21T03:26:07.290000
+CVE-2017-3792,0,1,94225fd904ed85ee481627c1b1e86bddff46af358a885b202d97bcce1ed49001,2024-11-21T03:26:07.423000
+CVE-2017-3793,0,1,782287a578d4012e82905080c789e267dca702163dd382c0182baa586ef3793a,2024-11-21T03:26:07.557000
+CVE-2017-3794,0,1,3ec961e6e9dc054ea13210ffabc724d18e2b7c224b19a0a5a5c7c8cdfef0c5fa,2024-11-21T03:26:07.733000
+CVE-2017-3795,0,1,5dc7952ed31cea62ceaee5f8ee30d90504adc6e92157cc3adfc2460dac85092c,2024-11-21T03:26:07.857000
+CVE-2017-3796,0,1,08b2e028544a42803695bbe80bcadad94338f6ee32e80d44681cef665dba8f0b,2024-11-21T03:26:07.973000
+CVE-2017-3797,0,1,9e8ce2a6bb781ea25a2e55d04dd46c05e37aa172749e55a85208d25a9a220e32,2024-11-21T03:26:08.093000
+CVE-2017-3798,0,1,4cc8471dc0b6afd841a30e1f447b9b28d1d0d5b3caff8b6f3c4a92db3e763d95,2024-11-21T03:26:08.210000
+CVE-2017-3799,0,1,8280ae4bc35852f86165f3f509bb2069a49f953ffe44947f51d114d91c45a6ca,2024-11-21T03:26:08.323000
+CVE-2017-3800,0,1,033068f3f7a476d0053867ebb2cbeec67b6193fc76f70f411e5924de296cfe26,2024-11-21T03:26:08.437000
+CVE-2017-3801,0,1,a98eba74a3e80ee2b2197628dd73383537e70582356d259cd92a1404956e7113,2024-11-21T03:26:08.550000
+CVE-2017-3802,0,1,d26e7f2bbe624143557d8afc8bc82312b0d609c891b2f22b94e3464a64b0d22c,2024-11-21T03:26:08.670000
+CVE-2017-3803,0,1,d9bd0fffff179e9f8eac845f6980bedb8d99fac2c7b07ea81a572c44121a7da7,2024-11-21T03:26:08.790000
+CVE-2017-3804,0,1,60fd0b65366e618c0a7de50d443dea63835df21b73dc17f65d07237a9bea3636,2024-11-21T03:26:08.910000
+CVE-2017-3805,0,1,114edfa2d2181d6121658a61265dd5a073403fd92750a0cd4913ac7f3d61b46d,2024-11-21T03:26:09.023000
+CVE-2017-3806,0,1,376344e83ddda163e0ff93596ea6ffd14952a0e5af2e60352ee3fdcacc8fbad2,2024-11-21T03:26:09.137000
+CVE-2017-3807,0,1,dc122300ddf917e8ccdbaf2f70d145eb754d69543be32366de6ac6b07934b0a1,2024-11-21T03:26:09.250000
+CVE-2017-3808,0,1,1014a7566adbcae0ba3a42d1834bcac7fda021205cceb41523f1bcd42d5a8982,2024-11-21T03:26:09.430000
+CVE-2017-3809,0,1,161287d6ae08085fd9f16fafdd17d108ccf986e2f4dd5484233a1a6e5f8bb313,2024-11-26T16:09:02.407000
+CVE-2017-3810,0,1,8b4decd4a3443c5fcdffb6052eb7b35fac7786758ded3fa67830d6a8298c94b1,2024-11-21T03:26:09.680000
+CVE-2017-3811,0,1,05f29e59e755a1f388e1d474d72d737be8e1102df6762622a78e50ff2fd3ba7c,2024-11-21T03:26:09.790000
+CVE-2017-3812,0,1,c0bda81495fd2b28ebeaac98492fa4c7073f95d12298c63940ed550e25a5130e,2024-11-21T03:26:09.900000
+CVE-2017-3813,0,1,67c5728cbe76b4e928268f3b1ebd7d5956804d2f8b8221f509b81fdaa421390c,2024-11-21T03:26:10.020000
+CVE-2017-3814,0,1,69732b94585a8afbc2c3159aeaae92363274e9492e79ea13307577652739b4bd,2024-11-26T16:09:02.407000
+CVE-2017-3815,0,1,e7b6afd1930fd2f364bba1e4b35c2f160bd7d0eb9ed4839601076b33b40005c8,2024-11-21T03:26:10.327000
+CVE-2017-3817,0,1,67a5484bb7cd84f1127d9620cf54976604a27a7b7d0b7fb138a7a28c68e4a256,2024-11-21T03:26:10.440000
+CVE-2017-3818,0,1,e0e109323d21a5e2dcfe2c6df7483fc0aa26c01605a9951c276eb37bc5332f1f,2024-11-21T03:26:10.553000
+CVE-2017-3819,0,1,e092ce88564f734c2e47e9f697910f58f1f2e7848422ee4f2f913a74c7c51c52,2024-11-21T03:26:10.663000
+CVE-2017-3820,0,1,774167a4b95f53d0f7ed446eae98b0c803f3b569709e846d2b17db74b77c0b7d,2024-11-21T03:26:10.800000
+CVE-2017-3821,0,1,52e1af17184a11dea891cfc03638b3d3fc7b019bf5d98e83de51d84b36a2c6f6,2024-11-21T03:26:10.920000
+CVE-2017-3822,0,1,3d70101733e65997254cbdc16c00f0e225758c717ddca6a971bad3e9c9fb42c7,2024-11-21T03:26:11.033000
+CVE-2017-3823,0,1,5a3cb780aa45af2a29b795ad26eb02f37826c01c174f681756938422c06f9d4f,2024-11-21T03:26:11.147000
+CVE-2017-3824,0,1,a1e088591ca69779bc4ff42a6503f2684a88610b1f680f7c3f68517514dbc101,2024-11-21T03:26:11.287000
+CVE-2017-3825,0,1,ce00f27d1d33a289be4ebcd36ce309862af01b426c018f41c90c9f39d5b57508,2024-11-21T03:26:11.413000
+CVE-2017-3826,0,1,22beea5cf54d45ea35846500884ad6dba35f9a95899e0b9b065015e3797ffc17,2024-11-21T03:26:11.540000
+CVE-2017-3827,0,1,4ed0e677e70670097b0fafccae52948ac3bd9b1c16172f35857b5de7c10a890d,2024-11-21T03:26:11.663000
+CVE-2017-3828,0,1,ffa0d7eb7425faf56588c6a787e01055eb491cf942f8b28da61288ce6b43ddcd,2024-11-21T03:26:11.787000
+CVE-2017-3829,0,1,30d6cea67cd953a27ee4664d18230d97a5c6bd6b11f0aa10711c8e13462b8ac8,2024-11-21T03:26:11.910000
+CVE-2017-3830,0,1,64429fb8fb3eb189c9cd8798d2649bb64d851606fcb9dc4c9b391152a50b0007,2024-11-21T03:26:12.023000
+CVE-2017-3831,0,1,54cdf355c7d911301bf7d9a6fb66ae2f7362ddc70363185d6754bc3e7d583c42,2024-11-21T03:26:12.140000
+CVE-2017-3832,0,1,61749a19f452be89dda9884d6a91aa2551c87671615058f38fbc05ee0f7fd66d,2024-11-21T03:26:12.270000
+CVE-2017-3833,0,1,2dddcc41ff0e570229a1c863cc7a80cb582d42b099ab58fedcb2c00e1817de1f,2024-11-21T03:26:12.400000
+CVE-2017-3834,0,1,0d0a95d4d95325f61592398e6ca6a8f0848271aecc64b4ccbd4dfe1b74cb0f3c,2024-11-21T03:26:12.523000
+CVE-2017-3835,0,1,dba240468a13a150c08bb27df31508b2de78d620617ef356e209653ad79fcce2,2024-11-21T03:26:12.650000
+CVE-2017-3836,0,1,950c8f7b5ac2796f5714a7f9c438e5ced27c3d2ea8cacfcbf8a9f465c0e4f864,2024-11-21T03:26:12.763000
+CVE-2017-3837,0,1,976ca4453837d09914c7146381eff0fcac3726f4006d2cfb20f103a90a6cbc63,2024-11-21T03:26:12.880000
+CVE-2017-3838,0,1,e80e5431c3ad12aecc3e5068b09b2a7afaee799013a045f9ae5722bd81c4661a,2024-11-21T03:26:12.993000
+CVE-2017-3839,0,1,bce1e859dcfb9dcf1228f9494b654487c0cea68bfe3c358a35245db8cf8214b4,2024-11-21T03:26:13.113000
+CVE-2017-3840,0,1,0306c08e23b7f89d322e7cc7b3409bb77c42ef71a5417db7e0343c9d7fd0d04b,2024-11-21T03:26:13.223000
+CVE-2017-3841,0,1,4b5c4b88f8610f06fb627e21de0e6be531e793a6da83a1cafd1d5f3ae7c582a6,2024-11-21T03:26:13.333000
+CVE-2017-3842,0,1,956853fff6a35a708b6da375b05c4ec2ed7564c745dd5b832e80617c5cb38080,2024-11-21T03:26:13.447000
+CVE-2017-3843,0,1,39a4e173abf249c6f7471362afe99b28826d0609c9eca61564f354c965d74b7d,2024-11-21T03:26:13.567000
+CVE-2017-3844,0,1,c04131327f4ead638c7c20246751c76123a12829fa4492b7e71a90ab65242bce,2024-11-21T03:26:13.693000
+CVE-2017-3845,0,1,be1aafdbb5e4eceecd37773e60eb7e3eeca7f42d039a08f72e8bad7cc551aae2,2024-11-21T03:26:13.803000
+CVE-2017-3846,0,1,ba59d48e41915026ea83950e8fcfe2b3d0cdcd4d150de04ef4cac2eb7c916109,2024-11-21T03:26:13.937000
+CVE-2017-3847,0,1,0f6320d050da0b8c91d7154999e472c8844a2279ca0c882bbcbfc47cce706f1b,2024-11-26T16:09:02.407000
+CVE-2017-3848,0,1,2f03b22d84eda6b1d30511dfbf26afcd1bbc8a976adee8071bb15b1d23e4ac98,2024-11-21T03:26:14.170000
+CVE-2017-3849,0,1,600c2100fd0357f48b8285a9fc3a7bbcef407e423e08a3688bee9975e5c39e7b,2024-11-21T03:26:14.290000
+CVE-2017-3850,0,1,067f7bb6017d1d6b6ff42441f621a3367445c532472e7d2f19efa366caa8c3b7,2024-11-21T03:26:14.433000
+CVE-2017-3851,0,1,bb4fe141bd2b7211f26f89a93ccca7dea024a4e6ef2a21797f0bb5875e4e6b7b,2024-11-21T03:26:14.587000
+CVE-2017-3852,0,1,2319a93ebff70a85deb1f9cff08941c1472675ae08e078e6b1e85c476e6c08b3,2024-11-21T03:26:14.693000
+CVE-2017-3853,0,1,b9b89325d2915186fea29eb7c3bb024b96c925e2d1525aeb7c1580dd1f8d8dbc,2024-11-21T03:26:14.820000
+CVE-2017-3854,0,1,45d5cb90d5ee9eca50ec7845e3fd946eb3ef70b37b02812b3a21afea5604bbb8,2024-11-21T03:26:14.933000
+CVE-2017-3856,0,1,ca0a8237b8e6a44454dec1fc9f179126e003ea1a05ca5c51eb4e1c07dd6d4618,2024-11-21T03:26:15.063000
+CVE-2017-3857,0,1,f48521539162d83bef48b70b6e9bb9e84239605b636e5385fa75033ef2180a94,2024-11-21T03:26:15.210000
+CVE-2017-3858,0,1,564a597ad63b6f53b63b978bd136a4e8f80ee540a76852650028bec24319f2d6,2024-11-21T03:26:15.390000
+CVE-2017-3859,0,1,b6ffec705fc8e8f7d150e918678f2a0716b0f0c1b6e058141720baa253061da8,2024-11-21T03:26:15.523000
+CVE-2017-3860,0,1,4184b05e044d3808c7d8edb1683e3db999a595118674ba44b1a32a3812b9769a,2024-11-21T03:26:15.660000
+CVE-2017-3861,0,1,58d83fa63955cf47542651c80f2ced951977279eda055f555e305aaf556309e3,2024-11-21T03:26:15.823000
+CVE-2017-3862,0,1,73db7ab4c77359a7ff1faac71d579b6011e5c818dd2df97a62135eff9c2ddbca,2024-11-21T03:26:15.983000
+CVE-2017-3863,0,1,38f8b9bf7e085bde63e87baf98e62c8a6e2c88160a8450050ce1997cf52e5df2,2024-11-21T03:26:16.147000
+CVE-2017-3864,0,1,dc6baf987bf41b983cf9140713e42e87f35f94d89f70ec8846eda4d96ee438a4,2024-11-21T03:26:16.307000
+CVE-2017-3865,0,1,b07883fe05bd927c94c3240ec63a3c1f95b4fab5f2645d35f950b0fac0a5b72f,2024-11-21T03:26:16.433000
+CVE-2017-3866,0,1,bb848345787200df397b16cd60b7e63319c70f2ea2c6a95a2d44f4d842692bb0,2024-11-21T03:26:16.550000
+CVE-2017-3867,0,1,f9cf8648017ef654e791f5cd1ab6f02ace525f2a49ac6082396b6048393cc221,2024-11-21T03:26:16.670000
+CVE-2017-3868,0,1,3b6d1f5c356c99398299b4d838268a5c6408255ed8c8f91d9d267c051cd019a0,2024-11-21T03:26:16.790000
+CVE-2017-3869,0,1,d7749f603b2b31fd1b17149213ede3a308ed1a16e0c5ea29dc9eb426eb947ddf,2024-11-21T03:26:16.903000
+CVE-2017-3870,0,1,6e42ef72df16580b3b574c87a66004adf2249d29653a77eeeb8fcd88174f87b6,2024-11-21T03:26:17.017000
+CVE-2017-3871,0,1,bdac6f5b9a0ecb3a3da58f01209a8c0e9093340db6b611f3cf07490f255cde6a,2024-11-21T03:26:17.140000
+CVE-2017-3872,0,1,2d6ef95992d2fbb5e430e7478d629d4e2bb6f70fc7642ae51996cf79c1314951,2024-11-21T03:26:17.250000
+CVE-2017-3873,0,1,41ad443826b42270b61b3df154574f065cc5d9ffaa0a25105a081154cd274764,2024-11-21T03:26:17.363000
+CVE-2017-3874,0,1,5eeca365d0eaefffa7d41ba5f8d753d18250f428152ec2ad83b21f0b3518a33b,2024-11-21T03:26:17.490000
+CVE-2017-3875,0,1,db974e96fca77c60f2ae6d8e5b7953171d5bd3fe67374d52e4ab750530828fab,2024-11-21T03:26:17.600000
+CVE-2017-3876,0,1,faf5208912689f083eee2467f133bf4aad18c834f3bbf9c73c079812ab4d70c3,2024-11-21T03:26:17.723000
+CVE-2017-3877,0,1,89305524d6710e38e7a4cd7dc75934cba10bdb398f3ddbc12beeb5e393222d76,2024-11-21T03:26:17.850000
+CVE-2017-3878,0,1,35f81ef6eed9528367c35d170230b4490e2647703a349cbba2941b5334c030ff,2024-11-21T03:26:17.967000
+CVE-2017-3879,0,1,32c30507154b0c35b5b4bf15fb3ccf87f2899f5dc418ff754053a791b732336f,2024-11-21T03:26:18.090000
+CVE-2017-3880,0,1,b07ae31f187ba3bad38a0e3ce2764014ade717432f6ee6bfc600b6d10ef22ea6,2024-11-21T03:26:18.213000
+CVE-2017-3881,0,1,7bcd4f0a41dcca1357c9be74f555f5981f73d4803de78cc3ca1dfccc3c4d4b3e,2024-11-21T03:26:18.337000
+CVE-2017-3882,0,1,8abb9d2cb2f093d8261f694582485bdaf5700ea2eec673d132e3a90207759c7e,2024-11-21T03:26:18.513000
+CVE-2017-3883,0,1,b1dd8dfa5f00f277cfbfc21db43405dcd4e149571939b2c61983118e983a6b75,2024-11-21T03:26:18.640000
+CVE-2017-3884,0,1,459a9a7f00ca7fffbd6872871a25f8e853576792bcd579cca307b937cc516f93,2024-11-21T03:26:18.793000
+CVE-2017-3885,0,1,6aef65c833828dc4637b66c49c2e95e3fc34ec313a922be88e251e99a858e993,2024-11-26T16:09:02.407000
+CVE-2017-3886,0,1,dd84438aa0d4079aec421cd784dfc25499a4a6180376fb4b55e1b7a7952a5933,2024-11-21T03:26:19.030000
+CVE-2017-3887,0,1,5d2f81f0213723fce4498c3dbe29a8a7c573a06d690a1ebe0acf90c80ce24132,2024-11-21T03:26:19.157000
+CVE-2017-3888,0,1,faf755e4cbd8733c45aebe51a23bbf654b5e204780ca3472d3fee74270cf277f,2024-11-21T03:26:19.277000
+CVE-2017-3889,0,1,484d21e6966d70814f2440d6919d3326e1b07111517ba183495e9bfc0006cfc2,2024-11-21T03:26:19.393000
CVE-2017-3890,0,0,41cc56ffdd0db8e871a04dbbf8eb41c26d076dd3d776415aaba64a4c06ca7442,2024-11-21T03:26:19.517000
CVE-2017-3891,0,0,44dfa2be4cd781a899985b4fff08a879e8913852589794595e13b5b09b441503,2024-11-21T03:26:19.643000
CVE-2017-3892,0,0,36319c35fd4f2cf0890e6c828300dad9657f8d9a9f88392c4df4b8d04d02c3a1,2024-11-21T03:26:19.763000
@@ -106708,200 +106708,200 @@ CVE-2017-6590,0,0,520068c6a82df7f011ad72c04ba1be895598c987c7436d6fbfacb2fc08093b
CVE-2017-6591,0,0,2e47e7569658e7edc6cab4d6c3776e7f3e938b913ab1ab26f5424e3265032bbd,2024-11-21T03:30:04.720000
CVE-2017-6594,0,0,82629cfec715d8c24feaf0e94eb6e73dfdf6f74d2f08434705cc69b808d5a9ea,2024-11-21T03:30:04.873000
CVE-2017-6596,0,0,8b704f1dff4dd577f6cf623221afad887c12b537f294d9274b822748a0cbd1c8,2024-11-21T03:30:05.033000
-CVE-2017-6597,0,0,68b5686cfb6ecd290bd0230845d4d830759ca3f2170312733118e43eca961657,2024-11-21T03:30:05.190000
-CVE-2017-6598,0,0,cd631fa76935dcbdc8a59c5b6da5faea9407b3fa5ee04f4447065b069b2fe291,2024-11-21T03:30:05.317000
-CVE-2017-6599,0,0,43ba6ba1865708d554bf395284c7706feebfb192575480d2ed0e429654f1b52a,2024-11-21T03:30:05.440000
-CVE-2017-6600,0,0,8b874b2baa88a754f271cebebe03652cc0c109d12981d505bf7a97f17e7d10fb,2024-11-21T03:30:05.563000
-CVE-2017-6601,0,0,5fd7dce6730e2637b9d47dfd0e274a30598d45d0c1e13dd5b64be2c58d3a1dcb,2024-11-21T03:30:05.687000
-CVE-2017-6602,0,0,6d72949f2b13d5d32abaac41f71db9b1ba8512c04a6073b5fc1b1ab98a55b063,2024-11-21T03:30:05.810000
-CVE-2017-6603,0,0,2e941e518245a4d088c150bfa4c23d04e20ed359356893744a8c05c115cc689f,2024-11-21T03:30:05.930000
-CVE-2017-6604,0,0,a7a041ac5ccab5a6cac7631d3c7eacd6ad8cbd6c34657e3525fe30977c7e4d66,2024-11-21T03:30:06.070000
-CVE-2017-6605,0,0,907260b569971d65480655f5b4b868d8246cff9bfff942cec569a740d041a986,2024-11-21T03:30:06.230000
-CVE-2017-6606,0,0,ed7c4fa1f50f70066f2043525928d6c32eedcad0b7ad9348039ff7c5562248a7,2024-11-21T03:30:06.363000
-CVE-2017-6607,0,0,b584e5212ae1e56635a33dca52719a547c88ebbaf2bf10fafe8e1ca24c330370,2024-11-21T03:30:06.503000
-CVE-2017-6608,0,0,9e5d7ee89dcf5fb715d7f6451890bd5769f1ee09e834a53bb26e7f9d961b516d,2024-11-21T03:30:06.670000
-CVE-2017-6609,0,0,b124fe10e93679dceb2846987e112c6dcd1e6eeffc41924238fa9a44ef82963e,2024-11-21T03:30:06.840000
-CVE-2017-6610,0,0,b1602e3b3513e2829fe7ae1ecb44e51b54e5215c7147d62cb7626645dcacbf71,2024-11-21T03:30:07.023000
-CVE-2017-6611,0,0,01958ba275f1a1a671eef3be5dd10daa6c8d5b239a824b4fcfd2f9275ce40aca,2024-11-21T03:30:07.207000
-CVE-2017-6612,0,0,9a910db2f16da991f3112e609714bb015fcbc98759ff0594a74db2604bc5cca6,2024-11-21T03:30:07.367000
-CVE-2017-6613,0,0,aa5a3884a1a53b220f60f6d07dd6d48a3f9acfadb26c19ff46c6895dfd89a65e,2024-11-21T03:30:07.547000
-CVE-2017-6614,0,0,b10310a4803d1182b56780e0444b63be02719c9ad62bb3fa07362c8db0d2a6c2,2024-11-21T03:30:07.703000
-CVE-2017-6615,0,0,74b424b5f2c3c5f0fcf80673f91ea83e20ea05695c6b0bf4a87a86bbbb19919a,2024-11-21T03:30:07.900000
-CVE-2017-6616,0,0,817de41dc33083d0877799e7d6ac0b9a3967843302df33ba0df1d797d4a553ca,2024-11-21T03:30:08.060000
-CVE-2017-6617,0,0,033e15dc0d1055bc46ea9e0266bf57ff2a15948ed6676e9c48bbb4f4fd63fc5f,2024-11-21T03:30:08.213000
-CVE-2017-6618,0,0,02e0eace59ed8843e5652d58cdc4e352518b831a2d39542786bed26be6bf3490,2024-11-21T03:30:08.360000
-CVE-2017-6619,0,0,f082715536c301f93eae79a16852fac773e9878fdfaacd724ae926d4fc7c82da,2024-11-21T03:30:08.530000
-CVE-2017-6620,0,0,56e1239478d0d933c07f558f719fd7edc4ef692b3d2bcde2ac24e7c5cd901cd4,2024-11-21T03:30:08.667000
-CVE-2017-6621,0,0,f7bce75822cc426027b273cf4034b306d8a78d2b7cda2c0d70f971d603b79e72,2024-11-21T03:30:08.817000
-CVE-2017-6622,0,0,34685d25bc5a4a1a0503bdc867d1ff8ade7cc6d3f4c122b54a3e0b9bc3237e9c,2024-11-21T03:30:08.967000
-CVE-2017-6623,0,0,46c6619b7240e5fd832906db61e3a28d5a48d11a69d2d3120cce2a86740695ab,2024-11-21T03:30:09.113000
-CVE-2017-6624,0,0,71759c3051c1a40da6aff44cf9afb8432419327cc143b729c12d30acf62b9441,2024-11-21T03:30:09.277000
-CVE-2017-6625,0,0,c7752f007a235b83c805d77c5651f46aa3f1f790f51df30a0673e0ef6c6c3d39,2024-11-21T03:30:09.410000
-CVE-2017-6626,0,0,ccc487d4aeb7217fec7ed5b5ed4c18793f6a17b43e2a503076586d6acc2c0a4a,2024-11-21T03:30:09.563000
-CVE-2017-6627,0,0,aa33e22627903091102ba8e90d6470c9775725ec9501b2a8430898452a6aa56a,2024-11-21T03:30:09.710000
-CVE-2017-6628,0,0,ecba55f3dae5a992e8200c1d6839d84d27d832c42ee1c8c12b1b603c94faa590,2024-11-21T03:30:09.880000
-CVE-2017-6629,0,0,2652c30334e23ec3fca827ae67d71a73562b7e7198789841119b85df738ee2b5,2024-11-21T03:30:10.017000
-CVE-2017-6630,0,0,62c71f67782d4c2c66f333c3f16607b1867b57bbc5a5cf20c1c2d3c3af130f24,2024-11-21T03:30:10.177000
-CVE-2017-6631,0,0,800114c9e23235d6bdaed5994be64780f8fd7b28a776d6a120288330843eeafe,2024-11-21T03:30:10.333000
-CVE-2017-6632,0,0,3589a07bc7d35ef764fe1beb068597058c404a1daf8a5f0bf3ea3b2e64bbb2a7,2024-11-21T03:30:10.513000
-CVE-2017-6633,0,0,e7eadfb49f4ed4f0bdf24a4dd66dc9c3e91a4a258ad1204c1af79d306255372a,2024-11-21T03:30:10.683000
-CVE-2017-6634,0,0,9425497badc91f345bf9bac70fc94516d7e89b301f8df9cfad84682ad080eb1d,2024-11-21T03:30:10.867000
-CVE-2017-6635,0,0,278f61d1ffe8a7c0dd0bb9299d682a3c972387e6db3a8f9e500d9a0dec5fd16a,2024-11-21T03:30:11.010000
-CVE-2017-6636,0,0,fad015c070285c9991a21079c456250bd01a053435ebb33064d77e702243587f,2024-11-21T03:30:11.163000
-CVE-2017-6637,0,0,706231c4adf9103495a970c00a50bf813c667118dc3090b915dc4b57e209fc51,2024-11-21T03:30:11.313000
-CVE-2017-6638,0,0,02058ce1fc8d7877841550f5aee428535b63d126390f3a09acd1cc02c28f3071,2024-11-21T03:30:11.473000
-CVE-2017-6639,0,0,094bacb25049b9afd247a68ea993873c3ec6516bcf3b5319ffa0e7e4418b2d43,2024-11-21T03:30:11.633000
-CVE-2017-6640,0,0,f153fc56bad2ffc0c79b8b3f39e344de141a990294dbb00015f615971c41c757,2024-11-21T03:30:11.793000
-CVE-2017-6641,0,0,597926d459ba58bd584578f09c67239699ceaca5b6a432288451c0e0b2a409fa,2024-11-21T03:30:11.943000
-CVE-2017-6642,0,0,62426fb424b0d710d3a7da9ac4f5fa1343e8888b1be6581dbf91161350f1e850,2024-11-21T03:30:12.093000
-CVE-2017-6643,0,0,7f76a4516f1454e135ac042469618f0c57b393119e2d9f9b94879eb45e0775bd,2024-11-21T03:30:12.247000
-CVE-2017-6644,0,0,0c72d86a6c8e841e99dd32e0164b45c8b4effbeae67066cb3ff854bfcaf7124d,2024-11-21T03:30:12.407000
-CVE-2017-6645,0,0,2331dc32ccf3d9667c7a8806890f6139cbabf348fe80d686920b15b4adf85ca6,2024-11-21T03:30:12.543000
-CVE-2017-6646,0,0,a81e05ee18da21bd8333f8b174464950dbf853cb26dd0f65d1a81b51f23d6bf3,2024-11-21T03:30:12.713000
-CVE-2017-6647,0,0,fc6dbf15dbabf7a9481f76d76e7271a365ccd5acc53322ad9e2524f7c296b40f,2024-11-21T03:30:12.857000
-CVE-2017-6648,0,0,19b6716b32a7d2bc698d326e13d47dbcfdf06c6557adc7c30d5d0e111c287e32,2024-11-21T03:30:13.017000
-CVE-2017-6649,0,0,74ec80d0d999300fabe43dde1400f5bf5dffa037f574496fe73dbef3cddf3d10,2024-11-21T03:30:13.183000
-CVE-2017-6650,0,0,1af1501174a9acd587f9ca4abf1a9a453d62b70a9b37838fe1d37f32601db2f2,2024-11-21T03:30:13.337000
-CVE-2017-6651,0,0,e5da75da594e084608ba627ce93c92f139abdf4bcd77fd4c484c1746599db0c7,2024-11-21T03:30:13.517000
-CVE-2017-6652,0,0,29ad43291bae6cf8e9c26b87dd87d47da16d3d259aa88e62c3338b6ebeecd701,2024-11-21T03:30:13.680000
-CVE-2017-6653,0,0,79d4df236846c56e6b62533afe553ffda618dee44643b46bb2e5f81c814d82e8,2024-11-21T03:30:13.827000
-CVE-2017-6654,0,0,07315362cc9488e66fd0fb76730d2c30d1edbf53f2423b6159740582221441b7,2024-11-21T03:30:13.980000
-CVE-2017-6655,0,0,2db912b824e59ffd05601cd17a39ddbeea3ecdd3de8358b4865e7bfae86aca8f,2024-11-21T03:30:14.127000
-CVE-2017-6656,0,0,b90e138fe4317ccf81058603f8e952b8f0edacbe25ef01f3db5be254dd604b63,2024-11-21T03:30:14.260000
-CVE-2017-6657,0,0,4d437fe44752e947398f7e4f32d59abfff4e34d9017ff39d1df7dd03f5fdf0c3,2024-11-21T03:30:14.403000
-CVE-2017-6658,0,0,41bd3c921a0885747947b7ce7e7a445d743af4337f210d55abb342db6c0b0ed0,2024-11-21T03:30:14.547000
-CVE-2017-6659,0,0,ed8da36d1b4116980794977d6bf32bf7abec8ff6bada0d9d60685d6522dfe0d7,2024-11-21T03:30:14.680000
-CVE-2017-6661,0,0,b15c9288fd4ab682250e4679a8c33c66d3976e2602e5cd423a39c8423dce623c,2024-11-21T03:30:14.820000
-CVE-2017-6662,0,0,4a0dbfc3878c39f8d5b14823ae375d5ac8f3b928fd0b6e0455cafe58cb05cd32,2024-11-21T03:30:14.960000
-CVE-2017-6663,0,0,004690e2546332b851635362eaab66ea4538320f68cd0497c93cf048fc6abdd4,2024-11-21T03:30:15.107000
-CVE-2017-6664,0,0,5943066143fe540b6fc18d04677f203ebc036087359dc2ea39c730b3eca00a10,2024-11-21T03:30:15.293000
-CVE-2017-6665,0,0,b1c7860215677ee5cd486bef6c9ac9ba00eb9a06f1f62283d9c806551182165c,2024-11-21T03:30:15.440000
-CVE-2017-6666,0,0,d56863e41fe32d21674fd8b8e6931f9a9d1af554036708bc7ca87024cf79833c,2024-11-21T03:30:15.650000
-CVE-2017-6667,0,0,41e1d57acce192b79d9a1afb5cdf9fd3f5930f805687c2eac2d2ccd0e67c68c7,2024-11-21T03:30:15.833000
-CVE-2017-6668,0,0,9f13b90605d7c12c58433e3da768316d1ed403657a29cf9968d73d0a88efc915,2024-11-21T03:30:15.983000
-CVE-2017-6669,0,0,3e25e77d0d9917a3f413c2aa79266dc00b8006eb22e7cce9ecf5b1d75b51789c,2024-11-21T03:30:16.123000
-CVE-2017-6670,0,0,6325e314cb18b3b8b5bbd8b9a20c40bc6930d1848fc31296628139bf6a147e5f,2024-11-21T03:30:16.277000
-CVE-2017-6671,0,0,901c43dec2c00f37a0b9c74d889b296b27646d5b6c518fe6461a113ddbbf7ec9,2024-11-21T03:30:16.420000
-CVE-2017-6672,0,0,a2ec2b81df09d227dca2260c7e65836696b1a591a1f8b78dcded7df508f859bc,2024-11-21T03:30:16.560000
-CVE-2017-6673,0,0,e7d33947bb356774bd2d280792a89f1a01ed4c6449625afa644b02bb82ba6409,2024-11-26T16:09:02.407000
-CVE-2017-6674,0,0,faa0127fefda9c8a1aa010972b87eee1cd0a2d351261f6a5c25c4a0c52f37037,2024-11-21T03:30:16.863000
-CVE-2017-6675,0,0,a3b7ea80eeb7fc88f2e691956be86374c5cc001a3bdc07dfe2929419052e32c3,2024-11-21T03:30:17.003000
-CVE-2017-6678,0,0,124a9abd5f447aaa0a9a26cc7dda5500d50df6ae349dde284a6e32cb448425ea,2024-11-21T03:30:17.157000
-CVE-2017-6679,0,0,c62c95450f4bfddd2a30f36e3fec3e2e826306ebe588a047148f09b2ae5c27bd,2024-11-21T03:30:17.310000
-CVE-2017-6680,0,0,5423bc2e3072a7e44cb77a5b8d2fbc8710e36bf033d37d2dca413f1d81f2b012,2024-11-21T03:30:17.463000
-CVE-2017-6681,0,0,a992bfef5ad6bfb1c9b6e71269396036986d5ab68dbef22d696783d9eb676d01,2024-11-21T03:30:17.593000
-CVE-2017-6682,0,0,fdf654163379bf290ad9e2f5d2009768623795bb432e18a77364b21105587cf3,2024-11-21T03:30:17.743000
-CVE-2017-6683,0,0,c1c5f73acabf6c528c17142841c8e46c0b9a0e50c01e4354299c4beebb6b40c1,2024-11-21T03:30:17.900000
-CVE-2017-6684,0,0,9130036f8777cfe0d877d2b780e4fdd11e9263dfe397af0e9e70ba7e8baf803e,2024-11-21T03:30:18.030000
-CVE-2017-6685,0,0,9fc6e7e80be111c40a1095927f7e0fa9316ef1fe17376566c8efc0d3bac190f2,2024-11-21T03:30:18.170000
-CVE-2017-6686,0,0,45747c96622476ff1780032a21cb5ef2f5e925ff63f5cad3aa50c08b07f7e051,2024-11-21T03:30:18.310000
-CVE-2017-6687,0,0,6b64a0085ac12cb5d11071dd5ed72563defc1e47a6cc8f12b3443df3fbaf063d,2024-11-21T03:30:18.453000
-CVE-2017-6688,0,0,853cd8129a9088a5597bf69191a525bce5e23f6f4bc5f93907b7b34dc561ebf4,2024-11-21T03:30:18.590000
-CVE-2017-6689,0,0,ffbfe756270dae638ff3aba950f14157f058677d77b77ede08abfc80caea7b8e,2024-11-21T03:30:18.710000
-CVE-2017-6690,0,0,f458de11566c40af33538b8ea118e2d7d7b629b9fb828627d97177da9c89c78a,2024-11-21T03:30:18.840000
-CVE-2017-6691,0,0,f6ef99a0ca6c0ef5b799f927c65dace87030870c0ec41bbf54365f0b64b99d1a,2024-11-21T03:30:18.977000
-CVE-2017-6692,0,0,422c4eec478b59c3d62c147b00fdf2f5303e7c1f92fdcab13b81da511d919246,2024-11-21T03:30:19.100000
-CVE-2017-6693,0,0,856a3604dfa59c3b4d67530b52145bc9fda7eff6655dae89f85d580c6d124782,2024-11-21T03:30:19.230000
-CVE-2017-6694,0,0,72c23b71451e91f6dea459fccab733b95dfa839b12e19985bb3a4d30053fbbbb,2024-11-21T03:30:19.347000
-CVE-2017-6695,0,0,67f6b4f80ba34ccfef3d967f894f027976492b700b7b08a723ef2b73d6e73be8,2024-11-21T03:30:19.460000
-CVE-2017-6696,0,0,576c07ffc2c6278f2b27952d6e1386286e66ebf787038d9ce877f6f8686fa72c,2024-11-21T03:30:19.593000
-CVE-2017-6697,0,0,caaf3b0ceeb1bb6664446bee7651a2d987d766cd3a3887f6c59f63528fdfbee0,2024-11-21T03:30:19.710000
-CVE-2017-6698,0,0,3881fc35ef3d4578cec1cba0d8590dbdeb14c949f820b8b92ed053fd8c5477f9,2024-11-21T03:30:19.840000
-CVE-2017-6699,0,0,65f900082ddb4f0124200e60dbd4bf46ce539c3dfc9dea42b64cb68908f80dcd,2024-11-21T03:30:19.957000
-CVE-2017-6700,0,0,814656cffe5c91b205102575ae992eddbae84d6516e8a4ce3daf2a876dc1242b,2024-11-21T03:30:20.077000
-CVE-2017-6701,0,0,88d255f3fec3e47bc492f4880474a44a651961dca05f708c10651a67d251d862,2024-11-21T03:30:20.223000
-CVE-2017-6702,0,0,563cbd4681ca9ed131ce00d8484c09afbf551a3a7d3db0108a4d1fbd8c790ac4,2024-11-21T03:30:20.340000
-CVE-2017-6703,0,0,c5ce3855a870ff83d6109a96272b535207fa8b2c578247e6a8df9b9f09ff419c,2024-11-21T03:30:20.457000
-CVE-2017-6704,0,0,fd5e2c76d25f983575ddfd593b1e69d5abb64f07d78e5cdce53a0092a5044fbe,2024-11-21T03:30:20.583000
-CVE-2017-6705,0,0,5fa69ebd554901661172cf53552728c973a79afcc82250924a54bf2bd547a252,2024-11-21T03:30:20.700000
-CVE-2017-6706,0,0,af501610e91b05926c8d119728af9adbe7e6eb8540f06b4f329f19dd1f121dd8,2024-11-21T03:30:20.813000
-CVE-2017-6707,0,0,0d592faa3c4bcea45d8bd8939bd4e2093f60f188c1ca466888e35ddebe9db0cd,2024-11-21T03:30:20.943000
-CVE-2017-6708,0,0,d1ceaeba31e7a257e6e5eab02c80c70ef75a2e320fa0a223c759300e40b3bfae,2024-11-21T03:30:21.080000
-CVE-2017-6709,0,0,e06812fb668a993d539bd55bed4a6ab3f8c9f0e51af6fd6f384f0980b35b5ea0,2024-11-21T03:30:21.213000
-CVE-2017-6710,0,0,7367d9a56791d721c8465f29de14e97f38cabf099bd4a9f8c3b00a40029d8d9e,2024-11-21T03:30:21.340000
-CVE-2017-6711,0,0,d7dee84f7dbeea833a1becc7b6196d32a73e4c79ca7f2d120dcabd71165e9527,2024-11-21T03:30:21.473000
-CVE-2017-6712,0,0,07164077acf8c11cea80f38a11fdc3ff4aefc54c55c82e0b637a32791fdd42b4,2024-11-21T03:30:21.613000
-CVE-2017-6713,0,0,546a452b6b20407156a1c7c347e3775f656822c02884642cc2ddb7cdf9c28217,2024-11-21T03:30:21.733000
-CVE-2017-6714,0,0,bf098f2f17e968fd9af215a3205ee210f216dd8a02b727db79046ce4e576ff37,2024-11-21T03:30:21.860000
-CVE-2017-6715,0,0,c115f4b41151b365ec25ac1406e3c8c0033c20cbd5c1d03f895a77588d7a0994,2024-11-26T16:09:02.407000
-CVE-2017-6716,0,0,1f1772d5eb578574795d357b49d241ced709dedb42057b6daa6b82a889df41ad,2024-11-26T16:09:02.407000
-CVE-2017-6717,0,0,598485dae27fd64b7b58002f62e3d45da3a34f2978fc1fbc34633fc643e772e7,2024-11-26T16:09:02.407000
-CVE-2017-6718,0,0,e81d5374a11bf8337954b1d2355fa9f37581a5c9047f7fcc4ac8d45b41543d72,2024-11-21T03:30:22.363000
-CVE-2017-6719,0,0,d9dbea8fe5d4c0bf90350a37d0734df0b196f0191374c3c799c13f1325be52cb,2024-11-21T03:30:22.487000
-CVE-2017-6720,0,0,bad84f4011ded81afee2e4dca142259ca78087dae1ebc10d10dd48dfbdcfdde5,2024-11-21T03:30:22.600000
-CVE-2017-6721,0,0,d65310abb6d3956545ce80af4e452a7364cfc71ae495737fb668d9b66995aa8f,2024-11-21T03:30:22.797000
-CVE-2017-6722,0,0,e376890915b77ae464fa780021e8bcdfda2de31b21645130f53ec71df2e0ee56,2024-11-21T03:30:22.930000
-CVE-2017-6724,0,0,3e0fab705ae0e817f6de80a72b555ed0ff6a9e75e6272defd0b64869996ed2ec,2024-11-21T03:30:23.057000
-CVE-2017-6725,0,0,ec71a7c39d921917b42afe3ccfa26f2bec4984761fec64daa6632181fe631bbe,2024-11-21T03:30:23.187000
-CVE-2017-6726,0,0,d4f9907990f7994ead1b86c35f1c062aafd665ccf1fdcd0a264dc862c0a31d28,2024-11-21T03:30:23.307000
-CVE-2017-6727,0,0,34a62f2b0dbb8edf0d99f97fe117919946b7bc6276ff271619065b7063b47f07,2024-11-21T03:30:23.420000
-CVE-2017-6728,0,0,a88c707044051065b34c813e5631461494dada7aec42932e86737ba40a919a4b,2024-11-21T03:30:23.547000
-CVE-2017-6729,0,0,37c9fc86bd8ad46fb34edc4aeb7f8b919033c86541eac90fcc68d197994d5720,2024-11-21T03:30:23.670000
-CVE-2017-6730,0,0,e206543e6012723a939777717384ef1cb7306bd4b5a6f2144512b5b1daff22e3,2024-11-21T03:30:23.830000
-CVE-2017-6731,0,0,08326c4a90b7de6b05057d7cde3ab69360b8dbc240450a847a5b0b3de71a8051,2024-11-21T03:30:23.963000
-CVE-2017-6732,0,0,e449d18ce6f0e4f4eac38b96c3d2d66d54f07c4ca4a73693763266118604bea9,2024-11-21T03:30:24.080000
-CVE-2017-6733,0,0,12281bc3fe34e5853661cb3bd250c771e4dae9cca52f1b1f182554e24492055b,2024-11-21T03:30:24.193000
-CVE-2017-6734,0,0,d9b2adc4e7eb6780e4d2115713a14f11526f090188dead83e62cc5f1bdfd0142,2024-11-21T03:30:24.307000
-CVE-2017-6735,0,0,9d32c7142761a02cc612b3679a7fbca4ffcc384fe02ad2998ca161d2cb2a6d6d,2024-11-21T03:30:24.450000
-CVE-2017-6736,0,0,c3207222d911eb7e777d4cbc9135c1f01f9a324eecb69948d71a42c1fbc4c290,2024-11-21T03:30:24.567000
-CVE-2017-6737,0,0,43e17a8501e336297bf58047e85f4d7117a35908607c2528a4c33e719edcaaa0,2024-11-21T03:30:24.723000
-CVE-2017-6738,0,0,9cc8a48d728859e21369b6f4451c1efa5fda5a0322ad217525541dbef9540502,2024-11-21T03:30:24.867000
-CVE-2017-6739,0,0,24054211043685689c0cf2539c975e72b2167d68fad4ae1077a29da84cea1216,2024-11-21T03:30:25.010000
-CVE-2017-6740,0,0,67aac77368db01ba58b38bc44a3eb1d11178528f78f4b15a840ec962f65c0513,2024-11-21T03:30:25.140000
-CVE-2017-6741,0,0,f8af4e0b5bac641d875dd63727ef3a015c71adea6c839db6fc84670137d7febc,2024-11-21T03:30:25.280000
-CVE-2017-6742,0,0,2e06429a9caa7ae6b8167a9a9ab2ccf57ced61ab237a965b25e2e11adeda4598,2024-11-21T03:30:25.427000
-CVE-2017-6743,0,0,e493a0e768cae47fec74d88e32e7e51042836765ffbb00bc23ebc0d4c24307e9,2024-11-21T03:30:25.573000
-CVE-2017-6744,0,0,2bf5de220a1158a38b5f63cef06fd6bab950dc2728209e927d33b53d17b28656,2024-11-21T03:30:25.710000
-CVE-2017-6745,0,0,1526c87d043fb2fb9aa97c34109289704f0d47421b47e9ce4b167a4f703f2c09,2024-11-21T03:30:26.103000
-CVE-2017-6746,0,0,710ec27660668acfac05fa03b9bd9ff545d24f927e908aa18ffac6e5f5dd0869,2024-11-21T03:30:26.230000
-CVE-2017-6747,0,0,711ba33714be9d957231cc5f9bc6ce7597a0c4f916253c9382b1889704dfbe9e,2024-11-21T03:30:26.350000
-CVE-2017-6748,0,0,e12376e272e854acfd7ac544b6a016ae9b86ec95741d984e8595ffc32f6cc856,2024-11-21T03:30:26.477000
-CVE-2017-6749,0,0,78b39c589d5d3f3a78e9876259d451eba3f31389276635e93bf761bdaff80b9e,2024-11-21T03:30:26.600000
-CVE-2017-6750,0,0,a904018322593e324902800d26193cd6e714415796f025f58e9ce05d72cde6ab,2024-11-21T03:30:26.727000
-CVE-2017-6751,0,0,55a2212e9e3821b06993981cc69203fc6cafcd713151c9cb962a5a26faf056c7,2024-11-21T03:30:26.850000
-CVE-2017-6752,0,0,5038222560443be052fe2ae6a08dcc60d271b346e4e494257bd10a14b4bcbdb8,2024-11-21T03:30:26.980000
-CVE-2017-6753,0,0,b935b23ea7d390ece69f4c125ebb30aa5be1e328d8d7a6c619f5dd14066eea5e,2024-11-21T03:30:27.107000
-CVE-2017-6754,0,0,43d7d59a210122a9e2684f3368f4991bcd2527e3e6b8ea242d1e8cdde4c7b34b,2024-11-21T03:30:27.253000
-CVE-2017-6755,0,0,c9e2a6d883ae6e72aa127995f556b0fa9e481bc777c43ed70eaeee609e60a5e1,2024-11-21T03:30:27.377000
-CVE-2017-6756,0,0,e5d81d17aa1c5ddf50fa12a1f405d997d15542e96871c4c8c7b5814c7aa8b1e2,2024-11-21T03:30:27.487000
-CVE-2017-6757,0,0,07fc2e6736567f648455fea306cd4ff2bc20e55294f3f1e1168955a16bbe0f65,2024-11-21T03:30:27.600000
-CVE-2017-6758,0,0,0397a361525b22192d824a6fc0a8511fc2879cf6115f0d5625b06c0229118c69,2024-11-21T03:30:27.733000
-CVE-2017-6759,0,0,9e626d1b534ae12efed0dc63f415ee35a22be8ca937f6cda0d32c3566158f005,2024-11-21T03:30:27.860000
-CVE-2017-6761,0,0,84b9a6112102aa1e28264577f4a6e623258092e10548163acb07a5b10b14ca67,2024-11-21T03:30:27.993000
-CVE-2017-6762,0,0,07e0ba69f7491320124ee5c6011fdb4b4fef863594a688230abb5d3400788698,2024-11-21T03:30:28.133000
-CVE-2017-6763,0,0,e6d63d9b3d3beb30bbf10a426d75c645f0e2a6d59713d246be0de9272f44a010,2024-11-21T03:30:28.253000
-CVE-2017-6764,0,0,32e2ff307439f009eb760895c82c9c1d70c705e6a07a2c246160beab4f6e5a68,2024-11-21T03:30:28.387000
-CVE-2017-6765,0,0,8190ebad8355aa137b8a37a81dbf9a1669e6873c07491e2afe1dbecb4d4f076d,2024-11-21T03:30:28.507000
-CVE-2017-6766,0,0,4a0f7246a96ec2dfe0522a911d23737245211a51fc6c5d22c4e113f13c555ccf,2024-11-21T03:30:28.630000
-CVE-2017-6767,0,0,60ebf3acafbe933af5501537185d4a7ecf859e247a03981a0cb2b3f97923c362,2024-11-21T03:30:28.760000
-CVE-2017-6768,0,0,a763ecd885c1cb5844fe43977bfe36602f29ff49933d1148279dffd92eb3732c,2024-11-21T03:30:28.883000
-CVE-2017-6769,0,0,5e7b4a21fd4529c244018baba34efe4d7d37690ab65d0c083f515b8a6ddd0cc6,2024-11-21T03:30:29.007000
-CVE-2017-6770,0,0,ea2f56d0f6e89cc25998ca91fc0ee0e9ffc9bd50445b98569bd5dd0ac51f4e61,2024-11-21T03:30:29.117000
-CVE-2017-6771,0,0,31a1881ae68bf9ed839535164936ee196e2791fa9e77cf334fff1101cb329e9b,2024-11-21T03:30:29.710000
-CVE-2017-6772,0,0,da66d6cc2553b4db91ece401ecf96a52a86e1367cf822e4e8b770912b0ad42f9,2024-11-21T03:30:29.830000
-CVE-2017-6773,0,0,266233c808abe8df61cd55dffc8493740d69fb998685419aefef2276de22b32d,2024-11-21T03:30:29.947000
-CVE-2017-6774,0,0,bf96def07f8d3e503bbaa1869e8f2b1653ae1ca2526efc1011fcd980fb321782,2024-11-21T03:30:30.070000
-CVE-2017-6775,0,0,144648e7a64d25195a91f6d6039063befe455f5f582cdc980079d75d197d29d0,2024-11-21T03:30:30.197000
-CVE-2017-6776,0,0,b083ac64478da0ac05ee51429a16b0f202bda530f47c5c811354651d6b477841,2024-11-21T03:30:30.323000
-CVE-2017-6777,0,0,916d4d30eaf9520a741faa79136bf4630df84daa9aca213af4e5bbf8ad492441,2024-11-21T03:30:30.443000
-CVE-2017-6778,0,0,2c1336a4d3cc44a580ad8dbe84beb6af179208b4bc32e021c164c5c5e9b65d81,2024-11-21T03:30:30.567000
-CVE-2017-6779,0,0,a08cfcf9e2bb5d368ab432833e51adc4b011acfccbddf51f12c7f76cc07147bf,2024-11-21T03:30:30.690000
-CVE-2017-6780,0,0,ec348bb37110492c7cbe2a4770d76de64d30f0c1c4f98dd465054d8e1a4f9f32,2024-11-21T03:30:30.833000
-CVE-2017-6781,0,0,8165585140f02c17f24e95e0a99a510ecb94a36cfe2f4956031c478e3f0b867d,2024-11-21T03:30:30.970000
-CVE-2017-6782,0,0,bfdb8c6200cc84b4e28227747714b0f45d67b5921173c35ad3c4fe949ee7b1a1,2024-11-21T03:30:31.100000
-CVE-2017-6783,0,0,6418637453a429073f2ba13532b3e8163a01816aec98d49fe90132e306707493,2024-11-21T03:30:31.243000
-CVE-2017-6784,0,0,b7bf6fff09d8833be79de114c3f955c01185f6275efc6def4b7ef6eb8f1da70b,2024-11-21T03:30:31.393000
-CVE-2017-6785,0,0,71a29d3950d22775854657083032b83d488643338781dfb58d3149741c5f1bd5,2024-11-21T03:30:31.527000
-CVE-2017-6786,0,0,6f6931d6c1bb640138d8d927cd80168c2c2ac984b4a6ba3c51e6c0e9ef9183e6,2024-11-21T03:30:31.647000
-CVE-2017-6788,0,0,f547a3b9e0a9019c4b4c1cbc9ffeba2f19fe0ed5cd7db80e683c10619dd36edb,2024-11-21T03:30:31.787000
-CVE-2017-6789,0,0,f1a9d7e1818056107f31f3cb930db86217eb49db06110417dc0a5226b119d38e,2024-11-21T03:30:31.913000
-CVE-2017-6790,0,0,9b531253d2793aad3842d634aaaf4f4c70db18f07a804297fb27b7ef95644a32,2024-11-21T03:30:32.043000
-CVE-2017-6791,0,0,e47481d6d00f61df79adaef5dacec95ce34054e7b8feb0c53d37705e13530636,2024-11-21T03:30:32.170000
-CVE-2017-6792,0,0,be8c9ae59a33aafd57119084fd0db814bc00f6807055530440e15570d0da65ef,2024-11-21T03:30:32.303000
-CVE-2017-6793,0,0,1a767e4c5adae1a10f74b01b13bca4b8a2bd33456e11c1049eadb247804c93ac,2024-11-21T03:30:32.427000
-CVE-2017-6794,0,0,7bbf96100a441028b64ce5cffc68e0b7256253f8c809aca613058470f26076b5,2024-11-21T03:30:32.560000
-CVE-2017-6795,0,0,2d19c563c60247d9994b05f1049ce9c49cf6f762faa29664e03670ea3892e47a,2024-11-21T03:30:32.697000
-CVE-2017-6796,0,0,43f120cfa6b4e416889479dfa64c3e9c3d44c9881b08a6cd678c60901ada75f1,2024-11-21T03:30:32.827000
+CVE-2017-6597,0,1,b72717f0d72380663874ad6209bef1a665a7539e76ed4b4b88a0c55f65c0b0e7,2024-11-21T03:30:05.190000
+CVE-2017-6598,0,1,232b6684b12358e370eaac042100a0e3565a6895c6044203e6464cb1e13928d3,2024-11-21T03:30:05.317000
+CVE-2017-6599,0,1,4c48f66155af71a77402c52c861b723189bc00f639e28d3109b251831a42a0cc,2024-11-21T03:30:05.440000
+CVE-2017-6600,0,1,5f8aaad4229d4926147624db47a50ce403116427e39ef8ec882ca1c3a4e90a78,2024-11-21T03:30:05.563000
+CVE-2017-6601,0,1,e71d3342b9c3472a65988274a40fc820669cbb4390ea7ba731b0de2010b274dc,2024-11-21T03:30:05.687000
+CVE-2017-6602,0,1,047f61b3e58834222378c00524d19ddb5f58fb29bf5b04cec235e6e351b84481,2024-11-21T03:30:05.810000
+CVE-2017-6603,0,1,f50b3643641e1ebe387e2e7ddf56816ca8c3391568e43b5922ed77ef40e17d04,2024-11-21T03:30:05.930000
+CVE-2017-6604,0,1,677742a9f04b36296074e82baedb8a7db328326212f24665a5a71219fcfd6920,2024-11-21T03:30:06.070000
+CVE-2017-6605,0,1,734294821ce338cfb4ccb7a72699c7bb362dc168bd9a650a2c1ea1c1ca651805,2024-11-21T03:30:06.230000
+CVE-2017-6606,0,1,01bc0f084387afb8fa861604849cb4935ae8b181355760130e70695b9d953357,2024-11-21T03:30:06.363000
+CVE-2017-6607,0,1,699263b7b706c329e316bc1887107801c349ff862a02260dcc94b5d0ad351054,2024-11-21T03:30:06.503000
+CVE-2017-6608,0,1,b34650487a9d9e6b62f59da1bcbd86253606434ce93ede899d6e33fa91307ed5,2024-11-21T03:30:06.670000
+CVE-2017-6609,0,1,dac497123e0aeb03ff33150ef140c43ba6879c30017e38f69da2ff0d5b1e1247,2024-11-21T03:30:06.840000
+CVE-2017-6610,0,1,82215da44920157597312cb9fddbd009e6d6f16100e8d242de4fda874facd403,2024-11-21T03:30:07.023000
+CVE-2017-6611,0,1,7551d74f90c020af08944388ac452deb4fb0aa4ea1e84ed94102356ff5cef7c7,2024-11-21T03:30:07.207000
+CVE-2017-6612,0,1,2cac18289282c8525cd9c1d51f5ea7fef7e31e0ee3f802788601917fc8f346ba,2024-11-21T03:30:07.367000
+CVE-2017-6613,0,1,bd0e30d00a53c7f30018a78f0e946778eb3dcf307c0394ca97a7396fd431b923,2024-11-21T03:30:07.547000
+CVE-2017-6614,0,1,22578b611b87f47cbf085f558a145370d89aacb18067e68853740da9e133233d,2024-11-21T03:30:07.703000
+CVE-2017-6615,0,1,3aebc5fa17840a7218c8299550ccbff9c83fadee692ed70357b748f338a05761,2024-11-21T03:30:07.900000
+CVE-2017-6616,0,1,62d8919e3a2e0c24f043951b0af1372481c2cccc0b72282cda655420df78d311,2024-11-21T03:30:08.060000
+CVE-2017-6617,0,1,c310b70204fd07993c47a4ae86131c1a0cd148c59270ff934002113898b8aed5,2024-11-21T03:30:08.213000
+CVE-2017-6618,0,1,ce009e4149528493d03fb9866131401adb0e78f43cfdabfc9f0358379030b031,2024-11-21T03:30:08.360000
+CVE-2017-6619,0,1,4b3828a6bbba9ad7820c63a9dced76a8cfdaecd4c564c159132b1bde305ad0c1,2024-11-21T03:30:08.530000
+CVE-2017-6620,0,1,f7ae3f5dc17807867b95cbcd8057b0f580ced57aec19d1dcc341fb027f8befdd,2024-11-21T03:30:08.667000
+CVE-2017-6621,0,1,769348552efdbe3405ef4a4cac16a74bac4e03ab757eb73b33e88991aadd7d28,2024-11-21T03:30:08.817000
+CVE-2017-6622,0,1,e8582d7f418dfb76ca398535b48d66cf14edc8b81d59b3cf7b9226712a28a35b,2024-11-21T03:30:08.967000
+CVE-2017-6623,0,1,6d4774620fcb83c6b322f8e1d664cb13e12d0a339eeb6b0b725e009e440595df,2024-11-21T03:30:09.113000
+CVE-2017-6624,0,1,f76268456841d80cf0030a8d263b6d566268d518ecb486b090483ba7d246d77f,2024-11-21T03:30:09.277000
+CVE-2017-6625,0,1,e0115d3c0a3799ef1ad77743639793bf6d16569e1012bfe831019e7e49a8a2df,2024-11-21T03:30:09.410000
+CVE-2017-6626,0,1,ce313182f2ec6a10b02eedf83ed19ee7e3f882c7f59df5eb663ef08dbd74085e,2024-11-21T03:30:09.563000
+CVE-2017-6627,0,1,33d1d6583e7cd9ab7b2b4ce163c89496da79e8ceb4e4670ac2cd5d93829349e6,2024-11-21T03:30:09.710000
+CVE-2017-6628,0,1,c54cd19471d8e65cdfbe6267dba07243fc81516dffcbd7dcbd8c7d61fc998130,2024-11-21T03:30:09.880000
+CVE-2017-6629,0,1,bcd1c0382e6b9f8f923c5d781e0213c3a9cb536c50a8931b0d178989ca79cca5,2024-11-21T03:30:10.017000
+CVE-2017-6630,0,1,f87e0f828fd9fd70cacf59f917a04aa6ef8fcaf453f9e8fc2011b9e59f1e3afb,2024-11-21T03:30:10.177000
+CVE-2017-6631,0,1,6b3ebb1fe8ac63acd233f436010fb72819e7d2025ad8d62c5d1485daf8e84406,2024-11-21T03:30:10.333000
+CVE-2017-6632,0,1,9b9878abc51dbc51cba0dc48c508d500c20a1a2f2fdbf6e4f779f011f8b37b2c,2024-11-21T03:30:10.513000
+CVE-2017-6633,0,1,ed122e7c68e15ee4bb0667aa0359a64f5c55f98b1b26900e499fad70bd0423c6,2024-11-21T03:30:10.683000
+CVE-2017-6634,0,1,37adee9ecb6154d45c7c92769731d8747d78865279272b8931f9b1cd57c7b377,2024-11-21T03:30:10.867000
+CVE-2017-6635,0,1,2b1bd0558060b6202fb6e7d283912e388702b33193b4b760daecc8f5c618775d,2024-11-21T03:30:11.010000
+CVE-2017-6636,0,1,921dc887818aab2569606244d749d13c8b70f1754d73ebdd0599ff53a9ce176c,2024-11-21T03:30:11.163000
+CVE-2017-6637,0,1,3b220380d1da7fdeae012a762ef47b69433f2f452cf5eae35caee26feadfd194,2024-11-21T03:30:11.313000
+CVE-2017-6638,0,1,1f6272d922641db34d234596845d29d7ba26f1550408463cc905e3a8ceab20e9,2024-11-21T03:30:11.473000
+CVE-2017-6639,0,1,1fec727cacec0ae7f904a893e011bba7b1f52b7813b726c8f9b3390e9caa1989,2024-11-21T03:30:11.633000
+CVE-2017-6640,0,1,001809a353eb86d0d66858d45fcc3fff13ce6fbbcd9d9836c8499baaed412c1f,2024-11-21T03:30:11.793000
+CVE-2017-6641,0,1,2c9cadb58b29b6ca6ffc850339ef0aff944b2f5069849ee4bc03d9dcc60f524d,2024-11-21T03:30:11.943000
+CVE-2017-6642,0,1,209827d8e9b6cc71b320e80c8e12683f8d44b4b109b348591c255b554c98c0e8,2024-11-21T03:30:12.093000
+CVE-2017-6643,0,1,93bb9bd7ef5c904852140f53de86bb742877e17977467249b5e8845b61590924,2024-11-21T03:30:12.247000
+CVE-2017-6644,0,1,a0a1447c03a8c5126b8e384def5ef64602ed735b66827b389322f4d7ef578157,2024-11-21T03:30:12.407000
+CVE-2017-6645,0,1,390ea52f58c41f3050a600d0feb90cd5e03ec380940c7cf798073f0af1988f27,2024-11-21T03:30:12.543000
+CVE-2017-6646,0,1,ecfec9d0db10f75e29a8f2eddf6bcb06b7eb07fdf263ed4e85021d6ed0426cf5,2024-11-21T03:30:12.713000
+CVE-2017-6647,0,1,eeb8fff4456b2ea29e58a5aa39cdc56155af0c93455f69671a6331e41d0e0a7c,2024-11-21T03:30:12.857000
+CVE-2017-6648,0,1,9fdf5b188ce43550b4ddebfa0e9f49772c893a50d5d4389f863e3607dd3e1073,2024-11-21T03:30:13.017000
+CVE-2017-6649,0,1,7655193488d5f2b5cae5bed77f48fd2a8076d2c9e0ea39121507b5fb4fc8e346,2024-11-21T03:30:13.183000
+CVE-2017-6650,0,1,8055fe1d9cb131013cd72e20c696bbdb31f770e63e49e2b457776b3bef0aa852,2024-11-21T03:30:13.337000
+CVE-2017-6651,0,1,36c2a736ce608be273e04dfacb0968242f45bcf2a1ef258f9c425d7b70ea0653,2024-11-21T03:30:13.517000
+CVE-2017-6652,0,1,05dd8d16240ade4603dc664c459bad53721cbb337064b735276c471d33dbd50b,2024-11-21T03:30:13.680000
+CVE-2017-6653,0,1,2b7c18c50c2ef25ee928559c2d7401d1182c9f23dddcbb2cfe0e63f857eb4ccf,2024-11-21T03:30:13.827000
+CVE-2017-6654,0,1,58f592e46c870bb3759e5b59e5103d2ece613b7154b78f8a264e5de1e6225f09,2024-11-21T03:30:13.980000
+CVE-2017-6655,0,1,0415866e94cd0a4fa5a189270147e7f4deb3d6921444e550c23de59b378c3d69,2024-11-21T03:30:14.127000
+CVE-2017-6656,0,1,8e38fef8f5cd9776783206cf34e5c46428a0773bb6a7efc4592a8b8e4c48b449,2024-11-21T03:30:14.260000
+CVE-2017-6657,0,1,3fc359d7c36a2904c918bb9ce7a51784bc4ae4cb919a44324462091cf024e926,2024-11-21T03:30:14.403000
+CVE-2017-6658,0,1,3b6bb6f51f6f23e010c7f750bdf0aebc00115e7b494a7d81fde94324a503fcfe,2024-11-21T03:30:14.547000
+CVE-2017-6659,0,1,284165f5fc9e75c0fc49c9392c1f7ba00a5d0ece6e8135901877dc5dcc2a24b1,2024-11-21T03:30:14.680000
+CVE-2017-6661,0,1,b0765e3e921f9f41c645fb064ff99e3b90499a074632508c02b61c4726ebdf54,2024-11-21T03:30:14.820000
+CVE-2017-6662,0,1,7c8f6806cf1487236ce815b75eb672d840b52393f90a63d8485cf6bdf23dbe4f,2024-11-21T03:30:14.960000
+CVE-2017-6663,0,1,556b5c4ce95b2ea1d8c3e924990c540e4c9f1966e2ca8c5edb7b3d5420283472,2024-11-21T03:30:15.107000
+CVE-2017-6664,0,1,bd78c98aa9961277ccd6d8ff1a0ede709d4fb899d1e41f5778e567b9f114e04e,2024-11-21T03:30:15.293000
+CVE-2017-6665,0,1,b3be70c1f6ff699e4e1edcf0fa933602c3bf00a6df840c92674d12111fbeb2df,2024-11-21T03:30:15.440000
+CVE-2017-6666,0,1,3d1019e1460279981e82c23c70b1d5b2726368dc05e78c200340eeb9396d3f68,2024-11-21T03:30:15.650000
+CVE-2017-6667,0,1,2056e22ee2c057200dffc6590c1c5ce8fb91cc666f097694d289dae6411f4141,2024-11-21T03:30:15.833000
+CVE-2017-6668,0,1,042a01fdd2d2ccea4677f4d34dc8ff2db522e066e175929638f880de72529b13,2024-11-21T03:30:15.983000
+CVE-2017-6669,0,1,18c5442cd944e03dbea9fbfc6f91b4b3e16d0c8e2ded09d24ffc79b8511029a4,2024-11-21T03:30:16.123000
+CVE-2017-6670,0,1,b0d54420475c9d3925fc550b9ecf0d1dadcb66d5e4662b076edc0e89ccace269,2024-11-21T03:30:16.277000
+CVE-2017-6671,0,1,cf6194ded1d4ca6c3e12e2ecffcba19d3aecab75df4a170c962a3e4aeb170f75,2024-11-21T03:30:16.420000
+CVE-2017-6672,0,1,4bd47bb7682570b95bcf8f3888849fa1276b1809134956687b578a07e271c158,2024-11-21T03:30:16.560000
+CVE-2017-6673,0,1,f97d44d1fc09c1ae94d1c187d41e1de2c67e1dd889a724f393db8258ddb42937,2024-11-26T16:09:02.407000
+CVE-2017-6674,0,1,c9c1242e2d2f8728a99bb8387cc5ef2974fbfc1cbdbac73f04e800a0d390dd24,2024-11-21T03:30:16.863000
+CVE-2017-6675,0,1,616a0afe38f5ee5e9032c660edd1c7ec5ab050781dbc67eea46a5efd38d4d8be,2024-11-21T03:30:17.003000
+CVE-2017-6678,0,1,ed27ef1638b66d4261ffc8e5c5b1a5b9045bdb8a4655ecd85584b188b5b9c6e6,2024-11-21T03:30:17.157000
+CVE-2017-6679,0,1,493f0e84169e923c25f07c5be369a68c60cec5cca7d156322398eb148cbf7f0f,2024-11-21T03:30:17.310000
+CVE-2017-6680,0,1,9a0f87c04e8ceabee19372d137a866899632e8b21ca47912b70ba4ad3dc1f2a4,2024-11-21T03:30:17.463000
+CVE-2017-6681,0,1,86e535c4817f8ed3571b71b639aa0a4d1777a0de03714624ec3017c192ea34c3,2024-11-21T03:30:17.593000
+CVE-2017-6682,0,1,659b9db596efc54352bb7b735bbe37444179c670caba3d91e1aaeb6c3586af90,2024-11-21T03:30:17.743000
+CVE-2017-6683,0,1,a2e53a66a518dc0f5e9aaa8a679ed8576a02a3f8c9d419bed847e1825249b0c6,2024-11-21T03:30:17.900000
+CVE-2017-6684,0,1,5aa8f4fe7a8777d13e7dbc8dbc959a3a602f6eb7f83fd6e532ac6b38f4c91845,2024-11-21T03:30:18.030000
+CVE-2017-6685,0,1,5aaaad2a33d3394804c78c8e4dae52babb430432b53ee5b06ce8a903dde3f5d9,2024-11-21T03:30:18.170000
+CVE-2017-6686,0,1,8b3a912c2fb32ed4359936053ac436902dda48ef1303f8dac3fd599354c1d1a2,2024-11-21T03:30:18.310000
+CVE-2017-6687,0,1,17590aaec6e5c8b87216b1f103211440e5fc7a35397d53ae88da429ab4d8504e,2024-11-21T03:30:18.453000
+CVE-2017-6688,0,1,06b7b7eeb8e8202b487868f1bcb636a353fb383930dccfbd1cb393a895869f43,2024-11-21T03:30:18.590000
+CVE-2017-6689,0,1,dc2517720699e31cb32bb9f69f22c676a39819efb759a5c9dc7e3d1eabae728f,2024-11-21T03:30:18.710000
+CVE-2017-6690,0,1,517ada025b223789adac42f2c8fb792ab6d4fb7fb5a0859dba8324f369cb844e,2024-11-21T03:30:18.840000
+CVE-2017-6691,0,1,0012b34bf7df7a47e604540028bd804abbcc75be5facc27b37297af8662b99d4,2024-11-21T03:30:18.977000
+CVE-2017-6692,0,1,a8990d2b9e00bb8d4a247648b913ced688f45332926790676f2549177ffb1b3a,2024-11-21T03:30:19.100000
+CVE-2017-6693,0,1,4470467b57cd7a5e5de2ab3d5672ab2dbec0d8c713d78b1a21ac8c45f31faf2d,2024-11-21T03:30:19.230000
+CVE-2017-6694,0,1,3b973ae3ad812512bd9bc43c8cfcabe64c21333962e85b1ba5f033477c5dd4a6,2024-11-21T03:30:19.347000
+CVE-2017-6695,0,1,0a8b405c6426a8381ba2ffeb0e3846b95e7588ee867dee8245b0bcc2c147e683,2024-11-21T03:30:19.460000
+CVE-2017-6696,0,1,3eb32fb706394b08df366723c286a54041157ecc2e346036992a499e8a1877cc,2024-11-21T03:30:19.593000
+CVE-2017-6697,0,1,d8ac1f3b9b213b91be89d87195b2fbf3b95d7024cfbf2c44b6e54e4884523b7b,2024-11-21T03:30:19.710000
+CVE-2017-6698,0,1,8123aa80c16f17ee3052c074355c42cded2097ac01dd94b1fa5326b0bfedabcf,2024-11-21T03:30:19.840000
+CVE-2017-6699,0,1,453c58d206adca3e80c59133724b79f67e60176ac8320a19a8470f8697261d52,2024-11-21T03:30:19.957000
+CVE-2017-6700,0,1,ff63ba2a2185c78104e72b0f504f4396815c4bb03553399f77d54278357c0471,2024-11-21T03:30:20.077000
+CVE-2017-6701,0,1,3a367a7eda8dd07c85b46ad64a15e27ef978de54ed5987a5b0a427e62c21061b,2024-11-21T03:30:20.223000
+CVE-2017-6702,0,1,12e791a410c19bb998321183adce9a59e433a1cf23052d63b77409a358c63652,2024-11-21T03:30:20.340000
+CVE-2017-6703,0,1,aafc51a5fac8b07fa32991b7efebd821623f6390b37a466c51972ab1e91addcd,2024-11-21T03:30:20.457000
+CVE-2017-6704,0,1,31ce1d49f827228445289c67cbc554ffd35b9b82e960782d58f3b0b49c658c69,2024-11-21T03:30:20.583000
+CVE-2017-6705,0,1,d7461324c5f958d99c23650ebf5422e69382cd56e3116d2e26f0e70a38c1e7c8,2024-11-21T03:30:20.700000
+CVE-2017-6706,0,1,3cb82e56af90e43faf6b7d9fee0b3c49bd902b2c93c6b3e0d9f93001c65fa01c,2024-11-21T03:30:20.813000
+CVE-2017-6707,0,1,0ec580ed1090cb8618a236cf03297093c074cbdc193f64d6ffe6f52c3546728a,2024-11-21T03:30:20.943000
+CVE-2017-6708,0,1,979bdacda9a3411b8118bdeeaa8462fff9d5166deb7f8de3c7cfc73a019cba9e,2024-11-21T03:30:21.080000
+CVE-2017-6709,0,1,a04ddba3d80438e133208c6a37b507afeed4009b2388cfe136015b43ee1d0968,2024-11-21T03:30:21.213000
+CVE-2017-6710,0,1,5efd1ad6131822eed2d355d54221fe8efad2883f0c19283aeeafda0fbe9f65cd,2024-11-21T03:30:21.340000
+CVE-2017-6711,0,1,6d9a155ef26b65cdaca89bd9052dfb23ea4c9be2ecce20be2748920f676ebc80,2024-11-21T03:30:21.473000
+CVE-2017-6712,0,1,bedd777a0d2c1dee6f784f5e0b3167f778c52d740d986f3c758f52f72d69e9c1,2024-11-21T03:30:21.613000
+CVE-2017-6713,0,1,0cc3413cc5a4af8f418bad3e4f2d7521bb80d9aa950383ebf9593a1842d6a6ba,2024-11-21T03:30:21.733000
+CVE-2017-6714,0,1,ced4591e24d58f6866d11eb1238aeb35564746b0329d1f163c9560f098fed8b7,2024-11-21T03:30:21.860000
+CVE-2017-6715,0,1,5fc80052836058f6fb235bd96a7f4398d610b88b2eb570148cc9e4e1fbb030a5,2024-11-26T16:09:02.407000
+CVE-2017-6716,0,1,1a93d7c819ef21087e4fc2b15b811561969f41dbd05fd7258c7935e3cdd2b114,2024-11-26T16:09:02.407000
+CVE-2017-6717,0,1,646c7c6965fd8262a1a4e76087574a3b9eecbd35a28e4c86f0ec9be83265ee5b,2024-11-26T16:09:02.407000
+CVE-2017-6718,0,1,d5725eaa604a16c12e88b7b499bc647e961ac4063262842cf347b2103cb0e7db,2024-11-21T03:30:22.363000
+CVE-2017-6719,0,1,0313ef40f56489ed359e9247c8cf0a90321742f8f8a85941944b6d465cdba1ba,2024-11-21T03:30:22.487000
+CVE-2017-6720,0,1,50afef6abddca6a54b602fcc022f5dba4aa351eef532ea25b0e6bb19870ba807,2024-11-21T03:30:22.600000
+CVE-2017-6721,0,1,e1eaa5899cd435b3cefc9604255684d380b86e34d285ec0a5549f886e3088968,2024-11-21T03:30:22.797000
+CVE-2017-6722,0,1,7a3e3fd14bc660f7862b3f28f7aea484ee77523bd4c6ee25bd6ee6a75408c6a1,2024-11-21T03:30:22.930000
+CVE-2017-6724,0,1,08b15c7f7c1e111563f75eb4e214f7914f04d8546963000f89bd4d19667fa2cf,2024-11-21T03:30:23.057000
+CVE-2017-6725,0,1,6f4c550a1bd00a999d4b2dc062fb31a957598cce3d29792df299b1ddb9dd98a7,2024-11-21T03:30:23.187000
+CVE-2017-6726,0,1,2f03cb008a7208fd4584b40f9126cbe3e3cc05a2e5e2d6d5be02f4eddc54e465,2024-11-21T03:30:23.307000
+CVE-2017-6727,0,1,1d1b038cf401ce023b572bf40fee9669a66549e2b64845441c077d178786f8e0,2024-11-21T03:30:23.420000
+CVE-2017-6728,0,1,d9fc017d3f054ead1847fea35a6ba441f37a040b68802d05404ac40c3b386832,2024-11-21T03:30:23.547000
+CVE-2017-6729,0,1,6c01be8bc5349cc15b90dd09313874de21b0517dbe04c28bde0f22905e9b8099,2024-11-21T03:30:23.670000
+CVE-2017-6730,0,1,4393e63c574a31c52550a8bc3301224978e4304bd117b9acff6f3931cf1d90bc,2024-11-21T03:30:23.830000
+CVE-2017-6731,0,1,12acf9f0008f2308d20cf87e5edffe4ab712fb230c90b8f4d8d41d565574c001,2024-11-21T03:30:23.963000
+CVE-2017-6732,0,1,cca57bd88a78791bb8faed26a0b036f8671b523845644c168890faee49153ded,2024-11-21T03:30:24.080000
+CVE-2017-6733,0,1,f7d6d7170aacd6eb30659e1d59ba22d21edf59406c58848c001baf7661dd75f8,2024-11-21T03:30:24.193000
+CVE-2017-6734,0,1,6e8a4513dcb5dabcf217f3419c1402ae24df0d175c35fc240a33a107002c25e0,2024-11-21T03:30:24.307000
+CVE-2017-6735,0,1,efd5a9da2bb9d8afe6c6d3a1c0291b40f80cc626e31f66589fb37a50e66c8ef0,2024-11-21T03:30:24.450000
+CVE-2017-6736,0,1,9cc158ca4d2f689a52781cb3cbf2cb2e44b596724cb35fa8c227f6ee3b568a09,2024-11-21T03:30:24.567000
+CVE-2017-6737,0,1,a3c6cb1750cfefed53944c3aab70141d6fd8dfd6aee31b95674aa5d544007332,2024-11-21T03:30:24.723000
+CVE-2017-6738,0,1,0a2df00735708014428c12a68d6e45fa31d152f442bd3f164343e72884d1a885,2024-11-21T03:30:24.867000
+CVE-2017-6739,0,1,84545f22c1135d888d86a1340ffc25aebbd4564840247cb07f1e97b74272778d,2024-11-21T03:30:25.010000
+CVE-2017-6740,0,1,67520fbac09b07c53131a80d36e365e6b4ad2bd0cd3eb713c3c68fd32b527907,2024-11-21T03:30:25.140000
+CVE-2017-6741,0,1,4ee950b346f180cd1b6ded67583fbef0635dd2fd6e5ac7341a08f3ea36efcf31,2024-11-21T03:30:25.280000
+CVE-2017-6742,0,1,a7aabb4930b56359809720d9b445c07817f493b0453b234c7f20252a6e64ca7f,2024-11-21T03:30:25.427000
+CVE-2017-6743,0,1,a5cb859c878b684f3eb9a8cf832fdc208eceb57c78cf1348d34ebafd8d98ff54,2024-11-21T03:30:25.573000
+CVE-2017-6744,0,1,a9744b0f08380c38054021dbee81f994a510b489f645bc965f9d9fbf13d26ac7,2024-11-21T03:30:25.710000
+CVE-2017-6745,0,1,70cd2743432f5d445bfde32d73cb1e75de596af531db3f189a288801ddb97040,2024-11-21T03:30:26.103000
+CVE-2017-6746,0,1,83890a40ff162d3136a563fc4394e25d1f1670bc83055d63f2e14e2322b719e9,2024-11-21T03:30:26.230000
+CVE-2017-6747,0,1,cc87fca71f09a665941311d96678411db2b2c57d1291a31e7f6904d233be28b7,2024-11-21T03:30:26.350000
+CVE-2017-6748,0,1,54f284dcb5a47b8eaaeb88284a83d095942dad7e4fbca5119007c1555942f802,2024-11-21T03:30:26.477000
+CVE-2017-6749,0,1,1d2b59465979895601abc989b42c7be727958978a111bfd11faac46f2f93d014,2024-11-21T03:30:26.600000
+CVE-2017-6750,0,1,26ec3fc05badcb47e5c5aa2a6ab4872fab78c7c40f754ea0e4f72af1dcf6f0e6,2024-11-21T03:30:26.727000
+CVE-2017-6751,0,1,3e8245b4547865258f223ad8a973d2589ef7c675d870ced8e1a76b372de19965,2024-11-21T03:30:26.850000
+CVE-2017-6752,0,1,9684aa5191e78b86cd3ee6a9fa254d7a3b4c10a77f0c113fbd22c9e37e4fe6a0,2024-11-21T03:30:26.980000
+CVE-2017-6753,0,1,c0b0334b7f1bd466253e6a979d8fd54a735dfe0ec0303b67e361da0760ebf055,2024-11-21T03:30:27.107000
+CVE-2017-6754,0,1,f0c5312ccd1ebc494ac3dc0552a672a5b687ce6c346b6df6b78fc281893e0845,2024-11-21T03:30:27.253000
+CVE-2017-6755,0,1,c9d7023741973f7b3a7ff4f6f749920641b6ef37d116dbfeb00245cc8ca31db7,2024-11-21T03:30:27.377000
+CVE-2017-6756,0,1,f86a4eb935ab2fe14fe14c0ff841709e6bb1e7bb755e8b85f9c5d2a92864761e,2024-11-21T03:30:27.487000
+CVE-2017-6757,0,1,13dd101d455dac76c5d353f6467a3f931c18dbfdea524b7406587aeafd3bcceb,2024-11-21T03:30:27.600000
+CVE-2017-6758,0,1,19e9e93dc8fad8eeca4860e274f6d5baa54df5479b0dba7bf309accc50753156,2024-11-21T03:30:27.733000
+CVE-2017-6759,0,1,91e40e1aeeff880f88b661de07870649cc7d8cff608a145a5b7b9cf4911c2aaa,2024-11-21T03:30:27.860000
+CVE-2017-6761,0,1,59622e2e1dc833ade7599bad63bd5781d6459d3e5f8d71cc4b777c29df7e9859,2024-11-21T03:30:27.993000
+CVE-2017-6762,0,1,d4b394b0deb7a8592e8e232eabca2398ff803c55e8dc543a2ff5c21484f9d91e,2024-11-21T03:30:28.133000
+CVE-2017-6763,0,1,71d380560f86642335634c8db8f41fa649ec53027ad1a76af94c48dada6620a3,2024-11-21T03:30:28.253000
+CVE-2017-6764,0,1,98ac35af5d26b731f81b5810d284ee3a234c9347f00ad0f0ad2f881e3d93dbd1,2024-11-21T03:30:28.387000
+CVE-2017-6765,0,1,326ae13dc9271b4677e3e6503d76a54101ca14725278b2b245ef7dabe38dd39e,2024-11-21T03:30:28.507000
+CVE-2017-6766,0,1,99c831a93b5f6368edfcd5a768984857cd5c3f62d232544447bc551a673fd402,2024-11-21T03:30:28.630000
+CVE-2017-6767,0,1,44192ffb66c355ad061eb69377e40a86a20715049276f50c24625d71a26ecbb9,2024-11-21T03:30:28.760000
+CVE-2017-6768,0,1,4590537c30cbf1b86c01684ff9ef558e2f75ce1b01e0ef673d73a19eee071385,2024-11-21T03:30:28.883000
+CVE-2017-6769,0,1,9d230e7ede0f746c1069647300bc77ee3075781993b5983fe3749654bee01654,2024-11-21T03:30:29.007000
+CVE-2017-6770,0,1,5393cd3144f41e67043484f3fafa49381bac105c3350cfc2b97082d8d7013103,2024-11-21T03:30:29.117000
+CVE-2017-6771,0,1,62a10b3dc2a89a650d6b55ee3aa0b056f2c649bea2bdc5a99fdf846108c344a9,2024-11-21T03:30:29.710000
+CVE-2017-6772,0,1,aded20bee14ac6170abca7ca1627f85ba6dcb17ec6dab0c04ac71f8608da2fca,2024-11-21T03:30:29.830000
+CVE-2017-6773,0,1,364d63aa2804b940a31c1cf73aee1ec9da096b540b949927891a5e6fffa25548,2024-11-21T03:30:29.947000
+CVE-2017-6774,0,1,b15cb3524f89b9d1a607004b5a3925e407ca146d7ff118d7b55392ecacfa94d7,2024-11-21T03:30:30.070000
+CVE-2017-6775,0,1,2e4f00ea4d2564a180f8dc63fa7af5bc75f108090453b0aa1cf9e8d2f93ce9be,2024-11-21T03:30:30.197000
+CVE-2017-6776,0,1,dc927b0c763a3311bc79d5099199b9cca1816707735364f1bce01fa2d45fbd42,2024-11-21T03:30:30.323000
+CVE-2017-6777,0,1,a19d2a35390bfd9dbec2ecc9dee30b83bb6fd9c5dd7a1fd37161a6d4a895bc7f,2024-11-21T03:30:30.443000
+CVE-2017-6778,0,1,be9a7c605d3bea07597396102a3bb772882c9b739360d3e2d97b01d629d21c2a,2024-11-21T03:30:30.567000
+CVE-2017-6779,0,1,deda82ef42a43eb6ea710ed571f0a9fe50993b0af0489e7dc837adedd4fff0db,2024-11-21T03:30:30.690000
+CVE-2017-6780,0,1,7093beef08a569a483ee75b1d931e9105bf927c8bc1ad7729d1d8d9f539bb12d,2024-11-21T03:30:30.833000
+CVE-2017-6781,0,1,986464ae6fb4d03589fc53987224089a9a42879e9fe3ab2ad23ca7825f7c9810,2024-11-21T03:30:30.970000
+CVE-2017-6782,0,1,47a8b4b44597cc7db5f50403f5079a059da8e3a961daca13ead9a9e4e72d1086,2024-11-21T03:30:31.100000
+CVE-2017-6783,0,1,93c452b113a6d2d6c118520d8be0a0ca418a83db781dacaa73a5441914a5cf96,2024-11-21T03:30:31.243000
+CVE-2017-6784,0,1,11a377cb812d2476771235ecc5c2e06d7e0f5dcc4d131f1541677156e2013d06,2024-11-21T03:30:31.393000
+CVE-2017-6785,0,1,2872a73f2e91e738582447fe079f7e95fdecdacb2b198d9a8155c1e8d49a1bfb,2024-11-21T03:30:31.527000
+CVE-2017-6786,0,1,757d79dc09eb806fd60b20a29ae480f31caef51560ad5f44e30853fc6aba9406,2024-11-21T03:30:31.647000
+CVE-2017-6788,0,1,16eb22d8b7b2589eefc5393c4730936d64294990dabd4040ef67f153ac230280,2024-11-21T03:30:31.787000
+CVE-2017-6789,0,1,4ac43d775281347b92e9fed79f15477dad6a90e7c6c33b116b7a7ca569ed0c30,2024-11-21T03:30:31.913000
+CVE-2017-6790,0,1,52c3192600b8607a8f305c0cbe2d4ba0fb809ba6778c054ae5f5ddb9cc924c50,2024-11-21T03:30:32.043000
+CVE-2017-6791,0,1,7e3bd52f2e6a8a57c54ac1264679ab54df7a3a920733e014b5bce7ac1d7e8c81,2024-11-21T03:30:32.170000
+CVE-2017-6792,0,1,070ee9cedf491ea72296d861e06f019a14a6e362e498320d43f9b5101e1cc70b,2024-11-21T03:30:32.303000
+CVE-2017-6793,0,1,4ed6454541b4650bbef1bcee9ef44a1d6e9b86d582b6a85df7e4c853cfd60ea3,2024-11-21T03:30:32.427000
+CVE-2017-6794,0,1,b5a262f3ef3719f1161a8706e2c88b5e326a86476b193380d2b90abbb8ff516e,2024-11-21T03:30:32.560000
+CVE-2017-6795,0,1,2d608c1a445688b006b420231d99c7805ee7935c925c853d8203d4370144e99c,2024-11-21T03:30:32.697000
+CVE-2017-6796,0,1,60e337c9f2a159e341531846e2c8a4ed40f092a09b662551c3bb7f423dd62e25,2024-11-21T03:30:32.827000
CVE-2017-6797,0,0,7375fb2ad4e4623347998bc2e68e2c1ef87160c625cc50a884cc8f00edb7f6c8,2024-11-21T03:30:32.957000
CVE-2017-6798,0,0,7c25a6707d68eca0edfec1c22a3cb21c0191ea280d0564b58b54629a8cbe7da6,2024-11-21T03:30:33.133000
CVE-2017-6799,0,0,680961fffc6e6874397ba1019f84c96dae5ba95ba4ae0cd9c3cdad5ee5724fed,2024-11-21T03:30:33.333000
@@ -109841,395 +109841,395 @@ CVE-2018-0060,0,0,8ef46b4c85fab069e44d43a165d3f5656db7ca7fb9a6927a6995234d1760a4
CVE-2018-0061,0,0,e706c8679365e1de8a7c042c57eb8c1966baddb6723ffecdd3a2d4a8414c42ac,2024-11-21T03:37:29.257000
CVE-2018-0062,0,0,fbdc11d17ee4b696d5ca0d6957a3a51517b8974bff72c1319c1daabf5cd71dff,2024-11-21T03:37:29.403000
CVE-2018-0063,0,0,e2b9fefa2c24a18dbdbd11e0c61e3fb99175b79589e233e123cf01d359ad4c37,2024-11-21T03:37:29.543000
-CVE-2018-0086,0,0,0ce5324f6c393d675f182f3f9ec2e7bab396bd4d366b0676d5f8609c5b0f147b,2024-11-21T03:37:29.657000
-CVE-2018-0087,0,0,6f0056d0ccd8590fecbcda8e565f4412ee236d3b271c2b43f389e732c693030a,2024-11-21T03:37:29.773000
-CVE-2018-0088,0,0,94de71c009be98d04b26291422bebbcce5ae11cd9c63357981f71647995745b5,2024-11-21T03:37:29.883000
-CVE-2018-0089,0,0,c95d4626c4a2f14a61e9c83a0e153fd882afd6ed816e189f1655028ef4361382,2024-11-21T03:37:29.990000
-CVE-2018-0090,0,0,e1e54756230c7ad111e81432bf01750889f8629ded15179205e6d69c3c708542,2024-11-21T03:37:30.100000
-CVE-2018-0091,0,0,fabcb0915094700dac88b5b6b6611132e4da430651f504086902ce144973864d,2024-11-21T03:37:30.213000
-CVE-2018-0092,0,0,61ccce04f6b883b26f5f7a8bc92ee688544538b79f4f50401d627392fae88489,2024-11-21T03:37:30.323000
-CVE-2018-0093,0,0,993d0a8545c3ba2a5fa4fa6a0fbc44c05bb0b95d0f44865218cd694dc352b944,2024-11-21T03:37:30.440000
-CVE-2018-0094,0,0,6ef6d6897b00b7e11c22b8fba7088a94cb7e8f3fa487d2004319aee07d7dc6fd,2024-11-21T03:37:30.540000
-CVE-2018-0095,0,0,6bcc49ebde5157dc97c870a1d35247855adb48e2606f06e210e5603070f4edb4,2024-11-21T03:37:30.650000
-CVE-2018-0096,0,0,0973f1fd0e136ea6e6f54f86e7aeb029dde85c54f502ba6ccf48c10e14bfd64f,2024-11-21T03:37:30.763000
-CVE-2018-0097,0,0,2e47aab1b156c640f207ff8beab2ceaea4bbedb15721f9cc5a9e53e62932eb7b,2024-11-21T03:37:30.880000
-CVE-2018-0098,0,0,4485ce654c1c9ba4eba1c2ccc6264e97c6498698b27a6871e7634df177a4cf9c,2024-11-21T03:37:30.993000
-CVE-2018-0099,0,0,52a4f05e3aedbb5b1e1d8113e2c1f7c193c7e4f535c292ac8dd6c4b760a0aaec,2024-11-21T03:37:31.117000
-CVE-2018-0100,0,0,460331c45106c240423d5e4ed8d67e35e250f4b885de615eb20b51c01ddadb9f,2024-11-21T03:37:31.230000
-CVE-2018-0101,0,0,4b1935b7a99a50886afbbe0c156df06bb9d4adab93d78a8fb621e45dcbfa5ed1,2024-11-21T03:37:31.353000
-CVE-2018-0102,0,0,eddbca5ed54302d85305a4a13643a2e0a7d585efdd070e724f763f48dbafe5f8,2024-11-21T03:37:31.487000
-CVE-2018-0103,0,0,a35752b13657eb315a20f6a72ee02ffc1aae597dd8144e304cf8bf401cd45c43,2024-11-21T03:37:31.613000
-CVE-2018-0104,0,0,26eee21627bd6c6378be9b88a4ccae037bde32deddbd50d858e3a9d6044dcfd5,2024-11-21T03:37:31.737000
-CVE-2018-0105,0,0,88fd7415c225795d0489213468ba6787c02babfcd48f8b2c677a47cc38aef30c,2024-11-21T03:37:31.860000
-CVE-2018-0106,0,0,f074b0d2c366495401e9d5e70ddb6a73571afc8fcefe46973ce0beaf744673e0,2024-11-21T03:37:31.983000
-CVE-2018-0107,0,0,17e91a1334e59501855a78620188a169d64c65c283966e71a5d38d75f081dc3c,2024-11-21T03:37:32.113000
-CVE-2018-0108,0,0,db27dec7071055bc3078eb874df01188508b8a1ce48bdd28ba37c4f9d96afee1,2024-11-21T03:37:32.230000
-CVE-2018-0109,0,0,6d671d999dc448c35f6f8dd073675b2907aab0f7cb53f534cbbbfb05a04960e4,2024-11-21T03:37:32.353000
-CVE-2018-0110,0,0,7e2e439841f24e92620eddccb8055b512d63a5114d9b05f5eeb8de8f4d07ea07,2024-11-21T03:37:32.470000
-CVE-2018-0111,0,0,2839388c43d863ea17b19be756d78e99822f069d215403f0698c67eb4ab8b40c,2024-11-21T03:37:32.597000
-CVE-2018-0112,0,0,b717dd9b2156e7feeda923d14aa38d9fddb6d740976f51a1c033e6bbc44bc470,2024-11-21T03:37:32.720000
-CVE-2018-0113,0,0,3407ceb95f3274d8637bf736e6b7af7a5022ad941518777a7fb5377655acb850,2024-11-21T03:37:32.857000
-CVE-2018-0114,0,0,641f35f09bad67ce299efeef4d5b91e7338e00c6060852ca8190f4a0135a70a3,2024-11-21T03:37:32.987000
-CVE-2018-0115,0,0,2808310be7c5486f725d23768ecfba9f0323d294d7db8f55664f4aa9c556a527,2024-11-21T03:37:33.120000
-CVE-2018-0116,0,0,c633072a8148bb036ef33af0a3fd9b14bf0ca96e717974c1d48202ae90677785,2024-11-21T03:37:33.250000
-CVE-2018-0117,0,0,4f67642aae24642fe48c417937dbc261a86547f13a592a0bb978c0ca0508e292,2024-11-21T03:37:33.370000
-CVE-2018-0118,0,0,fdd3447866b9f3938302895b81f6a91163d88f3e4f55106e9cdc64c219bfb621,2024-11-21T03:37:33.513000
-CVE-2018-0119,0,0,93e4a4decd1a24c1f17ac599647c4417930cac9f97efc7964a069fa8de640e5d,2024-11-21T03:37:33.643000
-CVE-2018-0120,0,0,eba7ad95184c0f003c7c810d0f6046a6d13acfa6bfb1a5d0a97d934cfa3ccd85,2024-11-21T03:37:33.757000
-CVE-2018-0121,0,0,895d765846373af6c9016596de7016de6f884a20584d1fa9d91d46d115292d81,2024-11-21T03:37:33.873000
-CVE-2018-0122,0,0,cd3f66860ac5ec0536320da1acbd6db9ae870ed66e28552867edcdc45391b7b5,2024-11-21T03:37:33.990000
-CVE-2018-0123,0,0,22e144d08627831e6984ac953d88825ee068c29b870b96f13aab8273c1319714,2024-11-21T03:37:34.120000
-CVE-2018-0124,0,0,47966be1765df87640bcb1a2e9ee245a357cf0e4d1ed6178d66b0a8dde53622a,2024-11-21T03:37:34.243000
-CVE-2018-0125,0,0,bbabbb7332f4c76657f5a3c29f16c083cb7664a9f817846744c4ea382bc675c3,2024-11-21T03:37:34.360000
-CVE-2018-0127,0,0,7c3a9e342f7028f1b2f58b0d7b57ed281db343c94296689bd60215d457a44f15,2024-11-21T03:37:34.500000
-CVE-2018-0128,0,0,4ed3e92f0411f288166411425ed1160895590b18e8c2e105943b0418a4631c0f,2024-11-21T03:37:34.633000
-CVE-2018-0129,0,0,a46ce472c4eee07fc400167a72eea8aa498e0a4f536d5f7752f9c8233e74581d,2024-11-21T03:37:34.750000
-CVE-2018-0130,0,0,4c099c52cbe814039fbf9d0fd7a4cf0780686d49b2ff8e5c833743fb3ed2883f,2024-11-21T03:37:34.870000
-CVE-2018-0131,0,0,f51fa292b74cd0c247bd2eb6081890f40e465e4e07c61207ed0a9f481372533f,2024-11-21T03:37:34.990000
-CVE-2018-0132,0,0,d84c1eb97e61a1a5553b9ca4c0c811b117309e690b8a1495fac134b9510fb7d1,2024-11-21T03:37:35.120000
-CVE-2018-0134,0,0,841d1a20a44cf5bb20f0170619231a8c906fbd3b816c8de8c06b1218f79b01a2,2024-11-21T03:37:35.240000
-CVE-2018-0135,0,0,7dd63e958a16f82b3041770c3f3a7bddcc57cf3a4a9cef8f4fbc27ebf360958c,2024-11-21T03:37:35.357000
-CVE-2018-0136,0,0,8ee1e6edb2da5ee3a60b9731e4d1e28c35c801eade8f12357f46a4b8b7416827,2024-11-21T03:37:35.470000
-CVE-2018-0137,0,0,d38a8d678e0f6b0efa816538f566c5b6cd6e247d9a11e30d4747fb5829414b57,2024-11-21T03:37:35.600000
-CVE-2018-0138,0,0,1cc9505aee591df94c8fb8c5b9cfe3c887935b060aca6747f8ad68894e9a5d30,2024-11-21T03:37:35.717000
-CVE-2018-0139,0,0,b5dd05b1674be6dd4ff69d249abac8a934112b0fc277f9f9fc842582c49618e2,2024-11-21T03:37:35.830000
-CVE-2018-0140,0,0,249f7987aa52d31db84db4dc8c6142250bcf71dbe5baf75630b7f802f46cdbd8,2024-11-21T03:37:35.953000
-CVE-2018-0141,0,0,d8f5a72caca2cb862304c490840969d9c4d53d28db936430a5fb5b6413339c6d,2024-11-21T03:37:36.077000
-CVE-2018-0143,0,0,0a866cb3b05eb22b54b7f39d852fd5eafad6b7a66e84597f60e19d38ab39bcbd,2023-11-07T02:50:58.707000
-CVE-2018-0144,0,0,652781df5c193ebcddbf4cedab44b71c81cabbd2b215e05bb9d1f1417705f118,2024-11-21T03:37:36.217000
-CVE-2018-0145,0,0,31b190d94230901f8cc74a4f5c2ac6f0551a3901882010c4fa6206bd62d8c199,2024-11-21T03:37:36.333000
-CVE-2018-0146,0,0,8da0a280cec243791a7964b52949e0a715a207b1e78aeb2f7e95915fd5e2484a,2024-11-21T03:37:36.450000
-CVE-2018-0147,0,0,b9e383c3a37e420418eb1a69855c7b9f23a75882d5c43e41e58337cb24e04557,2024-11-21T03:37:36.570000
-CVE-2018-0148,0,0,be0cd89d7bea1f7ff33c4cede8dc23fd7227dd892126c874c42e23ef95c2215c,2024-11-21T03:37:36.690000
-CVE-2018-0149,0,0,2e3996de5bc108b4c7b17a8c93d4bbee53383ae6cb017f97cb552be604789ecc,2024-11-21T03:37:36.807000
-CVE-2018-0150,0,0,e393d61410375883c66127558c761a4a82eda44480a5582440ff45ff1339adee,2024-11-21T03:37:36.930000
-CVE-2018-0151,0,0,719fed160e55ae68a40ed7186cecb2c8f80ac17cdd6b89f8d27865171b73b7c7,2024-11-21T03:37:37.053000
-CVE-2018-0152,0,0,c2469abe4decaa39fb34f67d81011eb434216b96bb00ab28e556dcec90f8bb39,2024-11-21T03:37:37.193000
-CVE-2018-0153,0,0,9e052eb2f0e8570d032b38a722386bdddeaeb452ae477e1afa923172a33ea0b4,2023-11-07T02:50:58.977000
-CVE-2018-0154,0,0,12f48d706343a60c13793b737f04d46c595cd53ec62635c44c515a6f41060179,2024-11-21T03:37:37.330000
-CVE-2018-0155,0,0,79e5ffcf85e84775c168a83baea0137a71e58ec2d8863028fefa1d65dc974d8e,2024-11-21T03:37:37.483000
-CVE-2018-0156,0,0,0169348c20e01a24ebacb6ba41874877543c4e7fa40ed67a85c4a4b02906eede,2024-11-21T03:37:37.627000
-CVE-2018-0157,0,0,ae5ee9998c7a76192e28e2e2f6bb96ecdbf483fec40ba325eed1ae123eb8cee7,2024-11-21T03:37:37.793000
-CVE-2018-0158,0,0,374478e243392dbdc9dc7a7299236ff49badd75c48857c36a6ff621ecfc4fa49,2024-11-21T03:37:37.910000
-CVE-2018-0159,0,0,52a7dbeae4fe7f3074156a44c0ce677361d0d35c8894c7da0af4ba8740a41039,2024-11-21T03:37:38.063000
-CVE-2018-0160,0,0,ea7c18725f6617fcae89786287949707d774010915634d3c452cc02f3b15ac04,2024-11-21T03:37:38.200000
-CVE-2018-0161,0,0,73a5e8fe1cf93089a28fa3767db660eeff95a045c542faef3d7ea68ecb29bda2,2024-11-21T03:37:38.320000
-CVE-2018-0163,0,0,385e240c6fcb9c6fdfb869012d789a1dd276f21f7bc4a40a9a9cf88a47adfe8b,2024-11-21T03:37:38.443000
-CVE-2018-0164,0,0,edccbfc6e437f05392a7ea8ef6617b9538ae1764329def397ae64ff60b95831f,2024-11-21T03:37:38.590000
-CVE-2018-0165,0,0,39e1b06a7da45923589d0b302e6ceac0ab3b7cca4aed1cfd13d014d689da2f25,2024-11-21T03:37:38.727000
-CVE-2018-0167,0,0,568388a7f91d388fa78ce3b50d80c0c21fbf23d4877a5af8fd15629b06f12d4c,2024-11-21T03:37:38.867000
-CVE-2018-0169,0,0,c3731ad58d7e6463df04065f8e05c9aea024acbe54c622011d6f1d9bd294bab5,2024-11-21T03:37:39.020000
-CVE-2018-0170,0,0,fa30239fae57076d1d15b2a91c01d4d60dcf5dba790f13b0c5842a1dd87ebbbb,2024-11-21T03:37:39.147000
-CVE-2018-0171,0,0,d453d3c3d471bee57a8a85e7f0ab0aae45d9082ef9a0a3c6b32f0314de1bcbcb,2024-11-21T03:37:39.277000
-CVE-2018-0172,0,0,a64cc32c308fc41fcf8704722deaf60b578d9da75574d9e8541303789f6bcd98,2024-11-21T03:37:39.413000
-CVE-2018-0173,0,0,e229b6eae82ed3c286c1d74b887ed09ab842b8a2d77e8280b2b6247cb20022f9,2024-11-21T03:37:39.563000
-CVE-2018-0174,0,0,11d0b1121211a10463f7c96c789c13cd57cd9375165025e8ebd0a495ebfd2adb,2024-11-21T03:37:39.727000
-CVE-2018-0175,0,0,4ae4b8110202a54cee6342aaf408142abf4e66e3da753cc5e8cc1a94792e8413,2024-11-21T03:37:39.897000
-CVE-2018-0176,0,0,1c4f7ee2f1ebb08b6104f79c8899dc731999f813eb03c7fdf1e632c7ee4601cf,2024-11-21T03:37:40.057000
-CVE-2018-0177,0,0,028ccdb5a9b977d0426e9b32b935090f5974c331431bfb395d45f663a991fbaa,2024-11-21T03:37:40.253000
-CVE-2018-0178,0,0,fcc0266b77ab1fc75799d82f6a7c6e59e18c4d0d7343eda561cb6c3bd85d71f6,2023-11-07T02:50:59.347000
-CVE-2018-0179,0,0,f157fdf7f522fe1e7559daf516adf29db52ae66717407c6e3270b2fa279cec21,2024-11-21T03:37:40.420000
-CVE-2018-0180,0,0,e00991c5011f4c6c0b2b9e02caff80102806fcce5b65d3dff0c16228633257d1,2024-11-21T03:37:40.587000
-CVE-2018-0181,0,0,92b027dedabc4b2dc31ff75d8783ed355603883026bfb4fcd2424351bfae3be9,2024-11-21T03:37:40.750000
-CVE-2018-0182,0,0,a7ad9d56fe316f20a76461bf9cb508bbf57ec9076ae8ae4ff0ed8b5e8c69cbe2,2024-11-21T03:37:40.887000
-CVE-2018-0183,0,0,ff2f440ee0767ee806268a89047caf476c85fbcdac1ab25b4d1356992e6d1246,2024-11-21T03:37:41.013000
-CVE-2018-0184,0,0,b829e0101ef44bebd6848ad9e37683c8a1add9ace80b1673fee85d442989731a,2024-11-21T03:37:41.147000
-CVE-2018-0185,0,0,0975415d8f2ef554cd68cdb2c04c440700aaa09f4dca1ff2dd8fb793ba143857,2024-11-21T03:37:41.270000
-CVE-2018-0186,0,0,69a9a8c7595c31e05b37160cf0b5a47abde90b5cda334f68af8a184aede70177,2024-11-21T03:37:41.397000
-CVE-2018-0187,0,0,b7025a295526bc9fd459ee05569a0ccdd5544a7589eae66f203951b30098df5e,2024-11-21T03:37:41.510000
-CVE-2018-0188,0,0,4eeb94a46a5471a2d85c63e10ff996c777dcaebcbe551dfdf79fa04a683449a4,2024-11-21T03:37:41.640000
-CVE-2018-0189,0,0,a33e1c1247b7550622e20ea6b4f28fbf7fa5271d61b7e61ef0cd6f90cd50ea27,2024-11-21T03:37:41.763000
-CVE-2018-0190,0,0,95b97c08e0d3f274c2232dbf2743e2c6ffbbf26c454443837c49d98f718533e9,2024-11-21T03:37:41.890000
-CVE-2018-0191,0,0,835b9bb6ee7c54c5c6c4f5a2299269f6bcd0a513439d8949e75ed37b4344af9f,2023-11-07T02:50:59.650000
-CVE-2018-0193,0,0,ed757a9dcae950e4614bc920d41dd15c9862ef1f12aed4d817c2ea656557ab6a,2024-11-21T03:37:42.023000
-CVE-2018-0194,0,0,0ff71f000e3e972fa579e70a59f084c847c11aad732888f9bfc7de7e395a003e,2024-11-21T03:37:42.147000
-CVE-2018-0195,0,0,8778679d26520d7adcb982c9f12a2fec403f7988ebb4bd0af2008cd8727444a4,2024-11-21T03:37:42.277000
-CVE-2018-0196,0,0,e2f18fb52f820b0ef9224773eb2b44ec99812766bb1cda608a7165cbffbed833,2024-11-21T03:37:42.407000
-CVE-2018-0197,0,0,d0dbaa913166435e19005b39267b6484a7c284e75aba7c409a34c3b555d90da2,2024-11-21T03:37:42.523000
-CVE-2018-0198,0,0,0dfa55c56fc2d0e5fb06f4154e6e7b0f930799b26aa7435d6d6f95cd56bb056a,2024-11-21T03:37:42.773000
-CVE-2018-0199,0,0,eafe2e38c47a464c815a31e75af9b9eb1e8e3d3cab0cb84aba4c078659b445de,2024-11-21T03:37:42.903000
-CVE-2018-0200,0,0,bb1dc983255842c6c34b2503651eb5135c2c8043d2eba27ad7551438f6f65a2b,2024-11-21T03:37:43.030000
-CVE-2018-0201,0,0,4f97b7f68fb42cacb40f9985a14308e576472aacf524d9367cbf1edbf6abe1e1,2024-11-21T03:37:43.163000
-CVE-2018-0202,0,0,3dfd310d19cb180d9e4920e8fceaad3ed92133604d6fb4242b24ad3b4782a2fc,2024-11-21T03:37:43.290000
-CVE-2018-0203,0,0,c8bf6d3de6f86462c77c6f2454889df575866623ff6fd01f89215d553216afca,2024-11-21T03:37:43.427000
-CVE-2018-0204,0,0,5590adb5cee85a2e8dff9617a4ade99d87c4e2721547691ab50feccde141346b,2024-11-21T03:37:43.560000
-CVE-2018-0205,0,0,4212c7bb18b312b373311fcbc52bf253c05acfcee868d2e3c1a9b85b1b1249eb,2024-11-21T03:37:43.697000
-CVE-2018-0206,0,0,ebeef3a0a5aa99c95661b06222f9050ad4fbe4998e0fd8cdad1143b27f095f23,2024-11-21T03:37:43.860000
-CVE-2018-0207,0,0,a4130b414d1520d03ab4600e507f5f2c7e8dc4e0d908192d21534fdd7f48f99f,2024-11-21T03:37:43.990000
-CVE-2018-0208,0,0,6c7f2cdd825b59766f95c2907753151c530e80cab4ad484c5020b5a0925af297,2024-11-21T03:37:44.113000
-CVE-2018-0209,0,0,6346f7e2748d25090c42f2f05700dd654ee73f04f71204ae9d1ff554d8fc5ca6,2024-11-21T03:37:44.227000
-CVE-2018-0210,0,0,d17e68e01fbf6114baf73c7eeb3d003f93b2ce10f7bbf07e28740ec29f069dea,2024-11-21T03:37:44.350000
-CVE-2018-0211,0,0,052aad7da27be792edd8577653e6ec65c70222e90eca1b44554fda0cc8e127f6,2024-11-21T03:37:44.483000
-CVE-2018-0212,0,0,845d2741697c007574f889d0ca174dd160b34b0deb3f4437df1678f7e76b2101,2024-11-21T03:37:44.637000
-CVE-2018-0213,0,0,28bb82fa39c5e1482383b6cd487c76b663cf774f3fa2e8bd90d47924210e118d,2024-11-21T03:37:44.770000
-CVE-2018-0214,0,0,cb8180120ffa3a14832c668a9249cbb9baa02094667cdbfbf553ca0480cd1357,2024-11-21T03:37:44.910000
-CVE-2018-0215,0,0,e86aecd377640f3425b73138eb69919f842c674d0725b6dbad23b964ea8b63b6,2024-11-21T03:37:45.030000
-CVE-2018-0216,0,0,0cd8f7854e1297e41008cdfbe9f23590843260477cbdbd27bf52a44f632a36e6,2024-11-21T03:37:45.153000
-CVE-2018-0217,0,0,63bcc901ec273322d8707d93cb090a715a3c1fd72d5c994244a869a3d18c2386,2024-11-21T03:37:45.277000
-CVE-2018-0218,0,0,f6b37538395877244cdc2d77319939b7aa8c89984e23e88a6e5d136a47e8ff3d,2024-11-21T03:37:45.400000
-CVE-2018-0219,0,0,93bb08c494806aa8979a8b100c9578410c26165b8d0fc53fb2404ae480d0aae0,2024-11-21T03:37:45.520000
-CVE-2018-0220,0,0,6dcdda203eba6ddcf0583d3c87a46e5866432327f08b45b4d8f25a49c694dd53,2024-11-21T03:37:45.640000
-CVE-2018-0221,0,0,52536e2932a3462c19cddb14ac5322d9def678aa9e322f34f723d323836a2cf0,2024-11-21T03:37:45.760000
-CVE-2018-0222,0,0,df87320e925ece6ddf1240a47af57603a8beb174593cbb9783c0c7a36bd30654,2024-11-21T03:37:45.883000
-CVE-2018-0223,0,0,4cb9186fda54c59f7009da14c81f535d812b968ed3daf72274a202d360e26e31,2024-11-21T03:37:46.007000
-CVE-2018-0224,0,0,f0606532aaf82c9fde2aca20086b7eec5ebc70b936d775d772788543d6cd5c3d,2024-11-21T03:37:46.123000
-CVE-2018-0225,0,0,de17b9cbae246d5fc880b2e36e658bb08e5de13a485c1a9086558a36dc94db95,2024-11-21T03:37:46.243000
-CVE-2018-0226,0,0,ba6767735c0e8dc49690dd31bece502d96b5b90dda872f40a70e5e02e2a567c4,2024-11-21T03:37:46.360000
-CVE-2018-0227,0,0,345ee1981c6444123e1d888e7a1c3d51d1ef7584fdb102c8351c642637b00239,2024-11-21T03:37:46.490000
-CVE-2018-0228,0,0,61afe4358c54bc187825e4e70ceecf03e2198de1747e88fd0b2d65afbe51e901,2024-11-21T03:37:46.627000
-CVE-2018-0229,0,0,a156812f5765d75d3cb77034ebaec3c5bdfc58b431cda63899cd35cb8dbb4785,2024-11-21T03:37:46.770000
-CVE-2018-0230,0,0,3f81a6113818d79073bfc85bbea09c639141fa45fd3539cf3c0ed197aa47faa0,2024-11-21T03:37:46.897000
-CVE-2018-0231,0,0,cac89449eaa2afe1567e6c0b4613cd25ec2db47455e12414c49bb0bc713f768b,2024-11-21T03:37:47.010000
-CVE-2018-0233,0,0,dbbdc9817ebaa920662f8deb0fb3b3162b5578a6dd929afb2a351c40a92f93af,2024-11-26T16:09:02.407000
-CVE-2018-0234,0,0,83d2b64776d3008b63d82105aaf761c95623120b83714e316fe1df64c5a1f1f5,2024-11-21T03:37:47.230000
-CVE-2018-0235,0,0,6d94fc60d20778e3f1ad832cfb0090991bd7477bae62fb47cc4ed45f061026a1,2024-11-21T03:37:47.350000
-CVE-2018-0236,0,0,a3d69a705af5a5b4587272d12641a4cd9571d5bb84b24e19750ad69e6f68e45b,2023-11-07T02:51:00.233000
-CVE-2018-0237,0,0,e389b4b5e9da707bd4aaed475d3cbbb20e718e4b92f7604ecf0ea3df7ba664ca,2024-11-21T03:37:47.473000
-CVE-2018-0238,0,0,c8bcc1ff4191bc991135652b96ee944a4999f25df7023cd8fd53218bd166abba,2024-11-21T03:37:47.577000
-CVE-2018-0239,0,0,e6ecef4abd90ba50b15f481f683d671cd5aa223b3c85812b26caac6ef8916e39,2024-11-21T03:37:47.690000
-CVE-2018-0240,0,0,5725f40224ed1772cddbc80aa33e6cd20b2e6eb69ebd082eb8656f1c59ba58d2,2024-11-21T03:37:47.810000
-CVE-2018-0241,0,0,84ce72e26388f0a10829c55ccbd0cce49e141988ebe21f90ffce94a2543abc70,2024-11-21T03:37:47.947000
-CVE-2018-0242,0,0,ecf6e2cdb06d36bc8db70cbedcf42c51b288d3bc31ffcaf1619f31bdc924dc98,2024-11-21T03:37:48.067000
-CVE-2018-0243,0,0,a06f0b44c3a3e80a5af1578ad174a4156ac7490a857ae24939c94046ae26dad5,2024-11-21T03:37:48.183000
-CVE-2018-0244,0,0,5bf76a59559ae0be543114b029482cf0e531f6a4b93861c09d3cd351805d770c,2024-11-21T03:37:48.303000
-CVE-2018-0245,0,0,71fb7aa3eb8d10d9aa9708cba1d0ed8bb472d4f6599a027d297473a6b44349cb,2024-11-21T03:37:48.420000
-CVE-2018-0246,0,0,d005bc0c43534ac5e4d9b5002d885fb9497ad378179fa3cf5ca486b64edcebe2,2023-11-07T02:51:00.523000
-CVE-2018-0247,0,0,429bd577a48862b4f607a89d9c6c4b3eb3105b9bdb1cc53ba08f915f2ea03a5a,2024-11-21T03:37:48.563000
-CVE-2018-0248,0,0,b61723a6d51c1b56b2e5bdd5e56a2e97d911f73cacb3d511a87ee2feaa4f76d5,2024-11-21T03:37:48.687000
-CVE-2018-0249,0,0,f1c8b5da287b5baa3ec788d6e8ea7a1c6bc8cd9f68056417bbb010896a93849d,2024-11-21T03:37:48.820000
-CVE-2018-0250,0,0,2191b4a8efe29b7ed3d2abb898ca564fd9a605de93681a0fb8e79df7f93b2cf4,2024-11-21T03:37:48.950000
-CVE-2018-0251,0,0,964d20aa37b1d49fd473817009eb0ff409eacc9a21fabc811f06623ccad68d3d,2024-11-21T03:37:49.093000
-CVE-2018-0252,0,0,546fd75c2c2f644f3e1a3c3dc393ae45601138f00fdcc64edf44bc1b5fb606da,2024-11-21T03:37:49.220000
-CVE-2018-0253,0,0,c729a8be97e9df415e18490213486720e9b92aea91c3e9de921068e1ebc9c605,2024-11-21T03:37:49.340000
-CVE-2018-0254,0,0,d96a9c0292f11f79b00bedd62177d39e2a2e92be224f9251f2bfa6844eb2be25,2024-11-21T03:37:49.460000
-CVE-2018-0255,0,0,f7633da8215501625979afb38f3dfa842063d86c1c8a6f77baec0070e8c68bd5,2024-11-21T03:37:49.590000
-CVE-2018-0256,0,0,ceb7c4332209543a8addc77e7e1bed7b13b30610277350f92feaa03c307050dd,2024-11-21T03:37:49.710000
-CVE-2018-0257,0,0,b1bad8eb3847044da72455260d6723f4c9d79c2259af5994c9d3c96ad0792360,2024-11-21T03:37:49.840000
-CVE-2018-0258,0,0,bef8675cb83497d173694b894e0c85947917dc594f98d9be2c4eee396b3f645e,2024-11-21T03:37:49.960000
-CVE-2018-0259,0,0,a2f6ba43ba92b1c32af2cbb51f4e568c80683b5ad2a7b9470ae44f7b7afb2293,2024-11-21T03:37:50.083000
-CVE-2018-0260,0,0,bfa1295eb411859ce37ac203a7b9f2cd3ba0c461cdf7ffb09e91d80c8141169f,2024-11-21T03:37:50.203000
-CVE-2018-0262,0,0,f379c3549ac2bfebaf42690f2ea3aa6d71eb720a57a5549286a3b41def4ed6ef,2024-11-21T03:37:50.317000
-CVE-2018-0263,0,0,a06456df7845d6c4e2124c7255b0e1de468108ed94e57fb2cd76701942503161,2024-11-21T03:37:50.433000
-CVE-2018-0264,0,0,8c739c5b013cb51de653ddfa6477d1d06f2abdef1b3ad2662a3a7ce83d3a49cc,2024-11-21T03:37:50.560000
-CVE-2018-0265,0,0,9eedffe44665584b859d53aa5d175b0f729611aa05a9d4515218eee2b0693fcf,2023-11-07T02:51:00.943000
-CVE-2018-0266,0,0,065547fbf694a8e5aec3e7d1d715552b5ed7c470880951722a2c046cd8d9b8a6,2024-11-21T03:37:50.693000
-CVE-2018-0267,0,0,90961bfc11c3e5f9e54905a6580bffddd82603f79d6a56c3e1291b9cc6265945,2024-11-21T03:37:50.813000
-CVE-2018-0268,0,0,a039b2bf56bebd9e706ac18687ea28585302c61e4124efd7a0b31da894bef0a0,2024-11-21T03:37:50.930000
-CVE-2018-0269,0,0,fe02a0def169989831d1beb87aab859986b37fb68e3e1f6bb5afff91ed68788f,2024-11-21T03:37:51.050000
-CVE-2018-0270,0,0,6bf924d1e0ca1570c9412b75efa214d8e4c5252047c110054d7acae49a1bfc15,2024-11-21T03:37:51.163000
-CVE-2018-0271,0,0,1f8809a54e899d3bb4d1b0030fdb270e293fd450d618179b8c92c3c854b1d878,2024-11-21T03:37:51.283000
-CVE-2018-0272,0,0,3e7690283ed06f7472224855c0d95df41a1a5e864ddc4c879016c225e7fcda2a,2024-11-21T03:37:51.427000
-CVE-2018-0273,0,0,7a23045f0e3731fec203cfb0c510cf9fb2c0b3a9876ec49c06b7f840eeb12f62,2024-11-21T03:37:52.257000
-CVE-2018-0274,0,0,13943a8b0ad48427cd5d9b0c7d720fbbf6038353abe85fb91b732dfa99085dbb,2024-11-21T03:37:52.380000
-CVE-2018-0275,0,0,b6d81cd042e165585a6d4ef4b602ba2423dd2269789d519fb234bed8957fcc3d,2024-11-21T03:37:52.507000
-CVE-2018-0276,0,0,5d2d9e3e08d5869238c1cecebb24acff6195f1c1d051f52f8e9d80d86831856c,2024-11-21T03:37:52.623000
-CVE-2018-0277,0,0,5fa95a0bcc760335ca0567d2e0116f07febf4643a60c756aa69ce15f0ee31775,2024-11-21T03:37:52.747000
-CVE-2018-0278,0,0,89a6df10c1f8961bd16081af789699147ff1e81a30a084c347d590076e0ae9fd,2024-11-26T16:09:02.407000
-CVE-2018-0279,0,0,9eb9d318853dd2f18a011d8754d03336e19d7cc79fdb8a79e97c6a8c48a30072,2024-11-21T03:37:52.987000
-CVE-2018-0280,0,0,cbf92c6039be338806fef6ca908ce54d7444d814a763cabcb251fe9228147b9c,2024-11-21T03:37:53.103000
-CVE-2018-0281,0,0,eae86f95896df1302c48d561ebfadef72554f0d41fc330845145f8e4224b0d5c,2024-11-26T16:09:02.407000
-CVE-2018-0282,0,0,f893120bbbbb9a82df707e894a2f8bbc8563f9218c7d3fefb0eeebc9dcd41b09,2024-11-21T03:37:53.353000
-CVE-2018-0283,0,0,ca31083d2eb68864b7eecb1f92d85d2e3aa091883607c9eff59ad6c2aa803557,2024-11-26T16:09:02.407000
-CVE-2018-0284,0,0,22258e6d9fc1e68612dbbcc2f69c9b73568196ed03c5c3545def5fe5854e2cd0,2024-11-21T03:37:53.637000
-CVE-2018-0285,0,0,9425ba549fa5bfb15407d312fad28c03a333eeeb751b63f8b8113b1251a671b1,2024-11-21T03:37:53.773000
-CVE-2018-0286,0,0,beafa49ebda8e4f195d0a3a017e1d4bdf24c9030eedcad212bb0ad312bcec1a6,2024-11-21T03:37:53.890000
-CVE-2018-0287,0,0,7d397114edf524043f58991eeaf2fab9f2077b22941b30792d50757c71231dde,2024-11-21T03:37:54.010000
-CVE-2018-0288,0,0,e15e0b3e3045c47d44b4be576f3bbf0601048d38bfbc1f5e0154a71d26101386,2024-11-21T03:37:54.153000
-CVE-2018-0289,0,0,a7af5bb563d1622e6a5de35eb2ee3fe91a8b4cbfdbe7ca93de9038335e47271f,2024-11-21T03:37:54.280000
-CVE-2018-0290,0,0,bbb28177f4dc21d9ac5c72ae685a181e36263a17d2c7a201d17209053c6cff69,2024-11-21T03:37:54.400000
-CVE-2018-0291,0,0,6b702d554eb5812890690711ad1a27b89e8193977b0bc91178def535d366bd5a,2024-11-21T03:37:54.503000
-CVE-2018-0292,0,0,0b1ecff849545c7e9ac657851f116b8eb559e0312ad242636a6591c2d3a4a4fe,2024-11-21T03:37:54.670000
-CVE-2018-0293,0,0,3083e77d9090660c919d9eb2fd50e71f04053851043855ea32f64192d7297d28,2024-11-21T03:37:54.813000
-CVE-2018-0294,0,0,93f3f6f627882212d6360204695236be8830acbfba05d70d5ced08340c188f34,2024-11-21T03:37:54.957000
-CVE-2018-0295,0,0,4c16a794447c8895ad857b1bbeae428d6e1e780c13343a7ae0a1acc93059b2b7,2024-11-21T03:37:55.090000
-CVE-2018-0296,0,0,611c447d854f3cb08fec22d0470036eda7a7f57378802cb9f52aa7611ac7f78b,2024-11-21T03:37:55.227000
-CVE-2018-0297,0,0,cf51af771632a289a0bc369aebb09823ebf8e148bee6c7196d6210a59123a6d7,2024-11-21T03:37:55.373000
-CVE-2018-0298,0,0,b71fbe54af4361c36f741ac166523690777ec8d1305561b319a2482066caaf66,2024-11-21T03:37:55.500000
-CVE-2018-0299,0,0,0e83e7d33ca7e1e7f2eef64222987fa1a977e16221f472ca55b3fa003abb5969,2024-11-21T03:37:55.623000
-CVE-2018-0300,0,0,d16b5ab61ad5111751af884a6f68179ee688a807eb9faa0d68477cff509816b7,2024-11-21T03:37:55.740000
-CVE-2018-0301,0,0,b0060b4ed9dfc03d4931438f530816dfb71420b99dedc5e5f8132ddc47228138,2024-11-21T03:37:55.867000
-CVE-2018-0302,0,0,4749b9d215f56c70e2614758cdd4606d04edcca71e4ce5dc8730177046995b7c,2024-11-21T03:37:56.007000
-CVE-2018-0303,0,0,021c6734f7160a706820ddc2f7895f909021f1c3316b89a31d20b53be72e25b7,2024-11-21T03:37:56.127000
-CVE-2018-0304,0,0,f448ced2643cf3b03ed91bbbc5a4099cf42f183f5b7afceb1becc5a0fb27bc0d,2024-11-21T03:37:56.273000
-CVE-2018-0305,0,0,a32417ff9f086261dbc78794f13237d8c19e23eccc7dedcc38d2997ee30b1b51,2024-11-21T03:37:56.417000
-CVE-2018-0306,0,0,5a0f7e314e87dd3c4c9fdc284fada120493b15e70391cab0e9072b54bfcbdb68,2024-11-21T03:37:56.550000
-CVE-2018-0307,0,0,f27c416aaa64b325ca41e87baf5fd59ad3ab2088b0996ead245b29c0dcc83633,2024-11-21T03:37:56.687000
-CVE-2018-0308,0,0,204c0ba744b87cb335050fadf2fcf6b31e0fc433b8ff69ab16abf50b3a122fa6,2024-11-21T03:37:56.830000
-CVE-2018-0309,0,0,21249eaf07165136306b1315884c7808d1a1af5ad959cb8c4ea85cc2dd08d939,2024-11-21T03:37:56.957000
-CVE-2018-0310,0,0,dd2c7689e5495eb663a4a017059b4398e070c249cd798055e58b520a4aa7d696,2024-11-21T03:37:57.080000
-CVE-2018-0311,0,0,fdea345197f99a43c0591c5faf7cbcee7b58855a23f6c2e57da04d7b5a5a938d,2024-11-21T03:37:57.213000
-CVE-2018-0312,0,0,c0f749d63aefc4d84c33cb92af05989215a22b521244bcc053e117d416abcc24,2024-11-21T03:37:57.353000
-CVE-2018-0313,0,0,5b950813328115fb9283b310173b575390be0a93d7a789fae3efc9df01df58ce,2024-11-21T03:37:57.480000
-CVE-2018-0314,0,0,e7d5b68de0eb87e45b70992f3460a7922890a0e5d7a741e8074ec4b5d87c141c,2024-11-21T03:37:57.607000
-CVE-2018-0315,0,0,364bf9502ce5b056a96179770e3ed0c3ae2755cf6a7c07b53b5c7abb2f13bad6,2024-11-21T03:37:57.733000
-CVE-2018-0316,0,0,94fbde7851d75480e77f9023d93ae2f49d9b178cdfb3b2f0715e68dc89babe7e,2024-11-21T03:37:57.850000
-CVE-2018-0317,0,0,b59b6bd44181ff7e53a7024f553197359e27ff57ab8a633414b884442d330aba,2024-11-21T03:37:57.983000
-CVE-2018-0318,0,0,69213591d27dadd277750d9a5e911b8333af76070d1e889ac7c214546406597f,2024-11-21T03:37:58.107000
-CVE-2018-0319,0,0,5137662d752371a400aaf5203e85f9e624f4a97eca2c130c3455d98b3cda741b,2024-11-21T03:37:58.220000
-CVE-2018-0320,0,0,5c4cf07051dd66d836736503086609ed4bb0f88c9d67723e66bee044789f8d8b,2024-11-21T03:37:58.337000
-CVE-2018-0321,0,0,816c732e3fae227cb3ff2f66f5858ce3f58da7a1e534acd2fe26786b6099b386,2024-11-21T03:37:58.453000
-CVE-2018-0322,0,0,bbecc7647b6574eaa19a705cb1aa326728bc054dc120eb10290396a1d6db74f8,2024-11-21T03:37:58.580000
-CVE-2018-0323,0,0,0d3af3b42f1922f9869da830789f6b267247e2e10591992035d29707d4ba5e41,2024-11-21T03:37:58.690000
-CVE-2018-0324,0,0,5fff3c35ae5cd483756a2195e41bf6c0d019e945afa52671f9ab3afb38e44a8e,2024-11-21T03:37:58.800000
-CVE-2018-0325,0,0,3c5f3321f408a2f190ab0f262d89cc81a2437e4462933267e57a1b4a7799af04,2024-11-21T03:37:58.917000
-CVE-2018-0326,0,0,703cc1b288ed6fb0362f0bae1ee8a70ca20a96c6dfaf191718c261971442b13a,2024-11-21T03:37:59.040000
-CVE-2018-0327,0,0,6299bd37ecad729ede6da85080d15b42abb620dafd8eb4c6f4ed421f22bb3064,2024-11-21T03:37:59.183000
-CVE-2018-0328,0,0,0c1e08c7ec8c968f0c37db44f73c6e4db462ced159a66a2a77693d8f5d13ff4c,2024-11-21T03:37:59.330000
-CVE-2018-0329,0,0,cc0ef6821f4b9e5e801e51a03ae2a417d6319298bfa1b431d9fa1c17425f2f76,2024-11-21T03:37:59.460000
-CVE-2018-0330,0,0,d41bd4b9ee4574e8c8d0c281c509b5ac604e8d0c101fa14c93aaf2cd49d62741,2024-11-21T03:37:59.583000
-CVE-2018-0331,0,0,cb58a95480770a8a7e1d19f1afe17d5c9184702473acb32d1a805173b6941d03,2024-11-21T03:37:59.720000
-CVE-2018-0332,0,0,831d4651e5b95ad3f688bd6217603d19b5b848092c68263113f4a5ef781ed80b,2024-11-21T03:37:59.870000
-CVE-2018-0333,0,0,e49de5ac72007804952e23e8c804b8cf0de97643bf8d2218b6eed694cfba7739,2024-11-26T16:09:02.407000
-CVE-2018-0334,0,0,7a9a46989dee41f9b92392d41b848ecd4b26d329d0d78cd0fa28b96c9ba0d9a1,2024-11-21T03:38:00.140000
-CVE-2018-0335,0,0,a579c37793d07ec4671734abf2e3bcef96ff70020a7bd59571db92bde6461880,2024-11-21T03:38:00.277000
-CVE-2018-0336,0,0,7c3e44b1d08551cf1baf3459dc374cb9b4fad7334b3110413d92c256a3ef83e8,2024-11-21T03:38:00.430000
-CVE-2018-0337,0,0,29ec75d3d90a8953d916bacf32d167f704fc9678228ec37eaadd173ffbf9f109,2024-11-21T03:38:00.557000
-CVE-2018-0338,0,0,62b26836a799eb6a7a1ffc74f831ff2c260f0ad9062c4e5c21b3f66891b1e9e2,2024-11-21T03:38:00.680000
-CVE-2018-0339,0,0,cc2f43859f5b08cb6ccac4e65786acf14cbf9a3d6c45c47c75a2345619ee8fea,2024-11-21T03:38:00.810000
-CVE-2018-0340,0,0,91cb17ab55a80b488e4fda505c606d2244da8cb6bf70d0626ed5e4553ed4d58b,2024-11-21T03:38:00.933000
-CVE-2018-0341,0,0,bd28426c64b8154f6738dfdeb2d0e15611fe2f77fcc14c53bd0cf49c92a9d614,2024-11-21T03:38:01.043000
-CVE-2018-0342,0,0,609a249ec7d1655289f3d235de3e64d6755f1a651b04af14967d420ed978a1ac,2024-11-21T03:38:01.167000
-CVE-2018-0343,0,0,05617985c7e64f2f81fb4b61cac7f24f79a5ce6fecd49b28a90f2f3df28788ca,2024-11-21T03:38:01.300000
-CVE-2018-0344,0,0,5116b3630c0152d15b4f7f1a6ca4dcabb7eb206a7c186244e54b2a8c74026480,2024-11-21T03:38:01.440000
-CVE-2018-0345,0,0,3af10fef742aff772b0abb86cb2c9721ac70108651be6b3e4c9667668b587c53,2024-11-21T03:38:01.573000
-CVE-2018-0346,0,0,a6949f5c8552a1a0cb43306142bcb75e12f23cc75a2206d00218fa66eb2fedb0,2024-11-21T03:38:01.710000
-CVE-2018-0347,0,0,87723eb889d32a64e931d6dd15157861610cdf7d1cefebc9ad40308e2a86e03f,2024-11-21T03:38:01.850000
-CVE-2018-0348,0,0,5550c585bb36e78ab46ef0dd7328631891ee0e9a994a0fcd2249cc1841ac7e7f,2024-11-21T03:38:01.997000
-CVE-2018-0349,0,0,9955319efeb76091d15176458dd7470b350f5a5e3a819ae00f860ed4f9fc4f3d,2024-11-21T03:38:02.130000
-CVE-2018-0350,0,0,dc72f44cf1a0db68975869315fd82d9783f001cd3bbdea30682d498e4b796bfd,2024-11-21T03:38:02.270000
-CVE-2018-0351,0,0,ea74b1cb0148f08588b91fc0c1f0ad7594ee996faf3dda7d23de90718d23c2e3,2024-11-21T03:38:02.407000
-CVE-2018-0352,0,0,4b71ca13cace57926ba0d7545004697e32a0b5791a238cad7f611fe0737ff70a,2024-11-21T03:38:02.547000
-CVE-2018-0353,0,0,a36e98042a6d5b896fe6bb6f9a0933a46792005316e6ca28da64fef3c86f4162,2024-11-21T03:38:02.680000
-CVE-2018-0354,0,0,eac998306aa973b7752da9170a97324ed6e8590ffa4718ad7dde92e6eafe2552,2024-11-21T03:38:02.817000
-CVE-2018-0355,0,0,34be2a6897b1f1e2142bbd632341fb8fc2df7f050c91243bad58dae15b4f1dec,2024-11-21T03:38:02.950000
-CVE-2018-0356,0,0,74fcba37b5cb189186ded347ae913c7647522c742ee4baf5b01f72d5a4a51975,2024-11-21T03:38:03.090000
-CVE-2018-0357,0,0,9dae1741822cbb4ab35412328f25063c2b9eb1de3a9e61e401edf3ceaaabe34f,2024-11-21T03:38:03.233000
-CVE-2018-0358,0,0,2fd70e1165c7669aeab01eb87a3df8a27fba28fa30889d4e3e1fa460c92ebfca,2024-11-21T03:38:03.377000
-CVE-2018-0359,0,0,20bd953f71db2f925a858b61107a806a652da9de6be7a8be20a50023ad3f2364,2024-11-21T03:38:03.513000
-CVE-2018-0360,0,0,7c51d099559d5850c56e60644db30f3021ff76c8d05ba53acc99b34eecaa6c7c,2024-11-21T03:38:03.643000
-CVE-2018-0361,0,0,0302c7a8e784f97a0fd18bd9631c53e607a1e9bfd5365034aa3a22faafb13c07,2024-11-21T03:38:03.790000
-CVE-2018-0362,0,0,7edbdac28fde8c0b435c1d25f9b5016ccecee7dc6294c1a1ce293aef1446c7bf,2024-11-21T03:38:03.917000
-CVE-2018-0363,0,0,a1dd4c33c0c57804781824a7e99697e0af1c8b1220e377b686719cf0c01888d8,2024-11-21T03:38:04.077000
-CVE-2018-0364,0,0,1e311c832dad58cdb96fd54e0d469524f111fc89555c72d110e313dfefc874cf,2024-11-21T03:38:04.213000
-CVE-2018-0365,0,0,481aeffcbbabeaebba390152f7b205b468b31b84b761c748ddb16479bb6dcd94,2024-11-26T16:09:02.407000
-CVE-2018-0366,0,0,ae9a28864447b29eddb6ba9880ee4449ad01020db4272be40155e32553d23652,2024-11-21T03:38:04.557000
-CVE-2018-0367,0,0,cbebc45bf395d6f7a300af611b7bd3a4412a80eb2b2d054c9f1efaa0a1f71e6f,2024-11-21T03:38:04.677000
-CVE-2018-0368,0,0,1c6b57360b06d8e882b801116b9a91b4bdc2fc9e6ce0158b77b8b3a1792727a3,2024-11-21T03:38:04.810000
-CVE-2018-0369,0,0,ea0c7ef85d48e1b45d35a7a11e5b1267c79a7f7b21dd09ecf70b9087761a1a9b,2024-11-21T03:38:04.933000
-CVE-2018-0370,0,0,cf4c33a3cf264120bcb2e9da06a8c7c913b8cfb48edc0813757baaea2af2e4ff,2024-11-26T16:09:02.407000
-CVE-2018-0371,0,0,bc4ca2fd8460dc81e01b5c3e4fcbeebd97ac19fbbb28e7be5ec12b0595b8f74c,2024-11-21T03:38:05.180000
-CVE-2018-0372,0,0,9af7ee41a9547f0716f2ee492c70386d26847ebcbc461fc30b65423f1bbbb8c7,2024-11-21T03:38:05.300000
-CVE-2018-0373,0,0,eda2b83aa1ba04d195cd2ea8dd9bba0a84a1ecd3c6849ab09360766147c5bdd8,2024-11-21T03:38:05.420000
-CVE-2018-0374,0,0,3142ffde2fa738050eea127cb74d4a2f3d1555ab215a66d5093fc973e7311438,2024-11-21T03:38:05.553000
-CVE-2018-0375,0,0,9893afb2fcff422bc325f93f104c6e210c9466d7f7d3015fbee7638e6c42009e,2024-11-21T03:38:05.670000
-CVE-2018-0376,0,0,4460cf0c902242786ab32ee872b4bf5773a4c8ca22dd38a45859157e80a9ad50,2024-11-21T03:38:05.797000
-CVE-2018-0377,0,0,b863d8006ee2571da08bc2346d57f2c4b9ff33b386120aa9eb866bcf2b6527d4,2024-11-21T03:38:05.917000
-CVE-2018-0378,0,0,03953eca737ddaed3fb5001e509bac940b1b960ba23b6736716ed205e4977fec,2024-11-21T03:38:06.057000
-CVE-2018-0379,0,0,1aee5b62989623061b0b1a0fad652aa67d50423a1834c2a02c254a78a2b4e168,2024-11-21T03:38:06.213000
-CVE-2018-0380,0,0,b3bdb4677aa645a4b537eb385804a92ee64865feae55193e022793f4af6a5fb1,2024-11-21T03:38:06.417000
-CVE-2018-0381,0,0,604e217a8c9a446153d0f1649148e6d9ed5e51d711be714c897a4d5b116742eb,2024-11-21T03:38:06.543000
-CVE-2018-0382,0,0,7581912a5649308044136aa1f79d481037df97939d00f4f469b2808dacf46677,2024-11-21T03:38:06.693000
-CVE-2018-0383,0,0,8a854e3d8c9da48552009e10f80db6a01556990b271604f960e2a4a4d3e9fa2e,2024-11-26T16:09:02.407000
-CVE-2018-0384,0,0,48c1fa46ea13e75fcb4468f639ab6cab345a57c19c5af59f1f6a97b9db0c8bd3,2024-11-26T16:09:02.407000
-CVE-2018-0385,0,0,bb1a0afd4adfbade90ac7beab92344d68a2fe24ce12140399ab6d4a7d59568cb,2024-11-26T16:09:02.407000
-CVE-2018-0386,0,0,240c4d30fe5044646a572e99b0cfa2be61f7a72febfefe4c1855ffda10def8ef,2024-11-21T03:38:07.213000
-CVE-2018-0387,0,0,909dd5a2098130c1ca852b4eb7aad21a1251f108d5032640978be174d44e7a19,2024-11-21T03:38:07.337000
-CVE-2018-0388,0,0,bb7d71c236601afd288ad822110d44b2cf5505065f61dca1886dce3b33a8ece0,2024-11-21T03:38:07.467000
-CVE-2018-0389,0,0,3941d629d905635a75edd09419cd4b4157348900e979b09e9fd52d8dbe2805d4,2024-11-21T03:38:07.617000
-CVE-2018-0390,0,0,e7cc1b19ce2b36b4a93e822e22ce5ce8d88684d9ce221197fdb99d9756954f11,2024-11-21T03:38:07.763000
-CVE-2018-0391,0,0,9eba643c0fe438ce5e331234d6d12d514cd316b2d61583a4342c8610175aaca5,2024-11-21T03:38:07.887000
-CVE-2018-0392,0,0,fa7648ef75829a674621eaa2442838f1b733d59a464e4cda5d1241af7cb3bf87,2024-11-21T03:38:08.013000
-CVE-2018-0393,0,0,71fe563afde59c482b47775cf75c626b8e4904ab62c9569e1f8a1e6cd18a1316,2024-11-21T03:38:08.140000
-CVE-2018-0394,0,0,710e519ee4d4b6db367764198dcbf4f37f1ffad98987de5b6360f450227d2696,2024-11-21T03:38:08.260000
-CVE-2018-0395,0,0,d8fda724ff60c398da71222b50936e39e9422cecec712bb1513a975930a74d79,2024-11-21T03:38:08.380000
-CVE-2018-0396,0,0,0c65749963092794f81d14bdeb2d3d1ced050750dfd1d3dbe612a6422b6168fa,2024-11-21T03:38:08.507000
-CVE-2018-0397,0,0,ffbc5568ca199222397153b438c7b78f2b16471e1d6cf557fafc36b3f61af724,2024-11-21T03:38:08.630000
-CVE-2018-0398,0,0,f1cffa564f3b58c988bafb34bfdef40dc5b737ebc55f3a923b927fee0c44900e,2024-11-21T03:38:08.743000
-CVE-2018-0399,0,0,7aa00cbe13202e7246c11bee6b1be491db5d47278bfbb51a8aff5a40dbfe303b,2024-11-21T03:38:08.860000
-CVE-2018-0400,0,0,1ae7910f626568bc2164afcdaf21b0b9f5abcd5b636dc1804dff296534b8469c,2024-11-21T03:38:08.977000
-CVE-2018-0401,0,0,e228c8fe1c2b23052c80ad78a8bb501f35cf2a5de22ceddef0a6a5ffd74efe71,2024-11-21T03:38:09.093000
-CVE-2018-0402,0,0,f1c51d20846c748c739fdb95e5c93ad4ab12d1a2047ee56e1300fbf595a8fdbf,2024-11-21T03:38:09.210000
-CVE-2018-0403,0,0,2b434f649787da1eae93cd2129d2a8f0e96540317a233fd07ef7d184a33517bb,2024-11-21T03:38:09.330000
-CVE-2018-0404,0,0,40340a18f82928b28675f46ee0ffe41748dae7019ec8fed123a95162b193b516,2024-11-21T03:38:09.447000
-CVE-2018-0405,0,0,b5835646c484f928938340456c1cf4315cb4e280a1464080f12ec31ce7634349,2024-11-21T03:38:09.590000
-CVE-2018-0406,0,0,16ee9d23f782a98c69df0aa93a6d3db2915f955bdcda66853c78d40967760260,2024-11-21T03:38:09.703000
-CVE-2018-0407,0,0,4eb86bcc316743e517d03a446c08f9b77f8541ee362646e5f2563f0f07e6ca85,2024-11-21T03:38:09.830000
-CVE-2018-0408,0,0,f67ecef92635be56ff3872e434b7877b77e5417f8a8ef6b5e8a6ff63f3e74000,2024-11-21T03:38:09.980000
-CVE-2018-0409,0,0,6497bec839293b11d868b3c4f5d7af42f6580ad53bb1a934df6f6b6fdaf6a030,2024-11-21T03:38:10.117000
-CVE-2018-0410,0,0,24fe1a61e30a995cc17dd336a7b96069f822d6a460c062381697e6d4cbe531a8,2024-11-21T03:38:10.247000
-CVE-2018-0411,0,0,4683bdf15073b6a5f5841c239780ea13dbd5ee18e588448cfdd71c9ac50c5eb5,2024-11-21T03:38:10.393000
-CVE-2018-0412,0,0,6b247310ae69196458a9de2a112ed8d4f2e4770474d44d19e69cd084f5812fe0,2024-11-21T03:38:10.520000
-CVE-2018-0413,0,0,03ffc9dfbac9e0076308afcaecc0fedbfec6057714bd16ddc30abe76a560dd3c,2024-11-21T03:38:10.640000
-CVE-2018-0414,0,0,37fc466e407148dbe25f1a23e7af68573eaf300231bfdcdb8137863fa117d9e4,2024-11-21T03:38:10.757000
-CVE-2018-0415,0,0,a88fb64eaa8067e409ddfcb0fe5c714ba6bfe4ab22b8f20c65d462ae886325fd,2024-11-21T03:38:10.883000
-CVE-2018-0416,0,0,7e0d81b3003fb3c045e5efa5d82a8884a33d2c2fe98f3ee26e6520dd02478f97,2024-11-21T03:38:11.010000
-CVE-2018-0417,0,0,83fd66f274bb4b912abeae37c98cc122b1f1f58e98a0dacb6d898a3fee4ddefd,2024-11-21T03:38:11.130000
-CVE-2018-0418,0,0,55821f54a1d62551b3b96cf5e6916eb5d0b874e62589b819178b3b1bec23b98c,2024-11-21T03:38:11.260000
-CVE-2018-0419,0,0,f36dd0145c8cc1134a94c661e29de0ea0b38bb4f70a054a2f70a6f43c8b2b686,2024-11-21T03:38:11.390000
-CVE-2018-0420,0,0,ffdf48a7d5614e5ff5f98b1971ea75611fd4a658b8585dda210b63c3fd98fa0b,2024-11-21T03:38:11.510000
-CVE-2018-0421,0,0,df047f434b59a5fb28e668e8eff2848d527b91fd390142f08379ddf5561222bd,2024-11-21T03:38:11.630000
-CVE-2018-0422,0,0,c2f6e638f3d5637f271b5dcd952fa9992e2296844fdbcfc833f144f1df6c32ae,2024-11-21T03:38:11.760000
-CVE-2018-0423,0,0,254f54a8d321c7b0e71349fb02d127d9592e26216e91785c287a7daa0b996161,2024-11-21T03:38:11.887000
-CVE-2018-0424,0,0,1c0a5b7205c9301b77a99d08fb27b6250c9e3a350dc20f4e38a2b7b6c9eb9a2c,2024-11-21T03:38:12.013000
-CVE-2018-0425,0,0,c83c303725d57fadf5a22ff0ac8ccc74fb815d8c63cae2343c591c7655375743,2024-11-21T03:38:12.153000
-CVE-2018-0426,0,0,d9cec940dfd44a20a7a5e857f0e07474dca1245176975ab1f4e38e40d62a6c9d,2024-11-21T03:38:12.290000
-CVE-2018-0427,0,0,77891241061e317bc919d3f6e68458981f7962d2d1e2d76e3def7509cc757208,2024-11-21T03:38:12.417000
-CVE-2018-0428,0,0,b153b29cebc1c1ce13d39bfafb8f2f9243ca1a6ae0c71d0dc9b40fa57e2ed5c6,2024-11-21T03:38:12.540000
-CVE-2018-0429,0,0,60b03c2d215d405f5f7cb47c271925bd1125aa91be0e12bc80a9e5416c0c501e,2024-11-21T03:38:12.670000
-CVE-2018-0430,0,0,aee5d3d518e2439ba283ac9038f09a3af56999f354bfb46cb7354bffe6f2c66c,2024-11-21T03:38:12.793000
-CVE-2018-0431,0,0,7c4c1440bbb4dc1ed213add03519e6f3f77adb28cbd8ce811ad9d8a6e73f57b1,2024-11-21T03:38:12.927000
-CVE-2018-0432,0,0,5401eed59f37e5c9fcb9e593116d6613cd5dc4cd8f16e5e468fe65c333d9a057,2024-11-21T03:38:13.060000
-CVE-2018-0433,0,0,43cdcbe2325fcd5dc38fb32d6cfee8c42502f782f57c02f61b5e72adce22175c,2024-11-21T03:38:13.203000
-CVE-2018-0434,0,0,3463bf0fc9b1d4fec5ed66f6ba5b4c789c699e637bb6f4f206aa3027efe383c1,2024-11-21T03:38:13.330000
-CVE-2018-0435,0,0,300768a2719b6d188581a53c75fa8ce399c839ab8c12fd76c2a75727b73b7432,2024-11-21T03:38:13.453000
-CVE-2018-0436,0,0,125a471f4072d7a863fc5c4cb9e4e598b3b3e3efb0ae566cc92208ffd27bad58,2024-11-21T03:38:13.580000
-CVE-2018-0437,0,0,489621585b0f02006f3f99de6e38317430e2471554166c4c2a2cdc3a0667b17c,2024-11-21T03:38:13.710000
-CVE-2018-0438,0,0,fe1d6d1743aa34602d0481c984e8ea8c14b816a327692d9e19cd8bf3a5f4ace1,2024-11-21T03:38:13.830000
-CVE-2018-0439,0,0,1049700ef1e80c218f3538e220321ae9c935908dfad33f79ce32b74a90dfad19,2024-11-21T03:38:13.957000
-CVE-2018-0440,0,0,3eba19950db801486563d26e62dc7e080849e61a7d795f2c62c40cefc99bbd79,2024-11-21T03:38:14.083000
-CVE-2018-0441,0,0,9e0ef4ddaf0d106ff4898e552fdfed36179f42483e9c9b961963c56904656f25,2024-11-21T03:38:14.210000
-CVE-2018-0442,0,0,ed96b93078579087a2a5c77d4a3c1d6680eeba0a274e79db99dcd0dec7fbafc9,2024-11-21T03:38:14.347000
-CVE-2018-0443,0,0,54da2c1c95553d766582b5cb5b817be0752c74181b83a8603c4406370358d40b,2024-11-21T03:38:14.483000
-CVE-2018-0444,0,0,0338a7126e4d39128de170539ba2546edfca218932bf16c011c8d8a11597fb81,2024-11-21T03:38:14.627000
-CVE-2018-0445,0,0,2a88a0fc2a2fb600ae06bc13184abc46d419a717c6bed394a04c3a7471bd6284,2024-11-21T03:38:14.763000
-CVE-2018-0446,0,0,58185d974ca41a67c106f10e836d13114713dc6af3da45c1f104cb012e56c5a5,2024-11-21T03:38:14.890000
-CVE-2018-0447,0,0,c90271c3bebc9feba741bb715ff8b27b1ce4bcf02c5e09c22376faaa281cef0c,2024-11-21T03:38:15.010000
-CVE-2018-0448,0,0,72b698ba21df49a0f3ee3be7bfe6a4e0ee849235d2565394ffaa1ec849689905,2024-11-21T03:38:15.140000
-CVE-2018-0449,0,0,875c60292466e83dafee4bbceb1e746d2245a627b55af0ef0716acac94b46802,2024-11-21T03:38:15.270000
-CVE-2018-0450,0,0,4d2f2a1993a4f21cab442d5ebbe2baf221a2bd66c9cfabfe1d279f7fd50ec421,2024-11-21T03:38:15.400000
-CVE-2018-0451,0,0,74f5066908f0f9aa0d086120455f42ec9e1e2bcaa83bd996bbec0668577ce8b6,2024-11-21T03:38:15.523000
-CVE-2018-0452,0,0,b6e8ddabc14ed3531b7b15c34ba61b0fdfc23637aa8d150e248697b8bbc39d48,2024-11-21T03:38:15.650000
-CVE-2018-0453,0,0,2a5387eadf4393e21cd985336f9cc053c68f0f3bf0fd96ba7d149252654f9ff3,2024-11-21T03:38:15.773000
-CVE-2018-0454,0,0,93da0b37108ae403686dc9e997d1ac3840767a860eeaa93242cca34c563eeda3,2024-11-21T03:38:15.900000
-CVE-2018-0455,0,0,7fb2ca453fff5501c259edcb51a9b8f98b3a428181955b6f8d6b0d5661a8cedf,2024-11-21T03:38:16.027000
-CVE-2018-0456,0,0,0e734b0fc0a0f60ab42cf500d6e53d8a4cd59540296de11a5d040a945fc964ae,2024-11-21T03:38:16.167000
-CVE-2018-0457,0,0,d3a49b2653c69c3a9cc608a605d33a670abca651916cf70d5824c7a693be0cea,2024-11-21T03:38:16.297000
-CVE-2018-0458,0,0,f469af50872e54261cea16cf7c84d5cb2f5882826f78fe7f732e2223519d263c,2024-11-21T03:38:16.453000
-CVE-2018-0459,0,0,b0414a057c11126f8e95373c81acab6becb32e0ac2c8796a048d809a2e18f0e5,2024-11-21T03:38:16.580000
-CVE-2018-0460,0,0,310014a3e329ee023300a68e127528f68aaea16f7d2df78f4c984249a7c73027,2024-11-21T03:38:16.703000
-CVE-2018-0461,0,0,fd01e76bc6eb10974ba279297459fa3a457b8b6d76349b2710cf1570f6f5fd43,2024-11-21T03:38:16.827000
-CVE-2018-0462,0,0,cdc2ef5a432e2fc9342323c2d72b0ec9397c70cbe09c1740463bfe694e972092,2024-11-21T03:38:16.963000
-CVE-2018-0463,0,0,427f7ea6da6da5e0845e662313f4698d27b9545ed110ffd0ac7125f6eefeacb3,2024-11-21T03:38:17.087000
-CVE-2018-0464,0,0,da015cb947859e674a67abace64ae29ccb2d38aa9d7decc7cfa660e94dee2974,2024-11-21T03:38:17.203000
-CVE-2018-0465,0,0,02710a24058e97296310c1e83677eda95510a07e6203e3b7c5b1bca67499f93c,2024-11-21T03:38:17.337000
-CVE-2018-0466,0,0,92877d2d0efca140afebf29c8e1a645321d52db8b7b41e2819977c1f79e35ae4,2024-11-21T03:38:17.497000
-CVE-2018-0467,0,0,cbbedd59a5bc6ebdd1583b7909dbca4792e98c01acb50189bc8d67bc6a4b2521,2024-11-21T03:38:17.637000
-CVE-2018-0468,0,0,5191339b29ed6d6413a19bd3f43ab561ce725eb1f28ec71434639054c7f92fc7,2024-11-21T03:38:17.777000
-CVE-2018-0469,0,0,4326fe44243a34bb69a36fc6a8c2184129a3bdc6c9a926c428582e57bbed9118,2024-11-21T03:38:17.913000
-CVE-2018-0470,0,0,59e4c6c09ff97d6a1f6704cf5a96f5563798cdcb91aafa72a7ffc09a15f3b7d0,2024-11-21T03:38:18.050000
-CVE-2018-0471,0,0,7a8f27b725fa25f3b22889495b741052228855f3416fb2289f4139343103c845,2024-11-21T03:38:18.187000
-CVE-2018-0472,0,0,a431a96479d39656b7744840198386f1397b03dca37d15581ed75217ef312d62,2024-11-21T03:38:18.313000
-CVE-2018-0473,0,0,52b4fa4c270e6d6f76249f9eda5afa826018ef8d459bcbc2542af00723dfa984,2024-11-21T03:38:18.440000
-CVE-2018-0474,0,0,23f67614610e5160bd33b0de8885f5f5c0d4228fba5d627638652308d65e171c,2024-11-21T03:38:18.573000
-CVE-2018-0475,0,0,778658ec7b85e9e4cb92805cce48a0aee9f0e9a7b3be2d5e3d05bf1f75ceab9d,2024-11-21T03:38:18.710000
-CVE-2018-0476,0,0,38ff6135bbb4b6d87dcf0c10d7cef00fafd5a62b58f0c35a98a982bac8a9ead6,2024-11-21T03:38:18.833000
-CVE-2018-0477,0,0,1b37790f73c99603dd2b1f09df1e49a793c27b50bbd0d7cef73f39fd2027538f,2024-11-21T03:38:18.967000
-CVE-2018-0480,0,0,a4509538a54fa08c482817b1df70d34ed4a8fc426e9f6abecfc5346e4a0f296a,2024-11-21T03:38:19.090000
-CVE-2018-0481,0,0,a351e7b0ea66610bcc1c1b3c99c122beaa17e14fa14772cd32001c26c6f4249a,2024-11-21T03:38:19.223000
-CVE-2018-0482,0,0,84d6ba87cdafbfc1b85eeeadd53c6aed581393e47949433410da8b212958e92d,2024-11-21T03:38:19.347000
-CVE-2018-0483,0,0,37c27071fb12adecdcbe8ed0908de2976745c082591d61d3339e9cc7714b83f6,2024-11-21T03:38:19.483000
-CVE-2018-0484,0,0,1800cf6fca2a2eeee681d159b6640b33cbc5b5c168fbdbf7c19bc66ee4d96f42,2024-11-21T03:38:19.630000
-CVE-2018-0485,0,0,b634bea78754338af8ee7ddcf5fa41845b223aa15fa44adb46b45ab676678bbc,2024-11-21T03:38:19.810000
+CVE-2018-0086,0,1,b1c7ebf34df3b9529b3fd5a962727a46bb6a8d044db3170903364d65e62c7783,2024-11-21T03:37:29.657000
+CVE-2018-0087,0,1,db13467a8b115827c8963c7401795dac721d14b5e306101fbc9e035a16632847,2024-11-21T03:37:29.773000
+CVE-2018-0088,0,1,e4addee5390a3d2aaa028108d4a99db86187a0f825047a86a197044d9cf82bc8,2024-11-21T03:37:29.883000
+CVE-2018-0089,0,1,61c3d3c04cd3e06133ced2ee51a56cbf248f31b7f53b2e07c82973794b245071,2024-11-21T03:37:29.990000
+CVE-2018-0090,0,1,5b50cecca7683e17d5dbf5d7a7c08d0ba68ce29b9e6738c7cf648588b9d34272,2024-11-21T03:37:30.100000
+CVE-2018-0091,0,1,0166a9300e57a3bd040db879cdebbe4fdfb783722fa95c14b8d41a1ee4bff00f,2024-11-21T03:37:30.213000
+CVE-2018-0092,0,1,52a66b88f9b0b7b6d6acaf510f6245dfd1733a5cf67e3364cf1f39d6213a0833,2024-11-21T03:37:30.323000
+CVE-2018-0093,0,1,cd737e306d79871b267ffb6dc7323bcb128a5fe51bd9d294191bd57ce2194533,2024-11-21T03:37:30.440000
+CVE-2018-0094,0,1,0eee5012f19414a93dc1a5ca1daef776ba71f7b7438fbd62ebb2ba8f6937fa1d,2024-11-21T03:37:30.540000
+CVE-2018-0095,0,1,0dd6b206a3cd4b093bd35987f7f55dbf633f49fe1b433ad2753ba2810ee3fcef,2024-11-21T03:37:30.650000
+CVE-2018-0096,0,1,f3832809733cd3caedc05573ece03301cc771e8486f0a6ca4dc1674fc37bedfb,2024-11-21T03:37:30.763000
+CVE-2018-0097,0,1,98676f5f97fbae281088abf532f47298ad40c2e76466cdee006b6c665691706b,2024-11-21T03:37:30.880000
+CVE-2018-0098,0,1,5b9ed09d32eb44a991d741d3d4a420d4a6700679fd760b25fd485647c2f3d521,2024-11-21T03:37:30.993000
+CVE-2018-0099,0,1,ce39443cb3440ba4b9b05caac300f089fe02091a02ef88bf78f485456a148d2b,2024-11-21T03:37:31.117000
+CVE-2018-0100,0,1,26fe3287e5416e34dad1e1f6042171f5da6ce510d2d6751eb50693b87c629d43,2024-11-21T03:37:31.230000
+CVE-2018-0101,0,1,1e5496ba11974bea21190012146e91db37e633e37b4745604ddf002542d7208d,2024-11-21T03:37:31.353000
+CVE-2018-0102,0,1,99e3c93588d48d69ffcdc36bb0a6a3035425424a3fb988a9ca3cd443e9aaacaf,2024-11-21T03:37:31.487000
+CVE-2018-0103,0,1,7c9785abc712a91451d5c37c8b23875ea8718b650e7cc636ac4f35574f27a55c,2024-11-21T03:37:31.613000
+CVE-2018-0104,0,1,177689d745a1e9a36fcc8a8b1de1e0ee94af59467048dfb76a071a47a9be86f9,2024-11-21T03:37:31.737000
+CVE-2018-0105,0,1,0a1030792d21ba89c1fc2d8b762832acedd76b565c8e20f191cce1cc6665101b,2024-11-21T03:37:31.860000
+CVE-2018-0106,0,1,3ab274315a8f133936487cbc9d38826791f1b3514d73fa093a1bd20efe8ff1a1,2024-11-21T03:37:31.983000
+CVE-2018-0107,0,1,8af57f7b9fc23c247562175222eaf7e4a4ad6a17780df94133ec75551e2db6c5,2024-11-21T03:37:32.113000
+CVE-2018-0108,0,1,5dc813b22a9d6461f3e3d149291ed44c22a9960be659cefb22777956c2b1d172,2024-11-21T03:37:32.230000
+CVE-2018-0109,0,1,5a65c5b992eea29cc93766d31c79307a85b92f5c03cd1776765354aa65f4ffe5,2024-11-21T03:37:32.353000
+CVE-2018-0110,0,1,380c065b1ffe3953d3dc3577ae28ed1ca22aea926a9286de1330aa3552f75adc,2024-11-21T03:37:32.470000
+CVE-2018-0111,0,1,a53db33a624e220d8327f3890e6bccf45e1fbc352d6021662954bf6b09dfa2ca,2024-11-21T03:37:32.597000
+CVE-2018-0112,0,1,52a035a67a742884a68c65b63b05fb392f48341ea5407fa8bf3c26e622bbbd32,2024-11-21T03:37:32.720000
+CVE-2018-0113,0,1,484358588409bd3d843c9cc93444204cabfac2d5ff678818708fde08e22d1562,2024-11-21T03:37:32.857000
+CVE-2018-0114,0,1,36ad1cdeda4475ffa8a1fc497636e034354b957ac05b196a435a9aa9eb1da187,2024-11-21T03:37:32.987000
+CVE-2018-0115,0,1,078c473a7d7de756987602cfc9ac2e25fd5714112a0d518941eab99ec7851e8a,2024-11-21T03:37:33.120000
+CVE-2018-0116,0,1,6f1102644b53134acf72d245d426b6807e14e382b6b73c8002b0ed473376a41a,2024-11-21T03:37:33.250000
+CVE-2018-0117,0,1,49cc6b93a65011116190723f5cb2a4e5d7b1d974085c56e69de5edffd72a0018,2024-11-21T03:37:33.370000
+CVE-2018-0118,0,1,650aeb2b09a4575bc099dc91ed9dcb83fd16efd845ad06fc932790b87058888c,2024-11-21T03:37:33.513000
+CVE-2018-0119,0,1,6cec07bdd4aa373bfa7bbd1c667258db097faf8b6d3ea1dd712b72d4bf907885,2024-11-21T03:37:33.643000
+CVE-2018-0120,0,1,92bc9d2a7637298fead54ee321b5cb7728f0d6e87c65913be99e390e0f756498,2024-11-21T03:37:33.757000
+CVE-2018-0121,0,1,eaf54fc38863dbec3c498392d510b2c76af7fe881189cddd917cfc625f081c8b,2024-11-21T03:37:33.873000
+CVE-2018-0122,0,1,9acf1646b20825207ca4c8f7c0a495c0d67d07716c4ec65da6ddc73a939d5c0c,2024-11-21T03:37:33.990000
+CVE-2018-0123,0,1,bbf910f91758b09fa4f0f964700d33fccdf1cddbee43bcd532938e40b1e32004,2024-11-21T03:37:34.120000
+CVE-2018-0124,0,1,74fdaf518c526527701f311afdac88d7ffc2024e5203395157af378d7cbc2f84,2024-11-21T03:37:34.243000
+CVE-2018-0125,0,1,c963a0b24ab1099364315005ff8dcde851294056839dbe1ee67751d7a204cd80,2024-11-21T03:37:34.360000
+CVE-2018-0127,0,1,5cf7bc8401b039ad1fdf00b1804da9025a26fe8b35253f38c352f76f82eb5fe7,2024-11-21T03:37:34.500000
+CVE-2018-0128,0,1,c4bafb0bb622e6672dddf180bd52ac8f2bfdf3e9d02b33304fb925b5406d3c05,2024-11-21T03:37:34.633000
+CVE-2018-0129,0,1,f4423d5c300c3409025ac2a219ba4a273dc39cd73313af7e38a4109978c23ff6,2024-11-21T03:37:34.750000
+CVE-2018-0130,0,1,69a750a51d03957aa8b7f7a7936befa338f4729bf173b0b2f0f8b9e63377bcb8,2024-11-21T03:37:34.870000
+CVE-2018-0131,0,1,37257254f7670e053e246913b7bf5d684e9169f06e4129498bf3ebc2e448754c,2024-11-21T03:37:34.990000
+CVE-2018-0132,0,1,624de7eca12e7290c82567c28ae4f742a6462d228d35fd9364bfb77515f0ba1f,2024-11-21T03:37:35.120000
+CVE-2018-0134,0,1,c04e9a8b958f35318ee06a54b9fa6f0a07cc7b09eadf23813f46c62b3f023135,2024-11-21T03:37:35.240000
+CVE-2018-0135,0,1,52e38fbdb3bfb8475fdc7fc1853204f68aa0ee80a328cf3868dd58b85c8d6419,2024-11-21T03:37:35.357000
+CVE-2018-0136,0,1,8fde048a01144be57aa2867277eabbd08bb29fbe205f1d3ee56a94fee5de1dd4,2024-11-21T03:37:35.470000
+CVE-2018-0137,0,1,6bbff1d01d86470ca8a162e72d6cb622feda684bef4fe7347c68cf53cfce270c,2024-11-21T03:37:35.600000
+CVE-2018-0138,0,1,9f5b435a19778f0e76fe3e46a2e8ab1ce3984f8feb0e1f64c732b0d8e57c1725,2024-11-21T03:37:35.717000
+CVE-2018-0139,0,1,273a3777ec6d6ff4452a2a601854667e429194e4c6064eb2e68e4dab431cfb8f,2024-11-21T03:37:35.830000
+CVE-2018-0140,0,1,fd2fa9d88684cfe638968da68ee331055a76d364a1e04c7f26658c1f9ad43637,2024-11-21T03:37:35.953000
+CVE-2018-0141,0,1,5432881d46719e6699337b0cfe2fb6ac4dd2471ca645eebdb18fa3b54ada7500,2024-11-21T03:37:36.077000
+CVE-2018-0143,0,1,43359daed7186d93a6d137e68f5b4f0bb1e0e668ef696e8c0c77840241ef361c,2023-11-07T02:50:58.707000
+CVE-2018-0144,0,1,48d7879990c0702e36fdac3e2937a02005fc24301ea0304c06e039a265478007,2024-11-21T03:37:36.217000
+CVE-2018-0145,0,1,a3b8082e3cee86aed3cb5cf4fa4193628ce43e2897e18a99393b363cdd6ae473,2024-11-21T03:37:36.333000
+CVE-2018-0146,0,1,f9b60df6ee3df1350cf829904e962e7939a5c165b6ad8d693ac4da640393906d,2024-11-21T03:37:36.450000
+CVE-2018-0147,0,1,16bf323ce47e3851c7abb8e0df258f94ed81b457feae3490e60e596bc36bf56a,2024-11-21T03:37:36.570000
+CVE-2018-0148,0,1,3b74b09277071b5d6eccb9d19b54d0ae94f23da1353f85149d1ade3773ea0890,2024-11-21T03:37:36.690000
+CVE-2018-0149,0,1,abdc39441c3f3d5650a4a8083f0df5b025c5a317f6803b647d0a642aabb8d8b8,2024-11-21T03:37:36.807000
+CVE-2018-0150,0,1,7b4619f80f31abc93e254e532b9e6d0026c40c247bfe7bd8f2dfc852aadb5a7b,2024-11-21T03:37:36.930000
+CVE-2018-0151,0,1,3762775b23ecc1b634bf9e4695db4ec49cbd102b55fa6033cf6c2333bd226874,2024-11-21T03:37:37.053000
+CVE-2018-0152,0,1,ce33e07a872b78c4b94b6c3d5022a148420b9720b32d31eb0d707761bac6f1cc,2024-11-21T03:37:37.193000
+CVE-2018-0153,0,1,a1c872cfa83725fd851b91d6f55104879503cefbb842761c44d061b1e425b0cc,2023-11-07T02:50:58.977000
+CVE-2018-0154,0,1,1cc10ac3cee0736017f9bae22934a2660a64d57cee8d8f2ed6bea8b168460ad0,2024-11-21T03:37:37.330000
+CVE-2018-0155,0,1,c2ac208e0986a3058e74f32b713809403ec2a47566013dd5d60bf03b97bb6876,2024-11-21T03:37:37.483000
+CVE-2018-0156,0,1,8a9c3fb4bdf267dadd8c8b83e4cdf132fddbfc88734d4268cc030c4a1012bade,2024-11-21T03:37:37.627000
+CVE-2018-0157,0,1,6043788694ddff654c19c1fbd5846c1bec8223107276c85bea03fa93db7af8b8,2024-11-21T03:37:37.793000
+CVE-2018-0158,0,1,d1ea938e575d589d3d00ad6362b151c0d3b58b1852f2623d86811f4e1ea46750,2024-11-21T03:37:37.910000
+CVE-2018-0159,0,1,74d2d177cf0dcddfa1228fc63b2146adf6ba5a12fededbe6fd0dc24a43b0e9c1,2024-11-21T03:37:38.063000
+CVE-2018-0160,0,1,99ae8123edbc5ba56c37f156fe106f8ef464fab5cf760983779880e3a391b664,2024-11-21T03:37:38.200000
+CVE-2018-0161,0,1,3c36357b4366d4da1db4656a32c3546142f169da5f514505669211b7f70b9d58,2024-11-21T03:37:38.320000
+CVE-2018-0163,0,1,e103e6c2b87fa4abdfb8ef2bcf784bbbc059c22b1ef4bc725759ac41c4e6769b,2024-11-21T03:37:38.443000
+CVE-2018-0164,0,1,a420667342fd78e4c46a705df245604ca3287432b79a5984b21129ae806aa406,2024-11-21T03:37:38.590000
+CVE-2018-0165,0,1,51bbee1bdfee70e60032c23a83778d72d509bb892cfd424f481d82ac992c57b3,2024-11-21T03:37:38.727000
+CVE-2018-0167,0,1,c547e0082883e250d8203a4485750234e8498f381b2f93a6d4b01fe26ef71b89,2024-11-21T03:37:38.867000
+CVE-2018-0169,0,1,08d2783e6ae1a541bdfba78455fef87c319a2483558043e0d0396799ee2a94c7,2024-11-21T03:37:39.020000
+CVE-2018-0170,0,1,b3a5c634803b50ba9c7181cd86ac33cdae26759d72cc6ae21a09f922ad5e30c7,2024-11-21T03:37:39.147000
+CVE-2018-0171,0,1,5144174c5428399ac597e800037c7b878a258ed3906c093622348a5ad48b7151,2024-11-21T03:37:39.277000
+CVE-2018-0172,0,1,6d9746735c8a63bf061bab1d420e9517ec1e3aafc77573738fdca6efa33ad8cf,2024-11-21T03:37:39.413000
+CVE-2018-0173,0,1,5ea2a7a2edd5233a745c84dde659194b70b7c8a02f7afb2ec98aa5e7249462ec,2024-11-21T03:37:39.563000
+CVE-2018-0174,0,1,d5af85bbaa4d14555b8730d6197450fb3f037434f9fe30aeaa88e32b6bd5de25,2024-11-21T03:37:39.727000
+CVE-2018-0175,0,1,0cd0ceaddc89695d7a647260a594c6ff122df2813f5e2e0d504330a198df7778,2024-11-21T03:37:39.897000
+CVE-2018-0176,0,1,e35f372f5047f48fdc4958b0a23854b1f9428725ec877eca4d6db44b477a3ef5,2024-11-21T03:37:40.057000
+CVE-2018-0177,0,1,9678706b1907ae4166539e0f63dac962c46ec823135aaf961df10aee97387a2b,2024-11-21T03:37:40.253000
+CVE-2018-0178,0,1,7febd2620d0370a774daad19a4841f98a039ae75fef79ea3185246306ea2ac9b,2023-11-07T02:50:59.347000
+CVE-2018-0179,0,1,cdc9625b205424396cfa17b5e000074666288f01a2f4ec6c37801c606c02cd6d,2024-11-21T03:37:40.420000
+CVE-2018-0180,0,1,bdb0037bf64da41b4213042c698f2f9e9e255b3fa4355ecb3f79013475b769e0,2024-11-21T03:37:40.587000
+CVE-2018-0181,0,1,ba177ad2b3339e2eb8ba6a24b139c705d517149a15a501d06ae8ea14ca138944,2024-11-21T03:37:40.750000
+CVE-2018-0182,0,1,649d918baa7dfdf88adaf6fe95a9acaa78511114571ade6a3717856e8819a6b0,2024-11-21T03:37:40.887000
+CVE-2018-0183,0,1,d8d0388fc48221b82119d1f3bc3125d49a164d739507796034c915a283f65161,2024-11-21T03:37:41.013000
+CVE-2018-0184,0,1,22aaf0c09a7cbc492a1cbea5a8853e1e19d45b682d022f05482d369fc5443201,2024-11-21T03:37:41.147000
+CVE-2018-0185,0,1,fe25e5371cfd693845d46b16da3b203a2062f131e45b3b481d8a7e75b03ce870,2024-11-21T03:37:41.270000
+CVE-2018-0186,0,1,d79d479b3a8ef93d64d1262c6ed2b7d225624bf9b36ad5d8b8158c6730ea3775,2024-11-21T03:37:41.397000
+CVE-2018-0187,0,1,72bcc8f6603c0a36f966ce2dbc582299148156ab4d7963cab9bb7e618f43a10a,2024-11-21T03:37:41.510000
+CVE-2018-0188,0,1,4f18a1a8a1d2b986b4ab32012acc897859d680fb5816661ef2a4de1647702dec,2024-11-21T03:37:41.640000
+CVE-2018-0189,0,1,a87669da911c1112fe39d8d6dc439d699b2e92396b4dc1eb6643aa6ace702591,2024-11-21T03:37:41.763000
+CVE-2018-0190,0,1,24272759d14cbf37cc9cc1fd646f4809d735623f3810f71d90c0f46d0c6b2881,2024-11-21T03:37:41.890000
+CVE-2018-0191,0,1,d3ae10c463e4b2eea6552be5a41ea451de61d22795da89a6a54fdf10c49de987,2023-11-07T02:50:59.650000
+CVE-2018-0193,0,1,5a1970f45c3cbb21849305261863168f1c2f58bcad5c6e0f68988704139ff3c8,2024-11-21T03:37:42.023000
+CVE-2018-0194,0,1,b9a2b0f2968a35196c96d90f50c61ec3cfdb49ec20e296f2ee148a2bd1c4df4e,2024-11-21T03:37:42.147000
+CVE-2018-0195,0,1,f6df8d880d2b001a8ab7f7c264cf1ee7873979d20266b025f812f07056d8ac92,2024-11-21T03:37:42.277000
+CVE-2018-0196,0,1,1aea4e3299ff68bd680df3cc0d4f972e81c3ec161afced07c809d5a75aaa94f3,2024-11-21T03:37:42.407000
+CVE-2018-0197,0,1,36cfbe0bc969cf688d25fd833ab18a4e703d830fb86fc93efd074ca66d3f0a36,2024-11-21T03:37:42.523000
+CVE-2018-0198,0,1,8fad987a184de3d2c8b9028d0150ccae54e1053558a317beb459af841385ff13,2024-11-21T03:37:42.773000
+CVE-2018-0199,0,1,1ae0728807870f822870fd2dd80e31954a48572ed50ccf7c0705ffd20942861f,2024-11-21T03:37:42.903000
+CVE-2018-0200,0,1,d6fa252f83dec56644389f354fc007358aaf25677f07c2f36cec7898666fe131,2024-11-21T03:37:43.030000
+CVE-2018-0201,0,1,fdbcc0c4cef139f8f12b71807065c4511313a7064eedaba3b881a517f3d52a78,2024-11-21T03:37:43.163000
+CVE-2018-0202,0,1,8aeb1eda56cdcc1c3bce2ddab9bf2db43a9a2191572ddb21cd67b30ed0347a31,2024-11-21T03:37:43.290000
+CVE-2018-0203,0,1,d69eed0e217ca768b9b495a19db297f1e8b1f5231c94b7a1b3efd35a91a56544,2024-11-21T03:37:43.427000
+CVE-2018-0204,0,1,77742a13ae369290f71439e50d023e04e138dee1f053d9fd174ef99d3e2243be,2024-11-21T03:37:43.560000
+CVE-2018-0205,0,1,bdbd3de276809069d3f85549f63e26c9b683d6d5019a1e113533fae209dcc248,2024-11-21T03:37:43.697000
+CVE-2018-0206,0,1,ce77d35b389e74c6adaae159c6104e7c8be9926e523c60a06773c489bdc47a8e,2024-11-21T03:37:43.860000
+CVE-2018-0207,0,1,b8e8bb2d55e16f888a6cc63e8c963aa2aa0a47251b868e645010c57ae617f438,2024-11-21T03:37:43.990000
+CVE-2018-0208,0,1,2262c138ee3f7b6790a2054159c986d756b2c92b7008a501e25f7d53b8337b1a,2024-11-21T03:37:44.113000
+CVE-2018-0209,0,1,c8ba94d185a3d760fe526fce1ac2fc45a247f762032f86995d219a1445d862d9,2024-11-21T03:37:44.227000
+CVE-2018-0210,0,1,80c591aaf04a2508789d2dab142bda0476cd09bcbbbbd116ba7c477bdf48a68d,2024-11-21T03:37:44.350000
+CVE-2018-0211,0,1,8a4cb9e5765aa53447949d1b5fbb8d6f6e58d87c2e66ed3ff940a41a5fe12647,2024-11-21T03:37:44.483000
+CVE-2018-0212,0,1,871a3a562a0e5f0bb7b6c5a0dfa39e9057ccdbc477b50046dfca088269ab230b,2024-11-21T03:37:44.637000
+CVE-2018-0213,0,1,c62dd44c0e76762beb904e541d5bc45243399033d6508188a9363c82f8f34e9b,2024-11-21T03:37:44.770000
+CVE-2018-0214,0,1,6ff952ab040d558e7563ec4b5379fc2a51d907bcb009cc33fd46532caaff89ae,2024-11-21T03:37:44.910000
+CVE-2018-0215,0,1,7657674f5eb34f2a0034b617c593f08fec091d7db435147829a8101eb7aba777,2024-11-21T03:37:45.030000
+CVE-2018-0216,0,1,103963e35c20914f7c0795453178f5bd1419cce0439610da2fe0266fda91abd7,2024-11-21T03:37:45.153000
+CVE-2018-0217,0,1,af76d209f04aee491b63ab2693b8881cb0d9382858a6b31838986f8c4afb65b9,2024-11-21T03:37:45.277000
+CVE-2018-0218,0,1,9872b5b0fe3006d3ec809722653b9fc5380d0db3fc733dbf84b2469763107aef,2024-11-21T03:37:45.400000
+CVE-2018-0219,0,1,b33b5562be176cdda54fb0ed1c4553814eaa4628a373a989372f40c894ed8deb,2024-11-21T03:37:45.520000
+CVE-2018-0220,0,1,f5c6a599965436c4d6fd8de4f03dec969e9264f2856031e567d7a96b74c4a480,2024-11-21T03:37:45.640000
+CVE-2018-0221,0,1,4963115d330e3cb953442f67798a60cb6dd0f03e6c1b21d85d7ad04a5348f552,2024-11-21T03:37:45.760000
+CVE-2018-0222,0,1,a0fc7f3db0896622421b7a3013a7eb1c34fd6224c54c512711eed5153eac0e5b,2024-11-21T03:37:45.883000
+CVE-2018-0223,0,1,b5876bed273a8d00058a831680a7f8d5fe247c4e3c87fada0b7e7b54ad45ca73,2024-11-21T03:37:46.007000
+CVE-2018-0224,0,1,c60c77dfabc09d88187b58e1757187da12aea6b41439140bbd4a6083db990bf1,2024-11-21T03:37:46.123000
+CVE-2018-0225,0,1,f9707dd4f4ee815bd338f03ad53dfc409da0bd9afdcf10890eeeb0fca1c6a3dc,2024-11-21T03:37:46.243000
+CVE-2018-0226,0,1,fd06cc1aad19f5506f96b029e394ee2a5314b809ace1a0c4ab34f15f7434ffad,2024-11-21T03:37:46.360000
+CVE-2018-0227,0,1,57d238c6a2c0f223f0d0ee9bab936b92e3097a708012cbf6994466241d4eb57a,2024-11-21T03:37:46.490000
+CVE-2018-0228,0,1,f8cee20a84d34e11313cf4582facd2f60e698eaa9efcfce8fd15b631fba24e49,2024-11-21T03:37:46.627000
+CVE-2018-0229,0,1,b1bc3d9ff9613d24876f15ae0005102f33907db8f1414ba804f42001dc169de2,2024-11-21T03:37:46.770000
+CVE-2018-0230,0,1,8f5bd223fd59124831d74746a672b17cde6ff128e12a656967ec124d06b85369,2024-11-21T03:37:46.897000
+CVE-2018-0231,0,1,5eba7c5087103ce974acc2709a64aeed6dc7391a702d8ba6b1b87b8f2a4e95ce,2024-11-21T03:37:47.010000
+CVE-2018-0233,0,1,8c946c425193f408357522b69e90326a0565b5dac480f9bbc3e697dde81577e9,2024-11-26T16:09:02.407000
+CVE-2018-0234,0,1,9a3b2ae2788335b09f694c44b2647b350de4c7d5ef25aa10518de3d90a8fdc2f,2024-11-21T03:37:47.230000
+CVE-2018-0235,0,1,fdf109c23287732a9743848af555b5e848fcfb8ae259c299b7514e2f13c4d59e,2024-11-21T03:37:47.350000
+CVE-2018-0236,0,1,ceca20811587d2cbefa1d3be2dad0f60bea40468298ed05fb8ca3316625c0be2,2023-11-07T02:51:00.233000
+CVE-2018-0237,0,1,f18fb66cd0e31a8078f669d9e2d598d4a3eb2d7cace8eff1feea293286752801,2024-11-21T03:37:47.473000
+CVE-2018-0238,0,1,2bd745869046fafd48e9b07d7ac11cccb0a657aabed52b3fdca0b3c2e35dde1a,2024-11-21T03:37:47.577000
+CVE-2018-0239,0,1,324b1f384bcc28117dc998c398370a6a6476a1a98decc4d79f7659e39c3d6129,2024-11-21T03:37:47.690000
+CVE-2018-0240,0,1,e6220f88e6ad5c61c77ebb6b8c7abeac815476df25db90a54002840f6950e7a3,2024-11-21T03:37:47.810000
+CVE-2018-0241,0,1,3ca0ce7b39ae80b424aaa6798ee051c3448735222e2369679da4ec5d2656c378,2024-11-21T03:37:47.947000
+CVE-2018-0242,0,1,9f094dfd4b7b714476673756e5f9a0f96e9b63b25c33223614bbb3a21f1fab3e,2024-11-21T03:37:48.067000
+CVE-2018-0243,0,1,8833758e2462c02995ca714459876d006110a0997fa781e5b4a5d4eb368a9c1a,2024-11-21T03:37:48.183000
+CVE-2018-0244,0,1,0c0074d3f4685c06e41b44436e2c9d19090bea7515262df4d08bfe77fe0ab315,2024-11-21T03:37:48.303000
+CVE-2018-0245,0,1,62459f0129b2417c15815a0641be49f81f83d6dc3fe88124fb46ca211e910a3e,2024-11-21T03:37:48.420000
+CVE-2018-0246,0,1,0a539b4e19ea3e26fa2244341d9ea3906f3f817f9dd5e862f6d6e92e8845025b,2023-11-07T02:51:00.523000
+CVE-2018-0247,0,1,6c0ed105e8d42f8f1579ad17658837dc367fcd0ab62c07a716eaeb8540374d79,2024-11-21T03:37:48.563000
+CVE-2018-0248,0,1,31de928af66e8890f2738b680d7d61ab41c63411641c5d9b9e7b7968d25fc480,2024-11-21T03:37:48.687000
+CVE-2018-0249,0,1,1c8a8cd119e77be725fd811fd38d247dad4dce771b5a700fee1020b7a9aea77f,2024-11-21T03:37:48.820000
+CVE-2018-0250,0,1,0d224b4b40eb24759c42d9323faf1dba1d05d0d7fe1f4d0a48fa3fce2e450b4f,2024-11-21T03:37:48.950000
+CVE-2018-0251,0,1,7335525b07ee44463d63583062dbbeb67a104b6e71d368810de613c2e3cdeac2,2024-11-21T03:37:49.093000
+CVE-2018-0252,0,1,ce7d78b1ca89f45b942e8b3ac18132da135b11e6a9f1c2a226b472821525f360,2024-11-21T03:37:49.220000
+CVE-2018-0253,0,1,5680066539af20d23c9a8d3d94ed37c8dbb9aa0b25735fa0c8434e684fc338cd,2024-11-21T03:37:49.340000
+CVE-2018-0254,0,1,1d9393005e2a9529fe7e1d304a829eb317a244010dc18a2f300a0f7f2a09bd6e,2024-11-21T03:37:49.460000
+CVE-2018-0255,0,1,17183483246719f0a120049c91cd60395f299b11df0316f58c3e279f1e9e5c06,2024-11-21T03:37:49.590000
+CVE-2018-0256,0,1,d17e19e0d7148438422d34865841fe87bc5b246da4b15accf530e0ae34de9710,2024-11-21T03:37:49.710000
+CVE-2018-0257,0,1,fadae0425dc491af58cfb5768120f348e92c10790bfa69ff5e6ee4209ad24bf8,2024-11-21T03:37:49.840000
+CVE-2018-0258,0,1,8e0b051a67dcae0cd0f295364ec7489114e9b4f574675d06b0b787c3763a47aa,2024-11-21T03:37:49.960000
+CVE-2018-0259,0,1,8461a7a7ccc68248b294d2ac7927770b014a3664a73f0a75820d7bb7af2bf7a4,2024-11-21T03:37:50.083000
+CVE-2018-0260,0,1,b4de45cc8f1bf8a5ea5c505dff713d28246616210df86d830860f45a836f860c,2024-11-21T03:37:50.203000
+CVE-2018-0262,0,1,9b913448c27fbdb5de73cbab182778af1fee13196aa9506ea4adcae80f608fcd,2024-11-21T03:37:50.317000
+CVE-2018-0263,0,1,967de28dc571a44181ef1d082f2c63e2338f78806392003d31541d1da651fb6e,2024-11-21T03:37:50.433000
+CVE-2018-0264,0,1,0df7426f5bd15ee6ab5d5bf15713a0e0709747aafa8f63c5d3f0d31693202001,2024-11-21T03:37:50.560000
+CVE-2018-0265,0,1,a0987701a85e8bb2c7b0818320a989357e71d6f63522592200a36a2749ba0839,2023-11-07T02:51:00.943000
+CVE-2018-0266,0,1,063dba6ef6df641f5947fc7b84298c3ad8e51868a745b6d79d275b04d0b65691,2024-11-21T03:37:50.693000
+CVE-2018-0267,0,1,0980f7c5dd9e91165960c76c3d78ea7d86abb988941b6bb73f9d6e5e029b706c,2024-11-21T03:37:50.813000
+CVE-2018-0268,0,1,b811457caf3f002a2eef756c621c64f3ac8ec67125e83f6ebc322effc61e6379,2024-11-21T03:37:50.930000
+CVE-2018-0269,0,1,c5127984c03d83dc0b13dd7b23114ca6daedef21f13e334a9ae44dabb3cd7de5,2024-11-21T03:37:51.050000
+CVE-2018-0270,0,1,c919e6067fd371f43e98ebbb0c1d555a8827f8a8ef6059ce641f63aaaa670fa0,2024-11-21T03:37:51.163000
+CVE-2018-0271,0,1,f80f9e2fd35bdce6194b0a14faeb4bdf99d35edc90d571af56baee6e1bdb6f56,2024-11-21T03:37:51.283000
+CVE-2018-0272,0,1,f49374ec1406ae711cfcd8ac06bd28bf60e18947068eb8ce9a3467103e4dc1e4,2024-11-21T03:37:51.427000
+CVE-2018-0273,0,1,2ca91b5d114115763a552118d3807a2819d3363c3d1849de1e2d0a7e41b44633,2024-11-21T03:37:52.257000
+CVE-2018-0274,0,1,01aa9a495d70fedb05f3c39226417dd1491a4433d224f9083ed93551539f27c2,2024-11-21T03:37:52.380000
+CVE-2018-0275,0,1,43f2cf028c652e07c7224d9895e576d5d900e91e4eabec3ed341c0e52a117a5b,2024-11-21T03:37:52.507000
+CVE-2018-0276,0,1,70128766d1b998c112921946de87ef3f0a124711139c518eeb8b3788c0794b37,2024-11-21T03:37:52.623000
+CVE-2018-0277,0,1,957bab59019fe9623fb13de1f5d12a1751cfebab247505bdd3273072846d0375,2024-11-21T03:37:52.747000
+CVE-2018-0278,0,1,88d9066c7f11a6e94e930c20c0e01c1a8690fb77c40535ee92d55b68cde5eb96,2024-11-26T16:09:02.407000
+CVE-2018-0279,0,1,cf1d419cb51a001585f36313fcae648eac9e1843148b492e0208d62c68e7692d,2024-11-21T03:37:52.987000
+CVE-2018-0280,0,1,5bf8e7d84dea64bda19eaa91f2eda6994e3ddecd16aec3014ca5410942f4c167,2024-11-21T03:37:53.103000
+CVE-2018-0281,0,1,fb737569898834f7e4fa6a62b0af7a3a9f5171af779ecb8422dc908e905bdc82,2024-11-26T16:09:02.407000
+CVE-2018-0282,0,1,b966faa55873e7efd177cc0b7a61658726368dc84f0487979ad53ed17ee95206,2024-11-21T03:37:53.353000
+CVE-2018-0283,0,1,14de89a3aa338123dae41cbf89fc79596168e88ad7035e7107aa642358228ce2,2024-11-26T16:09:02.407000
+CVE-2018-0284,0,1,7df55bef4e7aae8d9736ac4c1ea66b7ef54f3a17b2a5d252b9200377d11a750a,2024-11-21T03:37:53.637000
+CVE-2018-0285,0,1,961d76afa0c328f5b24d6007fc0dfb49271948500a7179ee275a26a5db5cb077,2024-11-21T03:37:53.773000
+CVE-2018-0286,0,1,c3278af1972d0635d7cbce32aec59c684d14200b29c28a72823f52bff5cb3462,2024-11-21T03:37:53.890000
+CVE-2018-0287,0,1,1d6c5e6bdeb496c715715faf459661c16fd16bc0cac7e8693fed46c1579a2f90,2024-11-21T03:37:54.010000
+CVE-2018-0288,0,1,642b6cd291541b463d6203e662491e9bd9615785a55793eca66a220c9fc28f14,2024-11-21T03:37:54.153000
+CVE-2018-0289,0,1,9d4ed6e92c00cb90f126f5990ffd3a679b00b29bedbf3ad11f5d2060b90cc993,2024-11-21T03:37:54.280000
+CVE-2018-0290,0,1,eea92ca8c0956f7737c5d3eb1c366bb1fa8e9104e29e30fe679409b8c7140e6c,2024-11-21T03:37:54.400000
+CVE-2018-0291,0,1,336038185925e7dd97b2b4ba0616f01a6445d2d993d8a8e37ec639e714f0a4f3,2024-11-21T03:37:54.503000
+CVE-2018-0292,0,1,b573ef2bdc95066740dbe5b35a7c3c3a8bc7204dcce1d913287168bf357ab3e2,2024-11-21T03:37:54.670000
+CVE-2018-0293,0,1,9164a94794213bd5512db8f31b76b177c5851472d8857b9e820a100235232a11,2024-11-21T03:37:54.813000
+CVE-2018-0294,0,1,959dc5b4e2bafac41a274d79a3537733c9d2333bf785c36bcd835cac9941b89a,2024-11-21T03:37:54.957000
+CVE-2018-0295,0,1,9c2e4161666ad89907c584bb9af3e5be9c0666b2a249d229d3c6ad48cc290c18,2024-11-21T03:37:55.090000
+CVE-2018-0296,0,1,65913c5ce33e5e7f9abe168f0cbefe320888a1f29912d60f49623f9f056d4359,2024-11-21T03:37:55.227000
+CVE-2018-0297,0,1,27fc04ec1b3ecefca749321cda70cb00ff72277b53a25976ed0da4fe6994396b,2024-11-21T03:37:55.373000
+CVE-2018-0298,0,1,0f09cdc9c4d7b4d1890159012a11110600e39df4edcc6398110dd4fcdaefa73c,2024-11-21T03:37:55.500000
+CVE-2018-0299,0,1,b1bbea1ef46b3bc96f0f5e61907fea629fa0f3ae387be21b5a9ee6ca6f8f34a0,2024-11-21T03:37:55.623000
+CVE-2018-0300,0,1,f0937ccb13fdd91aee8e051e863acd60716a9a45003a4a297b26358e3b3f1cf1,2024-11-21T03:37:55.740000
+CVE-2018-0301,0,1,de6c2730320403452c943e715a950862279e5e9b9bae5c481ffb583c547859ff,2024-11-21T03:37:55.867000
+CVE-2018-0302,0,1,9f53e50463c4629794334338c54be99b1b47a99953b25ef7c9de4c1663ccd154,2024-11-21T03:37:56.007000
+CVE-2018-0303,0,1,f30ebdf5f4daab58d3731cf96f9a83bc21682b09a25f4153d29db0f6a478a5a1,2024-11-21T03:37:56.127000
+CVE-2018-0304,0,1,528ea9b7d5d51ac57eeca928c23985d8e247dae4817becd23c9237a9b6f8e88b,2024-11-21T03:37:56.273000
+CVE-2018-0305,0,1,f137822d538514fff59b940d6ee6f5621cbe96ccfb6d59b7b7c0ddb9006eb03b,2024-11-21T03:37:56.417000
+CVE-2018-0306,0,1,528a4f33b72343b160d79eb1ab3a69fdb8d872612e1550cc69b4eb56d8f5d23c,2024-11-21T03:37:56.550000
+CVE-2018-0307,0,1,de07d2dc0634b78502e4157eb955128002b542ad13590f3c534bedc90fb7f735,2024-11-21T03:37:56.687000
+CVE-2018-0308,0,1,20dfba248c75670771e6d30c794683a84d4a6ce15d36bc21106ae22e5d6aa427,2024-11-21T03:37:56.830000
+CVE-2018-0309,0,1,6e3ab4ec04cd8fcc22e8e0c521fd9b15a76dc27d082716cebeecf048217073c8,2024-11-21T03:37:56.957000
+CVE-2018-0310,0,1,b141ad3725cb78963f4629e4cf93c8ce5daf804be983ba867e8d88a2e450a91e,2024-11-21T03:37:57.080000
+CVE-2018-0311,0,1,412c7b58c5088178ea62e61a8672f66ba19b588d075e4a93f37423243f1f97cb,2024-11-21T03:37:57.213000
+CVE-2018-0312,0,1,d1476f3cad1ae64b3aabd9d9756ec82c314addd8fc24bcf5f3393cd9ed375d7b,2024-11-21T03:37:57.353000
+CVE-2018-0313,0,1,5e5c964d435ac83afcfe9f0666a4031002135d37689e3d7394ee413e57d5c50b,2024-11-21T03:37:57.480000
+CVE-2018-0314,0,1,1e3aacc4b43d02285aa4b0f99a75e3ec564ebde819afbc9df7e3eef6c1f1f15f,2024-11-21T03:37:57.607000
+CVE-2018-0315,0,1,ea7f745dc12305d274edf3a8f08700b11aee8299f35fae56015e7627e5ca0038,2024-11-21T03:37:57.733000
+CVE-2018-0316,0,1,e4f4a329dcdceffa57f8e14726dbde375faa42b689d0f1527f872c3f6e99a784,2024-11-21T03:37:57.850000
+CVE-2018-0317,0,1,f26e2fdb44c4f3a35f4c3dc2b069edc694c63eb6775fff1f9770d2452ea71c98,2024-11-21T03:37:57.983000
+CVE-2018-0318,0,1,8a3fdea1af8ff1a4d1d78bf3bfc408f6657aacc41cf51e8529a896b8afd8c4dd,2024-11-21T03:37:58.107000
+CVE-2018-0319,0,1,0269b1a9bc19f7fac63f9d84ffbdfd0150d690a065d3ba07b230f7bc271a9e03,2024-11-21T03:37:58.220000
+CVE-2018-0320,0,1,42c327123d48e1dfc6596c4906d6fdee125fff65d93d8caa37d2f9a1c1c5b585,2024-11-21T03:37:58.337000
+CVE-2018-0321,0,1,35b51b7bf29e8ad32c6f30cd4ec0765f2fbf142ee0acf251607fd25b89f35621,2024-11-21T03:37:58.453000
+CVE-2018-0322,0,1,74b9961e2218ded04af6cb90d6850b5efca005b0f22a45fd0949eae6f4cd82cd,2024-11-21T03:37:58.580000
+CVE-2018-0323,0,1,2097bc90d44b91287a602c4771928594593aa0399750e3c8c982d414479d6060,2024-11-21T03:37:58.690000
+CVE-2018-0324,0,1,73276df30f4260ba37233608dafdd7a3d017dd20011829ca1286147f41299308,2024-11-21T03:37:58.800000
+CVE-2018-0325,0,1,7b9d901d2478ed2a6105d768cca1e6867a39cad1089ed948bd1314ce872eb272,2024-11-21T03:37:58.917000
+CVE-2018-0326,0,1,e7661684f3c8c46ee99ab59de57ac92792c57d68cf093f6bffa6e506125b4fae,2024-11-21T03:37:59.040000
+CVE-2018-0327,0,1,71db34a7edd7da39c55eefb417776b39354aeb344dad606e63a050046da65f1f,2024-11-21T03:37:59.183000
+CVE-2018-0328,0,1,e4ff89fb33acd22f2f2f7064538ab2dadb3413a13b9948d394c5db48fe37dafe,2024-11-21T03:37:59.330000
+CVE-2018-0329,0,1,d1b258bb7ce80289b09413b86735a7dd8a632a3504ab4f1923217f0c68cd9587,2024-11-21T03:37:59.460000
+CVE-2018-0330,0,1,bac3ccc74cdf1d3f2d552acae32fcc4ec70f5deb682fbd6d07a11d6ffc68d633,2024-11-21T03:37:59.583000
+CVE-2018-0331,0,1,63929b7ba17638481a4a116bd92cf4d28689e075c9978102e9a0019c3ae85b69,2024-11-21T03:37:59.720000
+CVE-2018-0332,0,1,d5d5931df9a01831ae5255ede4ed9407ba6302f25df60762ceb31e30bae6f9f1,2024-11-21T03:37:59.870000
+CVE-2018-0333,0,1,93f769d59675914c6d98626c7b1cea7f02f6b711361144ac86b219a931590583,2024-11-26T16:09:02.407000
+CVE-2018-0334,0,1,7456dfe9b45a677991cb885f3a888a042939aceae904da0481607b21d014c13a,2024-11-21T03:38:00.140000
+CVE-2018-0335,0,1,edaeffff7eb72ebca5c55c82ab80581cb81ac4f0118ea4ccb50b4b75abf62b16,2024-11-21T03:38:00.277000
+CVE-2018-0336,0,1,20aeebde35ff5e3c7c13765daa32878bf385357c3b3f8bc65018978155277cf8,2024-11-21T03:38:00.430000
+CVE-2018-0337,0,1,9e4c0e0536b688a6c6db99eae573c4362807acd1b8f871905348b6e88d2fcc48,2024-11-21T03:38:00.557000
+CVE-2018-0338,0,1,2867a10ee5ca45ac9f4df293dc4b402885e48661caac4e3fb6321543252d6e3c,2024-11-21T03:38:00.680000
+CVE-2018-0339,0,1,15a05aa3dca9df5745b93bd66a3bf80a32532618742fb2d56728466f68bd2750,2024-11-21T03:38:00.810000
+CVE-2018-0340,0,1,5898389ff480068da74c465703df08c2d812d0c63c223eb6e7f4a8fde7a5ec01,2024-11-21T03:38:00.933000
+CVE-2018-0341,0,1,b52f7b4ad153164f0cb44d62b7635e666a4f7fd1626899bc5e13158035e40257,2024-11-21T03:38:01.043000
+CVE-2018-0342,0,1,2cdc0422397c33302329bce9b38f480aa4d1e2a6c8d63961a921d79f0a9b36fd,2024-11-21T03:38:01.167000
+CVE-2018-0343,0,1,3403cdb3229d95bf27555c02b5a5753736af012d6ffbad15602240a18315426a,2024-11-21T03:38:01.300000
+CVE-2018-0344,0,1,4879ed83eaebf4e145ec814cbe0d8649b792ba90428f2857a16300a5fd882c2b,2024-11-21T03:38:01.440000
+CVE-2018-0345,0,1,80560520a16c87092a64157fc2dc1b2688efaa6f83e1d6c4dd284163365398f0,2024-11-21T03:38:01.573000
+CVE-2018-0346,0,1,5df6469e96bcfb2c06c3152b56c02bacc3303e582e013348746bcd79489d2106,2024-11-21T03:38:01.710000
+CVE-2018-0347,0,1,f90287688527d7f0833f1bdbfd1f1c70c5356001cc07dc175e0a3984d18c07cd,2024-11-21T03:38:01.850000
+CVE-2018-0348,0,1,9cec79ded3b3c2ccc8b3d7150bd1a52100226d52d9e47abfc5e1fe4d933d5c5b,2024-11-21T03:38:01.997000
+CVE-2018-0349,0,1,d08e7306862ceebfb73ecb8d14533efe7703e27ca8d7a06db251cb08c60225c3,2024-11-21T03:38:02.130000
+CVE-2018-0350,0,1,e39f20a291ef0a7e7e929872147726f12be7285a58f82afec94d11649b5ca57d,2024-11-21T03:38:02.270000
+CVE-2018-0351,0,1,213e0eabb0cf0cccf0a08f23ddea93373c685d4fde21e16c3083ee38f9c08685,2024-11-21T03:38:02.407000
+CVE-2018-0352,0,1,470dedb74c152ca7c62267739fc1f6c2b1fb12ad16c9d610dd1b89ba3012d877,2024-11-21T03:38:02.547000
+CVE-2018-0353,0,1,68a9bc1066ced9cb64ec23da01da8e47cc596ff7c791013bc189dcc033ee2279,2024-11-21T03:38:02.680000
+CVE-2018-0354,0,1,6ab01adcd295a80d5107ed97b0ab93cb6852cbf8bd809c631af2e9ecdeb638ae,2024-11-21T03:38:02.817000
+CVE-2018-0355,0,1,2de651dedde3d8e0a884170654aa98b110465db6500a6d067d1c3f132c812b1f,2024-11-21T03:38:02.950000
+CVE-2018-0356,0,1,fa3b9bc7ec508f8810c4df2e338edfecf217dd9c2e2ed5f0bc4b500842514029,2024-11-21T03:38:03.090000
+CVE-2018-0357,0,1,6f670e4cab80ae169f35b7e021ab3c9bd05dda592134b929213cdb7391a18f42,2024-11-21T03:38:03.233000
+CVE-2018-0358,0,1,b18a65750013a6b8bce4aae4c679aba23d49e32f8eb5d3d169d6ab9c315273c7,2024-11-21T03:38:03.377000
+CVE-2018-0359,0,1,72c4876a90de9750d47e635902d320305ed18e53bd0877e772d5826e9cea6d6e,2024-11-21T03:38:03.513000
+CVE-2018-0360,0,1,0621374045177ad2b6c844591b0cf2d63b04e52623342833dd16b0bac873fd04,2024-11-21T03:38:03.643000
+CVE-2018-0361,0,1,9ae5db7627fb3f560158edd6148294e47ed73fb3ab6ee01cc2366923bbb2f1ad,2024-11-21T03:38:03.790000
+CVE-2018-0362,0,1,a23d3b8054359f51a43f6de6e5b55b88068b1bea878bfd1ad414e1ad26cf5e10,2024-11-21T03:38:03.917000
+CVE-2018-0363,0,1,576d61258cf6020c674f1b9118c92b7e5691a1f136cd1a49c689f8dae8b14bae,2024-11-21T03:38:04.077000
+CVE-2018-0364,0,1,6261d20cabf191e905c689493245d54d017b267cc3ae38e9c108e329fcddb905,2024-11-21T03:38:04.213000
+CVE-2018-0365,0,1,211ae0227f8c148b2fc5d2cdc75c861b32833df4453e5682ccb295dd44b2a5a0,2024-11-26T16:09:02.407000
+CVE-2018-0366,0,1,3332fc7fb2e322ef77a49eb1fbc456b6d303b0868ad0be25038391c396a1278e,2024-11-21T03:38:04.557000
+CVE-2018-0367,0,1,59d52bd232f765546f16125257d081a663a2ea10d7a75148e0357930fd0d6563,2024-11-21T03:38:04.677000
+CVE-2018-0368,0,1,3521690bf3ca935d4d71fa0def60709bf6a0cdcc11e5050041bf4d042c45dd12,2024-11-21T03:38:04.810000
+CVE-2018-0369,0,1,a20e8e36c8f86b16b38a9012a34b6873d22c26438122a25f8fcf491253e6b029,2024-11-21T03:38:04.933000
+CVE-2018-0370,0,1,1ae705eaf3aa8b381b14e6b4cbbfe499421e80355cbca76f86f8b2db5bf27afa,2024-11-26T16:09:02.407000
+CVE-2018-0371,0,1,19b8785404ba6b1898f7a0fa74af4aaec5a63c68b80dd8be15b44a3444885964,2024-11-21T03:38:05.180000
+CVE-2018-0372,0,1,f9c0a9d05f89bcaf374f66a9649fc24ac9660a26ac39a4bad30469536eac05a9,2024-11-21T03:38:05.300000
+CVE-2018-0373,0,1,e7f28e39e1ef8a78d24b864e5c752a8e013342a79127b3c6a11773fb25306603,2024-11-21T03:38:05.420000
+CVE-2018-0374,0,1,706d367d0737ee41b869c64b6b3400b2d57444900bf979fc5bf5742fefb2cfcf,2024-11-21T03:38:05.553000
+CVE-2018-0375,0,1,668b6d6613a8d674d965202a3703afb34b095290931ce2ffe02b69c831bb70b4,2024-11-21T03:38:05.670000
+CVE-2018-0376,0,1,0430f2f59f61a4d9789da111128c5ea8909d77d14a74272a9facb5f873d60791,2024-11-21T03:38:05.797000
+CVE-2018-0377,0,1,8b35926ea4c355436de0cd791081eac1905c7f2c5efa9900fea75a45d3b7ce68,2024-11-21T03:38:05.917000
+CVE-2018-0378,0,1,995c416e8345aaf99894fd40ea61636510dc9ef97eea1e0a5f70cc1f65e28d70,2024-11-21T03:38:06.057000
+CVE-2018-0379,0,1,112249d149ba7f41b9a42440d99f6502d461fa210b6005e8ed5cac92172233b3,2024-11-21T03:38:06.213000
+CVE-2018-0380,0,1,39119b5238294de6b4aa0acd61a620efc81f3a0a067c33b982fe96b35a3e8aeb,2024-11-21T03:38:06.417000
+CVE-2018-0381,0,1,15d7f1ffd641b6c5ad64ca7cdaba3dc3b4b4e5fcef965a84cafd4404b9ec5ba4,2024-11-21T03:38:06.543000
+CVE-2018-0382,0,1,1523cb5cf1a73d51d6c5282c98d8ddaec19c07b7480d16e5d1bc854c34c5c434,2024-11-21T03:38:06.693000
+CVE-2018-0383,0,1,48914ff257332a3b476dd0d096526c6c9bb83b6654ce4635f893aeb079b4b39c,2024-11-26T16:09:02.407000
+CVE-2018-0384,0,1,a5ad0ffe1fd629b139f0be6ecd3b130a31ebb24a178a56881982cf3933aaac6b,2024-11-26T16:09:02.407000
+CVE-2018-0385,0,1,422b412a77ee763aae7eb21cbfa0c04dfb0b614848b3366c4a14a19d0063b739,2024-11-26T16:09:02.407000
+CVE-2018-0386,0,1,3453b20c068eb1a824e5cdb11399e4cbf71e6363d2867af3ccbbd6da6bb147f5,2024-11-21T03:38:07.213000
+CVE-2018-0387,0,1,cf64c8bdaf630a8762363d4652a695efbd53303e89cac7600c228c985973897c,2024-11-21T03:38:07.337000
+CVE-2018-0388,0,1,133e359543f505f6be693a29b828ba9fa5591dcdce5b8a6c16fd34c5630325cc,2024-11-21T03:38:07.467000
+CVE-2018-0389,0,1,41ad9c8c7d5cf8d5140226bbca1a934c8671b58a0f08868305042b5d9f9c3847,2024-11-21T03:38:07.617000
+CVE-2018-0390,0,1,eec2a323ee1748da369f5aa235562f7990af48a83a2c8ad1dc1a02297f06ab70,2024-11-21T03:38:07.763000
+CVE-2018-0391,0,1,1a237188c26e9d86d2494647f61e7c6ef79198f1a0113a1c2f79736c9b5d9921,2024-11-21T03:38:07.887000
+CVE-2018-0392,0,1,fd55f7bae20714c8d8b8dfeec3e985357605029acb1eaa1be91e8fe5522298a8,2024-11-21T03:38:08.013000
+CVE-2018-0393,0,1,7683931e877d027993912221223ceff3b149bcaaff7291700fda74d1a39290d3,2024-11-21T03:38:08.140000
+CVE-2018-0394,0,1,e26c2e2286d02ebdc3ecb80bb5e556f815ef90bfbb49f9ed85e1ca55d4dfe082,2024-11-21T03:38:08.260000
+CVE-2018-0395,0,1,00f9f3183d5beb8227649952db5778d762597af7be86fe43914228452c205359,2024-11-21T03:38:08.380000
+CVE-2018-0396,0,1,883e87d833c6f789b698c32bd6c56cd93eb5a19783a7648cea19fcc3c593ea92,2024-11-21T03:38:08.507000
+CVE-2018-0397,0,1,ad76ac0ddc1cbf949b606beece1894327f0a96e0ac30f5f64c65aaaf00233edb,2024-11-21T03:38:08.630000
+CVE-2018-0398,0,1,0d866c761cf98c340ba8db1f6f10c32eda34c2642a88518bdada1344a9b1a9fa,2024-11-21T03:38:08.743000
+CVE-2018-0399,0,1,26950a756b107ae8e1a6f79d499d8f6834a261f7d2801992da03098d90dcbbda,2024-11-21T03:38:08.860000
+CVE-2018-0400,0,1,088b991f4761a0f8f605184c4278a979213d7f935a650b73b1c9b1f74ebc3b2f,2024-11-21T03:38:08.977000
+CVE-2018-0401,0,1,2e6d26c007c599585573b5e3d636fe8d3314a4dc86090ad9cfe6850b4c7a6454,2024-11-21T03:38:09.093000
+CVE-2018-0402,0,1,5ec7db489ff038518ebb966a4d42619dc96ceb602754738e497470199bd09ce2,2024-11-21T03:38:09.210000
+CVE-2018-0403,0,1,49b91c68fa6164bdc53e354c79cbc978188668ef8c912983d62cfaf2b9497579,2024-11-21T03:38:09.330000
+CVE-2018-0404,0,1,bea5fa3c1c687eeab641f65127ec181fc1792780039ca5c3fb0a24a582d88231,2024-11-21T03:38:09.447000
+CVE-2018-0405,0,1,b55e72aceb27b54d2a6bbfadfad8c1485c4853614e6168c3dafbf84b44ac3522,2024-11-21T03:38:09.590000
+CVE-2018-0406,0,1,632d54b7eab36e3cb848025f7e54e8a398b8768f8b4e2f696f288b4c43feeadf,2024-11-21T03:38:09.703000
+CVE-2018-0407,0,1,e39f13f44fcd62a1c517b39a365b46f64713858aacd002b7f04a4d37c5cc7a54,2024-11-21T03:38:09.830000
+CVE-2018-0408,0,1,e0a80fed685a5c3611bf1aff89a473b25687493e2864fcbf264af86edae56e36,2024-11-21T03:38:09.980000
+CVE-2018-0409,0,1,cd3b24d1dbcb31cf7a0391eba86b42a6710b067fab9dfb286e7988021ff6ffbd,2024-11-21T03:38:10.117000
+CVE-2018-0410,0,1,e5a5c3b2aefc4cbb350298a9f5956381b9127cb671c8d41e447c2e3202dae446,2024-11-21T03:38:10.247000
+CVE-2018-0411,0,1,4202a7b8faf099e4fa53ab06f1ce1b9f34ee6df19816f656a885970259f5c613,2024-11-21T03:38:10.393000
+CVE-2018-0412,0,1,2fd0268142fafcbf1978956bde877b9a55c944e38394f1e43572324298aea85a,2024-11-21T03:38:10.520000
+CVE-2018-0413,0,1,679dd418fd2d20d32b310f7679c2f6455f63231f42ab3dc47fc537006edc8614,2024-11-21T03:38:10.640000
+CVE-2018-0414,0,1,0b9d2ba8f435c8e8c9c0452b86726f182c3e958430e252c53088d2775cbf30c2,2024-11-21T03:38:10.757000
+CVE-2018-0415,0,1,b73a9db7ab38c039ade697fa8964c7a225b3a1b56095acb19d25a62ce56591fd,2024-11-21T03:38:10.883000
+CVE-2018-0416,0,1,56baaff1bfb6542a1bc8c653973674bcbd568678cc4a62280f813a8d2b7c7d8c,2024-11-21T03:38:11.010000
+CVE-2018-0417,0,1,b8ce02a63d509e94915d5f6327fcbf88fb4d6d3305dfe6c99dfdbddcafc7e5cc,2024-11-21T03:38:11.130000
+CVE-2018-0418,0,1,52653263fb1ac2ed71cf0709273aae4137fd28175f946a736821eb45e54ba3ab,2024-11-21T03:38:11.260000
+CVE-2018-0419,0,1,af28416bbebc9fc2e6c2dab16a8ceb234924569d10ba10d8951b876fd5085c6c,2024-11-21T03:38:11.390000
+CVE-2018-0420,0,1,897db6ace51bc860c81a69b7dcd64bf446851a23dc0c3cfbbc2866eed236fe32,2024-11-21T03:38:11.510000
+CVE-2018-0421,0,1,a564cf09a2183cbacb931fbde8c66f723c15f23aaf6d25472d920051cf23d7fa,2024-11-21T03:38:11.630000
+CVE-2018-0422,0,1,b2519c765a64fda3e81da2bd694c84477386777df4ac16bc15bca5c92027a499,2024-11-21T03:38:11.760000
+CVE-2018-0423,0,1,217d9110347028b15db96aa7c3e39399ff570e1e5b3d30824bfddfbd19f74631,2024-11-21T03:38:11.887000
+CVE-2018-0424,0,1,a36627a5e045a90324fdafbe640485da805e5f2bcb4bae317d42b735f9e397b5,2024-11-21T03:38:12.013000
+CVE-2018-0425,0,1,0ba7c741ba01b2add72e0724a4076b6b90c2c1a780cda8fb8214214ea9a5730d,2024-11-21T03:38:12.153000
+CVE-2018-0426,0,1,5b8046a96d6f75ff65e0d2cefd670489e6f6a4a9ca7861cb330776bf951b5fcc,2024-11-21T03:38:12.290000
+CVE-2018-0427,0,1,d96fa73b1db4734a3b9a9be382f97b09e83c9e0ce11d489b5e7e25becf400b25,2024-11-21T03:38:12.417000
+CVE-2018-0428,0,1,ff7799c3878bbd1d6a8a67d115c0ef161768b1e9f4883229b118cdc309a811fc,2024-11-21T03:38:12.540000
+CVE-2018-0429,0,1,b9e4e5954a5aaed485b6748591f7e9b012d4333c0edb58a364007490f5efdd8d,2024-11-21T03:38:12.670000
+CVE-2018-0430,0,1,756cc7fd20b274c6eab3ad1fee51b2957ed1e3e92f58572df6a809b33ae7025e,2024-11-21T03:38:12.793000
+CVE-2018-0431,0,1,2e443890671bcfab681fe8270cfdf67ae1ae3976b2df440a72f484ffa08ccdbe,2024-11-21T03:38:12.927000
+CVE-2018-0432,0,1,2c753ce96e43d596857222c02b8d73d4f11f9783682fc1d413339c7abf6f6cd6,2024-11-21T03:38:13.060000
+CVE-2018-0433,0,1,b8a70b2099292059ef4258b1ee3e801984022e4cdaeaf63197a937d558fa7c91,2024-11-21T03:38:13.203000
+CVE-2018-0434,0,1,cfb8b6896e0803c00470f1dcd96fca859e890ceac9814d2d803c213e71324af6,2024-11-21T03:38:13.330000
+CVE-2018-0435,0,1,e5baefee29beb1996abbddd752115c473fe022b05a5072c1526b623c9b2dba92,2024-11-21T03:38:13.453000
+CVE-2018-0436,0,1,40b3d658d0fa0356888cd4e7bd2f3081e241b0a5b64226884ab914af96cc7a83,2024-11-21T03:38:13.580000
+CVE-2018-0437,0,1,e30b57a1c17cc9440a96a2300d2f6adddcfe58da33a0d7cf5793359d676a6a6a,2024-11-21T03:38:13.710000
+CVE-2018-0438,0,1,2593e403654c14e4be8d1c252cca804b645485026ff9effad3620325e9f6ee9b,2024-11-21T03:38:13.830000
+CVE-2018-0439,0,1,04c3931e1fa18c54e42122601ebb0f8fe2a373dc9e6d47a1076347560fc9b01b,2024-11-21T03:38:13.957000
+CVE-2018-0440,0,1,b8689ff818ccb91a05a1340153d42a91f275305a2e6c72938707974ad41bcba1,2024-11-21T03:38:14.083000
+CVE-2018-0441,0,1,d3627d220d6f572a81fce3d5e19baad3a0cb6cd7331a73ee6db5650ba6b1dad8,2024-11-21T03:38:14.210000
+CVE-2018-0442,0,1,6be4480a6fab42a5422739ad47d6608c33fb647f59ad27d0ff1580128a14f081,2024-11-21T03:38:14.347000
+CVE-2018-0443,0,1,8cd927e6c29906023f559dda64b2556cdba7f3f101169ed4e41410f87b3b200f,2024-11-21T03:38:14.483000
+CVE-2018-0444,0,1,aa995f99f21f57d21830a3a7e9d098bfd1c27c3790e7cb113e3797310525e05d,2024-11-21T03:38:14.627000
+CVE-2018-0445,0,1,872cd12da905f7a53e111cf7323a2ec0a430c6c3003172f094cfc785821803d9,2024-11-21T03:38:14.763000
+CVE-2018-0446,0,1,1f5dae4ccb45e5bac1224da06856da3f309ff43ef3ba541258e02efbc1c7409e,2024-11-21T03:38:14.890000
+CVE-2018-0447,0,1,908ede5041c832db6fc0af2ad551f9a5d6fdc9bc8b5d7e215834f20b3a861dda,2024-11-21T03:38:15.010000
+CVE-2018-0448,0,1,7a75e4859377b0f98de58084b45a8d78de7e24d22a0b088982391e4e84bc3fcf,2024-11-21T03:38:15.140000
+CVE-2018-0449,0,1,67f2e7804009c901fb45c1d1b0e5cf0f89e6221a71e7e505aa15afdccc464198,2024-11-21T03:38:15.270000
+CVE-2018-0450,0,1,bbb3623e62bfec025c3fcc6d3654d8074d04df7bfd56018572eea97187c8909e,2024-11-21T03:38:15.400000
+CVE-2018-0451,0,1,56a0c12268c12ebbaa056b2e7eae3c2c5aed4dd4e910e888c0c0cc6bdbc7c7d6,2024-11-21T03:38:15.523000
+CVE-2018-0452,0,1,1ffee1e5305ce8a6757cac35f0486c83b76bf8008f56e5e4dc1635b4922b9466,2024-11-21T03:38:15.650000
+CVE-2018-0453,0,1,609001f13481612482326174aed12454b8fc6c746f7c996b50f0f4ab645ff02b,2024-11-21T03:38:15.773000
+CVE-2018-0454,0,1,761d9f200ed0b3e7d237313c3b2ef9c53ac881b3850687d6465d68d6a80c8fcf,2024-11-21T03:38:15.900000
+CVE-2018-0455,0,1,fb818041a92e20d17035483ae54b29b7af9427594f16d1d08c6886b479b98552,2024-11-21T03:38:16.027000
+CVE-2018-0456,0,1,bdbd562221be6f21d84c4922a659a47ace55d9ee36138039058784f6d35eeec7,2024-11-21T03:38:16.167000
+CVE-2018-0457,0,1,9117743c769314dfca32248235b092dd2be3491368e64d815f1ca66498ddcb1f,2024-11-21T03:38:16.297000
+CVE-2018-0458,0,1,ac2c91cf8fa76c52a5e42f7bf1279e9e056f53a06950ee69ba63584980b3a465,2024-11-21T03:38:16.453000
+CVE-2018-0459,0,1,9eee0fb115a47be2faa5365b5dc7d2fe46f5f8435c24321db17c3b46f40c664b,2024-11-21T03:38:16.580000
+CVE-2018-0460,0,1,ed60fa08462060984338b6181e0983c6d36794737c15e0bc2353edd44c3fcf64,2024-11-21T03:38:16.703000
+CVE-2018-0461,0,1,eceb6372e8494334ad98674ecba8f074179b9877becdf17737752135899f5572,2024-11-21T03:38:16.827000
+CVE-2018-0462,0,1,44edf4277000f79fbc6e5aab9c8894473ac99175411c77ebbeacbcc439cca273,2024-11-21T03:38:16.963000
+CVE-2018-0463,0,1,c4cf39a97605bdb263e8bb320f30fc3c4ab86cc5f80f48a1b69814e9294c6653,2024-11-21T03:38:17.087000
+CVE-2018-0464,0,1,fa89f1b2a4993cd69b15bd0ae7a9f32a1dfa9b90a9de21a05e703abcd125e397,2024-11-21T03:38:17.203000
+CVE-2018-0465,0,1,c09d1ab3cec948d06ad94268a98e6f7efd4c6fdef1ab7bcfe79d595da514bb32,2024-11-21T03:38:17.337000
+CVE-2018-0466,0,1,f8f4c7621edcf0c3052cb7f50c104bf00137725aaafe090a07f9174fe564c120,2024-11-21T03:38:17.497000
+CVE-2018-0467,0,1,5a27aedfa385ed130f231fa20f1e90bb4f02f012722a830996845f519c881c99,2024-11-21T03:38:17.637000
+CVE-2018-0468,0,1,7dc694abd2359db2bc271032a13ee50435eaee33110aacf7b14a92a910c69afa,2024-11-21T03:38:17.777000
+CVE-2018-0469,0,1,bb1c46690ef8f73feeb3971196075218cd4520425dfc050e2d4bb4ff3290578c,2024-11-21T03:38:17.913000
+CVE-2018-0470,0,1,5a6a9cb3fc23bca393ae0b0f7600c5b1f16b4eec5cbeffcbecb6ce43b82d3c78,2024-11-21T03:38:18.050000
+CVE-2018-0471,0,1,fe060b95409bf74a3395aea75f1e20475731c44d51af67c3928e0daf3b9f1b41,2024-11-21T03:38:18.187000
+CVE-2018-0472,0,1,1080839c8ef6e4ad64110c84184c48b161416b471d25c8f3a2cf118c8f345245,2024-11-21T03:38:18.313000
+CVE-2018-0473,0,1,04cba67241aa2c9f5fd3a4ca338a3313b0ed6e23fc600ac9e4ccb1d17bb444c0,2024-11-21T03:38:18.440000
+CVE-2018-0474,0,1,3ccd1f05d8a43b6da4a165a7bbe625e62c0aa536771a9ad02b908aecb6af7fe7,2024-11-21T03:38:18.573000
+CVE-2018-0475,0,1,e0b2cf2f9f3d48fd4521d8a32e409a77cba5d240b5163b0d608871f9109619a4,2024-11-21T03:38:18.710000
+CVE-2018-0476,0,1,530323780fbfc63d1d2f9e1ba970ea0b05c8a2c9b5b5381671f002d92828497d,2024-11-21T03:38:18.833000
+CVE-2018-0477,0,1,d763b46ffc0254c75f3f1b3f2e280e7f80ae913916e0d5ba68720d17b4347177,2024-11-21T03:38:18.967000
+CVE-2018-0480,0,1,31711526084f6c059f80dc7a2dc80ce6abc4db65c8bd29b56a2a0ea52155d492,2024-11-21T03:38:19.090000
+CVE-2018-0481,0,1,15c12f2f7c1cc93ee820485439674c16015b680cb7e302deb8ac8f7e118528e0,2024-11-21T03:38:19.223000
+CVE-2018-0482,0,1,b128050ce67857f6c71b7fc0c6094c7783eaaad4630bad4ad3f5fa01c42bf683,2024-11-21T03:38:19.347000
+CVE-2018-0483,0,1,62f24f607b558c020e24b311aae5994d5ed21ea5115188b49436b7cf4e9a9824,2024-11-21T03:38:19.483000
+CVE-2018-0484,0,1,ef24dafa8b8f414ab989706365af178a01b2c918097430e2d0d19b8dee3377cd,2024-11-21T03:38:19.630000
+CVE-2018-0485,0,1,a274c3c238d14de605961f49af6c1ef1d5cd9abf0d40575b0771ea8ebef05be4,2024-11-21T03:38:19.810000
CVE-2018-0486,0,0,52efd19966fc44a5c9390527a42d433cd546ba3dad0195bf3e8b190949de230c,2024-11-21T03:38:19.963000
CVE-2018-0487,0,0,d7920fd60d1a81225011b670aeb50c26b7535beb083d534f20aeb3705dbf4d8d,2024-11-21T03:38:20.090000
CVE-2018-0488,0,0,fb0ffd575df89564c8abd9933e0163a0c1caef9a01b0976ffc3286a85a9d4c09,2024-11-21T03:38:20.230000
@@ -115819,111 +115819,111 @@ CVE-2018-15364,0,0,8ef2e0cc5d779311f878b9670b3582a418c7cf65aa460e212f2529f7556a0
CVE-2018-15365,0,0,2ac5c3952e2c4840460c871464d761bb41c19a43347523c69bd6365db0e148f6,2024-11-21T03:50:37.913000
CVE-2018-15366,0,0,07e0c109efe71aaf5c342ddbc148d40e654f2647bcd57d2a2f8c205bc1310885,2024-11-21T03:50:38.050000
CVE-2018-15367,0,0,03fb04dcacea9c546d34ace08bf854f6c9d97a0ee5d793223f91727bc4f55f9e,2024-11-21T03:50:38.177000
-CVE-2018-15368,0,0,403558b89e94bbe2569060d362d54e9906961f4a25ddcd91ad393d7e994644ba,2024-11-21T03:50:38.310000
-CVE-2018-15369,0,0,0b15460780c819c8f679851d8055cd05233f91a7fe8722ded9b4b72cce7144d1,2024-11-21T03:50:38.440000
-CVE-2018-15370,0,0,cd1fb7634b7378e08fa4e8195ff1c084e3b11ccc87719b50ecf49db528197ce6,2024-11-21T03:50:38.570000
-CVE-2018-15371,0,0,1faf7bd10e86081e4d04f828681e2a51b6db6ee778ee586dcd7c478ed746516d,2024-11-21T03:50:38.700000
-CVE-2018-15372,0,0,edac1ee99145693a1e13305550e02711f3e71ee05f0afdaa8f10883691448c75,2024-11-21T03:50:38.827000
-CVE-2018-15373,0,0,2760456a8588f035bd47872adc5248ea2cf61e24b9ea84d54755156c70ae423f,2024-11-21T03:50:38.963000
-CVE-2018-15374,0,0,e6798bb39268eb3968bf6b0a89a18719cee93dce5fd8c084721fd79c65e68699,2024-11-21T03:50:39.100000
-CVE-2018-15375,0,0,d368206fec030190e498410d386a50cd14b85e26825e7a56dae88a21eb668d27,2024-11-21T03:50:39.233000
-CVE-2018-15376,0,0,a3519fcc1a93d743b5dc93813cb15a690d23a2fa0ec69ed6304665167291bfd2,2024-11-21T03:50:39.360000
-CVE-2018-15377,0,0,692f8ecf3a0114ff4f0abd5d367dd3306c719eb5aed95a7c8bba42f3a6435d0f,2024-11-21T03:50:39.487000
-CVE-2018-15378,0,0,75cfeb079e56da4e90c76efb3c6451369b3e77cc0c5f38536dfb8c9225e884cc,2024-11-21T03:50:39.617000
-CVE-2018-15379,0,0,8a400b77daad5231deacc01e0df254ec2c7070d7e91fc3a5efaed67dd68f8133,2024-11-21T03:50:39.770000
-CVE-2018-15380,0,0,c2fab217ea0e3ac5fc68e03057ed2856c20dfcacc241e5bb681c33fa3057c4f5,2024-11-21T03:50:39.917000
-CVE-2018-15381,0,0,0bbed550b8fb2bc7415d7301c293a28d9c793fcd2c07b3f0198a13291a6a97c3,2024-11-21T03:50:40.100000
-CVE-2018-15382,0,0,0cb64622d1f6599b6c02d58f6980ee4d9b156609ff891a79571a8797c1571bfe,2024-11-21T03:50:40.233000
-CVE-2018-15383,0,0,a829aeeed385f7fbe4a4aff8c83530cafec27db33ac3bdd59505183b067a4e1b,2024-11-21T03:50:40.370000
-CVE-2018-15386,0,0,6c8103f7ac7a45b44ee92933b8d8ca62dc6326fb4ecac48afe0be40e354d5d5f,2024-11-21T03:50:40.500000
-CVE-2018-15387,0,0,3b95b348d95d010eb829c5a7a1511a2839d0e744d065eeed567931f2feae2e65,2024-11-21T03:50:40.633000
-CVE-2018-15388,0,0,98e7884baa53bb662e8f08e14998bc94ecb90de6a51177c6d1a4da269087a4a9,2024-11-21T03:50:40.767000
-CVE-2018-15389,0,0,913f1e36e911f247f8a2eb4795e450e5d56cd5de3bc2bb5cefe829831e4b036a,2024-11-21T03:50:40.977000
+CVE-2018-15368,0,1,57faaeceae9c1e1f6228bc707debcbb509f88489618f2a394fc3e94910b6d841,2024-11-21T03:50:38.310000
+CVE-2018-15369,0,1,e2e0a06061e8cb99b49294774dd81822ada21b1d8458938ad33d6950c3ada0e6,2024-11-21T03:50:38.440000
+CVE-2018-15370,0,1,714b39c5cc466f6caa95a91a59d56c099834cf984e68876277bd5208d860b869,2024-11-21T03:50:38.570000
+CVE-2018-15371,0,1,e8ef9bf404c97e17be71581ecec16adc0fa72758e12e77f9581b7cd35b925129,2024-11-21T03:50:38.700000
+CVE-2018-15372,0,1,83cceb2ac828a5c06a8fbe3381b132f9f418688c99dc59ab72b77b289bd5dd33,2024-11-21T03:50:38.827000
+CVE-2018-15373,0,1,8641d39907e33e9190014f6bcf2057536fad891fc305ecd755cda96b2d2231c8,2024-11-21T03:50:38.963000
+CVE-2018-15374,0,1,f4f9555993deac5a480d1f609050f0481e1500c58cf039d81e5750dd8ea3e092,2024-11-21T03:50:39.100000
+CVE-2018-15375,0,1,818e08e372d56c33062dbb44b2573f54a1cdf36fd1ee23648818182e79c0f6f9,2024-11-21T03:50:39.233000
+CVE-2018-15376,0,1,ae0bb0fe37db40e7f20129a28f596942bc2fea2215f05b64ec5507dd681a86d5,2024-11-21T03:50:39.360000
+CVE-2018-15377,0,1,2c932df8d2f091664a8088747d60ec3471b68602b62c6336a8e56f56a00f6050,2024-11-21T03:50:39.487000
+CVE-2018-15378,0,1,4d2eac9a12f8da94eaac9c266da41888b99e18c3d5bc9f1b4e15e1c527dd09b4,2024-11-21T03:50:39.617000
+CVE-2018-15379,0,1,66a3698d550ebf1ffb1154352cee7555b44a0c79d77e0fb2243c82e508aec6d2,2024-11-21T03:50:39.770000
+CVE-2018-15380,0,1,89c1eabdc03f3f7e01f2d7a1a3486bb4cc1d1e502f8d044d108533cfd220cd58,2024-11-21T03:50:39.917000
+CVE-2018-15381,0,1,e9612ee2d4605ef726ba2f502fc127f795adb6d2d777b92a52e1539e206e182e,2024-11-21T03:50:40.100000
+CVE-2018-15382,0,1,5d57e1c6fa5a5b81c01b1df8dfc7732cf972a9875a82994e25e8f0453f776e1d,2024-11-21T03:50:40.233000
+CVE-2018-15383,0,1,509037a0b5a94ca57dd5fe033b02b2a858df5d84484a1bb52adc624227182bcb,2024-11-21T03:50:40.370000
+CVE-2018-15386,0,1,bdcdc93f3f1b34918c4afc0d648be5f106eac4b4b2de1bac80b6fbe9941bd064,2024-11-21T03:50:40.500000
+CVE-2018-15387,0,1,9fb6f29a4d65872c783f91c809b3933f0aa4fd870b02a0053fb72224b4eef557,2024-11-21T03:50:40.633000
+CVE-2018-15388,0,1,2cf4d72f09426217d333a2e46941089dd8d05ce19f3f4d1f7c92e4cc0643286b,2024-11-21T03:50:40.767000
+CVE-2018-15389,0,1,3c7e2d051d3d256f49832875a9f8e42b8cad4cc3bd519344ffc293d541fd3d51,2024-11-21T03:50:40.977000
CVE-2018-1539,0,0,88adb7401ed3ff78950ae981659fe7bbec6b89cec626205aa9ec4e248f33a922,2024-11-21T03:59:58.767000
-CVE-2018-15390,0,0,7cbefd5491b9dadab1d5bee1082e1ff69da9a0998394dfa690fddbb594982609,2024-11-21T03:50:41.110000
-CVE-2018-15391,0,0,9e9e7c5b1edbd817a53ce7750a796daaa0407cf1d019cdc3312110b2b71478b9,2024-11-21T03:50:41.243000
-CVE-2018-15392,0,0,36279f6fd863f32a45b1bb3d61530b1e29bb28863627fa558075b9fed6d2151a,2024-11-21T03:50:41.367000
-CVE-2018-15393,0,0,4373f495657c9c3b2ed02a538d10949dfb68dadc7401060f3de13c45dd9c130d,2024-11-21T03:50:41.503000
-CVE-2018-15394,0,0,0d78a1128fcf4858bee2771526808a9c49c7926c8bccce0a8aded4a103da5eca,2024-11-21T03:50:41.640000
-CVE-2018-15395,0,0,47a3e1a8f8f5c4caba0f6239e9e83b024f915dd090c08166b353dfa3b3b8aaaf,2024-11-21T03:50:41.773000
-CVE-2018-15396,0,0,7cb5e90c423f4df4f1289136007a78a24fea7cd7f675dada14f6ed0e1bdf056b,2024-11-21T03:50:41.920000
-CVE-2018-15397,0,0,420918ceb3b9750721383683848eb216ecba08ceecaa4551a225515a6342bc93,2024-11-26T16:09:02.407000
-CVE-2018-15398,0,0,250e88b3f74a62fe47578d5cacf631937f3e59fb571f016178966eb1fcf0573c,2024-11-21T03:50:42.197000
-CVE-2018-15399,0,0,2a9e52ede45c8bb1833a7df96cb0a26cb3c8255baec971ebef0e3f7ad2488db8,2024-11-21T03:50:42.333000
-CVE-2018-15400,0,0,154fd3117b25fdf8586ca2528e5ed24c52b094fff2dead3e5572b56ca71a1f46,2024-11-21T03:50:42.480000
-CVE-2018-15401,0,0,1d009aa8a1f0a8d28545e92026edffd2cd4eeb79201e0ab697e3cf719e7b4e67,2024-11-21T03:50:42.623000
-CVE-2018-15402,0,0,a4bd0cd91921eb86c94129c7280fdae70b9f20e21d8c30357ecee6d89e9e3bd9,2024-11-21T03:50:42.760000
-CVE-2018-15403,0,0,eccffcd6ae28708fd99106f73dd1d3b32142c2890c484c46fb6a22d136b565bb,2024-11-21T03:50:42.907000
-CVE-2018-15404,0,0,d9121c3b681743d345817c2b1deed093503312bf7381a6e431e34cda85dcfa84,2024-11-21T03:50:43.043000
-CVE-2018-15405,0,0,a321eadf5c6c42fee1e020461911ac2e36642831550b32a81d3ca3bdb2b5229a,2024-11-21T03:50:43.180000
-CVE-2018-15406,0,0,410f5dcfae8f1a716a663671970150dd419bf852dabd7eeea0db4c8794cd9099,2024-11-21T03:50:43.313000
-CVE-2018-15407,0,0,3dac3e094a404456acfef793caee478b6c8a1b9e299dc3742e04b9a4753d9b5c,2024-11-21T03:50:43.440000
-CVE-2018-15408,0,0,7d64d8923a501e0364a8b7a198608bc1bd4b01bcd3928a6ef3a1b1e06bbcd273,2024-11-21T03:50:43.570000
-CVE-2018-15409,0,0,f4439b09fefa91c75566ad68deb8c452aa987aae234b003254d00401a6db9dbc,2024-11-21T03:50:43.710000
+CVE-2018-15390,0,1,5ff05d18037a6bfc4d3d0abea0e364bf7c8ea4fc7279ee6cb673c712a0dbff13,2024-11-21T03:50:41.110000
+CVE-2018-15391,0,1,278c74e589985ff290cee2a883a947ba2f3dfc3628ed382326154a101c62aecb,2024-11-21T03:50:41.243000
+CVE-2018-15392,0,1,4ce506f75b435d21819b72501dd2a1f2bc53d67789ecd59889184f1214ec4c56,2024-11-21T03:50:41.367000
+CVE-2018-15393,0,1,bef5a79e561cc30091ade593af9f30371b86ada1d2e13c4d14ce6b7f214a825b,2024-11-21T03:50:41.503000
+CVE-2018-15394,0,1,4455b5ca60efdf4a612d237c3240cb2922348d1566c3b1a8a545d132d8ab23b5,2024-11-21T03:50:41.640000
+CVE-2018-15395,0,1,1101e8f02f83b3eb5b4100c805693ab6198c685fc102c443ac983c39dca86787,2024-11-21T03:50:41.773000
+CVE-2018-15396,0,1,3a3e0de55b02c2b82ffdb691e2dd49aaff85f2aab8548776a08e112387ec5b57,2024-11-21T03:50:41.920000
+CVE-2018-15397,0,1,6e4385ea2ba2b4ce4745b6f14f7595d48d187125780396c45df317fd927b1e98,2024-11-26T16:09:02.407000
+CVE-2018-15398,0,1,e3703154e564e13e302b120eddb3ed599d45e27c3ab7ddd96ad0b1445a31d9ea,2024-11-21T03:50:42.197000
+CVE-2018-15399,0,1,1474a6443788e51f50ce7ef00bfbf86ce5bd18faa1e78831a01af16b45b3df40,2024-11-21T03:50:42.333000
+CVE-2018-15400,0,1,2f9953688aa1b5ff045bfecfe07c75885db4d74f3480ebd8a85951c276d26b34,2024-11-21T03:50:42.480000
+CVE-2018-15401,0,1,feee7cd30da9f0c22b0dfd2acac80b24ec1a7a50f3973c7115f18fe40f24cb05,2024-11-21T03:50:42.623000
+CVE-2018-15402,0,1,af57a2dc80fcc8b52a1c61b38f76c7f081d2a51f78990ab6974624610a05b2fd,2024-11-21T03:50:42.760000
+CVE-2018-15403,0,1,1c05b8e533dc9cbb9a06a9b83a17ec039106e53839c58444046acef374279e44,2024-11-21T03:50:42.907000
+CVE-2018-15404,0,1,04b28d0bb6fa863b95b4c4fa4781e5b19a220e7fad261e846ff8c610fb0fe7c0,2024-11-21T03:50:43.043000
+CVE-2018-15405,0,1,8c8bbd366e8d4066a768b314f5cee07f2a67d236907bc064911383143c2920bc,2024-11-21T03:50:43.180000
+CVE-2018-15406,0,1,3a9ff4fe1932a31043a7f0ba06dad82265168d329e1487b29bf9df6628d3d3c3,2024-11-21T03:50:43.313000
+CVE-2018-15407,0,1,7be30677f3b19c39458131e2c5aadd34593d3ebb3805a2006bf256e9d4e154ce,2024-11-21T03:50:43.440000
+CVE-2018-15408,0,1,ce47f2af6ac189b484aa87be61117431cebd1af9ce225ab0a480c097d263b3f2,2024-11-21T03:50:43.570000
+CVE-2018-15409,0,1,25d468d67534a60a4de8a4122298d2e77cb547fb3a07cf7aa10ce648c4f68dde,2024-11-21T03:50:43.710000
CVE-2018-1541,0,0,8ca8d9327bf3b98a258f5ea6831ddb06bcb503dfa415b03edfabbd37c3a2587a,2024-11-21T03:59:58.890000
-CVE-2018-15410,0,0,3cdae7f859776a38e342a493738a32a577a7446465208902d37c596697cb6ba5,2024-11-21T03:50:43.853000
-CVE-2018-15411,0,0,f9e1cc997c832e4862664eee2c8421b63539c0b15a05b95d7bbc18ad92542001,2024-11-21T03:50:43.997000
-CVE-2018-15412,0,0,ab7e1200071438a078d56372caf791b12301afb3d2a2875171528e149cc6281d,2024-11-21T03:50:44.143000
-CVE-2018-15413,0,0,610be614e119a3709d13555d1ad18d7633840a16ed4bbfa2d8a6b4b15e0df5d1,2024-11-21T03:50:44.300000
-CVE-2018-15414,0,0,e43aadb48975d4de9fc75f4c5b83f34edde2ab54f3366a8933f3c752064e45f5,2024-11-21T03:50:44.447000
-CVE-2018-15415,0,0,94ff154e53eb2790ad9111e1e29c185d2c4e56b59891439fefe442e7214a492c,2024-11-21T03:50:44.600000
-CVE-2018-15416,0,0,467fba4a8df2b620d71d993c16fcd93047242eeeb3f2cc424a64b41ba29a92e2,2024-11-21T03:50:44.753000
-CVE-2018-15417,0,0,c35a61389dd9205f548c205b27fdb949edd195d003de78882e6fa6dfa36474fc,2024-11-21T03:50:44.900000
-CVE-2018-15418,0,0,9f5443c8f861402880f8ae732cfc035cd6c1086a31d88b5bde0087e5738d4579,2024-11-21T03:50:45.070000
-CVE-2018-15419,0,0,2b287caf3cdbf1c9596a8d02e2af90eec5de05bd60f2215f486df48e238c0132,2024-11-21T03:50:45.217000
+CVE-2018-15410,0,1,ca65b040f91520eb3d6483ff90de369b8c03f0a13f95acff35b2493eb7746703,2024-11-21T03:50:43.853000
+CVE-2018-15411,0,1,ad9f3305e2dac94d39362c4a60ec8046f8e5496e5dce0c18df787bc14fadb2f6,2024-11-21T03:50:43.997000
+CVE-2018-15412,0,1,ca350eb83e4be7adec6ef8904527a299b0965d68171745ca53956c3bb1bad7ed,2024-11-21T03:50:44.143000
+CVE-2018-15413,0,1,effb186455535bfa74a5863e5405e7efac03a78dfd86b84b6f774b9b96925535,2024-11-21T03:50:44.300000
+CVE-2018-15414,0,1,cb3d164f397caf8fa18520b5e3e528095c0f5e4aa128f4e3bde91245fd2b13ef,2024-11-21T03:50:44.447000
+CVE-2018-15415,0,1,0175beaaebab541c6af21593ec9648cf00b27d8bc80207bf3f7be6b20206b12a,2024-11-21T03:50:44.600000
+CVE-2018-15416,0,1,f339a8661a6eaae86bcf3b0cb584e3f6f471951cd6c9aa8a89669ddd6d2a6a42,2024-11-21T03:50:44.753000
+CVE-2018-15417,0,1,5b6d4fe83d876c62626e65708099b029d8d1f84886d4aacb67cd94f0ca9b7b41,2024-11-21T03:50:44.900000
+CVE-2018-15418,0,1,5ccff3f1008ef72acf731c20989504b991f394d6fe0b987570075a82780a27e3,2024-11-21T03:50:45.070000
+CVE-2018-15419,0,1,ba5131bff3feebe6124cd0899614851840ee1410011db67b7c39391972c32df9,2024-11-21T03:50:45.217000
CVE-2018-1542,0,0,54608f95825bd825c545027abb93da620ce61b9c8f22fea5930ca5c40da0bf6e,2024-11-21T03:59:59.007000
-CVE-2018-15420,0,0,9eee976edcfc5b865db753965f574a9030564d07c50349e1b2a0d4dfacc3c1a8,2024-11-21T03:50:45.360000
-CVE-2018-15421,0,0,649f709335976c8eaf090b7335704e1173e8df3c5f3a574bab19ae55d38c7818,2024-11-21T03:50:45.517000
-CVE-2018-15422,0,0,12e8790b078ba516b267c3b0f118f9e12b6f18217be75696b71abfbc92b78233,2024-11-21T03:50:45.667000
-CVE-2018-15423,0,0,7b189706107d4ddbd2e6fc2f719d1341ec79d101c34c5771eb370acbd08bd125,2024-11-21T03:50:45.813000
-CVE-2018-15424,0,0,08aa64a829895701a465956a1a2eb17b14d3e41cc1a8b31075036d70f65d2e40,2024-11-21T03:50:45.950000
-CVE-2018-15425,0,0,184661f980bd7b29cc78e92ad03c0c3024fc9bbbdc1ae40de09092a00119641c,2024-11-21T03:50:46.090000
-CVE-2018-15426,0,0,2c0d8548d4b1aab36c01083fc8bf1345daca36d0dd9dda5379e7200b6eec3582,2024-11-21T03:50:46.233000
-CVE-2018-15427,0,0,259a7e7b078fefbbf2f81b8ee4e27b9234df8f730a913aac7afa93fd025234c4,2024-11-21T03:50:46.373000
-CVE-2018-15428,0,0,e71bd0905fb56d417a6ca83aac53bfa58110b5392829a746b2687a7e17a601ac,2024-11-21T03:50:46.520000
-CVE-2018-15429,0,0,ab21501775cc305bcda5f28254fa6b4cad05e6c201edb196e50174ed2607c6fa,2024-11-21T03:50:46.663000
+CVE-2018-15420,0,1,68a7e17d7bcf45c3a87cecd93045091705d8bfe9f4ed7e09747f4b54cea3ee73,2024-11-21T03:50:45.360000
+CVE-2018-15421,0,1,07bafb22ca818d27dfe973a0a3909d660c6a4b5ec7e49742ed4d6a20c7f23177,2024-11-21T03:50:45.517000
+CVE-2018-15422,0,1,be23a61b52a6452ac93ccc2dd1a96788f3452db317defee302e338cc6cbf946a,2024-11-21T03:50:45.667000
+CVE-2018-15423,0,1,fe777707b716aa6a3794be5b2492aa3134658aed969d56a809dea14bd07ef10f,2024-11-21T03:50:45.813000
+CVE-2018-15424,0,1,a2ab7fc554d2ac00b2bca3c23d1ed53f3634e809637e7bae24ca7207f7881f69,2024-11-21T03:50:45.950000
+CVE-2018-15425,0,1,5dd3e070ec0f03ba06ddf074d0d7b02aa9ffdceb911869b464b990ca45f11cee,2024-11-21T03:50:46.090000
+CVE-2018-15426,0,1,f1002dc6091cd299a20acbce58b34614a58481d4e9fd07f31016648f9d42e4a4,2024-11-21T03:50:46.233000
+CVE-2018-15427,0,1,9966c587f25d65fc1cd3c0cd36e89e4ec6de8396bfe4dc42c09120b012a47e9b,2024-11-21T03:50:46.373000
+CVE-2018-15428,0,1,d39b539c526d4ac2c435b4969d03a9ff9fe85294cccdd24b58f8b575ba3187d7,2024-11-21T03:50:46.520000
+CVE-2018-15429,0,1,71824b4fbe8333a8e656abc08018b87d09d40af397246f15d566c7dfc03d3f50,2024-11-21T03:50:46.663000
CVE-2018-1543,0,0,9bb6eaf88ccb298ae006b95073833bd0453e9187520c3a507d7e77ec28bb9cf0,2024-11-21T03:59:59.133000
-CVE-2018-15430,0,0,26415119ed6d15a9a673ee77d42f6ed098e4115d8bb3dfe74d1168be1a8fed50,2024-11-21T03:50:46.800000
-CVE-2018-15431,0,0,7b747c32ddb05a935067fcb87e8870cdf36d2590ff522708f9cfb7601c5020f3,2024-11-21T03:50:46.947000
-CVE-2018-15432,0,0,0d5c4917aa8533f65fe90c4c346060199aae13949259259b053ff174131e1d3a,2024-11-21T03:50:47.103000
-CVE-2018-15433,0,0,9a36c311f85b04560f4a5c7bf5e83292e61cf87728bf3c097909713302f07239,2024-11-21T03:50:47.250000
-CVE-2018-15434,0,0,4e278c04787ec2b4dec81c6f286d55e5cb2912c30855eda7ea9e90c33fc00e0b,2024-11-21T03:50:47.400000
-CVE-2018-15435,0,0,df119d1007a4a7d4320f2d0a4b841f9b01aee5d1b568077228c4838034a06e1a,2024-11-21T03:50:47.560000
-CVE-2018-15436,0,0,37ea965f4da21c536db92e2140a9d543d281e13b30a7461c32e95fa398718e9b,2024-11-21T03:50:47.703000
-CVE-2018-15437,0,0,a28b371400160cf9b3faecbf43a2b1f8e986c82ac20289bf8b25f4b19f4dafbd,2024-11-21T03:50:47.860000
-CVE-2018-15438,0,0,256c1137b458c8db886eb11f9777d83e18dbfb03a3a40b1179cdbce68b086349,2024-11-21T03:50:48.027000
-CVE-2018-15439,0,0,c92e9a143215ef5455a635908f1b4fbb72ada8b1b0091bdaaa244b6c33e20ccb,2024-11-21T03:50:48.200000
+CVE-2018-15430,0,1,7668bf33b6ae1bec5066a25f48cad1acebf748b9b70729a670e822651a8f9de3,2024-11-21T03:50:46.800000
+CVE-2018-15431,0,1,3ad125e237850c4002a6851fa51caf5b4eeb020b321c68a22ed21ac36c3d03ad,2024-11-21T03:50:46.947000
+CVE-2018-15432,0,1,88d6c83e8f692d5f84aab97d3d55d5516153335816780cd319ff04c98b8d2c7b,2024-11-21T03:50:47.103000
+CVE-2018-15433,0,1,eec6872539a1d10fa3fd9bc6380e38ef5b652045217f3427777adc3c217bea58,2024-11-21T03:50:47.250000
+CVE-2018-15434,0,1,4038d0f0e8394a9c1970c1213f8909c810572439c514f7578dfcccc3590c851f,2024-11-21T03:50:47.400000
+CVE-2018-15435,0,1,e072e1ac7172a71920b0efdb1ac6c8f7df72221d39e97dffa0445f9afdc103d6,2024-11-21T03:50:47.560000
+CVE-2018-15436,0,1,64724ee06df922bc14c900b03ca6b630ffc6e6c3647f0de4770edb0242490d48,2024-11-21T03:50:47.703000
+CVE-2018-15437,0,1,5c4249b57359f7edd2be00b84e8c7934012cf9b3c368525248d4d80ed28a6a26,2024-11-21T03:50:47.860000
+CVE-2018-15438,0,1,adec72538a579f11c4783368afb1f36a7da1714bc9c727143ade426b34eb1ea0,2024-11-21T03:50:48.027000
+CVE-2018-15439,0,1,e4b27aa92e3c49942ec70dac0e8c2981aada8cd520f142a15bb8af14cf6d3e22,2024-11-21T03:50:48.200000
CVE-2018-1544,0,0,8ce1405a3d05a7bb2f36a5ea0fba8e5f1eabf45782c1728803b80bfef0058e66,2024-11-21T03:59:59.253000
-CVE-2018-15440,0,0,32cad01822ee05d063e94527a6b23455f96b3e79aae0d5c7fb4b2834d8248078,2024-11-21T03:50:48.457000
-CVE-2018-15441,0,0,e5d0528437c633f9ffd54744ced4abe37684552d2658ce2f1c87fb8c221de849,2024-11-21T03:50:48.593000
-CVE-2018-15442,0,0,b39332f7616f1f3ab16fe3841b48c646bbdcbbad46239a4804d5b375e5e5f5e9,2024-11-21T03:50:48.723000
-CVE-2018-15443,0,0,7f08898231b33de28253f7863c213fdd4a0ed473cc2c812ec171a19b96754963,2024-11-21T03:50:48.860000
-CVE-2018-15444,0,0,cb9d98124848b3c268ea292693d102de0709ca208819fab9e74c761bd6c3f24e,2024-11-21T03:50:48.980000
-CVE-2018-15445,0,0,34569b92fa1b18b491cbcef1d91ff5977408ee1d91893907d5b53949fa7631d7,2024-11-21T03:50:49.113000
-CVE-2018-15446,0,0,f615fb527b45b0e9fb4c73060f2823163b008ec86e6509ed18c23d777d92b168,2024-11-21T03:50:49.273000
-CVE-2018-15447,0,0,152739c223077bace8ff95e1d84c1f348d0a6b78c1cecd179901db00dd14d981,2024-11-21T03:50:49.407000
-CVE-2018-15448,0,0,9a5e42964284cd4b08b5795dbb216af060b0aa23d2a2d93a3bf0739583866465,2024-11-21T03:50:49.547000
-CVE-2018-15449,0,0,48cdf042e46f4149040c5624c2d744cba11cf65bbca43f9e07a14c15eee4cc7f,2024-11-21T03:50:49.670000
+CVE-2018-15440,0,1,48fe29c854cd5252ed4663c9f9676e8496013af9c67c5488971b9956aac0d07b,2024-11-21T03:50:48.457000
+CVE-2018-15441,0,1,d8bcd5de284899ddfc36c2c5a4e15cd3db18bea0d7d490afab4a568dc2de2836,2024-11-21T03:50:48.593000
+CVE-2018-15442,0,1,19ce01dd95b0c326974edeea07835f890f48d90914b592232500d3e1e7c174b5,2024-11-21T03:50:48.723000
+CVE-2018-15443,0,1,6413ae21ded9fc8968b450300fd31d9aa46ad714e6512eafeaf34d8fcaf4fa7d,2024-11-21T03:50:48.860000
+CVE-2018-15444,0,1,ef9040723cc17c8a47d57e4174720e9e6d9c8d92aba45e0d90ed8a7f0f99706f,2024-11-21T03:50:48.980000
+CVE-2018-15445,0,1,8d8c955fceda381107d08e46b4847dc0e93f3b0b1e1c34f91c1a4249d3f9c757,2024-11-21T03:50:49.113000
+CVE-2018-15446,0,1,1cb6b472d129b6fe4718333c691fa8c8e80207eb5a5295a29da9175670e44e2b,2024-11-21T03:50:49.273000
+CVE-2018-15447,0,1,c8257a790adccfc8a69e771566d095be592fd1c8a298327c525b261197e135db,2024-11-21T03:50:49.407000
+CVE-2018-15448,0,1,a13ccfc06d328b8bad8c6615ff6e56741e49c6a8327be18f9ed31f3bb1c9cabd,2024-11-21T03:50:49.547000
+CVE-2018-15449,0,1,b078605fd3c5841bd463c5bfa1a77169f803955b4ac7bcfbe1b2301aa1216e4e,2024-11-21T03:50:49.670000
CVE-2018-1545,0,0,177df56c79cfb2d2e6ececd10ac13187f6268f78cba94993390ac7dccaec5fc2,2024-11-21T03:59:59.380000
-CVE-2018-15450,0,0,a62b28a4498d61939d824468f83836a20a708ce425200866f5c44f3a399a363d,2024-11-21T03:50:49.800000
-CVE-2018-15451,0,0,5642d719fe1691717aedd9c6b13a8e8f5b32a0eca4e3e469beb70f43b92df980,2024-11-21T03:50:49.933000
-CVE-2018-15452,0,0,bcc25d93f8285cfeeee771d80d5d368e95afb40ae27257a5a8d0aeed0029050a,2024-11-21T03:50:50.077000
-CVE-2018-15453,0,0,72058ef32022546813155bdc1c10172d3a8fe0c0726a0fd4874969867b7f9565,2024-11-21T03:50:50.217000
-CVE-2018-15454,0,0,758227379cbf6bea7561ba4f3c90a43dd48e083844062d8494bc1a0fd7c73b91,2024-11-21T03:50:50.363000
-CVE-2018-15455,0,0,aa91f3d664ed9ba7fbf3738d7aa301f493ba4dc4bee0a588cc04f1b08842bdb4,2024-11-21T03:50:50.500000
-CVE-2018-15456,0,0,fd43d1e8176c74625cdf660767ada9da09419e174b2c4e0c18302bdbf3856688,2024-11-21T03:50:50.640000
-CVE-2018-15457,0,0,860499593dedcf23de29a0877a8f902b2e6ff53e752afc4f7776fd68d14a7dcb,2024-11-21T03:50:50.777000
-CVE-2018-15458,0,0,dc01ca143ef65ac3c52c3f92e34209298a9c156d8a4ffd6c0049c4ac0e88ea80,2024-11-26T16:09:02.407000
-CVE-2018-15459,0,0,880e9565d4f27c2f5b60fb92041fe1c26657c882f5ce25bd4127675b165b5a25,2024-11-21T03:50:51.083000
+CVE-2018-15450,0,1,9893624bbd99121c96132b6f2add8591a6a065ba70f0cf7a562462847b9fac1d,2024-11-21T03:50:49.800000
+CVE-2018-15451,0,1,466227bd40469ba74ff5e5e374372bc0ee582f678c7f05c41075af00c5fce0e2,2024-11-21T03:50:49.933000
+CVE-2018-15452,0,1,48056700f92e999a21e87bcd2c95e8462a1155e1a9d6fe8cd38670f28d104990,2024-11-21T03:50:50.077000
+CVE-2018-15453,0,1,ece837d581ead0f33087e44c0c0db827c5e1a1f36c489dae2bbb26f78315e29d,2024-11-21T03:50:50.217000
+CVE-2018-15454,0,1,1e970332692ac72ea025a35587360ba2b3c2be3f22457d36e8811a4071241c5a,2024-11-21T03:50:50.363000
+CVE-2018-15455,0,1,302478c7a9d3d209eab82f49e6ab774d879b149af865d87cc4f0eb43b3c948c3,2024-11-21T03:50:50.500000
+CVE-2018-15456,0,1,f29db071b67a6259d1e677f79272d125d55119d7306a1e82c9ee8f7bdc6dbdd6,2024-11-21T03:50:50.640000
+CVE-2018-15457,0,1,4bb52a10351607b5acb3dd37eb13e601ba4543b173a62179f7be1918687181bf,2024-11-21T03:50:50.777000
+CVE-2018-15458,0,1,e8bd214fe86bca4c65c280d81519a66a909d894420c79d66e2eb3f6540fc7231,2024-11-26T16:09:02.407000
+CVE-2018-15459,0,1,b991fbe78b970b5445b001a541987012e123e0e2b837ef8c9adbbb8672abb831,2024-11-21T03:50:51.083000
CVE-2018-1546,0,0,97314a150acf710b15130496e9fed596c490a1e48429320c236ec25dbfbbeccc,2024-11-21T03:59:59.507000
-CVE-2018-15460,0,0,084363e105e871834fc06649a711841c62afb8ae7aa4a222fb310671c516a8f9,2024-11-21T03:50:51.233000
-CVE-2018-15461,0,0,0a27ccbd24c0c4f22223c08c9b51057875459131efb5d7245440116b39f3e34d,2024-11-21T03:50:51.383000
-CVE-2018-15462,0,0,09391884f46bdc565cc9f71e1fb446ff03bb8bae27a1d4cdfb87abd03df550a4,2024-11-21T03:50:51.507000
-CVE-2018-15463,0,0,07fd1dd8a473ecd55281935d09c1c277033699a0e5d637a56fb790537d97246e,2024-11-21T03:50:51.647000
-CVE-2018-15464,0,0,7447a29082eb8691eb1aa53fb07fab0c459bd375496d31a44f09e81d375d0a54,2024-11-21T03:50:51.773000
-CVE-2018-15465,0,0,62cf055fd63237100229a4163abbbf9619a24e0f63ef09ad61e99533447a800d,2024-11-21T03:50:51.913000
-CVE-2018-15466,0,0,18298bd2b25b2f8e7ec4733dbac46e3dbd532e6a3e055a507399dd278dc97e66,2024-11-21T03:50:52.070000
-CVE-2018-15467,0,0,cb287d842d72de680b47e8f14d9c41b4f8b568d29054d705489a0aac609423c7,2024-11-21T03:50:52.207000
+CVE-2018-15460,0,1,4179e38bdd8f9f4639c4e5153a0a9629942b49b014d970681b376c7f21cb1b57,2024-11-21T03:50:51.233000
+CVE-2018-15461,0,1,e9271f18e667cf82f706d1d8270244e42f17e3b4a3c6d0fb9e547e9e33fec969,2024-11-21T03:50:51.383000
+CVE-2018-15462,0,1,e64de6e9fdbf9c99b4adcbbe701a0945ddf66c43ae4788f93b3a1dee1eeaf154,2024-11-21T03:50:51.507000
+CVE-2018-15463,0,1,0e5c585335037d3539665b5259a53b187f7624ba21ccbc488e11c620767ea10d,2024-11-21T03:50:51.647000
+CVE-2018-15464,0,1,5eda6c4ccfe64ef61334e0559d0e4b8b240db6d5afd11f4e27b754c436df008d,2024-11-21T03:50:51.773000
+CVE-2018-15465,0,1,8e21a8a929817246abf03629c223d61d4c26de9a80530702b0b9e4520b073523,2024-11-21T03:50:51.913000
+CVE-2018-15466,0,1,626f492b6cde3db0501d8e1aebdbb36e40c16d7d7a615812d636ea8b90ff8048,2024-11-21T03:50:52.070000
+CVE-2018-15467,0,1,921b5238750e49e82ce97bfe72729da73a9d9019cea84f593afb5b7e7bd5d997,2024-11-21T03:50:52.207000
CVE-2018-15468,0,0,170def216925a76d1203f3f237ca8e8af344472c8b176f261e43de7512837f96,2024-11-21T03:50:52.337000
CVE-2018-15469,0,0,54a3dcb68da59eb40afe897c66019830ee52b45ef4a3d68ebbcb930c73a1f364,2024-11-21T03:50:52.500000
CVE-2018-1547,0,0,71e6ac431cdb92c443db57acb4e7e07dcf81afef745f14ca5b0cc19d591ec55c,2024-11-21T03:59:59.637000
@@ -126943,18 +126943,18 @@ CVE-2018-9370,0,0,87030da3b46653701fd5f7a865aef8798fab0242623ea0d195e8be90ff1928
CVE-2018-9371,0,0,222c2e4987b2e2d5c2e561d322c2393abcf0b781445c771ce77d7eaa6ac4047b,2024-11-22T21:25:48.853000
CVE-2018-9372,0,0,bf802d4801f9f860b3a398478713fbe7b249ed3f9ce1e6995b2077a1cb556211,2024-11-21T16:15:17.900000
CVE-2018-9374,0,0,3b6a94c92c93496e3937aecbafbcea0b081d505aad2846a5e6172408cea8db66,2024-12-18T20:25:33.723000
-CVE-2018-9375,0,0,a97a29d02584eb4e0ce8c21ea974703557f913785bbfa3ce5bd73f6e9786f4f0,2025-01-21T17:15:11.717000
+CVE-2018-9375,0,1,796c07416acf8cde600391dade7cacc2539272542d56dc601f7717adecb5bfb4,2025-01-21T17:15:11.717000
CVE-2018-9376,0,0,cc980c27d3656c448822c55fa140694c851c62fa72e54df15333c7855bb4f3dc,2024-12-18T19:37:08.323000
CVE-2018-9377,0,0,1a76ca591c622e996437a337b98c1fab200dd33e77f24b21e234d68799ab4b2c,2025-01-17T23:15:11.617000
-CVE-2018-9379,0,0,166aee5d93bc1cd52e5923f3e67f3e8e3e55bcda5fa285609e653d6d1a5738aa,2025-01-21T17:15:11.873000
+CVE-2018-9379,0,1,3c4d0b24777c1bb158fa692a2de5b655465acc34135122c5d837cf9bf5f58562,2025-01-21T17:15:11.873000
CVE-2018-9380,0,0,e12a43dbeeb8da1df7c5ede895c56553a0364f94530599aafaca6e6f3326ce02,2024-12-18T19:42:11.093000
CVE-2018-9381,0,0,2ce1fffdcf5aa87d66006064137212243a0a262bfc7f2cf820777dea17a7c8cc,2024-12-18T19:39:05.097000
-CVE-2018-9382,0,0,295430e7e44812a489bda517776cd704b457e64636848b454d86f32c87c90ef2,2025-01-21T17:15:12.020000
-CVE-2018-9383,0,0,2e6c200ebe10c3714abfd59b4f82acdc7deba28083aae93061087aaa92d0e588,2025-01-21T17:15:12.167000
-CVE-2018-9384,0,0,14ad0f459e726730235f27504f587c4acb4d750ab7fead69c973170221108351,2025-01-21T17:15:12.330000
+CVE-2018-9382,0,1,ba074b390611822ff9e742a44ddfc973a21e716b6f56ea520c7cdc61103c8f1a,2025-01-21T17:15:12.020000
+CVE-2018-9383,0,1,5dbe84554de763afe55b6de92440da80230dc1bd1534220af76932b8a7d73e2d,2025-01-21T17:15:12.167000
+CVE-2018-9384,0,1,d452cc0b6d2445d7d257c5b85ad553d7f9448c2167fb57d2e55e3907459863ab,2025-01-21T17:15:12.330000
CVE-2018-9385,0,0,963ab87aab004413f51f225df7125c38dada01fc62280d1b6b2d796be35cbfda,2024-11-21T04:15:25.463000
CVE-2018-9386,0,0,00c05564d802b59f0ce740fae1821c18eb3e04be32703f1b88fcf171f14e151d,2024-12-19T16:51:52.097000
-CVE-2018-9387,0,0,e14a29c2281b7b769ef8347ea717441de11cc8204f63f632139aaa6bd3a5fc79,2025-01-21T16:15:11.453000
+CVE-2018-9387,0,1,c51536796064d725fddbe49fd9acb541c6f56006847a3e07d695cf21efa26d09,2025-01-21T16:15:11.453000
CVE-2018-9388,0,0,cd8b1868b6c78b44a87a461eb158bc8cba5eaf7d4a400099563232fceb850761,2024-12-19T16:50:58.733000
CVE-2018-9389,0,0,25d19c8d4c7512c3bfbe9c683cd33e500035511aa3b62b8f393031869c3958a8,2025-01-23T19:56:32.087000
CVE-2018-9390,0,0,03e5cf7608f8573a4867237edfa1da4ca8706d51cc54b5a571dacd98cdeb3ef7,2024-12-19T16:49:41.540000
@@ -126968,11 +126968,11 @@ CVE-2018-9397,0,0,26269f1c9fcc6b1d423d4440d9c2507f2aec7b61ce25f05ba7d0c57d67ba53
CVE-2018-9398,0,0,95e014471e6e71c69269bc94d8c70fce198b8668e93169584f00b3fa6b85d104,2024-12-19T17:11:55.793000
CVE-2018-9399,0,0,b2462d7baa7c4eeaef223d1287aa13f98492fcc0bc383cbf07e373c2cee34191,2024-12-19T17:08:15.067000
CVE-2018-9400,0,0,29523d45cdafd598836ce2a4b8720a53971a0774008378f1306ff9abe0bb5da3,2024-12-19T16:44:18.670000
-CVE-2018-9401,0,0,1ebea4a064f48af1de71f59b8485b9bbadd9270c461d30ee4d0180ce961fff01,2025-01-21T16:15:11.637000
+CVE-2018-9401,0,1,899c1b417b0eb39874d55493bf3d9ec398015670c3bc4b8b959c0684f50f7ef2,2025-01-21T16:15:11.637000
CVE-2018-9402,0,0,8933a07544770cbdeacc339ffc963de192038d17676646257ca5874f8577ee44,2024-12-19T16:43:32.003000
CVE-2018-9403,0,0,d70838cbd1983720a8279a18efc914175faad26ff03523c1b9852a2402b5213c,2024-12-19T16:42:42.670000
CVE-2018-9404,0,0,43b16c4bd87fb57a678a75dfbb7264465ddd0a590164be8070509e928e887180,2024-12-19T16:39:46.807000
-CVE-2018-9405,0,0,9a4d91f36528fe73feae5aa1350d5208872d039e37d3538915eb016d019a21d5,2025-01-21T16:15:11.810000
+CVE-2018-9405,0,1,987a92d360c8189759b99a2b0c5be7348b24489d8b3bd71d5e182905c76db9c1,2025-01-21T16:15:11.810000
CVE-2018-9406,0,0,e1a8098d4ffca37a89affaca374ab2d19b11624fa1905086a924fe63ef19f3a5,2025-01-23T19:55:21.407000
CVE-2018-9407,0,0,b3ad459a642ed888363fadb16ef4b7071f82577e9745e7d759ce546d52d3b832,2024-12-19T16:38:07.783000
CVE-2018-9408,0,0,d789fa912b087296f24deff1e2d30bd08f527fbce9788bd053320debca25ac99,2024-12-19T16:35:23.567000
@@ -127001,7 +127001,7 @@ CVE-2018-9430,0,0,30fa557ffc9515e3bc20d1118d7d0ddecb889a285b3b3616e7604df3442680
CVE-2018-9431,0,0,4afe60514212cada51830aa66d3c834952243ea6184966f1bc71cc7934aa2656,2024-12-18T20:17:59.063000
CVE-2018-9432,0,0,1aa4e739566c1e2171afefbb1209caf86bb29deb24334a3e72ce4e05b106f8a8,2024-11-22T21:11:15.770000
CVE-2018-9433,0,0,e65252ae0191654fe4071edce96cc56fa66d855f8d858f6b4c76a072fc647ebb,2024-11-22T21:13:28.557000
-CVE-2018-9434,0,0,af6e5d858710ec7299a411fc6842e858e95636b9c50c4c26a2b2855d513fe6db,2025-01-21T17:15:12.493000
+CVE-2018-9434,0,1,754c3ca28b0444c933d32d7e11818ef1162f1b6d5a0dd7cf1433e12c6f9f689f,2025-01-21T17:15:12.493000
CVE-2018-9435,0,0,c406cb4911498c54f535025a4ff9635d1532d0c17327395aede6e99a5f8250c2,2024-12-18T20:00:03.747000
CVE-2018-9436,0,0,c2b494efb154d7aaa9ed81b96c713d9c24fbb84694f572f4377509f9f74eaf9e,2024-11-21T04:15:27.740000
CVE-2018-9437,0,0,e59cb92832983cf48add0369fb79f47a847f559175a0f2d7a936cc44f1b7ae9f,2024-11-21T04:15:27.863000
@@ -127012,7 +127012,7 @@ CVE-2018-9441,0,0,575f828caed05d70445398c6546d07e6187af95dfab7246adaf485e88049a8
CVE-2018-9444,0,0,71c23de0a19dd0833cbf31bcd17198f1ee23b3012d3e983445d1d8427624bfea,2024-11-21T04:15:29.460000
CVE-2018-9445,0,0,6f497d920b5dea1dff5b6fdf23b01b78b0db0eccdf0018e269ce9b214bfe106e,2024-11-21T04:15:29.570000
CVE-2018-9446,0,0,c234b9792d5f51536c0fd269b29b1abbbcfb1e948520636234fcd7501d794384,2024-11-21T04:15:29.697000
-CVE-2018-9447,0,0,f90c24dc57adfbd11544b9820d2ff2e84c7d603bf06413405ea93bb5f5347e07,2025-01-21T17:15:12.650000
+CVE-2018-9447,0,1,c5dd39510707213d7fdbd19cc565e6af9a6d98c6c6cfe08af5dde8e820dea6dc,2025-01-21T17:15:12.650000
CVE-2018-9448,0,0,69c64fe6ebbff0200617e0b85ea10efd9da70ed74749831ad78b183a3e956ce7,2024-11-21T04:15:29.810000
CVE-2018-9449,0,0,40c2935e250f77217097c1d24f2eb94cea68528fe2bd69e2fca6dbdff2691446,2024-12-18T20:10:01.940000
CVE-2018-9450,0,0,71a6672dc17cc007950c7f48e044c7117901d3605e37bc8deb02b63ead4edb96,2024-11-21T04:15:29.930000
@@ -127025,10 +127025,10 @@ CVE-2018-9456,0,0,1c78841b075bba5ba910247965bba0f6a8dc8a0b6c3b5076669b36b79f98bf
CVE-2018-9457,0,0,e8a26c1972ecd6c85221150cea18ffdf38c6d3c4d9a4baa5448246cb021ab215,2024-11-21T04:15:30.743000
CVE-2018-9458,0,0,c7100da419412c0b9f77fb95c41b288cf97bb377a2e2af8a9bc1bff7997eb383,2024-11-21T04:15:30.877000
CVE-2018-9459,0,0,0c686c1b3705c9efe57e36ad035d7d33550c8fd1fcc57cd9d5855aab2376a3aa,2024-11-21T04:15:30.990000
-CVE-2018-9461,0,0,0b1895899b4b3eb5b730b86932e3b88aeeba891fc6e037e0050050520e3041f8,2025-01-21T16:15:11.970000
+CVE-2018-9461,0,1,52a2fe13563b26967ceccb8986b0ad6bae9e815a9fe6e9dd847d030664164098,2025-01-21T16:15:11.970000
CVE-2018-9462,0,0,39faca4eb976d0192e81611d25151cf64bcb25f02cb123eb3db2336fd5969704,2024-12-19T17:05:52.180000
CVE-2018-9463,0,0,3e4f81bd8eae8c3f407afc4211cb341bc106a9bd2bc79075e64783fd4c9cf520,2024-12-19T17:01:04.227000
-CVE-2018-9464,0,0,7371d318e9c752a4ccad591fa1c7b45c1c50c5416ba7718dc294a67e72c86585,2025-01-21T16:15:12.133000
+CVE-2018-9464,0,1,f80f36660132da89315f16e99c2ac7dedc8c62d76dd409a82b1d3590721ebc07,2025-01-21T16:15:12.133000
CVE-2018-9465,0,0,cb2efd2b80efc3b600077998298a31fa09fe425af40f55a1a9b3acceb259a706,2024-11-21T04:15:31.130000
CVE-2018-9466,0,0,a6ce5776a6a0bc572eb2fe9b93668c302dbc661dc68279f63c0e20dc3a242886,2024-11-22T21:29:09.617000
CVE-2018-9467,0,0,fc2dc1d34992c43bebd9ec5fb99a903623aaf110c20cb7b73e1288eb66ff9671,2024-11-22T21:27:26.783000
@@ -130842,110 +130842,110 @@ CVE-2019-12615,0,0,12baefe109fe1fa133d87c9ee8eaa8c71f25236c423a4cc4d0d5bdebc9616
CVE-2019-12616,0,0,f99704797680fd2bf06aa987783b52c4e3c4a9f4b698d4f46fa3ec54a9a4bce7,2024-11-21T04:23:11.647000
CVE-2019-12617,0,0,789efe7bbf633c45e5e54126ee3a9a25f98c1defa1380caae196ea30782137b0,2024-11-21T04:23:11.803000
CVE-2019-12618,0,0,541f1f2dbaa94279535ba325f44aafb2720d4bbbbc42f3be28ac2116f195b6be,2024-11-21T04:23:11.950000
-CVE-2019-12619,0,0,9cdc5182b3ada2421d0ae06aec9be8d547e0191f44f439bc1006616ea3de1916,2024-11-21T04:23:12.100000
+CVE-2019-12619,0,1,7360adc645928fefdbc9bd4022aadf185f4bd6eba29add9ce4d95774d841e7b5,2024-11-21T04:23:12.100000
CVE-2019-1262,0,0,1cd789ec745f5544d068b485d686fc634ce7f1272edc271555ff44ed3a73f890,2024-11-21T04:36:21.623000
-CVE-2019-12620,0,0,60ea557651a31adb00a49b6c0c429f1902741013d2d6c63c58cc9a03f8b170b5,2024-11-21T04:23:12.247000
-CVE-2019-12621,0,0,2cac6cfb428ca1fb05a2d8773f735475c54247cb0c0e8c70dc572c1f71f8ff13,2024-11-21T04:23:12.397000
-CVE-2019-12622,0,0,efd70540060725b725f90c3d54c8b266479740fd965209608089a556043345f5,2024-11-21T04:23:12.533000
-CVE-2019-12623,0,0,df61fdd6109a75a4cb43ac15e89ef45d78d67cad948bc6779c7d25a5c16d7b2b,2024-11-21T04:23:12.670000
-CVE-2019-12624,0,0,5bdaea27eda1554a19cd9d12330a3aa1eb7fc96974456676b2583d8df842fa5d,2024-11-21T04:23:12.800000
-CVE-2019-12625,0,0,e7d58c51c9b9250c5551c82fd759fa90b9be4ed7810e788324f244661a6873db,2024-11-21T04:23:12.933000
-CVE-2019-12626,0,0,f25377e15698724910efea921009a780a1dd7ab7864959398504674b939a43e3,2024-11-21T04:23:13.073000
-CVE-2019-12627,0,0,19741fbb3f0bd53fd618e50b6f3d936ece2c65d6d02f020254103f9dbf7705ab,2024-11-21T04:23:13.203000
-CVE-2019-12629,0,0,72eb62b91ad2a02ea8658e6e45c9ab3bf23b4efad1fa99f22e448293ac5c94aa,2024-11-21T04:23:13.343000
+CVE-2019-12620,0,1,bdac6589d7ee31f781d2682f2f717d066ac0539aaf5dea0e152648b7800ab565,2024-11-21T04:23:12.247000
+CVE-2019-12621,0,1,4e10fe259dcab1e5e417f12a9fb5105cb9037d89425043f7bc7e9839eedc077c,2024-11-21T04:23:12.397000
+CVE-2019-12622,0,1,e3e37fbf0fcf57cce7f73cfd915a9a8d6c5d555b6a0021ea5f58449792443ff5,2024-11-21T04:23:12.533000
+CVE-2019-12623,0,1,fdf397b928cabbf60c787cd911f26f38cd3e3d1111d1a9f804e2a3f4ef59453d,2024-11-21T04:23:12.670000
+CVE-2019-12624,0,1,ec2928e7f446067651af689aa19947f905611ff79c9f04f5507e53fcfc000956,2024-11-21T04:23:12.800000
+CVE-2019-12625,0,1,499bc60ade4a652df2ca6f6f2e31b7d11327cecebaf2b4df8260bcc2b7e67f3d,2024-11-21T04:23:12.933000
+CVE-2019-12626,0,1,aaca9d25b3e83748fdf7001b7dcf4a587f1e47a33ce43ee19099df6f75da7784,2024-11-21T04:23:13.073000
+CVE-2019-12627,0,1,1c223af1ea08c8390e6335b01824099c01b05fd3b33cba1f79bc1b4c9dac64c1,2024-11-21T04:23:13.203000
+CVE-2019-12629,0,1,84d46f9a954c4dea3e50b948605559ce3f1548286ec0136416e252bc1e4b7cc4,2024-11-21T04:23:13.343000
CVE-2019-1263,0,0,fb7bbe077e053141248b28a14ce70918558afefb9cc5060f550eb4de117aefbb,2024-11-21T04:36:21.740000
-CVE-2019-12630,0,0,06315bd778b79f27b406804a75a811f1e9d63a192de1c352e8204e3e6ce861fa,2024-11-21T04:23:13.470000
-CVE-2019-12631,0,0,636ae58d83e9c19d18b9192a24f3e349671e95eeb7c0a8b49adc520f925a9122,2024-11-21T04:23:13.600000
-CVE-2019-12632,0,0,2592a1473919f25553bccc7ba814aa2eed9e1f5d22a3d9046be21c185e23c61f,2024-11-21T04:23:13.730000
-CVE-2019-12633,0,0,c12b4f26b981d88c31322b63b64984d070638932d7b24080084dccf2326fc869,2024-11-21T04:23:13.857000
-CVE-2019-12634,0,0,1a8c5794a29f64cad62a45b3c27182e97ab4fe7cb350afd1c4ea7a21f5558f19,2024-11-21T04:23:13.987000
-CVE-2019-12635,0,0,47521440f43bbffffb801df288bc9a025d988b4d9e84ddbbc42f8c2c3409faca,2024-11-21T04:23:14.110000
-CVE-2019-12636,0,0,29deca5dca89d772ee347d4ceb2a314b1dbb7dbc135396c1d1222eb71db2a4d7,2024-11-21T04:23:14.233000
-CVE-2019-12637,0,0,20310d2962b39a359fa6c3037bddc9131a40157fe32bd37fe14156b0bd9792f6,2024-11-21T04:23:14.463000
-CVE-2019-12638,0,0,809494c596886070f198411a74e360885d04b1dfad72d1c98cd4d84400dba5a8,2024-11-21T04:23:14.620000
+CVE-2019-12630,0,1,3c22239a219872ecf626dcde350cd7a01de650a73451b9e315bb594bc1923013,2024-11-21T04:23:13.470000
+CVE-2019-12631,0,1,85def545c7e6ddc32ec412c19a23433a51ddbb23f9ba3ec2e9ab1bde05f1e0d9,2024-11-21T04:23:13.600000
+CVE-2019-12632,0,1,d97f117b4d63a1531563698aff61965853342d77843ede5a56df04ad4e7d3690,2024-11-21T04:23:13.730000
+CVE-2019-12633,0,1,833889dffbc7a61a68b0e0768adb8652111b57f1e6d9e97317a6b968fcec010e,2024-11-21T04:23:13.857000
+CVE-2019-12634,0,1,5c22c8389dbb00dea77f1b93df18b838e53da0ebef2ca044c667c62a88419624,2024-11-21T04:23:13.987000
+CVE-2019-12635,0,1,b84795b7cddc350d0dafaab029326175f8295aafdc19486558cae72b4bff21af,2024-11-21T04:23:14.110000
+CVE-2019-12636,0,1,df9b27c4898aec8e7f377e660c2a424cfe8dac0ec5bfedefe6f68c82860d21e1,2024-11-21T04:23:14.233000
+CVE-2019-12637,0,1,06de59e2e73e3b246d5a9ea1bc44a74a1492b5e1de4ffa0e60b4a24c12515d38,2024-11-21T04:23:14.463000
+CVE-2019-12638,0,1,15c08b05ca2d51ebda31f8e852dbb4a26a9a56ab51a75f7f2c47301b110b94ce,2024-11-21T04:23:14.620000
CVE-2019-1264,0,0,db8716ae035652b2509d1760b4db95237574f893c2020774ec232b7f1b665807,2024-11-21T04:36:21.857000
-CVE-2019-12643,0,0,6e992e6c7d8138f51887fa84a9d6d55eac5e48888bf109b16cfd6df0915e8b00,2024-11-21T04:23:14.753000
-CVE-2019-12644,0,0,485f67bb29dd4cfa51f8851d0a1b90bdee8df63764b67ac29531010ca740f8e5,2024-11-21T04:23:14.910000
-CVE-2019-12645,0,0,a820c4ecc03647beaa3124a99d50ddb50834385f1d68e9026569db87b77effdb,2024-11-21T04:23:15.040000
-CVE-2019-12646,0,0,64a31e1bf6e1d2ef864624e7c81ba0dcbf725fe1af7f11a94b0588a213664b45,2024-11-21T04:23:15.173000
-CVE-2019-12647,0,0,b585165b00d543dbe89568f4978ac67e53d2459936174cc729bd9822e62aaea7,2024-11-21T04:23:15.310000
-CVE-2019-12648,0,0,7f590d219bbb5192b08f4600a244566ba54c5fabdae1e32a22f438861de47588,2024-11-21T04:23:15.463000
-CVE-2019-12649,0,0,f5d422394e24fc5807e9db6556e5d128880a5eceb691e63a5cb63d7e645c84f4,2024-11-21T04:23:15.607000
+CVE-2019-12643,0,1,2d762f89ba434fd835bdba2534f3886a596f40faf0192313dca957be72fcfbe2,2024-11-21T04:23:14.753000
+CVE-2019-12644,0,1,8738d057a51e2f604a2289058bccb7674ec25516962c8c5577038110e213da48,2024-11-21T04:23:14.910000
+CVE-2019-12645,0,1,0477046208d9819528bff849c19350a1dffe21f09f19ca44d44a84b09693cbe1,2024-11-21T04:23:15.040000
+CVE-2019-12646,0,1,3f97acc7d035cffa0b3b4b82de8da0a6b3af9fb24d5a496767efcb80578dde10,2024-11-21T04:23:15.173000
+CVE-2019-12647,0,1,748abfe2b47dd0d6c0d9ab063547ed28bcaffb6fff66f22cbdfeab86b4afb982,2024-11-21T04:23:15.310000
+CVE-2019-12648,0,1,cde2e0d22ebfd3715bf8b47b75729d1d64fd6bfe17ca1e2e6e3fb8d8cfe9534c,2024-11-21T04:23:15.463000
+CVE-2019-12649,0,1,89351292d579528a8ed0ce61a49bb09e756c4b02be956df2bb75dbfd82da2fc9,2024-11-21T04:23:15.607000
CVE-2019-1265,0,0,e43a0ad0bbea1d195cfee0d4b1c3f9823140bacf978c090b5beeca32586b96c1,2024-11-21T04:36:21.977000
-CVE-2019-12650,0,0,3986b411d534d8520b46e06f40bc8c3d448421420e5fead40f405adcaefccc92,2024-11-21T04:23:15.763000
-CVE-2019-12651,0,0,0b852d81711e1526ce898cd0a3286e168370b40db675e3ca366ebbbbaeed339f,2024-11-21T04:23:15.917000
-CVE-2019-12652,0,0,9fce5dc7dfee8f60ac1773455336176f55e8d086aaa93dabf4d38ef27060944d,2024-11-21T04:23:16.060000
-CVE-2019-12653,0,0,23e31b8adc7a049c992b399e5f1c2c2f9385a399794064124df0fe0fe7828516,2024-11-21T04:23:16.193000
-CVE-2019-12654,0,0,cb4e1a1ec8aa09f79b5ae2aae6699fa2d70e76d23dfdee49bf2d6a97567c97da,2024-11-21T04:23:16.343000
-CVE-2019-12655,0,0,264acad4d9af9918c27c3a1fd5b00bd5a2cb87873bc5d8d574e8849cecb4d5ec,2024-11-21T04:23:16.480000
-CVE-2019-12656,0,0,7b9707b050958a6f476833695376510083fa48ead8d5468ab544f16efc02c50f,2024-11-21T04:23:16.617000
-CVE-2019-12657,0,0,b06c59dbd18977c3bf9ca2915d4bf9ee4f1cdff44756e89054c454906411e830,2024-11-21T04:23:16.767000
-CVE-2019-12658,0,0,f61f0ae09860756766c53c33749ef8b129e67369a9e16e585eb4b6a316c545ed,2024-11-21T04:23:17.553000
-CVE-2019-12659,0,0,fea894e746748e3db42dffca53ea5172ea4fdcacc774b30550aed8a12c390df2,2024-11-21T04:23:17.700000
+CVE-2019-12650,0,1,d8ecd5215ed37fba5c8ee06248e062ae399b8906a7bcce68b0fec5e090ccfc0d,2024-11-21T04:23:15.763000
+CVE-2019-12651,0,1,5cf9dece88159ec8e944bbe530ce7cc6e1d4c6f68b46bcea19b571c8849d16a3,2024-11-21T04:23:15.917000
+CVE-2019-12652,0,1,33737e0fc4abc2cba0790a241a9a3961bb5c4649d7b9321f1beb330d004ddd4d,2024-11-21T04:23:16.060000
+CVE-2019-12653,0,1,517bc568c9e4f7bae771ec2a9582754cd8fe802cd115cd52232d4f1fcec7c9bb,2024-11-21T04:23:16.193000
+CVE-2019-12654,0,1,0132463bd3de8eb538845c50f3f34c4a8df903e17130d1b315d87b3a257c2a24,2024-11-21T04:23:16.343000
+CVE-2019-12655,0,1,2a054741c528904d44a30e01472e28ae98e33878316eed2d7797e1bc795776b2,2024-11-21T04:23:16.480000
+CVE-2019-12656,0,1,42ae1a5e806c96b335b5c6a89e3ee24efc20231720c03693ed18c1424eecc02e,2024-11-21T04:23:16.617000
+CVE-2019-12657,0,1,ff78950873669d346496de260bc090601bf8a4ab10839ecc95e4cde9ea0cd650,2024-11-21T04:23:16.767000
+CVE-2019-12658,0,1,4a80dfeeee79b4f13a08b4eea02389d07680d631f2aac2ed71dc5803d09f41bc,2024-11-21T04:23:17.553000
+CVE-2019-12659,0,1,8985488e063b0a559c77ff0d5c79e9befebf3193c1f09bb45a30e05ea3a52846,2024-11-21T04:23:17.700000
CVE-2019-1266,0,0,54eaa647254bdb9a6984bfd6d6dad27806882ddd086e33394198662cc2949265,2024-11-21T04:36:22.083000
-CVE-2019-12660,0,0,5fccd6811edb86dfab93f0b2e883e55a124ed5a54a301278cf5aa390a8f6458f,2024-11-21T04:23:17.837000
-CVE-2019-12661,0,0,306342545c538cf057d9d0c90c4646949286a2f65b07c2d88c3a32dc1cba3f5c,2024-11-21T04:23:17.970000
-CVE-2019-12662,0,0,40626d7c0197a0d2157f846faa524af62c81dcec888725b811f98766d36ec0f2,2024-11-21T04:23:18.110000
-CVE-2019-12663,0,0,df36dc1f80dfb49b6b95882434713eaab5ea643bf4d2129e6b66155624608efe,2024-11-21T04:23:18.320000
-CVE-2019-12664,0,0,fc9850d28d7c37a64881953ebc3f58035682213af3e9deb5ee850b8bad67f983,2024-11-21T04:23:18.470000
-CVE-2019-12665,0,0,4729f5ce17cadc5eb1b9dd1a31ff72af91c5f8cd8008862ae54cec90e4157da7,2024-11-21T04:23:18.620000
-CVE-2019-12666,0,0,5eecdc993cbd2632520da14b8bf3cf541429d8eeb5d13e81bd3d2c8652f06f84,2024-11-21T04:23:18.757000
-CVE-2019-12667,0,0,42ba06bb9267bf44523d707aca81ae2391c6a554bd148d131d7a84cfd6f63cd9,2024-11-21T04:23:18.900000
-CVE-2019-12668,0,0,029f0a5fe3a71e80dd6f032808b2d89269a987e9e1ee323c87c07ffa0358c5d8,2024-11-21T04:23:19.040000
-CVE-2019-12669,0,0,05fb09e1dc8348f0a2ea27d58da740e04a02c59281555c41477cd1b8f3f881c6,2024-11-21T04:23:19.187000
+CVE-2019-12660,0,1,532aeed4a44d888193cafaaf383d946c0cf476c73165fe2f90e7d5cf6b4c280b,2024-11-21T04:23:17.837000
+CVE-2019-12661,0,1,45f4c51eb2d7927af331aba9c49bf8b352a3307c5a5e7332e5c4288fe128972c,2024-11-21T04:23:17.970000
+CVE-2019-12662,0,1,38b0718edded36bf7e6bbdfbe0dce1838667d0f2b8f15ce375406f2bad92bc41,2024-11-21T04:23:18.110000
+CVE-2019-12663,0,1,c0e171fa716558c9e6e0723e4c8082f969065b32702a8488dfe8ac589ebdeaa3,2024-11-21T04:23:18.320000
+CVE-2019-12664,0,1,eca0c2ed328893670cd9dd26bd90b59b6ee97fd5d0c4c20e42909b9a052cd921,2024-11-21T04:23:18.470000
+CVE-2019-12665,0,1,2bb258624ac6e1283e49040346befb500938676018ed8d192fa37a3637c7fb0e,2024-11-21T04:23:18.620000
+CVE-2019-12666,0,1,1be9db94269233203182048b6f109d5f7ec838d918d454d9810e5fbd9110281f,2024-11-21T04:23:18.757000
+CVE-2019-12667,0,1,521740e65bb829bbd752310541b0dc98580fcc7ad50e8b7b6573148790fe6398,2024-11-21T04:23:18.900000
+CVE-2019-12668,0,1,ceb01e5bbdf6e9c6e6cd6b10af29439b585fb1afc6da3a4504fc9c9277df5a5f,2024-11-21T04:23:19.040000
+CVE-2019-12669,0,1,9c0fe2d307f091c692a9106ddfc62e525962d66659a7250d6257035f2c8f4dc2,2024-11-21T04:23:19.187000
CVE-2019-1267,0,0,662b21b609e5d5e812a38d484524ba5f0fd8632d3a395d4964c3e3f7b7792baa,2024-11-21T04:36:22.197000
-CVE-2019-12670,0,0,d47cd63f0ffb0c742cd00f0dc29839995cc0331217f8ccf7b45a5e732c3dea85,2024-11-21T04:23:19.320000
-CVE-2019-12671,0,0,2ec92b3eee2a2840ffd319d512d1391660e09fb064f26fc0eae8a1ce1a117c05,2024-11-21T04:23:19.470000
-CVE-2019-12672,0,0,91af30ecfb371a315fae81e5423635d263e93fed78bf94ca9db631513a48367b,2024-11-21T04:23:19.617000
-CVE-2019-12673,0,0,3b5c12e9feffaa32dcdc3320fd9f08cde23991e1ca01d618ce926e7bf932fd46,2024-11-21T04:23:19.777000
-CVE-2019-12674,0,0,448fee584df02e854643877fc694d3c2a2e09d78c628a40c089f4705e1a5b63b,2024-11-21T04:23:19.917000
-CVE-2019-12675,0,0,c886f08d3a1b57f267ed6421c97424130be5cf11567de75c872ea80fe6fbd4fb,2024-11-21T04:23:20.060000
-CVE-2019-12676,0,0,f4e82b28a05d583a6f83286dc55435700cefd4eaf57d7b67a971ff90d273fd64,2024-11-21T04:23:20.210000
-CVE-2019-12677,0,0,2b0e123ad9141d49843e0b83bcbb5f01fc3f2d9acba66449ad99b7596402d58e,2024-11-21T04:23:20.353000
-CVE-2019-12678,0,0,533590468667de0ab979fc056df177995b795471578fad1c9495e1c7be86376c,2024-11-21T04:23:20.490000
-CVE-2019-12679,0,0,648d3139a7121c441ed22289b99c0d67cf2af4ffdd67ea28475418f093d06745,2024-11-26T16:09:02.407000
+CVE-2019-12670,0,1,d596dcc13a30fbe7a5cb37a16ad3788e549facfe10ed06a8be8cc9e9a226ef6c,2024-11-21T04:23:19.320000
+CVE-2019-12671,0,1,7aa7fa939359a2309ec784ea4b224c9e0b60258f53f17493fc1252bf0ace879e,2024-11-21T04:23:19.470000
+CVE-2019-12672,0,1,e439fb606c61466f3cf7edf8f09b8fa69a53c9be379f909d2f7d96b39f7ac701,2024-11-21T04:23:19.617000
+CVE-2019-12673,0,1,6201fe6bd9a5454bf6644af0bbffdcbf747f386746c75b4956719ee67ccca43c,2024-11-21T04:23:19.777000
+CVE-2019-12674,0,1,15cbdf9c2148a2b2949d37243f5d4ff75e9d68e48ffe9afdf8eb0b132efcb6c1,2024-11-21T04:23:19.917000
+CVE-2019-12675,0,1,29a97f709c81bcb39784d0e1802e1bb7b5929c16bde52a5333b27a4d0f3db03b,2024-11-21T04:23:20.060000
+CVE-2019-12676,0,1,002bb6dfb607ca642e4f2c3596adfb3507d5c0c0e2c154f7316f180312463eb9,2024-11-21T04:23:20.210000
+CVE-2019-12677,0,1,d17013f810de9ac2077033a6609b06dd1145802104e1398dd171a429bb1ec10e,2024-11-21T04:23:20.353000
+CVE-2019-12678,0,1,db153263a006125d53f853f913409508887a2921f1bca23e985c00cd2a6caad5,2024-11-21T04:23:20.490000
+CVE-2019-12679,0,1,6f596fb8fb823d02d94143e449d93a4cd2d55ca3edf20204e7871e2f5ef33942,2024-11-26T16:09:02.407000
CVE-2019-1268,0,0,de9496e8974488d5a83f4c8f9a32e5724713f3b7de50b71ace5cb95b68c2cd70,2024-11-21T04:36:22.327000
-CVE-2019-12680,0,0,7166edd5d0ebe6f3a72fc78f148c9abeec42ba46ce4438874e7f6793d4aabb5f,2024-11-26T16:09:02.407000
-CVE-2019-12681,0,0,303dceaa7a676fc0abc96d54be5725a46b7569846c56fc47fa968424c464b424,2024-11-26T16:09:02.407000
-CVE-2019-12682,0,0,6ec75825f1e5edc14287a7edad7fb942417b70ac4c05661c9f7d2752492991e9,2024-11-26T16:09:02.407000
-CVE-2019-12683,0,0,7550e944f334f323d3612fe2541b30f4c093bf9c1bfe94412f53b3eb1932568b,2024-11-26T16:09:02.407000
-CVE-2019-12684,0,0,ea264c243b2f573efe8fef4b62739eaa25c72bff91895db46ef3740bca9007bc,2024-11-26T16:09:02.407000
-CVE-2019-12685,0,0,e61574af7ecc28cc6e5245dc43aa97617f9677b248d502f8682028292859dd58,2024-11-26T16:09:02.407000
-CVE-2019-12686,0,0,67c3fff0e606f2d78f8d11e3c930590d22b2c346519485834518625885cdc83d,2024-11-26T16:09:02.407000
-CVE-2019-12687,0,0,5bf7703f941ea961a6d7baae5aa1ab405ccb5cd449cc56eb925cbf13a737d1eb,2024-11-26T16:09:02.407000
-CVE-2019-12688,0,0,5e2a1d5e1dac95531a39ffc107a1d24c3045bc5f588fd98f50a9ee35371071ba,2024-11-26T16:09:02.407000
-CVE-2019-12689,0,0,98bbd5203cd9adca2ae66190b04ae9060d257464f4632e53a9499db5139d085a,2024-11-26T16:09:02.407000
+CVE-2019-12680,0,1,c288377d7ce1540d515557c577034fbf6a17c8838b7662cfde10cb26dfe2aa2c,2024-11-26T16:09:02.407000
+CVE-2019-12681,0,1,09b0834b8b72db187a1163facec84ce8ffdcefb279f5f28f764d3e8b45193910,2024-11-26T16:09:02.407000
+CVE-2019-12682,0,1,42f61dd2afa7372fbee6e415ee3177ed49aaf476ce65eadac84bcf8cce1d97b0,2024-11-26T16:09:02.407000
+CVE-2019-12683,0,1,481a1e7190742a53b5a68d8ee9813d6ae0f5252ea8d7d57d58166544a26ac6f0,2024-11-26T16:09:02.407000
+CVE-2019-12684,0,1,f27e5813cfbd7a244a06c36a5e1977a3c37c7a42a07407af79ffde9efa7e4934,2024-11-26T16:09:02.407000
+CVE-2019-12685,0,1,d1cce0741671d133f62fc481051d4393e4adc567f358b756634bec399d414109,2024-11-26T16:09:02.407000
+CVE-2019-12686,0,1,e87d63fc68bd4e28b7ddf9340a27d46cb143f69b686164b33de555058dfd4728,2024-11-26T16:09:02.407000
+CVE-2019-12687,0,1,13a13fb30dc0b1e67a67cd6652122f7eb91006e87a4ef950bdb0d29eb01c4b00,2024-11-26T16:09:02.407000
+CVE-2019-12688,0,1,f26896e9fb123a87e73f7558a94e3eb0faa79007ba012105b75103243c72a964,2024-11-26T16:09:02.407000
+CVE-2019-12689,0,1,503ebc94839bf6762dd6e2b5b4d8829b966bc828f619449edbbec2fb0f8841b8,2024-11-26T16:09:02.407000
CVE-2019-1269,0,0,132c148ad8c02399aa523e50c8c3720a0552f4612a95e82b6303918fc3c5f313,2024-11-21T04:36:22.457000
-CVE-2019-12690,0,0,50807be35bc3f277c1487ac1566c1edab015ee18296dcf2edc099745ec7da1c4,2024-11-26T16:09:02.407000
-CVE-2019-12691,0,0,8757384020c38e6a80aae6d174297d7316ad3226cd2d2d28413def078c184093,2024-11-26T16:09:02.407000
-CVE-2019-12693,0,0,65608cca5d402c13d54c93585a1c73c561be2f008c486b8dbd61b90f018ef9b4,2024-11-21T04:23:22.473000
-CVE-2019-12694,0,0,1a88ab4d98bcc98d693a5a61bbb3a3c6328f466e85e4470b8877623da250ca2b,2024-11-21T04:23:22.610000
-CVE-2019-12695,0,0,da7bb6957b2c792f6886574cc2d38fc133ab2ad2391b216eaa7735088f1f44da,2024-11-21T04:23:22.757000
-CVE-2019-12696,0,0,455e30f56068d378639dec5403c1957b46273c3005d9d7c2f3651ff778cb0be2,2024-11-21T04:23:22.890000
-CVE-2019-12697,0,0,cfd2d22ab5a1ff119d98d44c8cb223500fa146bd2266d02d72ad2b24ede1bb37,2024-11-21T04:23:23.040000
-CVE-2019-12698,0,0,ec3eb9b96661ef8008690200458262d0d879c0953c4ba3bb5e9e6128f4c003e8,2024-11-21T04:23:23.187000
-CVE-2019-12699,0,0,d84d5320877e3e082df44aec187c11b51fe73d6c3422ac18eb45a5cbad20bed1,2024-11-21T04:23:23.350000
+CVE-2019-12690,0,1,27fc8d07d1ec19ee9f4c0f7cee5ee395e11372ef87cd320077a792db3b5057a0,2024-11-26T16:09:02.407000
+CVE-2019-12691,0,1,d87f8dc2a23af8cdcfec30c3e8e4ddb815f7dfc3fec397918e03f9d75d754628,2024-11-26T16:09:02.407000
+CVE-2019-12693,0,1,87481a809fb6e3aae5a7ca98fe4417b7816ac5bd3aa7ca930a20a183f8d61583,2024-11-21T04:23:22.473000
+CVE-2019-12694,0,1,12cd3b347927ec480020cc21a5d5f7e77e76f7beb2b62fc4fa27c545deb9ca6e,2024-11-21T04:23:22.610000
+CVE-2019-12695,0,1,650265205374d1512ee2f4b71ab9661b6e0638ad121a10603fab0dfdccbce63c,2024-11-21T04:23:22.757000
+CVE-2019-12696,0,1,6abdb372bfc671e140b279a40cabd7163b97d96b802886f33291b76504060b4a,2024-11-21T04:23:22.890000
+CVE-2019-12697,0,1,81bd4360251ee4b0553379396cdb5280d30b2bbfafad62801393ad3c1e8e455a,2024-11-21T04:23:23.040000
+CVE-2019-12698,0,1,44c84f9cb3e1384c1dc22cf07086b27f86bdb4959c13ebdb182f616940550e62,2024-11-21T04:23:23.187000
+CVE-2019-12699,0,1,190c9622db59169620e3e9b8320aaf1362d019fa92a7ceadfb259371b4acff96,2024-11-21T04:23:23.350000
CVE-2019-1270,0,0,a02f53c5f68c10e401bb97548519c0ec94060df33e07599c5d2705d21ce2e3b8,2024-11-21T04:36:22.577000
-CVE-2019-12700,0,0,02ed00a2319902e5338f627ac5a5cddb515129bf21583bbdc50f01d2f534f03a,2024-11-26T16:09:02.407000
-CVE-2019-12701,0,0,bf8066cb7c7f58ee3476300091934c161fcd22e6c896d9474a76203028992248,2024-11-26T16:09:02.407000
-CVE-2019-12702,0,0,f958640a7b27f4c5e01bfc3ab287ac26d878ab42629219f086a509f5065d0c42,2024-11-21T04:23:23.773000
-CVE-2019-12703,0,0,c3483ebc8dc91c420207b7a6f5fb3064f4fa7c6afdd3593d1289f28db6f0a7f9,2024-11-21T04:23:23.900000
-CVE-2019-12704,0,0,1504804babe0eb2b5df71c803215e9ff6c86821b3fb62a2bf07578a01f76b0f3,2024-11-21T04:23:24.040000
-CVE-2019-12705,0,0,00780e60dfdb7eb7565ddf7ebf20fccfa119a6f7c7cb7269c46ec40b93dca5b2,2024-11-21T04:23:24.170000
-CVE-2019-12706,0,0,d41ddaa0f33388e43fa89c3a121339be740fce3c8c5428dae41f0b472cfedf6a,2024-11-21T04:23:24.300000
-CVE-2019-12707,0,0,aa61e0e9d78534ce24fe5fd13094b02cbd922aacff1f121b98639e9686232607,2024-11-21T04:23:24.437000
-CVE-2019-12708,0,0,7205f7bae94ef9fbe69ceacf0ec6d20757780dc7e8358cc98dae451402681a0d,2024-11-21T04:23:24.573000
-CVE-2019-12709,0,0,bd1d176eb2435af880d0b3010b2c896d6a72d80e779c14b2462e7d3dec5935d3,2024-11-21T04:23:24.713000
+CVE-2019-12700,0,1,0e5c8338595cb512e9a4a6ac1c23cfff22c2c068d935f3d063d0e4dabb9d7a0f,2024-11-26T16:09:02.407000
+CVE-2019-12701,0,1,0c289f0dcb142dc33e723aa80585af42a0548761ed29576644c201a9595bafed,2024-11-26T16:09:02.407000
+CVE-2019-12702,0,1,117226c853373d1d5e2b867513715fa435dafdc5078228ab601699c5abc61a70,2024-11-21T04:23:23.773000
+CVE-2019-12703,0,1,81f4286d9b79cd38e5ebd8f36e981d7b73d24255812a227568faeb6a437d63c5,2024-11-21T04:23:23.900000
+CVE-2019-12704,0,1,6610082b28e08c6b592c649cf02106f867f5ed5c1ef9db78db9972c017c7c262,2024-11-21T04:23:24.040000
+CVE-2019-12705,0,1,4d7357c668ad1e6c6ed24acd65d1b571ecf44e8908de0699e37b36254619ee91,2024-11-21T04:23:24.170000
+CVE-2019-12706,0,1,df70769f7bf3dd74576a83825c6b3df8ce5e7e8d5e08fb26849c34dd0c353bb4,2024-11-21T04:23:24.300000
+CVE-2019-12707,0,1,d4abb80c40df818528a202a543c0d23adabd73172f1c24f386ab9b5008322a39,2024-11-21T04:23:24.437000
+CVE-2019-12708,0,1,967b1119b164518b64789ec459be00fbed82883f31f706c0767db7997164c750,2024-11-21T04:23:24.573000
+CVE-2019-12709,0,1,c048be70e327617d7d9f40e0f10feb2515d2ad73dcb810add5abb81bac9c8cdc,2024-11-21T04:23:24.713000
CVE-2019-1271,0,0,801a73cb0b20f3da889d24a6647c31efa4faf4dcf3bab2aa6e51f95fc45f3cc7,2024-11-21T04:36:22.703000
-CVE-2019-12710,0,0,872b9c05003d5fae6db01339844a936a058f305f7953c44fc2b0a12419e91c84,2024-11-21T04:23:24.877000
-CVE-2019-12711,0,0,83c352e6f9a99f58fad2d491d914dc238f60f571ae4b973583223d802ace1504,2024-11-21T04:23:25.020000
-CVE-2019-12712,0,0,b5abc3e88d07dcdb46069cbaa4a8ed9b4527143f5204c2559923876eea402ff1,2024-11-21T04:23:25.137000
-CVE-2019-12713,0,0,864189e5183b253c09faabf2b54ab2b017a9efdce58d47683f7c761fc7bbe9d8,2024-11-21T04:23:25.253000
-CVE-2019-12714,0,0,9ab38c0ff6b87f3d698623b6ad59b946e1dc91b6e3fe98deee38b62572ecd9b6,2024-11-21T04:23:25.383000
-CVE-2019-12715,0,0,2fcfa3601fbc6836b938ac4329d9275bd304163680fc319f69f2c7315c6cfd4e,2024-11-21T04:23:25.507000
-CVE-2019-12716,0,0,6527693724a77fd555bc3e57283bf14f68c631dc62fb943e4648f544ef1f1f63,2024-11-21T04:23:25.627000
-CVE-2019-12717,0,0,c511cec3e87752a40ecfa9aebac86dbc918193442516e281afa38f94c7c3bdee,2024-11-21T04:23:25.750000
-CVE-2019-12718,0,0,350029633fba57c7e8772b91469b66004acb7c1ec74db58e2ad287db7484cde0,2024-11-21T04:23:25.923000
+CVE-2019-12710,0,1,a2a4ac897d8ce8a8906f477e6f592486e5f5c5af287ce2cd224396f9e64544f3,2024-11-21T04:23:24.877000
+CVE-2019-12711,0,1,6592388644dde03e28a194ba0b07887a7e074a62f295c60595e28f1e7f5f7579,2024-11-21T04:23:25.020000
+CVE-2019-12712,0,1,da42d93a6fbec893baa0964c2391731c653cdfa01be7278526b150a8321d2edd,2024-11-21T04:23:25.137000
+CVE-2019-12713,0,1,b40b9c3b75ac1a10a5acd02a9d026517f12563808b451a8c281e8196b11201bd,2024-11-21T04:23:25.253000
+CVE-2019-12714,0,1,fffbbb50672730d1e262727b018d2642a4e7d97ae14253d059eaa1a326171933,2024-11-21T04:23:25.383000
+CVE-2019-12715,0,1,30fd4fdb6598e80c9f1c06f96dd58e148dda36a3347d0d9aaa319ea9d871c3f8,2024-11-21T04:23:25.507000
+CVE-2019-12716,0,1,c60a2d167b682e777690ebc7a1f2635b23c972b42c42aaf02a51df288970983e,2024-11-21T04:23:25.627000
+CVE-2019-12717,0,1,3f41bdbb02109a96cbee0f92a5cc8f7daa6efa0ef1c94b5ab9cbff641c36ab61,2024-11-21T04:23:25.750000
+CVE-2019-12718,0,1,0afe5638efd3d574fa3dc19f4dad35471fe54dfbb0bfbbb8a25977113c96e4d6,2024-11-21T04:23:25.923000
CVE-2019-12719,0,0,df9a657435dea8e53813faaa74e8bc519f825135cee767fb1a329c49fc5d4d59,2024-11-21T04:23:26.153000
CVE-2019-1272,0,0,7c1c75f116162c69b1a3574b4c9ca49b0a54f2ba339e8f81fd55ae46f7406c06,2024-11-21T04:36:22.843000
CVE-2019-12720,0,0,286b3df44f626e2fdd5140581da3d7227767f37368cae052301f5df91fa413c7,2024-11-21T04:23:26.300000
@@ -133208,56 +133208,56 @@ CVE-2019-15237,0,0,ce3f3afd67d2424d17e181d30cc5a40fb8259dd58a64f28a87a854fdc9d33
CVE-2019-15238,0,0,541c5c534b5a515bde147fec13b7d58c997cc289467a670ba117fa40facc6505,2024-11-21T04:28:16.027000
CVE-2019-15239,0,0,4117bdf1016fcf3883bcde84e815a4260c2df9e2c2d0b726353da5db6b491c45,2024-11-21T04:28:16.163000
CVE-2019-1524,0,0,c0fbc250055ab1d2785b32a3258eaaabd9c4bf59910b21bcbae7d0789b750f67,2023-11-07T03:08:21.390000
-CVE-2019-15240,0,0,b770ab433c786605e4ba548a184f91541774a60d503de676328cfd45bb4c0b20,2024-11-21T04:28:16.327000
-CVE-2019-15241,0,0,6c8235f508db39385b83c873a3e9903fc84a037461252a99d6a30e17bf93bfd8,2024-11-21T04:28:16.467000
-CVE-2019-15242,0,0,ea119eb080a0ce8c8aba29c27433328d8e1f0bed3e95b74ffa6c9da1fd2b225a,2024-11-21T04:28:16.597000
-CVE-2019-15243,0,0,e4ca2b1895762a224475965470bfeed0fd2f9b2d79a69b85a00fdcfd67d48842,2024-11-21T04:28:16.730000
-CVE-2019-15244,0,0,cf0bc3f63a0d8bbd69fe0aea3224ff1de02960d704e4ed70e1f7296ae7a1ec8f,2024-11-21T04:28:16.850000
-CVE-2019-15245,0,0,8eb43cf0edfb17ec0ef9087a03275ae13b72797cc8372ab9d4c2add6f3a210ec,2024-11-21T04:28:16.980000
-CVE-2019-15246,0,0,625a5f2c18136d4c5173af02df2b62866f1893c99f1a0396855660df2a904434,2024-11-21T04:28:17.113000
-CVE-2019-15247,0,0,17e7e2fe5f13709ee145e3c61fbe6b4fc9318e5496b3deaed39d71756d3c7a49,2024-11-21T04:28:17.257000
-CVE-2019-15248,0,0,aac0b142db5abdfd8f916d0242dc6a108d7df41628120bf5d2187f9cbf447de5,2024-11-21T04:28:17.400000
-CVE-2019-15249,0,0,0b22894cd5f158dc03bec6fac8544484d044cc7dacb00bbcb673461a6156e19b,2024-11-21T04:28:17.537000
+CVE-2019-15240,0,1,1d21e53ee3a5935d4391818a316bc393a645c2498772a1fe57a2a27fee252cb7,2024-11-21T04:28:16.327000
+CVE-2019-15241,0,1,51fabe3458b572bc625bbd444b9ca7ddac3ef226b9e4b66441ca1ec930bfe616,2024-11-21T04:28:16.467000
+CVE-2019-15242,0,1,43d64e90a666f63aa7210c45530e8b2d63bdfb72c0f84f1a489444f845fe66dd,2024-11-21T04:28:16.597000
+CVE-2019-15243,0,1,854791844cb8853ff57a5b1a4883a12dd508bd5dc746fda030ccaa3c6bff8981,2024-11-21T04:28:16.730000
+CVE-2019-15244,0,1,e6608c361c73dfc6df3ff79a339e86c6f32626501d370ed7aab7f94d1428fac4,2024-11-21T04:28:16.850000
+CVE-2019-15245,0,1,14a0cffb26e4dd1d9718518b0ba849a399ada9ea0c5e64994851a83a78c6aeef,2024-11-21T04:28:16.980000
+CVE-2019-15246,0,1,3fe4e081475facb99bcedbcf43392040eb2d313950afe32764cbd932241f73f9,2024-11-21T04:28:17.113000
+CVE-2019-15247,0,1,a5549d9e368653285f8555510cd0d4f9eaff5bcf64bf6942f00cd8f72efc7a15,2024-11-21T04:28:17.257000
+CVE-2019-15248,0,1,29af66726b6a874175e0b7b2c8fdbd4b500541c6dd15f11178da3ce2846cc7de,2024-11-21T04:28:17.400000
+CVE-2019-15249,0,1,62e9a09d6869e052ee37059e20edf3445a7e8a08c0c2c9a33ac5286d11f52fad,2024-11-21T04:28:17.537000
CVE-2019-1525,0,0,c11eec7ec146de9fd592f1768b5afdf2c602021214e64a36eb497d32cf1e8732,2023-11-07T03:08:21.707000
-CVE-2019-15250,0,0,d83cd563d95b909bedf1ea422fcee999c7814fe295c9ffb0ce655b2f252082ba,2024-11-21T04:28:17.670000
-CVE-2019-15251,0,0,f34cedaac73ea3c778b0af8e19811935dae86e6999cf34cdeae94ca9c1bbcef6,2024-11-21T04:28:17.827000
-CVE-2019-15252,0,0,32579f947206c9098defd68847e1e7690c88524504bbe88329868d26c0ba7f43,2024-11-21T04:28:17.967000
-CVE-2019-15253,0,0,97dcc45273b4877ad96720a1b50b7e657ddd5e15551a38d96ab57d8be0fc8433,2024-11-21T04:28:18.113000
-CVE-2019-15255,0,0,b0bccc352be9fcd21b01863a5c6a5b1aadd6f84430e58bd0bd5c59d9924ef2f6,2024-11-21T04:28:18.257000
-CVE-2019-15256,0,0,8e19ac5d172a699874008fbc46169121c07ce9d1ef0fdf76b67f91d07fd9c3fc,2024-11-21T04:28:18.393000
-CVE-2019-15257,0,0,682b0bfd25178cd9e33de5f0128adc46f8163f07be4cf5c630f30bd3042b69ed,2024-11-21T04:28:18.550000
-CVE-2019-15258,0,0,468a699214ad3e78860acdf71ed38c63774fe839b1d90e898e7c3e335d719279,2024-11-21T04:28:18.680000
-CVE-2019-15259,0,0,f5f51fb18e3ee394112d846075905508658ef7bbd8b80b2cbdc1d7feed17eec5,2024-11-21T04:28:18.810000
+CVE-2019-15250,0,1,f8053df2f4bea35b711fbdd071b3aba2ae0a5bb3b5b7751615b309548b145651,2024-11-21T04:28:17.670000
+CVE-2019-15251,0,1,50549bbbda92ef9726206df45f347b2289c92f4fe57f4625c792298caa79568f,2024-11-21T04:28:17.827000
+CVE-2019-15252,0,1,d3a69be71b21afed1d9b7432268c41be808186ae3cbebe8b760c11ea10c7d15d,2024-11-21T04:28:17.967000
+CVE-2019-15253,0,1,f00179aca9bc652e19602abb18de3ae246b5c860ad416d29564f41b663b3dc73,2024-11-21T04:28:18.113000
+CVE-2019-15255,0,1,70dfeae37f7e5a83a92807d0ed0cfa1f1f15009c9fc09e02610b771bfa04a441,2024-11-21T04:28:18.257000
+CVE-2019-15256,0,1,c6ac43689f283e69b8a193147fea211e4f05dee32dc11a073f91120c453430ca,2024-11-21T04:28:18.393000
+CVE-2019-15257,0,1,00dcc893f800ed0d54f95ba2d13f99764d30f8d5cd1bd10324169c1e7aa4d6e0,2024-11-21T04:28:18.550000
+CVE-2019-15258,0,1,f4f66de55bc57ef08eef67065145d96489bc095569dbc44e015dc8e9946fd484,2024-11-21T04:28:18.680000
+CVE-2019-15259,0,1,cb5d36784b69b39cfe8629caa719219ddec75d267f05d6f756a73c69255e441c,2024-11-21T04:28:18.810000
CVE-2019-1526,0,0,a67bf1efdb135dce4fdd8cbb1fa6009ec7f5dfe699c17c73a0bdc2bd4dce711c,2023-11-07T03:08:22
-CVE-2019-15260,0,0,a64d3611d3527a9d8481afa88286a4149ac61c162d2df7bfccaf017bc29f8479,2024-11-21T04:28:18.930000
-CVE-2019-15261,0,0,26f927dea61ea1657b01e22cc4ef9c9309c3a25d5385171e813b50e71665cfaf,2024-11-21T04:28:19.067000
-CVE-2019-15262,0,0,58be14b71a61e72ed4fcd1ee9b83d7a9607934bbeaa6319a442d5d38e8fe3c78,2024-11-21T04:28:19.203000
-CVE-2019-15264,0,0,f9748a0fa10329a4d2a53f7b482fd6996c9c3ad7b7963e12a9e538ba69d5d138,2024-11-21T04:28:19.327000
-CVE-2019-15265,0,0,35689e16114ad4b927813ea75c04eddfe4a06885ff1c008d03c13b297b98af95,2024-11-21T04:28:19.460000
-CVE-2019-15266,0,0,692c064ca005a9463d05b9c3ca921b030803839af0f793b9e4e88a50ff29b550,2024-11-21T04:28:19.597000
-CVE-2019-15268,0,0,2a1233477ca9c0088a1c4c3b81a13689151d11be135c2ae6feebf30355972efc,2024-11-21T04:28:19.720000
-CVE-2019-15269,0,0,411deac8d18d8f31699acc99da8284b3e2ed2eca1e397504e9e0221c98d15f94,2024-11-21T04:28:19.893000
+CVE-2019-15260,0,1,d9fe15716b4d28af89db5ff66ef7637d4ea3d5c9c121f5e6cab083bd454da039,2024-11-21T04:28:18.930000
+CVE-2019-15261,0,1,8a0b9cb6650d367e5b6f8d2c270fe9d65cf75f3b5d7659acdf2d5d964d7a49b0,2024-11-21T04:28:19.067000
+CVE-2019-15262,0,1,4b894ad64b095565f1fc68e7ad3babde5efac8788ada8d398d29ad91b460d2ae,2024-11-21T04:28:19.203000
+CVE-2019-15264,0,1,003d7cdcaa2c828b8cd45755e938494f82abea4e2908ec24c7c212867601888a,2024-11-21T04:28:19.327000
+CVE-2019-15265,0,1,e7bc901d6f494016c55dd7d98c88aa4b489ccd5019f8b572d47b770062757eab,2024-11-21T04:28:19.460000
+CVE-2019-15266,0,1,549c6e2229fa54897181889c2ef0fcdade86431a780334b1ab966665056a324b,2024-11-21T04:28:19.597000
+CVE-2019-15268,0,1,d2ff45fa84caade01586621c57b63b3090ef8caab2453f860ebe6d4841809c63,2024-11-21T04:28:19.720000
+CVE-2019-15269,0,1,fb56ffc8627365f22b1f42864df305988829a3358c279d0acbda26dc0b5612b9,2024-11-21T04:28:19.893000
CVE-2019-1527,0,0,fdaee23fee4dc5e1b236a06f25f74afaefe5b16e114e3ac28443ace8bb778053,2023-11-07T03:08:22.330000
-CVE-2019-15270,0,0,399f810db73962a3bc022af73e543958f5546a59f61dabc4be163483058414f5,2024-11-21T04:28:20.103000
-CVE-2019-15271,0,0,98ccd3a5434ef738a3d56303d021ad0847e25fe917ef971298c589ad2d1c5410,2024-11-21T04:28:20.240000
-CVE-2019-15272,0,0,458c15992aa01f66080f96f23a7cd60dccc4d5a27fa752909cd12344a861d648,2024-11-21T04:28:21.120000
-CVE-2019-15273,0,0,d3ab20eb9cb3f3c8f4993c0860a1d43622a8b900010118242844b4a65080c5b8,2024-11-21T04:28:21.247000
-CVE-2019-15274,0,0,b4ad92a1bc6309786b9a371004bee12deff5a455e7c8a0310d508f3e0acae8a9,2024-11-21T04:28:21.370000
-CVE-2019-15275,0,0,41015410ddf3e99efb8bea2ef1a356de718bb840ea85e57b14d25e4130f16f0d,2024-11-21T04:28:21.500000
-CVE-2019-15276,0,0,7ecfb5b74f2c573e8b807c76abdc515c3012b4145f5fc74a4bc065364156f1cc,2024-11-21T04:28:21.630000
-CVE-2019-15277,0,0,6fc5e767c932c107d5086ac05af3b10515a287575527908a7ad6d67449dab4f4,2024-11-21T04:28:21.760000
-CVE-2019-15278,0,0,18a0cbba1df68a26e33498a7417da614b0f86bf4ce539c5a7fa93f0d6004d80b,2024-11-21T04:28:21.890000
+CVE-2019-15270,0,1,e2b3737ffa5137926147fac683f5c456dec815e83b6e2031fb4d40b5a5b5ce42,2024-11-21T04:28:20.103000
+CVE-2019-15271,0,1,1181768f0077c842888f0982b2db3bfb8842926d194bc9e1051c2e4e01bda231,2024-11-21T04:28:20.240000
+CVE-2019-15272,0,1,7cf3e457bd974bfff86038c8fa762828499a812bd186f06bcf8187c4085e3c48,2024-11-21T04:28:21.120000
+CVE-2019-15273,0,1,379186bff76bc501e54c67182677224c3c9c58ae343eb97b4ce8081620c32b1e,2024-11-21T04:28:21.247000
+CVE-2019-15274,0,1,eb8deb157943704cd3b3c3d2f1418efe46d9638fddaec0a75aa8bfb7d2fd9259,2024-11-21T04:28:21.370000
+CVE-2019-15275,0,1,299e0e5ba4520ba5a8c85154dd3bf5ff75710d7a76a96f12e87c1939db719b1d,2024-11-21T04:28:21.500000
+CVE-2019-15276,0,1,798df2836961d036248f1ea72943790543aafc1b1a499d861c58533efd10aaf7,2024-11-21T04:28:21.630000
+CVE-2019-15277,0,1,e49340f868703c7dbf566df11a2d76d1f049c7cfcc56597ca6184a1d170b421d,2024-11-21T04:28:21.760000
+CVE-2019-15278,0,1,c9a3ca2f794f938e9b1f001a145449a19b1745ee2c539f284fcee3e1297cee30,2024-11-21T04:28:21.890000
CVE-2019-1528,0,0,40bb70f9256782ec8f5b120307314db81d01759e660d267bb11c8f4de494249c,2023-11-07T03:08:22.650000
-CVE-2019-15280,0,0,b0999bc6d0bbddc913b8f0a6b4b588160255bad2e91b2549902da70ec1b804aa,2024-11-26T16:09:02.407000
-CVE-2019-15281,0,0,caa7ad99d2f206ad40c0ba3efb9e918db4668df479a1c10dc45c7dc8f6023a95,2024-11-21T04:28:22.150000
-CVE-2019-15282,0,0,67d4b62098db3cd1a1a8f494dc0a1c2a88e11fdcd7ccd8e4e89a5ff83978dd1c,2024-11-21T04:28:22.273000
-CVE-2019-15283,0,0,c97d2dfbca470ca004d172369bfff4e35337e623b7eb4630987c59615252af46,2024-11-21T04:28:22.403000
-CVE-2019-15284,0,0,fc6c2a63e94204c4cea0ac9d2b3c6e1601446b313f642099ed4d0a5375d88c78,2024-11-21T04:28:22.547000
-CVE-2019-15285,0,0,8e60e9ce98055a56af1bee0887fe2107e2e3fa8e158c6c7496dcaf000b8d50ce,2024-11-21T04:28:22.700000
-CVE-2019-15286,0,0,a9eea8459514951e1480ee6a8cf6cc87bc81acbe3a0644b6a9b12875d6021056,2024-11-21T04:28:22.830000
-CVE-2019-15287,0,0,e0ef2049e86d7be11c32535c55c9a8b609982acccafd5adeb0529844f7712d85,2024-11-21T04:28:22.967000
-CVE-2019-15288,0,0,fc6bca46e08765208807c611340de6bde1a4b502e17217dc5165a28e251e66c4,2024-11-21T04:28:23.090000
-CVE-2019-15289,0,0,3c7bc9ff47d57a10b7bfdb4dc9dc53c8945158498f51559462d7438e06fec2ca,2024-11-21T04:28:23.220000
+CVE-2019-15280,0,1,47eb36216b77c6a977346f54fa2bc54572dae38a42212a7f66fe9e91be28f44e,2024-11-26T16:09:02.407000
+CVE-2019-15281,0,1,6d00ba113c81c0145fa5b7aa84f13d5ebe03d4a924533ca572b802052399427f,2024-11-21T04:28:22.150000
+CVE-2019-15282,0,1,178c9f3a69ed4ecef31a259194e687502192f5357152ce92f329a41c9d39ca7a,2024-11-21T04:28:22.273000
+CVE-2019-15283,0,1,16bb43de1e2abb0d20a89c3b66e700659f9cc584932868ddb05c027d88205bb2,2024-11-21T04:28:22.403000
+CVE-2019-15284,0,1,2a3ad387ffb97f61989ec654e68a7fbd7b799306d2681808f49e9e3d3d213f06,2024-11-21T04:28:22.547000
+CVE-2019-15285,0,1,6873de5caeb7915b0553441d527d3097e1dadd43446c64386681415d61fa751a,2024-11-21T04:28:22.700000
+CVE-2019-15286,0,1,c39340799abde46e106b9b2f5a156fc37494f86f3d7ebfaee7f49a15e04613d8,2024-11-21T04:28:22.830000
+CVE-2019-15287,0,1,e81d033a9aba75049990bc5cae00677c24c832bb99725758a8ad129108c9fd2d,2024-11-21T04:28:22.967000
+CVE-2019-15288,0,1,545e2038127d0b6922fce8aea437aca15efbe5e4b49b649300cdb766eec979fb,2024-11-21T04:28:23.090000
+CVE-2019-15289,0,1,b06d29080ca33f87a7cab229c2fc304ed6a9091944dbcbf308bbb24ac5b89a60,2024-11-21T04:28:23.220000
CVE-2019-1529,0,0,c260b6cfcd40ee5a13a762a858203447d6c989c6b1fdf5db703f89213106ff79,2023-11-07T03:08:22.980000
CVE-2019-15290,0,0,7cbcd7f39e8fc9c073a9ea701af915d2639cfd2305a69d838801607063bf7bc0,2023-11-07T03:05:27.800000
CVE-2019-15291,0,0,ac8b32e10f9055d5858591e66922411360cd5aa7924bf3ccac86ee84e51c9986,2024-11-21T04:28:23.367000
@@ -133832,14 +133832,14 @@ CVE-2019-15846,0,0,abf2a34bdf65c79a8d7be013ff1ecdb074d1f3058f9ac4c0fe9f46ab99f0d
CVE-2019-15847,0,0,aa5d42b7c9f39217857724f818c3e0be0292690fa43718a88b6c6571f7872058,2024-11-21T04:29:36.210000
CVE-2019-15848,0,0,b3ceb1e20c7e79aeda5d106318677992e353ea4a934773d1ba7b89cdcd0224f3,2024-11-21T04:29:36.360000
CVE-2019-15849,0,0,924eedd338f816a8ef7cf7f37065cd649be94196c8aa0a2fa2449ade41997dc0,2024-11-21T04:29:36.500000
-CVE-2019-1585,0,0,c5a8f7c69a1dca6d0c60e58ca33d92865164577bd48b3ddfad2eda98d4dc5776,2024-11-21T04:36:51.620000
+CVE-2019-1585,0,1,a63095058f16c5bab0fe080f8b021b09e3a56804f6db690bd29a6e61e8c177c9,2024-11-21T04:36:51.620000
CVE-2019-15850,0,0,c52fc01bef9c58e6d5a929a3a68573fb25c26f5cfb3a2b25dc22f169dabf25af,2024-11-21T04:29:36.637000
CVE-2019-15851,0,0,a08e22ba2c34478677914ca485d8417d58e966260e5d64434e2b500e2b9c3fb9,2023-11-07T03:05:33.300000
CVE-2019-15854,0,0,b3fd389c43557f8f2120e077fc7f7bf52362f36efc0f21009c05722bd338fbdc,2024-11-21T04:29:36.790000
CVE-2019-15855,0,0,5297d9c6e37b823661cd620454e8bd3502f89f4bce36ed314cdd6f2a677bc9de,2024-11-21T04:29:36.930000
CVE-2019-15858,0,0,2c47184c332149218cbbff000e4cdec6202cc09e7052eedb9dca5cf780503e94,2024-11-21T04:29:37.070000
CVE-2019-15859,0,0,1ae0aad6d79d793a2a20a82284954a603f784bd581fa21861811e990e89afca3,2024-11-21T04:29:37.230000
-CVE-2019-1586,0,0,187b9af145b40310ada2cc5a2c41798845014416ee8fff7ef25d02ae7df4fbcc,2024-11-21T04:36:51.763000
+CVE-2019-1586,0,1,18994cd14a00b26e6777639c877ae332454111359ebbcbb445dd679f0a84d13f,2024-11-21T04:36:51.763000
CVE-2019-15860,0,0,2f3fe2c9fa16efb947cc6f92578411eb0447600ff26c60263efa0cc215c9acbf,2024-11-21T04:29:37.390000
CVE-2019-15862,0,0,d63e6ad4cfd77c3fcc8f39fb588622270f430fec9dd621d222e27d7cde82d738,2024-11-21T04:29:37.537000
CVE-2019-15863,0,0,aeee1305b6e3d521ed0f2709529ee8e634d80e210a22c3ea28e05485855987fd,2024-11-21T04:29:37.680000
@@ -133849,7 +133849,7 @@ CVE-2019-15866,0,0,6df7e2b5771a075bc0a1fcde0bb66b5bf22632b2916dffb489ce8abf47fff
CVE-2019-15867,0,0,e2f893b6c12bb5c6f52df86e8c5d3e121a9761bae0c1a9e40415749f409b7926,2024-11-21T04:29:38.287000
CVE-2019-15868,0,0,b4985bacf8258d5959dfe891c4078646851866fa53afe4859091247ebb3a5790,2024-11-21T04:29:38.430000
CVE-2019-15869,0,0,cb6c15040cd062f924782cbc26185f69b4a71b5bb10dce6b6076f4aac89cc278,2024-11-21T04:29:38.573000
-CVE-2019-1587,0,0,fefbc00b1137a18c4f57678b4d05a225cbf883da6401bc1d2b394d55b557d9a7,2024-11-21T04:36:51.910000
+CVE-2019-1587,0,1,0bbebc5cc86721970e8ed7983514880cd235caf37346d19e7941d110eaf0e0fa,2024-11-21T04:36:51.910000
CVE-2019-15870,0,0,bd16a4d7d36913a24ffd14155f27f21e22879218444bdc8f84ac5105df3115ea,2024-11-21T04:29:38.710000
CVE-2019-15871,0,0,aa321dd91356707b1798ed1ba23d2660b1b764556be5079d38329ec76305fcb5,2024-11-21T04:29:38.847000
CVE-2019-15872,0,0,4b7aa7edad56fbec07628d36cce9e8923723f8502aeac2bbd99d6666039f9ded,2024-11-21T04:29:38.993000
@@ -133860,7 +133860,7 @@ CVE-2019-15876,0,0,b6663e200a5d42afa42e7fb93eef6661316ed3a40e5f19010cd2c30a094c2
CVE-2019-15877,0,0,501fb65bb2d8b0605c49176184cbc513cd00256066325e5d17309f5cd38e22ce,2024-11-21T04:29:39.653000
CVE-2019-15878,0,0,43cca3fcd63e4a3b5bab1a6ec226796b6f4506d2379aa89b5d454f54ae3fc46a,2024-11-21T04:29:39.763000
CVE-2019-15879,0,0,2c3a737b0f24918700b90ba376247d74c87524549ca4cc993f4d97920e82c00b,2024-11-21T04:29:39.883000
-CVE-2019-1588,0,0,5c60e1b901bc23d51ead91422d8c56b2423f75917d50565ea2420be8a8987b9a,2024-11-21T04:36:52.040000
+CVE-2019-1588,0,1,932261b7f244dfcc4005178b157ab2537dab521742c0f4bc0858d92b541e0548,2024-11-21T04:36:52.040000
CVE-2019-15880,0,0,f47c9904fe5cb3dd9367680d098c6024a9637e3a9d9a3972226fa11490f50560,2024-11-21T04:29:40
CVE-2019-15881,0,0,70cef2d18c26ba3279120a0b359a56360e73fee923daba87deb45ebd07d21945,2023-11-07T03:05:33.497000
CVE-2019-15882,0,0,e4294238142a269d5018e9e351841af6cb374e24359de2d94ca0116c77c37092,2023-11-07T03:05:33.740000
@@ -133871,7 +133871,7 @@ CVE-2019-15886,0,0,7cef68e88604253a22cb39a1e7b0ee2d3e48d6e4b78b790b78a7a06751e4c
CVE-2019-15887,0,0,d545c983c16fd34270c9dc0ba0a26878e31029442b21affba6625f9383d170e4,2023-11-07T03:05:34.933000
CVE-2019-15888,0,0,df3b493524659db4d6a5c395e6767c3d786bd654d60bf16b6f913b5f58625316,2023-11-07T03:05:35.287000
CVE-2019-15889,0,0,aa5c62e8f6498e7cfb8db1e89d78a749d1265e8ed9ef7891290fb3cc6bf24879,2024-11-21T04:29:40.230000
-CVE-2019-1589,0,0,1ddf0df16726827101844e47b4bebbe392fadba8bc867dc5eb267ba285a84a6e,2024-11-21T04:36:52.180000
+CVE-2019-1589,0,1,fb94ac973777d4e9efbc811e261269988682320cbd45b78e2443acf65f9f3549,2024-11-21T04:36:52.180000
CVE-2019-15890,0,0,2558e745afc1fcfb40aa4399a4aed9f9ca3d2444e705f466821d91af124c4a1c,2024-11-21T04:29:40.387000
CVE-2019-15891,0,0,c9ae4e9a0f83d402ba830df5356c5ae1b012ef103bacfb0bcb1666fee00ce0a1,2024-11-21T04:29:40.543000
CVE-2019-15892,0,0,c2a4a4b737bd07cfac01354f5bc797af06c9df785c96f4dee24f1c3ab357669e,2024-11-21T04:29:40.687000
@@ -133881,12 +133881,12 @@ CVE-2019-15895,0,0,8bfd12dccf94067aa9fb35b77af39fdd1687b22817cb3faba87161015d53e
CVE-2019-15896,0,0,6c7ac9c97e291c1ec890a095ea6ac8dd731bc6b66e974466cce51654e10b9b9e,2024-11-21T04:29:41.300000
CVE-2019-15897,0,0,4e161f488726c4d9ad75d93e7c4d630e574efc0eeadab51ac83c550025609db0,2024-11-21T04:29:41.453000
CVE-2019-15898,0,0,1b4b1942018bd0f59c9b9f1427d9c5c91fb57879905c9325e90b51252747db3e,2024-11-21T04:29:41.597000
-CVE-2019-1590,0,0,c336e7f1f3ecb1302846aa2bd8da1d2092638501eb8e0a6dcfbd85ece413db40,2024-11-21T04:36:52.313000
+CVE-2019-1590,0,1,e5ef08dfe256f1d4b56f211aa7278a615e0aff0257659c18e9dd7c125bff254a,2024-11-21T04:36:52.313000
CVE-2019-15900,0,0,28356581340190d335818ea9aaacab5b024b1db7b4579239a0a8afcd2758d6de,2024-11-21T04:29:41.740000
CVE-2019-15901,0,0,fa808257d1407c92e54da41a0f4d7b997c2690e6b79f0881a2ed8ed65bab77bc,2024-11-21T04:29:41.890000
CVE-2019-15902,0,0,8e0912d4e82929887314d7f4e401ae78cbb6e2a034868f50b4c5e72f76a45a62,2024-11-21T04:29:42.037000
CVE-2019-15903,0,0,6440d0037c45fd96aec7833c6aa3c1db16f798b9113d20dfc47f1fe4cddc738e,2024-11-21T04:29:42.210000
-CVE-2019-1591,0,0,0cd61fc3efc040940813445a5eeefd97a6925ba13866fd7fb3e2a299094dbdb8,2024-11-21T04:36:52.440000
+CVE-2019-1591,0,1,6841a696121c7fca23c2750cb2cc539d4591c5ecdfa0c0d0392d22a3c4517e4c,2024-11-21T04:36:52.440000
CVE-2019-15910,0,0,c5010f4980b5fa72339dcdbd44f85f685a5a925759c98bea1af92e41bff6419e,2024-11-21T04:29:42.510000
CVE-2019-15911,0,0,66afa84aa45dded96f556481c4474402b79629fa0bf5d3b13f0432cf833f8ce1,2024-11-21T04:29:42.660000
CVE-2019-15912,0,0,1a834d9a09b62012757030d23a4526fb7d970bd4a620b26b666cd557e191dd58,2024-11-21T04:29:42.807000
@@ -133897,7 +133897,7 @@ CVE-2019-15916,0,0,7348be915a70f59dc99f21229ecb7b5276572db3dad5460966df0ce222608
CVE-2019-15917,0,0,356744d1b268a3da9caddfc9e03ec74f882ecce2bfad674128cbfb596bef9ced,2024-11-21T04:29:43.560000
CVE-2019-15918,0,0,9ba047cdb454c0bc6b22078ce9a915140ef301870f7e5b7c9812be4addeac18c,2024-11-21T04:29:43.727000
CVE-2019-15919,0,0,ace20a0cc9155082047c65487bc27305ce1b3e3aeec4991781af5dabb75ea6db,2024-11-21T04:29:43.880000
-CVE-2019-1592,0,0,d9594b864b1e6c545754d3f7a983e04ff6f4997504016082888560212f771ca2,2024-11-21T04:36:52.580000
+CVE-2019-1592,0,1,c138c8e18209be5da617bae4dba7414205194a02b4c1b7b1cf0dd24873c9362f,2024-11-21T04:36:52.580000
CVE-2019-15920,0,0,95821c0c1fe53e69baf9f2f0078e7feccecec948b10809569263fd391ae3a4eb,2024-11-21T04:29:44.033000
CVE-2019-15921,0,0,08b64f75bbe7a611f338a7a8ae8d0208435d4b5bcc2c15f6668baf6ef327814c,2024-11-21T04:29:44.180000
CVE-2019-15922,0,0,dbca9df3f86ca38d6b366854aa4666f7400beaf263d0438b8b29c12b5e05fe9c,2024-11-21T04:29:44.330000
@@ -133907,7 +133907,7 @@ CVE-2019-15925,0,0,c49535802ef60b942710406f242136831e13f044f1ee6bd4af3221ea8eeec
CVE-2019-15926,0,0,c57bf1fb982cf80dafe2d23b36f66cd91c1919aa8d56aa9053bdae52771e9720,2024-11-21T04:29:44.930000
CVE-2019-15927,0,0,88ccff832342ffd4408c3e6f85675be5d342af79c7ef77158cbc5f1d3925d5c4,2024-11-21T04:29:45.100000
CVE-2019-15929,0,0,00bdf701f73759ee40e987fda33c2c325ce902ede8a81fb652a3db1a839af374,2024-11-21T04:29:45.250000
-CVE-2019-1593,0,0,fa7c8e6524802b765ed85c833783ab2d51f2c8e6d997da42a340fe4d8ec4cb39,2024-11-21T04:36:52.720000
+CVE-2019-1593,0,1,cf181cd16bf310890bb4fd82dfb9a966a6eb61d63b3b10826e527c185b97096a,2024-11-21T04:36:52.720000
CVE-2019-15930,0,0,c90425252bb0dfb5b54b77629165196d9697fef4bf3223dc9d76399f0cf1ab95,2024-11-21T04:29:45.400000
CVE-2019-15931,0,0,7a42b7b30f9d4b58d8d5bafb634b1ea32b61b38761e89e265881a4af5423bf90,2024-11-21T04:29:45.547000
CVE-2019-15932,0,0,bd35f1e576f966432ed5295bd0b1a3dfc6ae5f0737653100c33b30a688f496dd,2024-11-21T04:29:45.690000
@@ -133918,7 +133918,7 @@ CVE-2019-15936,0,0,1060501b26998af12907e492cc259cdb590e9441c14b2eb0a7496078b1be9
CVE-2019-15937,0,0,8b3b14db3201f447825369eacbb9142eeff55cecc7c601431701d5ac4a23ce2b,2024-11-21T04:29:46.413000
CVE-2019-15938,0,0,8082d7d8bc1f2f39691805d6ccf7f91e02c1a4afbb749ba56e88c31ac97ac56f,2024-11-21T04:29:46.553000
CVE-2019-15939,0,0,39e566df3f851adc4db8c1246add333e69c360ef78a459a8371f21498541f539,2024-11-21T04:29:46.693000
-CVE-2019-1594,0,0,46d9a7d4639ed47a0b47b3400e4941906a87094446da3aff36d2d49fd5eb334b,2024-11-21T04:36:52.873000
+CVE-2019-1594,0,1,904f75be202f63b38cf4efa0b2a5c79a7c1a914fcba96896b81604a461aa770c,2024-11-21T04:36:52.873000
CVE-2019-15940,0,0,c071707d4b3af973ad4ffc5472fa9725371ecaa9399e1ae2a997ff76cf329595,2024-11-21T04:29:46.843000
CVE-2019-15941,0,0,57059139c223c84e7ebb0c42298eeafc816db3d458ec3c96950f20ee0cf42856,2024-11-21T04:29:46.990000
CVE-2019-15942,0,0,0f8bee27dcaba3fc52e58a5f2da4fe80998164578b25ae339183205491e82d35,2024-11-21T04:29:47.143000
@@ -133929,93 +133929,93 @@ CVE-2019-15946,0,0,5a7d83f8665502ce0831bf67797c94c5d4090dfd33f97087c0e89dbbe6c4f
CVE-2019-15947,0,0,0af8d327d16a5d79613ddc9e3ec9b1ba1968fa0a3ef1f7159b0ba45fea374f3c,2024-11-21T04:29:47.923000
CVE-2019-15948,0,0,f584935d7812d2d0b85a5698b7c7daec96f60298baa5fc482aedf43e9eabcd8f,2024-11-21T04:29:48.073000
CVE-2019-15949,0,0,1b734176ef993a4e76aa4d2a119223f3b32c6711c677f47a209913e0bbddcb31,2024-11-21T04:29:48.227000
-CVE-2019-1595,0,0,ef95f31887c756e4ae4d642be2e9b2c6e8776e7d69216bbe339d2c4afb71a9c0,2024-11-21T04:36:53.020000
+CVE-2019-1595,0,1,88ccd21b327ff58a8ee4b0ed2c599bb7ffd0b9cdf189f7abdcf010b611bbf4aa,2024-11-21T04:36:53.020000
CVE-2019-15950,0,0,2517d3ef69503853d6312e43202c28f44abfec972870fb968db5c09e40e667af,2024-11-21T04:29:48.370000
CVE-2019-15952,0,0,28b03c0ce9770ebcb4825ab2fb26e2b2fe76a5b9be6086826eae6fbae26fc9c4,2024-11-21T04:29:48.513000
CVE-2019-15953,0,0,9e29293918c476d0969034531592c362c3f902084f7cb5c645f3c8f06ab97c77,2024-11-21T04:29:48.650000
CVE-2019-15954,0,0,4e804a184eafae4a0537ff38b852c957840c696fc5994837dd65a420523f0b8d,2024-11-21T04:29:48.790000
CVE-2019-15955,0,0,700672705bb0a70b92d3e078601aed08d4825d869d3cc40f2c801cb55f7ad461,2024-11-21T04:29:48.933000
-CVE-2019-15956,0,0,c505688dc74b5a1f3b53267af6f267c4ce3b19dd0772f3a4b4bb174da7cc0096,2024-11-21T04:29:49.077000
-CVE-2019-15957,0,0,cdd424ce0aa30127e4e85fb0d98ef05844fffc4b4a981dbf4f2f589cfd1715e0,2024-11-21T04:29:49.210000
-CVE-2019-15958,0,0,dff3b7204cd4fb0323d48157c50588a2a95ace85ec14afa00b36d3f058ef32f5,2024-11-21T04:29:49.350000
-CVE-2019-15959,0,0,27c9d25f418bbb2a33a50492564da3a24310d07db6573ac367614adc601ef709,2024-11-21T04:29:49.480000
-CVE-2019-1596,0,0,850a7e9f1e99580e9fcef649296f7be083e54ef506503d81d19f1865074c783f,2024-11-21T04:36:53.150000
-CVE-2019-15960,0,0,c10177e9a24f4a66d5d6823850179839b3bc994e152f71588af5be79f392bbcb,2024-11-21T04:29:49.620000
-CVE-2019-15961,0,0,3c376aa9978ed33e0485ca8f82e347d2215807fa736398bed1532529969d935b,2024-11-21T04:29:49.740000
-CVE-2019-15962,0,0,40174ddfe160451dfe2ea7293697822b0bca8c306b1f1ac86b0217ebb5eaa37e,2024-11-21T04:29:49.890000
-CVE-2019-15963,0,0,0047b7b3594d423708b69819d4fa3cd647310d7c1542930791552c4df2c0bc70,2024-11-21T04:29:50.013000
-CVE-2019-15966,0,0,3f8ae95dbd3a1d70d88413f9790b60577101b810b9a1b6c60531f599192bf1fc,2024-11-21T04:29:50.143000
-CVE-2019-15967,0,0,aaa0af53fda296490844d8a29e9e2205af192d2c332a1531f38fe7341c16c2b4,2024-11-21T04:29:50.267000
-CVE-2019-15968,0,0,06202920c88145df8053de0703e2947dc38db111d4753e198dde3b9cf8025ec1,2024-11-21T04:29:50.433000
-CVE-2019-15969,0,0,a83353c2953f58c4aa96a8092c6abb6f375662316592a101ea48c390eb69f140,2024-11-21T04:29:50.560000
-CVE-2019-1597,0,0,9dc57669ae775a53e558b4b02f7fed70eb0010b26eed843c06e2ba0c13e75664,2024-11-21T04:36:53.300000
-CVE-2019-15971,0,0,279e018b77c64821571b7cdc117b651f460f7c26829d7af50d251e7752ca78b6,2024-11-21T04:29:50.683000
-CVE-2019-15972,0,0,3142938d166a1084e4bc7e30eff255d62aae2a4ce2d6d6e7e4c2221d6e2262d4,2024-11-21T04:29:50.810000
-CVE-2019-15973,0,0,07bfe5df643f9ea0fa28c0919a77aca9e8260b5bd32b7a0c3ed606d163b77a65,2024-11-21T04:29:50.933000
-CVE-2019-15974,0,0,f3742ef2daa2c7a3f2885d63b62972b012eb93caf17a77e5811fed8c9f0b96ba,2024-11-21T04:29:51.053000
-CVE-2019-15975,0,0,ba6519005aa97515df505e7f61fc0620a8d5ee20eb494169d9703a4f71e02b49,2024-11-21T04:29:51.183000
-CVE-2019-15976,0,0,7a4b060afa2987046cc67edfb13c49d93225c6238fa974d30d5ad68f4e09e324,2024-11-21T04:29:51.320000
-CVE-2019-15977,0,0,b2c609bf3fd66a280a0710c537f36dfe3e8de5beb6eb132273b6ec7057c6341e,2024-11-21T04:29:51.440000
-CVE-2019-15978,0,0,05d7102988ca97b1cae7babff638a5a3afb092eff3dd8e0a6133c5d6d470f9cc,2024-11-21T04:29:51.560000
-CVE-2019-15979,0,0,3c0950f108fb81fa774f511d5d9e17cc00cc094a444eaf098367c27d783995a8,2024-11-21T04:29:51.683000
-CVE-2019-1598,0,0,1187f7bbb4457c094abe09ead7f2c41a164d408f8143e22446d2dab36ae596f5,2024-11-21T04:36:53.470000
-CVE-2019-15980,0,0,0cfdec72980fa59e341d3f14ed0a9da715f2846f567a1754a32e4ba61aa497cb,2024-11-21T04:29:51.803000
-CVE-2019-15981,0,0,6836d92ec2e0c0973d0555904c7124b494782fdb94c3c5e6e09322fd60a1cd38,2024-11-21T04:29:51.917000
-CVE-2019-15982,0,0,ab606b012d402f6245d8d8bcdd0556fe4f36a7d9a10e9367c1e0f7ddc8513784,2024-11-21T04:29:52.033000
-CVE-2019-15983,0,0,192f599cd85973adba164d7fff8e5d4658e0fc816065a00598d076c920cdc914,2024-11-21T04:29:52.150000
-CVE-2019-15984,0,0,bf4d43fbbc83e8f98baa9772e1426c6e4a7054a4eaa8c045bdd6027f28736b83,2024-11-21T04:29:52.267000
-CVE-2019-15985,0,0,55ae676e7fca07768ab2f96a99b006544f0c49e643af291f9ad78493a4768816,2024-11-21T04:29:52.390000
-CVE-2019-15986,0,0,c3675a8279cf5458ef611438acee5718c73ad383749f898e0af222b610dc0d51,2024-11-21T04:29:52.503000
-CVE-2019-15987,0,0,e6ab5fcb932baa5e17a12a2b82f3c88ebd86aa6443a4a7eb250629d48a8d68d4,2024-11-21T04:29:52.630000
-CVE-2019-15988,0,0,ec9910842ced85238a1055089ff839f441077e2a8c7ac0b645df4168fba1a96c,2024-11-21T04:29:52.810000
-CVE-2019-15989,0,0,985103460b9e353e1dfb5d402d31797526c4171a6e859755c16b3a4a966eaa36,2024-11-21T04:29:52.940000
-CVE-2019-1599,0,0,a65e257e374d1ea279a6fcbe95b9fafb648bbcc45a62b56137807352651a902d,2024-11-21T04:36:53.637000
-CVE-2019-15990,0,0,92bcd7fb3c9df51280940f876fdf4907f8592f8cd7e2861a0954b1de54af249f,2024-11-21T04:29:53.083000
-CVE-2019-15992,0,0,0ebb6f3ac82680be606dbdf16694ec0d677fa9597e2ae49e6bb7222747157b1b,2024-11-26T16:09:02.407000
-CVE-2019-15993,0,0,6c3bdfd5a9b2f1c17d42d7e339c8ef0be1b48690110afeeff029311b9846a609,2024-11-21T04:29:53.367000
-CVE-2019-15994,0,0,220d5f6e887621c069d018daa87f44469d25a799b36feac8330c5905d7f5c78b,2024-11-21T04:29:53.603000
-CVE-2019-15995,0,0,dc29474956b9ed559ac7335462f85c9a387036177701ea36a84834d14fbe8caa,2024-11-21T04:29:53.730000
-CVE-2019-15996,0,0,72f7ed6e8d33d61cbb96b40805a5c87d53308ea18fc51b82d972917a81667307,2024-11-21T04:29:53.853000
-CVE-2019-15997,0,0,d78f112f0c76ccbeeb801b4e262d2f450ce258e9b3a0da66de1956b751e1fe57,2024-11-21T04:29:53.977000
-CVE-2019-15998,0,0,f42dbaa1404bca0fc9fa82a7cc1ac4f7086f6ff0518ddcbaa4083db80eb3bd4c,2024-11-21T04:29:54.100000
-CVE-2019-15999,0,0,f87fbb049b52959f928202daac5948462ad0efa1c4aed10abfd125535edebb37,2024-11-21T04:29:54.227000
-CVE-2019-1600,0,0,c6e24c4d650de25c5ace9e1a4ae6497de1076c9bfa982bab12e5b957cfa3d480,2024-11-21T04:36:53.833000
-CVE-2019-16000,0,0,e24f622980a930df39efdb1f71ae16299f3670c719c5a46c1fe36e5f98cb6067,2024-11-21T04:29:54.357000
-CVE-2019-16001,0,0,318c6e2f3bebc8cebb91c3f01c6e5e5e7d67ee527406f87c9b12b9ac54156c46,2024-11-21T04:29:54.470000
-CVE-2019-16002,0,0,3d71a322974590ca01bccab072283655091237196bb494f40ac2b59ee413e60f,2024-11-21T04:29:54.593000
-CVE-2019-16003,0,0,2bebbfee49f2fa003f1168cb6bd4c3e1e66aca48bce3e68c5248acbfedb53cf1,2024-11-21T04:29:54.723000
-CVE-2019-16004,0,0,b780673f8ccc222d874892ca9f413c6c8eb503518c8fa61d78a090e7f74f5798,2024-11-21T04:29:54.840000
-CVE-2019-16005,0,0,2bbc5df4ca2ac52d551c412bee4ffa43c13ed1af638bede26f23426b5f2ee999,2024-11-21T04:29:54.957000
-CVE-2019-16007,0,0,4f3cd8458c98f92dff06098a5ecede9263242002f49fac1573694404528d7eb7,2024-11-21T04:29:55.077000
-CVE-2019-16008,0,0,b3928972af913ec7cdc9d56a09452d3f4bfdfc47d5aa34aa002ef2cb303370ec,2024-11-21T04:29:55.193000
-CVE-2019-16009,0,0,46e99b005caa4bdbb0ab4d65427f0d200e3db9a04eabe71caebf8f69542809c6,2024-11-21T04:29:55.320000
-CVE-2019-1601,0,0,bf588fa32c0da704341f660c032b9497474d0726824ca67758e3311ae8d9939e,2024-11-21T04:36:54.010000
-CVE-2019-16010,0,0,34101237ab9841bd39da6a468cac114f3beecbc96322e9b91c049dd7879cc959,2024-11-21T04:29:55.447000
-CVE-2019-16011,0,0,7582fa5cfea96708ef0be8bf37be030f49419abb9bee4e9f13e04d98f9c810be,2024-11-21T04:29:55.577000
-CVE-2019-16012,0,0,6162e3da0b0b32b3e3ff7922c7ec84463c2a366d829773c7ad0f595a4f3c93da,2024-11-21T04:29:55.720000
-CVE-2019-16015,0,0,c800f7a04db76666da0c9913e7016f7048e8080d708316a72a56b3950494456d,2024-11-21T04:29:55.847000
-CVE-2019-16017,0,0,82b934823a5662c6b8c66564889fe07f591167edc7c9a13901b1ad489b1d53aa,2024-11-21T04:29:55.977000
-CVE-2019-16018,0,0,e89a56fa92a14f74c5fc6357989aa9350e4cb2182d390be82a11b2dc61c39cbd,2024-11-21T04:29:56.110000
-CVE-2019-16019,0,0,8c3c2e57173bf3370067f4c1305825fa58aade178b580965a963207a941743f0,2024-11-21T04:29:56.263000
-CVE-2019-1602,0,0,8635085f1662eef47952c4902aee7440e4f9438aeeeb6f4819b95d29d461e187,2024-11-21T04:36:54.187000
-CVE-2019-16020,0,0,d81a991fce294c1196c60d96c869b77ac1f7a40d7bcb8a48cadc129822f0b9fb,2024-11-21T04:29:56.430000
-CVE-2019-16021,0,0,0650c552afe71621c635acd5c4582dbf38a11e39d945cff20d041a9426ca1baa,2024-11-21T04:29:56.580000
-CVE-2019-16022,0,0,846bc6b8513c546a4d63b13d24b0498fd05612a1a5514c61e54e165b9519dc1b,2024-11-21T04:29:56.730000
-CVE-2019-16023,0,0,6b0bb6a7342926c0aeec353c520f2a48782b83e8fe5f7e78d21e53c45c783a21,2024-11-21T04:29:56.880000
-CVE-2019-16024,0,0,3c43f08311a1a12b687d96646cb831a148f2dbb23e89a2de5d3339d95e271e5a,2024-11-21T04:29:57.027000
-CVE-2019-16025,0,0,40bf24201bed47109dfaf9d73e08ec70b2a85f33bdd8273eb498d2ffb45fab1a,2024-11-21T04:29:57.160000
-CVE-2019-16026,0,0,f2804a040b617f3ed90c28e3aad95672b7c805add1794513a3a94f46f6d7c84b,2024-11-21T04:29:57.277000
-CVE-2019-16027,0,0,58907dc559e574df32874ff52fa68a7d762193f97e6640ab2da902912c21f52f,2024-11-21T04:29:57.407000
-CVE-2019-16028,0,0,5ade53c186dd1bd252269b74204bd90cac73ba7b0d34c7ad2e8b633612570c14,2024-11-26T16:09:02.407000
-CVE-2019-16029,0,0,8013b719be9da65cd1cadbcda729be6e6301a6333669258ede61214467852c2a,2024-11-21T04:29:57.700000
-CVE-2019-1603,0,0,51a81bfbef7a1827a549e68f1d8c73af605eb8dde0b270c55f5bb99d595ce37d,2024-11-21T04:36:54.327000
-CVE-2019-1604,0,0,776828a34444856c1f97f7eb2327b6301485ee3c913317cd20fd6b659750fb21,2024-11-21T04:36:54.460000
-CVE-2019-1605,0,0,4a039bb9b713d45cc7feb51d1ed0448eb3384574b0bf83007bf62275a8b958ae,2024-11-21T04:36:54.603000
+CVE-2019-15956,0,1,a86fc2410e222f5348e0a659ee655b36ab3083426e15a54618585a1e26131061,2024-11-21T04:29:49.077000
+CVE-2019-15957,0,1,68321699748298c8ccfaf41ebabae3266ac1bdcd0a908af89b0b568302897bab,2024-11-21T04:29:49.210000
+CVE-2019-15958,0,1,ea64f0025de16b6c12d4d4a93681f171cc2a5b8aeb935838e52f15cd2967303b,2024-11-21T04:29:49.350000
+CVE-2019-15959,0,1,22a3bc4bf3b66eab7996492c675a9368f03ac036f0b983c2dca62d0eabc2cb4c,2024-11-21T04:29:49.480000
+CVE-2019-1596,0,1,9a0ff67194bf419f9e04a63ed372fb8643356ed6c4cbb37cd921524b249f2ec4,2024-11-21T04:36:53.150000
+CVE-2019-15960,0,1,d55591d67cc477ab2954f2a2f64a6075e27901a41a9fa303491e527cf6ba2295,2024-11-21T04:29:49.620000
+CVE-2019-15961,0,1,21cb438ac9470c85f1ab8768940d3bfa5347af7c543b3e84c9142d83ca1ebf91,2024-11-21T04:29:49.740000
+CVE-2019-15962,0,1,065df8a96f37fcacb21b13223d74335f013bf3b898456e74377d4176cde86a13,2024-11-21T04:29:49.890000
+CVE-2019-15963,0,1,1e390dc83a528a3e6b4f0ce98bc684439102a46c09a10745a4fa8dbdd6fd7149,2024-11-21T04:29:50.013000
+CVE-2019-15966,0,1,d1795024bc5b8d0baff143e4180c8743e216c60cb6b10a9671babbe8841e0dcf,2024-11-21T04:29:50.143000
+CVE-2019-15967,0,1,cdccd18cc025208d18524dcbb10737eaa3d72354b2a8a1972832ac651b6c4af9,2024-11-21T04:29:50.267000
+CVE-2019-15968,0,1,5cbdaec1b16ed0b5873cc142c6d45450450c56e04629291a4d7466d0249b5d17,2024-11-21T04:29:50.433000
+CVE-2019-15969,0,1,016175b41335a839b4562d886eaa2dc9f6043f94a734ce3f7c890faeb4c64a46,2024-11-21T04:29:50.560000
+CVE-2019-1597,0,1,503d62ae941c8d3a8a6dcda21475c5da45803462e08a07cb418c7a8a47ead8f8,2024-11-21T04:36:53.300000
+CVE-2019-15971,0,1,ec42afce7bef46e6828420cb8d03b159b9d3570c75eb4aca9723be5c851f82ff,2024-11-21T04:29:50.683000
+CVE-2019-15972,0,1,50ce35c8ad088f23a0539d074a3f192fa8e7f801610c4a4d4ca477dc9af93370,2024-11-21T04:29:50.810000
+CVE-2019-15973,0,1,e9eed34a5a3af6efa30fb83704a60e27ccab86e36bf520f4c4656f52341d841c,2024-11-21T04:29:50.933000
+CVE-2019-15974,0,1,d55c89237ab6a47d7ec176be4f21cfd4a3f37ae8fc81188fc8e8e7b9aaa8c45b,2024-11-21T04:29:51.053000
+CVE-2019-15975,0,1,3844684e1360157293eb531e61b24af0e3c33191fd86b2f8989ec033976366e1,2024-11-21T04:29:51.183000
+CVE-2019-15976,0,1,3c5aade0a530e62515c3c09f19306970caf16f0dc706b7d5ccf7832ca746869e,2024-11-21T04:29:51.320000
+CVE-2019-15977,0,1,7883feef52724299ca4f1ae51311ddee67677c48eb5830241c4b988627043ff4,2024-11-21T04:29:51.440000
+CVE-2019-15978,0,1,3827da43ec9aa5f08bea60c49316b33038a1486ba46fabdf5630e7f13ccf9804,2024-11-21T04:29:51.560000
+CVE-2019-15979,0,1,22a6b408e1afbd12705f8064c9cfaf6c4228831679585fef4f3080e8af9969af,2024-11-21T04:29:51.683000
+CVE-2019-1598,0,1,f9ecd6b941e960252f147fb27c0a22fe35ba58356a2a41e7a5ac600a944e5c19,2024-11-21T04:36:53.470000
+CVE-2019-15980,0,1,df5fcc88d383104c3c40ed9c8f11d8fb4605d9edc00d339e1d1af5efdcb615ef,2024-11-21T04:29:51.803000
+CVE-2019-15981,0,1,32416f816d928e569bd4720f468e8766f168c41db47d00abcf8fd8320926a546,2024-11-21T04:29:51.917000
+CVE-2019-15982,0,1,a8f5876a2c57dca71acc7159b92929094557a368bb0469d62076780e52d08ea3,2024-11-21T04:29:52.033000
+CVE-2019-15983,0,1,5568e9f0691b8d519758fd5672d3d44480687f4073e3962ebe8e4606749ad391,2024-11-21T04:29:52.150000
+CVE-2019-15984,0,1,4af3e2f3dfca281ddc541780280bca63929120b92d286f3df07ea67a921a7bdf,2024-11-21T04:29:52.267000
+CVE-2019-15985,0,1,e670b0f1475c10bf7cb3371495dd33c8f9f7ca615b4cba33f6b6c5c61a153015,2024-11-21T04:29:52.390000
+CVE-2019-15986,0,1,e7309aab8bec97307fe9053ba317fe8b84a81c4a0c6019d4d1576641c931a42b,2024-11-21T04:29:52.503000
+CVE-2019-15987,0,1,82ddb3bcb85d69c7ff576b9b07dce06f525dbe0ed23e4136142ab676fd066f32,2024-11-21T04:29:52.630000
+CVE-2019-15988,0,1,9cfc6bcce5b36ff026b3d2b58d7b7974cf3600cf88be475908c288b21c2429ad,2024-11-21T04:29:52.810000
+CVE-2019-15989,0,1,630e7036308597b45f78519543d4b0c8de0174de7198e4b23c294fb3564b7eb8,2024-11-21T04:29:52.940000
+CVE-2019-1599,0,1,f708741389242085c543f6de59023cb2b4dc464f74861b96f747c613829a7d28,2024-11-21T04:36:53.637000
+CVE-2019-15990,0,1,a6ba5d7b01b49ca10ad4a473c06ee39bdec0ae90768bc5dd78457aea3323af23,2024-11-21T04:29:53.083000
+CVE-2019-15992,0,1,337b18dff76937880fb3e350f8b5b125450366a7994f1d23406cbcebd845fe73,2024-11-26T16:09:02.407000
+CVE-2019-15993,0,1,fb6a076e6b69e0c5c7782603ddb0fabbb6fa214307fd5052714246acb9e69848,2024-11-21T04:29:53.367000
+CVE-2019-15994,0,1,aba3469fa25cedacc5d2dd86dd6a34327bb1072722e7de49d327cde678cd21ca,2024-11-21T04:29:53.603000
+CVE-2019-15995,0,1,d90e4e3c55bf7c7b6aa179f9d0679c191398870b7c932717608922f119666668,2024-11-21T04:29:53.730000
+CVE-2019-15996,0,1,9ba28c548774793741029b0c8a1d06008d89fe08c35cf38a5513c061a09e070b,2024-11-21T04:29:53.853000
+CVE-2019-15997,0,1,1ceacccef428ebaf49bd8e011a8849d0c2110a8c287875d7b4b580f6624340ed,2024-11-21T04:29:53.977000
+CVE-2019-15998,0,1,d05afc92c82670f555bd1a7a236688b7ca04ef6a3f00793bcd7bdefb7ca4140c,2024-11-21T04:29:54.100000
+CVE-2019-15999,0,1,e1fecf8609861963e7f65c91942a48c944431cdae7b6867460c85d558fcc0d2d,2024-11-21T04:29:54.227000
+CVE-2019-1600,0,1,97a2986dc9f89939551e2a427ecee22b1d3422fdea5870e136a17bb1ebca48b8,2024-11-21T04:36:53.833000
+CVE-2019-16000,0,1,a4eeae5139d18049d3c081ac700bdeb62cf0d7b0ca9f2da38b4c95da32e70864,2024-11-21T04:29:54.357000
+CVE-2019-16001,0,1,35518b05a1a54a44d4f6142ad3bce94ed990c9125ffd2a26b8ea6c96dc484779,2024-11-21T04:29:54.470000
+CVE-2019-16002,0,1,f4899bdef680ad0bb2638025c9f4e3b97a3a606d50c8973cbb19440ba92c6729,2024-11-21T04:29:54.593000
+CVE-2019-16003,0,1,1da16e99acda51c3273c928ba7b7bdf2150d074d588778df229952760e10b366,2024-11-21T04:29:54.723000
+CVE-2019-16004,0,1,1b297fec7fe25ba91fc1cec761f084d7395670e929f4596859e76377ab97e0bb,2024-11-21T04:29:54.840000
+CVE-2019-16005,0,1,debbe90ce72220aabe0291fe4aaa15d60f0773e4f5feb101cd72367bfc4d2ce6,2024-11-21T04:29:54.957000
+CVE-2019-16007,0,1,47e6c758b0066f6ca8a8ccfb647f29947513540feb485335694ffcf2bffa676a,2024-11-21T04:29:55.077000
+CVE-2019-16008,0,1,2e9bbeff9cfee4fdb3e591834699378de33900b178ffc1596cedd02cb46b7909,2024-11-21T04:29:55.193000
+CVE-2019-16009,0,1,49ca06f2d71c25fe2c35908051b53ef65f02167e94894fa4f5ca80d704485c75,2024-11-21T04:29:55.320000
+CVE-2019-1601,0,1,04621c9aa6430ba56eaf18e50999c38463e2a4ad77080b4e770e609db61c388f,2024-11-21T04:36:54.010000
+CVE-2019-16010,0,1,a316ae11c4a4bf855953c80516a40a6edb38aa7516d59a27ad9246be4181beac,2024-11-21T04:29:55.447000
+CVE-2019-16011,0,1,068a77281ec607fdb21985d1110e4479bdc9a843b0589cedb7d25af2236b938b,2024-11-21T04:29:55.577000
+CVE-2019-16012,0,1,00fb65eaaad3d2b3e1c7ddb1dde032f426e828d69eb727ac7d1e3dede472fc65,2024-11-21T04:29:55.720000
+CVE-2019-16015,0,1,f11de886d8d28ff84eadc7c0d3de3a453f1c5e5e54d1efbc69d06ce786849c1b,2024-11-21T04:29:55.847000
+CVE-2019-16017,0,1,08c64735f1028e5b001ce59473950b36690a8f72e24def576e8a623f80607839,2024-11-21T04:29:55.977000
+CVE-2019-16018,0,1,6de6e1b7f558c104d262d451f50212d53ab25368ffcd9f866547855fac6271b2,2024-11-21T04:29:56.110000
+CVE-2019-16019,0,1,b0f53a88a463d35991a17c10efbeec427f5e82de7d23151c7e2663085b9df504,2024-11-21T04:29:56.263000
+CVE-2019-1602,0,1,450204525c89a98b087a08e1490099686d0870a9786798021d3d1fd451e0225f,2024-11-21T04:36:54.187000
+CVE-2019-16020,0,1,44a3de4079391df612dcf0085da266481e13eedbae272df03e7936cbd5b489c1,2024-11-21T04:29:56.430000
+CVE-2019-16021,0,1,acded78c79d0bb6b4bb40c9f90d54444c5f6d6d5c90aacd174908c143a916bff,2024-11-21T04:29:56.580000
+CVE-2019-16022,0,1,af8e334a0983cb07957adc010a2a45352f59058613ce15b998e80de51926f2a3,2024-11-21T04:29:56.730000
+CVE-2019-16023,0,1,398495c325732c8c175cbd34b6b9ac3d963c7261b1b9d35daf58f9caae744e12,2024-11-21T04:29:56.880000
+CVE-2019-16024,0,1,b775b14d467b8d018ad1a358ea3effa02faeaaabe782e53da194fef9886b8d1f,2024-11-21T04:29:57.027000
+CVE-2019-16025,0,1,a4dc57d30d458491a04bba2cd1137a4e220574de217d6a4705c76d7f1d1089f5,2024-11-21T04:29:57.160000
+CVE-2019-16026,0,1,885e58bbf28d2ef251251840bde058264ea3cdc735079954cc0e91fbc7f4943e,2024-11-21T04:29:57.277000
+CVE-2019-16027,0,1,506793379ddcf681b923fa1da2799f7cdc03b3b0ec631760806ff85fe7f173cb,2024-11-21T04:29:57.407000
+CVE-2019-16028,0,1,cb7652d6e98ce293df7e76539492479c5f027caac3d1e49b614e3b6fa7c45979,2024-11-26T16:09:02.407000
+CVE-2019-16029,0,1,a4ff96df0add7e31fa8589a4c64e841d74d85b4095f65f2318710ee69671e9b7,2024-11-21T04:29:57.700000
+CVE-2019-1603,0,1,40c2a6ac6bd6011d734d5924f754c4a9843b962091aa4df482228a55c47612c2,2024-11-21T04:36:54.327000
+CVE-2019-1604,0,1,01e8df9da45c28ff87eafc4687e6e5a1a06d7927f378f6ca1e3619f560850391,2024-11-21T04:36:54.460000
+CVE-2019-1605,0,1,8b8d6f1ab326a6f939c64a1dc12f8ea720aab18148e857b8f54d85e5b27c0aa5,2024-11-21T04:36:54.603000
CVE-2019-16056,0,0,c62ab5403a4f2160c97bba6d1d83e80c6e20c78f334ea77c8ffc304de2311e24,2024-11-21T04:29:57.830000
CVE-2019-16057,0,0,dfa9d47fa0df51951be0e84e6c9c6bf1bdc2540a5d76130bd94f0d029ac449c7,2024-11-21T04:29:58.100000
CVE-2019-16058,0,0,bc74a3e7cfec7a4dac42653ede8bd0bcef6785432d6e4537d92f24ec4a90bdfd,2024-11-21T04:29:58.250000
CVE-2019-16059,0,0,f881f137f91fa0cba33e52eebc3ba2644d1f2cc4aee787037c4e5f74d25d5b83,2024-11-21T04:29:58.400000
-CVE-2019-1606,0,0,4b661ff8d0582d99b41d04190d3cab69c17adda9c934368d76fb3d29c72b68cd,2024-11-21T04:36:54.757000
+CVE-2019-1606,0,1,925e1a63fc39ea6d5271eb12b0f9b38af11a867dbee2b3ac29a5547fd6953667,2024-11-21T04:36:54.757000
CVE-2019-16060,0,0,469dca38b91363734a7b604d7aa7e90c3666f8f726de07072b329d55837da674,2024-11-21T04:29:58.573000
CVE-2019-16061,0,0,cf7d602830d6b26b42e1235d5ef0a90c284c21fd6132bcf090271468d9c3dc34,2024-11-21T04:29:58.717000
CVE-2019-16062,0,0,fa6a398bc3edcbff285d65c6d0df075eebe0f006a22d3354176dd0bab6398e79,2024-11-21T04:29:58.857000
@@ -134026,14 +134026,14 @@ CVE-2019-16066,0,0,44b05711cd47fb4c53ddc497cbbdfe95ff54ec01caa1fb2c532ca35840d78
CVE-2019-16067,0,0,f8ad8c94fe055a3aa79809697ff73ab780a55e0eeddde2358665de4ac4c3c0a5,2024-11-21T04:29:59.563000
CVE-2019-16068,0,0,a9b59d2ec364e4668a71ed548dcf42b46b803d839b50431f1ca570f5926cd2d0,2024-11-21T04:29:59.710000
CVE-2019-16069,0,0,c6dc72a3b0fb38791542721bb2d3bdd00f79207cf612c1f57e798959ca93a45f,2024-11-21T04:29:59.850000
-CVE-2019-1607,0,0,88347869c428804ba68e7cf9dcfe1d59caf4e7c616f2fb6aefc351921194a343,2024-11-21T04:36:54.900000
+CVE-2019-1607,0,1,e70ab80ce4542b0ec2db30cee6923d7265222dae74fc46f0a18ac70e6306c981,2024-11-21T04:36:54.900000
CVE-2019-16070,0,0,eafc5de3645b8c3b5c273a8feee0d9f40b79819d4570b446fef608c78429cbb4,2024-11-21T04:29:59.993000
CVE-2019-16071,0,0,13d89c8dc96f20cc4a93e05f5e166e834aecf501dbd391a70a3b81c4a753a663,2024-11-21T04:30:00.140000
CVE-2019-16072,0,0,4673c77776edc759f9ae387c12f82ca2b2e1bfadd4ceb7e8351226300b219cd3,2024-11-21T04:30:00.287000
-CVE-2019-1608,0,0,a1bccf77a5d5f3cad384d098ffe28cb77b5c1bef1a978725a7083348617a29f2,2024-11-21T04:36:55.030000
+CVE-2019-1608,0,1,0e75bce665fce1d8dd477376a20c4bf863e10254d9d21cdad9395ac74873ccdc,2024-11-21T04:36:55.030000
CVE-2019-16088,0,0,7a5684a681f024b1d3829a543b2ba365055853211c45f47773bb13b99a4adb19,2024-11-21T04:30:00.430000
CVE-2019-16089,0,0,34da6683d69203f99087f4c9209fcb7cfe7f40559c532aec6c380000908c32b8,2024-11-21T04:30:00.600000
-CVE-2019-1609,0,0,24d677f6ff17cc28c4aab0f474c3fa2c3daacbbb3c4b3f4164b79a594a1f67a9,2024-11-21T04:36:55.173000
+CVE-2019-1609,0,1,4dc000e97b49b3cd56ea641bac1841d043667ce35c8293bd0a2002c550e7a327,2024-11-21T04:36:55.173000
CVE-2019-16091,0,0,4ff6e9d9f26381e172df8d50bf09aa8e587ddfacd68c3fbd7f9b627272f74783,2024-11-21T04:30:00.777000
CVE-2019-16092,0,0,8f90a5d70a6f8fbc5fac0c44fbf656ddc11ee89c9bfc8ee459faede43e45d0f8,2024-11-21T04:30:00.940000
CVE-2019-16093,0,0,a5350e0135349cb63682c881c5fcc4d2bb5c28ecb63be0aafa94c3de3e9f3086,2024-11-21T04:30:01.093000
@@ -134043,7 +134043,7 @@ CVE-2019-16096,0,0,ff99928e03e838931dcbb1d035d12b4cee4c40f9adc8fcd8fcc692c43d0b3
CVE-2019-16097,0,0,2ae8646d7178e47d8d85b1575f53498a374928d12b5852356e218c833af84b6e,2024-11-21T04:30:01.773000
CVE-2019-16098,0,0,76dbad3f016764e18440ba4084734add12897ef673d04e8b61dc8293c2789fc1,2024-11-21T04:30:01.967000
CVE-2019-16099,0,0,37af5fda5df333bd95d2092a16ceb623032283d0255f3af5e7f8a67313bea81a,2024-11-21T04:30:02.157000
-CVE-2019-1610,0,0,d631decb7e45223a9e0f16e901fec56d54a05427db4c0afee4e8caaa64c4eb8b,2024-11-21T04:36:55.350000
+CVE-2019-1610,0,1,1bf1288ba6cb7a8fd4dd65c2e7474538dd7f49b29661409fce08ce7cfc863a5c,2024-11-21T04:36:55.350000
CVE-2019-16100,0,0,42d9472f29daa4e416e8da161eb3147fea1fe9c3e573d70c1b077cecb459267a,2024-11-21T04:30:02.330000
CVE-2019-16101,0,0,43571464e4a250ce193aeadca8ae5a2974ddcfc84def7e21b0c5ac7e17cc1a78,2024-11-21T04:30:02.503000
CVE-2019-16102,0,0,cc09c3ff9050e2d03861b68fb12f4339df0f09d4b3bea3136af1bab89348dd09,2024-11-21T04:30:02.687000
@@ -134054,7 +134054,7 @@ CVE-2019-16106,0,0,63931010611ab2d1782ad520120393d8936703c46960a38b9f7081c46d11a
CVE-2019-16107,0,0,752aab8b22a900cfd5055c4d4998896c6b77472ce65e48cca41541548226be3d,2024-11-21T04:30:03.573000
CVE-2019-16108,0,0,5d431502192f0fc27264444c90219cea4ad72bc095bc316429d74a7a84d8646f,2024-11-21T04:30:03.740000
CVE-2019-16109,0,0,4ccc33688937486b50653bdd975f2be4b8b3169a560276fd0c9a191634a81a1d,2024-11-21T04:30:03.900000
-CVE-2019-1611,0,0,f669bb62fd84459c114f70ea6a31d4ca279699998f445fe366c34646b5f0638c,2024-11-21T04:36:55.483000
+CVE-2019-1611,0,1,743ffe65d601a0df1155953662ba81cda3edd2f30ecc2362e70afbd0a2f6b946,2024-11-21T04:36:55.483000
CVE-2019-16110,0,0,c16d5ca2a111554cfdc215991d6fc9f8b0c6aa77fa03891e2cdaecad91a185bb,2024-11-21T04:30:04.057000
CVE-2019-16112,0,0,483dd4830eedfe6bdc8521d7a4c43b355000c9d4cdf4612400bde433a01767bc,2024-11-21T04:30:04.213000
CVE-2019-16113,0,0,d58f5ce65ba5c1bfc436843723cf2836508ce880863ea82e3739b0ac63a82a73,2024-11-21T04:30:04.363000
@@ -134064,7 +134064,7 @@ CVE-2019-16116,0,0,876958b832b29a36bf780a54861ef35228ed37b036a74ea9f9e445b461dd6
CVE-2019-16117,0,0,a49d3dbbb591d5632c7364c457a9f7a966b0a2c3fd043a92da70b5919a52c9dc,2024-11-21T04:30:04.947000
CVE-2019-16118,0,0,e43c040fde529dd091fa021870ede1f4aa6626637f805a1d5c76881d85b3f5e9,2024-11-21T04:30:05.093000
CVE-2019-16119,0,0,8ccf11c5d9b811b59504cd811ca8e09db4e8e0d2de3cd4a68be4097250597a95,2024-11-21T04:30:05.263000
-CVE-2019-1612,0,0,b16b22aac2d6005b06cf1ab3c9d72ea7ca3510780220d5616da708a6c71d07e2,2024-11-21T04:36:55.640000
+CVE-2019-1612,0,1,08b6e550b2f840caf4514400530ab961a789f5fd0784c9f264c5559fd9e7ff10,2024-11-21T04:36:55.640000
CVE-2019-16120,0,0,2a7911f459303b2c14fef6d5668aff501f799ed146d148de7582f0bee021a288,2024-11-21T04:30:05.430000
CVE-2019-16123,0,0,7c7f70df5f521e71b86da7d4ff48f9a0a26af18a2ac058c8decd1d85386be10b,2024-11-21T04:30:05.580000
CVE-2019-16124,0,0,2196fbb4ab1a779a4a5b71e34f8a130a1564da651e92e2d8f0ef77b977fd7ca4,2024-11-21T04:30:05.730000
@@ -134073,7 +134073,7 @@ CVE-2019-16126,0,0,29cc099eef7024dc7cc3419a875d7e177c99dfddbeb0bb53c4bdeb0d877ec
CVE-2019-16127,0,0,e6ce73777c9f79a62a3f9dd6643e00773e3886b5d3c7cf2f0ddda0d1d79d7f63,2024-11-21T04:30:06.187000
CVE-2019-16128,0,0,f80ed8447efaf0cd8f2206d66a3ae7a5710e74ee62b68d497428d0342f6a7982,2024-11-21T04:30:06.347000
CVE-2019-16129,0,0,b389573e20c4a70936c55fe396ddf4ebc07197eee685479bd378ac6048ed5406,2024-11-21T04:30:06.520000
-CVE-2019-1613,0,0,5654273b9eb827405b6fb2258f7693472848df001477b06bb11db71dad24de04,2024-11-21T04:36:55.777000
+CVE-2019-1613,0,1,036f5265cbef903d069c4f786fe5aed8f69f8b1067f11587cfe63a0bf28450fc,2024-11-21T04:36:55.777000
CVE-2019-16130,0,0,1907b109175a86419d5d4627cf9726bfb26459a93f135e9913e5b163121f2e15,2024-11-21T04:30:06.697000
CVE-2019-16131,0,0,2b7495f51bc31a1f62fcd07f99903f47efe9bf3874a49619380703fe2c2973a5,2024-11-21T04:30:06.853000
CVE-2019-16132,0,0,143e8bc3e61a2ca9297b55ac8769e2bca94be033ab0893450a4fdd393c7aea07,2024-11-21T04:30:07.020000
@@ -134081,7 +134081,7 @@ CVE-2019-16133,0,0,19969fbc353172933f8306354ed82966d68097093488e6fc5ae7c1dbad32f
CVE-2019-16137,0,0,f79754c201400271e1429571e5e3d6f9312f393fe76456a53b304e0d8ec59658,2024-11-21T04:30:07.313000
CVE-2019-16138,0,0,e27bc31255023d8bf82eae383586390c6234e8795def1df77dbe768c13722e93,2024-11-21T04:30:07.467000
CVE-2019-16139,0,0,b139bac206cc06f70a90f527cb792384b1bec193d0272f31a62fee5b4dadbcac,2024-11-21T04:30:07.623000
-CVE-2019-1614,0,0,fc6ec6a2be8f46cd05a208f6fef0151240a4cd39649eb8055f01059e74cd9e41,2024-11-21T04:36:55.920000
+CVE-2019-1614,0,1,d08212abb8c2bb63eb6edec266e1dc5610bc7cacf0b80a99b08360601519f463,2024-11-21T04:36:55.920000
CVE-2019-16140,0,0,bda75aa3976df4f6f5b04390bcfcbefa4911b6a3cca5a4e37c865d0084fdf30c,2024-11-21T04:30:07.773000
CVE-2019-16141,0,0,0b850ce3bba4dc7ef018a790881e75041996d0fa43dbdcd07bd81239c6341981,2024-11-21T04:30:07.937000
CVE-2019-16142,0,0,4dfbfe4873e5ea9a17bf4c1a162de5f7bc7e88d26ec7160dbf185c78e9fdd9aa,2024-11-21T04:30:08.090000
@@ -134091,7 +134091,7 @@ CVE-2019-16145,0,0,2b69793269a5c57f810460bbda040d4d304e9b33a2f77ee33c1b9dbd7a8e1
CVE-2019-16146,0,0,8af4cc473afa15f241018492211f31b0c205758b9e43471a27fa6bb334e16b4c,2024-11-21T04:30:08.760000
CVE-2019-16147,0,0,4a7f39c9d20d6dcf2dade8137651897c7dc2170f14c4c449edf6cbfd873354a9,2024-11-21T04:30:08.917000
CVE-2019-16148,0,0,a19ea0830015076ed2aa786790a8f5f0b9992b0755be9e2897b7be066260328d,2024-11-21T04:30:09.070000
-CVE-2019-1615,0,0,fdb76bd4554221c40a2a4bd0166ff005a06db9647aa6ac31fd1407542e3a4b35,2024-11-21T04:36:56.073000
+CVE-2019-1615,0,1,aa52848fb05b8b2f8938e61eee3cdc6d5553493898d3d1ee2281bb1d6547d88f,2024-11-21T04:36:56.073000
CVE-2019-16150,0,0,a6461a4622b00ba70e3add49472eab1393dc846b2d8d2e8a753bdc0b6916d833,2024-11-21T04:30:09.220000
CVE-2019-16152,0,0,131cc19e20054d2bf5ae58c81eac14d7c9cd0a3eb2b604f29ab52be39d83ff25,2024-11-21T04:30:09.340000
CVE-2019-16153,0,0,d575345081973e4fcc8f9153136e3d576f01551c1b047ab612d9da9abb6b3d45,2024-11-21T04:30:09.460000
@@ -134100,7 +134100,7 @@ CVE-2019-16155,0,0,64b86cc1a2affd68d11e21424c6ea7e57ea43bbe2efbcc439fe5ab2188987
CVE-2019-16156,0,0,14223409639583e1b161cce5431500457c32afbda7a22bf913d6d1da50c3b870,2024-11-21T04:30:09.833000
CVE-2019-16157,0,0,73f32680ff3e66db237748ed3857133c67e2b2c36e093c64e7c0633ce20cc2fc,2024-11-21T04:30:09.950000
CVE-2019-16159,0,0,99c8f4a8206a4a5482c212a09e58c09847f8472b5fca9bddf3ab6188a0379624,2024-11-21T04:30:10.063000
-CVE-2019-1616,0,0,969e247484be9276b2351dd465fb49364686949c3bfdd60b4a58085b58c6b510,2024-11-21T04:36:56.223000
+CVE-2019-1616,0,1,1b1165fb110b110e9706978bf59950479c91ffad58d90f0b0918cc91e1dc7033,2024-11-21T04:36:56.223000
CVE-2019-16160,0,0,9e5edc1ae876f637b774b328eba6c7bd4f80360885531ee92f87e3a1572f2d3d,2024-11-21T04:30:10.230000
CVE-2019-16161,0,0,78a584bdfd7fe730abea82b197865fa1a741df172cfe29f781de0c086aac16fd,2024-11-21T04:30:10.373000
CVE-2019-16162,0,0,8f1fcbd6bc05b6d80da420f1d67c1ecaa54b3a02a674a852a7b1c7af15acb0f1,2024-11-21T04:30:10.520000
@@ -134110,7 +134110,7 @@ CVE-2019-16165,0,0,e300a1cf9a9a6aa78049adb8efba162831c29f5f7ac00f1f0dfe56dd74ae4
CVE-2019-16166,0,0,ebf1aadbeac231d2b83b8fb1455759a5373a5fd11b8dd12b6f8cebd99e93eb81,2024-11-21T04:30:11.100000
CVE-2019-16167,0,0,723403ad7cce5c000fc00c4a50b49107aaeeedf60f3145fe0bcc72017e52e747,2024-11-21T04:30:11.237000
CVE-2019-16168,0,0,7eb4a67e1ce852f502508906e178d4e83b76d8730e3fb378f55a4a6f295f22de,2024-11-21T04:30:11.397000
-CVE-2019-1617,0,0,26cf600252788e2b8797b0bca8e7b2f9a33c606b36675bf2e9288307963a648b,2024-11-21T04:36:56.387000
+CVE-2019-1617,0,1,0b55d88125b24b9c91665b078594a810e45371a364a51a4fb3764e67108256be,2024-11-21T04:36:56.387000
CVE-2019-16170,0,0,c91b8736327096665aae8219031d5c333bedc55210bcfc49d9aeb89810295607,2024-11-21T04:30:11.613000
CVE-2019-16171,0,0,d45b78ccbc122478e77b90165cd6bf3a2feaa6735521b7cd8d409a0de24e26e3,2024-11-21T04:30:11.750000
CVE-2019-16172,0,0,c0c8f8f86f7cd6531f0557aa76bdfe53bc73c547d3a61526ce86e4340220f2c1,2024-11-21T04:30:11.897000
@@ -134121,7 +134121,7 @@ CVE-2019-16176,0,0,d61ac3df4c3e46598c698d16d68888429fecaa8581368da4587bcbb52d07a
CVE-2019-16177,0,0,bdab13d430936432dce05439e078ea3cf783da18f3ee7fb3e25288b50fb66091,2024-11-21T04:30:12.637000
CVE-2019-16178,0,0,89470c84b09158e832973fb7297a35c30ec3b2480323a08647f065ce84d4879f,2024-11-21T04:30:12.777000
CVE-2019-16179,0,0,877f39f6d907b3f2b9d0ca6d3ad187e4113d75d9b8f47d345d1d42cf5fa30937,2024-11-21T04:30:12.923000
-CVE-2019-1618,0,0,327e4c72452ab72008bb2910a8fbac967a25ba9fd73455411f3fdac27306c7eb,2024-11-21T04:36:56.520000
+CVE-2019-1618,0,1,5f6746ce44eb4adbde7643cc15559b564febec281feeba7733fb84ef1c9a0cfb,2024-11-21T04:36:56.520000
CVE-2019-16180,0,0,6533b5cdfb37bbea3a25045d7fd1cf3ce3a60671944ef604bc39a1c26d1e22d8,2024-11-21T04:30:13.063000
CVE-2019-16181,0,0,cd4cefd725e22c682da97822e36e00df39141afe0a84e53c06a2863b571d3e6b,2024-11-21T04:30:13.207000
CVE-2019-16182,0,0,7cd3f50d206b132336640cbd04e2ff9f01e6007782bb8a3e8f66662a0aa75631,2024-11-21T04:30:13.350000
@@ -134131,7 +134131,7 @@ CVE-2019-16185,0,0,b41eb46b8ba82608cf22f40f14f9bde28d656ccdee9b2705303f93b44321f
CVE-2019-16186,0,0,b92e57006a8b406ae4157af8bed2fd1f2ec73cfce3edee1dcfe7216cd49dce3b,2024-11-21T04:30:13.967000
CVE-2019-16187,0,0,89989c3e11b4fd66e03ef276d961d4f3e2c30936d68cc02897def765f2076c5b,2024-11-21T04:30:14.110000
CVE-2019-16188,0,0,0b2811bbd96d3869336b53a634956993aabf129645fff5eefb45fe85ef9f53a3,2024-11-21T04:30:14.267000
-CVE-2019-1619,0,0,514e7c8ea5eae669c807a87703d7595dde7c2bef893b340770e49dd97843f583,2024-11-21T04:36:56.657000
+CVE-2019-1619,0,1,b5bd0126b91f1e334d4c0398f568aa7e2269d9b5e3c8da6693a994e1670fb7ad,2024-11-21T04:36:56.657000
CVE-2019-16190,0,0,2d21fdf7806f75343710b0fff8ffbd41a7488d133e744081e72ccfd4415e183b,2024-11-21T04:30:14.413000
CVE-2019-16192,0,0,5bbdfe8825bdb10cb475e83d926f3779f97094b20b99cf3c6e44cf87a41e4b10,2024-11-21T04:30:14.567000
CVE-2019-16193,0,0,a124e199ebb60cf84d5eaad968fd01d3ab4fff6587d7b283b185b3010b3cfe07,2024-11-21T04:30:14.713000
@@ -134140,7 +134140,7 @@ CVE-2019-16195,0,0,bafc38c5acac1fd402e42de663575b07fab8ba8e523aa4d26fa0dbbfff298
CVE-2019-16197,0,0,f4304f4b63b8bdbf0d9aa0b2a470b6049943353f215cbf82a2da65a8223cec2f,2024-11-21T04:30:15.150000
CVE-2019-16198,0,0,bd244607a126008bb04499c44bd8975f2ac5514c664fb3f3347ddb6d19b161fa,2024-11-21T04:30:15.290000
CVE-2019-16199,0,0,fbcf5a428c83a4c02e2ef7afc18c662d0b12c394019fc10e2d29f69e56c909c7,2024-11-21T04:30:15.433000
-CVE-2019-1620,0,0,4c115ee92b0470ec079bacb2b25adb9a565767d5dc75dcd6c368a9505dc2a1b2,2024-11-21T04:36:56.807000
+CVE-2019-1620,0,1,ea422adce1f57138c5b079dcb4343e87fecbf863458ed31ae351aaf45a31d822,2024-11-21T04:36:56.807000
CVE-2019-16200,0,0,38dc5da70bd28dd94df985466db664e79ac384b04576ac304ca86408a2eba014,2024-11-21T04:30:15.577000
CVE-2019-16201,0,0,a3c911bf8b6309f68d4d15207dd0bb42e29e24261dec2b2c0ff6dc3a22b62667,2024-11-21T04:30:15.713000
CVE-2019-16202,0,0,50d1a8e018a07a73c577c83f6a42a48fe7e101bbb2d07958ea904e4b2468e812,2024-11-21T04:30:15.873000
@@ -134151,7 +134151,7 @@ CVE-2019-16206,0,0,76eb8d444d6f6c8e0b23c09e0f8db47befbb565b32c64e724788376401c74
CVE-2019-16207,0,0,1aca0d3c88dda99d7e7ba45fd5e039486363696925dc60f9c673257bf3130518,2024-11-21T04:30:16.453000
CVE-2019-16208,0,0,3c15c43e47c8e063733ef8bce707660dfacd17bffa2e98527d6809df99ae76e9,2024-11-21T04:30:16.563000
CVE-2019-16209,0,0,c3ca9f9d840c3b5f3b05ec4451e7e66e243b401ac98956749b49ff22e4e4707c,2024-11-21T04:30:16.673000
-CVE-2019-1621,0,0,b11001cb6efcc450ca8c57e4bda64adbffa5d4eaa625147211e83ce676dfaf87,2024-11-21T04:36:56.967000
+CVE-2019-1621,0,1,996821a7f30f4d2189149078e5cf2040597f60bd10eef480421bc0936df12d02,2024-11-21T04:36:56.967000
CVE-2019-16210,0,0,b5c87d4f4fc412b1e52a0258caec84c1849c064a66362a334f67894c04593903,2024-11-21T04:30:16.780000
CVE-2019-16211,0,0,fe2e366b22dd426b422102ac2291b5f092ee560cf305074d54eddf1853a65e38,2024-11-21T04:30:16.890000
CVE-2019-16212,0,0,1aa61cd34a223ac8c2e1953e51a80d2ff1f70f1bc75353b4bb94c2e5abf2ecc2,2024-11-21T04:30:17.003000
@@ -134162,7 +134162,7 @@ CVE-2019-16216,0,0,a84c816bc29c97d4830f7b4d3943ea42d2600a371815e46115a51030879a9
CVE-2019-16217,0,0,076000fd982719fd4f626a6d10b5ff5e5996342acef0db7093c2762a3b216bde,2024-11-21T04:30:17.700000
CVE-2019-16218,0,0,2bdaade977e589170c186481ac92161c8703e37822d20a467423153cc06aeff3,2024-11-21T04:30:17.857000
CVE-2019-16219,0,0,188e6d8f3b35063406a1dfcc68be0efcd88b444b01b1d64d02804f50718b7e2d,2024-11-21T04:30:18.013000
-CVE-2019-1622,0,0,bddcca0934aab22b01a8b03c7985eedaf090141506841aa580b30cad89a1f1e9,2024-11-21T04:36:57.120000
+CVE-2019-1622,0,1,8e805a436ac2d38cf2bb124bb1f1b98a961411f0bcb0fff2440ac3f7150d3698,2024-11-21T04:36:57.120000
CVE-2019-16220,0,0,a85fd32c74eb1f642cec78083879a313c5f36373afd0d545199cd88ae8b67d15,2024-11-21T04:30:18.167000
CVE-2019-16221,0,0,86e7c3e2b95c7f77267d282b0956d4e028480de300c6914358bc43cf0ecefcbb,2024-11-21T04:30:18.337000
CVE-2019-16222,0,0,a4e16c957fb6a9ca2c6ed937d5090c8fcced9f35381e06c12673d7a965c77700,2024-11-21T04:30:18.483000
@@ -134173,7 +134173,7 @@ CVE-2019-16226,0,0,683cc2ea9a259de8277d3c799dbb9918f336d24328e64fb46f616018aeb25
CVE-2019-16227,0,0,14af941ff8fdacb38ce0b1d85eefa0ee0f66792a95528db85bd996c1f2852919,2024-11-21T04:30:19.257000
CVE-2019-16228,0,0,1912c5ed4c6cc59f149a85874923013440c4f1040720aca3399514d0af587a99,2024-11-21T04:30:19.400000
CVE-2019-16229,0,0,9cdca326fa63852c78ecccfb401530a00e090816e426ad5a564fd1d32106d831,2024-11-21T04:30:19.540000
-CVE-2019-1623,0,0,ac7480a59e30e677d83c1b63a93476c8529f386eb56077b3ace1eb4f837c0e59,2024-11-21T04:36:57.260000
+CVE-2019-1623,0,1,64f6d75135afaf0131bd44083d42d0ce79824185f997c4d6c8ee9b7e47c24164,2024-11-21T04:36:57.260000
CVE-2019-16230,0,0,2e8c6870c48bbeb6c15ed7454287e7c9f6fad433a8af16cd9bd820fcd15d1b71,2024-11-21T04:30:19.707000
CVE-2019-16231,0,0,42a0c2bf95664f990821a5ac66e879bb22015a220d3b1899f16ab2a9250aac1d,2024-11-21T04:30:19.863000
CVE-2019-16232,0,0,bdba10556204dbe40ae522564d545e1d2200a33e33345c003ca74ebd04e75dd9,2024-11-21T04:30:20.023000
@@ -134184,7 +134184,7 @@ CVE-2019-16236,0,0,d82742800c52fb4fca976eafdde99815f8a0f908b9042146cf5a9cddf33b4
CVE-2019-16237,0,0,3f51ec20fff2d8ccec7604c4be96f32929c4a4c372f8e24663c768a81ec159be,2024-11-21T04:30:20.827000
CVE-2019-16238,0,0,d680e1af5eedc1e9bb4ffa313aab126c7758aef0580fe6f192d3131bfe483b61,2024-11-21T04:30:20.980000
CVE-2019-16239,0,0,37c76a302fd47071357d832bcf5f99a8318ed96959b8d1eb05a2a6e8f4c44698,2024-11-21T04:30:21.120000
-CVE-2019-1624,0,0,68390e92d14eaedad96b22029612d23772d011f8a99078886d738feec7081170,2024-11-21T04:36:57.397000
+CVE-2019-1624,0,1,162fd5a4fe1965c479b08c1917fc5e60d1f8e132e74015003f82b8b347d87d61,2024-11-21T04:36:57.397000
CVE-2019-16240,0,0,4afea9aaf4eb9a5acff187a0541b3681645507de1f1c6b19a5f457228bde243a,2024-11-21T04:30:21.290000
CVE-2019-16241,0,0,4d0d347fff85397a5b6e1b1c936c8f0bf85bbc372f775da746b20294d950597c,2024-11-21T04:30:21.487000
CVE-2019-16242,0,0,d10ef3baf474cb010fc2dfebe38765980cf8c3ced838eba3214b4c5f89281efa,2024-11-21T04:30:21.640000
@@ -134195,7 +134195,7 @@ CVE-2019-16246,0,0,201ff81d3af4178fbf35748f7575e31a07cda7caffc29083562dfa6bbaddc
CVE-2019-16247,0,0,4e92d9d552934bda0a8e9761f703966dcb26373083492be55c109743b37622f3,2024-11-21T04:30:22.807000
CVE-2019-16248,0,0,5dd26839f407c03376cc86f9bfcbd1755e98c187b2615beb4e5a0461997f0d1c,2024-11-21T04:30:22.957000
CVE-2019-16249,0,0,923d7b1740d9825512879aa83e33b1243a5bf28a93fd9a9dbed2e55e1aaccbf9,2024-11-21T04:30:23.097000
-CVE-2019-1625,0,0,9e2e2107bacdf1bef7d0a1ecedc10d6bbbb2bd798e10f8cf7dc4f4555b0e51f0,2024-11-21T04:36:57.527000
+CVE-2019-1625,0,1,5ae59f6149de24322847142da5c9c98be0b8bcaf80c56e73297491d44f6ae37d,2024-11-21T04:36:57.527000
CVE-2019-16250,0,0,da9a263ccb3099404497a07be1460cc644607496beffa66159b1203db28f8eaf,2024-11-21T04:30:23.243000
CVE-2019-16251,0,0,d4ef4e8db38661302f3ec663c37e49590f6ff6556f0b116fc6235ca2b3734824,2024-11-21T04:30:23.383000
CVE-2019-16252,0,0,611c78ea84b23a1ebf1c071ac9583e779b4a95270fb8602cc11aa4baf6e2b3c5,2024-11-21T04:30:23.530000
@@ -134205,13 +134205,13 @@ CVE-2019-16255,0,0,7c8590890c0e5e0b1d673af8452363427644e1b757b039f508f15667c581c
CVE-2019-16256,0,0,67728c630ad0fabc0000fe32548fca303ac89f1bdee22e7407066d20e4b46844,2024-11-21T04:30:24.213000
CVE-2019-16257,0,0,658bbaed8ae9eef0b5653cb8c146b31cbd2a01045dc148866667df9b5c205bb7,2024-11-21T04:30:24.363000
CVE-2019-16258,0,0,ee2ee9e98fd1c470f1fce700131597f6e66006f164cd3aad4f32444cfb7d0e6e,2024-11-21T04:30:24.503000
-CVE-2019-1626,0,0,5200f83c2705e2763d03fbd8f17ef881431598a33d617a55a202b5864d736e2c,2024-11-21T04:36:57.660000
+CVE-2019-1626,0,1,fcd01ff021271eae6b11a40589c2f3a36ac97bd718574e8ce82e0d17b4881ba5,2024-11-21T04:36:57.660000
CVE-2019-16261,0,0,67223b4da1143d22817d5c9751786d17010b70104805070177cb3b12237e89f7,2024-11-21T04:30:24.660000
CVE-2019-16263,0,0,381c5aca433aa69b0cd64a4ff45a92479afd0edf4abeeee7602e0f0a60d52bf2,2024-11-21T04:30:24.800000
CVE-2019-16264,0,0,3dc97ec4d5f7b0bef578332d3d345d478c789a8507daebe5c05ec09aa9630615,2024-11-21T04:30:24.947000
CVE-2019-16265,0,0,e4a079d0ebf8137888491d559e0288a4f9eddb04cb3530a4a7b28f0dd770e29f,2024-11-21T04:30:25.090000
CVE-2019-16268,0,0,971ff55bfea3f1de630f9b178b827d154b37998bafaf78a2aa6c5bbc8da3081d,2024-11-21T04:30:25.227000
-CVE-2019-1627,0,0,406839b7edfd551253838ca8384641abf10e1684e7f5036df78ef4e7a35114d7,2024-11-21T04:36:57.790000
+CVE-2019-1627,0,1,b4bd89155369c9c34dd3f750b0a81aa050ac3d875caefd9b55bf5c329872f5db,2024-11-21T04:36:57.790000
CVE-2019-16271,0,0,d5691ec52f552fe5ca75724491c2fad6181a17fec7a22571883ed5dc87cb36cd,2024-11-21T04:30:25.390000
CVE-2019-16272,0,0,28a194b4c4478541557c529321cf80b3770ab9ad1eddc81c96c626cfcd669e49,2024-11-21T04:30:25.550000
CVE-2019-16273,0,0,41c84380287a93920f3b7089a2131dfd996bf21a81a39d729c6e75438c186b41,2024-11-21T04:30:25.720000
@@ -134221,7 +134221,7 @@ CVE-2019-16276,0,0,ab525e6466bef4756f1a1b7d04ee52ded4d1d67d64d35a4dbbf6d48284f0f
CVE-2019-16277,0,0,bca2a082edc45b172ee6e421cc3f9a248c513949df7187629f46bf1f88607469,2024-11-21T04:30:26.343000
CVE-2019-16278,0,0,9d54c8f98df197fcd2b28784a77da30e6227d7366541cfbed6cfad41d4b78845,2024-11-21T04:30:26.490000
CVE-2019-16279,0,0,cf72393fbff796f9a03980b1ea4fce135ee432f26ba459c93f4ae2e23cb5fddb,2024-11-21T04:30:26.733000
-CVE-2019-1628,0,0,1e32037049a8875797e1502415b567bcbe41c67e51ffc2a1aa3cd611f0c9281c,2024-11-21T04:36:57.933000
+CVE-2019-1628,0,1,41c2cfd4cd5a2c51615726790851f9c9c000f7c717133241e21816a375f68c1f,2024-11-21T04:36:57.933000
CVE-2019-16281,0,0,938304d26885864d59e3d34885772edab6902031b9fa4910a0d9dfe0c6ff0440,2024-11-21T04:30:26.883000
CVE-2019-16282,0,0,2d3896404bbf5bc9c866739eb93788213e3a4aa094d7ecc54660738f0110b20b,2024-11-21T04:30:27.030000
CVE-2019-16283,0,0,5fdbfec4d7b6cd038f4412079c38b440ef5d70d92ec140822f91bf9b80774609,2025-01-06T18:15:09.650000
@@ -134231,14 +134231,14 @@ CVE-2019-16286,0,0,0f386385a18a3114f926f5729367bdee9dd155c34e6c7e12b08ce39248354
CVE-2019-16287,0,0,d838f179700e986b78b43712fc1bc7ab59e1c036a76142460fcc8fe1ef08829b,2024-11-21T04:30:27.750000
CVE-2019-16288,0,0,92937cf6d87e763628fef1055f728315d91d04d896c938b480984901d5c2ea10,2024-11-21T04:30:27.870000
CVE-2019-16289,0,0,d1f3ac9c27e374d60bd00c30adb08db898e081b3fc5fb3fcafc49f1ac4266e01,2024-11-21T04:30:28.027000
-CVE-2019-1629,0,0,f5842862e20f3452ee5ff6d5e383d36cd41ace2923efabf3b2d248dbb5ab0ef3,2024-11-21T04:36:58.060000
+CVE-2019-1629,0,1,52ba5066f024e3894f6d695d8dd7f670e813113f890b9116e63e105fb3c019b5,2024-11-21T04:36:58.060000
CVE-2019-16293,0,0,53eff338ae8eb17958f8042e2785050106ba13a109ac43d960457c4da3b5bc64,2024-11-21T04:30:28.173000
CVE-2019-16294,0,0,0fe8e588d386dfb306ffc6eb32a11f1a343a89f914339b0b177fcbadd7ea2ed3,2024-11-21T04:30:28.320000
CVE-2019-16295,0,0,c0d44bff5fa09bb3ae341c651d5533d71422c5ee9b1ab5e808433b26ec1afd36,2024-11-21T04:30:28.460000
CVE-2019-16297,0,0,da6e5cea35588a3e02f1dc255eb5277109cc7f41506bbfebcaa4c012a56955cf,2024-11-21T04:30:28.610000
CVE-2019-16298,0,0,3ec0a9f37824e78459a20d5f6fc4d4095e89a53d8b6ccd163a128571eea581fe,2024-11-21T04:30:28.750000
CVE-2019-16299,0,0,d96cd0ffd09b07b858d94c1df32e8f61c268723240b26910f40cd97243298770,2024-11-21T04:30:28.887000
-CVE-2019-1630,0,0,453c0f97b8e66367ac61f9b868c7ffea0b21bfab91946e3089cd52ed89e70ae1,2024-11-21T04:36:58.193000
+CVE-2019-1630,0,1,2632da5afe422633ffa967912895d1a6ae945913aab2fb0cec8b4d1e0c94c65c,2024-11-21T04:36:58.193000
CVE-2019-16300,0,0,a8efb29f8e619c168971b7123b584900abb9250e8bcca15b5426ab127f96a1aa,2024-11-21T04:30:29.053000
CVE-2019-16301,0,0,4089307c57d3d0f7e8b12c9953c670eb9cf62088d19b3b2c379b278db9bddf06,2024-11-21T04:30:29.193000
CVE-2019-16302,0,0,d5d4f9ee1cdd1020511cc8878147ebfbcebab8f48fc0ce9982eaae34b36a291b,2024-11-21T04:30:29.337000
@@ -134246,7 +134246,7 @@ CVE-2019-16303,0,0,a159a2ea3c9b0e4ba56d9560a2172d45ee9b2e99f93c792bd55cbf13fc8af
CVE-2019-16305,0,0,7273c24afbfe5d66c26aa5eb2cfb928d4c6093c7af6fd1b1b52ef5e9bc291e4f,2024-11-21T04:30:29.660000
CVE-2019-16307,0,0,789911acc8f35f29dbca6d44d918c1ee8e4f87db11a36408fe07af4603b18b57,2024-11-21T04:30:29.803000
CVE-2019-16309,0,0,50e73e5177be721a3e38348a9077826dbed5e84e90312a42611c0635df3083a8,2024-11-21T04:30:29.950000
-CVE-2019-1631,0,0,07b1ba909dc5c12dd7570ec79d881df47ebfa390adeaa1fe2eba29bc083f86ad,2024-11-21T04:36:58.317000
+CVE-2019-1631,0,1,e642c4e5ce0f985d67c5078df9a737585094e1fb01123090a56cc3a05477f9c7,2024-11-21T04:36:58.317000
CVE-2019-16310,0,0,533dc4d2dd0f02560efd656324ddba58ec61847ff5301b1e0d802f533e2fdd4e,2024-11-21T04:30:30.090000
CVE-2019-16311,0,0,f19991643b584a94615afa00edb079f9a7e077bf105d6ac6a97688b0728e5435,2024-11-21T04:30:30.230000
CVE-2019-16312,0,0,2c7f1d35b087352258a873e939c89258318591c60c575237c5ae9c79a922a0ed,2024-11-21T04:30:30.367000
@@ -134255,7 +134255,7 @@ CVE-2019-16314,0,0,6461524bc93a056685890fca1040ecb3988c144266f8476a7914f5ee95f92
CVE-2019-16317,0,0,2b7afa1c9ce0607074632b2f8ba05535d13371f71bc509b7e5a51442477a31d7,2024-11-21T04:30:30.777000
CVE-2019-16318,0,0,67c4e9b05bc88f4ec1f26d228ab318bc739f6f03b8474e57c606ee761a1e4d71,2024-11-21T04:30:30.917000
CVE-2019-16319,0,0,d8bb90dd7840cb197191dc217657a8e279b6bed15c43b81330832da1134b704e,2024-11-21T04:30:31.050000
-CVE-2019-1632,0,0,729c34b1503a1498c37b80894a11e585b3129c1c8908358576e9d81d272ae884,2024-11-21T04:36:58.450000
+CVE-2019-1632,0,1,5f69420f101f3545517d68c353737a37cb2e476b0d033d66056edddf52b332cc,2024-11-21T04:36:58.450000
CVE-2019-16320,0,0,af0f8b163b3501c322d5223db8651c8084712c5f68c6b00b1822367138b3271c,2024-11-21T04:30:31.210000
CVE-2019-16321,0,0,da62af88c7721dd247196020d005106b916aad8114be3e2daf6ca006724b454a,2024-11-21T04:30:31.363000
CVE-2019-16326,0,0,ce149ce424c063af3b9933900f4fe52fda5ca51894493f86458fbe0d69d5d081,2024-11-21T04:30:31.497000
@@ -134269,30 +134269,30 @@ CVE-2019-16335,0,0,fd136188d493192229f1280623e3a5354b8ba93e9b3c402a578fda57ebda5
CVE-2019-16336,0,0,33843c217e4539c4fa814d0fd67ea527fcf3dc535698a3e3ecab334c0f477e8a,2024-11-21T04:30:32.823000
CVE-2019-16337,0,0,67887d8a546a80509a127bcb2859c779754a3d1a2cf2dc59bf3a51281fda2a1b,2024-11-21T04:30:32.997000
CVE-2019-16338,0,0,86d3fbc679197006b9e9fbc6e2a177d3b3951207902c1fe453a0da1b1ba954de,2024-11-21T04:30:33.160000
-CVE-2019-1634,0,0,4b76c19d74c3aeb69d89bab347dcae78f245e7ba5709c82572c57317c5d7697f,2024-11-21T04:36:58.597000
+CVE-2019-1634,0,1,351f728686a32ad27319e7618932fcab01d395e3bed2f6431e03740769083ec7,2024-11-21T04:36:58.597000
CVE-2019-16340,0,0,b9409a4c38cc3adaa7147fd41b3de3020403977a5e009cac767e8a90f9d34221,2024-11-21T04:30:33.307000
CVE-2019-16344,0,0,d5d70d8fe1fb10f1aff3053eb441c589017a5a043e42e0c4f028f0f03b212ad5,2024-11-21T04:30:33.453000
CVE-2019-16346,0,0,50a41752bc5823fd628d9df55a40deeab5d4edc514eed1b84921d76986f76be1,2024-11-21T04:30:33.600000
CVE-2019-16347,0,0,84702f65a923a68dcb041f9ffb4d7de5f6a3e8e0d80b7e6d1ceeced9b3fc73c8,2024-11-21T04:30:33.740000
CVE-2019-16348,0,0,1389e98f4908c94c4b2c337b13b7278cec4449cf537899e8738f9351f90e760a,2024-11-21T04:30:33.887000
CVE-2019-16349,0,0,14f0816fa6cdad92cf0372019e25c250508704e69ac5d017427517b0cd9df3ef,2024-11-21T04:30:34.047000
-CVE-2019-1635,0,0,a8a87a0b5d2c753fd0b1377d575b5b8b3794da630b112668384ebbccd57f58df,2024-11-21T04:36:58.740000
+CVE-2019-1635,0,1,10405b65d0db5ae29e1a2f14f38a9a6d2ac38770b028a9d192a9cbc0ead97fbe,2024-11-21T04:36:58.740000
CVE-2019-16350,0,0,82bd0bb2909da9eba94a08686a5b99fbd81e2eac50b2c97146a1f12f2c0e3423,2024-11-21T04:30:34.197000
CVE-2019-16351,0,0,054c99b0d6d7119bc0f9337c8f089067abe0ee679124ac0540491e5acfa511bc,2024-11-21T04:30:34.350000
CVE-2019-16352,0,0,207f0de8c4dca5fc8c2549a6a45578337a8e4a7fb6deb440c3377c69c1731b33,2024-11-21T04:30:34.503000
CVE-2019-16353,0,0,fe6b27d0400e4c46627aed0d7a99b0ce3881812e80fa5f01a4126fc4044e8c48,2024-11-21T04:30:34.663000
CVE-2019-16354,0,0,69d41a2042a003e8c9b20437c9679cbb8ef1bfed9fb8d0286ac4afa21166f397,2024-11-21T04:30:34.813000
CVE-2019-16355,0,0,705e3a78c7d9ac1cf29630b4b47808a377946c3c921719d057a25850d296876f,2024-11-21T04:30:34.963000
-CVE-2019-1636,0,0,e7748faaeea5238b9fb46ebc6af4f945642e58ee8e5cde8e70c7cbc7a9c9badb,2024-11-21T04:36:58.893000
+CVE-2019-1636,0,1,ed83bdeab26888bc35634ed64f782a32cc2831012895077346094f1d857abf99,2024-11-21T04:36:58.893000
CVE-2019-16366,0,0,2cb1be6e13bb8542998569240a10ef7053e7ae490cd72f53bed6b00ee1464bd1,2024-11-21T04:30:35.113000
-CVE-2019-1637,0,0,7c6885dd37eba0202d71e29d724c7acb3aa3495c837325f322973cdc737037ee,2024-11-21T04:36:59.030000
+CVE-2019-1637,0,1,cc4de0512a3c4992c8d92be887feba8f5cae49c2412a2c518d95d561ec0ff331,2024-11-21T04:36:59.030000
CVE-2019-16370,0,0,37cc9b3a1c8c59d61e6bfeb597a2b737295b67713803454f6a33b4ec91315485,2024-11-21T04:30:35.267000
CVE-2019-16371,0,0,3cb4fe6dd2f90c70065d6683f9eee636b306bd5032a63a81002b41a5f1bf259e,2024-11-21T04:30:35.420000
CVE-2019-16374,0,0,ad0d499514b79ce14fe68c15b036b7e3f567865adf4fdedeed8622a3499786c8,2024-11-21T04:30:35.573000
CVE-2019-16375,0,0,2f9ef36c1d83c2a05b0b926b51c3d78eabe9b7d789cc215f5d294bdc1684a05e,2024-11-21T04:30:35.737000
CVE-2019-16377,0,0,958d04991f08b1a3e4967d8ff50c79036c95aa54e843540aaaf33e9ab0d98f57,2024-11-21T04:30:35.907000
CVE-2019-16378,0,0,fb024b03357f7701363a4f2ffb5217868631148cc58ce2f5e17989a23e67203d,2024-11-21T04:30:36.060000
-CVE-2019-1638,0,0,b74d189a882dedc6a8df2f2b45507806f680af341a371107e15aca1594c673cc,2024-11-21T04:36:59.170000
+CVE-2019-1638,0,1,827d5cc0ca44bee961144bda38642f1d8a1db5a3befe505c04ae80313f9fdc71,2024-11-21T04:36:59.170000
CVE-2019-16382,0,0,6b9cba62dec008e5a3242d91c961b3a71962e83f7b05de6f04e50f0645e9c67e,2024-11-21T04:30:36.233000
CVE-2019-16383,0,0,2e8cb72132e7d254fe51b334044ce98787f7e4c143a9e5f639a8ec0c8fb60c48,2024-11-21T04:30:36.380000
CVE-2019-16384,0,0,17fff4dde7256d0576ed049b189e5a5f050009f5709f05d3482f2a88d8a1f1d0,2024-11-21T04:30:36.530000
@@ -134300,7 +134300,7 @@ CVE-2019-16385,0,0,eabcf304ee6aa3bf94c5fd9016288795202c1843634933e776bf843275900
CVE-2019-16386,0,0,a8b2f981d35d440d0a7079025a31287ed221234990b0237e8ee46fe5fc2289f7,2024-11-21T04:30:36.817000
CVE-2019-16387,0,0,7ef9653ee33a134c7716e4fc538785ad990cea8aafe4b13ca631db95774babe7,2024-11-21T04:30:36.960000
CVE-2019-16388,0,0,3fdcadb7ec8aadc7c2688967205bb044956182c00b872dcf4409d2495d4ff821,2024-11-21T04:30:37.103000
-CVE-2019-1639,0,0,4b51942b403ba55ce545d29b3f8c3aebe8b0264ff8d45d88524ba0580d4fa46c,2024-11-21T04:36:59.300000
+CVE-2019-1639,0,1,c6dcd00220fec45ea61ce5a713593f4f36afb64896aa31f586aba1ecb41ae5ca,2024-11-21T04:36:59.300000
CVE-2019-16391,0,0,f4444ef7966f6168a9efbbf51fa5b95c3bf67e627410ead010f318781d366ad2,2024-11-21T04:30:37.253000
CVE-2019-16392,0,0,05946b702ade1e6e59135a82ed1a791f399456feb332455d53b1f8ec9a53d7e7,2024-11-21T04:30:37.417000
CVE-2019-16393,0,0,bb5845b6904c5ebc4c918e498560c49177f8aaeaee353b67497c5eeb8600a30e,2024-11-21T04:30:37.570000
@@ -134309,7 +134309,7 @@ CVE-2019-16395,0,0,dc56fa444915280fc2db067a28b2258db570abc3acbf3b52d9dfb9f8a47a3
CVE-2019-16396,0,0,a77c51f83b4ec357782a2c68d786d88ce468e1fd54df94993d8f5eced04972a9,2024-11-21T04:30:38.010000
CVE-2019-16398,0,0,dfd290b3ff178cdb2c3d5ce2864f20f7cde81d3768323c06f0c89c8344241313,2024-11-21T04:30:38.143000
CVE-2019-16399,0,0,fb58f4d7148a0756c62d513b912cc1f3b45ba4c36f0f848bf62e2057b453c7da,2024-11-21T04:30:38.273000
-CVE-2019-1640,0,0,622b15884874f4c17d7c1e06e7283a91ac45059b94e2fb20561d046a748ef5df,2024-11-21T04:36:59.433000
+CVE-2019-1640,0,1,65af688f677d2477d215296b73adc0f7f51bffa8eea34458527618fe9ff29e30,2024-11-21T04:36:59.433000
CVE-2019-16400,0,0,5c8d0c903af2c8c24a938fbeb8cb90b0e1a8f938290e4b48c8c411f86716ec97,2024-11-21T04:30:38.413000
CVE-2019-16401,0,0,7747efd76ac3fee466ce9b7ae3e8c93b3f5b216838109e7dce1c61f7202e32bf,2024-11-21T04:30:38.557000
CVE-2019-16403,0,0,f86c96f3ef1148c57393080c94b4078149ed870f2958e81b778e6bb912139164,2024-11-21T04:30:38.700000
@@ -134318,7 +134318,7 @@ CVE-2019-16405,0,0,030dccd4fde079e53d13f957c38c6b19cac6c32a06c5cf76b9b43cc6401b8
CVE-2019-16406,0,0,f41bfe95d65e383de1023580575040da1e1d29591ed457f7ae172e2a3f75159a,2024-11-21T04:30:39.170000
CVE-2019-16407,0,0,2af2e2545bfc2a203aff5b1b8abaf1f07aca698947634df84f60261a18014f4a,2024-11-21T04:30:39.333000
CVE-2019-16409,0,0,a6ee7d158f74455a8e893ee17ebed0b4a02a761e6bb3b282d01e3b92bb73ac23,2024-11-21T04:30:39.470000
-CVE-2019-1641,0,0,2aa13c3f65efeb2594b2dec73c00d0b97f6326f0034fd7b1081c17646fe621c0,2024-11-21T04:36:59.567000
+CVE-2019-1641,0,1,8b21b2cf2eea76324b74ddb5f94616db10917d4dd6630d3513d52c216e5851e0,2024-11-21T04:36:59.567000
CVE-2019-16410,0,0,7ab95f1d1bca12750971843428c7b1d006d71a363c3489332233def40324f664,2024-11-21T04:30:39.620000
CVE-2019-16411,0,0,ab6f33de307bb18f0456a7b503b8c644217a05f5db7d4442c2c50174a356ac31,2024-11-21T04:30:39.767000
CVE-2019-16412,0,0,c3c0f0b14c2adaf5815c6cf829a5ea711e99ef96abd91fe39935b87de46361e6,2024-11-21T04:30:39.917000
@@ -134326,15 +134326,15 @@ CVE-2019-16413,0,0,f0a8ca6b1168621afd3557754807b4ac597a057d3f40cae561b9b0b8ef9e6
CVE-2019-16414,0,0,61ef2b60e9b5b1121eebd42caa69c9188c2120b347842416a965a5029800f828,2024-11-21T04:30:40.220000
CVE-2019-16416,0,0,68966967673a1041cf8174646c33fbb826ed4692b3912fe16b716e749fe35e4c,2024-11-21T04:30:40.363000
CVE-2019-16417,0,0,f53177848e044225083e7b89ebc179c4fad2ad02abac921e310e1d14da1a850f,2024-11-21T04:30:40.500000
-CVE-2019-1642,0,0,bae3e5c18717b78e74f2e2ba7b6661eb2b85249ebd23528956559ad43fe4ef1b,2024-11-26T16:09:02.407000
-CVE-2019-1643,0,0,a6091c10e8f7c15235fcee94d7a87f6681ee79803114973579f1d66ea876d869,2024-11-21T04:36:59.823000
-CVE-2019-1644,0,0,7965c10945e62aea5ff5b473cc3b3d448ee39f6460cba02d59e0c5af88f01c56,2024-11-21T04:36:59.957000
+CVE-2019-1642,0,1,6e9c5340611e00235bea46a6546287bee8c7b67981810a2aa66d04b7cb8c561e,2024-11-26T16:09:02.407000
+CVE-2019-1643,0,1,80f6a4d2c92ba64a992ee7110e321a563511319d62e0f47c003ae085bdba8260,2024-11-21T04:36:59.823000
+CVE-2019-1644,0,1,1a7cf5bff7d5fea739928dc9401575d6ba473aa6ec62ac5fb42d189120c76258,2024-11-21T04:36:59.957000
CVE-2019-16444,0,0,7db2ad405b07deebdc98ef3a10556766ce37ca59e04382b91f61e7f8ddb22dfc,2024-11-21T04:30:40.637000
CVE-2019-16445,0,0,50bfd816ba9308202ed14204a43705e41c640c2adde767baa33b6a03c76e6a01,2024-11-21T04:30:40.750000
CVE-2019-16446,0,0,76b17965f1ade8c3bd62fa83f968179b1bdf89cc2a2b8793fafef4bc3f4f22d3,2024-11-21T04:30:40.870000
CVE-2019-16448,0,0,4a8a031b44f4fb48c63f2ced751389c843f5d9d85582e519aeea11a4dbe29b11,2024-11-21T04:30:40.977000
CVE-2019-16449,0,0,fabef0ea524511d624be6a43756051c94b516ca9b16d2904efe8a9a670e3d15d,2024-11-21T04:30:41.087000
-CVE-2019-1645,0,0,a5d2fcb99f69ca3f29056602abdf5a8d2e0556be63ad1cc9abb89221edb24979,2024-11-21T04:37:00.100000
+CVE-2019-1645,0,1,b7f2fcf2fb620c0d05d144a48bbcc8e38d49bd9ffa9985635dd9c464868bedc8,2024-11-21T04:37:00.100000
CVE-2019-16450,0,0,2096b80e7d4493056dcbfdd33237333db33569245f82bccfa6125ed15e5db5d9,2024-11-21T04:30:41.193000
CVE-2019-16451,0,0,f631e4c670f291573942657f89e84a0a992da97212b2b154307df42b0fde0034,2024-11-21T04:30:41.303000
CVE-2019-16452,0,0,5b24c88c9fa1c6c05d1887f24b0a7dac82ed4bcfd4205012817a075d9d953b14,2024-11-21T04:30:41.423000
@@ -134345,7 +134345,7 @@ CVE-2019-16456,0,0,648b0640148d0a6dc1dd31a1a2e91caea197cb8c6712ce4b2c9c1f65a3119
CVE-2019-16457,0,0,858b40bc1f90730e6416cc4e56e4232ebd4767620f0a90079447c31225310dc1,2024-11-21T04:30:41.967000
CVE-2019-16458,0,0,1d4fd09541c9c94873813712fd915e22e127b6661ce1eb6026072810c05fe72d,2024-11-21T04:30:42.077000
CVE-2019-16459,0,0,4c9dedf377927a47dd5cec20e6481dceac55bc97139ac427a3bf1309a60a47c1,2024-11-21T04:30:42.190000
-CVE-2019-1646,0,0,8eaed1f215a5c7f6a52cfe695d8a57a252404b42b25207989aad2aec976122f5,2024-11-21T04:37:00.230000
+CVE-2019-1646,0,1,25c40e10de985ecc65439474b2fa3b4e249973affbbd84e2efcd32a0a6e0ee63,2024-11-21T04:37:00.230000
CVE-2019-16460,0,0,49ede21d5d124996b5feb8cd064a3de67fb040b4f0b25051e3cf66d12b8937b0,2024-11-21T04:30:42.300000
CVE-2019-16461,0,0,203e3a0d23cf7ebab4d15aa0b577afc0a5eb3870186e465eab3c5818666df69c,2024-11-21T04:30:42.407000
CVE-2019-16462,0,0,943eaef65ddda462ba3c0ea5931669ad4963fc0dd783f9340b20c4285a213656,2024-11-21T04:30:42.510000
@@ -134356,14 +134356,14 @@ CVE-2019-16466,0,0,62963fbeedbd68e821c5b29e66b41ea7c6f8ea70c33b988a614f06302100d
CVE-2019-16467,0,0,1073b6b0306e3e00830b0ab1549344eebf37f67b1d79edbf7c822ab0b3b2868b,2024-11-21T04:30:43.057000
CVE-2019-16468,0,0,ea1659a4711ef046573b67a34a9608a9f2a3e4d8a15c44b4362f79859ffaea58,2024-11-21T04:30:43.160000
CVE-2019-16469,0,0,9c9329ac79ce4a03968c57ba6d0f5803b6a5fdd868c1cf342e43cb6c69ae3b5a,2024-11-21T04:30:43.267000
-CVE-2019-1647,0,0,678f83c01ac4e5670f23a62830e41582d7947892561f66750430efbf896f6322,2024-11-21T04:37:00.367000
+CVE-2019-1647,0,1,3a9146f2a68c967abae04e982c02262b3805cb42270ddb51eb883f8d97531a58,2024-11-21T04:37:00.367000
CVE-2019-16470,0,0,d5eafee56ebc0c1d98c48af14f59387719225f0b17620a0786417ef238bfb900,2024-11-21T04:30:43.367000
CVE-2019-16471,0,0,c94ea60dee0f871ff9298877eed9f2a0f0b4b394b5c29bc66b8832bdf7592d99,2024-11-21T04:30:43.493000
-CVE-2019-1648,0,0,7ee7aff7bcbaa9c89405ebb375353304ab25a9e9336d4fbb2d96c07dfaa84768,2024-11-21T04:37:00.493000
-CVE-2019-1649,0,0,22e712d0bff25131be779113341c22d8717fce7b68bc0e4b1177361fa7bb160e,2024-11-21T04:37:00.627000
-CVE-2019-1650,0,0,067275d1888d50111f5845f5905689a5f86e60bae3a0e6e4c3d85dccd5998892,2024-11-21T04:37:00.823000
+CVE-2019-1648,0,1,052d6fdaf612047710bc377d5b2882364d4484e46ec3f7d32bad255cbccc5486,2024-11-21T04:37:00.493000
+CVE-2019-1649,0,1,d7c49e8c1bd9ea7950b575ce44e8f5e98e7083cdd44cf70f7a74d56396382a04,2024-11-21T04:37:00.627000
+CVE-2019-1650,0,1,25c81a38d03d819967daaf22127f6ef51f8ec6dee838ee408ac560b1768fad75,2024-11-21T04:37:00.823000
CVE-2019-16508,0,0,d4f157dc45226727be5ac7757738ef416af1c2ffa8375bf34ef5a171e8729218,2024-11-21T04:30:43.603000
-CVE-2019-1651,0,0,392f9155989ec6f14440c9d8d370058ceb006cd96af87c081f4530abf237c782,2024-11-21T04:37:00.943000
+CVE-2019-1651,0,1,7ba6686d37104b4cf5b22d36a8ba28076318ac8fd4781e419a9b0be115205f72,2024-11-21T04:37:00.943000
CVE-2019-16510,0,0,7c50471dd1e724be7b06f9d4b861c89226e59871bc9adf499f2675e51cd23d85,2024-11-21T04:30:43.740000
CVE-2019-16511,0,0,6fbba874e360335310fb77e3eecf3ad06dae473fe3eef3dfa8bf09d12ee651d9,2024-11-21T04:30:43.880000
CVE-2019-16512,0,0,0928706380619c63c516534e3a62dab1c7ffe7f8ac80416e7d084df40ca42239,2024-11-21T04:30:44.020000
@@ -134374,7 +134374,7 @@ CVE-2019-16516,0,0,d30583ecc33ac622b8bef687c972d231e6e7a88cfb12a2e2eb5e602a80e12
CVE-2019-16517,0,0,06e1e2d9a09c82ac5e37c416ffdb091067576da11213abe67a353352608be8d0,2024-11-21T04:30:44.773000
CVE-2019-16518,0,0,371ff8cd1814b34e4ee5f74c84ea4bc85e40aa0b4dfff5c305e6a526ef4d55bd,2024-11-21T04:30:44.913000
CVE-2019-16519,0,0,e0e03160c7a07f50bc7ebffea82797083edc2d36c364829cc3c57b96868e1bae,2024-11-21T04:30:45.043000
-CVE-2019-1652,0,0,590d0dbd1a539504bf35541a6d60d87d33db903a4509a990ae9d3aeb36c254b0,2024-11-21T04:37:01.077000
+CVE-2019-1652,0,1,900a2341011460e050cb303cb559e878f1799f9566a1f07eba6f9d1b039ace4b,2024-11-21T04:37:01.077000
CVE-2019-16520,0,0,8dba449bb9571e640f531f9d6a74aab5838cdc579f2092375f63ab7671df12a0,2024-11-21T04:30:45.180000
CVE-2019-16521,0,0,b9665867e96d541e593baf6f0269bffc6571e5ebeef46426432c63848794b77a,2024-11-21T04:30:45.330000
CVE-2019-16522,0,0,b2fe50efec30dbae822dcb51e3e840a6b9d4a94d74a867b679e8011e2bb31f87,2024-11-21T04:30:45.480000
@@ -134383,7 +134383,7 @@ CVE-2019-16524,0,0,86062eaa5d3a56389c6161887c5b3292dfff8795b8e06edaaee798ac8f419
CVE-2019-16525,0,0,d700e936a66636f4a7e0e4e04bcf75ea45d18da03b86df61bcfb22ae8c879579,2024-11-21T04:30:45.920000
CVE-2019-16528,0,0,1a759b2aef5e7e418517cdc01d9ec910edde97377e1e432a3ff7b07984ca7b25,2024-11-21T04:30:46.060000
CVE-2019-16529,0,0,5b55cbc6dfeb27ca2e8bd70dbc52262a449eb54eef77bf175df8b43758533e1a,2024-11-21T04:30:46.203000
-CVE-2019-1653,0,0,fef4b1cde8001f32b3c4d3a6acebb290f61495f07692fbd88f42abc805f67666,2024-11-21T04:37:01.223000
+CVE-2019-1653,0,1,d4a28269229bd5799b67e8b7c6e09aeae373477d98abb97181db060a9fa5f39c,2024-11-21T04:37:01.223000
CVE-2019-16530,0,0,01387f56ffcd7a26a3e9fe11c152a42d7abd377d00d94f1c8174fab8d063a4af,2024-11-21T04:30:46.343000
CVE-2019-16531,0,0,172383ab40b6099e9d1216efe38c87beb985f309229e66e7019d6a9d5664b68c,2024-11-21T04:30:46.480000
CVE-2019-16532,0,0,00c12348ad90d933237a6bedbdad7630b1f2315d42edcbaa9f858b32d02701e3,2024-11-21T04:30:46.607000
@@ -134392,7 +134392,7 @@ CVE-2019-16534,0,0,b8cd3a4caf58fff341660dc3f6ae2c9dddebda869ab485c641f77e65f337e
CVE-2019-16535,0,0,7dc8ac2689e405f410a4eea9c92c0ca322bc0d86958188411657f4a7214344a3,2024-11-21T04:30:47.033000
CVE-2019-16538,0,0,995fc2a04e0441c78315e326891241cb00233a90a3d004d795ae3c0385ba5f8d,2024-11-21T04:30:47.140000
CVE-2019-16539,0,0,cd64e42a64b00853e655eaaefef2132bb5046e4d97764aa715e2d499543453fa,2024-11-21T04:30:47.253000
-CVE-2019-1654,0,0,a0174c52b165a5f2b7159a4522f8bc5236274e2c853624d6d130fa33d8feab64,2024-11-21T04:37:01.390000
+CVE-2019-1654,0,1,9db86d5fe2cb603a176ac1ff7edc12527a169c530b7cf57ffd5b8fb3c4b29917,2024-11-21T04:37:01.390000
CVE-2019-16540,0,0,5e35a6da9b37209936832ce77e451fb7c0bfe52d0fa8e09bf1a3a775bac5631e,2024-11-21T04:30:47.377000
CVE-2019-16541,0,0,70f6b5ad58037ab4383ccf993f827cfcba70a93237b2a2eebb1ab3801f0cba2c,2024-11-21T04:30:47.490000
CVE-2019-16542,0,0,403205fcb0d99e5b5b5ba84ceb6de11458b773f25a4c5a858f4c4d5302bcbf2a,2024-11-21T04:30:47.603000
@@ -134403,7 +134403,7 @@ CVE-2019-16546,0,0,e887430ef343bcf635c060f96a3eb98e7c54c50d45e6687a6c4845c761742
CVE-2019-16547,0,0,20309211b2ca3a613fbf13746f796ea162c89fc74458e02bcca54d21d4f0379d,2024-11-21T04:30:48.150000
CVE-2019-16548,0,0,33cc5ad1dbda8c1880cffa1e0cab352f8f200246735f11cdfc6b3d17cd681fab,2024-11-21T04:30:48.253000
CVE-2019-16549,0,0,b474ba04676845c18fabda204b43ee5232922014b637f238c58bd697e6454a00,2024-11-21T04:30:48.360000
-CVE-2019-1655,0,0,00a879b19e25cf6d65496f1fc59e28552ea47172d42037bf1cc9178c6dd14963,2024-11-21T04:37:01.567000
+CVE-2019-1655,0,1,ecc7ddaddadf36b68997aa583f4f3a8c9db9c37b2ce68466bdc6dfbdf33fef68,2024-11-21T04:37:01.567000
CVE-2019-16550,0,0,cde88d8dc7b029f048151e5bcd6d6463c61713ab8073777d893d1a81ac4b9e8e,2024-11-21T04:30:48.467000
CVE-2019-16551,0,0,e3e039bc7bd1379a5714c8ea6a8331f5f24702ce2f7046d35db8f5b2c1f75d17,2024-11-21T04:30:48.580000
CVE-2019-16552,0,0,47222acd671aa4eefe911293bd8386ce1bfd2ba964cb58dc1506427c9eea4d59,2024-11-21T04:30:48.693000
@@ -134414,7 +134414,7 @@ CVE-2019-16556,0,0,79cced8d8cc205038b191bf66bf4a61fce3fb1bd1634b2c3132c2b4cc6f22
CVE-2019-16557,0,0,0f5267df0c37bc26e9941cf149019a7cf23c24fe3ce2cb9b2556c45f7b299496,2024-11-21T04:30:49.217000
CVE-2019-16558,0,0,fdf28446e24efcfccdedcbc1d1d9a8bc944b4a227566ce58e0ab50f8ef5e9737,2024-11-21T04:30:49.347000
CVE-2019-16559,0,0,ceca9320f3ad88d52562631195f0b778f9d664f738e0167963694685b909dc27,2024-11-21T04:30:49.470000
-CVE-2019-1656,0,0,e5c2fa36dab412f2ca174777ccb3677da315b20e204deaaad7f4b23e5ee1e8de,2024-11-21T04:37:01.707000
+CVE-2019-1656,0,1,50603cbd2aa8565b3636447ddc1083a9ba6ab8d6ffcaa15f0a4eb1f13cce195e,2024-11-21T04:37:01.707000
CVE-2019-16560,0,0,08bccf986b8163655e773e2a71e7872ce0dcb59efaf8baae551bb7afeeb50780,2024-11-21T04:30:49.577000
CVE-2019-16561,0,0,b6c71ba3a6b463af38d645b3e512546525b724cb3c600e988d9c8dc517a94fba,2024-11-21T04:30:49.690000
CVE-2019-16562,0,0,b7f6b5c10dab1683d60dc12a23826c7d2f1f8caa8397228f7abdf0c2389f2390,2024-11-21T04:30:49.807000
@@ -134425,7 +134425,7 @@ CVE-2019-16566,0,0,775a9c2dbc6630f6c82dd34ba4b50b1785d4615a9425148f36f14c3f5f10a
CVE-2019-16567,0,0,a65e00e7bbf92c84e376eaba0de69f5b3e910e5c63eb0b0b885f2d057e282d9b,2024-11-21T04:30:50.390000
CVE-2019-16568,0,0,abc690cd1a9ef283f66278e5b70475a37f46f3ecb0a6eb45229f95b4f688f65d,2024-11-21T04:30:50.500000
CVE-2019-16569,0,0,2fa37b82345adc144141ab44c3cdcf9285f1f6815bb9dd84070070c1ca39f73a,2024-11-21T04:30:50.600000
-CVE-2019-1657,0,0,0d22bafa7175adc59c9e25094b87c89d600e0501b1d61b1004456b6642aac7a9,2024-11-21T04:37:01.840000
+CVE-2019-1657,0,1,34659641e40a60c43fcb897080878fcbbccc5f4da2e0324fea58d271f7551e1d,2024-11-21T04:37:01.840000
CVE-2019-16570,0,0,76e97746d7130fb28a1a8ed3e9bebac264c131b4645aae5737f0ea3b4ad89332,2024-11-21T04:30:50.713000
CVE-2019-16571,0,0,d55b7db49b605d26a54c7e4a7de8cf3ed5e98b851c1632936f84bef3dd88a8bd,2024-11-21T04:30:50.827000
CVE-2019-16572,0,0,8599d04b766ede6648767ef0c4ed1d53c0c06bc757553b8a107587963caccd27,2024-11-21T04:30:50.933000
@@ -134433,15 +134433,15 @@ CVE-2019-16573,0,0,0807de6b32bbe54d2b7ba03d25649a3e6077cf4bed1a071415c115da5c626
CVE-2019-16574,0,0,47f864ade9491e9a7ff46bb2c624c2f8c3ef3195f8d3d8a4540b0471aa2f94a9,2024-11-21T04:30:51.177000
CVE-2019-16575,0,0,32c1f2d793200dc425f281e5ca123db8ad8575cf9edfc289137307d4c93f1104,2024-11-21T04:30:51.283000
CVE-2019-16576,0,0,0196950edc8f4d3db3189c5eb51eba327eb449c7b566b7accd5b72939ef3f334,2024-11-21T04:30:51.390000
-CVE-2019-1658,0,0,2d0ac8b567b4bcc3e80d8bb3513c3d85c51e5ef7df0fb567b9f8fdfffe3959e2,2024-11-21T04:37:01.980000
-CVE-2019-1659,0,0,b7adc4a12497568c2b7909ba9f18faeebb048be11565b6b56167546d5e38c142,2024-11-21T04:37:02.113000
-CVE-2019-1660,0,0,2716a911cebd8a3247f0eafccb13d71aad9b193e47bf33b040208a5591722e92,2024-11-21T04:37:02.263000
-CVE-2019-1661,0,0,1f5084e6a8ea358f0252a04a062a7d32953969dc14d0b77e75eaaf8c56daf114,2024-11-21T04:37:02.400000
-CVE-2019-1662,0,0,93cf1ba0262ecbcb61378261e6e7bfc00b9f004618b5ee91e8d8c1f9ee56de71,2024-11-21T04:37:02.537000
-CVE-2019-1663,0,0,3f75123c48b2a8c52f8cacdb2de41680a28156ae1eef710ef5147e3521db1d70,2024-11-21T04:37:02.680000
+CVE-2019-1658,0,1,ed05923c6ab59ef295d83652ef6b63c8b44ea4e531e307f0a76b9112b83bfb82,2024-11-21T04:37:01.980000
+CVE-2019-1659,0,1,7af1a798fd38b82fdafa88bbc0d7771b80de8777a146a2a29631b0667c24ba38,2024-11-21T04:37:02.113000
+CVE-2019-1660,0,1,ef994d20a1dc70ae7ea78faf670052d70d8a3d80f1e10d058942cf6f4ef07e6c,2024-11-21T04:37:02.263000
+CVE-2019-1661,0,1,8856120d96e32172e71a36204ebdcd07fe42c557bb89fe1f3544c755107a2161,2024-11-21T04:37:02.400000
+CVE-2019-1662,0,1,a52164da59f6918e2a18751518cf7c2abc0dd3152ea8331d99f9739fd6f7f41a,2024-11-21T04:37:02.537000
+CVE-2019-1663,0,1,858182e694bb1c6fa350a7299f64b90ea7b008a5edffac5e8e0ecf5c81a305c3,2024-11-21T04:37:02.680000
CVE-2019-16638,0,0,3797d6a3cea8623d5d2aace426c14a79b68b81fa4668cfbacc6cb62515828345,2024-11-21T04:30:51.497000
CVE-2019-16639,0,0,2ea5e4f9b64c86b85952eda9eb2f66346e5abd2b25a1ba8688058dec5e5f76e6,2024-11-21T04:30:51.677000
-CVE-2019-1664,0,0,c951adaa8444f3cee21ce6ba2366b120e4926ec5da813c765203e7a93c826f98,2024-11-21T04:37:02.840000
+CVE-2019-1664,0,1,ea1f41e02e9700a19837e4ce1e3b4122fc7b7bb1dcbbdda5af10155b7e87b4a3,2024-11-21T04:37:02.840000
CVE-2019-16640,0,0,dc41c5c5a11878d8b9fa7842e9185364645c72389f27f988fa3f9b7f37c49a76,2024-11-21T04:30:51.883000
CVE-2019-16641,0,0,38ea34afa5ac5774d58fa3dc8fbf761122f80f46742466ead6654d8158b55495,2024-11-21T04:30:52.080000
CVE-2019-16642,0,0,bdfa69b06e4c88a495080442dec984dd61446ab8814ec70ba20916cd871cd1d6,2024-11-21T04:30:52.283000
@@ -134450,7 +134450,7 @@ CVE-2019-16644,0,0,8b2cc56effea0a755255685634300ba768648a8b01acb1323d6a879b71b9f
CVE-2019-16645,0,0,4589a824cd92d9811520972ae754cbdcb3ee37a0cb2c5c1695ff83fd9270f890,2024-11-21T04:30:52.687000
CVE-2019-16647,0,0,293018ec86d92bd6f5feafb0534e4656b11ac8c3fac05f96e3a88691b8c4919e,2024-11-21T04:30:52.820000
CVE-2019-16649,0,0,96add125da0012719a38f82a3bdd3d2018a7cb18fdb9b1600566a3204a686dcd,2024-11-21T04:30:52.953000
-CVE-2019-1665,0,0,30bc8d457c6cddfa7eed095ea62ed2909bc30785c20eab1d6ded6376e2e4bdc7,2024-11-21T04:37:02.987000
+CVE-2019-1665,0,1,cb4b67f9394d666bef73cfd8782757e8499fe532d984432b8bf8d9b05cdf5e24,2024-11-21T04:37:02.987000
CVE-2019-16650,0,0,673a67923713883c989b95f3c506c763413647fccd6045537b93ca7a48e32be3,2024-11-21T04:30:53.483000
CVE-2019-16651,0,0,3e6f03adddaefedd0c97f179d0ca1a5abf81ba0214fcdde41903c2b58b58236b,2024-11-21T04:30:54.203000
CVE-2019-16652,0,0,61c86f5ac46e52daff3598713a964cdb43d970ef798daaffd1285dd06fbf2b65,2024-11-21T04:30:54.367000
@@ -134460,7 +134460,7 @@ CVE-2019-16656,0,0,24c9e4c4259126d03acf1df2ab189244bbd0c27e0db448913c3e9a62c2a72
CVE-2019-16657,0,0,ebfd2035051e23facacb76275a4df8cddd4a80da7f01af54c83698b77f044123,2024-11-21T04:30:54.990000
CVE-2019-16658,0,0,a9eeab5f25e7cd7c0b66fc3432446afd7698bc7358140c0bad0aff53b878d264,2024-11-21T04:30:55.117000
CVE-2019-16659,0,0,7d2f08d9bf6768dd05c4c3020a7c6938d34a57f815a4fd803e2041699250ce2d,2024-11-21T04:30:55.247000
-CVE-2019-1666,0,0,84284272fc4d24c6e2b0293b3b9db6d9f937686c45160a7fc8962538a9db61c5,2024-11-21T04:37:03.137000
+CVE-2019-1666,0,1,d3cd7927b128f3523a74d04da0665885a2124b3c770589b34b4e65479ab436db,2024-11-21T04:37:03.137000
CVE-2019-16660,0,0,6185ba56c40ba97803ead4917a828ee59fbe6f60cf6793bcc9e92897f2adc07b,2024-11-21T04:30:55.380000
CVE-2019-16661,0,0,5ac21edfd9bffb5c6f4a29b7abeb6f59a392ca868541951f8c050dbc34a97518,2024-11-21T04:30:55.513000
CVE-2019-16662,0,0,ac81d00e8a6f746b36bfe6ba6593f7adbc00f659a437a5c1ab83853ebd50426a,2024-11-21T04:30:55.637000
@@ -134469,7 +134469,7 @@ CVE-2019-16664,0,0,d5224828e7db1d19530cb0e16c62504b1f238002cca96324438838fa82528
CVE-2019-16665,0,0,064c33eb1fe55e884574e08fec90730e886f9a68ff474a9e5a462ef834c563ac,2024-11-21T04:30:56.060000
CVE-2019-16667,0,0,74d729a29df2b011fc123654b761dccf5ba4719583a545b576c1a12e95e8a331,2024-11-21T04:30:56.187000
CVE-2019-16669,0,0,da6ff4071c2c01cc789b4590c9b2a30992f6dc3a4919715df7c09f34549e94eb,2024-11-21T04:30:56.320000
-CVE-2019-1667,0,0,6d2ce112bdea1e043a1443249263b0858bbfcab9948c05f1f29390649fa1ba38,2024-11-21T04:37:03.273000
+CVE-2019-1667,0,1,f168dbc5548ad7ebe209be1e8af41ca1489edc11a1cd2daf34f396c72260c0d2,2024-11-21T04:37:03.273000
CVE-2019-16670,0,0,4216a316ff5b4ceaead192a43b52504ffe5f548cd68d207a0d8f2d883a865219,2024-11-21T04:30:56.453000
CVE-2019-16671,0,0,b251cce987b4bb911af5381a5f320e2ff199eb0ca45fef33aea6dc8c20d255ab,2024-11-21T04:30:56.653000
CVE-2019-16672,0,0,7a3bdb13dfc627cf3a4c3b9546a5f3ae931aa920f612483a9bc0c5ce020c758e,2024-11-21T04:30:56.840000
@@ -134480,7 +134480,7 @@ CVE-2019-16676,0,0,19bbc8ca6478929f583049c53699046c27b023751e35653a0333403a973b1
CVE-2019-16677,0,0,dc503cd15076d288a7d817aaea86bb5e0c742ede815b8cf0e6ad3478af03478d,2024-11-21T04:30:57.710000
CVE-2019-16678,0,0,fce591b5cf019c1bb940070cd793b3b2cd964b18b664c8c70abb5eb479118ab9,2024-11-21T04:30:57.840000
CVE-2019-16679,0,0,84f7e56f2fa774cf468f91ca1bcffdeaf28f60ce19451af115182557af30f7ce,2024-11-21T04:30:58.037000
-CVE-2019-1668,0,0,a16c2691aa407f89b022ed10af1f241d4fd5f3c05f78f83868d636d170836cda,2024-11-21T04:37:03.410000
+CVE-2019-1668,0,1,259bb441cda8bd12801ae72d331ad6d246cc2f3518b43efbb8f342a1516ba5ca,2024-11-21T04:37:03.410000
CVE-2019-16680,0,0,5aebfdd358d49e24780d0c6947ef19038bad266b7a98b6c67eb839467331019d,2024-11-21T04:30:58.173000
CVE-2019-16681,0,0,1aba61140454c0caca09dad3ce5a0d60c275cc0a72d1f31838920d2e15168fca,2024-11-21T04:30:58.333000
CVE-2019-16682,0,0,4860449a4563b1ac33933ddf6013c68f1d1aa0fd90c1202d7d2087b6527af875,2024-11-21T04:30:58.470000
@@ -134490,7 +134490,7 @@ CVE-2019-16685,0,0,5e1ad309932d3d8b89af06d848dddaba38d983667f17416e80546dc6840c9
CVE-2019-16686,0,0,8bfa7c62871b78affe1f392ba5e8e9cee40f27b5ace2bdcadb502f82d405477c,2024-11-21T04:30:59.007000
CVE-2019-16687,0,0,afa8838914eda15ba776b9272bf5b8eeeeca1b2138598977de8773655f214798,2024-11-21T04:30:59.150000
CVE-2019-16688,0,0,c8d8ffbd2ca7063f8f4a40f2239eb2e1180a6c53c3a26e135832031b80dd0839,2024-11-21T04:30:59.283000
-CVE-2019-1669,0,0,01ea95c53933fa4ce05ad1a9f987c11d349f2c7fac07d65d833bf06aaf3c4833,2024-11-21T04:37:03.550000
+CVE-2019-1669,0,1,b234fa2cbb0f7496b859b624466c55ad3584a4156f5c33c7702a229785dbc968,2024-11-21T04:37:03.550000
CVE-2019-16691,0,0,8b9c3431b57706024fe24f69b2c9d5fa8402678545d82f988ad3ebcf0a28dbb4,2023-11-07T03:05:42.233000
CVE-2019-16692,0,0,e0add847a416b35768698d2649f4cb91e31a01063d441f08fd98d48674f1f78d,2024-11-21T04:30:59.440000
CVE-2019-16693,0,0,150a5fa135e82e332f956cac22f3c9c0b6f4c8716616c92ec65a9474259fc894,2024-11-21T04:30:59.590000
@@ -134499,7 +134499,7 @@ CVE-2019-16695,0,0,afa5902e484a4422f30ffc7350ca4a7ac0727bd7d5b0d6385e90f8f12fa15
CVE-2019-16696,0,0,8e38f48a8c509750f07f9d30626c593dc1d5bad2ed2b14c6653ade86382fc3f2,2024-11-21T04:31:00.030000
CVE-2019-16698,0,0,27033ae92a5df628e1f584ef0edd7ee34b582519751d1f297cf1835a747ae748,2024-11-21T04:31:00.167000
CVE-2019-16699,0,0,991748fe406c4654745260907d9c374d887b9d7638915aa36c27690643560adf,2024-11-21T04:31:00.310000
-CVE-2019-1670,0,0,08cda7494eb4e7907b4ef6d2678774c5567188b3896c4b8cddd75038a3ff1365,2024-11-21T04:37:03.687000
+CVE-2019-1670,0,1,a14b82ed985b698d31eb7f271e7879ca1f1492f323a1be195d28e08694889922,2024-11-21T04:37:03.687000
CVE-2019-16700,0,0,4b35b26be35d5ed18fdd9ac1ba0d1833e1f0d1013d102fca6a950ad3ede6d718,2024-11-21T04:31:00.450000
CVE-2019-16701,0,0,cd90b9559fef8fc29df347f477177607d084593f2e954e2312f6e37d179e7336,2024-11-21T04:31:00.590000
CVE-2019-16702,0,0,0c08a1804371dedf6ae3a067ed8995062d5a154b68a583660969ed8d4a19f63f,2024-11-21T04:31:00.730000
@@ -134510,7 +134510,7 @@ CVE-2019-16706,0,0,f25a13b2e5c3546d4cbe235a52bc70accbf1988bb3516aa432ebe1bd60e30
CVE-2019-16707,0,0,6a9d043f68820849ee379f7386e9862981bb516824ab565c29adb703c2fa5bcf,2024-11-21T04:31:01.440000
CVE-2019-16708,0,0,7cdd72f3ed041a97990b04c4539c77b99c0bab51b0bde61a35116e9f371c9c09,2024-11-21T04:31:01.593000
CVE-2019-16709,0,0,ac79de975a880cba0d647a94c6026dc491e4cc9a35d8bcc32573a904e9b6aeca,2024-11-21T04:31:01.757000
-CVE-2019-1671,0,0,88a83bf3e3e188182573513269b83545307ac2ca558c505f0d7db46bf9af9cf3,2024-11-26T16:09:02.407000
+CVE-2019-1671,0,1,c4d6aadfe134d7f35342404d5584f7863d3eeb86dc3ffbbc8771af654b408484,2024-11-26T16:09:02.407000
CVE-2019-16710,0,0,d2aa93a67550722cdac88da6f0ee2ce203263a9f4299b83d93e9802051a9b1d6,2024-11-21T04:31:01.920000
CVE-2019-16711,0,0,321f3c98a8dbb68cc957c8d1157bb56fd92a2cc314305c941828b581c5556005,2024-11-21T04:31:02.090000
CVE-2019-16712,0,0,cd2ff61144c7f4bc23c7a68c10b79d8424da8ea8efc38f018c8e67b21d6f332a,2024-11-21T04:31:02.250000
@@ -134520,7 +134520,7 @@ CVE-2019-16716,0,0,d8d705df230e7aec8711237cf089e165baa3dbae9a5269e0ac1cc4b6f330b
CVE-2019-16717,0,0,5e04b2ba80a810ade5e6c08e58a2163b5290c194d5914f306bd0c7bd045e50e9,2024-11-21T04:31:02.910000
CVE-2019-16718,0,0,810097cd3fb5c4f55cce516893c8c71038ef9e742517aa428c0dce81504134ae,2024-11-21T04:31:03.067000
CVE-2019-16719,0,0,864c74eded5f3b1ffc9d702a1e0ed318588678f077e5f23155fd15574d761c5e,2024-11-21T04:31:03.237000
-CVE-2019-1672,0,0,889ae84fadb97607247e9cdc935a8c268d192d936dd70d436da6378a0966950e,2024-11-21T04:37:03.967000
+CVE-2019-1672,0,1,e352998c9d43700cfec49a4c3b5d940d32d8123c48727952350eacbb2cba2fda,2024-11-21T04:37:03.967000
CVE-2019-16720,0,0,de983066f91a69727934595ce968f4c73d9213adf2d0097309ee52916baccce8,2024-11-21T04:31:03.387000
CVE-2019-16721,0,0,296e4b6d300d0eea3a5cbb3852a0d5c6c6b669da072dee283cf841865ce868f7,2024-11-21T04:31:03.533000
CVE-2019-16722,0,0,cc2feef4326a872b8fcb8cb491671dc1875acfc18f2a5dec1bf840e0d0221a74,2024-11-21T04:31:03.677000
@@ -134529,7 +134529,7 @@ CVE-2019-16724,0,0,00808f36e8d890c5dadb2cfcedfc28a94c4e470152bec5bdea91f35bfc16b
CVE-2019-16725,0,0,27cd8f954892d1211bbfa053cdd9273771d93e326e210c86b17ae9ac0caa00d0,2024-11-21T04:31:04.123000
CVE-2019-16728,0,0,c218a204db15466b0c2b0288a66a467eb7d73c6ab4987a6b1f145efc5191629b,2024-11-21T04:31:04.267000
CVE-2019-16729,0,0,8694e08634819c404f04466d1049d6b162a29911ed2034f62a6641933522b321,2024-11-21T04:31:04.410000
-CVE-2019-1673,0,0,acbcb619d5445855058766ed71bd8aa7401e1d2affc1cbafb4f191467ab3c455,2024-11-21T04:37:04.107000
+CVE-2019-1673,0,1,008578d8565e2e9e70cc8b91f055416ad8e308854c262598bee87127cbe6528a,2024-11-21T04:37:04.107000
CVE-2019-16730,0,0,5a7ae5777a0f763680f946e9c4cb15a399ef0e79c529ae84972d657b47ecfb41,2024-11-21T04:31:04.587000
CVE-2019-16731,0,0,8f8e953a4068d3476c1e0e14aa671685950767a1cc016b119b308191b1d419bc,2024-11-21T04:31:04.737000
CVE-2019-16732,0,0,67bd91b3732058c0c9610fd849b890623acdec6de54b2455596617d335f32750,2024-11-21T04:31:04.897000
@@ -134539,14 +134539,14 @@ CVE-2019-16735,0,0,9e822d84235227e69dec7e1b2d4ab23bd7fb17366b451d02e152f4c671e02
CVE-2019-16736,0,0,8053e49be327e369e944522fa0089837d2179e05b2287251df7b1c50b2a96ad8,2024-11-21T04:31:05.557000
CVE-2019-16737,0,0,66ae60d13fb3a42866a918358e364fcfafa51a37caaa37002c9e515ea29fa9d4,2024-11-21T04:31:05.707000
CVE-2019-16738,0,0,3568ea033c8ec62852d58808d884a4b72397e66c7aa6091b1deb455ee8b8d013,2024-11-21T04:31:05.860000
-CVE-2019-1674,0,0,02870fb713b4fd30f53bffaadcbce7ff351980d4735f8a50cabeaf0882697b96,2024-11-21T04:37:04.233000
+CVE-2019-1674,0,1,33fbc411eda990525c61ad1e749e620e9d14a7a960aec6c89552a0425fa92320,2024-11-21T04:37:04.233000
CVE-2019-16743,0,0,c29cdc417ec8394200fa2faff59f30c803891b6db79f5daca550a16d1fbec783,2024-11-21T04:31:06.017000
CVE-2019-16744,0,0,902e11ea9f09267fc497bc0e08a8e04a84dd8eabbee2ca384dfb666c2ee7d44a,2024-11-21T04:31:06.170000
CVE-2019-16745,0,0,4be1d64c79de33b81d412ff99e9f62b0b74d9c710f7fac83dd9aa6ce460ef482,2024-11-21T04:31:06.317000
CVE-2019-16746,0,0,66db70aacdc1bff40194c6b707736cce658d485e17e8087d0990a39b82792e79,2024-11-21T04:31:06.460000
CVE-2019-16747,0,0,f3df7d51bfcd217a42c12c215e81ad81de62b72fd757761cb168e62ce141f3fb,2024-11-21T04:31:06.650000
CVE-2019-16748,0,0,15d3f04256866d0558f7bfd309e21ab2a87ba4849b57ef8e5d153d7534491ce3,2024-11-21T04:31:06.797000
-CVE-2019-1675,0,0,f1282602c020b20cd45f6abda2bb6a3145eb6e7f3436325fd1bebc5422d1f571,2024-11-21T04:37:04.377000
+CVE-2019-1675,0,1,4426653b04691f36c7d5d4601eb4615bb4c28fb08dc69f386aa69c987b01edf9,2024-11-21T04:37:04.377000
CVE-2019-16751,0,0,f2426f3808c46ed41dea7dcb52714f2d37c3c86db30ae33c683120985998b453,2024-11-21T04:31:06.937000
CVE-2019-16752,0,0,7baf363aaa45e22faa2463ac9655063bc494f07ae2dabd8664b86113ac1303a3,2024-11-21T04:31:07.073000
CVE-2019-16753,0,0,a8c124acabc5569b4f614df68470787dfa0dbbac8766148b5f83a6a8340e7c4e,2024-11-21T04:31:07.213000
@@ -134554,7 +134554,7 @@ CVE-2019-16754,0,0,b32fecfd67f8ae264ce925a7ba6e448fcc4fe17ed4ff8a3521f2c8bc9af48
CVE-2019-16755,0,0,9dd35281259e46b51d040193a6b18f17b4e948f0942fc5ddad7e5b4d40516f8c,2024-11-21T04:31:07.510000
CVE-2019-16758,0,0,87c7f69babf1139a4852b5dab803858fce08dfb9fee2a608be55671897bdeb40,2024-11-21T04:31:07.657000
CVE-2019-16759,0,0,9c402dea75ff3d4d86dde12e4a4aa494d8f23c119398359f096dd08b184dd4ad,2024-11-21T04:31:07.813000
-CVE-2019-1676,0,0,afcaba5eb656b2228cb9d4b9b3b56efb2d3274504e35bd5ef439085261b689a5,2024-11-21T04:37:04.513000
+CVE-2019-1676,0,1,42cf8837a60102f737e1deda7fcc2cf65bb57bcde7064d21401799623c7c06e3,2024-11-21T04:37:04.513000
CVE-2019-16760,0,0,c1069b3a71e4c56e31917227cc558410169c5535afb5383e39780e629933f40f,2024-11-21T04:31:08.003000
CVE-2019-16761,0,0,a5673eaa5809bfbf2297fbd37bbec74a455d47dddbfed9566dfebf6c69eb87c6,2024-11-21T04:31:08.150000
CVE-2019-16762,0,0,0d6682281b6dd58b651fca2b95f83321c6d193076691c4ca13e50b8fea249c04,2024-11-21T04:31:08.293000
@@ -134565,7 +134565,7 @@ CVE-2019-16766,0,0,0f14e6e8775b43ba7463ccce705bcbda14a712111eb12b17b6b1469737294
CVE-2019-16767,0,0,b09e9fb8575728198a472c25c28b6176379dfd5b761e305f1349bc4897c822ae,2024-11-21T04:31:08.960000
CVE-2019-16768,0,0,7c5e311fa6d6a075f64ae4fd9075b14e49d9487ba9b279e281f057d637760aa9,2024-11-21T04:31:09.083000
CVE-2019-16769,0,0,e58a03215170d503b33809d4bbc84903c9c9ed5cf3cb8b3698fb97edf43d8965,2024-11-21T04:31:09.207000
-CVE-2019-1677,0,0,b881f8bcf9ecea2bcab885b7a40eeb975832ad0997d32ef17d30ce4320512205,2024-11-21T04:37:04.643000
+CVE-2019-1677,0,1,39a5b1689a0b3fa0b0e6165498da1bbcdd314682be429bade64647845cd4a313,2024-11-21T04:37:04.643000
CVE-2019-16770,0,0,9fd8d0b3f6582128f9ba7905c6b6ff3ed56ad5d5f5b558ddce0a084ac73247b7,2024-11-21T04:31:09.323000
CVE-2019-16771,0,0,aa547e35c39ca3575b286b472fa3627b8a07cf5376c0add1c43d72e8bfcf0c93,2024-11-21T04:31:09.460000
CVE-2019-16772,0,0,fcb13464915b77033d146a310b8520b303f0ec974bf2dbf832f5409a94f1a657,2024-11-21T04:31:09.597000
@@ -134576,7 +134576,7 @@ CVE-2019-16776,0,0,fbab6d09307deb1e4b2afa1a1e80999e5cfe45e270d1259f5a6893320c41d
CVE-2019-16777,0,0,15bc132a1d30d93e563b7013186bb3d25b38e31f716beed307da31e472a81362,2024-11-21T04:31:10.213000
CVE-2019-16778,0,0,a6b2c9e87584fd5f718cbf2ef7ee259adf78d55c2e71cce71f39af2e290ed004,2024-11-21T04:31:10.367000
CVE-2019-16779,0,0,5ff5c139bdc205f917873de8f8aafd6f013ad5794f8c9d910bc1e22cfd1d19a0,2024-11-21T04:31:10.503000
-CVE-2019-1678,0,0,fc91b4da2a82cf09f0d5c4de8a3c90b52e7a3b42392b30ae8cb0712e2f6f2bce,2024-11-21T04:37:04.770000
+CVE-2019-1678,0,1,cae4a4acdf965026c5a07c842ad2dbbc668ba0de8738184196ea400ac3d8d2f3,2024-11-21T04:37:04.770000
CVE-2019-16780,0,0,c4144e7ebfb1e9195edbfa2a8ec968085e251c02161cf4e8941286834dc3881d,2024-11-21T04:31:10.637000
CVE-2019-16781,0,0,79c4169233718cafe0760c72e70e5d058d73850b97e99f491b84903387d35abb,2024-11-21T04:31:10.783000
CVE-2019-16782,0,0,b9963b95d62a4b527fdff1bed657ea14e8e1a5ebec6067fef8d54323d398889e,2024-11-21T04:31:10.920000
@@ -134586,7 +134586,7 @@ CVE-2019-16786,0,0,fc105fde19ba4daefb7ff6ea9bc1e1243837fa1c3a3ce80126613a4762e7e
CVE-2019-16787,0,0,89aa496b8e01797bfae30668e6ead6c6dd17dc5b70eb2420d8aa64e806afb637,2023-11-07T03:05:44.393000
CVE-2019-16788,0,0,703ff123dc1b4c12c81a71e126ad4591c01ee455f10fa3762a48dace07d21e9f,2023-11-07T03:05:44.637000
CVE-2019-16789,0,0,34b672ee0fa64828e64f77cd0ac5e896b4f18e64ec0335f295e927f2be1fb25f,2024-11-21T04:31:11.543000
-CVE-2019-1679,0,0,035d39fd71ba36c17e85fe3791f794048b0514752c8d7e25aa66ffecbf060564,2024-11-21T04:37:04.907000
+CVE-2019-1679,0,1,d8fe2b8e21497a71ec8417089464a93cc26effbd1eb0deb9ab6780032beb12ee,2024-11-21T04:37:04.907000
CVE-2019-16790,0,0,eb6dc1e928b41dd53d66a0e72cc9c37a234f1c1037df9f642d91cd8308e5403e,2024-11-21T04:31:11.683000
CVE-2019-16791,0,0,22e45aaf78ef4a23d387f3195f35cd7056ec3ab71e7257995b64f2ae91f5b203,2024-11-21T04:31:11.807000
CVE-2019-16792,0,0,8f0a3698b004ce3863db3e48c66ec02031e8d6fc6d4e2bea2152cb5fad80b927,2024-11-21T04:31:11.940000
@@ -134597,7 +134597,7 @@ CVE-2019-16796,0,0,bdbe6be19decd5cf08577a18a03ab5fc23edc22379b813b866a202ec93f31
CVE-2019-16797,0,0,d7d9feb5702887fe3aa27df022f920c62f945ee3ac49ba29707bb561e7426664,2023-11-07T03:05:46.053000
CVE-2019-16798,0,0,1ad75b12ddc0282feb636a97b1a5badda845118e3f95e1e894cfcd3bc0a167ad,2023-11-07T03:05:46.313000
CVE-2019-16799,0,0,a8154e95d4daa9868626385fcf6b90bdcd0d321d2e83009ed62e0d39a3026f85,2023-11-07T03:05:46.560000
-CVE-2019-1680,0,0,e69fa9d1c8444f96d74d910ddd595de721a7cad946100911290040088c4710cf,2024-11-21T04:37:05.040000
+CVE-2019-1680,0,1,dbfec0f49e18c5745ad1414806eda9b7ba224dae7070e34271a7f6302508c4f8,2024-11-21T04:37:05.040000
CVE-2019-16800,0,0,ce05504710ea0e749a8df0c4775edeba02b03d0d4b87b8a808c86e45ae5b32bb,2023-11-07T03:05:46.807000
CVE-2019-16801,0,0,38ff9019b8af44ef0a90d862200538fa63124ef3e87ad4702d8b47c985fc5b43,2023-11-07T03:05:47.050000
CVE-2019-16802,0,0,e568d5beb7d7398cedeb99acf75466e5c7c2debf2887c833e2b13b2605ba6c1a,2023-11-07T03:05:47.283000
@@ -134608,7 +134608,7 @@ CVE-2019-16806,0,0,2c4bbd5c65769855126a45a72e874e3d05afe5d204108d65ad767aec119dc
CVE-2019-16807,0,0,d8e0fa99c30d05ebf1cac3fd17569c8c8c0fdecec5e3e2658805a944c74ec8e1,2023-11-07T03:05:48.490000
CVE-2019-16808,0,0,c4450b73c4c83b0e8c945c1818c75f7a218424154d96172693f38487237ca21b,2023-11-07T03:05:48.730000
CVE-2019-16809,0,0,62d6b832ea7c15233cb06f559034a6b7cb4b6e740991f87f2b2ab85a0dac384a,2023-11-07T03:05:48.967000
-CVE-2019-1681,0,0,320ca37a98f15b3ca8e3e4f851b3f5a0888dba4d6b64bab5b3062324e9151a15,2024-11-21T04:37:05.170000
+CVE-2019-1681,0,1,2d35eb0ed14baf8ae0a6dc4f58a611297b4143102cebbef155c3c4841c8fe5b8,2024-11-21T04:37:05.170000
CVE-2019-16810,0,0,cb10a000ddb4996ff5a9c851e0d5dce35b4f3a183df9dcac73145deed291bb3b,2023-11-07T03:05:49.200000
CVE-2019-16811,0,0,06c0bfb85e25e1eca57ab570b932c2fdbcaa308bb4f9cee2a6061ce881443cf7,2023-11-07T03:05:49.430000
CVE-2019-16812,0,0,7c4e8d0379257ceb58e6062808ddb309444dd4317d3b1b81c84645d9a44ef12d,2023-11-07T03:05:49.663000
@@ -134619,7 +134619,7 @@ CVE-2019-16816,0,0,a7fa35fce9e87e7dd1d82da7c894c65fa9abdef9b924243808edab3ec1674
CVE-2019-16817,0,0,6c28f52c36e7a0964156e1a833369990187e92c00857dcbc8de924ccfebdc8da,2023-11-07T03:05:51.013000
CVE-2019-16818,0,0,db945069720f6afa82620e4c9f2ac228d9176946c8cca7a0257bdfd583577fb8,2023-11-07T03:05:51.307000
CVE-2019-16819,0,0,bb40d56135b3a812f876ce43dd9c2299ce7e3939f407c1e974fd606e015f70d4,2023-11-07T03:05:51.553000
-CVE-2019-1682,0,0,d25ce8e96075207ff1032faf7ee01b81028c7c81d701100c53139eacdc99aa0e,2024-11-21T04:37:05.300000
+CVE-2019-1682,0,1,f9338d53567b0301ff1b37be56162e4eacc8b5de75630722f3d566b1d13588ec,2024-11-21T04:37:05.300000
CVE-2019-16820,0,0,4b252b1ac63ed2771082acf6e03d8a0568ffc8e1eed9f4985ec3edf44ca8691b,2023-11-07T03:05:51.803000
CVE-2019-16821,0,0,f11098d2c6a5407cfa4ea8a3f0f62994c724292a164b5cb92af6133b91020bb3,2023-11-07T03:05:52.050000
CVE-2019-16822,0,0,6076886e1b2739484273fec4c321e45170b7bb097935a838695df349c7fe052d,2023-11-07T03:05:52.290000
@@ -134630,7 +134630,7 @@ CVE-2019-16826,0,0,0d0a1e27e7748b035442f0a7e676d615fe7934edd7971b2ce1ac180bf9b2b
CVE-2019-16827,0,0,966eb7d24477090c6c975640b28d6da6150d8dde6cf3c6888b3c8119a2998cd6,2023-11-07T03:05:53.517000
CVE-2019-16828,0,0,abe3cd9f054d2aee901de4aa92951f7f7ae444b3d65deb7d444b89d657697cf5,2023-11-07T03:05:53.757000
CVE-2019-16829,0,0,da463a1d608979131a8b8b1206e0a68f61c6ff59162605b499a2da7a8b1509dd,2023-11-07T03:05:53.990000
-CVE-2019-1683,0,0,9658bf9c3a6d0a17b2ed9ad99b0dfba5f0f8539354c3923dd0820dd8f0ba0740,2024-11-21T04:37:05.440000
+CVE-2019-1683,0,1,4f5cd83b2783ffd8f53a3cf9b21d98538e731d155ebd23c5e8356e4eae25a0de,2024-11-21T04:37:05.440000
CVE-2019-16830,0,0,3e87eda5584751c089971efdb1e71dbd302d06b53d005a8de573f4b2dfaca673,2023-11-07T03:05:54.230000
CVE-2019-16831,0,0,729ffd0e5b71c310f2193cc0f9973c70f8e9259bc9ccde18bce08a47f6df4f82,2023-11-07T03:05:54.470000
CVE-2019-16832,0,0,1a9df60694a5d4fda9f7c28339190fd0b3f328b21a2a7aa32b9f3911cef85e98,2023-11-07T03:05:54.713000
@@ -134641,7 +134641,7 @@ CVE-2019-16836,0,0,ea97092f82cd4d7e06ac1dd916636f5752030ccf6479c62c1bec1adb2aadc
CVE-2019-16837,0,0,3c40d3b705f62095c625d3075d92fe8dafb02df75eace6ee8de4a4ea21167123,2023-11-07T03:05:56.310000
CVE-2019-16838,0,0,da7bb45f02f32e3b90c7464865d6b0f2f889f1b5856f76af47c4b68acbf3a5bc,2023-11-07T03:05:56.547000
CVE-2019-16839,0,0,aac693a59de507075bcf20f5056ffca2775a95b2e96217ab54becabe95717a21,2023-11-07T03:05:56.783000
-CVE-2019-1684,0,0,ec5691fc2ea767b658efd0ac571febf4c16825c3dc617d125e6f50fe78dce266,2024-11-21T04:37:05.597000
+CVE-2019-1684,0,1,a9f902b925119e62e05ffc08383f6fc540525068e2be6e6596e2a2e081601541,2024-11-21T04:37:05.597000
CVE-2019-16840,0,0,e7e7dc484aef9fc2bc5e45eae2dcf13427ec96c873436f77eb6d07272c53231a,2023-11-07T03:05:57.020000
CVE-2019-16841,0,0,57393d7abe2997b128e1ca9e2afee825834508916a7fa57ee9a520d5a675f222,2023-11-07T03:05:57.250000
CVE-2019-16842,0,0,e91cfc3f2abf0999edcf047c3b0c835694bfd12b968c2cac38d479d0c25a76e9,2023-11-07T03:05:57.493000
@@ -134652,7 +134652,7 @@ CVE-2019-16846,0,0,1aaa4ccbb8eb744f8bc36ac03889c27bbf0096d68c5695a5b5fedf94d6127
CVE-2019-16847,0,0,8276301c6bbd48782bb569cc3a9a9d6e6c6eb889e8dbbab95f6cbdc7c32a6dc1,2023-11-07T03:05:58.683000
CVE-2019-16848,0,0,c5c669e90412c83390e61d4868ffa042f0967cd6177b370b5b8079fb6d8c20bb,2023-11-07T03:05:58.933000
CVE-2019-16849,0,0,f68ba8f85895e32f844bffa7f15e403f2e9581ebea49964e6d6a1217e9c8f97b,2023-11-07T03:05:59.167000
-CVE-2019-1685,0,0,09e5d95ab083d58361296c748d73f8745316b284d946fae3f1cd313128d317ee,2024-11-21T04:37:05.767000
+CVE-2019-1685,0,1,5c229e7ee6b1eb70e905b31b2fdd4b4959f4ece638ef52673c40d8c0e0194a43,2024-11-21T04:37:05.767000
CVE-2019-16850,0,0,61dc9385fe072b26e32ba132cfe01a027a3ca675331a1d209f18c2cce9d75ed9,2023-11-07T03:05:59.393000
CVE-2019-16851,0,0,7c9e35326b8aa70b6ff189119126abfa5006a0a5fe29725e09235eeee7115c87,2023-11-07T03:05:59.627000
CVE-2019-16852,0,0,15fe94bba3d7aedffbb7f7b0f93ffab7c94304e7f1d5b2a76daac66c1452f694,2023-11-07T03:05:59.860000
@@ -134663,7 +134663,7 @@ CVE-2019-16856,0,0,fbd8611d8ceadf777948b97466ae5fc0b22a5698a2c949146a510a9fb45d3
CVE-2019-16857,0,0,eec3d456aa2299bb89c078cd681158393e049a5deb2189be9f7ad38c12da2b06,2023-11-07T03:06:01.117000
CVE-2019-16858,0,0,65740ea88c855fb7dfef5aea76e24261ea29de0484c75fdff9e27af0cc85193a,2023-11-07T03:06:01.400000
CVE-2019-16859,0,0,2e80f69aa83ee8c19cc95c39902a18e6fdb09ad3322e9ad1052d5a2ffffca62b,2023-11-07T03:06:01.697000
-CVE-2019-1686,0,0,c32d2324e68da723645962e4a9e34a0ee710d29409198192cfe02e3e72830fab,2024-11-21T04:37:05.900000
+CVE-2019-1686,0,1,6d083cdcfeb1ad0e6c5f0edfbe6b5166b87f58cc6e43fc2cb75ff7dc7b997c7c,2024-11-21T04:37:05.900000
CVE-2019-16860,0,0,7ed5a8382bb042ed2ef456f5cb4c0c0d8382325e39c49dca9718e24dcbae9eef,2024-11-21T04:31:13.090000
CVE-2019-16861,0,0,783cf26580289d87bb52aea111af6a0af6a8c51d51a0f0b3bb0182dd06a44533,2024-11-21T04:31:13.237000
CVE-2019-16862,0,0,92625a8a631c35c95f617f53a9f2799d34c2dff88bf5054e9ffa0e696bb17cae,2024-11-21T04:31:13.390000
@@ -134674,7 +134674,7 @@ CVE-2019-16866,0,0,f9cf4e267589c819fcea81ad91519c2bd7f250bc4a21893454c8eeeaba04d
CVE-2019-16867,0,0,f9c8990366987453c17182da5d9b796f7faee31577cde5937573a635e581eb7e,2024-11-21T04:31:14.210000
CVE-2019-16868,0,0,b5fca10e5fc26a3268fcb07cb7158b9994e4a10c3e002ec21135caac3cc2821d,2024-11-21T04:31:14.343000
CVE-2019-16869,0,0,554ea80698e6e3f7ab35fe9e4455b643fb77b548ddb86e0c6a3536101461eb8d,2024-11-21T04:31:14.483000
-CVE-2019-1687,0,0,8a2e8cc7b947d20545ac23a0e6723ae44dd51281fa4ccaf1a5c4943f0de1f17a,2024-11-21T04:37:06.050000
+CVE-2019-1687,0,1,1d5d50ac2fdf07e6cecf3662b12e118a5213f32bfa7b86ee162548e8a837219e,2024-11-21T04:37:06.050000
CVE-2019-16871,0,0,72e531f14ea12b4e947d4b7f068534148c20018514b605ddc94d5cb9981b5e10,2024-11-21T04:31:14.783000
CVE-2019-16872,0,0,5f7665292e41b33fccc390ff1a336fc1e9de391606d522ab78d712d7b6b28e77,2024-11-21T04:31:14.930000
CVE-2019-16873,0,0,9bab1166a9e438d9bc172042904553c238a7df0a41d10e94ffac89d06ef24e4d,2024-11-21T04:31:15.090000
@@ -134683,7 +134683,7 @@ CVE-2019-16876,0,0,ccaba0a6efebb10d586242adc6b0ead9d589f40d273373383900dcc5d4bcd
CVE-2019-16877,0,0,5ffc5e69b99c32ac63ea2c015be748730806bb86445abff84f0e187c26e3acfc,2024-11-21T04:31:15.503000
CVE-2019-16878,0,0,3adf8caf94e883b9231ec55ecc6955c204d7ad80f3759bbdd127f504c8b4d849,2024-11-21T04:31:15.627000
CVE-2019-16879,0,0,1177f122d86970a38868fcc53a58363b34bd500bb350470d8c54226fb30bae9a,2024-11-21T04:31:15.760000
-CVE-2019-1688,0,0,b61ee724b1a58837167c7db20aacf5ea46363e67206516a1c93fb684e1415d9c,2024-11-21T04:37:06.197000
+CVE-2019-1688,0,1,f8f95167074b8909cab3f70157e0ca2656af019e90580fc8236eba6147f0c364,2024-11-21T04:37:06.197000
CVE-2019-16880,0,0,6498c23a08760e00c72cedf266f50e2a06b135903f6bd0b2294b148678358075,2024-11-21T04:31:15.907000
CVE-2019-16881,0,0,8453281329077459b256c3b513b4a27abebb79fdeb15b70c4d7b3296af36c3b3,2024-11-21T04:31:16.047000
CVE-2019-16882,0,0,7898b6e514115f5cafc95ba2d93eaab7dfc992ff9c62beecb88b1f30319f435b,2024-11-21T04:31:16.187000
@@ -134691,7 +134691,7 @@ CVE-2019-16884,0,0,7b62fdd73af2c49400336f74f936ae081f09578cf24d51f532c1c38236244
CVE-2019-16885,0,0,9afd457dcfe667ae03ad1cf2566ea1ae9bc2558c10638211da4b04e421b8224b,2024-11-21T04:31:16.507000
CVE-2019-16887,0,0,addc578660d6036e1f4729c672c582d3dcfaa3db87be08f90bfc2ea5fbf45047,2024-11-21T04:31:16.663000
CVE-2019-16889,0,0,ee6c0c0db4fb1859ce5285840a1b85c945646711b19be2b301b350cff43562c2,2024-11-21T04:31:16.817000
-CVE-2019-1689,0,0,26f80cd4377add90500f93ff2851822701a39cff12b6c52b796fbb6457b7541e,2024-11-21T04:37:06.340000
+CVE-2019-1689,0,1,b174d91eab83d35fa22cf7d66ac83991f2fee19af8537984c609abb48aadc986,2024-11-21T04:37:06.340000
CVE-2019-16890,0,0,0fe92e1c7c008e7599731ec9f6ad3e404209fd783ba64cb21cccc097a9188800,2024-11-21T04:31:16.973000
CVE-2019-16891,0,0,6b43556ef58992c47fed14263bae4fe2557e7ee263190c148364019323325b5a,2024-11-21T04:31:17.117000
CVE-2019-16892,0,0,4f728fbbc26edeeefbd5ae2c5d0d6db7070b44cff3795ed067135cfb4a62059c,2024-11-21T04:31:17.280000
@@ -134702,7 +134702,7 @@ CVE-2019-16896,0,0,3edd46683bcff541fd082cf0e65ea910751f7c2f74bcf17bd5025fa9fbc36
CVE-2019-16897,0,0,658da94300c8348f4904c1fe3c48996982fc57043ac51915fed6969af90fe243,2024-11-21T04:31:17.880000
CVE-2019-16898,0,0,e8c151f6e9025cd3d65866b0fe3df68e7964070ab11896b7d6a32bfa8f9ad301,2023-11-07T03:06:03.190000
CVE-2019-16899,0,0,31c82138b716747ed2dbfce975bb3b39047a58152ce73f84f3342a11879d83a0,2024-11-21T04:31:18.047000
-CVE-2019-1690,0,0,bd17781fabfffaaa5f6dfa8ba9a2aae86ffb7c6098f3f4439a2f565bfc47ecb2,2024-11-21T04:37:06.480000
+CVE-2019-1690,0,1,6839926a70f42c9ea9060f66809596fc5c101ae4920fa8b63cfc319987b344b1,2024-11-21T04:37:06.480000
CVE-2019-16900,0,0,849e80eaa87af3e9ceffb5f5f74bf5294ac476f1ca7367bd4ccfddeb32f3a1ee,2024-11-21T04:31:18.190000
CVE-2019-16901,0,0,1a111c63998ef06858a9ee8c4886d8167bf75d623fb752a25ef484339876461f,2024-11-21T04:31:18.337000
CVE-2019-16902,0,0,da54d085e84938f9d2b8681cdc995d7974131372860d431e601e8c90ce90c1b5,2024-11-21T04:31:18.473000
@@ -134713,7 +134713,7 @@ CVE-2019-16906,0,0,eb1fbe2487c404f96c26a29462239ad807dcd6545f7b2db1d87890a183837
CVE-2019-16907,0,0,7dfd0b961a2cc08d7be906b1b9b0c44fb256a0b8ff5282f277906253ea98ca2d,2024-11-21T04:31:19.227000
CVE-2019-16908,0,0,640f76f8a541f13bf9508d55b66bdda5ddccd1fa6dcc81541fb78a0003ce1184,2024-11-21T04:31:19.377000
CVE-2019-16909,0,0,636f8680f7da8e45ccca89aafd224f9af58cbb4700c209020000846876ffa098,2024-11-21T04:31:19.527000
-CVE-2019-1691,0,0,2d1ed68bbea86dcbdf46463335f9f26af44a01d05351aa93d78a0fd09f7bd817,2024-11-21T04:37:06.627000
+CVE-2019-1691,0,1,09e594c6e9d9a72c504ae6baef4fc842d1786fa0a78fc3f5c03ab0f1c7e35844,2024-11-21T04:37:06.627000
CVE-2019-16910,0,0,4eb83f2b091ea522b3dabdac000d2ed43edc4790253fde3a5a9178c98c1cc700,2024-11-21T04:31:19.680000
CVE-2019-16913,0,0,3aab1a9692e4ccd6c1b33efd83a6e4719cc406ec8c176f7a606c70923ef943e9,2024-11-21T04:31:19.863000
CVE-2019-16914,0,0,a4f8b7c95cc39e4e86696732359458397367807828623d7375f00fc47688aaa8,2024-11-21T04:31:20.003000
@@ -134721,7 +134721,7 @@ CVE-2019-16915,0,0,6ac2556065a08ddb3da8764d3621464b2ed4e47ab68890b048ff4f5c23352
CVE-2019-16916,0,0,9787be4ad06670ea0d543be4b76daf27b47852a58adccb911d92ed9bb7a99335,2023-11-07T03:06:03.330000
CVE-2019-16917,0,0,3cee2ad1f71f995771490ee8032914c8feadcced87a0af7fae668d81888ff210,2024-11-21T04:31:20.337000
CVE-2019-16919,0,0,6d020cdcc98072feeba88232730d9ca6b08676eb2714ec90a55ef6feaf62f8d6,2024-11-21T04:31:20.477000
-CVE-2019-1692,0,0,61564457b567d1ac50146f2f056dbf4e85770f3eb1be8494741f4a6f73f75086,2024-11-21T04:37:06.760000
+CVE-2019-1692,0,1,e5861baa5b8efe73265a332007afb8be55bed39a0bbca3a35f9551120e74bde0,2024-11-21T04:37:06.760000
CVE-2019-16920,0,0,8c3f00d2794b7cefe4fabf3870f82b1fae8960b5fc11a8d22858afe846784155,2024-11-21T04:31:20.637000
CVE-2019-16921,0,0,e57dbc050c68c261320e890d797c1591d0e03c23c3c019ea4ea9aa0ad5f2af0b,2024-11-21T04:31:20.797000
CVE-2019-16922,0,0,7ac970ff8171e369289e379976dea57a29336a15d611f56d419a991a762e5db5,2024-11-21T04:31:20.943000
@@ -134732,18 +134732,18 @@ CVE-2019-16926,0,0,2fd405866642062f213851dd941fd9525e358af4d2584ef5723f7ad01eeb5
CVE-2019-16927,0,0,2fb3d9c2c8b5c2842e6547a10802b9b10a58031279b3deedbb8a89126f5833d4,2024-11-21T04:31:21.647000
CVE-2019-16928,0,0,7fe6544097c565235fdcf370e51edc109a368ab3aed2be8558b2bc51dfe03120,2024-11-21T04:31:21.790000
CVE-2019-16929,0,0,c8559756654e9a62a5c6980e74381ab3fad1e9d0bea48008bca5276d026b6dd3,2024-11-21T04:31:21.970000
-CVE-2019-1693,0,0,de13640c71754790fed0e917c9842e6c8800b81d29acd042782c3b32f5a02584,2024-11-21T04:37:06.883000
+CVE-2019-1693,0,1,2e2222b2223836b512c461945a8a924406481fff3bb11ce5f908ab466355f121,2024-11-21T04:37:06.883000
CVE-2019-16930,0,0,2c3d17f3b220f1a83aac157676c5ab4c85646fd8c0e9135c161bdbe1973570bc,2024-11-21T04:31:22.113000
CVE-2019-16931,0,0,6f0ad39a8e9cd3de4c702e3b2a6a816e93b4c793fcc191feb7422b75126c1fb0,2024-11-21T04:31:22.267000
CVE-2019-16932,0,0,e7fe009fe64552d49722aaf02db6bcbedf837f26d95ccfd5c07790f318c85a6c,2024-11-21T04:31:22.423000
CVE-2019-16935,0,0,c4f6371600e7cd4a02753d4d3071939fb9172eb4b8953e070e9b773e4c64a145,2024-11-21T04:31:23.140000
-CVE-2019-1694,0,0,eb2bc26e719e17cd66a62bb44bc8a16cc6b7f6a7d077f864199820797f061271,2024-11-21T04:37:07.030000
+CVE-2019-1694,0,1,af932c76c492fd12dc23fd37b8c705df5f72fff795d08fa2bd0692c0a8f4fecd,2024-11-21T04:37:07.030000
CVE-2019-16941,0,0,efd1036f3d5c01b19085ec36c70fd8343a288d5e0fbe45deae8695635ba79f7b,2024-11-21T04:31:23.340000
CVE-2019-16942,0,0,2988d5d0d0a0a24aec81318ffbabf227e21b08f5be92fb35549a459b5e7445e8,2024-11-21T04:31:23.477000
CVE-2019-16943,0,0,680c4c823c6f59e59bb1806088b9ef238f3eb3a9c8cb15b00c576dd7e13fd184,2024-11-21T04:31:23.737000
CVE-2019-16948,0,0,94fef178d7a91dc63d8120684f713396eae6cbca1ed0306cdc831f54e543959b,2024-11-21T04:31:23.990000
CVE-2019-16949,0,0,776b63bedc9c3dfc66e4681e2c1d514e635b90efde3709c14171f13098c39392,2024-11-21T04:31:24.133000
-CVE-2019-1695,0,0,5db89a994f1f198cc2f214cc737698b764afa2dbfdf1db128671003e8e060ff6,2024-11-21T04:37:07.167000
+CVE-2019-1695,0,1,5913137ccef7a45fd1a5086bf56cfd62c14b77973c1c880d0c0975c6657cd8dc,2024-11-21T04:37:07.167000
CVE-2019-16950,0,0,3f2e61791f4e591032c0521ccf2d4d64425b3e9cd732adf357e1ebc479f242b5,2024-11-21T04:31:24.280000
CVE-2019-16951,0,0,bf075a68e8592c56f2dd088a5de76c5a13c3c4341d981302c7e62d2640bfb571,2024-11-21T04:31:24.423000
CVE-2019-16954,0,0,e2aaa339d23f4171244949730cfe88918f034d462be798bef052a5ba867ba9b2,2024-11-21T04:31:24.563000
@@ -134752,7 +134752,7 @@ CVE-2019-16956,0,0,e4bae5ab1e93d8f3525356d46fa30e509d7d79ec9e97c23f755474d82ca87
CVE-2019-16957,0,0,1f4d4669e1d7555576e94379234ed0af5cba39c04e43093c5f26d19b7473db87,2024-11-21T04:31:25.020000
CVE-2019-16958,0,0,569018f4db731f393e8a0ae6f71338fcc77515cfd094f0a911288fded10674c3,2024-11-21T04:31:25.173000
CVE-2019-16959,0,0,f9d7ad284295a35ce782bc8be4aecfa8da20eb815519661fa0f880c7f305a5b3,2024-11-21T04:31:25.323000
-CVE-2019-1696,0,0,6c0e8e42404feabc6d35b751137d3e5c8a3a9a9d333869e7786036f102e430b4,2024-11-26T16:09:02.407000
+CVE-2019-1696,0,1,08b27d28171e836eb1bd7fbdd6c94b05b4fdb33b3530b6c57477caf2a42f1f18,2024-11-26T16:09:02.407000
CVE-2019-16960,0,0,882d3f47eb0ef683dcd2f7aacf38435781549392bee075418c94dcc7d98955c5,2024-11-21T04:31:25.467000
CVE-2019-16961,0,0,55467e7f7f733a68c55f675bfd72ddc7bcc4de67dd0024eec64d618418253805,2024-11-21T04:31:25.603000
CVE-2019-16962,0,0,04403d848185dcb3e23ed4406d367e60eb295ee064ab9d3ff828e60311ca92c2,2024-11-21T04:31:25.763000
@@ -134762,7 +134762,7 @@ CVE-2019-16966,0,0,a45605fbde5e521ffc9f8001d5d26977cdbd3feb81c116a53988f4f91bd75
CVE-2019-16967,0,0,5585e9e1b6a5e6b2e3cfca3a30c60de8bece4d9c1325137d8da74856259b04bc,2024-11-21T04:31:26.313000
CVE-2019-16968,0,0,b3307f5a7dd7b0400141b794b2d04018adea2461d9a153ebb6b33a07b0aaf38e,2024-11-21T04:31:26.467000
CVE-2019-16969,0,0,6d1f5d97db77dfee9dcceeb9e94cc16c08070f7c1bab67f59d3313aa194ee722,2024-11-21T04:31:26.607000
-CVE-2019-1697,0,0,11320a1ffa86bb5a3d0c1ff647875f407ae6871097c95e755753e1db871fdc9d,2024-11-21T04:37:07.460000
+CVE-2019-1697,0,1,be1622ff071e5aeee60ef50ca5cb665b9d28b13e3b179d2fa72d6100a360f356,2024-11-21T04:37:07.460000
CVE-2019-16970,0,0,badc5896db19ea6a9862c6359fd592e81768b79f282fb6e6b8073229fb9702e3,2024-11-21T04:31:26.740000
CVE-2019-16971,0,0,1075e32024d9a679d8f800d517df361d849242b763dc019e7a5cf3faaed435f3,2024-11-21T04:31:26.883000
CVE-2019-16972,0,0,36a2b9ff3021561d29fc6600429b6e8d106a8e7293dcda1aad1538826a181aac,2024-11-21T04:31:27.030000
@@ -134773,7 +134773,7 @@ CVE-2019-16976,0,0,3744c756de1f374bf147a43164eedbbe240749148840b90e396a7013291a8
CVE-2019-16977,0,0,4237ec2aa5eda53a7033d24cb7316f2179031457533c773eec0c95e8ebdf77f2,2024-11-21T04:31:27.733000
CVE-2019-16978,0,0,37ec3f6f0f01565f2885eec9a695dc9faa96a970b52442359d0213e16cb3a31d,2024-11-21T04:31:27.877000
CVE-2019-16979,0,0,53cfff54a822203ec972752e5a6dccd53ffb3adeee4e0071e8965419e8683741,2024-11-21T04:31:28.020000
-CVE-2019-1698,0,0,25b49cf26aec510b2adf2c1caf2c24afae88323cb246f7fc6d86f857c5badd09,2024-11-21T04:37:07.587000
+CVE-2019-1698,0,1,8d03aed156828eba6e47a5239b7da3589b8ba20510e243d07df27087a054dc07,2024-11-21T04:37:07.587000
CVE-2019-16980,0,0,639de257440faa3bb4c3875b4747b322cb3fff8576ee4f439bce7372ecb05310,2024-11-21T04:31:28.163000
CVE-2019-16981,0,0,662175d0c09a23ed3356adf26a997851b49ee818934594b25f4db075897337b4,2024-11-21T04:31:28.303000
CVE-2019-16982,0,0,fd8f94d1d5751079866cb79247371fb940bf0994814ed86de45076df478bf201,2024-11-21T04:31:28.450000
@@ -134784,7 +134784,7 @@ CVE-2019-16986,0,0,9f5e65824b115fe2e3586af98052375c47394dc4eaeef6c31dfacbeb91307
CVE-2019-16987,0,0,3906eb20e0c7bb8bb41606ada62b55b5e56e71a37cc275058074f7a7db18ca9d,2024-11-21T04:31:29.157000
CVE-2019-16988,0,0,cbcc8f2742480ace05919394e0e4aedd2133d89a7c1944ccbfe238e56d253206,2024-11-21T04:31:29.300000
CVE-2019-16989,0,0,6a36556a561c038fe46ae395d420c67f72910ba95895ac55e166c30c59a58ce4,2024-11-21T04:31:29.437000
-CVE-2019-1699,0,0,6457d915ffbb4e1025936e9f20abde01f4c9d8f4493e8b73a7afadfbf59131fa,2024-11-26T16:09:02.407000
+CVE-2019-1699,0,1,1491c7d0b217166f619d8379df1a67e7bd60d62d69ccde3fcd1138ac91c75a84,2024-11-26T16:09:02.407000
CVE-2019-16990,0,0,77798d990175ed37c7fd1cb3f9a562c2f98a2906843145823692295b732d30a6,2024-11-21T04:31:29.580000
CVE-2019-16991,0,0,4dd74141238eeebfed0735c868f0c7a38dc550fe329a538e0870899ff603bfda,2024-11-21T04:31:29.717000
CVE-2019-16992,0,0,ad62f73739997caaa5e4b92c88032dd7d493e294b72dbf75ad87f633dc013c2d,2024-11-21T04:31:29.857000
@@ -134794,7 +134794,7 @@ CVE-2019-16995,0,0,3506702b0a1d4f3edb407024bef417a4c92e4486b930ea52fa4bdb7f5d070
CVE-2019-16996,0,0,18eb4aabf4a8a25a1a2ca38b49ee0648aaa944725c1c1306ea6e4d4720723337,2024-11-21T04:31:30.490000
CVE-2019-16997,0,0,ed76e1a79ed2c23accb010af30cbbd75da6b94ca44907865dda6a3021a91ee46,2024-11-21T04:31:30.637000
CVE-2019-16999,0,0,6e644f5980884e0e1c5f0ab5f59dfd11ed15ceaa930819def09526630bbb9905,2024-11-21T04:31:30.780000
-CVE-2019-1700,0,0,f85cb8efc74d22a1c22e71ed034f8e42ce99bab3245bb661b6648c8b401fca09,2024-11-21T04:37:07.837000
+CVE-2019-1700,0,1,a6e171e79ad36fe85dd07b50261d4af63085a39c4d74206b7bd771480b9f1870,2024-11-21T04:37:07.837000
CVE-2019-17000,0,0,29a684231ede2cd1024a9549986fb81f148d8ba52a484d4e23541cde639b9c90,2024-11-21T04:31:30.923000
CVE-2019-17001,0,0,669c829a34a1f3ed2b81108acc49d25303f3125561a7e6159a748e3cd4b65a2b,2024-11-21T04:31:31.037000
CVE-2019-17002,0,0,66c22da4571e13654f3f2ef7f4aa390034b8bab5224ef737991cb06c9e9739c0,2024-11-21T04:31:31.163000
@@ -134804,7 +134804,7 @@ CVE-2019-17006,0,0,b5e9a2c731b2a1246fba50917a44df458d1400f2d699b97b3993477de7f52
CVE-2019-17007,0,0,7c8b8411e121256f9fc98a115605a8a989423b026d833ecc7b75225abd4ace61,2024-11-21T04:31:31.717000
CVE-2019-17008,0,0,a1ebb6b9f85e65901a0f9681a707cc57eb1465d4e58f972f5d35119a1146a920,2024-11-21T04:31:31.857000
CVE-2019-17009,0,0,8e3def1a474785a29bb810a6ffb9d3994c624ffc97e0089dccba98efea11819a,2024-11-21T04:31:32.013000
-CVE-2019-1701,0,0,38c049079ac7609cf4c5b957aad866e734e2f67fe50757abffe0375c4b7c9005,2024-11-21T04:37:07.973000
+CVE-2019-1701,0,1,a42b24ec410ae6dc4e1f0870e733f96c81b3a4cd4abdd782fa60e9fb05cb530e,2024-11-21T04:37:07.973000
CVE-2019-17010,0,0,627bef6d04639afff24c641c962655e1f577f00b68603d43049106fbdfd09c7f,2024-11-21T04:31:32.143000
CVE-2019-17011,0,0,67b40e209e0c633837454a37f271abcee8c948bea49d28c8ad2a726463f3268c,2024-11-21T04:31:32.300000
CVE-2019-17012,0,0,aa37a98e3109835aaa904bdebabd149f667c4067f438eec641d0dc62c52aab64,2024-11-21T04:31:32.450000
@@ -134815,7 +134815,7 @@ CVE-2019-17016,0,0,106e5d4901f0a374b7410be15ccbd28af11a1150d267217e064070d0acdd5
CVE-2019-17017,0,0,dbcd3ceafa3f9011c4f9d4e193f6dffae548fef0f08cc695a0b843d2416b15f7,2024-11-21T04:31:33.150000
CVE-2019-17018,0,0,adb839c171053a824d018e9c587967ed1f229d53fd5e382994aa64519dd4adec,2024-11-21T04:31:33.330000
CVE-2019-17019,0,0,96a3ae6677af9666ba9c37b676d93f6a84e0ca722b3d42ff0f6164473bea6d6a,2024-11-21T04:31:33.450000
-CVE-2019-1702,0,0,4c26c85edc7f463f629a5f97086a3773a5aad8a2719dd3529ca4c51b764c5fe8,2024-11-21T04:37:08.110000
+CVE-2019-1702,0,1,b224098838f7821dc47f797caf1a9bfdbfbd6196d4da6946bd1a32ffeaa2cd42,2024-11-21T04:37:08.110000
CVE-2019-17020,0,0,e547bd9c1f45c65a7d307288d68b12048f9bb5bacaf48b477ef5b4ac1a1d694f,2024-11-21T04:31:33.570000
CVE-2019-17021,0,0,bcf8be2b0b23e502d3d25598f8ad64d069766a5132a78659c782ce0d36279fc2,2024-11-21T04:31:33.697000
CVE-2019-17022,0,0,2549626e1780f6af1ddb8be2f539ea0e922a5c5c1d303eef7ec3e82378d33744,2024-11-21T04:31:33.833000
@@ -134826,7 +134826,7 @@ CVE-2019-17026,0,0,8d8a63899bbb94b10200e425c633509c8e0c6b0836b21f83f95087695edf0
CVE-2019-17027,0,0,f7ed5974fc75e190b4208964f8711f7ad9b93123e226a61ac2adc63a0345f3ef,2023-11-07T03:06:04.753000
CVE-2019-17028,0,0,c1265f7a7b94d54285d64f616e08deb150012bd5b7ab30acccbe82decf486f90,2023-11-07T03:06:05.003000
CVE-2019-17029,0,0,18d34cee5063de4835bbe4b851811efe9a29c8a276a2b4c6f58794cc92f6fb23,2023-11-07T03:06:05.377000
-CVE-2019-1703,0,0,3ba32a4e22f9eca9bb003f5fe96b48eeea7fbf893663e4c3481cdafbfca1d73a,2024-11-21T04:37:08.240000
+CVE-2019-1703,0,1,a3e0704f3ba41c0adb0ea409c6a69ec5a66ac5d8835cf89a13179354a1703743,2024-11-21T04:37:08.240000
CVE-2019-17030,0,0,274c52badfe6172ed51e7c303f51b6597b6f7a99d17800eddee01c671eb5f2ec,2023-11-07T03:06:05.637000
CVE-2019-17031,0,0,3f483ee76ce813efaf674a832e65dbeea5a388aaf23d0c0ce3d1a9d5e875a7ac,2023-11-07T03:06:05.880000
CVE-2019-17032,0,0,490493862ba75061c03f41a37026df1b5b2b41ba565725951d0b87df886fde27,2023-11-07T03:06:06.120000
@@ -134837,7 +134837,7 @@ CVE-2019-17036,0,0,ee0364de039ec3fcd828193211e009b980816ac9d776349626fe5588b3678
CVE-2019-17037,0,0,45c921c83e652095ffbdb9e8775064095f4293147efeac639f4289003b02a724,2023-11-07T03:06:07.300000
CVE-2019-17038,0,0,930749cce75d08cbae38764656494f73cc3bb235cb3376e6f973ac6cffbdf2f5,2023-11-07T03:06:07.550000
CVE-2019-17039,0,0,865a7d99b88c7495838f699674a1efcf0ee60126e995f1dfe4e795894aeefd47,2023-11-07T03:06:07.790000
-CVE-2019-1704,0,0,cd9a0dd41d59fb54c0ca7ae8a7fe5f914a5d0df3652f09764c41f70309000c0a,2024-11-21T04:37:08.370000
+CVE-2019-1704,0,1,e2bb947196954db1e5ee5e8ed12907cc318fe57ef6abe86282a488fd305149b2,2024-11-21T04:37:08.370000
CVE-2019-17040,0,0,07f7c9d010224f6208c39bc0a51a1607b492540311a23362e6d3cb193c0ed4ac,2024-11-21T04:31:34.727000
CVE-2019-17041,0,0,5099e7879e7da53b8df6840dd7148842ccf37787244d00b2273d7c0c7d4a2a7d,2024-11-21T04:31:34.877000
CVE-2019-17042,0,0,d2222173f5d0ab14a8116066193732cfadb5e00b7898749dbfab3c7d41730dd0,2024-11-21T04:31:35.040000
@@ -134846,7 +134846,7 @@ CVE-2019-17044,0,0,64af04ad3966f3d12fb10b61b14ed6132054732b0270aeb0a60fc1d7e4db8
CVE-2019-17045,0,0,70172bfc396e22694812a6f3400e9817bc2b47c9cfa4e5f6ce66584df00e8ac6,2024-11-21T04:31:35.530000
CVE-2019-17046,0,0,aebdda54a478e65a1ce6a857d84209a4f0c87a10a3bbfb2deedca118b2f3c6fd,2024-11-21T04:31:35.670000
CVE-2019-17049,0,0,78d3787f61af602a4a612c0f2c6e436aaddb3009c0d5e0d6099a16d8ada3e7b6,2024-11-21T04:31:35.813000
-CVE-2019-1705,0,0,99870971d04aa799850561e067de662a351f2ebc717160205f1ca29ec73deb55,2024-11-21T04:37:08.510000
+CVE-2019-1705,0,1,20fb75cf300babb7bd654acd53c0708a68e13c144d8b0c3b3444083cdec96a44,2024-11-21T04:37:08.510000
CVE-2019-17050,0,0,fba7e27ef7f1a08bd2d04951c95a4a1f8b52e215cd0e9884732b871fa24995b0,2024-11-21T04:31:35.953000
CVE-2019-17051,0,0,6d4d77cb7457ba7e1939d7223d563c1f941513b4dcb0efea3c6574848a312fc1,2024-11-21T04:31:36.103000
CVE-2019-17052,0,0,bdb42a6f2285da5e57d5c3059259cba65e434b604c5d25bc6e8ae6feab165abb,2024-11-21T04:31:36.250000
@@ -134857,7 +134857,7 @@ CVE-2019-17056,0,0,c2992097e54cddaaf780918d566ea2c378e51ce54ca6b757007c47819e3ee
CVE-2019-17057,0,0,da999664576e0b53e770d8998f409dca59f50b5d5e498e208955ee6fe8427b4f,2024-11-21T04:31:37.050000
CVE-2019-17058,0,0,aca7a218565dcda7f53ca84cfd82b1315e57275e2d3068c32c1e62566b85e379,2024-11-21T04:31:37.190000
CVE-2019-17059,0,0,f09477d0cb989a87a96f644956a947745a01331f7e8ddcb6739bcb8c30c34f36,2024-11-21T04:31:37.330000
-CVE-2019-1706,0,0,13d1470985d953254abd6002abb7499b6d86630d3df87904fb38659342f4aa20,2024-11-21T04:37:08.653000
+CVE-2019-1706,0,1,6370f6ecdf2a0dfc84e3587d7e01899aed6b31e6fa1a5f34b45b7a7a45b8a6c7,2024-11-21T04:37:08.653000
CVE-2019-17060,0,0,6800dd8156c2303fd0102d804855e27f67744a671183fca73c04960985f5321b,2024-11-21T04:31:37.480000
CVE-2019-17061,0,0,9d9db397659607a98ec03bc3facf56ae9c8b2da924fe9cafe42db7a2f933997f,2024-11-21T04:31:37.627000
CVE-2019-17062,0,0,005e4bdcdd6e000dcf27c1188b69af5c5f77684ff679f366cb4fe85697357c77,2024-11-21T04:31:37.777000
@@ -134867,7 +134867,7 @@ CVE-2019-17066,0,0,15c8413428a33d63087c8f5926f76f680e7eb5aae93ef5dd58454a6dbc526
CVE-2019-17067,0,0,5e85586014aee482e749ff641bcfb309a2c40ac2ef2742dd075794a8933cdb8d,2024-11-21T04:31:38.360000
CVE-2019-17068,0,0,4c560155df9173a7c1df95c6d6f811bec3317c86ba0b2b2547d1ee66c97f3440,2024-11-21T04:31:38.500000
CVE-2019-17069,0,0,5f2571e98fd6167b1cb19f25d7ddce10095a6809117bbe4c1c8f3f720049f339,2024-11-21T04:31:38.653000
-CVE-2019-1707,0,0,2ae3d6ad62faf4cc80e0f6e25225729149f6b3a864ec982a7776dd1fd3d95401,2024-11-21T04:37:08.783000
+CVE-2019-1707,0,1,89a41c639c631c24fe0135595c72ac9c765a5026e4dc16643edbb18822160fbd,2024-11-21T04:37:08.783000
CVE-2019-17070,0,0,68cfde51c1416a306fc9fec1df50f9ce66d4f98d7d8cdc1674463f0b86eb66cd,2024-11-21T04:31:38.800000
CVE-2019-17071,0,0,162de4387faab66e50d72ec23bc2978466301aeb08b6764facee3d9f06746549,2024-11-21T04:31:38.940000
CVE-2019-17072,0,0,721321cf455e0fa1c155d9d55d5093e0a1e5c0f49ffdf5d72be8972e8af0736a,2024-11-21T04:31:39.077000
@@ -134875,12 +134875,12 @@ CVE-2019-17073,0,0,de9876250ad261150e8da136aa7ca0c59c324cd12198971eb6318c92309d6
CVE-2019-17074,0,0,3ccaaa5309fd62f79616cf806c98ad373c60d8bbf4d86afe5ed0ef589f0aa1e4,2024-11-21T04:31:39.357000
CVE-2019-17075,0,0,b13c049d46bf5bd185306eebac1156652bc31547d4a8b0ff9f58e84fc6a47c25,2024-11-21T04:31:39.500000
CVE-2019-17076,0,0,29e1c24703e3c5abf389b911b93d3f4f2393dee770f72dc33079e11f40db8dab,2024-11-21T04:31:39.677000
-CVE-2019-1708,0,0,66b342b900363f0652622139ddd622fbfd0b7a06142ce8d542b0bbe298a50e3d,2024-11-21T04:37:08.910000
+CVE-2019-1708,0,1,9e77c9db559b693583f3b30fe95e7b2508dd8837335de67b73b66b9b37f7174f,2024-11-21T04:37:08.910000
CVE-2019-17080,0,0,16ea6e1ae0a7d05a66496896956c03655d58d835b5e5b5bd933c7cd70c843f13,2024-11-21T04:31:39.823000
CVE-2019-17082,0,0,c439f94ba02d84cf12dd2123f2ba672455510324767b08a5254c3499c53ac953,2024-12-17T16:15:21.400000
CVE-2019-17085,0,0,051a5575ac6f80434dc9fa80e3b180c65bfb9ab2c637c6f9f13530a13cd0b230,2024-11-21T04:31:39.973000
CVE-2019-17087,0,0,2cb2a611e9c76d56ba85e2a7bc0cc3a718beea9e57e489a93677876bc3c49c07,2024-11-21T04:31:40.080000
-CVE-2019-1709,0,0,94d87eb6901cb24d81302303539415f94bc1773a364b2f3a252e4305a631b046,2024-11-26T16:09:02.407000
+CVE-2019-1709,0,1,a809afa72d279dcbd09c59bea147289be26bc3fa58dade06b7fccd9057000aa0,2024-11-26T16:09:02.407000
CVE-2019-17091,0,0,dd743cb5c8836e0ec3f608385f22ae2c8c468d43c8ac778eed9bb3ab976608dc,2024-11-21T04:31:40.197000
CVE-2019-17092,0,0,d99936b96714285b159a80f670791cb56865b51cd53b60c77963e37b4c7284cf,2024-11-21T04:31:40.490000
CVE-2019-17093,0,0,8548a9015d391dd937267848643430c4a025a9cab577504c1b3affc616e0428e,2024-11-21T04:31:40.653000
@@ -134889,7 +134889,7 @@ CVE-2019-17095,0,0,de9d5753ed113589bb13fb97253f9a9832294bf842ae3661059e9d715a3a4
CVE-2019-17096,0,0,4ca916b0216ae145c09c89cbc3e38d1f5ff1a729fef3673a2ec5a6a67ae6a6ac,2024-11-21T04:31:41.107000
CVE-2019-17098,0,0,e390a0b037c47d918f522ee5af8d32d15c281eea6ab402045d0e3f39c2217f95,2024-11-21T04:31:41.240000
CVE-2019-17099,0,0,d3e3e246b6793f467b62e9eef9591495c6a84728ba2ac3212dd3b2973d9c55f6,2024-11-21T04:31:41.380000
-CVE-2019-1710,0,0,823e40ee0772bf53fefce842df0fe69c7bf6bb2e633325d36b634b7d97b2aece,2024-11-21T04:37:09.177000
+CVE-2019-1710,0,1,0278bdfce492fa4c182382aeee444b216c77d8cbae2c5eae8534acbf2ab71c7e,2024-11-21T04:37:09.177000
CVE-2019-17100,0,0,6e6814b28dc93c198ccc152769de3d2dac446fbf4fbc7c8b94e13f56782a6ff1,2024-11-21T04:31:41.500000
CVE-2019-17101,0,0,a511f5c37ca4214a81d6b72510bdc130ae74afa997ff17c7b3bc2c9b5ee2028c,2024-11-21T04:31:41.627000
CVE-2019-17102,0,0,466f2a047c776740ade51b760a25f104c4a2002f7017e052a3e4d715dca8995d,2024-11-21T04:31:41.760000
@@ -134900,7 +134900,7 @@ CVE-2019-17106,0,0,8fb402ed4557f40c504d00616b4af41b261f96003a0617d926f6550b42703
CVE-2019-17107,0,0,2908a8b882e74bb8200e6d01cecfebc2aa67dbc6138cec72a44239fc717cd195,2024-11-21T04:31:42.463000
CVE-2019-17108,0,0,81743a1d572e6dc568f565be6e10c017769cdb73cd61b8e36760257c2fa56c85,2024-11-21T04:31:42.600000
CVE-2019-17109,0,0,cb842205083acc817dabf948e6b031f3365d15bb578785d0c7aefc871f620c5b,2024-11-21T04:31:42.737000
-CVE-2019-1711,0,0,b9b64ed3a427594b56a71801902f8199d8b55841af5dcde28a2ae363071f556c,2024-11-21T04:37:09.303000
+CVE-2019-1711,0,1,949d10569ebfcfc36c48b0e242d1444898bcb585dccaf79c50a9a9e0ab198bd3,2024-11-21T04:37:09.303000
CVE-2019-17110,0,0,84a4cf8986778b4ca65838fa0d1a7093277ab49c0c64285917ed8420abc00095,2023-11-07T03:06:10.083000
CVE-2019-17112,0,0,d795ec399c3d994450a90c31034967d06c2e0c2cdd2994df18c3ffefe1dbe6cb,2024-11-21T04:31:42.907000
CVE-2019-17113,0,0,26434b7acfc1c13d308be267d501a955f23515870af846320e226a2d5f96fb03,2024-11-21T04:31:43.057000
@@ -134910,7 +134910,7 @@ CVE-2019-17116,0,0,728871e9a720bbaf98646be6218bf230b1ae3bdb3c997d5903ec553d8698c
CVE-2019-17117,0,0,62ea91cb05e8816e832beb94ef426b6c787872af40c95026b188192140192c70,2024-11-21T04:31:43.620000
CVE-2019-17118,0,0,2aa9cd4413075afabf23e357150e31b5a8167d48dcc5d6ed7e2aa38cbf817c78,2024-11-21T04:31:43.780000
CVE-2019-17119,0,0,76c602f06cfd7786b3bfe9a932fdf7186b73bce88d4f39d1a5948b9446e3015c,2024-11-21T04:31:43.937000
-CVE-2019-1712,0,0,a2e2b37ff6e3ed4f7faf4617da6aaee1c1d8351fde2a47be76eb92eae01c1cbf,2024-11-21T04:37:09.430000
+CVE-2019-1712,0,1,1b713703d11277310472c06ec0ee91a7c8407f91ecd8fa5fbc929f5f7a3a7889,2024-11-21T04:37:09.430000
CVE-2019-17120,0,0,919a8dc625f090541de9f0b030319dcd57d803ca13211b3afa5b618d6bb50198,2024-11-21T04:31:44.087000
CVE-2019-17121,0,0,a4609e742a2df67e2eec420e7fd7c734717b80166a963d99689cef66946dfd12,2024-11-21T04:31:44.237000
CVE-2019-17123,0,0,1d4f2f9993ada654f4a08a8bf1e0855dbe0ed9e9543ee80981a263d28987a208,2024-11-21T04:31:44.377000
@@ -134918,7 +134918,7 @@ CVE-2019-17124,0,0,aab51d19ca4ebd1e3fd614170d4f633fdd53554150dd5739073e1c4f86284
CVE-2019-17125,0,0,75e5a4a711812655c6994e974646a8f59ce9b181171675be2b732718e457f0e2,2024-11-21T04:31:44.660000
CVE-2019-17127,0,0,406fa0345d2e0d9fad68a95a4252b0461045d3c81c6c1f0b1cac94adf3535e8d,2024-11-21T04:31:44.810000
CVE-2019-17128,0,0,a84a02d9f2b35575e66a840763dfff6d091d281c398bd01e31ea88de1242e4e7,2024-11-21T04:31:44.950000
-CVE-2019-1713,0,0,5cb1400cb9e47c4c3506c6a7a8213ff6b07328981a91c33c0d4e9ff81ee2d593,2024-11-21T04:37:09.560000
+CVE-2019-1713,0,1,f6414609aed4d819d80977236d18abacfee82b7399fd6c31587c1355ff7297a7,2024-11-21T04:37:09.560000
CVE-2019-17130,0,0,db172dc459fcf0e0a6b79ccb95423886e8214760dc8ddf0f8bde7b0a5ae4b248,2024-11-21T04:31:45.097000
CVE-2019-17131,0,0,9a0fda6fd55f66f76335d69672c05c12232084e17cec945c6c5a17a2106814c6,2024-11-21T04:31:45.237000
CVE-2019-17132,0,0,d14580542ab43801eeb3bfb21ee3d756089c336bf78178f5dc335325fa51db5a,2024-11-21T04:31:45.373000
@@ -134929,7 +134929,7 @@ CVE-2019-17136,0,0,5d7c3b0632f79ebc58e6a7fbdc0eb83ce787ea192e5f70524f7e4dc973c97
CVE-2019-17137,0,0,fd8d76e1b8725736c505e5cb90c386f0ba743e100bd7cf780d6add20529411bf,2024-11-21T04:31:46.110000
CVE-2019-17138,0,0,4719fadb081c060eae20914c5f9726eb94321f6330bececd72e578f074524a44,2024-11-21T04:31:46.230000
CVE-2019-17139,0,0,723681c51c1317ed9cedbdf5c738cef249fd114592ef61d32cb72853a6999bf0,2024-11-21T04:31:46.383000
-CVE-2019-1714,0,0,0617a2e9d9cd5866d743715ea050100cddd485e0ce39dcee8d82c6ca91a7769e,2024-11-21T04:37:09.697000
+CVE-2019-1714,0,1,8ef9c1709e9e5a70276bc10a9c3f77c149212879480f439180b04b3d0c41fe52,2024-11-21T04:37:09.697000
CVE-2019-17140,0,0,c9d0042d8a221d6adbb8c4655eb8d43a5f1c70d9b32236874d1a56e3e97d4db8,2024-11-21T04:31:46.523000
CVE-2019-17141,0,0,9301856692c24345de0aa7e563de968a44d15d0dc050f99d407c53421ebd2700,2024-11-21T04:31:46.660000
CVE-2019-17142,0,0,676b97d73e72aaf71a9a58c137fcfec31e374bf26be803b4df56c11280a48002,2024-11-21T04:31:46.783000
@@ -134940,17 +134940,17 @@ CVE-2019-17146,0,0,9dc786fc8fa53251fefda1d2c1ff861d22be5326b64de6936c460125fdb1e
CVE-2019-17147,0,0,9bbd4d9f23c38db50c65c4603696faaa0a5fde51bbc9f83f4640503dfec86f53,2024-11-21T04:31:47.390000
CVE-2019-17148,0,0,3e7f612777ccd0df2e21ccb06bf0524f330eeb36e4e68b02b44deda8d5c36481,2024-11-21T04:31:47.510000
CVE-2019-17149,0,0,a8b016376cc80aec10e3d1d92aa4b95e6d3646458eabab79933bb30aedbdbca8,2023-11-07T03:06:10.533000
-CVE-2019-1715,0,0,7e20107eab337c1265816faad0740b9b1f4fc766f4f64850161871540e624a83,2024-11-21T04:37:09.840000
+CVE-2019-1715,0,1,666d80a21d23bdb2ea3ed2a6ed2bf6823d9ea6ce2095fdc325f54da77deb0069,2024-11-21T04:37:09.840000
CVE-2019-17150,0,0,6f55dc498eec2b0e9eea841d1360057a89d608ed54ed834a15ab67798583a1ba,2023-11-07T03:06:10.847000
CVE-2019-17151,0,0,c9332a571d8451a49eed6b65bef72017f7dc2eea23831cf4a13a78ac0ec75475,2024-11-21T04:31:47.663000
-CVE-2019-1716,0,0,b80ed70b4d739396212fe7cdf72a74aa263f013bbd8b226931ac1e5d133049d9,2024-11-21T04:37:09.980000
-CVE-2019-1717,0,0,5b12feb4147324fc4da85e46acf3da250a942d5ae93505a7e9931ff1a060b88a,2024-11-21T04:37:10.113000
+CVE-2019-1716,0,1,1d52482b01e04d8f6df184575bb73b7492c65c45994b3997b85342ff0d514375,2024-11-21T04:37:09.980000
+CVE-2019-1717,0,1,94953ff4354b4d6ee42e21a19170a859001bfcd2483246507e4cd15b5ae52301,2024-11-21T04:37:10.113000
CVE-2019-17175,0,0,6af144baa6f25c7533a45fe08ae67c89b14f641796835efe0d91e3050fe9b5d5,2024-11-21T04:31:47.773000
CVE-2019-17176,0,0,d1b03a9e8874a75e62006b0ccc2ee22e13115ddb6fa8589e0e7ec9a662274558,2024-11-21T04:31:47.920000
CVE-2019-17177,0,0,95cdd1e7b36b321b26f38ff3576684488204246ac7b20c55701245b8a1ccd714,2024-11-21T04:31:48.073000
CVE-2019-17178,0,0,f509ee6a0e2c9036a3763f644e8c519f4b9f57f199a53e79b8c2f0e70fa06c18,2024-11-21T04:31:48.230000
CVE-2019-17179,0,0,b56572f975cd477eb700ede2f970c07909d31624f43d873a5996d5c3f3a74adc,2024-11-21T04:31:48.380000
-CVE-2019-1718,0,0,b9c6440bda4c917fa13ce2135a6c06e93d6999f1c0769e9ab4328c8440dc505a,2024-11-21T04:37:10.243000
+CVE-2019-1718,0,1,d50958f871a68cb993656336cece9bc7798c2102df8265752723d6b33ec77fe9,2024-11-21T04:37:10.243000
CVE-2019-17180,0,0,3807a5538d96adf50c06a79bef4018d1fec0e103351825c5648fd7b49d1b1269,2024-11-21T04:31:48.527000
CVE-2019-17181,0,0,23dc5107b73d528987e4f9f08555a0d05e379949cef1ab4b978a10cdd8ad990e,2024-11-21T04:31:48.680000
CVE-2019-17183,0,0,e87ee7bd3dfdec485ee57ad91ab77871119ac3647861e4f9e953f911107c4662,2024-11-21T04:31:48.830000
@@ -134960,14 +134960,14 @@ CVE-2019-17186,0,0,2d409968dd0ff1e7211a92a521fcbd5b283a386e4fc6730bfd452fd12706f
CVE-2019-17187,0,0,8bb66b355079cc71f2b2e923f8bd55d3d6d6ff23ca68bbbde857146d374466b2,2024-11-21T04:31:49.420000
CVE-2019-17188,0,0,91594280700bc601e4fa524aa4c164c1f0644495558b19e517b8fdf640f7f0b1,2024-11-21T04:31:49.560000
CVE-2019-17189,0,0,38423bb34a5630dfe5ba9d441eb49e369c45a4a19d695f8ea719928f8990d82f,2024-11-21T04:31:49.700000
-CVE-2019-1719,0,0,57d6318768d6a42e4f3673c80ba2990afd593090f20b7b6c20d8e16fb1749dea,2024-11-21T04:37:10.370000
+CVE-2019-1719,0,1,747e8c1c2effb6ea2e68be0215471fcf883a0a216e943f7dc17fb966c14ac746,2024-11-21T04:37:10.370000
CVE-2019-17190,0,0,902d33596d72b73d8f7092b55b0e92bb3c1560e8cae8a00522965d8a36c3d36f,2024-11-21T04:31:49.850000
CVE-2019-17191,0,0,0137d881c63bd89dbb4223502012a43895e44f4314c68119dd7e45fe593c839b,2024-11-21T04:31:50
CVE-2019-17192,0,0,cdcacc30a8fb726c44526e9f88c2911e65f0574c5c5fd4df17cb9b05be70c25c,2024-11-21T04:31:50.137000
CVE-2019-17195,0,0,23c20fe4340733f5f05ad35c14ac99c32ab44c7dff01c44a5da6ea9506ef3070,2024-11-21T04:31:50.293000
CVE-2019-17197,0,0,d4b335fed24242a20c4abee2fe6727e46d7c69b27a0ba6a77ce861c051746fd6,2024-11-21T04:31:50.560000
CVE-2019-17199,0,0,d2d146602f337a17ad2e874ea4dca63d73c7d580754261c6a6110562d15cc843,2024-11-21T04:31:50.720000
-CVE-2019-1720,0,0,518f3e9d931e6a3cce02d145c5b24b151d0d24bc02e19e3c2ca28e485fedde0c,2024-11-21T04:37:10.500000
+CVE-2019-1720,0,1,bea64e354988fd7f75e333ba97863d713278bfe4bcd7570c83faf06346497ecf,2024-11-21T04:37:10.500000
CVE-2019-17201,0,0,404f5fa06f0aa07c137f49bbd16c47c092f3a18c0a18dbcb9170baced39ccfa2,2024-11-21T04:31:50.850000
CVE-2019-17202,0,0,fbcb6dcd5cbe661871cea5bbc48743e05abf2773147515b724385c5ad8597f50,2024-11-21T04:31:51
CVE-2019-17203,0,0,c07c3db8535d8fb7f7a871206bd3ed0390fa2abcf2fb766f9d56f6bc2af3b406,2024-11-21T04:31:51.153000
@@ -134975,7 +134975,7 @@ CVE-2019-17204,0,0,6c09dd5a473ddd7a340e9bf3b797606ec28cf1a7ba876141d7db0ce961139
CVE-2019-17205,0,0,b073a8ce439f2c1bc56cd51f4822a66ccc776d1c568988bf58af7ac22c9bf5a4,2024-11-21T04:31:51.430000
CVE-2019-17206,0,0,fb3b948b21536c7c2c956bc568bf0721269d2b829089b8b6321bc8af04ff1ab5,2024-11-21T04:31:51.563000
CVE-2019-17207,0,0,249c03cc2dca58a2c58232a8a7dd66d315d7a74c0d0b6433e28988bb6ce8b386,2024-11-21T04:31:51.707000
-CVE-2019-1721,0,0,0167a313737f1fd2f3d37375c4cc2f8b1f157d3db9863c9447c10a93c3245893,2024-11-21T04:37:10.620000
+CVE-2019-1721,0,1,e19e0da9fa27cd3c0271ce3fdf5c4e3f59b018de0b5a984aedba383d60e2ea30,2024-11-21T04:37:10.620000
CVE-2019-17210,0,0,c8b06fcca4638e36f91d9bb9a81c19757bb79f42a92f3fe055f08373a62250fa,2024-11-21T04:31:51.857000
CVE-2019-17211,0,0,008d89f6167ee704d9afdff65f07eccd99bfe369a32a9c7390ff59e934b3b3fd,2024-11-21T04:31:51.997000
CVE-2019-17212,0,0,d81b527ceaacfdb93718b6e1e25f0ecdc6245ba85cbe0d013538d89186754a10,2024-11-21T04:31:52.160000
@@ -134986,7 +134986,7 @@ CVE-2019-17216,0,0,3f636365c6eb78b6c8200944481f7b5727116cd4ce8723a9a4249d3d82d4b
CVE-2019-17217,0,0,d28e5da7bd0c193513959cb7f5219c5a28b7e02a02cb3df8f7dafb29c264f7e8,2024-11-21T04:31:52.880000
CVE-2019-17218,0,0,9541f52a95f1edeacc0d0ed06107d2a3ee52a5cf72d82e29eb877c135ac7bf09,2024-11-21T04:31:53.020000
CVE-2019-17219,0,0,b95eb1381d4f76d8ddab797f0ee5af3ea8fc95faa45505c79388c37ccdf07639,2024-11-21T04:31:53.160000
-CVE-2019-1722,0,0,e3acf9576eed995b302ba62b345c6fde0e0f3ee773a1cd43ca2ca84f24443821,2024-11-21T04:37:10.750000
+CVE-2019-1722,0,1,39952914da4de51eeb0342c14d855555e9e10e93d2256e44a1809dca0ecaf7bc,2024-11-21T04:37:10.750000
CVE-2019-17220,0,0,0ec1008e35f6c24a398b76da3eeab1faaeb91aeba4ca094a1c08fcc814c62374,2024-11-21T04:31:53.300000
CVE-2019-17221,0,0,3c791defa4bc317730a97a263a1ccec91209c9b1cd496b0dfeb624a026fbe679,2024-11-21T04:31:53.447000
CVE-2019-17222,0,0,038d0ef2a7ef8cdb875c1b57364839ef8b4b1c7c3af05926725914e35e71417e,2024-11-21T04:31:53.583000
@@ -134996,7 +134996,7 @@ CVE-2019-17225,0,0,8ea377d06b9a82074b58ece0bebe0da70269ff7f9014e91037c9125efa5af
CVE-2019-17226,0,0,72522f7c68cd3dda7bc308b0eee7d593c8e053cafcef37da7bf85d48be24efcb,2024-11-21T04:31:54.190000
CVE-2019-17228,0,0,cb75e3c9dae0528d5543cb0963fda337eb062d022cfa30dd1e16aced8f738834,2024-11-21T04:31:54.327000
CVE-2019-17229,0,0,14fbaf6e94c01739a53c19bc082df7b02be8f9fe79828d240f443b387b741f9d,2024-11-21T04:31:54.467000
-CVE-2019-1723,0,0,0698e55a2fca3682cfca20bf34a2b1dd71ec78e6c4e61db60b83a71b41e335fe,2024-11-21T04:37:10.867000
+CVE-2019-1723,0,1,dafc9b3936eac180272eed7a796ef49989b3a7775e8dff621366b87c3c3c78ec,2024-11-21T04:37:10.867000
CVE-2019-17230,0,0,ee03942d323b68231a89eb95bc779242818b8baaa1a2dcdaebf8422fa990b9c6,2024-11-21T04:31:54.607000
CVE-2019-17231,0,0,36b7cca130a489f3dcd53e8f9d02564a73db41372074d8bf7855fff26a5a253e,2024-11-21T04:31:54.743000
CVE-2019-17232,0,0,497c5ab1b9808d7d49de4df36b3c8463c75698d63007326a0a6758573108640f,2024-11-21T04:31:54.883000
@@ -135006,7 +135006,7 @@ CVE-2019-17235,0,0,2f4096a6bd7268c83f0ed0509008b876e4d658b4086ea38f28aa4ac24ff7a
CVE-2019-17236,0,0,69d3163e03899f22b34bc1608ab67147b65ff9d22feab6d2b80a80562bf2d29d,2024-11-21T04:31:55.437000
CVE-2019-17237,0,0,5274cec841afdae5fc25100f5833e4caaaafdd153d813c73d30fd6fcc8e2ebbd,2024-11-21T04:31:55.573000
CVE-2019-17239,0,0,3044879675b0f4ceda333e3ffcbdffb1221ddc4329a5c87fc5873f8380d5367c,2024-11-21T04:31:55.720000
-CVE-2019-1724,0,0,1e8443b664a32283a3674ec38f1bd8d53dee93624d4353b72ee3e7d4f0a6eb94,2024-11-21T04:37:10.997000
+CVE-2019-1724,0,1,cfeadd49325935649a8b37df7971a973456945a6ab6db3a56ea93faaab28869f,2024-11-21T04:37:10.997000
CVE-2019-17240,0,0,f2f8a873963da8f3046efb2339a9e523e7b75b0130d3320bc4a83c9cf253c5db,2024-11-21T04:31:55.870000
CVE-2019-17241,0,0,48f8c37cfd5bda8b546f95d7a1f61cebb3ab2e6be6eff6ad5caa56424ee886f5,2024-11-21T04:31:56.020000
CVE-2019-17242,0,0,3e815cc55e782cd8be3d33fbddf6cf904cfc5f8e2606acd4b8c4e1a1abec77b8,2024-11-21T04:31:56.163000
@@ -135017,7 +135017,7 @@ CVE-2019-17246,0,0,bef46f70c96c3da6751fa9878b0ebcc36880eb2f26d883633cbc380074802
CVE-2019-17247,0,0,54b248560dd4dd0191abd81fe7595921aca3aee14d3a6058a01a386bf3ee0d7a,2024-11-21T04:31:56.860000
CVE-2019-17248,0,0,9c2ed577d3b1939367c9307442afbab58bb0ab9c49f6386d7b305962c5c3d8d4,2024-11-21T04:31:57
CVE-2019-17249,0,0,acdb70fd815a50faff4404a0cddab839ae638fa51f669fb1a336261ba336e51c,2024-11-21T04:31:57.133000
-CVE-2019-1725,0,0,d1b851e14d57ab5017e468cdac878fa17eb2fe6dc2c589d6c7c95e45ab6e60b4,2024-11-21T04:37:11.130000
+CVE-2019-1725,0,1,d1aecca1fbb9d426a00b81dcf381e796d4d6dba7eb093e7f158a06239c23c8ee,2024-11-21T04:37:11.130000
CVE-2019-17250,0,0,d225698990f9f23eccf3519c79306eacc08d8405f03817685f48d0c66c60ae13,2024-11-21T04:31:57.273000
CVE-2019-17251,0,0,1adc609984f19befe0237571d9f889c80066b685401d50102a50fd82cce1f283,2024-11-21T04:31:57.410000
CVE-2019-17252,0,0,17e5eacbc25b667fef018d5204472ff5354c7c5bacf464a94f26fbf1dae16cf5,2024-11-21T04:31:57.550000
@@ -135028,7 +135028,7 @@ CVE-2019-17256,0,0,9ee6c9843b5f0d1517c7fe9ab191a685ef91de61c1e42674c94caa8e6b477
CVE-2019-17257,0,0,6e5cf9be68f44e8c564b01071ba3e97faa8230c34b503f496649b003418063d4,2024-11-21T04:31:58.263000
CVE-2019-17258,0,0,faec8c37a1746f156c8301bc3874a9155ba7d9cf9bde4227a3a889906c37af92,2024-11-21T04:31:58.400000
CVE-2019-17259,0,0,36e796b078d3adabf6256c56fcce703f49b4d9847894c164fdcd9eeeec35a501,2024-11-21T04:31:58.540000
-CVE-2019-1726,0,0,53b9175f6aa462090eb4b6f9c64d208d7d258be9766382a4517cd952afa30959,2024-11-21T04:37:11.267000
+CVE-2019-1726,0,1,6af1c090296d060779d09e56ba7855d8fbed469a28caf9c75fde95e0593885f4,2024-11-21T04:37:11.267000
CVE-2019-17260,0,0,2e36cf5feef71ae2d6c9e802c0ea72cc3c9d806ad44ad18aa118b58216e7a2f3,2024-11-21T04:31:58.683000
CVE-2019-17261,0,0,7ee761a4ee3dee10c8f7e51ba1477dfd54be2a3382641f6155af7eef8a805769,2024-11-21T04:31:58.823000
CVE-2019-17262,0,0,d5267d829a706390fdc01e92481e461a9c72149e866f66c0565b97cd9304d01c,2024-11-21T04:31:58.967000
@@ -135038,7 +135038,7 @@ CVE-2019-17266,0,0,af56ccbe4f4598bd424bb93600f1e67ae89fec66680d913b6e357137958c5
CVE-2019-17267,0,0,c01c5d8aa3faf7040b7f8cbac179a7b944a1137119b96ef0632044e4549c5a30,2024-11-21T04:31:59.543000
CVE-2019-17268,0,0,09ca3acb36b71bda5893602c9c56f42bfa12ab43972ff5bc35cae77f0da9c452,2024-11-21T04:31:59.760000
CVE-2019-17269,0,0,2bd4cb8a6629122b761276867d5cf8dadaca3cc97b1110e7d6f1299b649d3197,2024-11-21T04:31:59.900000
-CVE-2019-1727,0,0,f09aa461e91517f16d47ef639f9690caf1421fdf4dcb758f02ca9fef6ccbd89d,2024-11-21T04:37:11.413000
+CVE-2019-1727,0,1,20c09fa7597e42bf8ee360ad6b859a3f7169a531c80dd667bcaf73b0a50b13f6,2024-11-21T04:37:11.413000
CVE-2019-17270,0,0,236a9bb6a0db95bc6d5e74e1f5c691be85dea2d2bd309c567e910e66e660f92e,2024-11-21T04:32:00.040000
CVE-2019-17271,0,0,7775e40fef1f66ea8ced4d2881c855feaea54218daa398b71d0ed62949141600,2024-11-21T04:32:00.183000
CVE-2019-17272,0,0,ac2a37575ca897d70d373796b5dddceb33c991455e6ebe027b07d28c0eef9356,2024-11-21T04:32:00.323000
@@ -135049,7 +135049,7 @@ CVE-2019-17276,0,0,206fbfe39fbb703a8bcf6bb6f65407ea85fc93ba009f5ea017e9dc4abbec8
CVE-2019-17277,0,0,329d5d9bdc097fc8a459df5c95c116d6ba01c516e2560bb110e0be3e85fd957c,2023-11-07T03:06:12.200000
CVE-2019-17278,0,0,78189226220970e4ec42b4f95be8fd8ba3d7dd86810e03274dc547b8183004db,2023-11-07T03:06:12.407000
CVE-2019-17279,0,0,9c6c0b68fbace5e57422d7e77ccc91f6bfbeda730c094b774e931d6d115cd633,2023-11-07T03:06:12.657000
-CVE-2019-1728,0,0,3301413edd7d489294ed754b76c5ad40f0113fe04bd0c6710480a1b3d62f0352,2024-11-21T04:37:11.550000
+CVE-2019-1728,0,1,b9dbff75ccd71f7a6c4964b19ea815bcf5ad38d163b9ed8d0309302367811a19,2024-11-21T04:37:11.550000
CVE-2019-17280,0,0,3ebed0920f0a9b8d70950c5ae2a23dbafa18b138551363ee80a61269e16c6e19,2023-11-07T03:06:12.893000
CVE-2019-17281,0,0,9058fc1b99fab6bf6687d5d1efda2fcc90e465aab4efeb3c18fd750a44ed98ac,2023-11-07T03:06:13.123000
CVE-2019-17282,0,0,9c56850a1ad1a92dcd51b29b224e4a78a6a26e46b769b2b870ab881615a1f0a5,2023-11-07T03:06:13.357000
@@ -135060,7 +135060,7 @@ CVE-2019-17286,0,0,65daddeaa1b4b1dae86183d1f56daae47b5c49a894f5cbc94521ac42018ad
CVE-2019-17287,0,0,41d8314078e434ac6b712b5405e2339bb7dde98fa22d3e4486589af45d4fab04,2023-11-07T03:06:14.530000
CVE-2019-17288,0,0,b49ad1539bf696172154cf08e4d7b7ee6d101810fe3bb7fb73cfc07e1418eaef,2023-11-07T03:06:14.757000
CVE-2019-17289,0,0,af6a240f09f5b32069059f35a848062cf36e710792028ab90b1e3a97525e2338,2023-11-07T03:06:14.987000
-CVE-2019-1729,0,0,d8ca1b349979451003331913fdb300d66cdeac265807d176b330a4defea7cf62,2024-11-21T04:37:11.700000
+CVE-2019-1729,0,1,d492e172d1fb5243c13046e1f8b4f5ac1da9b7a9593bf1dd0543be2f51059cd2,2024-11-21T04:37:11.700000
CVE-2019-17290,0,0,3882803e230b4709268705718211786e76577f61818c07f7e19b653e240ffca3,2023-11-07T03:06:15.213000
CVE-2019-17291,0,0,8fff73cd737ef23ea52aaf176ffeecdda6260d6a54e32b2e223f6318f39589a0,2023-11-07T03:06:15.443000
CVE-2019-17292,0,0,409bb91be10c3fb6745838f79b3aa1030ae280df19cfbb4573343f0677c88ac9,2024-11-21T04:32:01.093000
@@ -135071,7 +135071,7 @@ CVE-2019-17296,0,0,d973b9854848dbdb82b0910405e17229f6b2609e2ec8cb51f59cc2e519098
CVE-2019-17297,0,0,b0f34a16152409ed666c3561fa866f3a75201b40ad314797a3e8c348e042649c,2024-11-21T04:32:01.823000
CVE-2019-17298,0,0,e7f5d0fcf9fe112413bee012eb152765f1c8aedfb21ad9e7e0b3cc1c7b4e36dd,2024-11-21T04:32:01.967000
CVE-2019-17299,0,0,28994e553099aac659809deb922ddce3a394a21efdc637afeb49b3e57352ea3f,2024-11-21T04:32:02.110000
-CVE-2019-1730,0,0,7eeb8db667978c0d8189bd0786ae86edf840e9f4a842916f8512d1da335cfae6,2024-11-21T04:37:11.850000
+CVE-2019-1730,0,1,efd2cfa56fa941cd1bdc7ba77e9b746d70455442cf3be8be27bf14c5c41ca828,2024-11-21T04:37:11.850000
CVE-2019-17300,0,0,51da1672ea3cc32e9b5c1bb68c44830d78d85def433a43cc40cfb1ad4276c07f,2024-11-21T04:32:02.253000
CVE-2019-17301,0,0,485ecede156923030c04bd5615e1f8fc121b2783429d2c5f35346ed67d8ff961,2024-11-21T04:32:02.397000
CVE-2019-17302,0,0,f97de0a12096b6e6a0a7909bd893a35d78079b352ccb8b92c3ee8de8810a8f14,2024-11-21T04:32:02.543000
@@ -135082,7 +135082,7 @@ CVE-2019-17306,0,0,dbaee87fd2c3e01e4b6836d69a6b9c59185e24d9f583f443cb4f73c42623b
CVE-2019-17307,0,0,7f22777ad9bd2ea857c3733be65ae98d4079a1b1ea822df00bfb3907170c5ff0,2024-11-21T04:32:03.280000
CVE-2019-17308,0,0,e02109ff5212312a0fc9050dbfad43707f2cb866efb082f81100d2d3345f1b40,2024-11-21T04:32:03.420000
CVE-2019-17309,0,0,c9584db154f55fca564a25bd71a3a67b01f2b9a276915872b16b88cccb6d40f6,2024-11-21T04:32:03.557000
-CVE-2019-1731,0,0,16a462da1741b3145d1cd0936815c665fa995b5cd15be18ffb72ab30b233e0f1,2024-11-21T04:37:12.010000
+CVE-2019-1731,0,1,a7764a9ff5ad7dc404e62fe9b2b08261d3e461fdce85e4e55c8aaeaf82e18983,2024-11-21T04:37:12.010000
CVE-2019-17310,0,0,4c497becb6eb48179b16e3fcd3f94b7f249ca5b638eae6f5e3dcff4fedc2de01,2024-11-21T04:32:03.693000
CVE-2019-17311,0,0,824fd08b1d6e742d0b81e93563d19635076ec672e8adc7b8411c85a6e4d1ff7c,2024-11-21T04:32:03.833000
CVE-2019-17312,0,0,874c6d9fa862b70e50b7e71e39055747f779695d2caeff0b2b179002d59d60c4,2024-11-21T04:32:03.970000
@@ -135093,7 +135093,7 @@ CVE-2019-17316,0,0,c7771dfeab23c89d3cf35b1c73e3ba4ad2a7b63be8d9fcf11848049649ebc
CVE-2019-17317,0,0,b6f692c4f25d0398df57a18a0be3b7ce6b69959406a33f5d7484a02f03f9697f,2024-11-21T04:32:04.690000
CVE-2019-17318,0,0,986f6822668a7c6d1d2c23b1c16c1f6bfaa9195a2ad185f412059283a05b08f1,2024-11-21T04:32:04.833000
CVE-2019-17319,0,0,b5cab43e28e010be5e1b7294fc6a6482bab10cac77407e4ba1f1afdbb925a82e,2024-11-21T04:32:04.977000
-CVE-2019-1732,0,0,766eea3b550042fc9d8f00de5712d9a4077f71f36314e1bc81e996756bddb5ee,2024-11-21T04:37:12.157000
+CVE-2019-1732,0,1,37e55b9d531761b5e958f5ca14dc2adffd1add9157e1f823f2bd477b896a29d2,2024-11-21T04:37:12.157000
CVE-2019-17320,0,0,859442c23d64adb9ac91a96f3224a24ab0d66cd37922e891b6458cab3bea763d,2024-11-21T04:32:05.113000
CVE-2019-17321,0,0,a0c8c36c4d991bae1f66c74800ed17df82c920521edccd6cf079e4dfe2faffda,2024-11-21T04:32:05.230000
CVE-2019-17322,0,0,2d70b806cdc8170ac60172f80e97e8605356fd5d714a6c6c7fc90e1b6feb8c26,2024-11-21T04:32:05.347000
@@ -135102,7 +135102,7 @@ CVE-2019-17324,0,0,da3133145340d914ade5924716b2b48bfbcb8f01d193e7f2c45a921cfabae
CVE-2019-17325,0,0,e1efc2709fe43a45825dcf8176b62cf940c743ff035df573122d426aecb47998,2024-11-21T04:32:05.677000
CVE-2019-17326,0,0,a7053d18d58bc9d8c34fbdfb4835f1977b7720d96bbcc45b6507b9a22ec06b98,2024-11-21T04:32:05.800000
CVE-2019-17327,0,0,049b8a9c36ac1a50475cf4a7f5ee9830aaab5ba8aabddab09eb66f78551bbbdb,2024-11-21T04:32:05.920000
-CVE-2019-1733,0,0,80fa17f759dbe8ee74a24e27b81d4eac86825471c294c4a2ef5bb3f42a0e4220,2024-11-21T04:37:12.297000
+CVE-2019-1733,0,1,7fa4b0ebde6021540686d42f0c2cf9c8451e1bbc23645d7bcc462ab0f6a6e69c,2024-11-21T04:37:12.297000
CVE-2019-17330,0,0,577c04a46b1b890f4f96c4c4d09e1f22ac9dc6ed5ed1eed27897d696fc051a19,2024-11-21T04:32:06.037000
CVE-2019-17331,0,0,7ec7e29687aa75da31f55ad8b040a58330efb31c19c43078d0999367822ba671,2024-11-21T04:32:06.153000
CVE-2019-17332,0,0,decd1e27fc91f5e76a1a9916f7d81dbd54e865c8ae46eac52283476a36af4052,2024-11-21T04:32:06.270000
@@ -135113,7 +135113,7 @@ CVE-2019-17336,0,0,c98ffa16ca9268ce2a37e077fe28ecdfe6c1eb3a5e0d63edb2f8d4bf7d819
CVE-2019-17337,0,0,ffa4e227763791cb3ee53a1f88d85058654e6c01df1ccfbc7edae55f67e7e362,2024-11-21T04:32:06.877000
CVE-2019-17338,0,0,c858997223bb38235cca49f53a4b3c29d871c5535466aa847f87db1ba1129cd0,2024-11-21T04:32:07
CVE-2019-17339,0,0,e3afdfc9207f6e0320214e8e041f67b3a69d9fb53bf07507a47ed9da96bd22ac,2024-11-21T04:32:07.117000
-CVE-2019-1734,0,0,7a99b5d54ba9e0ee60d7e4d26252b6fe122e4e22ebbbeee2a7296cb6e95a630e,2024-11-21T04:37:12.463000
+CVE-2019-1734,0,1,599b50b2032672c4a6f3df8c687475eb977d07720d9de75ed463d82ab48cdbb8,2024-11-21T04:37:12.463000
CVE-2019-17340,0,0,23be557dcfa10f85be70331a9ccdf1f7e76935552631ab496e5de9ab3731cd17,2024-11-21T04:32:07.233000
CVE-2019-17341,0,0,70ee527ef4e34d63e9eeefb76254ba34485c2d88574b93852bd3c2c971b99485,2024-11-21T04:32:07.397000
CVE-2019-17342,0,0,5eac7fc295a17cab6405aab74e0e290e2bf216ade6e6790be8f2ca428390a24f,2024-11-21T04:32:07.540000
@@ -135124,7 +135124,7 @@ CVE-2019-17346,0,0,aa4165d333bff2e5909bb7a007312b064f9464151b83a8db477993791572b
CVE-2019-17347,0,0,12d5ad757ed33ec8ef1e2ba0ae8eabd755b0e8f950e0533d1b2c0561ce0c86f1,2024-11-21T04:32:08.283000
CVE-2019-17348,0,0,f8df3dd2427fdb6bc26070716c26bce0879ae9d38ad02c1478d3d35c9c625e74,2024-11-21T04:32:08.450000
CVE-2019-17349,0,0,7a79a5414dd53c23049ea3724fd9453b4712cf74ef18f3048028ab1c16e41e89,2024-11-21T04:32:08.607000
-CVE-2019-1735,0,0,2efe9971e4a41c19c754b71b0d13dfc2bdf0b996aedf3f68a9fbfa80e8330576,2024-11-21T04:37:12.613000
+CVE-2019-1735,0,1,cd31effe50091c9a9213db7c5668177bf63590a8c4d2325841a8728e8df8cffb,2024-11-21T04:37:12.613000
CVE-2019-17350,0,0,be52dc25e2adcf74aa62c814bfa0015fe4bec880444bc267a0b4e8c8e90e49b5,2024-11-21T04:32:08.760000
CVE-2019-17351,0,0,d5232d641cc8e559261bbb89bff6427197a5b93f88530f71f925d7921695d431,2024-11-21T04:32:08.917000
CVE-2019-17352,0,0,73cc4665661d2b9c4c6664d2c4641ecc1b85bd55fdcd0ddb505e3ba1271f2aff,2024-11-21T04:32:09.077000
@@ -135135,7 +135135,7 @@ CVE-2019-17356,0,0,a709ba86eb71ea33f3f8073fe6212380a559d056723c7f7839e5a9b4e9e3e
CVE-2019-17357,0,0,0aa73ff5713f0dab830df286d34743e6d38458d9bdb1cb561cc95f26df9a7173,2024-11-21T04:32:09.900000
CVE-2019-17358,0,0,6481e3d6129969766114e0fd67402bd685477165e907983da875f24e5acb9e7c,2024-11-21T04:32:10.073000
CVE-2019-17359,0,0,0830bbdc6514992e452878576468bfbe45fd954a58b71384a5e101fddde4be1e,2024-11-21T04:32:10.340000
-CVE-2019-1736,0,0,510103846c5feed496cc2a172d7a535e8e76d2f61e04c6643dc717884bb14775,2024-11-21T04:37:12.767000
+CVE-2019-1736,0,1,f5f45c09d9976b0eed7cad92ffdd59248c8424df4a8e6e8909979ad6374c3a0e,2024-11-21T04:37:12.767000
CVE-2019-17360,0,0,e9d1374fc4b5a7a669a6ed09bc82d5cc65b822f6e0714be068851d8e693f083d,2024-11-21T04:32:10.670000
CVE-2019-17361,0,0,f1639cedded3c0f269af4785acf201b67c7a26ae34b6fc9826e0d7f418956de1,2024-11-21T04:32:10.850000
CVE-2019-17362,0,0,9a4d564f9bb63325f690a1307d08440b438078b13924355160f31cd6507191cd,2024-11-21T04:32:11.053000
@@ -135145,7 +135145,7 @@ CVE-2019-17366,0,0,aeaeb278f620952b5286b02ca14f9fd83b74f565277308c80c74c3f41bd57
CVE-2019-17367,0,0,2f815e8f6b5ac36cb977e31c657d7bdc705c8bc4385bf039c4261d0d51077486,2024-11-21T04:32:11.700000
CVE-2019-17368,0,0,d03164c42837e13028da2074f0925a00225f37a87ef5525c758189c9ac9843c7,2024-11-21T04:32:11.830000
CVE-2019-17369,0,0,38351b0d16f06fd585c3c7b45e185f915af3c5809bda2ee094e4d6da50bb6e74,2024-11-21T04:32:11.957000
-CVE-2019-1737,0,0,572aa9d4147ca062f307dcc97e39a0d453ab7212ee042d0417f4d141b2252c3d,2024-11-21T04:37:12.900000
+CVE-2019-1737,0,1,1d75f44ab32292840616dd450f641f35c9ff4f9900439eb220cdc9deb9ce273c,2024-11-21T04:37:12.900000
CVE-2019-17370,0,0,6f3e725f947161e9e6aca609cbdc9544810655fad5d233de4fabef2357f50741,2024-11-21T04:32:12.087000
CVE-2019-17371,0,0,8c07f6c289a97ed4b5c7ea611948bed481c9db00d96db3fc93a4112bd5feded4,2024-11-21T04:32:12.217000
CVE-2019-17372,0,0,518c44a17fcd90bcfc9735e635aabeaed4361d1e0cb0c98f6c249f663b526895,2024-11-21T04:32:12.360000
@@ -135155,7 +135155,7 @@ CVE-2019-17376,0,0,e0936b6114ad4879a8bff59ac7569c9d4e08498dc55a2b15c5a5487cf59e1
CVE-2019-17377,0,0,0896b0f67f5e16a7c92836defdcebf2549b7dc1657576753dd140f3ff9d6b1e2,2024-11-21T04:32:12.973000
CVE-2019-17378,0,0,f5450e72cfe946221e19d5ef8f5362f7faa9ef486e4c3880a4f45a18b3c458e0,2024-11-21T04:32:13.117000
CVE-2019-17379,0,0,6e799e4c33019eb7a07bdb25071dcdc82a7898170309c079d67d6b98604b1774,2024-11-21T04:32:13.250000
-CVE-2019-1738,0,0,8de8a4e2ca2b0a292b052290312ac629ce644eb66c8cd23ca6ab5ee426609842,2024-11-21T04:37:14.727000
+CVE-2019-1738,0,1,113fa97ce881d7a4bb07ceb149c5ecdbbbf55d062677a10828dde1aa6b3b4ccd,2024-11-21T04:37:14.727000
CVE-2019-17380,0,0,f690037cf635c9b290a7ccd29478de82f4365831d85d4408be6f0141e4ec6b74,2024-11-21T04:32:13.387000
CVE-2019-17382,0,0,e39bc75144a732ab57cdbd1f4cba0a6dab910a4550a40f708c740e74b1dcdfa0,2024-11-21T04:32:13.523000
CVE-2019-17383,0,0,9df42d44b0dfd3c0ad0984a1cffc3cfdc683af235d415ce5fadf96b8439d6791,2024-11-21T04:32:13.663000
@@ -135165,7 +135165,7 @@ CVE-2019-17386,0,0,0419e387dcc55cdfcc4e69a68ccfc2f95c7b6a49e56475801e0045fbe77b3
CVE-2019-17387,0,0,81fe7c3603bf07428a9a8529aaa4e6b693a3de073f70f76862281b7c9e9c9f74,2024-11-21T04:32:14.223000
CVE-2019-17388,0,0,9fa6ea6e13e4093ebea26ba4bcc8216832b713d41d4a230a08243731569e15cf,2024-11-21T04:32:14.367000
CVE-2019-17389,0,0,c977b12e0da111bbb37741178f1b1128601de2c86975913d354bad151142b7e0,2024-11-21T04:32:14.503000
-CVE-2019-1739,0,0,ed9511661ee0f8dd6a6e321ae26b91b752c9ce4dd73f885e21686a582f287b88,2024-11-21T04:37:14.907000
+CVE-2019-1739,0,1,9597b671b756c73b2fd0bd5defcbbd709e0b00412a6bf27248da628b44f5110a,2024-11-21T04:37:14.907000
CVE-2019-17390,0,0,70ab275221c369c3d8f0ecce38db83be722ba716e4dbc2d231f5fb109827ccaa,2024-11-21T04:32:14.637000
CVE-2019-17391,0,0,03dbc0fff4ff2c23e8645e6aa7f64c5ef8d43ac29efca665f9e18263e9686b53,2024-11-21T04:32:14.777000
CVE-2019-17392,0,0,c4ee1c705016b92ff833a10b46655ad6c2a765bdb933ef675d78245845653d14,2024-11-21T04:32:14.917000
@@ -135176,7 +135176,7 @@ CVE-2019-17396,0,0,3ea8aa94d51d65de1f72338fa4b65ab4712a81c7aabdf69d627d12e7ef4eb
CVE-2019-17397,0,0,59962b3766eab6e69d1526ac54b6636c8cb4a9b1f64c76a20a77424f6556d181,2024-11-21T04:32:15.597000
CVE-2019-17398,0,0,7404b9128819d81588bf7b61163acbc2451bddf8d793e8f708f82b2e9b71c860,2024-11-21T04:32:15.730000
CVE-2019-17399,0,0,9a9154d413994d08445270a941f7689f217bf5149c44a93400417f569d050265,2024-11-21T04:32:15.867000
-CVE-2019-1740,0,0,dcfec19921410e895a2b74b7bb1998c9b8dc7ce0d7a2dadf0cb9c05646b3b0a6,2024-11-21T04:37:15.070000
+CVE-2019-1740,0,1,c828f2ac803a997eeae867fa1b92d7ca65616f2fc7c6c554b8b72878a5e93ee4,2024-11-21T04:37:15.070000
CVE-2019-17400,0,0,9145ffddf9f1c7911c665f0515b993d153e90d69a47c28605b62355624c8aceb,2024-11-21T04:32:16.003000
CVE-2019-17401,0,0,172e653991d7af13f0729d57e2ea60de02ecb3dae83b1f0d86c18f7676223103,2024-11-21T04:32:16.160000
CVE-2019-17402,0,0,9775e732d30c416d8e30bc657377f0efef4fa66f4c728c64824f420d5e022881,2024-11-21T04:32:16.303000
@@ -135186,13 +135186,13 @@ CVE-2019-17405,0,0,f8b80dd30b2e0ca93f5751dd80190e9aaf0c68edd2ae09a6484a92d773c11
CVE-2019-17406,0,0,73122796902b39278600c034db5765657c0407ed499401f85f37406983ca8e13,2024-11-21T04:32:16.850000
CVE-2019-17408,0,0,c6ef02b0620b66256b0632b2427b2dabd3c12c2ceea488712b7ac6e0701d38f7,2024-11-21T04:32:16.983000
CVE-2019-17409,0,0,4e8f8fd4cb7f5dc9ed2ad8b8dc1ebc52cb3a4fd814a3d7e80b44fe0d876925be,2024-11-21T04:32:17.113000
-CVE-2019-1741,0,0,63d1354827ea9cdcbe718e28f62ddc6e48c3e3be9c9216e2ce7c7e299fa9347b,2024-11-21T04:37:15.240000
+CVE-2019-1741,0,1,00f487378fd4c67f1fd789b2845e6f24140b495559990d765b57201b48e821ac,2024-11-21T04:37:15.240000
CVE-2019-17414,0,0,5f24845583fc02d21ac7fa78b7e863745c33a37dc9f7bb11e1c1b23f84a9a891,2024-11-21T04:32:17.250000
CVE-2019-17415,0,0,a92d985046230eef12d63d2330df81ad2edb5253cfceb46bd1a993f9e2fe61ca,2024-11-21T04:32:17.383000
CVE-2019-17417,0,0,97c4b6d946f71989c57ceefa9abd5cb7eb6f9468b7b31d6612ca566efe2226f3,2024-11-21T04:32:17.520000
CVE-2019-17418,0,0,3126d98923efdfd5cfaf5b2abbc6bcec12ad15c6a3b7af48e2629d7c26a12c0e,2024-11-21T04:32:17.650000
CVE-2019-17419,0,0,41d0fd61d5614d1448deade8263b8d4ab77c29e89182cd89e4ca9e768b66da4a,2024-11-21T04:32:17.777000
-CVE-2019-1742,0,0,4f36dd1969ce11fcbae91a3c84e6a5739894f3038857a68da0d251c3ef91b184,2024-11-21T04:37:15.377000
+CVE-2019-1742,0,1,d8c891d769bd3648beaf607577d113e0aed37ee9e2f6afe84994624fa13e9a3e,2024-11-21T04:37:15.377000
CVE-2019-17420,0,0,5db14c8917187ed6910ad621d5dfd9a1e0250a3289803f5393c77aa23a7e90f7,2024-11-21T04:32:17.907000
CVE-2019-17421,0,0,7776da8f072ed90068e9a8032dcb639e6d4634c4ce1edd4a96da7aa23f3ef88b,2024-11-21T04:32:18.050000
CVE-2019-17424,0,0,ca398e0dd517e7e3af65b4883ee7a3e7562548345e096a180b9527321a6e2980,2024-11-21T04:32:18.187000
@@ -135200,7 +135200,7 @@ CVE-2019-17426,0,0,0254b7fad934db6fcfb97b124a6ed95e797816824810df955811945d27e88
CVE-2019-17427,0,0,fe4e300128fca5bc9011ad467565d7dc11020fcd1420dedefbeb02e216ba6875,2024-11-21T04:32:18.470000
CVE-2019-17428,0,0,06c18701960b5094763a96f59e5173ffd6ad46bd879cbe9f5a009507c956621e,2024-11-21T04:32:18.610000
CVE-2019-17429,0,0,4be766c7dfddf859b817bda9a654ddb1b186cb1e46782b24dd999e7c7358e8e6,2024-11-21T04:32:18.750000
-CVE-2019-1743,0,0,379f5cb64c683a3c75a46040ef2bc039a37a491a5e46c074a0bb37c73c705eeb,2024-11-21T04:37:15.510000
+CVE-2019-1743,0,1,af00b360ba15d92bb2d3000bb248082af999a2545017db2eb48cc632683cb6a0,2024-11-21T04:37:15.510000
CVE-2019-17430,0,0,3de9c5049bf1351a947ff56a2f189aa25df347d3cc6e687b09aa9df528fd1e83,2024-11-21T04:32:18.873000
CVE-2019-17431,0,0,0d7849531a0a203db8d90ded0ea33ef63d33aed45c84ef80562d1578a5880b53,2024-11-21T04:32:19.003000
CVE-2019-17432,0,0,b69759b70b27ab2854fe4400f6efdee72d5c7e142ec4b8d4c7c972f1e8377939,2024-11-21T04:32:19.140000
@@ -135219,19 +135219,19 @@ CVE-2019-17444,0,0,298a54b60d12dc622b3eebd9fc24c665f6cb275561580ae1ea436e1eb1fb9
CVE-2019-17445,0,0,0a803af590d49f77bc23b7ca8206647ebf5da7f951f6f6e557ab8ec1ab9c14fa,2024-11-21T04:32:20.213000
CVE-2019-17446,0,0,5ce2120c27c8d6d018d4bbe7d2a8730178f9689a949bb87bdb710848f19972f6,2024-11-21T04:32:20.360000
CVE-2019-17449,0,0,d40e9ad4ab566ae8be1f37b773b536c8dca1e26f837152e7595038347eb35dee,2024-11-21T04:32:20.500000
-CVE-2019-1745,0,0,387950b6e1536a5bde189544258ee3ef059f09e1b3f9d7c20e19a04c3628af68,2024-11-21T04:37:15.650000
+CVE-2019-1745,0,1,981dc47675e27940918b57e42096a3bcc5954bd75e843585b4f89d994825c20e,2024-11-21T04:37:15.650000
CVE-2019-17450,0,0,4b84b04a5bb102611f002cae3238cf78e69359dce565435b96842730997c40c6,2024-11-21T04:32:20.643000
CVE-2019-17451,0,0,2f4186df5644a9dbfe6d8a517b53b6eb4d704c83798a5d94692ae9713bd5bf22,2024-11-21T04:32:20.797000
CVE-2019-17452,0,0,784472a1f0a5ccf2dd703c4cce467ccef38194ab2c2f6ea8a853cce3fd14f01f,2024-11-21T04:32:20.960000
CVE-2019-17453,0,0,5d7df316e9bc74c37333f0956ddf7a9d1940ff619beb80e3ef762539dfb89b92,2024-11-21T04:32:21.097000
CVE-2019-17454,0,0,a34640ec5609abad80c9eb435efda35274422a658db1c4d1aea23909a6d733b5,2024-11-21T04:32:21.253000
CVE-2019-17455,0,0,7b8d9b1241d5f4d995e3b896d9857389f307bc8e72ce93bd5f8ccad48831096e,2024-11-21T04:32:21.390000
-CVE-2019-1746,0,0,e93fd3c380b14f024dfa25f79b6878077a7de61247a587a67bd5f971697f765b,2024-11-21T04:37:15.843000
-CVE-2019-1747,0,0,cdb4d2c0444284798e4acc5e002434880ea671ca3c19bbfbe87b9d705bb096d9,2024-11-21T04:37:16.173000
-CVE-2019-1748,0,0,1edf03246735f3a19daca89ca22432c16cbe96944391d074ba9f17a50be9c56a,2024-11-21T04:37:16.300000
+CVE-2019-1746,0,1,de80cad5fc91f828cacb5dd1a9d9d187859f0ef6a23076a9b338691ce02ec39a,2024-11-21T04:37:15.843000
+CVE-2019-1747,0,1,1200631475f75d0f0e3fe75c829800557f3a256f29499ea4c3588252ef13a489,2024-11-21T04:37:16.173000
+CVE-2019-1748,0,1,6b8ae06bc14498b62e1b5919af1bc08a653ed7fc3a2307106a385c84c36e3837,2024-11-21T04:37:16.300000
CVE-2019-17488,0,0,38ab15570f42a71116f5687ddb13b8a0c4c550251ecc6d4106ba3f81a265e1f8,2024-11-21T04:32:21.570000
CVE-2019-17489,0,0,6c82469540c95df93e70893e29c86c3564408e21914354b41927307b85eaf901,2024-11-21T04:32:21.703000
-CVE-2019-1749,0,0,dae2775355208f1dedf1f2d7aa7107970a7a1b988e78b33ea5d16e40d2d272fe,2024-11-21T04:37:16.703000
+CVE-2019-1749,0,1,de5e51ee7698ff476c274ed2246b28ce127ce091aa0ad80b2196e1f7a37e57de,2024-11-21T04:37:16.703000
CVE-2019-17490,0,0,b6f94344cf70a86e940b89ca461440c10943d6cdce2307a6019c1f263503b5a8,2024-11-21T04:32:21.837000
CVE-2019-17491,0,0,64d59c2c91323a2de4127350573f4738515b8ce0c11fa4cbef7af82153245f50,2024-11-21T04:32:21.957000
CVE-2019-17493,0,0,95f82d10b6a731212e338a932bbe07af9ece0621565911184ca3babc432d3d62,2024-11-21T04:32:22.090000
@@ -135241,7 +135241,7 @@ CVE-2019-17496,0,0,5adc77d2d1478dbeb099354e6795d256808e5e64011b6a83491bcb1a0b754
CVE-2019-17497,0,0,724d9a855cbfd0dcd0b9567aa65bb9e214e221f0ad4ee27d8c503edfb7005232,2024-11-27T20:11:45.410000
CVE-2019-17498,0,0,064f2f74878211a9a56289698efa0d4f8b2751f314add41b3358905fdeeae0e1,2024-11-21T04:32:22.850000
CVE-2019-17499,0,0,8e6318a2d54ff266c7722484aa65befffe56d20bc9539efa7ea0163bc141156f,2024-11-21T04:32:23.017000
-CVE-2019-1750,0,0,b0dfff451786af2df36053f7a88fa399299fba1324bf66d8063b81620507e8d8,2024-11-21T04:37:16.857000
+CVE-2019-1750,0,1,fbef1d4f5d967529ef23e8e1d9ba4b81d8b4ae3d39cfef8e7fdd7eb747ef5efd,2024-11-21T04:37:16.857000
CVE-2019-17501,0,0,23f929f08e2923db92102ce4efc8c9f9ae8d955a2472389ebcd406b477ece558,2024-11-21T04:32:23.203000
CVE-2019-17502,0,0,65ecb223f2a64981a07dc7ca020ec9396e771a5a2db8c941b32334d1954c8cfb,2024-11-21T04:32:23.753000
CVE-2019-17503,0,0,e68ccc7436dd8756b08f5eca10ffabc7a31f8036edfb048d57c79e06cc7bbf2d,2024-11-21T04:32:23.887000
@@ -135251,7 +135251,7 @@ CVE-2019-17506,0,0,9b96cad03120c07dbd122c413c477049f0760b3057636dffacec42aac626b
CVE-2019-17507,0,0,614399aad22557c9522529c63972a4d550d31faa931a380d690a958d92ee4b5d,2024-11-21T04:32:24.420000
CVE-2019-17508,0,0,8ab8053d2dd4f43036f3a7aa21061c1e917bd5dfb5d7ed66d4b945b59f073b52,2024-11-21T04:32:24.553000
CVE-2019-17509,0,0,1a95a9f823357f2fd419e1682c57ce339295fafc3a05846404c1c129579268fa,2024-11-21T04:32:24.680000
-CVE-2019-1751,0,0,90aa715704830cc183fd98841b6e7e2e7369ab43b51af52db6f0a36842e07692,2024-11-21T04:37:16.983000
+CVE-2019-1751,0,1,6108fb627db5d0a5052b1fa52de47bcb62e1819b9329d8ca5ac1ae144da38deb,2024-11-21T04:37:16.983000
CVE-2019-17510,0,0,504e2d6d8504142a916200a27b67bad3b201bb6d5ffe23808f1ab8468eddf53d,2024-11-21T04:32:24.813000
CVE-2019-17511,0,0,968dc155997c5bdac48a6c3efaf7efa32c28f10e47216ff2c1e563cc25051adf,2024-11-21T04:32:24.950000
CVE-2019-17512,0,0,5a2505eeb0dca306b42462978788500c166a151d577f4ac28be02f785e958cf0,2024-11-21T04:32:25.083000
@@ -135261,7 +135261,7 @@ CVE-2019-17515,0,0,51e2fd733bc22f1448da0a13f1089b7a6a72b94e457689d5daf0a8a2a3bdb
CVE-2019-17517,0,0,5e30dbfdc93957087e05300c63d8345200b9289c99f62c8605f33307f41018de,2024-11-21T04:32:25.657000
CVE-2019-17518,0,0,3b6ed6a2437c369bc026d66f98e3d2d6fa5056f8b8ff3b11c1dae1ead6b75c34,2024-11-21T04:32:25.790000
CVE-2019-17519,0,0,38b1aae29df21a983c5d721332bf23a869a30c31552978d03fe3ad63157991a3,2024-11-21T04:32:25.940000
-CVE-2019-1752,0,0,56c3f851a25ec8250418b0bb28de9b966913c3ceb6d59a219102da9a15369f18,2024-11-21T04:37:17.130000
+CVE-2019-1752,0,1,00d64408dfc40c8d4a8459f4f3425295bfce11da6116b6ea827372c8cbecb90a,2024-11-21T04:37:17.130000
CVE-2019-17520,0,0,cabb11a1a85328bbdcf2922e5308ee91370900d04b78720f074a94b1d01d90a0,2024-11-21T04:32:26.073000
CVE-2019-17521,0,0,2250fc921490364c54b36b9f90ba713b122f57aa33cec37203d91a1c09f2be5f,2024-11-21T04:32:26.220000
CVE-2019-17522,0,0,532e23d47f0795e84e54dcbdd39245fe1a00cf12c34e2fccad43c7fd60cf5eea,2024-11-21T04:32:26.367000
@@ -135272,7 +135272,7 @@ CVE-2019-17526,0,0,25deaef5c632a24c90261470e6b80ba6f45238f8a41ec979e4445bf74b6c5
CVE-2019-17527,0,0,c7313ba73eee9e91491c06bef7687682eddba383bfbc78547a77b21b0a2d45e4,2024-11-21T04:32:27.047000
CVE-2019-17528,0,0,acc466dac902df313c07386c1745df124ba1f90973aabcd3be0d09f39813854a,2024-11-21T04:32:27.193000
CVE-2019-17529,0,0,692278e406c7d4accd579ba80090467e99ae82066e78536701b07230e3ed67aa,2024-11-21T04:32:27.330000
-CVE-2019-1753,0,0,de5e3685eb240f790ad9f8d98ec9c43fb5955c11210777c2cbf96e04ab058b3c,2024-11-21T04:37:17.363000
+CVE-2019-1753,0,1,f64fc99422aac9d6b7f41f7dc81960ad286baa43a7a33222fc13a78e4a0bf264,2024-11-21T04:37:17.363000
CVE-2019-17530,0,0,fb97e496b6b1f95005a44bf3a4ec8ada01958cedbc6d8fc907c35a297fcb4098,2024-11-21T04:32:27.473000
CVE-2019-17531,0,0,ea68ad2b07f0f7d40ae5dc4bb9ff81620fdc89c0b69d649226cff99470dabdbf,2024-11-21T04:32:27.613000
CVE-2019-17532,0,0,e5ed4bd8a67a5890c8f8a76096c9b66057832e5c3e9cf8fc62cc8e5be99f1a72,2024-11-21T04:32:27.870000
@@ -135283,7 +135283,7 @@ CVE-2019-17536,0,0,a6a41f6183fdfe1a3f28f7b58ed93356c2e9b3d5b90309e7ade3af379b7a2
CVE-2019-17537,0,0,7a8e7b5a7a0ca571a565d9c6d107732b537cbfbdb339de23698313f38a1caf07,2024-11-21T04:32:28.610000
CVE-2019-17538,0,0,4bb9162b483b4ac7de3fd968c6156b5b40a4d8b97b2d52c7f49a2666cb868bfd,2024-11-21T04:32:28.743000
CVE-2019-17539,0,0,9c38bf79601fd637b305c14222517e112287018a8ecf670ac6ec1733ea31a793,2024-11-21T04:32:28.873000
-CVE-2019-1754,0,0,9ee3b59ec2da27af54d4d7f7a216457bbad7dd55e86c22331ce274fda11b1856,2024-11-21T04:37:17.537000
+CVE-2019-1754,0,1,774b6e970a96fe9cb9a2ed0799f6491e90a4c0618a79886fa5cd41d7d66f3338,2024-11-21T04:37:17.537000
CVE-2019-17540,0,0,8669f95b7625fb929edd59abd22074518cdce8e7689a84359a675b34aaaddede,2024-11-21T04:32:29.023000
CVE-2019-17541,0,0,064327b020d667faae1a1a96afc52ebddb4e66d4e999501aeb9bb6c97b209399,2024-11-21T04:32:29.170000
CVE-2019-17542,0,0,bba8dee23d3d4641d9c9e54d270a6db2554e11a19ef0d087e9b2d3d29faa1526,2024-11-21T04:32:29.313000
@@ -135293,7 +135293,7 @@ CVE-2019-17545,0,0,8c28336f1002ef1df1da8d50b355c0fec7b0ce2b0b0a911d0e75bba00e821
CVE-2019-17546,0,0,08a000452a6ce20d0b9faf6d82919e2de2fc4f92ab269acde7dccc998629525e,2024-12-20T13:15:16.870000
CVE-2019-17547,0,0,10e450c6bf14b6a3abe2f9dc45748a489e2afbf73df76774bf4b43616fa9bb87,2024-11-21T04:32:30.127000
CVE-2019-17549,0,0,014c2de2dd2138e99264935b0e47aba257361da73377e82c244852321f1f4129,2024-11-21T04:32:30.267000
-CVE-2019-1755,0,0,7b9825a5d3b919bef05e466222322a66358d653067a74a6843a366273a05639a,2024-11-21T04:37:17.687000
+CVE-2019-1755,0,1,4552ccfb7adc749009519d932c6da904f4e8148d8aaf4355ebc2228ed2dbbca3,2024-11-21T04:37:17.687000
CVE-2019-17550,0,0,d3e53e57770c4a2727dee3711cc71730a1c3c5a283d47cb4d6a94e3c66224928,2024-11-21T04:32:30.410000
CVE-2019-17551,0,0,84635e8413e579e2a12d7fb279a8a68e44ac06838d7ebe5137a26ce0cbeef129,2024-11-21T04:32:30.560000
CVE-2019-17552,0,0,5a65d47c9902df146ee1772a8aaa2012a229fdcc7966b9598fb49319ce3361ab,2024-11-21T04:32:30.703000
@@ -135304,7 +135304,7 @@ CVE-2019-17556,0,0,dfc45f73027f031fefc79a0156d2ab7571b3f741c49b1431a9c4c9cb60844
CVE-2019-17557,0,0,2765353326187bfb3caf488301fe76eb67bac10840648f333a8f5f229ab08e5e,2024-11-21T04:32:31.327000
CVE-2019-17558,0,0,510dfb9968f7ccdfa1c09cd928f7c4fbdeb1ce9bc8651a842d00b60e6ea88b3c,2024-11-21T04:32:31.450000
CVE-2019-17559,0,0,ece668b06a6f358fb8eb3ee85628d2086d7c6e147d352d7cd06ac3d8ce38ab60,2024-11-21T04:32:31.673000
-CVE-2019-1756,0,0,f032bc5c81455dd81b12c5fd55db5d0118ea4de8dbece9d8d0a301a95dbe24cf,2024-11-21T04:37:17.833000
+CVE-2019-1756,0,1,29e8e4aa3a8fae54efbea0ea2d8a6835f4a0fbeffc6925b6b0d4310f284e5e1c,2024-11-21T04:37:17.833000
CVE-2019-17560,0,0,9cb09af49e361a69d0d03fa2b24de3af3540cbdfdf14fe00a8f4e341c5514a63,2024-11-21T04:32:31.797000
CVE-2019-17561,0,0,b92a79442aa7855d45503abcc636ab14670dfdac4d332bea4401afef6621e076,2024-11-21T04:32:31.930000
CVE-2019-17562,0,0,59a66350ad4bb1b75294a7d99ccf7f6e26573d872eaaf2089dabccaf984c928d,2024-11-21T04:32:32.050000
@@ -135315,7 +135315,7 @@ CVE-2019-17566,0,0,5db20e0a7186b1664a34e452923df9ed1b9ea1eb6a771a3dca3f8f129d85e
CVE-2019-17567,0,0,3756f094ed295959e1111c43d024094b3baafa60697feb302fc1ec2e6a539ee0,2024-11-21T04:32:32.810000
CVE-2019-17568,0,0,2f7ab9d104e72efa232c6d1c06f37cfc14979d78b042e84615b126a0a5aa5a45,2023-11-07T03:06:20.050000
CVE-2019-17569,0,0,dfcf747b93b3ee0c48897b3a0f3e29a22361f60ef617fcbc3490baf23d3e0000,2024-11-21T04:32:33.027000
-CVE-2019-1757,0,0,57b5bf107270935deaaea6742a5dab16621fa91034dda1c0e85c578d3e767075,2024-11-21T04:37:17.977000
+CVE-2019-1757,0,1,1d8d3a03c5bea4b4dd21f91b5f5b11d3dc592204c3c231d66f3cb3e750400f82,2024-11-21T04:37:17.977000
CVE-2019-17570,0,0,bd9db555c6fed275bee42d2aebbb1e331c4194f0516c1bf31276e4d450677c5d,2024-11-21T04:32:33.230000
CVE-2019-17571,0,0,cf0f69068a6da14088ee2cb362b89c524399a1ee4c3ea11e6abfc41516c4cde9,2024-11-21T04:32:33.393000
CVE-2019-17572,0,0,70427ac12cb7ef978b90ea9bdec66b0cf139d50109832394400437a3a81790c7,2024-11-21T04:32:33.843000
@@ -135326,7 +135326,7 @@ CVE-2019-17576,0,0,8ee68fb6154ec828e0cb3705af08dd2821a4c3a204df06fb2151a4aca01a1
CVE-2019-17577,0,0,8a6c7bcd5e3a363f103f21f0399da9fe3aca04ce0b02789e42854c56c4e1bc08,2024-11-21T04:32:34.553000
CVE-2019-17578,0,0,81585f339ddec74c6170c681d26a37e2145c8c41b23cf08817f46db95bf0788c,2024-11-21T04:32:34.687000
CVE-2019-17579,0,0,3a2a45cf468e3d8c42294ed1a64bda0bd739f90ac1c39a74b7c043b9ff83e478,2024-11-21T04:32:34.827000
-CVE-2019-1758,0,0,80bf56d5b2fc6d81f96bdb0b5326dc29a8885d97f0343a39490c1298f5ac4905,2024-11-21T04:37:18.167000
+CVE-2019-1758,0,1,8b95e4cbd6d851ffdf7e0f6841a8333bf8528b5344f3cbd39a87ff5043cb4076,2024-11-21T04:37:18.167000
CVE-2019-17580,0,0,0fb70279340c44ea703804df10233fcadb32e9b158b14c6e1581f3697e29edcb,2024-11-21T04:32:34.973000
CVE-2019-17581,0,0,52f93bb9b3d8536610c257195f7aaa31716629de267e4cd21df32e74545dc7e9,2024-11-21T04:32:35.107000
CVE-2019-17582,0,0,515d659b87b57718864082c105757dfbb93cbc1ed0e29abd94fe9e426f94839a,2024-11-21T04:32:35.243000
@@ -135337,7 +135337,7 @@ CVE-2019-17586,0,0,e6b7d13408c80061d208d2eeda90ca71e1bd11fcd6a8c5c29aff8ac194c77
CVE-2019-17587,0,0,63caf1657dd141c9fd89e529fd01e6887fb7588961e4f9ffa6443df14130851d,2023-11-07T03:06:22.407000
CVE-2019-17588,0,0,13fa78ac8d4b7c9527350d8f0dfb123653ebb6e2e9658da875a6e6f3f59ddf7e,2023-11-07T03:06:22.653000
CVE-2019-17589,0,0,eeb3f20043c6dc0fb44fe6df866e791e190f6b3691e469eabb5e4544075c4b2d,2023-11-07T03:06:22.913000
-CVE-2019-1759,0,0,7424fe821ceedefa1a6fc1e75e060c9e79400ac145bffb0e8dc6f9412b9c3258,2024-11-21T04:37:18.313000
+CVE-2019-1759,0,1,582c7214c7258f2b5ea87823ff0be0b661c737b99e00abd0a8ad993813b46f5f,2024-11-21T04:37:18.313000
CVE-2019-17590,0,0,1eb822bd69ebf7b8c31e5cda95bb431367caf1e55f6ef120d99814ce05453fcb,2024-11-21T04:32:35.750000
CVE-2019-17592,0,0,ec73de62f5cbaf44aefa0927df069839fe8a76d662543e50a5890b065ac6b3b5,2024-11-21T04:32:35.897000
CVE-2019-17593,0,0,1dad6ba646898bfcaea7b8201507222415ebefc056319f8ac232d562b04c9e6d,2024-11-21T04:32:36.043000
@@ -135346,7 +135346,7 @@ CVE-2019-17595,0,0,4e5e2adcce87d80f0061f5b1d05eada170f70918560c3af71860c642f3f61
CVE-2019-17596,0,0,7b6189141bcc073e35c58ae8ab94542eb6567d23b95ffdc9134987fd4f01fb04,2024-11-21T04:32:36.500000
CVE-2019-17598,0,0,6ba2c48b05918f8e9037b0d78056f8e1cd05e8e26d8f1d190bd6cd1b4e2e7898,2024-11-21T04:32:36.667000
CVE-2019-17599,0,0,2a0027554ed546307bca7d3918d67567f927871b246fa66eee0b2fe2a31f4369,2024-11-21T04:32:36.807000
-CVE-2019-1760,0,0,7ba03f51f67c36a492659c49b35f7770ac5c2f6e8324691ba0426d009f6f9f95,2024-11-21T04:37:18.470000
+CVE-2019-1760,0,1,0f61e2222b6441d53cafd3d3cc57eff7ee5f5bc26557a425bdc6b4aa35c12e28,2024-11-21T04:37:18.470000
CVE-2019-17600,0,0,5a4c844bce815836bb9b564d7c3d292c5b16ed02b2dfc58b6b07c3d0872d6bd9,2024-11-21T04:32:36.937000
CVE-2019-17601,0,0,6de7d30faf7964ebc7c0da9d46006c64dd7e68796c10c324bf557a9e0f2560cd,2024-11-21T04:32:37.077000
CVE-2019-17602,0,0,ff3a614402055b342e7d77406a540b1e7a80f29ca5a34466f9d59f8ec9283a7d,2024-11-21T04:32:37.210000
@@ -135357,19 +135357,19 @@ CVE-2019-17606,0,0,592ceb9b4b46085ff9fd731ec811527389c5f585f3253f6abdcd8f73cb57d
CVE-2019-17607,0,0,b1a7a337696f1a7dce908ff39c03d1e1baa80df6d4461bf200ab66ce8db43394,2024-11-21T04:32:37.913000
CVE-2019-17608,0,0,73a0646d1342a107346d4f7a80004bedf06f9e268367a8749a6eaa8d1a2cec19,2024-11-21T04:32:38.053000
CVE-2019-17609,0,0,0e42a50486bb0eb76d5cc9f270c1154cce799b17a82f11189750e4e28605da9d,2024-11-21T04:32:38.193000
-CVE-2019-1761,0,0,d265539451225e8a611644d5c9b233062174904db5cda3f59d17c5a0a4adfe39,2024-11-21T04:37:18.623000
+CVE-2019-1761,0,1,3bf32279d15fdbb4098edc1561ea65ed4e82ae1349faec3bdb2dc24c4c79fbba,2024-11-21T04:37:18.623000
CVE-2019-17610,0,0,67977d2c72d4aaec01974828b37f8356ae19518ce139272fd02a48dd4a80955a,2024-11-21T04:32:38.333000
CVE-2019-17611,0,0,3c97f0081d034847da509aea465089239ea1d2032fe80c318c1bd2757d7e6e9d,2024-11-21T04:32:38.470000
CVE-2019-17612,0,0,f319bca96938f50b615d89fb2fb752df9caa437c73707773867a84f3c93eb92b,2024-11-21T04:32:38.613000
CVE-2019-17613,0,0,db402e1d8e6719ca5d401f13f9be431b7dac9455556730d8827a679223b3dd9f,2024-11-21T04:32:38.750000
-CVE-2019-1762,0,0,e3256100df2ea517698539ad1c3c37c4af7503cc5ebe545c0484009a1d9ca662,2024-11-21T04:37:19.220000
+CVE-2019-1762,0,1,9178294dd1bd75816debb1672526b8c9d56d5738f4a0e486d6e0b9b2f698e266,2024-11-21T04:37:19.220000
CVE-2019-17621,0,0,abf541f2404df15fb961382113211b6320315dfd97dff1f1838343b8d921ba78,2024-11-21T04:32:38.893000
CVE-2019-17624,0,0,6d418316ea4e72ee2e990c928fdfbbdb8147714c15fd8dfbec6fcbfc43071bc2,2024-11-21T04:32:39.073000
CVE-2019-17625,0,0,8a0845af873ed335f746f3d026c140eda50e173a05a6033e3072e4cb6c3cde59,2024-11-21T04:32:39.220000
CVE-2019-17626,0,0,c458cac0f40577abd6a1d9321218797aa0f76c3ba6308ef015eae87380099f78,2024-11-21T04:32:39.353000
CVE-2019-17627,0,0,833beb0180c6343abf5cc41faa86962c57df41d9aaf74d0ec57a16feaa461891,2024-11-21T04:32:39.590000
CVE-2019-17629,0,0,435e11f56ac177dfc34dc4b00e1b751b79c60c813531bb6e403c4a628b60dfa4,2024-11-21T04:32:39.720000
-CVE-2019-1763,0,0,d24e5b9e4d5fd8534ece55836b458c2fe332acd8876d598732f6b42c766af45e,2024-11-21T04:37:19.370000
+CVE-2019-1763,0,1,88036fcdd0c533cc5a85e61d2ae69794f9263cee7a7e4047df7ce3e1b40d324c,2024-11-21T04:37:19.370000
CVE-2019-17630,0,0,e3285733096df591151ae6f78f503e95b1a05d2b8cb8edc6f84841a44a71c9d6,2024-11-21T04:32:39.853000
CVE-2019-17631,0,0,7f87acfe46deac51f3f244eccdd70c79fb18d71d083cafe2d434ea478afba85a,2024-11-21T04:32:39.997000
CVE-2019-17632,0,0,56cf5abde4143aef50f0b54d7b5d147c92197fef9c28da7c67f0fdc83a4447fa,2024-11-21T04:32:40.123000
@@ -135380,7 +135380,7 @@ CVE-2019-17636,0,0,0492e59a3e0a17ddae0a21f733032ba7fcbeb764efd9633212b52ab1b44ea
CVE-2019-17637,0,0,2b9c501e23eb7565ab04836f965982951d350e6be6c331f1c67eff3dd652b30b,2024-11-21T04:32:40.703000
CVE-2019-17638,0,0,3905c2724905211ddb1e4e8eb1e0e7098c540891b870e77227fb271fd158df2b,2024-11-21T04:32:40.840000
CVE-2019-17639,0,0,b3cce6c0952054d4afcccef32b7cfd96da3d5f771909ad707f5c3ddcf75ab9b2,2024-11-21T04:32:41.010000
-CVE-2019-1764,0,0,bb397467be79f6f6e749f198ac0ff7d50fa6c836de8cd12bed8ffb2d11065310,2024-11-21T04:37:19.503000
+CVE-2019-1764,0,1,96f877c82fecc00a8e289a900fff315597ee4b174a0b491d79cee371a292eebf,2024-11-21T04:37:19.503000
CVE-2019-17640,0,0,704e861727ca6a42b66a1663b2de92fa9cceab016a2b04c2e1800930de083cf0,2024-11-21T04:32:41.150000
CVE-2019-17642,0,0,f1c1a9af6fcddddfce4f9bb02338dc1ddafff20cc93cf905a69e538af5b5b242,2024-11-21T04:32:41.300000
CVE-2019-17643,0,0,9f32da32b3b4632c39ebc40f8d9d72154a82ea206ebecc8f8e56d3499ee58a8d,2024-11-21T04:32:41.460000
@@ -135388,7 +135388,7 @@ CVE-2019-17644,0,0,dfaace30066f6f0423b3ce9fadd6bf5a83e8820747c47703660f39b52bc70
CVE-2019-17645,0,0,3dcfa12235db98823f10acf9c1a6ded8a21a2597cb2caed4c36b760e7cdb9c2b,2024-11-21T04:32:41.780000
CVE-2019-17646,0,0,fd024671ff6cefe2a2635b5e30fc8d43c143fb9f82587955aac86043d6243fb9,2024-11-21T04:32:41.940000
CVE-2019-17647,0,0,bce7b79f11d76b3e9a71d039623fb158c513d679c2dc5e4595b353aab8712ff7,2024-11-21T04:32:42.080000
-CVE-2019-1765,0,0,7ee96b9aad8b3c0dd75b89a52232ca63b0c406148c01a1f3d5b85ec0bffbc582,2024-11-21T04:37:19.630000
+CVE-2019-1765,0,1,992ed6614802bc6f3156f3a9a22193cc942be349f981862c32e84a4e1a9e741b,2024-11-21T04:37:19.630000
CVE-2019-17650,0,0,f17b855f5ea6147a06feb9b5c43154eae48fa46f4a69770b989ba0a00f7bf76d,2024-11-21T04:32:42.233000
CVE-2019-17651,0,0,0d8aff271102f865eaf29ba640b5e223da0e5164077001fddbe1441d6952f75b,2024-11-21T04:32:42.353000
CVE-2019-17652,0,0,f98e9b3c78d00307aca94d0eec607b6d35882b90b2202ec9e321518fe0d601ef,2024-11-21T04:32:42.467000
@@ -135398,7 +135398,7 @@ CVE-2019-17655,0,0,f9fac732a067b1a9e64b219d368783b3294b0c61a4fbdd1e9e0c4ac95419e
CVE-2019-17656,0,0,1534e682388077c18a66375a0b769b9f23c6820937cc3618dfb5a8e0322cfe13,2024-11-21T04:32:42.930000
CVE-2019-17657,0,0,761f15dea2c50abcdb1f3a93076f13baa894c39e8f64e3f300e51f7762675073,2024-11-21T04:32:43.063000
CVE-2019-17658,0,0,b017d4a442f3012156eebe7c0a2a31d6ef0f22a21bad8d6d82472b3f1a70fcfd,2024-11-21T04:32:43.190000
-CVE-2019-1766,0,0,f5252fa0eca0141d15310680e724e03dbd59c99064ab613f2ec64e645e561628,2024-11-21T04:37:19.770000
+CVE-2019-1766,0,1,347fef68ad0c79f2caf0982e322c7365f36f23ea94c55ba5468ad2ce1db1ca03,2024-11-21T04:37:19.770000
CVE-2019-17660,0,0,6323f037ebc03efc369a87354992e95ebf95deaf5fd7e9be8b2bbbd3af281992,2024-11-21T04:32:43.300000
CVE-2019-17661,0,0,556b7c59f59990108eef104f7845b9ce4ffafe4f4a7ec005af59692a41af7313,2024-11-21T04:32:43.430000
CVE-2019-17662,0,0,aba635487446253188f1dfe27033fed4c00cd2303b8ad3fe6be9f830fd5d5deb,2024-11-21T04:32:43.637000
@@ -135409,7 +135409,7 @@ CVE-2019-17666,0,0,99487d5cdcbc4eb0e2b5d71289df23e5e81e8ccd5e087c8a24e08432510b6
CVE-2019-17667,0,0,cd3dfa3ae3d923b5d547ad76563710df34512da15a604ff8b0dd067e32244426,2024-11-21T04:32:44.333000
CVE-2019-17668,0,0,80632a1a333c0f8a6f60b97da98c353a445e171bb234d7b33bc6bba1005e4127,2024-11-21T04:32:44.470000
CVE-2019-17669,0,0,0895b2dd4e441e5de0a506f078faf79431e24acdacb88e91a89217cc601dee9e,2024-11-21T04:32:44.607000
-CVE-2019-1767,0,0,482d8ac8c18fd163663a5930f97690f33fe642c423107e93ef62966606e9ccb5,2024-11-21T04:37:19.900000
+CVE-2019-1767,0,1,421cdea1edffc1d32f65dce2fe0c7bb5d9e2c5c6be1f731cd4b4a33c8d9b8296,2024-11-21T04:37:19.900000
CVE-2019-17670,0,0,db5ae326929c39aabd6568e9e2ac5652362cde397800c113352795ce97e649e0,2024-11-21T04:32:44.753000
CVE-2019-17671,0,0,70f79484c59b59738fd554ed8ab8742e115b4985e80779863388e6975ecb5e74,2024-11-21T04:32:44.903000
CVE-2019-17672,0,0,f88b8c46002c8fe81a65daea9f34274471c586388cac3674756f726ce22897cf,2024-11-21T04:32:45.050000
@@ -135417,57 +135417,57 @@ CVE-2019-17673,0,0,b6bedb4ca649a7ded2ae6aa1d9b19ce4e77f7a21dabfc8a5359fb2f4b3228
CVE-2019-17674,0,0,73794fb509e7d0e3411ef651fa94855e1dec22ca3ea307387e609a74209000b8,2024-11-21T04:32:45.843000
CVE-2019-17675,0,0,30e4ceff9f29440b95d904296031674c3c0b129b997878694f6edad58d499597,2024-11-21T04:32:45.993000
CVE-2019-17676,0,0,bcaad3594b96e6c2a9e7e0f7c543ccf418972de69941072e2d0d4e0898163ef5,2024-11-21T04:32:46.140000
-CVE-2019-1768,0,0,ebec09506775c76b8d2c243bbc47eb2a76cc9b6f71ca696a3b7f500d1dd4b382,2024-11-21T04:37:20.043000
-CVE-2019-1769,0,0,a50de33d9591ff069e8b7855638d1b0a53181a9caa97ccc528dbb55dcbd81869,2024-11-21T04:37:20.180000
-CVE-2019-1770,0,0,d947296c0ef9669b951d9bab5fc01ce1e2b865e2cf057415189caecf975be0b5,2024-11-21T04:37:20.330000
-CVE-2019-1771,0,0,be779b468769f9bb9f61ed2d56467fca233661f1c0f10a684ad9ead79ec6ddbf,2024-11-21T04:37:20.483000
-CVE-2019-1772,0,0,3107eddeced3dc9f8c1073a973b25eabdac0b06091906b79bf4e0003ce89825c,2024-11-21T04:37:20.607000
-CVE-2019-1773,0,0,8a1109e5f3d967b1b233891e73cd426379356bfc85a9294902786392fc959e50,2024-11-21T04:37:20.730000
-CVE-2019-1774,0,0,eaf8529e614c26c9afea2b67013588c2a715239b69aac93b90dbf6a1a36bc195,2024-11-21T04:37:20.850000
-CVE-2019-1775,0,0,b166537cec0df8365e0f9a4d222ab37cd4e501a8b0bae8fa20e5336cf3053eb6,2024-11-21T04:37:20.987000
-CVE-2019-1776,0,0,6accb41df8c1a631884846f394892495819217a70c0486a8de17b84cd2e9f04f,2024-11-21T04:37:21.137000
-CVE-2019-1777,0,0,ed06447eed7886e6fe2474167d215513f77e05e7cc0f69da541e32633e636588,2024-11-21T04:37:21.293000
-CVE-2019-1778,0,0,46f9b7d050b2139296ac2ea265297638119e7dad055ff91367838a61a8d0ba70,2024-11-21T04:37:21.427000
-CVE-2019-1779,0,0,4564191d0588ee8c3df391f79b0167689f70d95be001148f65c53bdc273c1590,2024-11-21T04:37:21.570000
-CVE-2019-1780,0,0,1c9944dfc8055d4d92d2c9f2ebbc4247509c30612fda51787b9055e2ab5edb3b,2024-11-21T04:37:21.717000
-CVE-2019-1781,0,0,dc1c1bc2510dea4d2e4aa7f40f28255b1ee8c6b37d31f572d1ac3331202d01a4,2024-11-21T04:37:21.873000
-CVE-2019-1782,0,0,4cfd50bc4e08d34ef95f4a9d1e3986f1d799bb482d0e0886dbd2c24d4d2c7170,2024-11-21T04:37:22.043000
-CVE-2019-1783,0,0,788899e8e373c8767b824620563801663261e07c5f1587bf1f799fe1e58ffe99,2024-11-21T04:37:22.200000
-CVE-2019-1784,0,0,751b398efd8b20892c2383f257b91687602d64d5af7858878dcd170c6339e895,2024-11-21T04:37:22.350000
-CVE-2019-1785,0,0,fb0824f3c02a5a10ff8d6d6f75cb2d1d9dc89a6c425fe68564ba060b6217a1a8,2024-11-21T04:37:22.487000
-CVE-2019-1786,0,0,b2285a642ac6851bfb259a8a3276453e42619ddc955a653f2cb9ea23d92c5bd9,2024-11-21T04:37:22.640000
-CVE-2019-1787,0,0,73df531994f7f71d504c7e771ec074fb2e065d874ed9bbaf48b326d1b6411707,2024-11-21T04:37:22.823000
-CVE-2019-1788,0,0,f3019fc5585676e151eb72ce2f4dabee8020e99e0ca49976d51de98c4474c315,2024-11-21T04:37:22.993000
-CVE-2019-1789,0,0,bd8ba4afc79f82159279f94df1cc6e4bfa9f208751ac2fe5081ac3eab27e651b,2024-11-21T04:37:23.153000
-CVE-2019-1790,0,0,85a22a69cb9b5dff60dcf2abb0af89804126bb6232691f8a386c1ef76ad3cd8d,2024-11-21T04:37:23.283000
-CVE-2019-1791,0,0,53a2b758a0ec594f91add9a764d107fb00b17cbb22a4ee34640d9703684d1ea2,2024-11-21T04:37:23.437000
-CVE-2019-1792,0,0,5992e0ceb04c1748aedcdc9ab311ff17f6659b253cd00c33d80c2716a9cbf586,2024-11-21T04:37:23.590000
-CVE-2019-1794,0,0,8dad5cd11603970bac36ba709246557c656e96ddc6373e4591e39f03393ba0f9,2024-11-21T04:37:23.720000
-CVE-2019-1795,0,0,7d540909654b542d02cb932f91d5490cf544897d69ec2b8decbecfbb369746e6,2024-11-21T04:37:23.847000
-CVE-2019-1796,0,0,ee1c57ae40bda20a8317ac829f719f5cd45530d58d4946e2c83584836fe91999,2024-11-21T04:37:24
-CVE-2019-1797,0,0,2f4bb9989140b1cdb8111b9cd9174c6131ea28bed29afd85d301bf09a0553be3,2024-11-21T04:37:24.127000
-CVE-2019-1798,0,0,285d6177206dbc130eee4a31282aeed8d53ff3afa1496a6440e39e5e191971c4,2024-11-21T04:37:24.253000
-CVE-2019-1799,0,0,f941134c4ee4e18124a5a947d716005740dd36c4ca02e281e834f4db8aa7e794,2024-11-21T04:37:24.380000
-CVE-2019-1800,0,0,1b6abbf719629de7863297e2b5a97f50c73e2678aaa8a616c3585969ff7c6ba4,2024-11-21T04:37:24.497000
-CVE-2019-1802,0,0,c494356cb9548399906ad4152d30a55ded8bad6b72ce9f1ba3270b60f6f699b5,2024-11-26T16:09:02.407000
-CVE-2019-1803,0,0,167d4540a8309dda8b02acf383d3e17b18bf9771d35f968e216443d952042ec4,2024-11-21T04:37:24.733000
-CVE-2019-1804,0,0,ca9f1aaec0b1d4a2c3ab9ed877879f6134a492af11334870db6e723ab9ef9114,2024-11-21T04:37:24.863000
-CVE-2019-1805,0,0,f815c70153753e4186ebc223758a7e9e1907b8761842f32210994e52b3b944a2,2024-11-21T04:37:25.007000
-CVE-2019-1806,0,0,db0b8d9996b9a1adb665133d5543154552aa8a5dc90fd9cb230bdff456468bd2,2024-11-21T04:37:25.137000
-CVE-2019-1807,0,0,b71f4e36bbd80cacbd9c70f2fb423cf1f10df4d1e4e9ac15c815a1c334f9a341,2024-11-21T04:37:25.353000
-CVE-2019-1808,0,0,df11a612da8f3d0e019387071d2d588e85dbd81f26d9c817775954490bcd55a2,2024-11-21T04:37:25.483000
-CVE-2019-1809,0,0,ae4c652d4984f492a6364649ac83f632e43fa8432fa0dd7d6fa2937ee92f76a0,2024-11-21T04:37:25.623000
-CVE-2019-1810,0,0,356d0bdacd53ab4af71b3ec681c4fb054d8eb7485d62d16ac5a5b788a2a7a18d,2024-11-21T04:37:25.773000
-CVE-2019-1811,0,0,d8f6ba170be0d2a578cec33d90a638f2e4d7ebd5e751255ddbff94eb8d03ac84,2024-11-21T04:37:25.917000
-CVE-2019-1812,0,0,820b8c64ac2d9b527212082d382c1010d81cc97ba0386a02b790f13a15e140eb,2024-11-21T04:37:26.070000
-CVE-2019-1813,0,0,6b8373a37b91e632b8378bc56ebe6e7d90a65e76e61af81841987916ba22a4d2,2024-11-21T04:37:26.217000
-CVE-2019-1814,0,0,cbd4f08830f1a5ef5e5079ac69de3c618cf3202b90d87c85d6bfbda7e0545766,2024-11-21T04:37:26.363000
-CVE-2019-1816,0,0,a8da8d2188dfc0f3af35a1012924c089b4fbfc69850fa9b654d090b645b0985d,2024-11-21T04:37:26.523000
-CVE-2019-1817,0,0,4ee26441ca69be5d8a7ad224b9e28101d4cf76a6142120b1acc6c2e4507627f8,2024-11-21T04:37:26.647000
+CVE-2019-1768,0,1,77b24c4deb5729ff738ed9213faed4a26adbda4902340c68777c751811f61573,2024-11-21T04:37:20.043000
+CVE-2019-1769,0,1,522d197e0f1ccb4a7f57af518b7473fcce8855a07005fb1882c7438c0307e765,2024-11-21T04:37:20.180000
+CVE-2019-1770,0,1,3b802be0b2f4af8ce655e9b4ceaff38948f1bacf70e88deadf60ae7592f592c9,2024-11-21T04:37:20.330000
+CVE-2019-1771,0,1,be1ce490972712d4de850a6e8a3eb81f329b2f6a7ecff09a62c2eb8f21c7405a,2024-11-21T04:37:20.483000
+CVE-2019-1772,0,1,b70922303c79f924f4eeb72cdbc89a885088d92614a511166a6444edf7a9fb65,2024-11-21T04:37:20.607000
+CVE-2019-1773,0,1,83446890fa5c8a7a8be0809a501358afc105889896f807d82b582974c36e531b,2024-11-21T04:37:20.730000
+CVE-2019-1774,0,1,532301e0be90441e3a5f819a1d195293b5b9ff2569ea87d42471fedf166ebce1,2024-11-21T04:37:20.850000
+CVE-2019-1775,0,1,bf0de56ddce30d67bd393cd273132eca9df1afc9196b13b5e73679ef181a3f99,2024-11-21T04:37:20.987000
+CVE-2019-1776,0,1,b2eefaadca332df6c4615f759a7e3241a4b1a9dedcef87b9e6a325f9a4fa50e6,2024-11-21T04:37:21.137000
+CVE-2019-1777,0,1,01979f56fdb0cf7a10d706964652bde6df246be4614fc979bc7a6401be5adf89,2024-11-21T04:37:21.293000
+CVE-2019-1778,0,1,5afda37dfc90a673779c5aef6a7bcc51d0d8fbe6560f74e1b79de6f075504edd,2024-11-21T04:37:21.427000
+CVE-2019-1779,0,1,e62f42d7d1e2c7faa73138ba47762a43626d91d145a855b773c997cd0fb465bd,2024-11-21T04:37:21.570000
+CVE-2019-1780,0,1,9cf7e13bcdf760a6911a331957c19eceb9d01ffeff8881be27ece909e271f258,2024-11-21T04:37:21.717000
+CVE-2019-1781,0,1,1383718d74d52dd06cf94f8769b61c333f7c0010a6e9e7b68fdfbeadb3ddc969,2024-11-21T04:37:21.873000
+CVE-2019-1782,0,1,3b52d0bfe20bdf7b8188600fea511846c24619b7f59b861fec94a373bf4fb121,2024-11-21T04:37:22.043000
+CVE-2019-1783,0,1,d7c98204daa988e9c2c3a98e557c79dd6019c296ced4b909efbd2667ef431aad,2024-11-21T04:37:22.200000
+CVE-2019-1784,0,1,f2e128759248619a3eaa589167a519774c2bc97658e86fd432015d5993d489dd,2024-11-21T04:37:22.350000
+CVE-2019-1785,0,1,ca4ee0479dc5db70c0fb52662a751af0e36c70997a293b05572988b7a5b201cf,2024-11-21T04:37:22.487000
+CVE-2019-1786,0,1,046c9a67b467f42531b890f4f85ed2efac3b6bfba51e8528740ad9bd98ff0710,2024-11-21T04:37:22.640000
+CVE-2019-1787,0,1,4ddc6377b179ec22d36f8d2359af69e8be5fb330e39d2efc4e649237c9383273,2024-11-21T04:37:22.823000
+CVE-2019-1788,0,1,a8b602a9c34edcf4dc31b3cd9959112298c9373e799e4308abc6cdfd34c09067,2024-11-21T04:37:22.993000
+CVE-2019-1789,0,1,bfefb9a384665623f7877359238200c62ddbb51042f59d2a13f3bf0a9abd970d,2024-11-21T04:37:23.153000
+CVE-2019-1790,0,1,d4bbe9fc680d32c8e422933420f02f62f2eb74175c63b187d1606be4c61edf8f,2024-11-21T04:37:23.283000
+CVE-2019-1791,0,1,c9bb84aee240211be65051589a2f7737dd5b09f235e9369cc537e6ee6f350aca,2024-11-21T04:37:23.437000
+CVE-2019-1792,0,1,108a204fdcdc6d96fd80c4cdff21acfcef913a68388b25c311f91c5f1f1e0a7e,2024-11-21T04:37:23.590000
+CVE-2019-1794,0,1,7990f7dcf9c1a2360325dca9ce73844916c42914d694fd347f2c07f1e9b9c2b9,2024-11-21T04:37:23.720000
+CVE-2019-1795,0,1,6bf13a3f797cd0b2327d7dbe5e002dae6b4b22563d473dc4441847e85d15f7e6,2024-11-21T04:37:23.847000
+CVE-2019-1796,0,1,ee296f0447f94cebb6b42937a4de5dc74f596f2d92cf5c39fc17052af3971d38,2024-11-21T04:37:24
+CVE-2019-1797,0,1,568cbf2337ba9f52019757360375e3c369d11c665c484fe05306c09904780cf9,2024-11-21T04:37:24.127000
+CVE-2019-1798,0,1,de096eaf2c8fddfe3921ee59f8aaa4153287d086136ee6ad499e7ff3832e5792,2024-11-21T04:37:24.253000
+CVE-2019-1799,0,1,2826bd2f597efa3dcb8a85313c0e336e9a40ae9e3389b24b9ed7a16d06af6477,2024-11-21T04:37:24.380000
+CVE-2019-1800,0,1,f36f47f6a364cc503e78dec8bab71d8a1515608bd26a9974c6482e586eac4d2b,2024-11-21T04:37:24.497000
+CVE-2019-1802,0,1,a20653d59a8344d4986e99b1dc7dbc5c66272d7cd41f5711739d64d1603d43a4,2024-11-26T16:09:02.407000
+CVE-2019-1803,0,1,9793a5ae0bad4ba1031df9c11d0849326254ee9880a058f7a0088c70b89f462b,2024-11-21T04:37:24.733000
+CVE-2019-1804,0,1,a7ea2f2fe7f8616cf99dcb162676b3f0e58ed1203a1912264397824a6b4282ac,2024-11-21T04:37:24.863000
+CVE-2019-1805,0,1,46a2afd27715094285ceff2b5495d4aa3a248ca6b7cc9b04826af08732ce177e,2024-11-21T04:37:25.007000
+CVE-2019-1806,0,1,eda39f95e104c03ff75dc52efcd51744eb804835fb1e793df2e42520b204b679,2024-11-21T04:37:25.137000
+CVE-2019-1807,0,1,a9e789bc8f9d30511c03fc1f4cd8615c4e56706ab1b0041a4c1cb47e5b8cc1c5,2024-11-21T04:37:25.353000
+CVE-2019-1808,0,1,09f09c9983cdf8cb71203726fb5a2d0441bb28cc53b1380da44ec4e622384457,2024-11-21T04:37:25.483000
+CVE-2019-1809,0,1,73e39acb025f7daf051757204a4f019cc70bc70559a4b1a3ef8b182428a44017,2024-11-21T04:37:25.623000
+CVE-2019-1810,0,1,f6cfc20979269a37e53df5ab9a61f0b686c7701539aa81d58fe95043c057ef63,2024-11-21T04:37:25.773000
+CVE-2019-1811,0,1,7257fa9318dbfbb906f8172322d1a6dcf0026ac87e97127a618142b9ce820f3d,2024-11-21T04:37:25.917000
+CVE-2019-1812,0,1,f39f3180939fe0866f9a91a0e0e9b95e0612f700f79a209a057b2b8cb0dacbf2,2024-11-21T04:37:26.070000
+CVE-2019-1813,0,1,72bcb700ab78583c44bd818d08ef976f5a57e0b08f0d9981270962c1cc81ecea,2024-11-21T04:37:26.217000
+CVE-2019-1814,0,1,6b482a1984164225f91a406f53c4f46d9a97fe53faff00d70635949504734401,2024-11-21T04:37:26.363000
+CVE-2019-1816,0,1,bc1b96179ad9e6dc3efe1c98de6af983824c419aa24897dd76fe2ae3535bf76d,2024-11-21T04:37:26.523000
+CVE-2019-1817,0,1,b37f886c116df24d0ef11fd8cd0180a420714c8f2b41e09b3f99177374f69a57,2024-11-21T04:37:26.647000
CVE-2019-18177,0,0,997596f59e0036f91e0b923e8d3cab2e9e3873b57aa1cfd4f381e2447e82c231,2024-11-21T04:32:46.273000
CVE-2019-18178,0,0,4014754098609c269ccd37e16c70e7959f7f1db6a3796fd3f3684fc82a2086bf,2024-11-21T04:32:46.407000
CVE-2019-18179,0,0,f8ec20cab5aeaec90d0dc5ea3b6119ac224af602e436eac536be52ace47ae53e,2024-11-21T04:32:46.540000
-CVE-2019-1818,0,0,60f497baee80d59f6cdcac9cf12c99ecab5bcaf672ba4b3f89fc888672ea450f,2024-11-21T04:37:26.773000
+CVE-2019-1818,0,1,3d1a9790a6b995e50f8a9799d3172dfae1cd6d7c6e0f7f158914ad39cbc3acef,2024-11-21T04:37:26.773000
CVE-2019-18180,0,0,52f1d8e02db8cb6620e81881c4de31e2ea6628a1d865393071f7aa9c77ec69b5,2024-11-21T04:32:46.717000
CVE-2019-18181,0,0,1656454c0d2687493ac76aa070298449a5da6d4b40f2ae5444253bd22e14a084,2024-11-21T04:32:46.870000
CVE-2019-18182,0,0,04250e5a887b634592ba1352e15d2c548963c2241206493229b867a445e4219e,2024-11-21T04:32:47.003000
@@ -135476,7 +135476,7 @@ CVE-2019-18184,0,0,5d859ad092521d26c338f6609490ceeebe37f7c18beed00dbeab79cfa93f9
CVE-2019-18187,0,0,e7712a3fbebf888bd692502c0b21013633e2e66f9080eb3d209b2094f9ad3692,2024-11-21T04:32:47.440000
CVE-2019-18188,0,0,f6271eee764dee49e854ca8eded1cc3fd6f73a0c6120b5c66d0caca59d262d4a,2024-11-21T04:32:47.540000
CVE-2019-18189,0,0,794fb25f653b440af7195bd2a42eebf2de7fa3d595035bce07155902c2f8886a,2024-11-21T04:32:47.640000
-CVE-2019-1819,0,0,fe0496dd535660915f7c03e533392599c618b611d0154f78e3c34805e184487e,2024-11-21T04:37:27.780000
+CVE-2019-1819,0,1,6d5e6840e0b1ba9cef4b125b4cd10078d08be2060c74e294d223abdc0835ba44,2024-11-21T04:37:27.780000
CVE-2019-18190,0,0,f9a93b092827746f7f2f839528bcf08ff191fd2dc566982723962093fa78dd26,2024-11-21T04:32:47.740000
CVE-2019-18191,0,0,fcf19684922b1f630cb76a8652d040961770861cda6ed262c3c5329954a17df1,2024-11-21T04:32:47.840000
CVE-2019-18192,0,0,6886aa5a6422657efab732084e8c999d7b5e3c6eb8d0c3f4cfe661bb40be4a76,2024-11-21T04:32:47.937000
@@ -135487,7 +135487,7 @@ CVE-2019-18196,0,0,042c7972eba3023bba647c0ff8f4c6a49adbf9a6f71e9277fd165214100b6
CVE-2019-18197,0,0,92cb938a85ad82d905957b5da0e279ee3af708611ad978fa9cf6245ee304284f,2024-11-21T04:32:48.610000
CVE-2019-18198,0,0,1b9fd8ceef0aa254d3407365bfca551684349965ddab2ef4a1640d858e4a47b8,2024-11-21T04:32:48.770000
CVE-2019-18199,0,0,3969bd3237a68455b6c0ea0481da464fe1debdb3a9a0d62d495ddc5b6f07e377,2024-11-21T04:32:48.913000
-CVE-2019-1820,0,0,aac96ccdd4c88f42a503fee6b35cfa2ac58eb403e99614430b4c417e0e4de55c,2024-11-21T04:37:27.933000
+CVE-2019-1820,0,1,904e55999eb8aa58e7c2cec5a0b38942f2569ad2e289b07a5748d3e08a1d8020,2024-11-21T04:37:27.933000
CVE-2019-18200,0,0,4dc672f95822f8d450a2d3ae756324ac68f0161323bc290c2531bbc24d3194c5,2024-11-21T04:32:49.040000
CVE-2019-18201,0,0,27eb975e8dec1d68fa5fa2d068be256ecbf4b3a0a11cf08c664d33541126b36f,2024-11-21T04:32:49.177000
CVE-2019-18202,0,0,09b75690b0657518307d4373a493dc2b242cc299a8419f2414096f91008f5b30,2024-11-21T04:32:49.313000
@@ -135497,7 +135497,7 @@ CVE-2019-18205,0,0,31db42c478165f3cdf944ef4d0ce2d5976d71fa384ea5a4cf4ac04abb4d87
CVE-2019-18206,0,0,177fb6d7a5165c03ff612bd7addc9e3bc7c6693c722cd710dfc9468eff25c861,2024-11-21T04:32:49.860000
CVE-2019-18207,0,0,e188cdd6a5b24248cf6603821d4dd4aa13f7ee956614c3576365e3b1f6cacf6e,2024-11-21T04:32:50
CVE-2019-18209,0,0,eb213021ac465eb0fa0d443a4dc3003948d284a57675760622ec6a6de77f1417,2024-11-21T04:32:50.133000
-CVE-2019-1821,0,0,03a1376eb001b099563cecb714ffaaebb0416a7675ee446c86e6eb8b4033c3d8,2024-11-21T04:37:28.080000
+CVE-2019-1821,0,1,5fcc2d2c9262212c4a5b0dc5c8e58bcaff65226d9ba676043f9734cabe3cea96,2024-11-21T04:37:28.080000
CVE-2019-18210,0,0,421cade8e83e6716a205bd66aa96b7888f4dab6ce820716c5d196f3787720376,2024-11-21T04:32:50.270000
CVE-2019-18211,0,0,e04547f8681ab03d021b08dd73e2f3085ab67d7538da1d8e503df14e568280cd,2024-11-21T04:32:50.413000
CVE-2019-18212,0,0,a8116430ef5f17a212cf26f1c2aa2411ecbd2ac7a129638ed31a20e1c3aeeedc,2024-11-21T04:32:50.553000
@@ -135508,7 +135508,7 @@ CVE-2019-18216,0,0,93d96945311878d75b160461316028da65850d51ef855041fa5de1e8703bb
CVE-2019-18217,0,0,4a47ee6ac9778ec9a9d9780011877fb7f5cc04fa1da7740c9134733da307eafa,2024-11-21T04:32:51.270000
CVE-2019-18218,0,0,d9b3a5ec1a9fe9bffbfe183994dc38d12cb176de738a3c90f5b9607a36199413,2024-11-21T04:32:51.430000
CVE-2019-18219,0,0,6a6b0367fa5404a88de3a42d523bf91e938aa74d7c753df2e338617bd24bb5e8,2024-11-21T04:32:51.590000
-CVE-2019-1822,0,0,eb651ed1f046b424113c335abfc9934ebc8effca369db3a02fd5c0d34d872b93,2024-11-21T04:37:28.217000
+CVE-2019-1822,0,1,a40b6d3d9042cf93bdbed964905825c6e5b3b39be60943b7efb2e19c0e9b1abe,2024-11-21T04:37:28.217000
CVE-2019-18220,0,0,f0625c87125d6c1b5bd005a7bf651955037bc88577cd04a73442f3fcb69c9b30,2024-11-21T04:32:51.740000
CVE-2019-18221,0,0,a4e8fbfe70883af4ad8ef671d577d8391d2074f05e60ec9cc0af007c359c7ce9,2024-11-21T04:32:51.880000
CVE-2019-18222,0,0,9e6a2e294279eca4bb94a2a272d0073cc8eeec1e38d74b2d4d3169cc3595805c,2024-11-21T04:32:52.030000
@@ -135519,7 +135519,7 @@ CVE-2019-18226,0,0,5dccd0aaa7552e96d3891195250e7fd34e07d351ed0bca3e3e903de2a3feb
CVE-2019-18227,0,0,d264767c9658ef08d338c5122f1ad169010d922163450575a234fcdb8c90de8b,2024-11-21T04:32:52.770000
CVE-2019-18228,0,0,d885a8609f0a3ac04044f8cc2e5e42cb6c79979001fd6b38b84fd598c0eb83af,2024-11-21T04:32:52.897000
CVE-2019-18229,0,0,714f769f76c1b217c0db5a3190ec4d37958c2c15e0ae05fa63419f30115b82cb,2024-11-21T04:32:53.037000
-CVE-2019-1823,0,0,fde5785e650bedc5a7fc68aa1f6c5c825a44f1e4052fbd355feaebdca72fd738,2024-11-21T04:37:28.357000
+CVE-2019-1823,0,1,07352904a84adbd70f2ee850b61fab879a56029d6f75722d0fa3058660f6d30b,2024-11-21T04:37:28.357000
CVE-2019-18230,0,0,865b492c1e8b948f429f5ab0d300f3e6af30da6e2cd1b1a55f5fc54ebc90af70,2024-11-21T04:32:53.170000
CVE-2019-18231,0,0,5fdde1ca836ee55cce7ceaab36adfacf8dbb9e851306aee603010f3a67c2a252,2024-11-21T04:32:53.323000
CVE-2019-18232,0,0,9bbe0ac6b0cd1a2ac46432dc0769ce0ba872cf6b8bd5a569b1a78886b81246cc,2024-11-21T04:32:53.443000
@@ -135528,7 +135528,7 @@ CVE-2019-18234,0,0,96d88ec9d0af11ea83f453fc5aa2f060957bfcba66da3b201a1f2269781ab
CVE-2019-18235,0,0,5052239168df17ac6c652c543c7b05c6086ab8af2369258d5c3861caefe6cbb4,2024-11-21T04:32:53.757000
CVE-2019-18236,0,0,0aee6525fba0b156b156c3accbd5150f7b3d90b8abbe9df6cfbb40687b78dc33,2024-11-21T04:32:53.863000
CVE-2019-18238,0,0,41b323cbd680facec6c5017706926ab500f4868771ef57247aa71741950a69ef,2024-11-21T04:32:53.977000
-CVE-2019-1824,0,0,e7bbba45ca7cc777ad9f14673385d28c05b6a941173c222d46b53309dbc93342,2024-11-21T04:37:28.487000
+CVE-2019-1824,0,1,c4d62fc718d909c46f04074d52d6e163bd5753938dbc0dc41f3fe97ad42af71c,2024-11-21T04:37:28.487000
CVE-2019-18240,0,0,49fe631faea236cf7640bba8a6b5dd30a9051c31f51abf03bdad9ddb64f34f37,2024-11-21T04:32:54.107000
CVE-2019-18241,0,0,80827bcba69fd3e23387e520e8f848025d26aee6d188e0b327fa7230a3bcfad5,2024-11-21T04:32:54.213000
CVE-2019-18242,0,0,1d7f93d0c82c1e77538efd976f0fb402559a3b61751913404df609f0faa42442,2024-11-21T04:32:54.327000
@@ -135539,7 +135539,7 @@ CVE-2019-18246,0,0,086d8b1e13cd28e04fba721327ec1069ec0fedfdffa3f768126e48ae0b580
CVE-2019-18247,0,0,d0108e493e8ab31a13f5aa14fdaa803e4c20a91f60a9fd81b34d86dde0b9461c,2024-11-21T04:32:54.943000
CVE-2019-18248,0,0,20d76b8394806c82c63c6fc7256404ee1f5828bf768373eeebf2634dd13aafbd,2024-11-21T04:32:55.050000
CVE-2019-18249,0,0,d8762bae1dfef6a428ad09652d41f0efffececbcb8d3e7aff3f5f1a239c2e7b9,2024-11-21T04:32:55.167000
-CVE-2019-1825,0,0,e80a010aa8497761c8870ac3a49be35cfaecf2b5f80187bdbdbf8a04e9e6cefb,2024-11-21T04:37:28.623000
+CVE-2019-1825,0,1,2c996c86ee8e846ed44dd88fca47ab6c994a3a0fb0ec6c9588e1f4b583d55cde,2024-11-21T04:37:28.623000
CVE-2019-18250,0,0,339ed21e0ec8d98222ebbed7f57d7f5951fe70072200c9d12b1856a09cfd3ae3,2024-11-21T04:32:55.277000
CVE-2019-18251,0,0,5c008ec86e94457463d6fb2e5fa4f8d00de46b5119b3fda66bb99aeaf2ee8f8d,2024-11-21T04:32:55.383000
CVE-2019-18252,0,0,107113eb49aaae2705ee24f7f5b74a641826bb2626de5f9a72df1d6e9b247252,2024-11-21T04:32:55.493000
@@ -135549,13 +135549,13 @@ CVE-2019-18255,0,0,71dcc75d9ce8f9f5a70aeff8eab1d2ede6a04f7af28d9f5c823763eecbdb4
CVE-2019-18256,0,0,75f49a7e3cbca8baee13d827871afc59a838bd5dccb482da01c106aaa3411050,2024-11-21T04:32:55.923000
CVE-2019-18257,0,0,ae0be27b6e05111e5aa2c03b57c8daefa5d047d7148d719e17a1c1681721db32,2024-11-21T04:32:56.030000
CVE-2019-18259,0,0,c9a15444a2f999ab61c4cfa14229cf1940ed3a803922032e550a95dbfb254bb9,2024-11-21T04:32:56.130000
-CVE-2019-1826,0,0,bdaa30b0b49855a1be4e11171644f287a493ba424ad736248d11ef54b72d7c17,2024-11-21T04:37:28.750000
+CVE-2019-1826,0,1,d71b7ee567271eef51d572256b07d4bdbc5a09815f1c85b67badb80837654c91,2024-11-21T04:37:28.750000
CVE-2019-18261,0,0,b2307dea67fcbcf070f5d0de00ae8f2899d5b2e0b2eec2b2f6f0c0bae634b2fb,2024-11-21T04:32:56.237000
CVE-2019-18263,0,0,2bc362ec1ffcdb66126c9b70d418bb3f125e86fbcd286187c04537e1850b16bf,2024-11-21T04:32:56.343000
CVE-2019-18265,0,0,83cdf63f538b054620807a65163a1cd43bb97104567893b13d2aeddaf84a26ee,2024-11-21T04:32:56.453000
CVE-2019-18267,0,0,2cde86a876a111ee37a7ac3068d2507c42f54fb18ea039e8f1defea0b768500b,2024-11-21T04:32:56.590000
CVE-2019-18269,0,0,45fce77509b4e13f13d23c9592596b4832c2703c3dd3739bb0e2785c88128ea5,2024-11-21T04:32:56.703000
-CVE-2019-1827,0,0,1276f76383d9d50d66e2852e2c4544d6011a5e414e35e66313f506044eec80aa,2024-11-21T04:37:28.887000
+CVE-2019-1827,0,1,a7d79b03672c53df05d2f3492b73f6eb45485282942762fd93b901464a0d26a7,2024-11-21T04:37:28.887000
CVE-2019-18271,0,0,b6438aa80e2a71b14562b2fc378fbc298155ee023f2505a258c6770fabb5aaf4,2024-11-21T04:32:56.873000
CVE-2019-18273,0,0,c40a06b7ca7307bd946ac76569cec739781192288c239a8b24763f9c4e26bbbc,2024-11-21T04:32:56.993000
CVE-2019-18275,0,0,575569670beea2c4bb975b02ba447db2ec441c5d5ee1e6eefc5bae56ce2a9d3a,2024-11-21T04:32:57.107000
@@ -135563,7 +135563,7 @@ CVE-2019-18276,0,0,b020fc52ee8ab8f27fbec08a5d9ba0361eb0c96388e48a0858c4de031b5f6
CVE-2019-18277,0,0,69127bb2afae7169b116a70f66d1aa2d764b92ae7e7de41a0af39a096d72fbbe,2024-11-21T04:32:57.377000
CVE-2019-18278,0,0,df35160d7fba6fc63019805b53f8ef763d5089cef2e378271398113af363a0eb,2024-11-21T04:32:57.520000
CVE-2019-18279,0,0,5446ee055c6e661ca1d014c5afb24551806a583f9d9ddf4a8ea2a3709d6bdc82,2024-11-21T04:32:57.650000
-CVE-2019-1828,0,0,94c8ec337c00861fe37bff897c192b00762cac3183227979c3838838d9f3ac3b,2024-11-21T04:37:29.007000
+CVE-2019-1828,0,1,7a37570a5241dff53436c489214f24a1a4588d66952a6863d8c9e938f1bc1741,2024-11-21T04:37:29.007000
CVE-2019-18280,0,0,d7297e42f867cf949716396490b889dc5c6aa9d23355d20d01b5b4f77f599093,2024-11-21T04:32:57.857000
CVE-2019-18281,0,0,d05d24bdf3dd3baa8d459f1b430c212d2b7593d0adf54ba45a65c753c8952013,2024-11-21T04:32:57.990000
CVE-2019-18282,0,0,33ef3774e8f27a518f5e182557b6fcb41753cc660d42d11b35e7c94d2ed3b1dc,2024-11-21T04:32:58.140000
@@ -135574,7 +135574,7 @@ CVE-2019-18286,0,0,d32e3b7be863f2c070550c857de2bb40bc2d0c89ec6f6a52a1bbf2b620b42
CVE-2019-18287,0,0,384f70f21de2b92e9a2b533169a909ab313f7f87fa20a43619549245a33835c0,2024-11-21T04:32:58.750000
CVE-2019-18288,0,0,0179f56c6dc176fceb63ad27410b706e4246a9f8db37d0982cdb89b5c05fdb54,2024-11-21T04:32:58.863000
CVE-2019-18289,0,0,29f14c6da3f914b07ebbc5cd7646478eb46153cb3d89c8f15d3af480ff511d33,2024-11-21T04:32:58.977000
-CVE-2019-1829,0,0,91ec83bc34cda71b318bb26427180107707f822614bc9e08db17081467aa2ab0,2024-11-21T04:37:29.127000
+CVE-2019-1829,0,1,0a47c2a729c133d8266a918726480eda067e8e2ace8bb8d178f6b6ac0ce65922,2024-11-21T04:37:29.127000
CVE-2019-18290,0,0,e764cb947f50988a0b8e8f6a4452c355d3f8b909a6e047a8a700c54559734a8e,2024-11-21T04:32:59.090000
CVE-2019-18291,0,0,b9bc545428984a103bb3c57c89f6b18707124276a107e063116be8c07bfe5d2e,2024-11-21T04:32:59.203000
CVE-2019-18292,0,0,61f69fcc643a64abfb48e7662666679d0258513013f5d4df96bf29c576d73606,2024-11-21T04:32:59.317000
@@ -135585,7 +135585,7 @@ CVE-2019-18296,0,0,a873675e97d04669029972aec2a6a65b1f5d3c237e022fe2ecbc12a34771d
CVE-2019-18297,0,0,612dd4d6229cb36e398e8f30d3e7a0bd8417d25460aabeca3668514b840ff836,2024-11-21T04:32:59.883000
CVE-2019-18298,0,0,764872cc114d96e23d407218176b15ba4fe195343d913cd8937eebbd1451da9f,2024-11-21T04:32:59.993000
CVE-2019-18299,0,0,7c7bde3a873c3b338e8c038183bb11c6029b646967ae5c7ea72a2469b01bea70,2024-11-21T04:33:00.103000
-CVE-2019-1830,0,0,3e011c5b89e8b83988bd1f265b63cc8ff25ef98b8d2b3e52464a733d0e8afe0b,2024-11-21T04:37:29.260000
+CVE-2019-1830,0,1,4facaad6cbab1ef34a330cc9b637b04a786589940e6b60b4bcc4e89081f05632,2024-11-21T04:37:29.260000
CVE-2019-18300,0,0,04050c3e33d4c5966d31d55de861e878f5d6eedf61333772aefc6d2151e35496,2024-11-21T04:33:00.223000
CVE-2019-18301,0,0,b3a4e48c9565d4d24191df8d2e2eb9b6fbe1bd5151947dd519865243d630ce6e,2024-11-21T04:33:00.337000
CVE-2019-18302,0,0,e7af472ac68bc47714cc3d995c3298e02e274fb2914d31b490e825b540c00e13,2024-11-21T04:33:00.443000
@@ -135596,7 +135596,7 @@ CVE-2019-18306,0,0,18230b6d8ebf4611d8ed00cb06cab8a7d89daf69c37e3e2e47d39d883fbe7
CVE-2019-18307,0,0,e6850333a7f3c666420af5c7f8c1657fa4de0b0ca30356cf67fa009a5e5da913,2024-11-21T04:33:01
CVE-2019-18308,0,0,24d32cf0adeb21390508d0cf6a2d71e7a04b840ebc4d7cad92ee7b611c319d43,2024-11-21T04:33:01.110000
CVE-2019-18309,0,0,14fc2fd0f1a73ed6af90c4b4927a8443f644a68b4096747116206b142ae9899c,2024-11-21T04:33:01.223000
-CVE-2019-1831,0,0,29287ea59e817e637f6377557659ac1ff74af21d5e33be2122be23b79ccca61d,2024-11-21T04:37:29.390000
+CVE-2019-1831,0,1,c13cf660cddadd308d437a015d7e01a80c8006c7417a598a27d0fea17823e660,2024-11-21T04:37:29.390000
CVE-2019-18310,0,0,24049beef0827420feebc2cd5b764b1a5bc6e8075b8af041fd68b2350519bd1a,2024-11-21T04:33:01.333000
CVE-2019-18311,0,0,7d8b1d7cb051fc2be3defa30645e841bbcdf28945bd0ee683b37bcf17902d0ce,2024-11-21T04:33:01.457000
CVE-2019-18312,0,0,da076b3f742d11a7d4484d5dabeeae994ee517cd5b46ecfc3831f952f8412e4d,2024-11-21T04:33:01.570000
@@ -135607,7 +135607,7 @@ CVE-2019-18316,0,0,32e7142868db85315db8853e38fe53d8f565d8a3e77a651de947520d39b32
CVE-2019-18317,0,0,7e59d3511b02291020a533db245d566bb27868460416f1550725a487bbf12e8f,2024-11-21T04:33:02.150000
CVE-2019-18318,0,0,fdb688785ea5d8d0f01f674303548d413d6ec187e8cd61b97e3448d4c48de362,2024-11-21T04:33:02.277000
CVE-2019-18319,0,0,a68db84164aebdfe522221e4903a0fe841973dc9ecb4f1b9d8d7e9341456145d,2024-11-21T04:33:02.390000
-CVE-2019-1832,0,0,6c9408e7b8a628dd56bba4e120273fa22ec19037802987bd9c9a9457a5a0b7eb,2024-11-26T16:09:02.407000
+CVE-2019-1832,0,1,7482a1efa8756b0cb1fa339cc4b0b3863cde300ff06c86a041a8c89756d98015,2024-11-26T16:09:02.407000
CVE-2019-18320,0,0,2f5e8cf21e6e5dd28642594f44bf1339f84e33166f8f9c67025b1ec4698d7e65,2024-11-21T04:33:02.503000
CVE-2019-18321,0,0,85fa25f4dda5d8a1159cfb2d6979004977e1bf87b0e841ab5f09d77f2547719a,2024-11-21T04:33:02.620000
CVE-2019-18322,0,0,c71ddd972f874f38eb2c83da5de450a9b8b56a8b24b8232b7f53859f33e124b1,2024-11-21T04:33:02.737000
@@ -135618,7 +135618,7 @@ CVE-2019-18326,0,0,2bc10b3b99a00445d86e6382664afe484b53368a190b6c741d5dc6cce2990
CVE-2019-18327,0,0,c47ca1cdada0e8bb9f355e1c4d3957c71e242cd6ce77d6611909c53dbbdd67ea,2024-11-21T04:33:03.347000
CVE-2019-18328,0,0,dcc4f7cf7fa1719afaabd1cf656059dc3d55353b80770df3426946ea571845ff,2024-11-21T04:33:03.460000
CVE-2019-18329,0,0,70a414f20175b65cb58d92afb50b33cc346b3d1c36407415eec123b4f51b4116,2024-11-21T04:33:03.573000
-CVE-2019-1833,0,0,36939d3a133828f61f3c83dbff720ff958bcb4465f9acf8283c3022ebd98ba81,2024-11-26T16:09:02.407000
+CVE-2019-1833,0,1,a7e71f72a7d69bf7ee082c04e308924e916760b67c26a89a34a8efb8a137b9c7,2024-11-26T16:09:02.407000
CVE-2019-18330,0,0,5420ccd1dae514da241b863082ce165cc0fbefec686bc6767b4c422ca6e8ecce,2024-11-21T04:33:03.687000
CVE-2019-18331,0,0,a430dd8721997312465cc7de1f2df36e16938af83ac4bc3a07780dd45b214546,2024-11-21T04:33:03.800000
CVE-2019-18332,0,0,9581605f0938279f3f7a40cba57edb447815819ba018f609107b64773123481f,2024-11-21T04:33:03.917000
@@ -135629,7 +135629,7 @@ CVE-2019-18336,0,0,6883433c9b7ad521200444c67f703b3dbaefb5fc18acca3f60bee4c805a7c
CVE-2019-18337,0,0,cb06ae5190c05dc4caa57a68563a27583142191b8bd60c5bea4dee9400ea727c,2024-11-21T04:33:04.497000
CVE-2019-18338,0,0,7492cffc7bf4edd8b26ee8db452c840d4f3db8b2f23892b52f87298a961b653c,2024-11-21T04:33:04.620000
CVE-2019-18339,0,0,d1e2b8d98c03833961a37ad3dc67eb865f0024e1fb1b5ece20b18acec1488053,2024-11-21T04:33:04.740000
-CVE-2019-1834,0,0,f4e1d577e0d73dfe6f5ea3b1e3c04b1cc20749c91b63c6cd3b7898173115f2f2,2024-11-21T04:37:29.763000
+CVE-2019-1834,0,1,305070f6ddaf2d590a4fea025e5def9d2a061fd0fb2295461834ac105151e623,2024-11-21T04:37:29.763000
CVE-2019-18340,0,0,664ad8e14f19dfb020b5e5ae491237d8d7de022c3d5bc1b78cfeb5ed7ac3640d,2024-11-21T04:33:04.860000
CVE-2019-18341,0,0,cb04d4c35e07e0bc986c4051979bd96b97957e4524d36053547335d12e07f326,2024-11-21T04:33:04.987000
CVE-2019-18342,0,0,4fb3880f3d055d661dcf96d3ed303b6d7ef420031b7a8c015f20f7d8d9158f5f,2024-11-21T04:33:05.120000
@@ -135639,7 +135639,7 @@ CVE-2019-18346,0,0,085b38e40058f5cbd8a88f3871ef25f71b5c1ab17bfbf27f345382b66701f
CVE-2019-18347,0,0,58d9ba4dc42abd53303602e88c286ec25ed3a31c117d27445842467e9a6445ab,2024-11-21T04:33:06.510000
CVE-2019-18348,0,0,625eb0f470cb50591f75e22b8e77abd456031ae4f2f39f9ae5f210f227fbfec2,2024-11-21T04:33:06.653000
CVE-2019-18349,0,0,3de8e316bf87fc9e8bec2b42bbaf8091be4f9e6a59c338e5e8561b5a76e784f6,2024-11-21T04:33:06.820000
-CVE-2019-1835,0,0,44a70f6d507c8b7bf26d2388bcb880ebd2b9a80350eced093c454787489b43c1,2024-11-21T04:37:29.893000
+CVE-2019-1835,0,1,bdc1a7c90d73813c43c99ad778df3e7e106016eaa8563c04d5eb9ffbc2d759e0,2024-11-21T04:37:29.893000
CVE-2019-18350,0,0,13cdb9292727783e424e07d254f27b2c3ce2fa0abed740a882ba294b024e939b,2024-11-21T04:33:06.953000
CVE-2019-18351,0,0,5916244b40c886d293a1db7280aa69d61a2c4d5bacf1afb1ab8dc75b8d9bbddc,2023-11-07T03:06:26.027000
CVE-2019-18352,0,0,362d8305eaf8e26630036d327e92b053dce405847c3b80bb418ef48865a03f19,2024-11-21T04:33:07.103000
@@ -135647,7 +135647,7 @@ CVE-2019-18355,0,0,1e404aac57d44dea8ba8fd0821e94ce035894059eaf2f2401d0234c04d793
CVE-2019-18356,0,0,aec08b7fc4b98efcfa2821a6d9b04c06e6c4d69b3ed34bcedc8ec190e785b254,2024-11-21T04:33:07.370000
CVE-2019-18357,0,0,2bd2a43152b7f2a4466eef8d0d807f46cd6321b40aa3f4ec212dce1d2b93e329,2024-11-21T04:33:07.493000
CVE-2019-18359,0,0,3fb6ca1faeefbf4426586c363743b104f8526e2f1955539642eab79401336d6b,2024-11-21T04:33:07.623000
-CVE-2019-1836,0,0,9796a35d7fede93f21f62024306503b15eb6ea424a7d28fcca41cc29ee0b2532,2024-11-21T04:37:30.010000
+CVE-2019-1836,0,1,d0b3150acd58d073a5ab74d4711827b175bebf694912225dcee9b5225330574f,2024-11-21T04:37:30.010000
CVE-2019-18360,0,0,bd70c0c89a4174788ea5a33a5c939441630673b4d53c728621b014b771a09ec2,2024-11-21T04:33:07.757000
CVE-2019-18361,0,0,f5741d8b89d0a7352cb465f1c532bbbdea034306b58348096076bff231f88cd8,2024-11-21T04:33:07.883000
CVE-2019-18362,0,0,ca49f57760eb8892a3247bf755455080882624d28b49fdb8f7f0e5f867ac0b34,2024-11-21T04:33:08.027000
@@ -135658,7 +135658,7 @@ CVE-2019-18366,0,0,97888a7e6df7dd09903ea6e527dbb1f27b712cc377e85c33d4b2bc5bf9f4d
CVE-2019-18367,0,0,a4f46ab66adea551fdb3caa3bdde61e0b75f82ecdedba5c12b14c402fbe29afa,2024-11-21T04:33:08.700000
CVE-2019-18368,0,0,2582620e17c5687f73b1d17f92ef58f9df0322509639ec43e5b62dc3a8d95b36,2024-11-21T04:33:08.823000
CVE-2019-18369,0,0,a459569b3ed9b5ef4b46a8cb3124736326b79ea820b26dfd1b04057ee2631d0f,2024-11-21T04:33:08.947000
-CVE-2019-1837,0,0,54275a4fadbcad5b456c81786d4fb512405758ea811965eac8d172ad0ac7857a,2024-11-21T04:37:30.133000
+CVE-2019-1837,0,1,bcab97c7810e4f8217847dbe745db952bd23fec16f2283035a7ebe037eccf3b2,2024-11-21T04:37:30.133000
CVE-2019-18370,0,0,be98f0844acd66e39e9ac53cc9ee137a8c5363374eef11f9b29844cea4fd5038,2024-11-21T04:33:09.060000
CVE-2019-18371,0,0,2cdac358f653d83bcc4839af28c25835116b7701ea18992572548358199d8767,2024-11-21T04:33:09.193000
CVE-2019-18372,0,0,fad9ce5551d2c037ce33e8440b7fe68aca368b88ce2bd2e6744690407a08afb6,2024-11-21T04:33:09.320000
@@ -135669,7 +135669,7 @@ CVE-2019-18376,0,0,2a1e2709f89fe6ed2b211642e24f6507c37b8a3581c55772c5a38e6bbf8a0
CVE-2019-18377,0,0,ea70d20cc8115163a0d0bbd840af356b99ea534ee47e991f4ba41034791b69fc,2024-11-21T04:33:09.820000
CVE-2019-18378,0,0,7c951244083432c0a80276728ea09543377a3c8638f675afdf6cec0720ddc5a7,2024-11-21T04:33:09.910000
CVE-2019-18379,0,0,b789a0ad1063428a5820d14d9f7aa86b1279d0c52c5003e26304d55cc5e85964,2024-11-21T04:33:10.007000
-CVE-2019-1838,0,0,1bf2c259c7d8c4c5df15cf51799fe71ef7e0916fc6a1006b0cb4c97e53e5911f,2024-11-21T04:37:30.260000
+CVE-2019-1838,0,1,dd43ba673e0414851717d163dc0cd3cc2c7968316532c692e4f390ba325b35fc,2024-11-21T04:37:30.260000
CVE-2019-18380,0,0,5cbd3cf0324b727b6b19919a09363c480570ff2510280517f7cc715ecb24ee84,2024-11-21T04:33:10.103000
CVE-2019-18381,0,0,6f24dea2813dc63e8cb8927f7a2c7ba64f0ec689a2bfe76e9ad9d9e9f896c5f3,2024-11-21T04:33:10.200000
CVE-2019-18382,0,0,755d4681dc9b595be000d81dc10f36a16c9843db11ec9f1c91693366cfc40db2,2024-11-21T04:33:10.297000
@@ -135680,7 +135680,7 @@ CVE-2019-18386,0,0,87fc4f9d52a21530a992e538a42114bd393efc230913b347864f8a6b7a552
CVE-2019-18387,0,0,30f690a6373b85c3bb88c66133c16f658427af1f1ea1b19c9a81e5ef2928e100,2024-11-21T04:33:10.943000
CVE-2019-18388,0,0,1707f890b576f30a738b9ab43ff298e38588be510285090208e404df9a3adc33,2024-11-21T04:33:11.070000
CVE-2019-18389,0,0,c465f53fd55025a3002ed0ad6893ca949aaa494b48cc6961d930f69f9d9617ce,2024-11-21T04:33:11.213000
-CVE-2019-1839,0,0,ff672344982c05b69b8506611b16d29861356a1ea1573db7f02c40d2cee5909d,2024-11-21T04:37:30.377000
+CVE-2019-1839,0,1,363f1ac72dd8c426c8d317c96ebb1c594c54914959dbe21ec737a64bb88f35c0,2024-11-21T04:37:30.377000
CVE-2019-18390,0,0,3c1c1059377a17992b0fae4bd7d03e5d4c891be2b0ef57b95db8941e27b17981,2024-11-21T04:33:11.347000
CVE-2019-18391,0,0,4203f2a2851d8d7093b10ab4f9eff50408b129c17c4be392840400cf078512d8,2024-11-21T04:33:11.480000
CVE-2019-18392,0,0,41c11311692d812e6f32b2bba0153865cb1027776f82611873643b900036d8a5,2023-11-07T03:06:26.327000
@@ -135688,10 +135688,10 @@ CVE-2019-18393,0,0,abda0fd0388ad7ee097d4d1c46e2d333eb076e70f9f5727fad9829cd0bf2d
CVE-2019-18394,0,0,4a630d33d1a81c54effa69d06cc649678d68b2919b37cad90cd8dda0c9e9703a,2024-11-21T04:33:11.770000
CVE-2019-18396,0,0,bc1a08bc2fe469710e336780f76e0e06245bd6125309ad12e1aab3065f99fe84,2024-11-21T04:33:11.903000
CVE-2019-18397,0,0,88989429918714139f04d871eb27ec3fe9ef954c2ffd3d765a58215bd5e94de2,2024-11-21T04:33:12.027000
-CVE-2019-1840,0,0,831a90d358764b8e56d2a895e2908df30c328f79f804710b46d6ee460a8c1637,2024-11-21T04:37:30.500000
+CVE-2019-1840,0,1,ba296725bb6454ca9b5391f89f8ce8323fd6f32996689e13b19aa2761ccf6275,2024-11-21T04:37:30.500000
CVE-2019-18408,0,0,6b3303ed2c40a24966d71307a7e535a4030d128016ad8cc9b745978729385154,2024-11-21T04:33:12.187000
CVE-2019-18409,0,0,2e15c18dbfb3921ffe2f44a5eed639815e7cb766a6828f772cb583ed905e94f8,2024-11-21T04:33:12.357000
-CVE-2019-1841,0,0,dbc42d433778facd965eb315c0c36be3f602cc87835b183c8cbc275c5f6ad23b,2024-11-21T04:37:30.627000
+CVE-2019-1841,0,1,42cfa35546b1c673fda8efc6d12422a23d77613db503dd8ea236d0df1141614d,2024-11-21T04:37:30.627000
CVE-2019-18411,0,0,91cde6a61641710c3a7433d6e6fb2ae1959d1824476bf69babde53db90609a5c,2024-11-21T04:33:12.487000
CVE-2019-18412,0,0,71529481cab288988911d7c09fb6f1274e7361e2164553036cdaa5915138d9bd,2024-11-21T04:33:12.633000
CVE-2019-18413,0,0,9ac82e090bd9d02d9203baf48b1ced924ae5051b477f04b303dccc6d3fd02f3d,2024-11-21T04:33:12.760000
@@ -135701,7 +135701,7 @@ CVE-2019-18416,0,0,a5deed82c1d682317845cd14768dca480c37e7585b9773c8d8c1694fa502b
CVE-2019-18417,0,0,ef9167435922d98307e3eec0af5045e2aa546bc3d739ac83cd5555a8fce94493,2024-11-21T04:33:13.313000
CVE-2019-18418,0,0,eaa70326a76605e11d1d00be2a990924d69cc1debf87cee3e5ae1d4653d3f94e,2024-11-21T04:33:13.437000
CVE-2019-18419,0,0,56e56d8c80659e6212b707eebe7b54df1079a941b387d362b55c0457191e01dd,2024-11-21T04:33:13.567000
-CVE-2019-1842,0,0,60bcb647e695d03330cb7db8dd58ef3c557e38abe10e048daaf0b2fcf0c78e15,2024-11-21T04:37:30.750000
+CVE-2019-1842,0,1,63da6f982f7a494158a432196b8ff27ab99ba9edd020f92422897b1eefe42b41,2024-11-21T04:37:30.750000
CVE-2019-18420,0,0,8df376f4af7190173eb7f16d925652fc3313e675d68ef7ffce15d73d0243313a,2024-11-21T04:33:13.697000
CVE-2019-18421,0,0,67e7356ffd86511598b29050e8ac282a125b51338086eebf9f3e02d82ede255a,2024-11-21T04:33:13.843000
CVE-2019-18422,0,0,fb6deb0ecc1c10eb6de2604e690114cc8cbeb9737eaf05d766cfaea2574cbd33,2024-11-21T04:33:14
@@ -135709,13 +135709,13 @@ CVE-2019-18423,0,0,d310b7187c2a48d1da4c271326ba0834cca6d4a5ddb446800e39545479c34
CVE-2019-18424,0,0,bcf9e126bd6eeb1df15dde369255a9fa6667f7155d2a1fec84a6a3b422f27588,2024-11-21T04:33:14.290000
CVE-2019-18425,0,0,0e428d23803d7a07165937a89677149ba3af3811d1f07c78dbf5a0abfea937db,2024-11-21T04:33:14.447000
CVE-2019-18426,0,0,4aa66b5bb43641f4e564ba1086be501b8158d9e63d441e41dfd8f6bf23c546ba,2024-11-21T04:33:14.600000
-CVE-2019-1843,0,0,70a62bcea959d5a651277a670ba18fa42561cdf2535328f19f261b502c508f06,2024-11-21T04:37:30.880000
-CVE-2019-1844,0,0,3e6763686f8e31b477540a3a8521b7fd385ed72b005ed1be3ce7bc2f37b258ed,2024-11-21T04:37:31.013000
+CVE-2019-1843,0,1,31b2f607ded81ab5c0be9d1b12affa614e3d125d07d6d6565b8c6d1b5cc4a6b4,2024-11-21T04:37:30.880000
+CVE-2019-1844,0,1,802f1a4a8f23e410a7e774db20a25ba3e4ed0b926c1d518b89d959d06c9e327a,2024-11-21T04:37:31.013000
CVE-2019-18446,0,0,25a16f51b9e90fe6ef6a3cc58e02bfb3d38900dbb979a3549613248db4b4037e,2024-11-21T04:33:14.710000
CVE-2019-18447,0,0,3e91da9fc587afb6f48ab0dcba2db8ec3c77f48554f96e0209d939cf21bcb357,2024-11-21T04:33:14.847000
CVE-2019-18448,0,0,d9f9f8f194d8882d8507433b708b6df72ae4b901b2fc326b604d243338557c3b,2024-11-21T04:33:14.983000
CVE-2019-18449,0,0,cbf015886fb9f6315d2cf2069bc5d60ab91372ac2a7252f06b4c711bab841a8a,2024-11-21T04:33:15.113000
-CVE-2019-1845,0,0,9b2c262e2bbbe29b6286e6363644b798dd9f3b55c1f39b01420c87a00b7cc871,2024-11-21T04:37:31.140000
+CVE-2019-1845,0,1,d63d661e7140ecf8b4177a04a2089061583a927c35a3a4ea06aeed7ec570d040,2024-11-21T04:37:31.140000
CVE-2019-18450,0,0,771392de37b29db9de7a7bf62b93d2e13a1bc5599165ebfb73c52947e45e0456,2024-11-21T04:33:15.250000
CVE-2019-18451,0,0,98424e3c3bcf60bf3c68fd84568a40f1153c686e78bf41ea9b6d149d59328d94,2024-11-21T04:33:15.383000
CVE-2019-18452,0,0,fa379100a482c3a4f8b789a5df20c8fb42e498e3bf40039a0d9b48a6b85c79ff,2024-11-21T04:33:15.520000
@@ -135726,7 +135726,7 @@ CVE-2019-18456,0,0,70cce8429cc5a2fc40aad9b0c0cbee7a7c91a4b8f763ad3f0744a3afb6eb4
CVE-2019-18457,0,0,0e3d85f1c06d108c22c74fe7307abef71cc4b1b285f21b932167208819d7aaf0,2024-11-21T04:33:16.200000
CVE-2019-18458,0,0,fe913874631433a55f64d700934259dd0744056bc6cf040b13770407df22cf36,2024-11-21T04:33:16.343000
CVE-2019-18459,0,0,2dee7cc650b74f3a3c7bf4087f418312843f437e73a5ae7a23a35a9b4360379b,2024-11-21T04:33:16.480000
-CVE-2019-1846,0,0,f99229397cfa93579c520bdf48d7a04244193922c10d4cc56c85ad30e3f9632e,2024-11-21T04:37:31.273000
+CVE-2019-1846,0,1,8356ca019fd91f78ac2edc7e73ec88ed3546d942ab492e08164120ec9e4d25f6,2024-11-21T04:37:31.273000
CVE-2019-18460,0,0,beedebbad583d7bee49ac74df82964bd32bc09a3f59e4f6e09317c4aba96ee1d,2024-11-21T04:33:16.620000
CVE-2019-18461,0,0,2ba35a2172abe42a58fa71a25c141950895e9ae0748d08e7383f69870de84de0,2024-11-21T04:33:16.757000
CVE-2019-18462,0,0,e55cc2a41835cc3820e2a5849400425785a6affcda8072736bc451bf90079f51,2024-11-21T04:33:16.900000
@@ -135747,7 +135747,7 @@ CVE-2019-18476,0,0,c354adad5117e1d497046033b8fdf3a240c9ea65db5170886912069534eea
CVE-2019-18477,0,0,f208e10ff16c1d0f464713e5ff497616464c0d31d73965a4f9fd4a2cfc47a33c,2023-11-07T03:06:29.540000
CVE-2019-18478,0,0,d02a386dcf1a1b9cf177f592903d71881b42436797952ecef981a4e003ca072c,2023-11-07T03:06:29.763000
CVE-2019-18479,0,0,e34ebb36607ebc956c488e2286d4dae265c9110d079af54ab8c2c8e177aed0b4,2023-11-07T03:06:29.993000
-CVE-2019-1848,0,0,d2a95f79a69e20199cbb3aecb45211b670e55231f36b7856ec3235373139c3c2,2024-11-21T04:37:31.410000
+CVE-2019-1848,0,1,cddd9595d7b0ffb753bf33e548abf5ab50bf9adb7d9b7411dcaef95955860bde,2024-11-21T04:37:31.410000
CVE-2019-18480,0,0,a54571542a106bf10d7968df8fe6a51ce24a684bb8ef3a8321cf78ebd58e1bab,2023-11-07T03:06:30.220000
CVE-2019-18481,0,0,fd71662654750239fb1e6cf53df99c5d751223c7db28058e739f71efecddf874,2023-11-07T03:06:30.457000
CVE-2019-18482,0,0,c094e1fa2fa8771abe405a08f34ad62b429db41cf6b2d79245a70120556bda9e,2023-11-07T03:06:30.717000
@@ -135758,7 +135758,7 @@ CVE-2019-18486,0,0,8d66bfa72a4ec818d96d112f08630804d486229a9bdfded901071ded0ec7d
CVE-2019-18487,0,0,f72ac75c1184561d71879aa6b721e7e5d0e4427d4390dd16323ca7853198894e,2023-11-07T03:06:31.943000
CVE-2019-18488,0,0,366a10792595ffbb8618d8170c9afb0c7f837c7a2af2932a3a5e9089dd89e108,2023-11-07T03:06:32.227000
CVE-2019-18489,0,0,6a72b0ea7f18e571f500107bc80e4588c0c2ef4aa3b372aec0f0c0583b4270fb,2023-11-07T03:06:32.457000
-CVE-2019-1849,0,0,f80d1d22e06781f922bbb97303d6a5a3c4574bb6987b2e02f19da5afcb92b111,2024-11-21T04:37:31.553000
+CVE-2019-1849,0,1,15d477ce68e5f9091d6efa8d0da9ded2d33592423fd46a7664633b16f34ca881,2024-11-21T04:37:31.553000
CVE-2019-18490,0,0,5f7fce15c2771608e7071a49399687cd6e8a757ab52b088b7d23d0fc180aa283,2023-11-07T03:06:32.730000
CVE-2019-18491,0,0,adb34427ab4d53c04f818bccf2a609104bbdc1c68bbddf2012c20172f22ee5d1,2023-11-07T03:06:32.967000
CVE-2019-18492,0,0,9f21562b10c98c42b9e3fce8dbe226a5ef36431aca246a78c87ee25095e23bc3,2023-11-07T03:06:33.200000
@@ -135769,7 +135769,7 @@ CVE-2019-18496,0,0,a09496cbdc2da758feabc2a33484f8d172a9b977ed0b4b060d8feaa3d8dae
CVE-2019-18497,0,0,35aa3ede677c16a1a88561842b6f90d19b904befce812b1169a65b43233e1e40,2023-11-07T03:06:34.340000
CVE-2019-18498,0,0,a6ea686dace616e3162408bf7b1cdc7cb8c76c3fe7bfb99778336ebb737aa34a,2023-11-07T03:06:34.570000
CVE-2019-18499,0,0,2ae148989153f433d0d43d322c84176854723f0796fdf9b2d3452ebd41ae03ee,2023-11-07T03:06:34.797000
-CVE-2019-1850,0,0,ca652748681519a9aa184a199d346e22505eb551d2966e8b27730815834169c9,2024-11-21T04:37:31.670000
+CVE-2019-1850,0,1,decaa79adf5ceaedb578e04e0e0dd58b39823c8e405ee102b3c442742cc9ee79,2024-11-21T04:37:31.670000
CVE-2019-18500,0,0,dda22f690eb8d81bd3d555d9f587de6c7b39ba671fb51d81c2aa9c45fe823720,2023-11-07T03:06:35.080000
CVE-2019-18501,0,0,be6f825dc7535263e0b6ee4463101db24df655dc2775a84cac3e8cdbe58db0c7,2023-11-07T03:06:35.383000
CVE-2019-18502,0,0,15f1224733b673324fb13888a5ae98b8aa4272e5a543e0af127228e6f36d091f,2023-11-07T03:06:35.747000
@@ -135780,7 +135780,7 @@ CVE-2019-18506,0,0,f124c9383c3f1dbd4c96cce9ce5b988091ed96b076def33cc10b73966035c
CVE-2019-18507,0,0,fb9c870d84ce5ceb520836ea4ea1d94bb35974c1280531ec13c9a0320e67d188,2023-11-07T03:06:36.907000
CVE-2019-18508,0,0,d66f7380269cd1c7d060149b4bf6e14862733474478e9e7531ceae07ce7f3fe9,2023-11-07T03:06:37.130000
CVE-2019-18509,0,0,19f7c0c1ccc8eb1cb6a1372935cc36d09376ee8c6d5f576e6c15f76831281e74,2023-11-07T03:06:37.360000
-CVE-2019-1851,0,0,026d101950baee0e9f26fc1308586006cd68de99ccc1639b6fb32c18bddef054,2024-11-21T04:37:31.803000
+CVE-2019-1851,0,1,0bd5b47c6e2154980468b2e82a412effee5ba1f215cfb3b9ca7fdd416bdaed06,2024-11-21T04:37:31.803000
CVE-2019-18510,0,0,3e8764747da51b987b4cb02a890401f5981f31b12cae86dc8199dcbe7b4d523d,2023-11-07T03:06:37.597000
CVE-2019-18511,0,0,52ea7a2942bfb254bfcfcd939931d3a7fb5e41e8d10a571128aedc881e67c37e,2023-11-07T03:06:37.837000
CVE-2019-18512,0,0,63006505154e3e0fe9c6df8342571c088ec03aac9fb5be87d3beab691df59fa3,2023-11-07T03:06:38.103000
@@ -135791,7 +135791,7 @@ CVE-2019-18516,0,0,6f434bfae1c40842762a0dc6439ac0de13a2c68cd21237a86512e1b0b65b7
CVE-2019-18517,0,0,724a9d9424181c4084f52ec8efed872b6b2a715e6e2c40e28945e13a39a411e8,2023-11-07T03:06:39.317000
CVE-2019-18518,0,0,fa6cdd6266c35defa8067b65efecfa1f02b0627f03a1d1adfec92e25e340de21,2023-11-07T03:06:39.550000
CVE-2019-18519,0,0,9ca79c51fb1e172cf1d23c4cbb5fa30196a4a9a7a25859ed1e616349b2f15887,2023-11-07T03:06:39.787000
-CVE-2019-1852,0,0,c110c8621b4eea46bbcfcb9ea462ecb9568e8aa1fb8c4e30ddc23f60bf914b4e,2024-11-21T04:37:31.930000
+CVE-2019-1852,0,1,f81a1b1794a5e5fa14a8302ac4ddba46e0f8f9cd74a1d5fd954f303686c40595,2024-11-21T04:37:31.930000
CVE-2019-18520,0,0,539f28a229a47dd60dd2250e97b2991e3a99e436f087ce68729a01b6eba20faa,2023-11-07T03:06:40.013000
CVE-2019-18521,0,0,c3161e141b5bd044c73834d35fa8d7042677b1e9c4251315ce4c704816d3150f,2023-11-07T03:06:40.243000
CVE-2019-18522,0,0,bd67b188df01088e4d502cec4c9b1fb4df0872413b0a91a6e6a44460a70eb830,2023-11-07T03:06:40.573000
@@ -135802,7 +135802,7 @@ CVE-2019-18526,0,0,355b8e2de4c4efe747151e3718934fa2a37c00f979c303f3eb7bee35af39e
CVE-2019-18527,0,0,96d7c0e42d3beee4882aa9b313c87eca2d313104723ebaacfbc844c936c45c6a,2023-11-07T03:06:41.823000
CVE-2019-18528,0,0,58202812c42a98c2b3be9b03a23187071efcbebd0a4dcccab567293536ee6f3f,2023-11-07T03:06:42.053000
CVE-2019-18529,0,0,9631725012b1a7321baecd6d4f01a0f8fc51931961dc257cf7d074c3d1f601c8,2023-11-07T03:06:42.330000
-CVE-2019-1853,0,0,8ad8498b50711b6ebc89f35411e09c36f228c4ca5b87acd78211ee1aa6680b39,2024-11-21T04:37:32.053000
+CVE-2019-1853,0,1,6a126c02f059441118f06e3c417bcb02195e5da89342a1708e257b1c52338028,2024-11-21T04:37:32.053000
CVE-2019-18530,0,0,e6558875a694fbeb151f75dbc9ae39ddac70fb692d8ee7243c5fdb8bb4d632ca,2023-11-07T03:06:42.587000
CVE-2019-18531,0,0,f4d8f4ec283ad8ebe4290d14afb11fcdcf44b053f0b68e5d28308b99665edb11,2023-11-07T03:06:42.833000
CVE-2019-18532,0,0,56c7c4bb858ecc72153de01b795055d82fd9a12957f046d4208c7a02f80fcd4b,2023-11-07T03:06:43.060000
@@ -135813,7 +135813,7 @@ CVE-2019-18536,0,0,ebd06f3ae2befe6fc9be13f67e9b1aecfd54da919cc32c0f93dff2ac10622
CVE-2019-18537,0,0,efed7e6110f1b72c539ff31935497960b10befe508d30474e0357332035fc84d,2023-11-07T03:06:44.240000
CVE-2019-18538,0,0,2170a02d926f2142d36b641b1855ba6e6f76a06cd8bb5bb59aa7eb35b4cc553b,2023-11-07T03:06:44.470000
CVE-2019-18539,0,0,606751f8864b5c3a064384f166b61ed9aa069d18070814fd16952885b512b6e1,2023-11-07T03:06:44.700000
-CVE-2019-1854,0,0,40c01206c079ab19696403b4f20fa374d942a470c8f02eb5ee67ca03d399b807,2024-11-21T04:37:32.190000
+CVE-2019-1854,0,1,15b255e121661fa4de7547683c1ee18ce0cd1384742c2a433d91697d31d56c78,2024-11-21T04:37:32.190000
CVE-2019-18540,0,0,b5323fbd5edb6ef2ebc5ae1c5b2de752e2cb47f970cfc9c7bbc3f31242647a63,2023-11-07T03:06:44.930000
CVE-2019-18541,0,0,4afc5711ba34c28a262540f698cb5d55a2e1fa7f6979d8c7c97c1b8cd44c5e69,2023-11-07T03:06:45.153000
CVE-2019-18542,0,0,a2cabaf9293209909daf4ad0d5a32808e4e8758a3c876b5181ce2c131e84eb30,2023-11-07T03:06:45.390000
@@ -135824,7 +135824,7 @@ CVE-2019-18546,0,0,09df3c89f3f293440ad07f86e3c5df5bf024ae71e2bb9ade21af6109d9195
CVE-2019-18547,0,0,a733357aeb22c53e2d2b85a00147ca249f80fb170fefd775a844c8a23e8e8aee,2023-11-07T03:06:46.647000
CVE-2019-18548,0,0,c50b72460c4da9287dfbde457aa978513715cbacf6fc1d235007aa9157fa6fd4,2023-11-07T03:06:46.887000
CVE-2019-18549,0,0,21928a307a661d203052e9b772e72ed10b545416e4d1a842d6ed5a0db2ef9337,2023-11-07T03:06:47.120000
-CVE-2019-1855,0,0,ab0451eabf7f0dea1e08ac36338d1fb5c514a58b7a486b27d2415f3923219190,2024-11-21T04:37:32.313000
+CVE-2019-1855,0,1,7a2a9b80c766f133591a581388488fbe33b62961d239d699f00aaddbf139dc06,2024-11-21T04:37:32.313000
CVE-2019-18550,0,0,6675f0be148ce04745ee875252cc238c11facc1e37a57dd57b2bf6593532c68d,2023-11-07T03:06:47.360000
CVE-2019-18551,0,0,639b1b1b9e5e04bfc6788863b67325b164ebe02f29c7646c2070c87af1f8da22,2023-11-07T03:06:47.610000
CVE-2019-18552,0,0,634de13fb141ed7b9599fb820822e8d2957365222538024c2b2957d4d289b19d,2023-11-07T03:06:47.843000
@@ -135835,7 +135835,7 @@ CVE-2019-18556,0,0,cb568e6aa3f6d4cbbf59a086e188d29a16ec9c44097cd9c3b7522712d4f80
CVE-2019-18557,0,0,aaf509c8805eddecce5095ee6cc5daf2648f288f729aec1da02a69a99dcd2017,2023-11-07T03:06:49.020000
CVE-2019-18558,0,0,89ab366c63043ed09da807fca54c1d005714db1dc3ca376978e5d9c0ea9c1537,2023-11-07T03:06:49.240000
CVE-2019-18559,0,0,f525225c04ac07aad50dde49ee5583f1b6b9c9d99113a932eb7af236b187b531,2023-11-07T03:06:49.480000
-CVE-2019-1856,0,0,12f3ca3151fc4e629256a58ab114768f879853f3a68ec17733063a1cac64513c,2024-11-21T04:37:32.457000
+CVE-2019-1856,0,1,1d7dffb1789f16838c51de94d0c35c8366369421dcd147da4b17157dd60e253f,2024-11-21T04:37:32.457000
CVE-2019-18560,0,0,254674e1733c270361c5e2f89e3059fd4a7fd1607a8601b21e07de8cdafc9038,2023-11-07T03:06:49.713000
CVE-2019-18561,0,0,81178a17dc2d83af76a46dc887b76ea5d116d55af22f01ad3f5623ced18d4fd0,2023-11-07T03:06:49.970000
CVE-2019-18562,0,0,2cfeeb279d02d77b6d1c3ef5f5b8531d42d414b8c04aaa29f6ab6c2f18753664,2023-11-07T03:06:50.320000
@@ -135845,7 +135845,7 @@ CVE-2019-18565,0,0,cbfcdea05c0fd88c2b10a0b9fcf7ee9c713c98b9c343625ae2dd884f25816
CVE-2019-18566,0,0,7053fb8f55e58f1ca1cb41d9a153ac232173e6703f74c60eab4ba76a38d0bfa2,2023-11-07T03:06:51.313000
CVE-2019-18567,0,0,52847f2a096ac33f1170f0925dda0a3d13f5cdb3c873c4902591a2bf141f5ff8,2024-11-21T04:33:18.953000
CVE-2019-18568,0,0,ddde9df7dbe18eeeac73c8f3144220056b43a5dff3ad7b742002fc75c4c96ad8,2024-11-21T04:33:19.070000
-CVE-2019-1857,0,0,90a9bbcba1915bf0bb6eb158c833576dabd19ce5f3a4f40d554ec7a235a37f08,2024-11-21T04:37:32.597000
+CVE-2019-1857,0,1,108aa02b3a47a6634a472a3a64f0eb7e2bf71640e8a5da0a85299c33fe21ab47,2024-11-21T04:37:32.597000
CVE-2019-18571,0,0,bdbec4e59a3529a4835965d54504a5f2b09fa87cfe6486ccfbab911643ce87ae,2024-11-21T04:33:19.187000
CVE-2019-18572,0,0,fbb4a03096e91dea1d74fb93c97cf59729209426689466460f9d339e5edec365,2024-11-21T04:33:19.300000
CVE-2019-18573,0,0,55dddcdff26730edae57b7dec5c7e591898371ddd083d3903db5396423bfe47e,2024-11-21T04:33:19.420000
@@ -135855,7 +135855,7 @@ CVE-2019-18576,0,0,45240b9972b90365fa2ffd94dd6d9279a4fb44123369823b2eeb4dbea2251
CVE-2019-18577,0,0,0beaa8e84fda3854dc39b49a43f664e90135de6c962f7c988b001458d0bc552f,2024-11-21T04:33:19.890000
CVE-2019-18578,0,0,aee549e60d9000b51156bdab9b662b0537cd8b6a7adc56c176ea36d25bcb8bbd,2024-11-21T04:33:20
CVE-2019-18579,0,0,fed38bf622860084172aa06441f7dd7e549b3476a781397604e5ee280bfd24b9,2024-11-21T04:33:20.110000
-CVE-2019-1858,0,0,e04caef159bee5561ab38525fb4e154f803e3020b2d98a01eff094710b763bf8,2024-11-21T04:37:32.763000
+CVE-2019-1858,0,1,00d777fb135b6cdcfcfe637402acea42674bdc81e05ad4ed94be5f1b9fead4bb,2024-11-21T04:37:32.763000
CVE-2019-18580,0,0,c971d076c1d65d79863c1b007da961072ee606816afcca7b381625f1d5100dbe,2024-11-21T04:33:20.227000
CVE-2019-18581,0,0,aa3f91ac0b6e0355184bc3af9bcd3bd036ef476308b5e78865692d9a132ab807,2024-11-21T04:33:20.340000
CVE-2019-18582,0,0,291030d056f8cd887affa5d08eb8fc0922975b2a9642fc76052a8d621db16450,2024-11-21T04:33:20.460000
@@ -135864,15 +135864,15 @@ CVE-2019-18584,0,0,7778b8eca69ccaccc7a2f2d372f464b42211de9e331911e4f0476178c5395
CVE-2019-18585,0,0,37395fc22576ef0b787eb4db733f99e53450c46440d02a7f444f1173ac272bed,2023-11-07T03:06:52.247000
CVE-2019-18586,0,0,60855639260b6ed1f04727719c5405def660afd6d591d1bc0fbe69787e68fe95,2023-11-07T03:06:52.570000
CVE-2019-18588,0,0,83363f2785c513cecb8a150a02a26e0398cb7486641e3d97ae7df1e7b3ae0f01,2024-11-21T04:33:20.630000
-CVE-2019-1859,0,0,f3f48ddc430ffe71df5436951e912888aa1b2a671bfff759ae6929233996823f,2024-11-21T04:37:32.957000
-CVE-2019-1860,0,0,ddcde7f4bab02e325ac52c35edd57324c65b46bdea1e04fbc42c7afee5df9c3e,2024-11-21T04:37:33.260000
+CVE-2019-1859,0,1,fa8160ffab286097b56348a2e490b5d2b5d7570dbcc19edc922fda26173c6c02,2024-11-21T04:37:32.957000
+CVE-2019-1860,0,1,ec9a0d7d458c68021f1f599384e50b1f2e9241869bc28195366188334da0bf29,2024-11-21T04:37:33.260000
CVE-2019-18601,0,0,98e6b7c643a0d60ac9539068861fa11a355a528f02aa092caa1951307e178546,2024-11-21T04:33:20.743000
CVE-2019-18602,0,0,e9bc09a4c52541e538b5c0b63173b861afba1aee79708b9ac4905c9110e01281,2024-11-21T04:33:20.877000
CVE-2019-18603,0,0,0405d9774b38bce562e4b5b58fc736257b38bfb65a57a5f48d4a06e7ce606448,2024-11-21T04:33:21.017000
CVE-2019-18604,0,0,39f31caa260e9799ace1398e4152453939bad57ef2417e00a4099f2144f55ebd,2024-11-21T04:33:21.167000
CVE-2019-18608,0,0,c05acfdc4a457117ee026472becded1bac01d17ce88cf4204a2939ad21aaf0f2,2024-11-21T04:33:21.303000
CVE-2019-18609,0,0,ea65f08c718a94476b092f06be0b32e300edb1abf7de4aceb09966765408cad0,2024-11-21T04:33:21.440000
-CVE-2019-1861,0,0,8517fb6b15c0f00232f30f032dbe1bc4ecc00aecf9202af7f8df50d5c905085a,2024-11-21T04:37:33.463000
+CVE-2019-1861,0,1,651ff282261a665ec54e07fe80abf278e9141cd9f2c47a410935f7f0977bad53,2024-11-21T04:37:33.463000
CVE-2019-18610,0,0,adcdc3e13f12bc0e808c016e896dbbaf96df4e51d747cd4402fe290b7796e9cb,2024-11-21T04:33:21.593000
CVE-2019-18611,0,0,a13ff1756f2bb27887afdd3400401cb60df3b327b925c78ccbb28d90d487f2d1,2024-11-21T04:33:21.747000
CVE-2019-18612,0,0,ee3d6cbda2704fda000f016c0f2428b916ea4aac12b30f41da14e2ff1416416f,2024-11-21T04:33:21.890000
@@ -135880,7 +135880,7 @@ CVE-2019-18614,0,0,f083e6cd9ffd0477a492a33c3812541c61a64ad2288920c4cf3705d0daa2a
CVE-2019-18615,0,0,370fd1ebc40bb5970265b24aeee630bc5f32870eb0d69abd9e8c0c520eb1bc65,2024-11-21T04:33:22.163000
CVE-2019-18618,0,0,b1dea14a7ae36bfdba222c41bcaa7cbdd2d63f13bc5610437b88fada6114106d,2024-11-21T04:33:22.317000
CVE-2019-18619,0,0,11f52e1d73ea2edd373baeda8dcce01b2d839c00285cb5da1af77b05f8c98c0b,2024-11-21T04:33:22.597000
-CVE-2019-1862,0,0,c0a755df6b2643b30224482a665ee77b34c8782438e1ce6c3ff03b1ade30e66e,2024-11-21T04:37:33.600000
+CVE-2019-1862,0,1,cb7c6d2f0144088e9fb8b532134d8488355e8d18192b1455db2d2327c5eab48f,2024-11-21T04:37:33.600000
CVE-2019-18622,0,0,8b064b4fb49021b0b3c10c6c22015fb143ee6c1ad756c31809f8eecca4438146,2024-11-21T04:33:23.143000
CVE-2019-18623,0,0,9fcaa0e1d4c9c691d0dcca3adc7c725011eb9fef0456c41843fba2442d53fe06,2024-11-21T04:33:23.307000
CVE-2019-18624,0,0,694b8070ebb1042c4884f93bc80e7c27b1efc41cf24150a0b54ad46427415dfa,2024-11-21T04:33:23.440000
@@ -135888,7 +135888,7 @@ CVE-2019-18625,0,0,0a77050280a16966fef5c79d0209c6c5b3a64b542a6a1ad1a064990c210c9
CVE-2019-18626,0,0,788b59c1bed8867bd86c4bd93e2ecebe23950f564f10061664725a73f7ebd9e1,2024-11-21T04:33:23.720000
CVE-2019-18628,0,0,3abddbff5e56f4bad44b9167f236627cfc5a8fed349429f3840847388a34cb69,2024-11-21T04:33:24.070000
CVE-2019-18629,0,0,ce463327d9e748da0406316eee1b7b0eade0ec064fce2a3cb7205307a2ca6e41,2024-11-21T04:33:24.730000
-CVE-2019-1863,0,0,47e050bee8ed71082397326842456796eabe52f386e27c3267353c2341dcf332,2024-11-21T04:37:33.743000
+CVE-2019-1863,0,1,f5ed488151abdc2f0c9445bb638699108bdb5a2e53138f48580f37aa459885e3,2024-11-21T04:37:33.743000
CVE-2019-18630,0,0,a6054017f46ec53a8c6ae27247cf010776f7f737c06600f71643bc96836c68a5,2024-11-21T04:33:24.870000
CVE-2019-18631,0,0,d86737e366b3e62d4f45a1f68b21cdece29ee1726c62f1e7267c59d8f45e6782,2024-11-21T04:33:25.013000
CVE-2019-18632,0,0,040d4e4bf89de751dfc7f34e8efde626b00d5abd1431763f06c9313718946337,2024-11-21T04:33:25.160000
@@ -135896,7 +135896,7 @@ CVE-2019-18633,0,0,0b64e7c94ef9b8407a4311f2fa931fb5dde30ec8d7129a6d4eedab4fe3971
CVE-2019-18634,0,0,cd82c004f3e32397dfe41a491ab3c07d25d33b8eca0c705f6cb981b6b5f79353,2024-11-21T04:33:25.447000
CVE-2019-18635,0,0,d10c38650bd7a83dcbb1a618e1635f13e721156e840d85c7202ea5fe1d59f581,2024-11-21T04:33:25.630000
CVE-2019-18636,0,0,6dad20a7e33060a827a84c045f647ae1eff5eeb2636274807285bb4695b74e25,2024-11-21T04:33:25.770000
-CVE-2019-1864,0,0,c742f906fda768faec4265f1967d6f92580828432bd7fe5dc78d12930d63690a,2024-11-21T04:37:33.893000
+CVE-2019-1864,0,1,937580d5046d70fa1753c0f363e235234073a4c5dcffe8e147a50d31c62afd78,2024-11-21T04:37:33.893000
CVE-2019-18641,0,0,b4a7923c67af94036d9230af9202a71c244dd5d22acd23770a90dd50dc15f689,2024-11-21T04:33:25.907000
CVE-2019-18642,0,0,8ea7f73faedab51bcfb6642173be95568786e0855cb222db4e8ccaf5e05066b7,2024-11-21T04:33:26.060000
CVE-2019-18643,0,0,00fcdd24731a92f4d2ff5333fe55ec93fd85efc997c7f6fca1c2d9d155ce24e3,2024-11-21T04:33:26.217000
@@ -135906,7 +135906,7 @@ CVE-2019-18646,0,0,d978f156e2ab444c47cef5f2dc3262086dafbd1fa0dddb26436c17298dba6
CVE-2019-18647,0,0,a09e801d612cddad267871aaddef7e3fdb9e1243125f7a04dec726cf1f7164df,2024-11-21T04:33:26.760000
CVE-2019-18648,0,0,3d5e96c67d56ec7e705af3bc0549d64abada7e8831d6e936c30609704785dcc5,2024-11-21T04:33:26.890000
CVE-2019-18649,0,0,f6a4f0f1eb8dbbe9931732c4499aad26d867c9e000654c8c0f9f26a2449450f2,2024-11-21T04:33:27.023000
-CVE-2019-1865,0,0,e61ac6a830559dc4161f62478685b5425ae7c68c316e24c1440c8d77c773a017,2024-11-21T04:37:34.050000
+CVE-2019-1865,0,1,1114fe53dacc3d540142eee10efe79a02a8c5627068a5868a1267f7ee3846528,2024-11-21T04:37:34.050000
CVE-2019-18650,0,0,0d0b8d1f034571b2ab0e0a515ce48ee9b1e274c210c528d7e021bac307b9f340,2024-11-21T04:33:27.140000
CVE-2019-18651,0,0,14188a64bff4e9f57b2161b02c239110e6ff64cf94b2335ece4ddfcc2ce1c46c,2024-11-21T04:33:27.273000
CVE-2019-18652,0,0,f38285ea68c87cf5c48e46a8dc541d1063e04a5feb981562b03650e7c088d186,2024-11-21T04:33:27.423000
@@ -135917,7 +135917,7 @@ CVE-2019-18656,0,0,82511e7f8fdf425a3bf2d7a830982da6bc618e9b7a435f4524cb597c07a70
CVE-2019-18657,0,0,41c4fd9a1281359e15ead0b1672be3b6483e3c24dfbfdb8f96f9878ad0095ca5,2024-11-21T04:33:28.107000
CVE-2019-18658,0,0,fdc46359c23f2b7c1a24938d8e51908743f10e8ceb29b22ee29606ef9816156a,2024-11-21T04:33:28.240000
CVE-2019-18659,0,0,08d331ef6e39172a98c50bea716ac87bbf267eb65904f9af3f52b782feafb419,2024-11-21T04:33:28.370000
-CVE-2019-1866,0,0,b29d891124b6e4d0e74849cdd861c222ac934b1fa2167946dbe00ad09ff3cf67,2024-11-21T04:37:34.197000
+CVE-2019-1866,0,1,111749620e55dff4176608c16008c01c0b9d27eb10f128307a00885840d54a55,2024-11-21T04:37:34.197000
CVE-2019-18660,0,0,98ec294cedacc2f75f33142ee9a47eb89d952ba853c2a4d421b585cba91e3d6a,2024-11-21T04:33:28.500000
CVE-2019-18661,0,0,7f5ee7b6ce2a942d77345c1ae1844ac04bff61834912428bcc9d53abd73f3391,2024-11-21T04:33:28.710000
CVE-2019-18662,0,0,f5018690e380b9a0531e05a24c48c7b01680a67b1ac48d3b75abb84ae123519b,2024-11-21T04:33:28.853000
@@ -135927,7 +135927,7 @@ CVE-2019-18665,0,0,6b29bc42d5d34e994cbe0c0b7a62d09ef472450eb9c0ed79fdf97c1c7b829
CVE-2019-18666,0,0,695f51d2878913e2e02090c2da8a690bb52e14e575c2693438ec47f60aaab893,2024-11-21T04:33:29.393000
CVE-2019-18667,0,0,a8cc80202854c9b867d8d418e1c346d20c18f8dbd2fbfc47c2a0d08b6a0a8267,2024-11-21T04:33:29.540000
CVE-2019-18668,0,0,f170134ca7038926e27a1a6742cdacb808622dd58d75e9a925722df905b3e9c6,2024-11-21T04:33:29.677000
-CVE-2019-1867,0,0,b5a2705d3e6239e73d2480271a77f51eed2663dae8db63945becdef412877fc1,2024-11-21T04:37:34.337000
+CVE-2019-1867,0,1,bf4749fc066b3f05f425676c338ab6675672ca510c2d6e35d6e2c9a163e27d98,2024-11-21T04:37:34.337000
CVE-2019-18670,0,0,d19387c64720d94aa1e085adfc37a98d83ac6e49af16ac13099a30044f237042,2024-11-21T04:33:29.817000
CVE-2019-18671,0,0,e6f0c84aed5cf6a3d915389d43296ed1d52eb3b4ae059a5f424ef07b10641e34,2024-11-21T04:33:29.950000
CVE-2019-18672,0,0,a7b54851da72c008899a79379a8461c966a7e3d9335c6f8444ead217ead2b4da,2024-11-21T04:33:30.100000
@@ -135938,7 +135938,7 @@ CVE-2019-18676,0,0,45475d5ac02984a625e7fb032181629d7bc8d20c3ba859f345190d1dd2445
CVE-2019-18677,0,0,626de48fffa65aa0b857152fb9037e6fef16920b0aa152a4819376e7974bee98,2024-11-21T04:33:30.820000
CVE-2019-18678,0,0,f0d6bb1d34e34ab3df22fcacf0faba0c6a09c4e720a71753bdfdaa5a4390281c,2024-11-21T04:33:30.973000
CVE-2019-18679,0,0,afb01fde45e9a29ea0e97801936e1f124e2eeb17ca75cb5f1f9d9d1a643ef4b5,2024-11-21T04:33:31.133000
-CVE-2019-1868,0,0,f0ebb551b7c30095e51fc271f45fb331fb71a5c30f037d429e3561dbb2453e73,2024-11-21T04:37:34.527000
+CVE-2019-1868,0,1,af1230713fa15d0005093b0fe34ae3c3c16b3926b430fb78c680210c8d1c2167,2024-11-21T04:37:34.527000
CVE-2019-18680,0,0,21beb65c4101b41ab4bbce286dc3e15d33d3eaa77142424ca857fd0ac2e4a7e6,2024-11-21T04:33:31.290000
CVE-2019-18683,0,0,014524bba3e04c13019e6b3965c1c22e8352db043ec5c55f1a987931463a7853,2024-11-21T04:33:31.440000
CVE-2019-18684,0,0,2ea32c2451f2d972d5ea9b88e95b8968be41c4adc28f0030562bfa30ab96be35,2024-11-21T04:33:31.627000
@@ -135947,7 +135947,7 @@ CVE-2019-18686,0,0,a7a8882a2dea859253b700d6f692e4646260a2c73014290fd6aa97c7e066e
CVE-2019-18687,0,0,345ebae57005b72851109719f525de4fa6b74974d8bc961ccfcc702cd68f77e1,2023-11-07T03:06:54.820000
CVE-2019-18688,0,0,91e0728cbd10691b9897a21ac2ca86cd54b5029b0fd6c74e7117939c78aaad58,2023-11-07T03:06:55.047000
CVE-2019-18689,0,0,0ba4cabfbb54d1b4ebaa5fab7ddf47446d01101f5093a52b213df24b90899afb,2023-11-07T03:06:55.270000
-CVE-2019-1869,0,0,fcfff012ee774de8401e2e99ca4dd1ce717898bd5bacd59115ec5d5c764df33d,2024-11-21T04:37:34.670000
+CVE-2019-1869,0,1,5d14148854a8847a8bb1e46691a9a0687a82cf27ac88f5bf7f738eb75294ca3e,2024-11-21T04:37:34.670000
CVE-2019-18690,0,0,cdb3933e6910dafb459c9477eeeb29a369b64873446d0683657b11e14c5acce3,2023-11-07T03:06:55.533000
CVE-2019-18691,0,0,7574fefe314cf7924a6a6600b8481183d68e791e0c28e9b4e460ba423c21e783,2023-11-07T03:06:55.790000
CVE-2019-18692,0,0,e4c0eb53103acf69a95d507384896eeedaae98894153a192f68c843ce5ff26ef,2023-11-07T03:06:56.247000
@@ -135958,7 +135958,7 @@ CVE-2019-18696,0,0,6093c03c578d80776abcdc87e5d1f2de32cc5567af7e27de5db4fee833f5a
CVE-2019-18697,0,0,912408a623d88b2b23cfcea6d09be0a33ee6509ea072322bb7460194dba8fb17,2023-11-07T03:06:57.433000
CVE-2019-18698,0,0,36f1d32a9302c2046ab8f9e4e046730d6f5821006c354c0b5a07e93652a49af2,2023-11-07T03:06:57.687000
CVE-2019-18699,0,0,90104d592f8eb7e17fc7a3eb774b1b784f3f7755c4dd736e41f0242d4fbadcda,2023-11-07T03:06:57.917000
-CVE-2019-1870,0,0,2015271a1897f3470c73f1f7418e82b042c2327cad701e9afdb26ac2c95006ca,2024-11-21T04:37:34.820000
+CVE-2019-1870,0,1,1bc3965da590b5678e09d1da1192fd7e17b9434de8390568eee7c4e450053e45,2024-11-21T04:37:34.820000
CVE-2019-18700,0,0,ae844293df070f297a405a1010487741e6fdbe4c8b88be0aab175f6c5731ae6b,2023-11-07T03:06:58.150000
CVE-2019-18701,0,0,d890f2ec2b3f36805d5c0dcd358898e3b5e26abafe9369497a1cb16e52f45c0e,2023-11-07T03:06:58.370000
CVE-2019-18702,0,0,725b2f33704c7ba6188f67d3dd5d2eaa45c8ff9da793460755dc4d762c696fa2,2023-11-07T03:06:58.617000
@@ -135969,7 +135969,7 @@ CVE-2019-18706,0,0,5dc22599ea98e8136c8187919c61d14d7e3f1764f148e260f69ba4b7b8a60
CVE-2019-18707,0,0,935ba702c7fef2b4ab7552348b71e47908db743ded6e43427e00664015f7f681,2023-11-07T03:06:59.763000
CVE-2019-18708,0,0,ada45ea5853fb002144ca7153fb02a2cb3804b4bd862de258e2b878f8f4758b5,2023-11-07T03:06:59.993000
CVE-2019-18709,0,0,7d0c481ce8a912e1a2e81f7e11f63f418af984a6c70504bd26ce58b1723d27a8,2023-11-07T03:07:00.227000
-CVE-2019-1871,0,0,d5550de84dfa0baa11f997cf91de929fa812a81e9db487677eae335a923a6e54,2024-11-21T04:37:34.953000
+CVE-2019-1871,0,1,109006a27d02474df21cb201f4a6cb9bff686e18777da1c12906bb97c07eda15,2024-11-21T04:37:34.953000
CVE-2019-18710,0,0,78395187a6eaf8e0c3fc092afc5f044b4e1f94d5845ded3c1f832f1c7955ebd9,2023-11-07T03:07:00.460000
CVE-2019-18711,0,0,1a3e9b832a2e9f5757a97b9f4ca21f45957a6370e99fa336ee8d3e64e52cd41b,2023-11-07T03:07:00.780000
CVE-2019-18712,0,0,d98a9008f26fba9237f47533834c296bdf39516bdad570d5b5cd49f1c6098157,2023-11-07T03:07:01.013000
@@ -135980,7 +135980,7 @@ CVE-2019-18716,0,0,f84143e9369f8a5ec5f2e6cd5d65b266231d96e0722fec28566956eca55e2
CVE-2019-18717,0,0,b8d673e24d93be51576af6f4ff4cca5b3c5176d6d75d0c7138feecebfca1083c,2023-11-07T03:07:02.247000
CVE-2019-18718,0,0,8d405bdc8620477de062845cdc1ac12274b73233eebe3e61450e38211effb170,2023-11-07T03:07:02.483000
CVE-2019-18719,0,0,f55cd1fd6102da304e7db5e05b53999d798ad6b47d4482d1183e8cca4b378f4d,2023-11-07T03:07:02.787000
-CVE-2019-1872,0,0,c834a5cd0eecf36be023130b2f869cce88e294c2fbfa741f68547da88d5c6575,2024-11-21T04:37:35.100000
+CVE-2019-1872,0,1,fe2ebcd8d92fe8e5d35fbcec2875f93f29890ea8c2e530d24e0aaf44fd2d5c75,2024-11-21T04:37:35.100000
CVE-2019-18720,0,0,5af473972b97a227b7e9376e265130fa6e01bbc81aadb0a7326d81bc25aa7b95,2023-11-07T03:07:03.097000
CVE-2019-18721,0,0,d37432ec2f7e35227af7167460181673a60ef3a15d37ff5cbcc0b322f1819356,2023-11-07T03:07:03.337000
CVE-2019-18722,0,0,7d0474f32d8853005611670b4e94f1357710371cbd5034189697a8bc001fd1a0,2023-11-07T03:07:03.580000
@@ -135991,7 +135991,7 @@ CVE-2019-18726,0,0,7cbf2a6ab757073b2dc74679dc6cd070ee1055df9185cf48f9f09f2d19255
CVE-2019-18727,0,0,efcf060e6e79e4e6bd890cd78cd0df804ca1396fc7724ad6d91fd58289032b5c,2023-11-07T03:07:04.750000
CVE-2019-18728,0,0,66df14457d90107e5ac083f866df8f8a8f50421ba91fd39f92d9471f336e68ee,2023-11-07T03:07:05.003000
CVE-2019-18729,0,0,ed9ed29f1d8e396162fe909f10dc2197a70b43e0393049ceb9d4ac7892ea234e,2023-11-07T03:07:05.347000
-CVE-2019-1873,0,0,b05d27ea577ce8cec81ff1c1c4fc081fa848f81c00d41007714179b24798d93b,2024-11-21T04:37:35.247000
+CVE-2019-1873,0,1,e676d08966a2ab8f2ecdff3430641d121f98151a364c9d5b2e2882ec6f5b5250,2024-11-21T04:37:35.247000
CVE-2019-18730,0,0,86edaf87fa56d2208382a1384caf57c5247477f325aa50e7e7298430850a66ca,2023-11-07T03:07:05.607000
CVE-2019-18731,0,0,fcf56da6e31ea303297568d4a14d3026772f20acf83612e5a2250f63f8f206ba,2023-11-07T03:07:05.877000
CVE-2019-18732,0,0,8140f0f0871dedb17423b7e29bca7e4e33dddea61a5e9ff1b94d65782feefb83,2023-11-07T03:07:06.107000
@@ -136002,7 +136002,7 @@ CVE-2019-18736,0,0,f832bd35fe10f54363808dd2996f98f744a4f1278fc12bf296f9ee7979c60
CVE-2019-18737,0,0,6faf7a34525b60d742aa1baca811fc4f108447f81678e2cedab0fd88317d99f5,2023-11-07T03:07:07.283000
CVE-2019-18738,0,0,8217ff5bff68a3cc0e1dcf3b10fe84c48f830cb0664915154e2b1dc3bd671ada,2023-11-07T03:07:07.540000
CVE-2019-18739,0,0,bec01283d8d5e919828e8fe6da93796514a857c55547f276abe5fd2ac5548fd2,2023-11-07T03:07:07.773000
-CVE-2019-1874,0,0,44927b4b724733b69a99675e7ba5958a6b0f82d94389d6870b5b5ff964081412,2024-11-21T04:37:35.403000
+CVE-2019-1874,0,1,f24d594beb62726d12fa4503029b62594e8058d0de4eb10ba16511e029a74bf9,2024-11-21T04:37:35.403000
CVE-2019-18740,0,0,842475f12b6f434813c173b3534f836861dcfc91c69e421bb2395b5a62771970,2023-11-07T03:07:08.027000
CVE-2019-18741,0,0,4dfd8ac8f7885156ee4f12f989d71945feca8f020aa1509184d2a5e4d9bc95f7,2023-11-07T03:07:08.260000
CVE-2019-18742,0,0,abd85fb584b981e11ecca6fa42f85a2a63e722e3a5e5b7f0b7bc5047ab416a53,2023-11-07T03:07:08.493000
@@ -136013,7 +136013,7 @@ CVE-2019-18746,0,0,891d1974745c22736d356e555ff861026cc190e8185d8b412e595d67bff32
CVE-2019-18747,0,0,ea4827977824c8aeb90af4c1a71240655c0522ac554b3bcb16880ad8b77d914f,2023-11-07T03:07:09.687000
CVE-2019-18748,0,0,88e587669061a27311fb8add4f12f1bf6cf829a79f4628c6f5ef72fdb0400d09,2023-11-07T03:07:09.917000
CVE-2019-18749,0,0,982ba8a7a9640e3b1d50ff4b2e96085b504d04b0f685c5620afb02a9712a3aa3,2023-11-07T03:07:10.150000
-CVE-2019-1875,0,0,9f8dd5865a91f7ac400811bd11d43101bfa02057d5fd5ef470bf6a069182c4e0,2024-11-21T04:37:35.540000
+CVE-2019-1875,0,1,2f32c956d9755243c8864bc67bf11568bca2d98f4cdffcad1c6352e285c98bd6,2024-11-21T04:37:35.540000
CVE-2019-18750,0,0,02b34175ef8b87d7dd2cd17b2f7c72b7631a130474efc0e1737e2f18e82d90d8,2023-11-07T03:07:10.380000
CVE-2019-18751,0,0,9542fa1a67d8224081a83ce3ebea4c41066b5d65e7183ef9fc8939828ea92bb8,2023-11-07T03:07:10.680000
CVE-2019-18752,0,0,034d5b468f71ae2742cba0ec98879d5fdce734fc734ed255bffaf36f63a8246d,2023-11-07T03:07:10.920000
@@ -136024,7 +136024,7 @@ CVE-2019-18756,0,0,672b390c837a87336d4564cb85613694644e8861b3ef976e3d709936e0db9
CVE-2019-18757,0,0,bf76c4837080d1a72f3a87bf12267a5d1009dd9c4e313710d4113711ed7cfb33,2023-11-07T03:07:12.113000
CVE-2019-18758,0,0,6079d58a4055aec00a03612f2af722a1a40f1e3f1bb94e1acd6936170aef0a1a,2023-11-07T03:07:12.340000
CVE-2019-18759,0,0,6d85c63dc67c74eddc7bbf274cd6b99253fc07d01f51d8f75ae8ab57440d6ec6,2023-11-07T03:07:12.600000
-CVE-2019-1876,0,0,e6fc29a9237ca72a6c20826558d7df3963657491df06d7a4a7db349ca52ccf77,2024-11-21T04:37:35.670000
+CVE-2019-1876,0,1,4cfd702109db6cedc9218b6c7c3949413f034814be80169698700f1be20e176a,2024-11-21T04:37:35.670000
CVE-2019-18760,0,0,0c0b8871a5636c6d7274520ba84bf311b39e40b99d20fe89e1b1f0f3f7f71d42,2023-11-07T03:07:12.860000
CVE-2019-18761,0,0,c4a54f4221e99ab1c0f34ec7f78816cc550f0a6f5debfc328bd60efaeaf606a3,2023-11-07T03:07:13.127000
CVE-2019-18762,0,0,6f881162d0602d534e2271bc1b4104536a403c7958dbd0d784825dccd150eb59,2023-11-07T03:07:13.360000
@@ -136035,20 +136035,20 @@ CVE-2019-18766,0,0,bc9054494b98329f0e88e0127f3348cf3818736709e8430742ed2221e5203
CVE-2019-18767,0,0,1b7a38a671ede4aefac8269ea137f59ac061075b0a0c57aadb3d5fbc9405d878,2023-11-07T03:07:14.553000
CVE-2019-18768,0,0,a8941f7b2d7d1b1c1f1bc692d1b7183b1e5cd5cd175a784426777d90c4327a35,2023-11-07T03:07:14.787000
CVE-2019-18769,0,0,0a53e438d40183682949cae0c74db55711a122e862c484d864ce9bee4680eb15,2023-11-07T03:07:15.017000
-CVE-2019-1877,0,0,e780412ccc925f35c47706f16ecb257543a17a9c38af127bcd412a58605c88ac,2024-11-21T04:37:35.787000
+CVE-2019-1877,0,1,ec4976793757a4a8f1a30b63a18b0db7175cab152bfbd378c02d21c31e15b749,2024-11-21T04:37:35.787000
CVE-2019-18770,0,0,62ef099c3dac3123fd3c8c244af0a26ad0d564d568cc6ac0a13347e3d1a24bb8,2023-11-07T03:07:15.250000
CVE-2019-18771,0,0,6701717f0c62fedd54c000ec6755cdc1574b58df57129ae50af50b92319ec550,2023-11-07T03:07:15.480000
CVE-2019-18772,0,0,d70c6b0740898b10342c45cb0534beab4d0144d61bda5f5fc66ed8023c8a2b88,2023-11-07T03:07:15.750000
CVE-2019-18773,0,0,9a89c683f3f2c1ce6b713eabf5a0a1830f985c6d93d0f9a784695b41931f3afc,2023-11-07T03:07:15.977000
CVE-2019-18774,0,0,1e259a9a1be6e1e296c84dbb9785a5d6bfd0877f4e0414747653b9ce397af10a,2023-11-07T03:07:16.240000
-CVE-2019-1878,0,0,8866dea80fe8f1778d916374024e8597d328f7509303b0c47eb1bb208193cd70,2024-11-21T04:37:35.903000
+CVE-2019-1878,0,1,3f634f43d6e65e85580455d950af91c056769fde0e722a6b8612eb581f985b24,2024-11-21T04:37:35.903000
CVE-2019-18780,0,0,fcd4292e80c3116319a1d956568d16330c9741e9f4c4921b5a7ab6e2595a23a7,2024-11-21T04:33:33.170000
CVE-2019-18781,0,0,85aa3555f46905f292d2e05c08b6548c2adee4c9f5166e0758a5c8f4721d2d90,2024-11-21T04:33:33.350000
CVE-2019-18782,0,0,192411e5a9c45b5be7a6ae9efc5a8dfb9d883070762762a19e8265fe9b567765,2024-11-21T04:33:33.523000
CVE-2019-18784,0,0,e9300586ab8cf1a41aacd2bebd0329c6a70e7f62768b4d75b461841dad645a0a,2024-11-21T04:33:33.663000
CVE-2019-18785,0,0,b880d2941d46d19f81c5f8d87ed2b7b6db2d1066840563b674edcf2c96b8af7f,2024-11-21T04:33:33.800000
CVE-2019-18786,0,0,71a6cacca50eff7ec89f6c651b01d99a92718af3cf167934cc1d9445bdaaee4a,2024-11-21T04:33:33.937000
-CVE-2019-1879,0,0,83740beaa430b2a4cb997797f3d0614a8e225147269156043aa657efb2bd4473,2024-11-21T04:37:36.020000
+CVE-2019-1879,0,1,0008550f5d78b427b1d3f56e11525e2eefd65785159e47a19f1bbcf29d9fe6d6,2024-11-21T04:37:36.020000
CVE-2019-18790,0,0,7e028b463cbd75320354cb70caba8c61678ba0c5f98cdc78864ff9c3e61d9477,2024-11-21T04:33:34.090000
CVE-2019-18791,0,0,4502dcbfff6dedb96a662d5ce9e36640d4cb0980947e2069a9e6a908d8137f50,2024-11-21T04:33:34.237000
CVE-2019-18792,0,0,35439f9b580246b68faa9a544f445c0241ac8e24df38d4d35d8c5e462d0d444c,2024-11-21T04:33:34.450000
@@ -136059,7 +136059,7 @@ CVE-2019-18796,0,0,980af8e89848b9fdb3b3eb08ee09268032720680662481276be6e44b07ff9
CVE-2019-18797,0,0,29bad322fb6f4d4344087c9a5d6bd140142ac31853a6aba6b68ee540f3c5696f,2024-11-21T04:33:35.177000
CVE-2019-18798,0,0,24f26e65c2e276850560653ae70d1a015815f9a196e303f5e7dc0c8cf0e8492c,2024-11-21T04:33:35.320000
CVE-2019-18799,0,0,2e2d7c9821e6fb48594961fe4e6dbf8e5e0ca4df9dfa8ac65e476e25a1c09000,2024-11-21T04:33:35.460000
-CVE-2019-1880,0,0,940805d56bdb75ab47bb0a88cef19b1fe628fd15111153620905bfd5eee5aa9f,2024-11-21T04:37:36.150000
+CVE-2019-1880,0,1,dafe3f3e39d28583d2e13ce1e19d674d0de019d12e11aeaf58dd4e0f92239e60,2024-11-21T04:37:36.150000
CVE-2019-18800,0,0,510660f16327066116a34346662df436e986bb4611c66ca5fb600f0386df4f01,2024-11-21T04:33:35.593000
CVE-2019-18801,0,0,c235d7e50aa86924a7870c0eba5d3952309ca857c45ea3dc7b316d6911ea7026,2024-11-21T04:33:35.730000
CVE-2019-18802,0,0,46ec4fc65901d5cbf178a05d3c81bcf309d6f8348038c5957448c7b998fea6f4,2024-11-21T04:33:35.877000
@@ -136069,7 +136069,7 @@ CVE-2019-18806,0,0,27983ecc43ce6bc62b914818b3917e97991e133708b660010845d2d872ba5
CVE-2019-18807,0,0,57f3b018fa8c23c7daaf6738545395ca4d3baf03794d27f97b9399633b7d1c5f,2024-11-21T04:33:36.493000
CVE-2019-18808,0,0,ba2a5db2719db2a63d8ffa329d2ed1b4a54ec48f0419f33e59ab17cc2ff19543,2024-11-21T04:33:36.630000
CVE-2019-18809,0,0,875f10f9131bc89d24c34c8dee14d116fe4ab2507046058a1aa5a85604e65b18,2024-11-21T04:33:36.790000
-CVE-2019-1881,0,0,f4efffed7bfd49421bd4019a8f338de88ec9e8631a08255b045104c3b7e23849,2024-11-21T04:37:36.277000
+CVE-2019-1881,0,1,93623be887e60171fe00fee66e7433022103f10e19ab2c7d9eea9882363980f9,2024-11-21T04:37:36.277000
CVE-2019-18810,0,0,9178c64a060664cb2a6a86033fa75f6aec779d826fe719bf2257f1d293b64c21,2024-11-21T04:33:36.953000
CVE-2019-18811,0,0,c2fde7a0b932e6ae3c55aa373b6c63d1ac09083993cf7d803b47fb17fcda3e5c,2024-11-21T04:33:37.117000
CVE-2019-18812,0,0,0be24a804066d7092b0750ddd66c5b349b390bece63a307b025d54b98adabbdf,2024-11-21T04:33:37.263000
@@ -136080,7 +136080,7 @@ CVE-2019-18816,0,0,5be7c7255d493e5f91298548fe8f1f94b3ac3542d3c41a04c14bd9928bb68
CVE-2019-18817,0,0,cb34c32c6e80ce9490e4a0753fa251625ea88dbb687c4db9c127135957784c92,2024-11-21T04:33:37.990000
CVE-2019-18818,0,0,b50dfd22816ab91046e3740cb5a28ac2e4b0bd34c823639cdfa72991b7ef63bf,2024-11-21T04:33:38.113000
CVE-2019-18819,0,0,497d435f7e1d94d2474c31e5d35b99d5986a3bb26d53b30c3541857a6601ea51,2024-11-21T04:33:38.300000
-CVE-2019-1882,0,0,2fb166e3851876f01f980a9bee2bc0d1c0f93119ad99690bc223082829d01842,2024-11-21T04:37:36.403000
+CVE-2019-1882,0,1,dda10e76a4a632c3db9782edf765318cb7762776304655d28554f8675d0962fd,2024-11-21T04:37:36.403000
CVE-2019-18820,0,0,fa39eb1e30355ca89d787c286a4f3a28003d39a1774e8a2aa0e75d8602931bac,2024-11-21T04:33:38.433000
CVE-2019-18821,0,0,9cc14a0bf2517565e2fd019889f6e5541c21cfaca61589fce9bd300748e74864,2024-11-21T04:33:38.563000
CVE-2019-18822,0,0,af8c046a2b6e463fbde57ece9b5114b8438e3bb8a500e8dda0f598b919f11d4e,2024-11-21T04:33:38.697000
@@ -136091,7 +136091,7 @@ CVE-2019-18826,0,0,1352ba3e685fd725edf2374e2c07c141200af0b032edb49b78c21c8831e4d
CVE-2019-18827,0,0,6adf27438877572b2b322c65d5df44bc5cfdfc8956e46d15ff12bb6f8255601f,2024-11-21T04:33:39.447000
CVE-2019-18828,0,0,c774caa7e66f8159270d4db3a76615869cc6212eb1bb98fd9df7999ca7a5c593,2024-11-21T04:33:39.600000
CVE-2019-18829,0,0,b265f46d3929c52b603e8a0017172780fc993031161f4474129251d6051223e5,2024-11-21T04:33:39.760000
-CVE-2019-1883,0,0,49c001ab90da4f2162f7836dbea067b5c31ffd6603ab7b7ab0f677cbabed5cca,2024-11-21T04:37:36.547000
+CVE-2019-1883,0,1,cc2f874c2204f4c7d27a2a45b2db7242ae7a25c993946a1e7e02323882e1d61c,2024-11-21T04:37:36.547000
CVE-2019-18830,0,0,c7a5cd58981ca10bfc69fa36c203a1ae9ccd4e8c3870d71494b72fe9e65b68bd,2024-11-21T04:33:39.907000
CVE-2019-18831,0,0,36e0ed30721a78c76c0d2a7bae6eb3e6d4598f0f47cfbe0485fee800351165ea,2024-11-21T04:33:40.073000
CVE-2019-18832,0,0,278d13492b4ab2472add92fe927661bf0df8106c27ef690dd5626ac920db66e1,2024-11-21T04:33:40.220000
@@ -136102,7 +136102,7 @@ CVE-2019-18836,0,0,f6246e10aae1037d108420cf9c2c6202d1ec74574eb0adb5ab7aeec4630e6
CVE-2019-18837,0,0,d2e6eee44238a889c5f12d63296b1a45c507eaec0eae88dc528e6890422c00ec,2024-11-21T04:33:40.990000
CVE-2019-18838,0,0,e4660a5587469e5d0e1028806d7dfe212c1370e5427caa93e8e5222bc6939d3f,2024-11-21T04:33:41.103000
CVE-2019-18839,0,0,a0436ca551dae8616d09bc03a960898416255cff4251ed8775b02b01e8f855b4,2024-11-21T04:33:41.247000
-CVE-2019-1884,0,0,46a65a93ebe8daece47a6fab164ecf035bdaa3954dcd32a8ac376d7d6b06c768,2024-11-21T04:37:36.687000
+CVE-2019-1884,0,1,028315e9b900d80dfd81bd61e3eb5dd6d2c0815262da51648f0fbbbd7161d088,2024-11-21T04:37:36.687000
CVE-2019-18840,0,0,450fbd92d3c43c6e1c1ef011d3010a0d4814ce7d7064d3233f5d14dac69da95e,2024-11-21T04:33:41.387000
CVE-2019-18841,0,0,667ea5f86bedcfe7de5e8c7e2038074faa8b57670e97ab3902c2d46877c2e25f,2024-11-21T04:33:41.530000
CVE-2019-18842,0,0,eec901e74f4960e0deb636e73a0d9e0b76648d74ce2d4c59139da8bebde9890d,2024-11-21T04:33:41.673000
@@ -136112,7 +136112,7 @@ CVE-2019-18846,0,0,ca9bfb9bd3dc074cfad28790ddc9e9ca189e4a87b0f51ff95d8e5ca6d53aa
CVE-2019-18847,0,0,b629011326965f4d4edb4941b7c0ac977e93fc3bf9e68057c9ee3e991c2243bb,2024-11-21T04:33:42.233000
CVE-2019-18848,0,0,0be665b764be25ff1f60e18dbf21f3d1d61438a20593793e99e15f5ff674e149,2024-11-21T04:33:42.370000
CVE-2019-18849,0,0,41399cd9660632c35a9bd014a7f6727fffad03f4d95f67cb351b65d03a93ebba,2024-11-21T04:33:42.520000
-CVE-2019-1885,0,0,8b7c4be43d69b14da46357d6587d2585c9bc0e8bf6db67dc3ebf35fe19280f26,2024-11-21T04:37:36.810000
+CVE-2019-1885,0,1,f8e0c5d6665bec15eaa3a652f1e63459ff4f95a7896374688f4fe448e716c511,2024-11-21T04:37:36.810000
CVE-2019-18850,0,0,402cca099927e3b8c7ff2bcb5169a1048a59dc4454591e960d3282c28d174f1e,2024-11-21T04:33:42.690000
CVE-2019-18852,0,0,8eefa4a8782c60f6e7ac87b6e117395d01d9cf8cfbcf2fac48cfe9f45398c916,2024-11-21T04:33:42.843000
CVE-2019-18853,0,0,12e384b9c702365b1f8b8ffad616e024dca2a1ab82d920273ed1c69320ae1582,2024-11-21T04:33:42.993000
@@ -136122,7 +136122,7 @@ CVE-2019-18856,0,0,aa5b84b0aae7719f6470658ea930e0f6990708aede96e41fa2fecc9b4f4e5
CVE-2019-18857,0,0,f133913d8f50164b88864602dab70842f010f18ea5e440d141d9ceadd2c4222f,2024-11-21T04:33:43.593000
CVE-2019-18858,0,0,893b3ddf12478401bad1eb10c116dae578caacf3f4993043e79fe53108acf425,2024-11-21T04:33:43.753000
CVE-2019-18859,0,0,ddfc1b3adf8e5b4709e35e1202d3eadd2f7409ebbe479abe29126bae37267fd1,2024-11-21T04:33:43.910000
-CVE-2019-1886,0,0,5eceb619a59b583ca747184b3d7349bf3e9713554984e1d62ff2a771206bae87,2024-11-21T04:37:36.930000
+CVE-2019-1886,0,1,3b40fad425ef6336233a9b625eb556a30e4340a18afe35c207d6f7ebe2f67582,2024-11-21T04:37:36.930000
CVE-2019-18860,0,0,5135e7b35676c86b5048455f1111f70bddda7edc83ea16b431a4f0be663b7080,2024-11-21T04:33:44.060000
CVE-2019-18862,0,0,7835e10fc9e6048126c253baaa80157a4f3493f3c356107c87ff3a9dc5d5be9c,2024-11-21T04:33:44.213000
CVE-2019-18863,0,0,e7ec270b049c551ad1f5ce9a502764ad5c2c124774440820529dd7c251c34044,2024-11-21T04:33:44.357000
@@ -136132,13 +136132,13 @@ CVE-2019-18866,0,0,a2c7a1965549f5f37e1dca913f24b5b70d97e5c4cd311e4cb38ab269a48fe
CVE-2019-18867,0,0,beb6cf4c82381bd5865091963ad1bafb5fb402f21c599cfa76ef725917454372,2024-11-21T04:33:44.967000
CVE-2019-18868,0,0,3d932c01f9954077759c5448ee90aaea13df44a666571290772850676fb49afe,2024-11-21T04:33:45.130000
CVE-2019-18869,0,0,3a5f329fe870dea6d4cf457cb37e5c9656bc6eb405e81f4a7f7197c435a38a26,2024-11-21T04:33:45.270000
-CVE-2019-1887,0,0,57b27e540f4e5e14a613bae4d945de9724a7f5b9db637a8ca878879cb4b805a9,2024-11-21T04:37:37.050000
+CVE-2019-1887,0,1,850cbd64dd3bfb668bc90b0493a222a5437b0fc6d1b659924d2715074fc2c377,2024-11-21T04:37:37.050000
CVE-2019-18870,0,0,79ca010adbc660fa8ee85af0b7678b92a86f8c6e498d0fd46a6f466b7fd4a350,2024-11-21T04:33:45.417000
CVE-2019-18871,0,0,52eb3109b1c67fd5f4cf4243901025ce941d00317a622c2db50553dde423a1fa,2024-11-21T04:33:45.557000
CVE-2019-18872,0,0,12c0f789a576b1c2b40cd7ac850cd012df59179a925fd7551f951857940e5f1e,2024-11-21T04:33:45.700000
CVE-2019-18873,0,0,6ce67c59b4879a5b0422eecf2e109492094aca45da69d334a9f630fb4c26f77b,2024-11-21T04:33:45.840000
CVE-2019-18874,0,0,02e5d7198c60d56a73b08837f1942038e490745694d6896073771c672a74e4f7,2024-11-21T04:33:45.980000
-CVE-2019-1888,0,0,0d3a1d3cab147d4478357bbabf8f18cb787ce8f0f51fc6f34013d4d408435f59,2024-11-21T04:37:37.177000
+CVE-2019-1888,0,1,52e3644fd9a4a53028f62cd9e6037d88bfba492587e121df5840d9ab5553c4f2,2024-11-21T04:37:37.177000
CVE-2019-18881,0,0,3167ed8647a1e0a13e338e6b83b1b590941339f809d39495d7f74c89dadf9579,2024-11-21T04:33:46.117000
CVE-2019-18882,0,0,bd3f48fadac8e35b0d5826464f708015e073dd1ed4962c687fd8564eadf85c69,2024-11-21T04:33:46.260000
CVE-2019-18883,0,0,18f955d8aab841f8d187ebbcb23de6b1947e12765652c21f9e851322c0a470b4,2024-11-21T04:33:46.397000
@@ -136148,7 +136148,7 @@ CVE-2019-18886,0,0,7377e423f6963a7fb10521e429da9ce1e28fe0bc7bfaf7e812719e622a316
CVE-2019-18887,0,0,c4411b84b4a89a1f8fad8ea92d2217cc7427061ab4cea8c529dbd1d28eb5a030,2024-11-21T04:33:46.977000
CVE-2019-18888,0,0,6f0c7d05a70d55db879b3c8b27fc4b18abd9744fcce3e1da8a084a696573dbda,2024-11-21T04:33:47.133000
CVE-2019-18889,0,0,dcb72aa625730defa60917c1771fb812e25b3bf413e4f5bbe0b808ed51affc24,2024-11-21T04:33:47.280000
-CVE-2019-1889,0,0,62196039458454856e0ba9ee6945cb4a33aebec962f6f31c5f6c6b149aea1910,2024-11-21T04:37:37.310000
+CVE-2019-1889,0,1,50afe12f20b02255fb524030c577946b1dd7757fecbad96a68854cee2089c693,2024-11-21T04:37:37.310000
CVE-2019-18890,0,0,8358d4cd232b36aab23ac6210898994a153febf8fd2f9fd3ceeb22d7b230e852,2024-11-21T04:33:47.427000
CVE-2019-18893,0,0,839f0e2b33ad7146a269c14a1e577f0b0030bfa1dcff8291c18f7a5420c880dd,2024-11-21T04:33:47.577000
CVE-2019-18894,0,0,cdf867a7dbc9a8e6a7ba6cf5c84a6abd11c6d766c4ffec4361dd0227c798d3ae,2024-11-21T04:33:47.727000
@@ -136156,7 +136156,7 @@ CVE-2019-18895,0,0,3aed5d9c03b3e8ab13c0831642ae0a0133c6b456506b9d2fdc0ec32e1ed7c
CVE-2019-18897,0,0,5e916ac0c31302e6bef1af3dedaf7602d7da272adce66927125984eb32b73af4,2024-11-21T04:33:48.030000
CVE-2019-18898,0,0,70fdedecf2c8f15d818d68b913f803f80a7c78293e51fe19b4aebe5d54f5d936,2024-11-21T04:33:48.173000
CVE-2019-18899,0,0,6b59b3cdfcf55620619fe494691fff7ed4a2357b34430b59ab8eac69d6dbb1ab,2024-11-21T04:33:48.320000
-CVE-2019-1890,0,0,3050f6d4f439beb785868a8a7857290b8f778689bb2c1f44146e928d88bd76ef,2024-11-21T04:37:37.437000
+CVE-2019-1890,0,1,dc22f1528baa95a0d4b4763d04d3ab4dcba076e4c2c8c68eb360a5fae981a262,2024-11-21T04:37:37.437000
CVE-2019-18900,0,0,8f69608266c0ebf0f9c092c08e5d3c4e259e48448ce58a2b7d1c756755289232,2024-11-21T04:33:48.447000
CVE-2019-18901,0,0,bf1a0e5ec5e93103f66088a437dd83630261653f412a9db314120085d3dddecd,2024-11-21T04:33:48.580000
CVE-2019-18902,0,0,c131a28ef70e92127098c86f82a2e089cb539c2cccb7b9880fa9c3e01c8ee641,2024-11-21T04:33:48.707000
@@ -136165,7 +136165,7 @@ CVE-2019-18904,0,0,0d04369b03191a42a0f70938fd436335dfb54bdeaa25b0521279d6e4cc6ea
CVE-2019-18905,0,0,f90443f9e3aeab76f77c063372661aa3877521db38592e5ea0190b0c2ee12959,2024-11-21T04:33:49.097000
CVE-2019-18906,0,0,c3cc84bdc7f34f99e54259900e3a99c1e61ac26d157bb18888f70449c1fe18dd,2024-11-21T04:33:49.220000
CVE-2019-18909,0,0,509dd68aec72b57997e572ee39a98dda705374f293d0a6a8910da30d5571ea05,2024-11-21T04:33:49.360000
-CVE-2019-1891,0,0,6c3f77c99909158092402f5a84089c0d32bb5bfa1d17f8c1268cf9fc76f0a993,2024-11-21T04:37:37.573000
+CVE-2019-1891,0,1,049ea1b46f9c0dccd276b847d601f1c0874def22c84d5cbc26e1c78ed36e324e,2024-11-21T04:37:37.573000
CVE-2019-18910,0,0,808c2c5dabd3f4ca1fb195674af6a157b18729914102a5d8a5498051921adc67,2024-11-21T04:33:49.480000
CVE-2019-18912,0,0,dec97afdc4d07e79b61790869e0d5f0f9d378468c3550768e845fc081ddadec9,2024-11-21T04:33:49.593000
CVE-2019-18913,0,0,7c26de644031d74816ce44420d84fa7d84a095db9a5666f7fc2276043c4dd343,2024-11-21T04:33:49.720000
@@ -136173,7 +136173,7 @@ CVE-2019-18914,0,0,06c8d0302496bbe9dd12d8238f5948375217797e9251a952ee0102d21da8a
CVE-2019-18915,0,0,ab35b98b90f9780dcc7b2239c8454b904edd9c1b029de43de50295698afcee59,2024-11-21T04:33:50.130000
CVE-2019-18916,0,0,6450fc103a32742aa3fd96bcf31ec3035aa83982ebb9ed32851f6ca99d277bee,2024-11-21T04:33:50.247000
CVE-2019-18917,0,0,c5021895de8ab59c47412740901b1c3be85ea4946beeb714d5bb71c102250357,2024-11-21T04:33:50.370000
-CVE-2019-1892,0,0,ef39c5608b15b986f90b5ecd3db5b0775d2f2bd3e2873aab7ee1bd6712acf45e,2024-11-21T04:37:37.757000
+CVE-2019-1892,0,1,14551b8f5fe63ca11177f64ec4799868f9eed4ef51677c7d9e21a1fba35c5161,2024-11-21T04:37:37.757000
CVE-2019-18922,0,0,dd50d362d85827692fcf2e7f239f9218cecdf993c2e76bb6216d86ac34114ecb,2024-11-21T04:33:50.483000
CVE-2019-18923,0,0,dab7367c1f12fbf22baecfaebfd33b2780b903bb368dfef37351e1abc072dd8f,2024-11-21T04:33:50.633000
CVE-2019-18924,0,0,ed102be97a39820cec1f813a2ad3244dcff114152ef7e983a89fede9ea463087,2024-11-21T04:33:50.773000
@@ -136181,7 +136181,7 @@ CVE-2019-18925,0,0,62b87f8b93c388dcede12360e231e1f0ba24a5f6d744dd657cc4dcb91e764
CVE-2019-18926,0,0,33d4d92d77bd254a9052542f3327f237aff6ead39a5435dd4dd7ebe57c6c59cb,2024-11-21T04:33:51.060000
CVE-2019-18928,0,0,1f8ba67f3db75ab416f3726072fc5c1b102dd08b9dc81567676672b8ee0ad362,2024-11-21T04:33:51.193000
CVE-2019-18929,0,0,5b6b342b3d6b235cc8107f082e49c30181b9452da25a38d0facf9cf1693fa477,2024-11-21T04:33:51.353000
-CVE-2019-1893,0,0,0200b6f2ef308c1503e66948b34c1ac3a27a2b1151d4c7a912522af70488096c,2024-11-21T04:37:37.933000
+CVE-2019-1893,0,1,af8a33d2ffe13d84a2ee1d0361708d5597d9bef6c883b3562545ecf27d207d87,2024-11-21T04:37:37.933000
CVE-2019-18930,0,0,386ae025fde4558d656f797d9304fe7a3aabce5a0b62c07d0432605c1bbd273b,2024-11-21T04:33:51.497000
CVE-2019-18931,0,0,e955c637282ac5a728088c0381c840c791ff4f561f731511b637931df37eb9c2,2024-11-21T04:33:51.640000
CVE-2019-18932,0,0,75c5583493e5dbb89a28c82ff965de2a93b55b804be9a1450339c451f1dcf706,2024-11-21T04:33:51.783000
@@ -136192,7 +136192,7 @@ CVE-2019-18936,0,0,1837f5db9c2a916a924fb647332d20cd17f35be9fd39fd56fe7d25d3dd519
CVE-2019-18937,0,0,dff5cb0c4cb3eb577e3edd8e6491918d56e5d89d5fc569411334afc0fb025a14,2024-11-21T04:33:52.567000
CVE-2019-18938,0,0,274bf3e9c65fa47dc165bd495c5cb956484aed6a32938e137adb61887a9a154e,2024-11-21T04:33:52.720000
CVE-2019-18939,0,0,7b9c7cce29715d856700513cf543bcafd45d1e75b506602480bca3ae797948e5,2024-11-21T04:33:52.900000
-CVE-2019-1894,0,0,d9bfae08acb7301428a3311199a1a1eac1280379cc3be2cca295ef1cc6e0fae7,2024-11-21T04:37:38.060000
+CVE-2019-1894,0,1,a59880fe51f24bac7fd4f9e0fe4085c9c32768d0478aa6b0ee11e802639cfd63,2024-11-21T04:37:38.060000
CVE-2019-18942,0,0,3269c339404b333f8fc91b1399696d49771b5d40bce5a20ba11f9d66ce35fc5a,2024-11-21T04:33:53.067000
CVE-2019-18943,0,0,025ccda7d983cfd72f6653ab47efd0a39c5fb7feb757c621d793cbecf58cd717,2024-11-21T04:33:53.197000
CVE-2019-18944,0,0,05abc8d9fa88eeed550d35b700b3a153a1f2a5fe95950f2a98edcbf5903dbe36,2024-11-21T04:33:53.313000
@@ -136201,7 +136201,7 @@ CVE-2019-18946,0,0,d5b19d957432ecade70dc7f1d5efbc6e6ec5412fd73c76ad436a78daa1dc6
CVE-2019-18947,0,0,d11095040cb377b8ce165339b38082124e6b917355915f4ca036fb15da95421e,2024-11-21T04:33:53.670000
CVE-2019-18948,0,0,49afa83d7fb24d529f61966e772ecc4921a45e7ddf6205becfc1f06ee6644bc8,2024-11-21T04:33:53.790000
CVE-2019-18949,0,0,9e68a631f342ece333a593ad00e3bf9d8b0bb012ccc314dea4391ff9d1de4137,2024-11-21T04:33:53.933000
-CVE-2019-1895,0,0,bf71acf2f7716e82d10db91e1b438fae7a09efce6f9e68b4cd3f8f365743e9c9,2024-11-21T04:37:38.183000
+CVE-2019-1895,0,1,3803edc92eaaf35614c223c9e392721aca6ed8332724b8d36a2114451f9ef415,2024-11-21T04:37:38.183000
CVE-2019-18951,0,0,75bca4288ac7eae43ecdf0531c37ae59487644aadb5029fff02e3cd3ae3dc19d,2024-11-21T04:33:54.073000
CVE-2019-18952,0,0,89a30ea53f32f18d5d9e7c8700733975d16ad16db1e1af18bcff8bcbc3c20629,2024-11-21T04:33:54.207000
CVE-2019-18954,0,0,5d621f183c8368a8b11231a59dfbec3d19415e7a23bd7d01adf8de8b947e7abe,2024-11-21T04:33:54.343000
@@ -136209,7 +136209,7 @@ CVE-2019-18955,0,0,7e1f7a81529a3cc0d5ac7febcb4d570b59a8baba9bae6bb0bf5f3859dfec9
CVE-2019-18956,0,0,ac0afc61176435a7928bb28a57740f98741d19a6d96ca35d28d0de1dcccefef6,2024-11-21T04:33:54.610000
CVE-2019-18957,0,0,642928317b78f480af56ccd5614ec11b98ff40901511045516735d5b77ccf229,2024-11-21T04:33:54.750000
CVE-2019-18958,0,0,6d6cec68b0861a2075c097ed78fe76d7e2ff3d03ed91d8a2b2adbdb9f2218c8c,2024-11-21T04:33:54.890000
-CVE-2019-1896,0,0,75f2f0089c5f7bab62c5ae65cb9c545b936ac6a4e10f60cf2dc6958b6c7d1c41,2024-11-21T04:37:38.333000
+CVE-2019-1896,0,1,c8dd72684a1780c5e0cc1e478c15d4c634de0a67fe883d6887baa579d90156a2,2024-11-21T04:37:38.333000
CVE-2019-18960,0,0,55bb64371cf4bdc694ddc0c749f5c148d91e865b39a920c809a516a41a52c914,2024-11-21T04:33:55.023000
CVE-2019-18961,0,0,e174603e5db5117a8f77858b3c9786a92412421166f280914b080402bcfd37ff,2023-11-07T03:07:20.643000
CVE-2019-18962,0,0,84755e44f428871cde23447ad8d139e7240939c386ff054e1ab020dadbefd375,2023-11-07T03:07:20.870000
@@ -136220,12 +136220,12 @@ CVE-2019-18966,0,0,b9bd87c337040af4703b31c2fe70f5103dfe584a05b2f89cf2847bca6bd13
CVE-2019-18967,0,0,0325df3545d8b115350ed657d77778b8be7111384ad58646bc605eb85f2af56a,2023-11-07T03:07:22.113000
CVE-2019-18968,0,0,ada7d5ee84b949118a95f666eede714c0da4a5ff25ea3218b7d76e42fdf5be66,2023-11-07T03:07:22.347000
CVE-2019-18969,0,0,87f83bbdc01ffd3e7269c46ed049ed8afea48d67ecb4b8f719de09b601dfd8e8,2023-11-07T03:07:22.587000
-CVE-2019-1897,0,0,9f7d1b19366969304c973193f9b7e7900e278df3028015bd15ec780aee46b78f,2024-11-21T04:37:38.470000
+CVE-2019-1897,0,1,471f2670dfc642a4fa808f686e8f8ce6c6740ca3227b7cfe4c1dcdd95f01514f,2024-11-21T04:37:38.470000
CVE-2019-18970,0,0,7cffa898504c415163dbfb1d97ac4ed1ed553c29a224fdf145a0dcbf9997f212,2023-11-07T03:07:22.820000
CVE-2019-18976,0,0,c41d8be223efc61434dcba0f04d2e433141fa963f8986a5cd1035dd560cccf55,2024-11-21T04:33:55.320000
CVE-2019-18978,0,0,c165c355ec726f98817f8d01ca3461278a5bf0c16f9c4c66fa8b2f6c08b846f8,2024-11-21T04:33:55.463000
CVE-2019-18979,0,0,be7fb2f42183d1fc88d1635fab9a2ac06b33aa4f4a6527c9b21a0504c4327713,2024-11-21T04:33:55.607000
-CVE-2019-1898,0,0,35c61bcbdf8c49a24ab5fc54500f1bcf2eaea216d846919618ddb15e5313ab10,2024-11-21T04:37:38.620000
+CVE-2019-1898,0,1,f53ed0d0784209aea13c3680436979fe82ca2fd3231c0a30e993b74cefc0d85e,2024-11-21T04:37:38.620000
CVE-2019-18980,0,0,691ec99b54261570ef9a22d18952496e7833b00ae5becbd52991f58d17d31524,2024-11-21T04:33:55.747000
CVE-2019-18981,0,0,02c829ce949dd15a338808da3bc7dc48f2e5e94f6467a14b74433eb00a77a006,2024-11-21T04:33:55.883000
CVE-2019-18982,0,0,c12b1bc0f60be34d39fa8ba435104cd7195c24acc417c41698ba77c2b6e92c48,2024-11-21T04:33:56.017000
@@ -136234,7 +136234,7 @@ CVE-2019-18986,0,0,43d5c56729f09f07f131bc9a7107e4f77f3e2ddc2531741f68c354ade8fd8
CVE-2019-18987,0,0,080b08b1fd6a53dc0a23ddab70c7358f2772cbbd6e047c81f3a17d1e9a4fc1fe,2024-11-21T04:33:56.430000
CVE-2019-18988,0,0,f3f2c7c314e05435eca96d932d0e971a0ee5cc054420d169bc30d4bed3c16491,2024-11-21T04:33:56.580000
CVE-2019-18989,0,0,20e09feee1a4145f4d9d2f25b20023c9cf3680e5d1d95717744a055548b31435,2024-11-21T04:33:56.730000
-CVE-2019-1899,0,0,263379e3b0cb3c53d24a04aa1c458a9743a4d752bbacbe9278da6205f857a022,2024-11-21T04:37:38.757000
+CVE-2019-1899,0,1,8fa0e9a41d9a4adc76f20e9bbb524a8ec844134bb941bb95ccb8b9f351d81648,2024-11-21T04:37:38.757000
CVE-2019-18990,0,0,4af78f6f9a48f0ec08643343769ea9f447b77326054f590beaa5a1d61f9bf565,2024-11-21T04:33:56.887000
CVE-2019-18991,0,0,4b9b21f7435552e560c92dfcf9cec72e901823f766a474490f582743bde492d2,2024-11-21T04:33:57.047000
CVE-2019-18992,0,0,0475f6519c4f506ce8f4d5a710a1df0702e73c525f48545330fc86f21f91e944,2024-11-21T04:33:57.207000
@@ -136244,7 +136244,7 @@ CVE-2019-18995,0,0,f5a2db7a2f752b58a5b93836abcae16f76ad7b7ee3c8f6489670612219596
CVE-2019-18996,0,0,5db141a738d2e29823d8b667a7fda0cd30b8f64b387b1f885aff37ac8a3adf44,2024-11-21T04:33:57.740000
CVE-2019-18997,0,0,d971606e2ec41fd211da2081e007508f875fced980aa720669fa07521bfab787,2024-11-21T04:33:57.857000
CVE-2019-18998,0,0,2b85168e146e3830b2b1533c4a16825f2edf0ed0ec33befffc6874e027f3029f,2024-11-21T04:33:57.980000
-CVE-2019-1900,0,0,ebabf4e5a9a08d82bb1ba41800f4d7922334f738bf552c83d905df8e91d85d08,2024-11-21T04:37:38.900000
+CVE-2019-1900,0,1,e179ad192236e071bcc7cd9a07c1dc3f0dbde8a8bf1297d66888db3c81d2ac26,2024-11-21T04:37:38.900000
CVE-2019-19000,0,0,c39126bf1f5c488474b24968aceda97945ef72077bec37aad461688b575705c2,2024-11-21T04:33:58.133000
CVE-2019-19001,0,0,08572c54b410f25fb49bd9a01a080da52904aff9f9b10cf87f468d6653454f80,2024-11-21T04:33:58.243000
CVE-2019-19002,0,0,2eb30f7856bed51dc4bf761a3363bce8cf1cea852e912a30ab7ae08ee548e416,2024-11-21T04:33:58.357000
@@ -136254,7 +136254,7 @@ CVE-2019-19005,0,0,840bb02fb5c2df94aac9c93afdf1f22e7056ed3560f6e3793a88e686ec7a3
CVE-2019-19006,0,0,717c13b4d939db53cb07dbd4d19d1d1d1e56cf842c20b2c0129cf90ed33d09cc,2024-11-21T04:33:58.897000
CVE-2019-19007,0,0,fcac91818be7463476b46e9e1ffaf0778a13eef69a570f82fc922989939d9866,2024-11-21T04:33:59.043000
CVE-2019-19008,0,0,0cabfa4285b453d5ae3b2341816573346230d88570f907580ac73f25e38fa5fb,2023-11-07T03:07:23.580000
-CVE-2019-1901,0,0,fd4cce41164a7f3e9ae99c10a4e00cbb5ebc0b31f620c531c4083ab6f438f12f,2024-11-21T04:37:39.023000
+CVE-2019-1901,0,1,56efc7982c20562f24d9f7bae5f35091dc57230fc1e133893e966aed478db152,2024-11-21T04:37:39.023000
CVE-2019-19010,0,0,65a07a62cc65b64b4394dc2155df642bb17efa3bf76cac8bde68fddc70a17f49,2024-11-21T04:33:59.200000
CVE-2019-19011,0,0,1b602ec6f6f7bc18934874787bde5519d6c169ee589fa9aec6c91458e8e9074c,2024-11-21T04:33:59.350000
CVE-2019-19012,0,0,4ddccd08f74ebb4df95b08b81ef9c343c68302c3a0a4a7bf79f13e97d3f86e35,2024-11-21T04:33:59.490000
@@ -136272,7 +136272,7 @@ CVE-2019-19023,0,0,dcb28d08344f1339919c49f6d1cb68082002584bc8f8be17ee4ca9ed44d17
CVE-2019-19025,0,0,93e2908599ad43f5f427582f2d1677824f31c9efb4b715da17321d013cf0df48,2024-11-21T04:34:01.150000
CVE-2019-19026,0,0,3f9263eb3c9ee3c64e82dc3dc30f177d98e64ce2e0fa1a671dc1101325dd6c6b,2024-11-21T04:34:01.290000
CVE-2019-19029,0,0,fe88c484a10b77f3ffc5201d2aa64dd1d17a6fe2ba2892c9a028d95aaecf1b3b,2024-11-21T04:34:01.437000
-CVE-2019-1903,0,0,eb4b9252a489c3fca7d9da51c4206b6bd37847b9ba1af86e79c171029858248e,2024-11-21T04:37:39.163000
+CVE-2019-1903,0,1,6ff2594fff582733cc14f1358ff681bbf89acdcb17071143c21dfab617acd818,2024-11-21T04:37:39.163000
CVE-2019-19030,0,0,56e44e9c7f4b518adcf62eeff77c64ab9b214a76fe7ae9dfc1c47f0583fcf3b7,2024-11-21T04:34:01.580000
CVE-2019-19031,0,0,a2b702e12106df718f9c108c36b2e07e8a4873562e2bd4f3398f1ebbfde44015,2024-11-21T04:34:01.730000
CVE-2019-19032,0,0,b5429f178b1da5bfe0aa69e449a4799a4ff10039c9e5c7c67b5284550deb35c0,2024-11-21T04:34:01.877000
@@ -136282,7 +136282,7 @@ CVE-2019-19035,0,0,d53f1ee1de58b1392080fbe7c3a11cf8d65a9b16efbbf35dcbede14961a1c
CVE-2019-19036,0,0,1b3b93f160fd6566ca3cbc819d493871c758072f81cf5733f6095b745b2bec69,2024-11-21T04:34:02.500000
CVE-2019-19037,0,0,e1d74aa404385c050fe34c75708f773819cbfdd035d284b7c3deb2891356a000,2024-11-21T04:34:02.647000
CVE-2019-19039,0,0,b11f410d06d53fb81663b24c543b810496af5624430ff2a550876a684b4afc67,2024-11-21T04:34:02.797000
-CVE-2019-1904,0,0,99e4a75daa784d2321fb0c4e85601800bc90cab1c47440e1f38d534cbe98c1f9,2024-11-21T04:37:39.300000
+CVE-2019-1904,0,1,866935ac1cd501ade0711a98b9e73b1adbb27ff7aa82970d15e2aac4dded8845,2024-11-21T04:37:39.300000
CVE-2019-19040,0,0,36f2d4ea0e09b18c3d45e4ad8f757d672a65114581ca4f5c99a06783c9cb7c4e,2024-11-21T04:34:02.960000
CVE-2019-19041,0,0,aa63463b5f69523fd2eb9b247dcb30e4f3b16922e7c79d5c10d762ea41f709d7,2024-11-21T04:34:03.137000
CVE-2019-19043,0,0,409e28a4a321e7bf1a93d9d5a8fb6a2af928adcedb436fb197acfa9d426ce09e,2024-11-21T04:34:03.290000
@@ -136292,7 +136292,7 @@ CVE-2019-19046,0,0,8987a45d05deb3cd3a08c21378a7d20a9ee8bc3609cccafcbb5e35b01d4f4
CVE-2019-19047,0,0,cb343d11b8c4e8202adea20892f3da33685debcea842b5b8a2288e6ea68f15eb,2024-11-21T04:34:03.933000
CVE-2019-19048,0,0,3da2b293cdb641ef1900d5f9142e3956b032b28fd106db70735bd795ec71dc93,2024-11-21T04:34:04.083000
CVE-2019-19049,0,0,4ccbab434f3114119889d03321a5c82152f777199e4eb3345b0b2d9be678092d,2024-11-21T04:34:04.233000
-CVE-2019-1905,0,0,15d6d85f6b33a3b0d65f4da65220512ece49b449327363b7fb25cda240b1901e,2024-11-21T04:37:39.443000
+CVE-2019-1905,0,1,0b0eb4362f19b07aea9340092a53aa6ec78876ad887d29a07805e338537aaff2,2024-11-21T04:37:39.443000
CVE-2019-19050,0,0,2a878b8a0e2c61d567fbdd2b56dfd6f9f43844593e9b39ce9662625233ee1896,2024-11-21T04:34:04.403000
CVE-2019-19051,0,0,125269ec287e7bfa24a3821003123e06e7e3f35db5c63efafd5dfbf9140883a0,2024-11-21T04:34:04.570000
CVE-2019-19052,0,0,616a00e2bcf5a6f655a339144857295bca6078b98feb2ba25641558aa759f72c,2024-11-21T04:34:04.730000
@@ -136303,7 +136303,7 @@ CVE-2019-19056,0,0,6aefeaabf89cd5798cd511e020cb4fdf934de7e87bf6030aca69c19ee8172
CVE-2019-19057,0,0,58c9708e1eba22144a1301eaefc634f9de806dcefd393be00135ec7c3087725f,2024-11-21T04:34:05.587000
CVE-2019-19058,0,0,d71559f2cab688d92a4bf5642410781cc8ee0eafa4e41f8dfe89dfb384f60e7e,2024-11-21T04:34:05.770000
CVE-2019-19059,0,0,ddcf44567c454eb69610250bd47d192f189be457967df835fd6d3f4f9b5c3c27,2024-11-21T04:34:05.933000
-CVE-2019-1906,0,0,3a69e9a8f54362743ce2370e1fa68ebd9ab93408c4e7df63329871e902da3277,2024-11-21T04:37:39.573000
+CVE-2019-1906,0,1,9fe6b5ce1ea0445ce428e9c44cd3153f9b6e96e2230412b1ae22b808293320c2,2024-11-21T04:37:39.573000
CVE-2019-19060,0,0,d738aaad4f4b77e0f81a7ac05b7d1cd3264beddd4ccd121d1816b5cd5dae06f6,2024-11-21T04:34:06.110000
CVE-2019-19061,0,0,f726ff0ffe8d7a7031615ef88568fa372712e05b830d80e3e0b9bbf8d2c6835f,2024-11-21T04:34:06.290000
CVE-2019-19062,0,0,2cc525dc40b384ac52287da50b289d6083de7a5d24f55a6c572966970a320830,2024-11-21T04:34:06.457000
@@ -136314,7 +136314,7 @@ CVE-2019-19066,0,0,05b0e9001c200a682f2f1fc0bcc7e5d90897f78f4bbcf8f059c01ec159678
CVE-2019-19067,0,0,deb1a3163424a7c8264270fe15e3485709cb60eea77a9876a0c3550d19902282,2024-11-21T04:34:07.317000
CVE-2019-19068,0,0,d2d9870bb79ac8ea0f68dc4aae936a7ba0345b1fd54e34e0b25f7602ddbeeaba,2024-11-21T04:34:07.470000
CVE-2019-19069,0,0,c295fb1812bab237343cfd906982797e8e7432041f3e868f55ef074bf38c2853,2024-11-21T04:34:07.633000
-CVE-2019-1907,0,0,297dea42c5eda6e3e5a552f7266dcd4becffd6775849576c0390a68ff0fdf125,2024-11-21T04:37:39.700000
+CVE-2019-1907,0,1,6c28b6029ff9855084a2bda618e2633c07ccb370b1dba4a836dd94fd46fd4cff,2024-11-21T04:37:39.700000
CVE-2019-19070,0,0,3e5feeff454e724e8c141c28d034e093fcc4129e7862f103d1bc3b424a9d50b3,2024-11-21T04:34:07.783000
CVE-2019-19071,0,0,60510b62ebcdfd83e44593b3a9815d3ccd0f5a6ec987326d2b2f344568994a33,2024-11-21T04:34:07.940000
CVE-2019-19072,0,0,606352a89a370f077b6ae0733b8949d7a42cec40e7ab8a5324f171a1933c2c69,2024-11-21T04:34:08.097000
@@ -136325,7 +136325,7 @@ CVE-2019-19076,0,0,fbee4757a5dff94b44eb03c737a1d2b5fdc3e6e6cbe031a710eea61f00980
CVE-2019-19077,0,0,ba87d51ec9f14f649991500a5adfdfb525125e5ef4ec4dd145a0ac78ff5a494a,2024-11-21T04:34:08.947000
CVE-2019-19078,0,0,99a3e7aacb52b071ed30e37b4b338ef92cc6cd0ca4532860088d8b25b22104cd,2024-11-21T04:34:09.140000
CVE-2019-19079,0,0,4599ad41711c33c59b75e05db46ace1c027c4d547730d126378d16e604858924,2024-11-21T04:34:09.307000
-CVE-2019-1908,0,0,8dca2a1957a25a855fbd9974d77758ca2b3e62fa32dbaac03de4b5e873c292cf,2024-11-21T04:37:39.833000
+CVE-2019-1908,0,1,bb95de10a9963d77deb9a82ae42b8722406c288320c2e7a0805a66a0ecdc9b31,2024-11-21T04:37:39.833000
CVE-2019-19080,0,0,7f40dbf8bd3a8a435433445b4157a18c9fc4ef8a53192fda29ff75f774a9b339,2024-11-21T04:34:09.453000
CVE-2019-19081,0,0,11bf856f35868ee8e6929fd3775f9456b32cfdcc2b87a59b2d5c15fb159bc6c7,2024-11-21T04:34:09.603000
CVE-2019-19082,0,0,4b68d40424026c323b71c50e8aa5c46e6c6127530d9319d4fc9cb49141552218,2024-11-21T04:34:09.750000
@@ -136336,7 +136336,7 @@ CVE-2019-19086,0,0,f01cf0b981e9ebcbb00a6b620a78237a09f5164837e8771150933f70d6416
CVE-2019-19087,0,0,cb9d75a9136cb204b71d4f951b5e3bef9666a63bae88570ee33c76f6fb1a7149,2024-11-21T04:34:10.510000
CVE-2019-19088,0,0,826f1c3191120465767949cb02f69e657bf89019da5e5652c41195e4bb3b552e,2024-11-21T04:34:10.653000
CVE-2019-19089,0,0,5985569b04ad62d8481c2adc7d8997ed8da9aee326c4fa4ae4d05bbf40a93698,2024-11-21T04:34:10.793000
-CVE-2019-1909,0,0,807505c06a9a78cafa966345f67e66fee664f1659319c77a8a2c60ec90567afc,2024-11-21T04:37:39.967000
+CVE-2019-1909,0,1,22b5eade834eb82a317ff498fdffcd380f1e4d6d0e22b31ef06f7837b5329da3,2024-11-21T04:37:39.967000
CVE-2019-19090,0,0,7561a109652b4aa0535ee090f0271464f95c82f1568e5bf0960ba6e08c5798a9,2024-11-21T04:34:10.913000
CVE-2019-19091,0,0,200c8452726b82100a56292ebe34bf441717d1b4e512192eb3c23a95286fb864,2024-11-21T04:34:11.033000
CVE-2019-19092,0,0,97bcb22857bf9b2ab4eb3d0bfc37cec93bfeeaa4b58bdb3a4596e4b57ac41abe,2024-11-21T04:34:11.157000
@@ -136345,7 +136345,7 @@ CVE-2019-19094,0,0,8590fb131173f638bf760e425bef7655ce14438663ac9dc6a664c658094fc
CVE-2019-19095,0,0,ae47fdb8ed4a2bd9da6852186e03049b71a19b873e2ed1572de6252744fcaa77,2024-11-21T04:34:11.510000
CVE-2019-19096,0,0,2445259699b3639281e67f8a4119b7b48f9a7c6c27f48d92010ac7a510b9f936,2024-11-21T04:34:11.627000
CVE-2019-19097,0,0,7a141478cde1b84c83d9073aae6db69ef5aa7b67d91593a73dfba38c4dcca017,2024-11-21T04:34:11.743000
-CVE-2019-1910,0,0,e14ef133d0da582f98022a027f0e2a5e148329b3aec8e8a246618279b4a6abcb,2024-11-21T04:37:40.087000
+CVE-2019-1910,0,1,1253c7e1fb50251737a2bb42aba26daf24dbdcea5a5e589ed085610a1253a08d,2024-11-21T04:37:40.087000
CVE-2019-19100,0,0,48e87524fd7fd87635d84585401c83efcb01006422fa3781cf8c9123ee5a91da,2024-11-21T04:34:11.863000
CVE-2019-19101,0,0,03ef295cdece72ac10af6b81ace2981fbf8db8a254c6a2f059114a01da4d9420,2024-11-21T04:34:11.993000
CVE-2019-19102,0,0,399bb4f39e726d183b9847bc2d06af4a46dfa92d4093264a44080f8bd6906d81,2024-11-21T04:34:12.140000
@@ -136355,7 +136355,7 @@ CVE-2019-19106,0,0,cd1e439590e2d10d6e02ebbe55bcb313580fa7967db43c843e2ee2fc2a383
CVE-2019-19107,0,0,a15bbe3fcb41d41ec5154de064b71df8909a630e692921de3395f9706c466edb,2024-11-21T04:34:12.637000
CVE-2019-19108,0,0,187d56587705f5ea79d99f86b8d5e10569f97ab5e3ef3e7f6e164189e24da12c,2024-11-21T04:34:12.763000
CVE-2019-19109,0,0,89d8d2d3ea3ffded547eeb80d28e4a8d8b0e1e22a150c22d110679c3843dbfe8,2024-11-21T04:34:12.890000
-CVE-2019-1911,0,0,de7707c7b0da10e4bca2643b00ba042764b16740ad5d441167301efb2366172a,2024-11-21T04:37:40.217000
+CVE-2019-1911,0,1,16d4057595f6124d09cbd5a1df9072d297512fa34b2674d81b689b0a993c786b,2024-11-21T04:37:40.217000
CVE-2019-19110,0,0,12ec8d0f132f12bd6886a57c42e72846293fa7ab21aad4867cef5b12e3e65fb6,2024-11-21T04:34:13.033000
CVE-2019-19111,0,0,749d9c47c899b82b638c518ad3648097a4fc47f850616363c490cdcc133fdab9,2024-11-21T04:34:13.173000
CVE-2019-19112,0,0,0c1c1331f9718e470d80f82ee8152dbb7af0dfbafdce4bdf289f018d52e1dad5,2024-11-21T04:34:13.337000
@@ -136364,24 +136364,24 @@ CVE-2019-19115,0,0,06a445be2bfd55511a9320b01443efc6ddfa316d2785f6e97fc14a518c5b2
CVE-2019-19117,0,0,1bf4c753bbd50a523502d800b194674b9abc751cb96b3ce9b12f266c27023176,2024-11-21T04:34:13.777000
CVE-2019-19118,0,0,67e1c35f05e89782920ad55503d037c0cacac7d07c62acda6baa797b617a70a6,2024-11-21T04:34:13.920000
CVE-2019-19119,0,0,c0e600feed0c3500e11d08b06fc8da64af52062836eef9f284adae7e5c6ebc20,2024-11-21T04:34:14.073000
-CVE-2019-1912,0,0,784dd011054fcf0ad4309bbaa36c203aabf1cf238263976106c212029813cb58,2024-11-21T04:37:40.340000
+CVE-2019-1912,0,1,580f23489015f111eddb21e5aa69203498136eedb72f246d9fdf153cc1d45226,2024-11-21T04:37:40.340000
CVE-2019-19120,0,0,dd141590e848d2bfa40744929f29f04c45efd915bcebeff2e021f560fac48757,2023-11-07T03:07:31.063000
CVE-2019-19121,0,0,c670f6aabdf6dc68ab09e721c0c6b00cd38cc02a123efbc35bed8762ca82d5a8,2023-11-07T03:07:31.283000
CVE-2019-19123,0,0,a6f5af3d9822f8cbe955a24863d8e9c729af5f93c2bd5fed708196f89d96d5bf,2023-11-07T03:07:31.417000
CVE-2019-19126,0,0,415a577828951d73d22fcecd33ebfce9fa90ae99e6f7ea84f266c75208fc81a4,2024-11-21T04:34:14.263000
CVE-2019-19127,0,0,a6593cc07a8953965ec4fa627b7c6767a934293bd4b7a1e0454ae70d34b4f4cc,2024-11-21T04:34:14.417000
CVE-2019-19129,0,0,7ec5f6c420feab2407b5f0345e51dc1530ad63fa53faa974600b01c6abd46785,2024-11-21T04:34:14.560000
-CVE-2019-1913,0,0,1536f39ec8bd2930f627087973716f707348ba760946ecf2f75f081b92b3e679,2024-11-21T04:37:40.477000
+CVE-2019-1913,0,1,3e87161c38d6fd9511c83a3f5bca112c9e6e98b04f5998790e8268772051a0bd,2024-11-21T04:37:40.477000
CVE-2019-19133,0,0,63ae2986aebf87f47fe5556f3a9c143630866ec3c6f5da48132ae36ae30a7ae3,2024-11-21T04:34:14.700000
CVE-2019-19134,0,0,d116289b161f57962e878af797102c0a953f0529507e442b97f60be55be734ab,2024-11-21T04:34:14.843000
CVE-2019-19135,0,0,7616b719e52e67e4284e1a1632b7c4c35ee477e4b7b9a5fce66573a376d6f0dd,2024-11-21T04:34:14.993000
CVE-2019-19138,0,0,90e9e8cde99d926f045f1c2a9b517ed0b737c78ab007ab64161615757e173214,2024-11-21T04:34:15.133000
-CVE-2019-1914,0,0,e37c9a1a562d848da41835133b4e2d1777532f4eecf34cd0f9ee6af6226719fb,2024-11-21T04:37:40.633000
+CVE-2019-1914,0,1,40e06cecb4c197a385a02fdd0bddb1319c52a051045f22f1bb444020bb8bcecb,2024-11-21T04:37:40.633000
CVE-2019-19141,0,0,b5ecb4afbcc26fdc941c004cca2663bbf7cfd4632a8df44d5cd53cb511ca13a7,2024-11-21T04:34:15.283000
CVE-2019-19142,0,0,b8a3c01ef176c487e32bed28dab5dc8258a8c07a60909ce9f94e386605f5a169,2024-11-21T04:34:15.430000
CVE-2019-19143,0,0,23cc67a6279c64d5843d5fcc17490dd58786fde19fc7149ec46623962211fa50,2024-11-21T04:34:15.580000
CVE-2019-19148,0,0,eeb3d26032c77f2dc60988d7961a08b6734a2671d6fd688d6b0a15b4c19354e6,2024-11-21T04:34:15.723000
-CVE-2019-1915,0,0,d8f4c525ea6157e21737b2aa3edf76128af97057d52ac2a5a6ade5ceb30b6468,2024-11-21T04:37:40.783000
+CVE-2019-1915,0,1,7f09b180eaa665f7599335c9b595bd8a04c1cc19a232ff783fbbfbe1093d5f8b,2024-11-21T04:37:40.783000
CVE-2019-19150,0,0,c18f15e0617ba75a6c82af71fdfde0d1f35e985b463e3171c797eedfba764607,2024-11-21T04:34:15.870000
CVE-2019-19151,0,0,a40ef34111b8d542c232df43111df18a985b6b2aab06cb31b3a733013189a58a,2024-11-21T04:34:15.983000
CVE-2019-19152,0,0,98f2372c55228d095344347551080357285c89d159f3fb5814ddec42c34044f1,2023-11-07T03:07:31.930000
@@ -136402,15 +136402,15 @@ CVE-2019-19166,0,0,aaae571dcc5f1ebdcb9934de92a37c0af1bc0ee1cad02751056949c9b6870
CVE-2019-19167,0,0,0d6d66166e0ab2ad22482e85958fa4bcf2b7c7a08499623d75d68d3ce42cacf8,2024-11-21T04:34:17.153000
CVE-2019-19168,0,0,ca349c3def0e0251be0eede673685ec99b04771b7f3988ca39ebe3a44cdce1fd,2024-11-21T04:34:17.287000
CVE-2019-19169,0,0,3355cb4cead0571aff173ccd37765dcae571c8b96411a74f266816f07dc7213f,2024-11-21T04:34:17.407000
-CVE-2019-1917,0,0,5a444a214836b406ee7dd6eef3eccecab0af71218c806a1f4e5327615824a7e2,2024-11-21T04:37:40.923000
+CVE-2019-1917,0,1,1cc4a18c78306adc73dd928c28e1b0d388020d3232768200b01beb62b6139ce9,2024-11-21T04:37:40.923000
CVE-2019-19173,0,0,41167728a22a936c130d4720951268abff9b68da10585df8a9e6b4a4cf4c0802,2023-11-07T03:07:34.643000
CVE-2019-19178,0,0,223400616d78a64468cd169f1eef10e9ae04d1fca9a9bec90b5864a26e4698d5,2023-11-07T03:07:34.693000
CVE-2019-19179,0,0,7ca15a6d5a228e43f990c1a37d51929b75b2e58b72c38b795c3551b89b26f7d9,2023-11-07T03:07:34.757000
-CVE-2019-1918,0,0,a4529c0957c3cf145eecef5f72f0a2fe686cf018c710a8a334688c5fb047639b,2024-11-21T04:37:41.070000
+CVE-2019-1918,0,1,388d707661fb5dd15281e588374eb7da43ee4154b78be48f4e1d7ef81f77555f,2024-11-21T04:37:41.070000
CVE-2019-19181,0,0,905b8225d085a09b759e665f2e3f6d33fbbf6339ce89ee3747116fefd8e54603,2023-11-07T03:07:34.820000
CVE-2019-19183,0,0,4afe3e609d3462645d895d9d4c42bb2b1d2c6c3651fe8cf89e0e7b2f50596385,2023-11-07T03:07:34.897000
CVE-2019-19184,0,0,8ab834cfc4fad3d7fe82b11729ae97dd250e7bf6e3793569e81c4fb1fe7bab1d,2023-11-07T03:07:34.970000
-CVE-2019-1919,0,0,13263374a7e66e4d67a4b885e9adc34babe6b88ccf6d2316a16fbb15e88b7b97,2024-11-21T04:37:41.190000
+CVE-2019-1919,0,1,430914921ca5c041253a75b049080f286bfd42777a0fca82a463746ae2521c5e,2024-11-21T04:37:41.190000
CVE-2019-19191,0,0,f5a4c0c0454425ac7cbcafa23e2ec26d08fde8c45928bb9744720e8cb51e7861,2024-11-21T04:34:17.600000
CVE-2019-19192,0,0,0d39f49b6c20951de98f5818b0849b56a02adf98da2ad6b29c81047c7a05e0b1,2024-11-21T04:34:17.740000
CVE-2019-19193,0,0,3777aa1d6ee1005b06ffa29a44f597f5000e3b7cfef3be75185c93c79bd60218,2024-11-21T04:34:17.880000
@@ -136420,7 +136420,7 @@ CVE-2019-19196,0,0,a4207cf097fe9850f384907aefd6914a54188411e3c4917a90a139893f90a
CVE-2019-19197,0,0,22ed58a73ce082f31464934b7b4ed87633c9d8a629c30ed18f6aaebbe2762adb,2024-11-21T04:34:18.490000
CVE-2019-19198,0,0,9cdcf1e56e499d4271f8429b9303f934a8987e9508a712b6e3063faa898e4a03,2024-11-21T04:34:18.637000
CVE-2019-19199,0,0,4015ca7e31210720320b66fff3dba2ad7d27e29519af7743eb3396e26763b9fd,2024-11-21T04:34:18.783000
-CVE-2019-1920,0,0,313a25048d99f432cec80a35d39af5f9c69773a6b9d2094e781c12d771f76142,2024-11-21T04:37:41.320000
+CVE-2019-1920,0,1,ee687e7ba4edffa71ce8b627119f5b5ed8af6ee4d9f32aa0f17f7f68a537265e,2024-11-21T04:37:41.320000
CVE-2019-19200,0,0,f20cd6d1ecb6bb848819b1fd11bfd9fca3e1bbe18cf25978b4496abe43e71bd6,2024-11-21T04:34:18.937000
CVE-2019-19202,0,0,3b28b1d2e1ac42516a0bb7ef7a67cb5a5a54a53331c268e7ed1ba611320c64e2,2024-11-21T04:34:19.083000
CVE-2019-19203,0,0,a33c5e11759775eac4b4185192a46199d35096b0b363a63500d4547211c21adb,2024-11-21T04:34:19.243000
@@ -136429,7 +136429,7 @@ CVE-2019-19206,0,0,2e5df886a0a06141f24b680c32704b4f4501682a407a87f2b635bae160b9a
CVE-2019-19207,0,0,0a48035e7a15b252fc49240c0bd75fb7bcb7668270c2b76205883b787504589b,2024-11-21T04:34:19.710000
CVE-2019-19208,0,0,789297ba7172fe6994cbca3d44902c8a92ed3b87519b1001ecfc9afe4adff17f,2024-11-21T04:34:19.850000
CVE-2019-19209,0,0,54ab947fdf0abbcf772cc2731d8a5a81863eb9aaa5be49acc7f25999117ee004,2024-11-21T04:34:20
-CVE-2019-1921,0,0,62dab574219c7c1ccf24ecacf8a4627d1a4434714f0a6703a5e2833638695f8e,2024-11-21T04:37:41.443000
+CVE-2019-1921,0,1,0432b4bca617a64fef0bc96a6f4787d9519ca02e89d7990b4202bb52ad7591b3,2024-11-21T04:37:41.443000
CVE-2019-19210,0,0,3d75d056e6698b76fff49431f8db6eb46dd75ce5e192d37d9221962bdb57189a,2024-11-21T04:34:20.140000
CVE-2019-19211,0,0,c0f89a59c8f321750015a9ea706673b70159efc2e58908412953796aa5ad1375,2024-11-21T04:34:20.280000
CVE-2019-19212,0,0,2a4ef7d73af468969511d8ff3c8fb2878baa20852e386dd9e0e689e0b849ad85,2024-11-21T04:34:20.413000
@@ -136440,7 +136440,7 @@ CVE-2019-19216,0,0,a6f53b7d38b505ea7bcc6c5bc2fac6cf6174dcc71ad48b5671c3853999171
CVE-2019-19217,0,0,ec582185cc2ea1034a3c388c501c3c50226a7bddf4f11955b613bdee23023bc5,2024-11-21T04:34:20.863000
CVE-2019-19218,0,0,6ab0a11b9709b6e4240c54acb83bed7bd291eba92d1a3771d42789fd937556f3,2024-11-21T04:34:20.993000
CVE-2019-19219,0,0,174412f333232ca5f71d336b0b772a183d2c3ebda20489b1796c4cc15ef80815,2024-11-21T04:34:21.123000
-CVE-2019-1922,0,0,b950731224de9b2fbaad6bbad55c3a28a7dbda7756b1e3528cf6c2ca63f9179a,2024-11-21T04:37:41.573000
+CVE-2019-1922,0,1,aac710d99f087287d0306e41f018485b91b4c52f8ede3b9894ee9d577d34254d,2024-11-21T04:37:41.573000
CVE-2019-19220,0,0,b0f6191de552f6b5d97c950b972440a11d08fa97670f3bb60c583c589b93cb9b,2024-11-21T04:34:21.257000
CVE-2019-19221,0,0,f040fc1a237a44ffc2a07caf93a812b33f6810386641a403bab2912abb0f7a07,2024-11-21T04:34:21.390000
CVE-2019-19222,0,0,3a25d7d15da1fb1d19634efae2b535d70aa4e3bf2220ae336a8d8ef91f697aec,2024-11-21T04:34:21.547000
@@ -136451,13 +136451,13 @@ CVE-2019-19226,0,0,4ddea62ef8e2e957c2e55eafb1fffcb3298c5e97d31d57a02cc1ff4c97a52
CVE-2019-19227,0,0,ff2d2bc758a2143b14a5035361420f9377ec0e00ec4c6869f615880dae91b7d7,2024-11-21T04:34:22.280000
CVE-2019-19228,0,0,0a2b436405d5df1645a74a2d5bfdb52be779ef8c0dd3934de9a00965eadcd83b,2024-11-21T04:34:22.433000
CVE-2019-19229,0,0,5da1ca6a16dc67039250fc6590d69b2e0adc773918cab1b1c26170e397e65d24,2024-11-21T04:34:22.627000
-CVE-2019-1923,0,0,399fc9afa24b93578e33cf4e94ac3daa996d3d1834edb9e67bde429bb1223ac7,2024-11-21T04:37:41.697000
+CVE-2019-1923,0,1,91fbe7c579dafc52ebfae975a7f59cb4431268ccbcd920e5ededd469fbfd5240,2024-11-21T04:37:41.697000
CVE-2019-19230,0,0,022dc440652371def0f8ba774dee57e077d8e4671ff8c7caf4f6802151d813c2,2024-11-21T04:34:22.827000
CVE-2019-19231,0,0,8438646091166edff46bcf82d0914ac2b0f9473d1f7237ed1d571fa0857d89ac,2024-11-21T04:34:22.953000
CVE-2019-19232,0,0,4a9c0074ec2e28b74ca4ecf7a5328810b2a0a94c1783acbd79288ca763d0ca67,2024-11-21T04:34:23.080000
CVE-2019-19234,0,0,64bdbbf51ac6a6aaf541bd0df661b7d5169ccc21ff06d3eba90ddcab9f64efa8,2024-11-21T04:34:23.253000
CVE-2019-19235,0,0,6473900c90c59f4a88861cb3c78d89929377d053d3af1071d44edd4a09cbe4b5,2024-11-21T04:34:23.430000
-CVE-2019-1924,0,0,bbacefde0acf7a9e954f6b43f8337a2c31faf00cd70856736ff25d029a0abade,2024-11-21T04:37:41.843000
+CVE-2019-1924,0,1,943b544e45e7f55fce8cf2aae505c2ef8be854e8fe5d2373381a2f5d151576b0,2024-11-21T04:37:41.843000
CVE-2019-19240,0,0,b3029691582f311f7f2fd720da09154fbe77232143ff2897b93b88c8e362a4b7,2024-11-21T04:34:23.607000
CVE-2019-19241,0,0,bba5c18163a50ffe5cf01f1d673c7960be4302f6d36f2c52f402820e93f05dd0,2024-11-21T04:34:23.750000
CVE-2019-19242,0,0,db4f8b4f5e54d683a81487e35db343623246e0d036dd82b695cb347ff238d0d4,2024-11-21T04:34:23.900000
@@ -136467,7 +136467,7 @@ CVE-2019-19246,0,0,41bc12e974d39469de632a273c08adef4d4812b8d1d25d401a32942235380
CVE-2019-19247,0,0,86057a797e00f2e7d3d3f34fd24066aa8569b60145d5e5aa24b0118177b1941e,2024-11-21T04:34:24.513000
CVE-2019-19248,0,0,7449fdd8289f9809aa65b65d9bba5dd3e896f501d12f5ecb6baaffdd2dd35aa4,2024-11-21T04:34:24.660000
CVE-2019-19249,0,0,b5c972b440a7a527a7af1bb2c73d4821f2fbd1db781f4269eea2edee828cf1f7,2024-11-21T04:34:24.977000
-CVE-2019-1925,0,0,4f604ed7d4b5da9320cd4ab41f34f65e3df3fb848419e57ccdbd9de5b81f9f16,2024-11-21T04:37:41.960000
+CVE-2019-1925,0,1,9596194773453e50d052cc9473fbe90c46bd251da88e1dab7ff6b63006eb37da,2024-11-21T04:37:41.960000
CVE-2019-19250,0,0,7b34d8144253e871c5c9eaa711670807ff18c5704c8ec5ae546cd23d95f62522,2024-11-21T04:34:25.453000
CVE-2019-19251,0,0,06df41712601e34978c4ce07db74693878b2cb944da98d8403446ec5683c1c77,2024-11-21T04:34:25.597000
CVE-2019-19252,0,0,31ac017d366898b5bde36c219b7cdd8de2f71b827bd12c074fe165bbde461a3f,2024-11-21T04:34:25.730000
@@ -136477,7 +136477,7 @@ CVE-2019-19256,0,0,f7468f5e713c058b877fc75c7466e019fb77b5598fddcc47b2c8245b4ed44
CVE-2019-19257,0,0,4374d76e615d197294cf5aa68b258258efd116a9d376607882390d58c0c6377d,2024-11-21T04:34:26.287000
CVE-2019-19258,0,0,f4429532f27477048c0047a9083df292e08f15fc48b6e5906be853f22434a7be,2024-11-21T04:34:26.427000
CVE-2019-19259,0,0,2e35f63ccf107c876cbaff388446be96589177d132d9dcfda09e7b09cf035e1d,2024-11-21T04:34:26.570000
-CVE-2019-1926,0,0,ca2e74b5abfe760277481a161a04d699a4549598ff98a7c070d81ac83f47a7b5,2024-11-21T04:37:42.080000
+CVE-2019-1926,0,1,44e937abd174146122381d3e1397d9dcd48bc033779d6ad8edba9582d7491d57,2024-11-21T04:37:42.080000
CVE-2019-19260,0,0,b980cf82b8ab709d0a88aa1450a9834137fbacb9bea0217a00f8f3ed21749523,2024-11-21T04:34:26.720000
CVE-2019-19261,0,0,f852a45425f68fd1bbc368d93a0c32bad7c29c99ec634af6b448225dcfb24acb,2024-11-21T04:34:26.863000
CVE-2019-19262,0,0,4c645da93d7ea46a4881d9364ae93f8f48368a42e3cde0f8fcb8229b1df59c0a,2024-11-21T04:34:27.010000
@@ -136486,7 +136486,7 @@ CVE-2019-19264,0,0,2b7f23507c069d62a423f1d03b7ea9ab21716f2ad26af522538667085a2bc
CVE-2019-19265,0,0,77172b6b2927ed3b1108e8140fa029add48c808a40fdfd72e1188b22b339c9d6,2024-11-21T04:34:27.487000
CVE-2019-19266,0,0,7f314b93780399b8406abe195e196c9acf33426398588e5bda4e7a30892dac73,2024-11-21T04:34:27.643000
CVE-2019-19269,0,0,97baac88277131e2994ae53fd1f66afb1e5bdfe83653189078704573e7424d82,2024-11-21T04:34:27.800000
-CVE-2019-1927,0,0,4a51745371f284edb5340fbc02891e219623e7d66a9ae30ef063a304689b90e5,2024-11-21T04:37:42.203000
+CVE-2019-1927,0,1,3dd90f4927fb4e800f4d3e22c28696d4d4e6ff0ea74f7a9865048e14a6b4ad2c,2024-11-21T04:37:42.203000
CVE-2019-19270,0,0,b31bfe57f4248437f8611f458072eca4fffd50ac659e17c747b70af985474cd8,2024-11-21T04:34:27.963000
CVE-2019-19271,0,0,9a39cfe4d5415b7589aebee4e1ca7b29eafcca884b2a0b6cc177aa34fdbdc6d2,2024-11-21T04:34:28.117000
CVE-2019-19272,0,0,2bb7614541c13699d5f8a3e8fca1e4ebec50d5f2ffc9b627f91259131214af47,2024-11-21T04:34:28.260000
@@ -136497,7 +136497,7 @@ CVE-2019-19276,0,0,cd01a0d44dd5e1f6a770b2fc6021ad1241260e0d7e36b84e4cb93adabeed3
CVE-2019-19277,0,0,938d9135e65d12a1112029b97251488e3d8ea0b733930c5e09522a7986f40345,2024-11-21T04:34:28.983000
CVE-2019-19278,0,0,a7e7daac6ce2c1298f52ecab6d2505bf24949a749da0ae9e59a71b75ac967a59,2024-11-21T04:34:29.100000
CVE-2019-19279,0,0,1ec991d88de0fef51bc25c5ff2f8c4bda6388ff1e9afe2e6193597a08bd80791,2024-11-21T04:34:29.223000
-CVE-2019-1928,0,0,ff1501c18429852ccb67313fee19d9c72e1fdbb489b6672db977bbab067d22e2,2024-11-21T04:37:42.327000
+CVE-2019-1928,0,1,8d436f8b435822e1e369d1dd57b03cbfc69456fbab6358569f79b21dbc935ed0,2024-11-21T04:37:42.327000
CVE-2019-19281,0,0,5d90963b61740ace510dbaf782d1435f2fc6bd242bd7e90837e402658ae27915,2024-11-21T04:34:29.350000
CVE-2019-19282,0,0,a267d9c5dca67da1086c0f70bffdb6bbf07107473e22e76a71bf8568a59c57c7,2024-11-21T04:34:29.480000
CVE-2019-19283,0,0,2568ed6de25246735a66560bfb2048384cab266f0ef2572a0013bb1517ff206e,2024-11-21T04:34:29.623000
@@ -136507,7 +136507,7 @@ CVE-2019-19286,0,0,566df2619ca58c58bb26dde1058d209b3059628401761131981fe1381d812
CVE-2019-19287,0,0,127ab3e1f8c0d6c6cbf478535708b1699641dc8dd4b4812143025a688f570123,2024-11-21T04:34:30.063000
CVE-2019-19288,0,0,0bb964e0416540fdb0770fa89a2acf49aec40820ec003a1df8d2fc3bfe61ad7d,2024-11-21T04:34:30.177000
CVE-2019-19289,0,0,a8f2e40cad17ba7bf36b442525624c5545ebc08f1f17821599f216c6a89a8d65,2024-11-21T04:34:30.330000
-CVE-2019-1929,0,0,275045e94573d37a437961eaac33191e0dcebeb11f5ebe3aa1c6f7ddc9176e0d,2024-11-21T04:37:42.450000
+CVE-2019-1929,0,1,b622e2135a6f15bf2d5b3d0937ef7d2201e221f9c3505e3046e4ea7ba96d276e,2024-11-21T04:37:42.450000
CVE-2019-19290,0,0,a432f31d2879a7d4fc1d1b14943175f9ec9cf7180624d956e923eec2e03a694e,2024-11-21T04:34:30.443000
CVE-2019-19291,0,0,53aa837021da3585df781c09bc21a081ba432398dae68374937307246f8f07e3,2024-11-21T04:34:30.567000
CVE-2019-19292,0,0,e280428779c1355b975eca0e4d52cdb5edbbf40927831620c616a7f5be3625fa,2024-11-21T04:34:30.683000
@@ -136518,14 +136518,14 @@ CVE-2019-19296,0,0,df7ac9018dbea0632c3fc7715e2f356d5406b7db648cf6a213ee94ef07f3c
CVE-2019-19297,0,0,47ac26a22676d548b4ee448eadae7e8cafbacbca70c7f4f2e645e9eeddabff15,2024-11-21T04:34:31.290000
CVE-2019-19298,0,0,a9c04ecd2cf97f1b1fe3d703e20c5a4af9b269b861120b09365a33264fd2f0a8,2024-11-21T04:34:31.407000
CVE-2019-19299,0,0,03c1fc8ff7f137b2bf17fd6b64b9503b67c5be6439d6858d5e05e7a692e6c997,2024-11-21T04:34:31.543000
-CVE-2019-1930,0,0,ac1ec8c4267ea502904099848958ca5fd13c3fb46c822f23bbb2a709befea4d2,2024-11-26T16:09:02.407000
+CVE-2019-1930,0,1,91d07001df99cb281a09ff5bb7b8c13bc4ad3a2dd14c0a871ce71c446ef21457,2024-11-26T16:09:02.407000
CVE-2019-19300,0,0,c215b4285e6e9b13ca0f43aa953fa487c23a57eeb7f299b6a1ab076d395c364b,2024-11-21T04:34:31.677000
CVE-2019-19301,0,0,d9c319366c48f9b5514cdffb6166ccacebf48d55a4c1972c50093faf167261be,2024-11-21T04:34:31.900000
CVE-2019-19306,0,0,acda1633508bfc6a9da66d4fd04417cc64b1455ecf1cfbaefaac0ce8b8d62518,2024-11-21T04:34:32.117000
CVE-2019-19307,0,0,43e55d8e7e02dfad2951d487568a759f3b9e93b3cc679f9192a5f8ae891c2e1a,2024-11-21T04:34:32.273000
CVE-2019-19308,0,0,43210ad52d8587b120282703f77f97ea958948e3074dbd3866504e0353124862,2024-11-21T04:34:32.420000
CVE-2019-19309,0,0,8992802850c59d77f663e7367fa2485e0e98a13e7d5cd882c644e5497b10c4ff,2024-11-21T04:34:32.600000
-CVE-2019-1931,0,0,9ad5944221402fbb13c365ebf856abc2642958fc8869bed8f144a066c294604e,2024-11-26T16:09:02.407000
+CVE-2019-1931,0,1,e27fb9e3ca6e677424f70dc7eac0166d36e6173b3f65702b41b0b2999e5a3f6d,2024-11-26T16:09:02.407000
CVE-2019-19310,0,0,fe7bd6247da60d78ab51477fcfa7c412af88cc054931723c7d09eabed6527bdb,2024-11-21T04:34:32.757000
CVE-2019-19311,0,0,f7a4f35b4aec274386e82c77dfc4e888fc371df9e71016e3458a154255f66be8,2024-11-21T04:34:32.917000
CVE-2019-19312,0,0,70fdf11453b848e96371e91f6ede81a402bf6207bb411a2b1e29d55312c6ac4f,2024-11-21T04:34:33.077000
@@ -136536,14 +136536,14 @@ CVE-2019-19316,0,0,a07d0a0440b01138c549f0fec010966d025e49d9ba7dc1ed63275cee9fc4c
CVE-2019-19317,0,0,fb6e01fc9e7be65870e1c3ee30fa53fa3db80c0805ef989a4a2116689a8d0344,2024-11-21T04:34:33.870000
CVE-2019-19318,0,0,8f10fac77b8f820ba418a5a74a2c51877c7901b03788371b8a0ecbf8508af54e,2024-11-21T04:34:34.033000
CVE-2019-19319,0,0,5f6b03f59cd8a018d31c7d65661e22ceb793670736a527edba7364ccab4330df,2024-11-21T04:34:34.200000
-CVE-2019-1932,0,0,957619d418acc39add73ff862356b7b64e3be3ab6bc4fcd70b8dcc6a3c0c338b,2024-11-21T04:37:42.820000
+CVE-2019-1932,0,1,fc4bbcf24efcd420d932ab44db87af8fca487eda12f090c7a2016ce7dd68f6fc,2024-11-21T04:37:42.820000
CVE-2019-19324,0,0,7e51386d903e8634cbe50a7278a7bd238ed22e60fabd9d765bdcb4dd966bee4e,2024-11-21T04:34:34.387000
CVE-2019-19325,0,0,a744fc972afbc8b39dc8b1eca9d2317b137ddc7a27065d37e8553a8545145246,2024-11-21T04:34:34.527000
CVE-2019-19326,0,0,00cba5731e04666d11b6ded61ded2677035317ff87ac3790e1c4c27834695918,2024-11-21T04:34:34.667000
CVE-2019-19327,0,0,e273b4ae35b5230f8dca69ddf9d82981267ec68dced3d662e5d0812ddbe98b07,2024-11-21T04:34:34.810000
CVE-2019-19328,0,0,a12ca9961113bd11594ad21bbf3854f007d2bf8eba4fd6721a22752b7acd0bf2,2024-11-21T04:34:34.953000
CVE-2019-19329,0,0,f9d0160272507f03f8a2c4f5ed7b06005d04aed0d8cf0bc873bc9c840244290a,2024-11-21T04:34:35.103000
-CVE-2019-1933,0,0,fd90f08977425bc7b3aa8ffe28188a06b00439cd366e3de3b3482d9e0d1a66a2,2024-11-21T04:37:42.943000
+CVE-2019-1933,0,1,161bd880bf23ed9aa2c8754e94f502d3e37e7844776d4120052dfe1d5220f767,2024-11-21T04:37:42.943000
CVE-2019-19330,0,0,08685201e7ba66d600ceca69cba83d4c402d4125d6ba4693317e2f579b1d118b,2024-11-21T04:34:35.250000
CVE-2019-19331,0,0,3326eb3ccf43c2d7b23481c05434cf0300338a2996445f52b418706fc5fa90dc,2024-11-21T04:34:35.420000
CVE-2019-19332,0,0,430353527526e59db056687a67725872c425a917b9f7ba8eff88a3bac98209f8,2024-11-21T04:34:35.547000
@@ -136554,7 +136554,7 @@ CVE-2019-19336,0,0,8852e903cf572fd76caac27d3c414ab7baea46cf597a40e5a7f453a12cfab
CVE-2019-19337,0,0,7c55019732c0c72294dd4b839b979b1dea8590c6663b224b7091e13770abec3f,2024-11-21T04:34:36.223000
CVE-2019-19338,0,0,ca3a3266f667401faa230f94088b222fd24043ab818d4806b84ca7e25237dca2,2024-11-21T04:34:36.347000
CVE-2019-19339,0,0,6db285075cbacf4497c317d2e261b1d169743df1903ebf1338ac730c4ad24dd8,2024-11-21T04:34:36.487000
-CVE-2019-1934,0,0,93470c214eb302eec962f86c6720304fa061dbe0eeb7a3a63c3195ba2c2e0124,2024-11-21T04:37:43.053000
+CVE-2019-1934,0,1,8652f329ea4908b40632a0d3d6974c8e55b9dbd421bfc434f72c2c0684d3cabb,2024-11-21T04:37:43.053000
CVE-2019-19340,0,0,b7e4b24fbabad8dee5dd46bcc06d5c43b5df3b13e76664b3d1c41b54d7ed9206,2024-11-21T04:34:36.613000
CVE-2019-19341,0,0,824daa3cdbbb8e34a312738d84a5c250e1a4edb3edfcefe12e9d4cc995c60dc5,2024-11-21T04:34:36.740000
CVE-2019-19342,0,0,a3b7e57e466e792a9392827ff01a308b7a1989c0766415cf6a83f6a4428e628b,2024-11-21T04:34:36.853000
@@ -136565,7 +136565,7 @@ CVE-2019-19346,0,0,d76af0a2deeec6eb4e7fc58faa852247870a4de4ed184461254745a1c5bdf
CVE-2019-19347,0,0,e5b835cb425fc9909771c3d54f74a61ec324a7eaf6a7ebfffd989b4ef4efed1f,2023-11-07T03:07:38.813000
CVE-2019-19348,0,0,b55572e3406bb4e23c66ecc103cfba6da6f11e8fa41df9e2580a7f1045e749dc,2024-11-21T04:34:37.547000
CVE-2019-19349,0,0,96773e1cdb18d3865445ea51beeda7d2046c9442313e54b3940a1bd330f75b89,2024-11-21T04:34:37.670000
-CVE-2019-1935,0,0,ae2ee6596af4a6802a852c8cc88bae6f85f6502f8031bc02ab9c6c66b7585c90,2024-11-21T04:37:43.173000
+CVE-2019-1935,0,1,d40a06f98110a615250a77280d55631a2f3019b117bd85a9186930f860efc055,2024-11-21T04:37:43.173000
CVE-2019-19350,0,0,71c4c5e5f1e44f646e6ad43d7ca127b48937177ae29bc6b979f9139c9592330e,2024-11-21T04:34:37.790000
CVE-2019-19351,0,0,fa2092c659abf78998ce7a0f55bdb76d5bd22dd65e205489a980d7a0338f5ec4,2024-11-21T04:34:37.907000
CVE-2019-19352,0,0,c2b63aeab881adc5917b65e898fc7cd021315efe3f5b4cd2f9ea5c9046b11619,2024-11-21T04:34:38.023000
@@ -136573,14 +136573,14 @@ CVE-2019-19353,0,0,bb237409102dcedd9dbbbd4d99331efc9110c0688742f85b4cce4394d4eee
CVE-2019-19354,0,0,88eeb9079d43a8969d51d865f4324bb2694637cd7b870a9f9b80a9fb6c98e49a,2024-11-21T04:34:38.250000
CVE-2019-19355,0,0,9f2d4ae0b940804a3767624cd5228d86ec51edac5e0698cc87b3c36ee8f41db2,2024-11-21T04:34:38.397000
CVE-2019-19356,0,0,9fe6f1ccbf586dabf3ff779f12c6bd97f380b2032a02cc89e1712292f05124fb,2024-11-21T04:34:38.510000
-CVE-2019-1936,0,0,624ff2e00090ef34147123052e1b212da6776c34c686e01a46cc16b9319f7e4c,2024-11-21T04:37:43.317000
+CVE-2019-1936,0,1,8efb523839ad4f3993d96bc8877278ed4caa83d76a8b5de9a1e8f6ab230f7d0e,2024-11-21T04:37:43.317000
CVE-2019-19362,0,0,a00e8ba4b9e9b3c28ce6e935edf45b2499a2041410266813d64f9f1596151a03,2024-11-21T04:34:38.673000
CVE-2019-19363,0,0,3568a58998f31088e4fe5b37c69f2265937b1b2cd2dcc7ef376d2a0709d6088a,2024-11-21T04:34:38.827000
CVE-2019-19364,0,0,ffdce58467087b2ae4fddbc39a096225fb1cff62a3c469aeee6cd599f99506e6,2024-11-21T04:34:38.990000
CVE-2019-19366,0,0,4967b2835c23a86ec196e842e46d417cecda9b25439386c31235a554febd218c,2024-11-21T04:34:39.130000
CVE-2019-19367,0,0,ea624fa4c3adbdfcec87df671f7e496c65cb52a6ed1357d0f852b006e12885da,2024-11-21T04:34:39.273000
CVE-2019-19368,0,0,b6b9b065236fb2ada2d3f5c4896dfe8b391701adacd68233c6112d3c0038b298,2024-11-21T04:34:39.403000
-CVE-2019-1937,0,0,912b03c37a8e81e49040faf8f7ef27368cbfac943345dc47bbb34d84c67e7f68,2024-11-21T04:37:43.487000
+CVE-2019-1937,0,1,784c8e0753014b8b981dd66f2b69ebfd190f35d098d67e61e4c660b6f92b423d,2024-11-21T04:37:43.487000
CVE-2019-19370,0,0,eab10a4853b577183dd1608ddf5277f07077320d0d9990bf827bb6933440eaa3,2024-11-21T04:34:39.540000
CVE-2019-19371,0,0,76edaae3ef50ae91a935e5fe020f491b2f96aa7be0582271d52dc4e6d3efd667,2024-11-21T04:34:39.683000
CVE-2019-19372,0,0,1601dd395c5b62ea73c403ffe7cfb17c207411c205561caf09cde9df24d61ac1,2024-11-21T04:34:39.820000
@@ -136591,7 +136591,7 @@ CVE-2019-19376,0,0,7fadae655ede496be6dea366725f38734a2bd79b9183a578776d1c8897d4c
CVE-2019-19377,0,0,2dd910095ede9b650df1e4b9c8ab2991ca964655797c4c18129ce33dadafec68,2024-11-21T04:34:40.553000
CVE-2019-19378,0,0,529ac7fd56265a2a4df32bbf3474ae1e89e699f71205012eff03e788a098157d,2024-11-21T04:34:40.707000
CVE-2019-19379,0,0,8a3a8b82bf3baa0aa41e56a676db8410207cc9127d17e32a3e6e51d11ab98f3d,2024-11-21T04:34:40.843000
-CVE-2019-1938,0,0,7fc652868bce29cc879724907262460fdb6d5e3041b4b936815e858d1a989e72,2024-11-21T04:37:43.613000
+CVE-2019-1938,0,1,a5d6160346cb06a48deda3b6046d9569432d04462c51cace90045f279d226e2f,2024-11-21T04:37:43.613000
CVE-2019-19381,0,0,3beeda5d7c26ce0b6899a7f7a0e546c09b4f1d0b1d49b32cc59d2575ee11386d,2024-11-21T04:34:40.977000
CVE-2019-19382,0,0,1c80cd317e09f22aaccaa4317f544b616987c1c84fed03867dd9d9980ef18b58,2024-11-21T04:34:41.113000
CVE-2019-19383,0,0,b791c9fbfc4829da954c15eef7cf18c1bda0721cc090e257536af6675b5d3003,2024-11-21T04:34:41.257000
@@ -136601,7 +136601,7 @@ CVE-2019-19386,0,0,046fbce583d492a6750b690028436cb9181abd9a4c422e92e21f1bea1f43a
CVE-2019-19387,0,0,96f8e7f42f563b963b796a21bea7d382d0cbdd13ec2f0b6573e6a55454aaaa9b,2024-11-21T04:34:41.820000
CVE-2019-19388,0,0,88f80ceedb76857f2a90300f733af70e5f9b4fb52244cb160f75fe9f962f1eac,2024-11-21T04:34:41.960000
CVE-2019-19389,0,0,815cd77ba94a05f0297f2c6d17399175ff52d49296b015af47b7f4cb3112a758,2024-11-21T04:34:42.100000
-CVE-2019-1939,0,0,02e4027b8f380cbfdf36346f1536746759dc31ef2bc12c5b4170478a27f5815f,2024-11-21T04:37:43.740000
+CVE-2019-1939,0,1,2de5a38143693ff39135683337bab0b9faa6dec2c35c4ccb20f77e3b1ab0b141,2024-11-21T04:37:43.740000
CVE-2019-19390,0,0,3efc29c6e93b0f3f72d7e5ed1ef16f9e59f77540f50d8b7a8fee2958f35696e5,2024-11-21T04:34:42.247000
CVE-2019-19391,0,0,7ebc8ec0036c1233f9c1ff54cfc3171733472acccee88a427bcbc24c800aecbf,2024-11-21T04:34:42.400000
CVE-2019-19392,0,0,95ccdd787c18be6ef5d76994d98452555100ddbc3e98f4a55666072ddcbba3e5,2024-11-21T04:34:42.557000
@@ -136610,8 +136610,8 @@ CVE-2019-19394,0,0,c58d56f4bf41c9cc7d57b11b75b8e4973c09a2a984f283921479908f98113
CVE-2019-19396,0,0,58f0a5cf706ecd42561212cc3f5f0330e65530cef3954bd9cb7351569069b965,2024-11-21T04:34:43
CVE-2019-19397,0,0,a062e16a3030495594ad4638420552814ee11de525432b74886d90ed3b39231d,2024-11-21T04:34:43.150000
CVE-2019-19398,0,0,adde5b83037c18cb0944966ff818f0f3c3ce4ae333e2b6c7557d0ed14a115bc4,2024-11-21T04:34:43.280000
-CVE-2019-1940,0,0,675f354b762c5475f9476831034affcacfaf413675aa9570346bc7554fa1e81c,2024-11-21T04:37:43.857000
-CVE-2019-1941,0,0,7f9930c4dcf876a655e77d1d9f0f304c31b6d890d48cc3b92020cef02b762ae3,2024-11-21T04:37:43.967000
+CVE-2019-1940,0,1,66862bcfed012c93f1f1bf04aa32b4dccb4f66bf317a725494c07bf68f8e8af6,2024-11-21T04:37:43.857000
+CVE-2019-1941,0,1,30d8a1226565c2d4f4ad11081637b0f97d77212754b0ac357b0632911d820d47,2024-11-21T04:37:43.967000
CVE-2019-19411,0,0,63306a241f66d16f1d950c6983ac0c56e7e820524e9d8c77ce2d20651ca7e2d7,2024-11-21T04:34:43.393000
CVE-2019-19412,0,0,d99a2854c68dc061f917bb452c9b32eb0862de65c45d139d94fcfe94ae70add6,2024-11-21T04:34:43.503000
CVE-2019-19413,0,0,2faa3a0503c16218d406d8e2aba9da22aa5cfbb78181f6ee98b29e03d6889e3d,2024-11-21T04:34:43.700000
@@ -136619,14 +136619,14 @@ CVE-2019-19414,0,0,9670c54960bd6a757b7d0b058f8eddb933f32d0272d02bca2e5e9db437c45
CVE-2019-19415,0,0,4c29282d1a3139e80f37cd8500292b87d6f36990f09e9c0185024fd75586d407,2024-11-21T04:34:43.987000
CVE-2019-19416,0,0,618b6821ba4eb309d1bb9ca027d277e7156a08a6e416880a8b9219e0180e71b5,2024-11-21T04:34:44.310000
CVE-2019-19417,0,0,9d187faaeba9c7d5d9b8dc340ca99378ef776523424dc5a4cfa26a17a2c3516c,2024-11-21T04:34:44.617000
-CVE-2019-1942,0,0,e0da135a2aca4d3f69cc43aa38c004e3a0204cc8835deacb07602d2d2b1c001a,2024-11-21T04:37:44.093000
-CVE-2019-1943,0,0,170b80a5979c4674b703a89742006f297e1f8967b0818cdee76dc1e8ac1ccc98,2024-11-21T04:37:44.213000
-CVE-2019-1944,0,0,bfd5eab59ca4c06d95c016332b8882a29f6b433e41b51a5df4057eeb82f77b62,2024-11-21T04:37:44.380000
+CVE-2019-1942,0,1,6a991b52409ac9f26ddbb8ac206dfc5dff6ddac0b34cac4295aa32623c09d83a,2024-11-21T04:37:44.093000
+CVE-2019-1943,0,1,76558f449c9f8516e3710ebb3608f01fe4b0bf75bb87074a3174f27601a38455,2024-11-21T04:37:44.213000
+CVE-2019-1944,0,1,7a555a98b3af291358e5f62311fac8e07586d64f3c4a2141b11bccfac79acea7,2024-11-21T04:37:44.380000
CVE-2019-19441,0,0,31fc9664d8f04ef153a6cddcfa0a3395868acbbcf807949ebf6476d43145672c,2024-11-21T04:34:44.910000
CVE-2019-19447,0,0,4b465f93c30e0ea666733cbb361c22c5e1d6069a3d8fcde326f4370a6c6632b1,2024-11-21T04:34:45.017000
CVE-2019-19448,0,0,5367b65079d0dae37388c06e22c164c40f21ec33b3a09ddf4a540501530dfce4,2024-11-21T04:34:45.167000
CVE-2019-19449,0,0,1918db4c4fb20dd545d4ff21f411505661af4a8cb91292ad4cf688fc722abaad,2024-11-21T04:34:45.337000
-CVE-2019-1945,0,0,2b1138102f0447f7f7f7422406cf3b82c0dc477cc11f1b5769faa049fa7f2bdb,2024-11-21T04:37:44.503000
+CVE-2019-1945,0,1,88b49c3c7b9b41a69ab143b6b925f88dce8bf267d2c48d2dc77401917e28a19a,2024-11-21T04:37:44.503000
CVE-2019-19450,0,0,d7b87eb0f94df5d8a3b99ad6fbe407f4bc6ad8a1d690447eb7b6d20731adcf18,2024-11-21T04:34:45.463000
CVE-2019-19451,0,0,0ebcf63f9b0481ecbfdd8e700a2ace753bdf78473acfa0058238421c3eb71329,2024-11-21T04:34:45.633000
CVE-2019-19452,0,0,1e2a7339cad7e0c726d2b083a64bc88f78be06d73bff8f4ef32b3e077dbe1a80,2024-11-21T04:34:45.783000
@@ -136637,7 +136637,7 @@ CVE-2019-19456,0,0,4dfaeece9017b3c9da350a90294e093b82c7ebdf20aa819d698db20c212ff
CVE-2019-19457,0,0,a091234dd5b7615afd0fc40bb45fa41b97f7ab7354cad9999fccddc3d54f968b,2024-11-21T04:34:46.513000
CVE-2019-19458,0,0,90156f5daaa70defa0e263f291392b786a55f89111870e46bb9fbf1931fa43df,2024-11-21T04:34:46.657000
CVE-2019-19459,0,0,6a9ffce6a62763432ea9ce6173018fba8e5ac03829bc5f955b87980104b2a45f,2024-11-21T04:34:46.807000
-CVE-2019-1946,0,0,ddd7873bc3899047b3a76614c9f916c18af65aed9a31864f71722b85a1f78870,2024-11-21T04:37:44.627000
+CVE-2019-1946,0,1,7c0d8df1cb3c0a5d6e9e0c78caa9e1f58a307458def6f4f2f5dad55e807cd03e,2024-11-21T04:37:44.627000
CVE-2019-19460,0,0,ca076706f093d8e227b4cd1afe5202119f12ffa58ed5e148d97c76cd12840df0,2024-11-21T04:34:46.953000
CVE-2019-19461,0,0,b06505a85d81e256b610e304fdc523cdf2c73c3ceb13ede1ddd9171b1af552b3,2024-11-21T04:34:47.097000
CVE-2019-19462,0,0,3a29844d553724f1c49b9084d6837833143f0157a94f0643090dceea6357b172,2024-11-21T04:34:47.243000
@@ -136646,18 +136646,18 @@ CVE-2019-19464,0,0,d6b2654f10db49cd89af14b82dfb91464858a6a46b700cd131b33cabade7b
CVE-2019-19466,0,0,be5643d8421a0c77c4213c456ad83a8be8f7b63868b6470203d6bf21b3b0139b,2024-11-21T04:34:47.740000
CVE-2019-19468,0,0,c18b9966cdbb8c3f98bae4fe351178f07e7a3689ec4b5e832d2dd63dbd68387b,2024-11-21T04:34:47.883000
CVE-2019-19469,0,0,fd2084287a1a37205454cfc25e06ab1183bc7d0f2ecefa50ee3c7793dab7dacc,2024-11-21T04:34:48.023000
-CVE-2019-1947,0,0,8560a2f7e7325e74fe950d34252afd3afbecf05fb4f864e52ffb0b97c3be6607,2024-11-21T04:37:44.757000
+CVE-2019-1947,0,1,043f21ad5d40eed5dae52ab8443f394995f0284f6cbf26fd46967e20e7683f44,2024-11-21T04:37:44.757000
CVE-2019-19470,0,0,a77c2c4da82332e0a8e1f554d77c80763695d97fdfbc65cf00c7c8b858f41194,2024-11-21T04:34:48.160000
CVE-2019-19475,0,0,80424490e086d2329b966a4146d17db00be39eeba1d7895b506e37b35828a56e,2024-11-21T04:34:48.310000
CVE-2019-19479,0,0,f37287c0996a4c57abee22617aba08e6b014e7d33025abf5263de37b02031fee,2024-11-21T04:34:48.457000
-CVE-2019-1948,0,0,79f132481377fe48dd607d71106f5d8455749ea47341fb531528ea83f9e1af75,2024-11-21T04:37:44.890000
+CVE-2019-1948,0,1,8dac5c9c6d7e092030c24d8241d9f5e120cbce516fa13b1e9f464cc129d745fa,2024-11-21T04:37:44.890000
CVE-2019-19480,0,0,4b0fb5c8625fc606d7e75375ac3d0f12957a36806d9611fc997d0ba2f7390847,2024-11-21T04:34:48.613000
CVE-2019-19481,0,0,cbe2b0d7d05d644af3b9a6fd0210cc89d51543b7417a2347b5d3ffac428457b2,2024-11-21T04:34:48.773000
CVE-2019-19484,0,0,d8028492405632fb6a7f51869313a634c8af3face5b05b09aa144d4f5c1ebe92,2024-11-21T04:34:48.920000
CVE-2019-19486,0,0,0b2dd33adca1472588757b5e6c0904d6b398537e4c1e43c85dd9b860aa36bb1f,2024-11-21T04:34:49.063000
CVE-2019-19487,0,0,84319314d3b31eb898936985d4f1895d898507f373992a4b5303a265d4a6ea3b,2024-11-21T04:34:49.213000
CVE-2019-19489,0,0,4b44aa15608bdf570a94cd6f53c47a318cd5cdcbe7c8c0f92aa8ddfecc3f9831,2024-11-21T04:34:49.347000
-CVE-2019-1949,0,0,88fbd2fa238b338f88f06469dbcc0ebdc3c909bd076fd168fd576322c0250852,2024-11-26T16:09:02.407000
+CVE-2019-1949,0,1,14c770cd571ecfdd84052487f8579669383e7821fc3582be8145648af077ecde,2024-11-26T16:09:02.407000
CVE-2019-19490,0,0,7fbc07b9e7976c8f181a402d252913916f13051a6f853fe9d65080564dc7556f,2024-11-21T04:34:49.490000
CVE-2019-19491,0,0,5c2cd2e265f349e87c5404b707f41b19e5085c4da1fe7666698b3ce08a5c0342,2024-11-21T04:34:49.627000
CVE-2019-19492,0,0,ef735783e672e437b9e89b73130db178bf666ac51c2a4bab3d3734645e41f30d,2024-11-21T04:34:49.763000
@@ -136667,7 +136667,7 @@ CVE-2019-19495,0,0,5a7ef364a5ea45576fbe6f4ab5a448abc41fbcd2a76792349a31ebcba3da9
CVE-2019-19496,0,0,9c50e5213cb4b71dcc053a118e4620ff317a54cd492e4dec4546ebbd7785eb9d,2024-11-21T04:34:50.330000
CVE-2019-19497,0,0,f1097417d84ddae07eec01342f56f2cb65ec068ce9cf396f8a5d7199b8e5da1a,2024-11-21T04:34:50.463000
CVE-2019-19499,0,0,6bd0d63c7b317b9f455925e2300ed17cb76e86a5141a1603489f2e16dd5838ef,2024-11-21T04:34:50.603000
-CVE-2019-1950,0,0,71ca7df14affccccedc94411600b75d12edfc0cbce794db31b0548070836a99b,2024-11-21T04:37:45.133000
+CVE-2019-1950,0,1,229ca8b0cdca11d0019d870ede5a1530deebe82df9503c635ecba9e8a36d0092,2024-11-21T04:37:45.133000
CVE-2019-19500,0,0,8f31f1ec13786b08ce0a9460e045446e9a44ba6da31545eaa981377096f37015,2024-11-21T04:34:50.757000
CVE-2019-19501,0,0,f4990648cf865ab604a11d5ca03626b1edc00a062d6aa8147655fd1496bd1662,2024-11-21T04:34:50.903000
CVE-2019-19502,0,0,927af3413f67986a49602de2dbaf3bc4d5f4b5cb8add1fab991b9f7ee8b70792,2024-11-21T04:34:51.037000
@@ -136675,7 +136675,7 @@ CVE-2019-19505,0,0,c30e2043ac675eaa1cbd1463266bfae3fbe420af094796e35982088882048
CVE-2019-19506,0,0,d3d3840b018b64c0bbb9167634f14447703eb3382ab866af626252ea04691e58,2024-11-21T04:34:51.313000
CVE-2019-19507,0,0,cb972653835fd8bf5bb9d8799e8f89699398bca6112c85330e90123c10b074dd,2024-11-21T04:34:51.450000
CVE-2019-19509,0,0,a16f9a390b93fb6e9cd5d0c954347b2467c005aa14ff960b39e4b540da8c0118,2024-11-21T04:34:51.587000
-CVE-2019-1951,0,0,ec95df0f69661e720c195bae8e459fe3b9f597a78bfce73ccddcc1ae7a40d2ee,2024-11-21T04:37:45.270000
+CVE-2019-1951,0,1,602287bdfba2b77656225f599cdcf03708ab587cc3461c68754bcbfb8de85561,2024-11-21T04:37:45.270000
CVE-2019-19513,0,0,f6ac54e0cc21875c1d4e02422970560a2892247255be5cb17ff238cea695846f,2024-11-21T04:34:51.737000
CVE-2019-19514,0,0,359322220218d2d9fc16c92877cba1d9f6709bdba8cae2d863c10bbf94ce78df,2024-11-21T04:34:51.877000
CVE-2019-19515,0,0,89a2428abae9e7ec5bdb2639510309b5eba251e69ebe4886fdc3c0aea4d7fa34,2024-11-21T04:34:52.020000
@@ -136683,7 +136683,7 @@ CVE-2019-19516,0,0,6dbcdcdee425925726791cdb5de18db6524038d180fd144de894bf112d0ea
CVE-2019-19517,0,0,091e6c56e7aff76e4c3370d673caeeef6d042dc393318a394a7785a9edac46bf,2024-11-21T04:34:52.300000
CVE-2019-19518,0,0,876eac688e0bef5901ef729a56c883b85b01b64512ce6c920fc559ece675e7a9,2024-11-21T04:34:52.450000
CVE-2019-19519,0,0,4fe57369df0257bed2362004d9ef6694e3325dc6bb553d9b478a76c2d2ffa18e,2024-11-21T04:34:52.550000
-CVE-2019-1952,0,0,522e4f127fbbeecd57a83179bacaecbb02e3e3d439dcd5f0c1385e4de6a2ae2a,2024-11-21T04:37:45.400000
+CVE-2019-1952,0,1,2a742c30e2d0a95cabe4dd3bc155cd96416cb471b2c8156555ca8565c5490f92,2024-11-21T04:37:45.400000
CVE-2019-19520,0,0,f49da4ccfe8c73699464f28f42d9a331ebee48e28c5d6c07b5c9eab59484069a,2024-11-21T04:34:52.703000
CVE-2019-19521,0,0,8f8db03711c5a0942b35630f91b2e5240e24ded47119a5b8b2f4335f6a80f311,2024-11-21T04:34:52.850000
CVE-2019-19522,0,0,5b90146357e5e58e5fdf4db9b4d7eb1a3a3442cfe2fbf585464cef8bd680c973,2024-11-21T04:34:52.990000
@@ -136694,7 +136694,7 @@ CVE-2019-19526,0,0,af1567ede78683026b00a0659377d5ffbb554ca37d64c7d87003041c37bb5
CVE-2019-19527,0,0,b40647b13ef05f7ca49e1a8ec248e7575b1a7bb0b8b3bcc14da4211e134df1a2,2024-11-21T04:34:53.797000
CVE-2019-19528,0,0,013539fae308a964d503ad8278aa1774d274afdd938d9cac0cf0e668df19fc4c,2024-11-21T04:34:53.963000
CVE-2019-19529,0,0,306e580c24b0dbfd2a37854cfbe0d039ecbee2e5e517098a06f863c35a6685ea,2024-11-21T04:34:54.133000
-CVE-2019-1953,0,0,e2bcdcbdf30a83f2fa61ae3b2636f97451f57a517aaa3653b4e0de8e509e41dc,2024-11-21T04:37:45.523000
+CVE-2019-1953,0,1,209479fedacbe6e51f05504ac100a4a46d33b715a0e6135cb572a8c472f4ed38,2024-11-21T04:37:45.523000
CVE-2019-19530,0,0,7e63de573c47372372a92bcc7753f3f4a28e947f0f3f1e6791c97ae1195963d6,2024-11-21T04:34:54.317000
CVE-2019-19531,0,0,8cc6b13fd7df3c4a312eddfc6ac91926daf9660e22ee30adbaa8b88c91707451,2024-11-21T04:34:54.490000
CVE-2019-19532,0,0,52a18078972b4cb8b8c2bdf1208b2181786db2493bb841341b61f9a8629b8e82,2024-11-21T04:34:54.647000
@@ -136705,7 +136705,7 @@ CVE-2019-19536,0,0,44018146e7a611f369a8ee4c9a8bb4f3b492c94cb79c089b6417fa581c32d
CVE-2019-19537,0,0,d1f0efd36937d9093d665d4cf57dbb7b050d3bc817bae72c8d388d88cbf88f0b,2024-11-21T04:34:55.473000
CVE-2019-19538,0,0,c58d95b7b1fdddad28c5f1705789e42281168408294279a0702beaa2c3033d9f,2024-11-21T04:34:55.623000
CVE-2019-19539,0,0,d75f102fb284e808d66d7c018ad2ef9ef75f6a255df5de1a5c8b787d19785ffb,2024-11-21T04:34:55.760000
-CVE-2019-1954,0,0,42e3a7ac1016ed2d0c79290bdf913224aca5819d79765f53eb56979867af3bc2,2024-11-21T04:37:45.640000
+CVE-2019-1954,0,1,3f6eb8c0cb21c402e025a2dfb794da09b9b4557229a76e34e718e17aaa1fd8c3,2024-11-21T04:37:45.640000
CVE-2019-19540,0,0,69db129664251284fb1ca07c0c15e63e4e3eea0b2ec1dbfffa1a721986c24530,2024-11-21T04:34:55.903000
CVE-2019-19541,0,0,628602a499fb2ef251ce01fdaf105e6a6f6ff2a9646234b906f11b05134f37f7,2024-11-21T04:34:56.040000
CVE-2019-19542,0,0,4ec29ad6d869e11a18ab0540c8412aa9d010dcc21b43fb1dc985158195865472,2024-11-21T04:34:56.177000
@@ -136715,7 +136715,7 @@ CVE-2019-19545,0,0,b1df011a7ed9d270a029028a5ec33bd9753a09ebbd44ee26c1286c1085dc1
CVE-2019-19546,0,0,edef0bbe1a3acf1fe3c0cb19a28339b747da6f4271ee0c43c064d71244aba148,2024-11-21T04:34:56.670000
CVE-2019-19547,0,0,5f4140d7f2a08884a901b359ffe06a72e6e668e160c85209b5daa46f98949027,2024-11-21T04:34:56.780000
CVE-2019-19548,0,0,ef292eeb6f5e1c3d410feb3cecde975b1057ef0a1fa5ecf175e7de3443f667ad,2024-11-21T04:34:56.890000
-CVE-2019-1955,0,0,c0fb15495a25e101f815f76861db2a1755887345663cdfd4988f89c05ed696b7,2024-11-21T04:37:45.750000
+CVE-2019-1955,0,1,98c79e56301ee8cebdcc97cec1ab0650314ae3b0fcdd7b8ded193b3808ba618c,2024-11-21T04:37:45.750000
CVE-2019-19550,0,0,9939e3ee47a5489e18cadf380ac7c04f138fe1241a1fb3eb0feba71e3155b0d2,2024-11-21T04:34:56.993000
CVE-2019-19551,0,0,d574cfb8fd184916ab6a1f9d0c4063a4dc7c543e556df04d6f45c0fc3c8b6c37,2024-11-21T04:34:57.130000
CVE-2019-19552,0,0,94daeaa80a920d1de704fd3851cda0653eb9d5822fc190fe19d86a3d7ff14046,2024-11-21T04:34:57.273000
@@ -136723,17 +136723,17 @@ CVE-2019-19553,0,0,e0f4d3e51cad2f2e7018784dfc0fd9edb25fb620fb606a262e2c1254f56a7
CVE-2019-19555,0,0,ef1c39d36a58d3600cacfbc1ea14195b601a0f0f1f967f70db52fcd2acab02ea,2024-11-21T04:34:57.580000
CVE-2019-19556,0,0,b770f0fc27c6c3f33297bd5e666c2b5310c63a85c5b74fd5c5328dd1685e2956,2024-11-21T04:34:57.720000
CVE-2019-19557,0,0,bb1889acf2b6c10c9d5734455c7ae785fecbb69e0cccec8611baa16f9b60f7eb,2024-11-21T04:34:57.870000
-CVE-2019-1956,0,0,8f3133df4496706c3760a0fbef39a5a0538271ffa2ffbbf241c50d5334226752,2024-11-21T04:37:45.870000
+CVE-2019-1956,0,1,dac4d607e5be6f5f370e705c800be71b7a794b866f7fb2e565bc62b0a918e9f4,2024-11-21T04:37:45.870000
CVE-2019-19560,0,0,ba00b506931966687e003263ccb200a60fb31f5e8249e24d2896ecd5ca1e62ad,2024-11-21T04:34:58.010000
CVE-2019-19561,0,0,9067aa30724830bfc4661e2642f990a9b1c017f53dbafb3fb7df1f3aec4059f3,2024-11-21T04:34:58.153000
CVE-2019-19562,0,0,a50301a0aa6233ddc53c56dfb3a0a936b8f2307001f0cd818e4bfb132ffb01cc,2024-11-21T04:34:58.303000
CVE-2019-19563,0,0,8db55ed4ba57c10f33029bde1a640fd76aa75ae6c3ad430acdb76b800fdb7b22,2024-11-21T04:34:58.470000
-CVE-2019-1957,0,0,7bd20485d60c6846c971fbaa603b7235317f892b8867e5d25ac05c6459ef59ef,2024-11-21T04:37:45.990000
+CVE-2019-1957,0,1,a9f94223a16cae614f04e9807fce4571706011b34cd9de8529a9116d29e8ea5a,2024-11-21T04:37:45.990000
CVE-2019-19576,0,0,f9e98332ba81480cd411fc56d7a11e7442e031d19a45e6f708146ef32bfc5e84,2024-11-21T04:34:58.613000
CVE-2019-19577,0,0,52a94ec21425d3d7fad64447fb71c8eee143443d2865800af036c3f08b991863,2024-11-21T04:34:58.777000
CVE-2019-19578,0,0,a24b620c19ca196ea70f8a8af12dae59c17e2db337350e856229baaa8f0faa4f,2024-11-21T04:34:58.923000
CVE-2019-19579,0,0,785b2d2cca581a9a4fd0f435f048dd2592558ef106f74a265a90e47b003b9de2,2024-11-21T04:34:59.077000
-CVE-2019-1958,0,0,460afa80e2716e57d2bd0c159acb4e35e2ded85a4ef7242fa6921ffed8d5a789,2024-11-21T04:37:46.110000
+CVE-2019-1958,0,1,cb4d3307bbbdbbd68784101e3934ce9ff43184da50adf756299c09d6897fb5b4,2024-11-21T04:37:46.110000
CVE-2019-19580,0,0,deeba9fc2d8dec31b0311fb700314d80d1e1b5099b44d4b4e7c794d0c9b8c882,2024-11-21T04:34:59.233000
CVE-2019-19581,0,0,362bea8d200e1850b41b23e1a5a267f537f4016b6c6190dedf921ea3a47a8c6b,2024-11-21T04:34:59.430000
CVE-2019-19582,0,0,341b2b4481b3d7036616e3d55234e828033b30cc8626bb23f3243be6b40957f4,2024-11-21T04:34:59.587000
@@ -136742,7 +136742,7 @@ CVE-2019-19585,0,0,2fd5f0ed4874a9699892276f90578ba6c47a3ca33c2ee71adf89a1c8ed69b
CVE-2019-19587,0,0,59a7064e1ec5c8bdb2494c8dc549c3f0bd1f852995016fd6267bfea1f9443500,2024-11-21T04:35:00.043000
CVE-2019-19588,0,0,796b6eda0cb6ef8f15a3fc1237667b8f516ab42e0747bbe42ec3be1cf7c1e2df,2024-11-21T04:35:00.180000
CVE-2019-19589,0,0,0d3d73a0af0c5682b3eb2be82852754b558eccd0ceb1479f86b03317e33b06d4,2024-11-21T04:35:00.313000
-CVE-2019-1959,0,0,f597fba41a74de7a04f29a085d8530297304589319cd6f27bb0a72d4f5dd9263,2024-11-21T04:37:46.233000
+CVE-2019-1959,0,1,5cd8472ebaa9d940228ec91ba58842fab5c0d62438e53eff7222e6809a5a27ce,2024-11-21T04:37:46.233000
CVE-2019-19590,0,0,214c5d546f6432cde7004a85ef5e31d030c9bb45805624061cf69b70627b3f32,2024-11-21T04:35:00.550000
CVE-2019-19592,0,0,f35e4851d3a8793bf2c427eb41ce4cc69bda93392a1c1c38d44a887bc2ad1e3f,2024-11-21T04:35:00.707000
CVE-2019-19594,0,0,12f06f02c328a6772adcec6b872ab67562e28c185a165ce46522e57a8f0d9154,2024-11-21T04:35:00.853000
@@ -136750,7 +136750,7 @@ CVE-2019-19595,0,0,ab8f47e021ab5d9eb39af890e99b6bfbb0d2d9c642cda8c6f853779a5ec71
CVE-2019-19596,0,0,6ce0894b78fcb0bdf2ec15d5b971049be57c471db6cf663cb9b8338994c1170b,2024-11-21T04:35:01.163000
CVE-2019-19597,0,0,e1c6ea128ea10d4f36b08ecf0503ddc7b0d6da312e0837c1ea22e4de2202fbc3,2024-11-21T04:35:01.310000
CVE-2019-19598,0,0,b670f3df58809f80ba4060231a80a73409e97dcdbedb0a726cc603ac51143d27,2024-11-21T04:35:01.473000
-CVE-2019-1960,0,0,33b3eb41c1f0fd922bc8d00626b1a39e92d72c961c16c5d9be157cf814b493bf,2024-11-21T04:37:46.363000
+CVE-2019-1960,0,1,4ad70ecf5a020e37403343acefec32c329bb341ae8ad5a8dfb256b12d7f11f67,2024-11-21T04:37:46.363000
CVE-2019-19601,0,0,6d28730c9d121691ba5d6b727bbe149ad0101e502420d9ce33e375d2c004529e,2024-11-21T04:35:01.637000
CVE-2019-19602,0,0,d6fe8439c7f7d1016fee9b4660e7279b89e866e4c9cc48694a27536af3a7bde5,2024-11-21T04:35:01.793000
CVE-2019-19603,0,0,689f41e6bc1b245cf108de0e54f3f46b51051ebe61a27b6c8873f066decef473,2024-11-21T04:35:01.970000
@@ -136760,7 +136760,7 @@ CVE-2019-19606,0,0,2a76993037cf2714f7b5c055db6888aa810425e9c409f24d4198ee518825f
CVE-2019-19607,0,0,c46ca397006745c05d2c53281ec4a5bbae3d2dd56fbb3b9a45bc16282553c3c7,2024-11-21T04:35:02.683000
CVE-2019-19608,0,0,c1e2e6b56baeeb146ca91e39977d9552c61024b592a85741db1b2a351d662421,2024-11-21T04:35:02.853000
CVE-2019-19609,0,0,c22e2130448e31c71f8eecce17921ff0b18e13e78290045495ac6734c5cbf993,2024-11-21T04:35:03
-CVE-2019-1961,0,0,fb2059c134743745059448819e808a12513d8b3cc454d36ab3414abca53576f8,2024-11-21T04:37:46.490000
+CVE-2019-1961,0,1,08bf317e1684b05259228e318f30d57b16d4d7c2d1699fa2b29df4d0ce93e77d,2024-11-21T04:37:46.490000
CVE-2019-19610,0,0,42263f1e82ce1161d4c655d162baf93201e014fa614d407902c634138e2bc2d3,2024-11-21T04:35:03.180000
CVE-2019-19611,0,0,cdae49018554cce1290d804a88e4135353ca2a115ed3d67ec306ac28cce81c17,2024-11-21T04:35:03.337000
CVE-2019-19612,0,0,9131218544e8c60a2107c3e08b03fdb970699c3ec427978385ddec8af5f3f9ed,2024-11-21T04:35:03.510000
@@ -136770,14 +136770,14 @@ CVE-2019-19615,0,0,7551bbde315d0e7b62768ee3538cd02929aa072540e112a00c548d8f5818e
CVE-2019-19616,0,0,2c8ec562a837422ec9290912bb085437c7484701e496442e0d33b9befc380079,2024-11-21T04:35:04.163000
CVE-2019-19617,0,0,bf13da31c4db3d4c94a585773b77bbadd73732818b08361c0486f5b61afbbc23,2024-11-21T04:35:04.343000
CVE-2019-19619,0,0,ec8e074f655d07e2d859db9cc8224d91de0cc0dbe663ae2d54bc8c31484872a1,2024-11-21T04:35:04.533000
-CVE-2019-1962,0,0,dd227f268cf32f5175d1ccf72401bb885ddc736f311785c3883683a5e0fa1480,2024-11-21T04:37:46.613000
+CVE-2019-1962,0,1,19798e4787eef34f9312c3967824b84cfbbf3ab91c32ffab09f6b5a2461b9612,2024-11-21T04:37:46.613000
CVE-2019-19620,0,0,6b97a7599394ad9e014fea3141ce488bd4a9912912b909ec664c09c6b2c3346a,2024-11-21T04:35:04.697000
CVE-2019-19624,0,0,67e3779608e9f6b388c5187f1b0d6c54254c4e3c69fd7d8f58af13d2e53cb315,2024-11-21T04:35:04.850000
CVE-2019-19625,0,0,82379fac42dd0496e89a5558f46f5bc3654beb9dc88dc4209370b6f57b3ef554,2024-11-21T04:35:05.010000
CVE-2019-19627,0,0,b84c4170027a7995c6773325604ee03cba207b2eaebed97b427e524ccaac5309,2024-11-21T04:35:05.163000
CVE-2019-19628,0,0,0b5a1a1ff9a9566c368fcb8cd40281ce6cc332720d9edf4b0ffbcd96c07d88b8,2024-11-21T04:35:05.323000
CVE-2019-19629,0,0,9c80429aa6b67db4e5b02f6e871c920e4409e9b1109a51b9453e098fa86669b3,2024-11-21T04:35:05.477000
-CVE-2019-1963,0,0,5a09c2efd5e565350d8e48caa8744c107911d0919563e7082fae49260fa96b78,2024-11-21T04:37:46.770000
+CVE-2019-1963,0,1,2623764be8f90a6e1bbbf75b97e33fc7ccabfb86d2b20e13f5517d09a824616a,2024-11-21T04:37:46.770000
CVE-2019-19630,0,0,008271125a42f4de334b45d8bf76d6901398faf9e43e9794196212b51bed05cf,2024-11-21T04:35:05.623000
CVE-2019-19631,0,0,ee6936f79f7635173d2bb843c2836ed5fa69978153ca4f3300e348ee501480b8,2024-11-21T04:35:05.780000
CVE-2019-19632,0,0,0e9d9f58e3258e0f42e2851f07d0ed3185ac2652ed11abbba74f30b01484ca0a,2024-11-21T04:35:05.927000
@@ -136786,7 +136786,7 @@ CVE-2019-19635,0,0,34a05aab94d69a7d37154769eb1034be61fc15abb9539b9cbb06bf9951e64
CVE-2019-19636,0,0,16155a16ed526788b7cc93210f4c4f2c42478a6f86dc93409332aa1006649477,2024-11-21T04:35:06.380000
CVE-2019-19637,0,0,08c691b873cc7b8c2a38901e236ce05e60e43b99eef0c07796fa8411bf353426,2024-11-21T04:35:06.537000
CVE-2019-19638,0,0,4a94ad85b5c74e0517520c1ae9460045a2e743a2eb67d0235eb90d1df4466e6c,2024-11-21T04:35:06.683000
-CVE-2019-1964,0,0,c40913c71c5cfd03f5330f021e171717061df413fcf0b4f3f26b1ef381194d4d,2024-11-21T04:37:46.927000
+CVE-2019-1964,0,1,147037996f5f5a7598efea06ba566c749ab6a88e8bbd97140ac07fb7716e0ef2,2024-11-21T04:37:46.927000
CVE-2019-19642,0,0,740e4708ac4bae6aa913a02d2070703fc9afd269a3c9d5069063237e3d193cfa,2024-11-21T04:35:06.833000
CVE-2019-19643,0,0,b3ce5111195a82329d5f1990bbf733d684835fe14e1065887a8732eced140ff9,2024-11-21T04:35:06.987000
CVE-2019-19645,0,0,6ac3ea613ca3f6c2b6c94486a702e78992c60080133ee8618fe4d62077e8102c,2024-11-21T04:35:07.153000
@@ -136794,10 +136794,10 @@ CVE-2019-19646,0,0,8f2b95c519578d82a5c66d52840e814618d9365a9fbd57586a0eac551bd1c
CVE-2019-19647,0,0,19aff544fa158cd518d56cd44e166d419daa09b50fa23f3e45731fe52f230e5d,2024-11-21T04:35:07.573000
CVE-2019-19648,0,0,86b799d6214daffe269c9b3d53506cad281a889695e61f69d68725bd0cda8110,2024-11-21T04:35:07.723000
CVE-2019-19649,0,0,678d277c9afefe7d81c3b9885ebbf6a091c0dbfe79f6d1336cb01395678146b5,2024-11-21T04:35:07.877000
-CVE-2019-1965,0,0,0e0ae2a3337ca49b6a2048b98eab79da366343a8de21774d69b3da7598e8a75f,2024-11-21T04:37:47.067000
+CVE-2019-1965,0,1,3d7166ae8e3eb5dea6c4173fb83cf88c74164b9f551b5855c3dc884bb145ae40,2024-11-21T04:37:47.067000
CVE-2019-19650,0,0,a4d73123e234dffef18e28381d58c8941cf2df875af83f4780aa0aba0aabeecd,2024-11-21T04:35:08.020000
CVE-2019-19659,0,0,63be6ff2a17634498fb15d82c5f18525984a06d64071241a3650d335f08efd15,2024-11-21T04:35:08.177000
-CVE-2019-1966,0,0,a1e9a70dce5f026d60eeae0584d687da17c38f9fdeebf5858c82a3398f054b5c,2024-11-21T04:37:47.227000
+CVE-2019-1966,0,1,e8fa23247b7c282f47b6b02135157956ff8654228793c5ff9a2ccc7279638d6a,2024-11-21T04:37:47.227000
CVE-2019-19660,0,0,13cbfdf6b781e1617cc8304d68e11fc52670769dc227714f3c5ba2b5092b42c4,2024-11-21T04:35:08.333000
CVE-2019-19661,0,0,0a46e7dd4a5b4bc255a712c37f7e7208a54b718ed6cdcbf26affb90fb12389b2,2024-11-21T04:35:08.480000
CVE-2019-19662,0,0,6252a3d67e7743bf405eab0b87574abd02a27d1fbf91853c992d5efbd9ab308c,2024-11-21T04:35:08.623000
@@ -136808,14 +136808,14 @@ CVE-2019-19666,0,0,da03907f66f259ce705b1caae8682834e6a054d4ca36d640edf899476af95
CVE-2019-19667,0,0,73b7b88988696a397b8bf481c93218b262e9eca87d84d3916dbe32b84669875b,2024-11-21T04:35:09.370000
CVE-2019-19668,0,0,c6065a80c7d8bccc25a663b38dfeaabf6300306d2c575c533249ca19fbe64e6b,2024-11-21T04:35:09.510000
CVE-2019-19669,0,0,b2e2602288836a0ad63792271c44a0a0d3605f87b9910b47c49c7bacdf08a3b8,2024-11-21T04:35:09.657000
-CVE-2019-1967,0,0,87e36f7a937a78cbdacd3b66da8a0fb53d34be9a8a49b9886dd726b7f2403156,2024-11-21T04:37:47.367000
+CVE-2019-1967,0,1,53deee96ed2f0e6c27f52666125ec651f81e50d13cdb08cb1abdc7b61b9340f8,2024-11-21T04:37:47.367000
CVE-2019-19670,0,0,7887d67592d3385c7b5d54268cba86ab8c24affae8a63b90259ade175c2539a1,2024-11-21T04:35:09.827000
CVE-2019-19675,0,0,3b4a4681ac98c3cd4bba7aa4558aeb04be8bf77ea5abbaf184f4c17ebf704bb5,2024-11-21T04:35:09.980000
CVE-2019-19676,0,0,7e3190b47ae08cd6cc6e95269cd531944027c4adedf1cc26dd9d49d3f57f100e,2024-11-21T04:35:10.130000
CVE-2019-19677,0,0,65c2021a06e8e883a368930e86ef4f232faccbafbfa5b1a08d0f24fe76af567e,2024-11-21T04:35:10.277000
CVE-2019-19678,0,0,eaa858fac36bbaf851da2192b2c15866541540e9750e20835c86a2e360685024,2024-11-21T04:35:10.413000
CVE-2019-19679,0,0,b19d9ca2cecfe6bd1c7decfc240e5ca6cee346baa56e6412bcff33f6acd269d3,2024-11-21T04:35:10.577000
-CVE-2019-1968,0,0,387f7b01a14edcc8da7f7ace9330955ceb0ea9de0ffba7d5e96462f5ddb4c0da,2024-11-21T04:37:47.520000
+CVE-2019-1968,0,1,1d4276afa89d96f42425e46630b616fb562cecaeed16cf47ea055c6dce6f70a5,2024-11-21T04:37:47.520000
CVE-2019-19680,0,0,71bb669f441f6e8910c2937101d9ac3c2819acccad59a228b7d44437ac983da1,2024-11-21T04:35:10.720000
CVE-2019-19681,0,0,e325fcdd7846331173375e0ea1f1310431646b2f4c061358701e87c088c444fa,2024-11-21T04:35:10.880000
CVE-2019-19682,0,0,0395005d2c5fc04a135c7818450f01a5a5ef59585e99c95664be0c3746e30bac,2024-11-21T04:35:11.023000
@@ -136825,7 +136825,7 @@ CVE-2019-19685,0,0,6c061173cd57838605b3a232dd939bd8541b549b8cf4a7228d6db06dfc017
CVE-2019-19687,0,0,73a8267ddc3132666a53e691daa9cea3ff3d2a5230039ea7ca721223e4b377e5,2024-11-21T04:35:11.607000
CVE-2019-19688,0,0,316188e74690eb193dd06beeac82f8e6439f7e7cd3d139861a47b0aabcefc440,2024-11-21T04:35:11.763000
CVE-2019-19689,0,0,f3b1139805340828b4a4887224db029814872af4e5e69726a454bbc5d68a2558,2024-11-21T04:35:11.867000
-CVE-2019-1969,0,0,cbd5c8230e0e28dddd0d0d862a45bdf581640c3a081f23be18f9170b7f50e414,2024-11-21T04:37:47.670000
+CVE-2019-1969,0,1,ba23f4c4c337940e6f42dc6c1d513aa425be6a8d18c63b6039c14a586136a179,2024-11-21T04:37:47.670000
CVE-2019-19690,0,0,a764b1d1353da4ca7663382050d8744ef8f568c6255a0c5b26857872a7b80486,2024-11-21T04:35:11.977000
CVE-2019-19691,0,0,fd8edf23a9230ac570de389c281aebb51c175f9800584e31710bdf4e0e99c209,2024-11-21T04:35:12.083000
CVE-2019-19692,0,0,544c8d4df08245e393de8389a1fab93ff70fa91de30ca52db291bbeac3c6e4eb,2024-11-21T04:35:12.197000
@@ -136836,7 +136836,7 @@ CVE-2019-19696,0,0,f22c0c662215c11e9d155bf2b84366b34e9c0d17be8fef7fc2be85fbea1d8
CVE-2019-19697,0,0,c22526481c56c4d3b01a1eeb9402fb4d57bd32c730317856084f2694c067597e,2024-11-21T04:35:12.830000
CVE-2019-19698,0,0,d66d989a3bd84f1e9253ba24845a1d5bedc50c922270b0ae962b56fd998854ad,2024-11-21T04:35:12.980000
CVE-2019-19699,0,0,3fb30891b405da23975823f4fa4eeb4ed8d9fbd0d038da9991d3d65b912d9b78,2024-11-21T04:35:13.133000
-CVE-2019-1970,0,0,d369a3b650ff5ca18b25900e7c123cb5191cd054360309627c4a5ad6d5718b52,2024-11-26T16:09:02.407000
+CVE-2019-1970,0,1,fd0b28d9e55ecc20a675839941eeff86679d250475ab9457dbfec753183a15a1,2024-11-26T16:09:02.407000
CVE-2019-19702,0,0,dbf6df8929ad895c6c8d85156afbd6cac9d25da1a26c4a1f5a09fafc232ad008,2024-11-21T04:35:13.300000
CVE-2019-19703,0,0,63f0680d8cca515f1d9e30d83a20ce770d06e995ba2140c70f4aca4939b8cc71,2024-11-21T04:35:13.457000
CVE-2019-19704,0,0,cf0ece0e7e8eb23be432eaf7027dd50ee05cde290294b510770290c5c3225618,2024-11-21T04:35:13.630000
@@ -136844,11 +136844,11 @@ CVE-2019-19705,0,0,2b50930340db03236886ab1e3513b38994a3de1010b34500a6cd82e418b66
CVE-2019-19707,0,0,9fb3069c921248e786df5ebfa0b2b83997ea77c697f4b6bdd24d87ee28c687d3,2024-11-21T04:35:14.117000
CVE-2019-19708,0,0,00588cb8b95ea7186817d874af924df267b32fcf75aefb3d38252ddef2ab78d9,2024-11-21T04:35:14.277000
CVE-2019-19709,0,0,c3f517ffc4c1d93403b740397e3359d19091e45a20acbc682b39a46a0b064308,2024-11-21T04:35:14.450000
-CVE-2019-1971,0,0,2f3cf46b64a1bd420aceed165d99b986cf6f1ad53a1657247de6e1bac6a666fa,2024-11-21T04:37:47.957000
+CVE-2019-1971,0,1,073c5a555486552879ddade31229b62db684846659bd2e978a240f45427ff3f0,2024-11-21T04:37:47.957000
CVE-2019-19712,0,0,8a5100eaf1506a6960abe2294488c7e3831ff05f443d6bcffff0ef9052c09686,2024-11-21T04:35:14.600000
CVE-2019-19714,0,0,4e16e48edb3e895b3f9a9a7f55eee8a751a3f4c34609182db680dc6ff34f9c6e,2024-11-21T04:35:14.733000
CVE-2019-19719,0,0,32933744eaebca8e3cf6edb1ac95b2edb192e693cdfdc3f64053c43a2181920d,2024-11-21T04:35:14.870000
-CVE-2019-1972,0,0,9f58392f0e1f058f395c46773361bc35b85f944a70fa24414a94c5f9c3858f68,2024-11-21T04:37:48.090000
+CVE-2019-1972,0,1,e204e5091a711ca1c1e4e2803611eb7c37480e0d2a57c31cf866cdad0fc2f4ea,2024-11-21T04:37:48.090000
CVE-2019-19720,0,0,c41e6251de0f93033ad172019b376e6424092eee0fc6b58ed3316471b8848d50,2024-11-21T04:35:15.030000
CVE-2019-19721,0,0,97f001305d6752d7e2effc8f500143b439a867eef1be07775174d1d1a7bb1042,2024-11-21T04:35:15.170000
CVE-2019-19722,0,0,a3f46db9d961f34f03123337247c3b1dca031dfc00d5113e615c00fa1be42a1a,2024-11-21T04:35:15.320000
@@ -136858,7 +136858,7 @@ CVE-2019-19726,0,0,dc4cdb0fae7f2047f92886976bfe57dc6159bc3f0bfae261cef7fc08fa215
CVE-2019-19727,0,0,b7063f3bc23f0479c3ba441107b6b8158f1078d8d7fced45988cfb578d2bd89b,2024-11-21T04:35:15.907000
CVE-2019-19728,0,0,93b173a742bac1e5793d3e4bc5ce46cf24d00b147b046f87cd570369df72cb82,2024-11-21T04:35:16.050000
CVE-2019-19729,0,0,98c1112570ad65f065be76afa0425c19ea1574deecbc3004847bd698ef077424,2024-11-21T04:35:16.200000
-CVE-2019-1973,0,0,b65177aa07acd28a5feb9405094f54936fee408dcceec437e2a1c7bdc4bb449b,2024-11-21T04:37:48.213000
+CVE-2019-1973,0,1,9f2032dc2a25b7cd8f6d068732060b52c618e1dae72891bb1314367f57eb1241,2024-11-21T04:37:48.213000
CVE-2019-19731,0,0,779d4c36394261430d6de55a699a585948cd566224a770d6b3e9261a7d78ac3b,2024-11-21T04:35:16.340000
CVE-2019-19732,0,0,786c0b6fd47edaf923b07eda94ff9da601673068506bce0fed690de224bdf312,2024-11-21T04:35:16.480000
CVE-2019-19733,0,0,eb5d8e812f4b8626ce80853ad9a85b6badfbe1d99c6d75d01cf05207ffe162a8,2024-11-21T04:35:16.617000
@@ -136868,7 +136868,7 @@ CVE-2019-19736,0,0,2c79814a678ecbff67c6b11ba944c5fb8dbd967618f5e886019eb179cb0ec
CVE-2019-19737,0,0,24479988e49e0a6b0e4b45b698b0fb5e3d35a0a427948ffab7d4dc04e6617fbd,2024-11-21T04:35:17.173000
CVE-2019-19738,0,0,bd4170e859f35adcf4ff5766260b07b873faf6e1003538dd169c5ce7f70aaf2a,2024-11-21T04:35:17.307000
CVE-2019-19739,0,0,d3ab9666ac3113c314404b0a981182f31e9bb8baf6110a82c2e768d4e3563fd4,2024-11-21T04:35:17.443000
-CVE-2019-1974,0,0,254deb0e8fb82659c8441c1a5fa7bfbeda1cd6dd60b2b648ca89dc93e234e085,2024-11-21T04:37:48.333000
+CVE-2019-1974,0,1,04bef7cd537cb6c4fe5126906118278e660d9330d725c206a7b5eb7c1a86b325,2024-11-21T04:37:48.333000
CVE-2019-19740,0,0,7b13783f41b54b4e2fd24f20f6c0ae1421949ba9f17668ac7cf3834b8e3d9346,2024-11-21T04:35:17.617000
CVE-2019-19741,0,0,87b96874d3fa53269e1f47a6fbd87b8c2ccff44bd8d744f8c43aea286adaf682,2024-11-21T04:35:17.757000
CVE-2019-19742,0,0,c39577f360a758736f9342955eb2efaeff33aef8183c426da51d770ec250a2ad,2024-11-21T04:35:17.893000
@@ -136877,7 +136877,7 @@ CVE-2019-19745,0,0,be8aec23390b28f67fca010d814bfa50cd258dae7a8b256c7323c334a9823
CVE-2019-19746,0,0,934a21f15a3ffb019a94816488c90a4c2d95d82cee5edb4f4c5512dd0b50ac91,2024-11-21T04:35:18.350000
CVE-2019-19747,0,0,611057112dbadf75d7b4163604d3b75c131e7617ba9d398e9a201c6393e2f0f1,2024-11-21T04:35:18.507000
CVE-2019-19748,0,0,003d66c6089b9a24d32cd4a1651b8f57fde00fc0f47e0b8791d4cb6569311d3c,2024-11-21T04:35:18.653000
-CVE-2019-1975,0,0,66f37974e0992711d0f4dc69918fe48e508dffcaf737b93f22ac44113bb1b307,2024-11-21T04:37:48.460000
+CVE-2019-1975,0,1,24c06b4868d756718188257376a9efe8aeacd0b60748ac6f7eaeca88b3f1ec41,2024-11-21T04:37:48.460000
CVE-2019-19750,0,0,55a285013e24bc651d991c05b211bc25bf9cbd0a58577751d4f6cec8eb6b7df2,2024-11-21T04:35:18.803000
CVE-2019-19751,0,0,56d4c79bc14b390375789894ec926aed91956a60aa03c945c02b7f21a448ccfe,2024-11-21T04:35:19.033000
CVE-2019-19752,0,0,2395d1e161beaba79d92b816bc4467aad9f15130021aa70c563dfbadbb276be2,2024-11-21T04:35:19.193000
@@ -136888,7 +136888,7 @@ CVE-2019-19756,0,0,3474c2f80cdb7e1835f066532a7c62fbc5ebc31298625d71bb9f8ef092414
CVE-2019-19757,0,0,8097adf842be4f815233535ee0eb0daa592ab53d297645dd80b6ceea661a33e6,2024-11-21T04:35:20.097000
CVE-2019-19758,0,0,668afd8c9c4d8e42f1f540a76892684b746f341753e5c7065382849315326d96,2024-11-21T04:35:20.223000
CVE-2019-19759,0,0,c73fa57cf1d4a71b74e43b73ed6f6925ccd11f73aa7004387830396e6043feeb,2024-07-29T20:15:02.963000
-CVE-2019-1976,0,0,677cf9a9ada216890c3af47ee555c1084b4d9d249a6480ad3ef66b0660c202ac,2024-11-21T04:37:48.620000
+CVE-2019-1976,0,1,0e70b75a38972506afc44555e1f9f7563aa9a1bb466b067aac093c0c706c958a,2024-11-21T04:37:48.620000
CVE-2019-19760,0,0,9e5c9bc5d0b432b348f73233e37e2b945549620e6b96e24780b4cfd1943709b2,2024-07-29T20:15:03.067000
CVE-2019-19761,0,0,ff1e415d3a5c791dc91d45d4d9c8b0ef11b2af0c7ca0d18a257a76b67c42d319,2024-07-29T20:15:03.143000
CVE-2019-19762,0,0,feb988600c3fc6ca7d1a933280b0be01b94e3ac7fbb425729dfcea7e6ffd9601,2023-11-07T03:07:46.650000
@@ -136899,7 +136899,7 @@ CVE-2019-19766,0,0,1d47e54eb007b1b1048069caab1e46a7fd209f555654682c334f06964c2ea
CVE-2019-19767,0,0,32fec1f4dc4fc16dd48e8adead40600cd86fa4c994c412bc5f199f85a7296b83,2024-11-21T04:35:20.580000
CVE-2019-19768,0,0,bda5252fa0c7a81bd513ac0c349d4939082c6dbae821470b8a3ada2a86a9e1a8,2024-11-21T04:35:20.740000
CVE-2019-19769,0,0,6de3cb5a1852e7dd2f4797c5c4588a4d35c5f2d0e0ea681437a990d28a596c1c,2024-11-21T04:35:20.893000
-CVE-2019-1977,0,0,3926a0f2f3486b9b8fb98017673ffaf5031192052bdd13d41b0aad0f608b9c72,2024-11-21T04:37:48.753000
+CVE-2019-1977,0,1,b7bbbf48d975359167a368d2e61ecd0486984d13994d27a47bb60f61dfe0bb51,2024-11-21T04:37:48.753000
CVE-2019-19770,0,0,643ecd8282f87680057b9c6927853af3941c1a36c20b1b613300fb624cc625ca,2024-11-21T04:35:21.040000
CVE-2019-19771,0,0,096914e8999b96cb693c5f93524f3d921131695a5499e0de6cb7d4e50752b5cf,2024-11-21T04:35:21.190000
CVE-2019-19772,0,0,da4bed69cc3e71e5aa5e3dba7f691a7e285a672f1625b6ce082afcf4d951cb1f,2024-11-21T04:35:21.333000
@@ -136908,7 +136908,7 @@ CVE-2019-19774,0,0,7340b778d71ccd9bb2dff696301eebcc69669846510648050ce474dfe6211
CVE-2019-19775,0,0,dd61646defb57e925ab7d96e260ec086955061604e343672cdcd2899f39ce2af,2024-11-21T04:35:21.890000
CVE-2019-19777,0,0,4df4f4170dd99734ecd5a7ca0324761f5d46697e003f1e3e16eb874d3dcd9b02,2024-11-21T04:35:22.033000
CVE-2019-19778,0,0,39f616ac47dca42e3468afd018f3f3369ca07f444e8df1bd7db46f1b53f7b07f,2024-11-21T04:35:22.167000
-CVE-2019-1978,0,0,9c776ee714a7ee8fbff289dce2c6897cd332c37c81505b69bdeadc72506fed6d,2024-11-26T16:09:02.407000
+CVE-2019-1978,0,1,dfc11fe027eecdbd711f40fa89585185f26bca063b363d573d6e51aa234ad813,2024-11-26T16:09:02.407000
CVE-2019-19781,0,0,656e2ec5ea3cde7318eb68ca9f31e6339e8a006f9b8dbba0c31837830750bc08,2024-11-21T04:35:22.303000
CVE-2019-19782,0,0,a0036089ee458c9456e026b83339e480a87f9e71ca283927773c2325e9a31bcc,2024-11-21T04:35:22.470000
CVE-2019-19783,0,0,add3b3f124763fa66d62282022ce91a01c9865b9656c22fa081ff8f967c16893,2024-11-21T04:35:22.613000
@@ -136926,14 +136926,14 @@ CVE-2019-19795,0,0,e6dfa1f071024abb25ac3c1e3ed1b767f1762852edb88760e3512fccb279b
CVE-2019-19796,0,0,776e4ccd88e79baa0e55ce00130cfeb173ccf47faef62b02aed675d1936c0e40,2024-11-21T04:35:24.390000
CVE-2019-19797,0,0,54b66a97810dbe2479aed557f7251f959ad8b4b677b498b044861653e985589c,2024-11-21T04:35:24.543000
CVE-2019-19799,0,0,98f3b7ff54dd97f6e7b478b2368c8833222e0af435fb023fb1ad986aa92f2e66,2024-11-21T04:35:24.717000
-CVE-2019-1980,0,0,f7951e2293b105a6b6eb77ac05d127ad8c22b9f42679fe29198023e3623d4328,2024-11-26T16:09:02.407000
+CVE-2019-1980,0,1,c1a0388de9ba6cd2f1774fcce2cbc477af88afa54cb4b7abf6837d4648587ca9,2024-11-26T16:09:02.407000
CVE-2019-19800,0,0,db855a279500bff5aec313c4db2ede0a5015b056bc320ca8e6c0763d197eb24f,2024-11-21T04:35:24.873000
CVE-2019-19801,0,0,c30ec1c0d554fc27db2f8961a1741c136cc3a98f480e3a3febea8515c0d65dfd,2024-11-21T04:35:25.043000
CVE-2019-19802,0,0,dc00b3b210fc719b3c0777ca80fb2155dbfe313b4f177a857ff4c552c0a09862,2024-11-21T04:35:25.213000
CVE-2019-19805,0,0,2df1954b9f8fc5977a9bd5c05e08d228a0d3508955829c4158818523d1dcb13b,2024-11-21T04:35:25.370000
CVE-2019-19806,0,0,193212eaa3501cac7fd2f6ccfa2b05ac749d120464d0355900f57dcafc0cd238,2024-11-21T04:35:25.517000
CVE-2019-19807,0,0,28c81a3fcc81e990010fac582309e73eb9207b0eb40da9f0662a1184bfdcb3dd,2024-11-21T04:35:26.217000
-CVE-2019-1981,0,0,5726956989b7597898b9b5fb3eb7edc906abaa329ff309495eb9f882e2f8364c,2024-11-26T16:09:02.407000
+CVE-2019-1981,0,1,5a445b35ec5fa1add7137442b697be9776515b590450fef35bcdd02efdda9975,2024-11-26T16:09:02.407000
CVE-2019-19810,0,0,da604d2d2067e1ca5df740c2ee4ab35623fcb060ae082ae72f6d48c4f22cd888,2024-11-21T04:35:26.373000
CVE-2019-19813,0,0,cea5cb19cbe3211f4b95117c380765e8d67abf9d581bf45d611507a219afa9c0,2024-11-21T04:35:26.520000
CVE-2019-19814,0,0,b0a67844202936a83a5c01c421e2f1208abbc30dc4d052412709f81f6ed9a363,2024-11-21T04:35:26.680000
@@ -136942,7 +136942,7 @@ CVE-2019-19816,0,0,04774217158a8a3db89ab7a6b6f53849d155a8eefb4d06fba21b1becd8c90
CVE-2019-19817,0,0,e80210c5941e92d110544198c2c9505e9659831282e556dd60c1c113a3712ad4,2024-11-21T04:35:27.123000
CVE-2019-19818,0,0,51e98f02ee5ca372634d6f252024a24a501e7b8d38043640d9503889eea14b3a,2024-11-21T04:35:27.270000
CVE-2019-19819,0,0,68a6f39f1e75ebd2e81ebf30b32ee7b8ddf48c94689cc8d3c3821cf471479fb6,2024-11-21T04:35:27.413000
-CVE-2019-1982,0,0,994d79687b30edcd5ed57d6402069b55de5bb425dda94bc4155e42874df33a3d,2024-11-26T16:09:02.407000
+CVE-2019-1982,0,1,8efa58c69908d6eea3ccbe257d568f810eff9a2f6746609570f88c728d64b9bb,2024-11-26T16:09:02.407000
CVE-2019-19820,0,0,2ca290b0620bfa061fa60d62d30d01da88a98f397b963533c498abc8bab8c977,2024-11-21T04:35:27.553000
CVE-2019-19821,0,0,d8e6b319d216c9b586ebad3f45f345b3cafc9c8f9f47999edaa11f6e20a587b1,2024-11-21T04:35:27.707000
CVE-2019-19822,0,0,1a042204199269de9263f34d518196228faa7e74d982042f9ca442c1f691fcfc,2024-11-21T04:35:27.863000
@@ -136951,7 +136951,7 @@ CVE-2019-19824,0,0,8f9e09446662f963c8757afe30640463e50772fc4597b7e4b90ef41612b84
CVE-2019-19825,0,0,389c369a6b2b7398b1297199921e753976a96e149a8f34efff96dde9ef58e72e,2024-11-21T04:35:28.407000
CVE-2019-19826,0,0,a34c30a9fe7a5161754a9126b6204345e08cd2c42e37e1be01be24437f9f04b5,2024-11-21T04:35:28.570000
CVE-2019-19829,0,0,33ff84cac4f9740a051a8dee165de131aa506050d451724a44dc281ca1d590a1,2024-11-21T04:35:28.720000
-CVE-2019-1983,0,0,37940d2d98ab215ae51f6af144819ac63b211cb8fdd7931163ce93b26cd3f591,2024-11-21T04:37:49.387000
+CVE-2019-1983,0,1,c639347c3c172e30fcb1ec34d90a41e335937f7760504104921dbd928fb57189,2024-11-21T04:37:49.387000
CVE-2019-19830,0,0,31025b8a031fd90140bcdf3f777007f5042afb4a79190444b77d37bf4883c5a7,2024-11-21T04:35:28.860000
CVE-2019-19832,0,0,f0b00c4e155f62b8def17242dd48fdaaf414457792426ce723dc4a20009eb1a2,2024-11-21T04:35:29
CVE-2019-19833,0,0,c5f0a590516037512dc2b55666878f3627e651166adb7114a8606b440b39088e,2024-11-21T04:35:29.140000
@@ -136961,7 +136961,7 @@ CVE-2019-19836,0,0,71376899d4598788aa1d8a17eae82f7983224490029114a223fc354daf442
CVE-2019-19837,0,0,7a375a6fb076c67a65c5931d6db0353afcd0024afc13009c46a3657dd9e9ab26,2024-11-21T04:35:29.750000
CVE-2019-19838,0,0,85322b190e54c8feb904c80fcae7b6dd4c01c371e3bc2021080b6c1656338afe,2024-11-21T04:35:29.910000
CVE-2019-19839,0,0,d78104385bd5493c68438e29df34d594df92ac839985734c85d5b0344cbbcf69,2024-11-21T04:35:30.070000
-CVE-2019-1984,0,0,85766d58114fbe08a7a41ce2c0b1a873bc86cce1ecf4a013be31df09af1815ea,2024-11-21T04:37:49.523000
+CVE-2019-1984,0,1,c519c2a637febe7bd922528cb308ba5e5501a7bff7e024635e6c63dfd4d220bf,2024-11-21T04:37:49.523000
CVE-2019-19840,0,0,8e6436762b4c3473387c90844251e21000789aae500e45b8e5c892655aa6d9d7,2024-11-21T04:35:30.237000
CVE-2019-19841,0,0,b5f5456f4d7835648c730d71aaad6e651101c177a6b92a090f5fe67f97146763,2024-11-21T04:35:30.393000
CVE-2019-19842,0,0,ac195d4ebd687a52b341790ac893ff051653a2fb077ea8d9c78fad3674d665c1,2024-11-21T04:35:30.543000
@@ -155339,32 +155339,32 @@ CVE-2020-26052,0,0,ecc1cd460a93bbd694bb6debbc8c084679c3c1c2d3cf2afd85047a94ea98d
CVE-2020-26053,0,0,7c7f74e869b26ac6fddfe010b02541c7f47338a10762619f17be95bfa6d71909,2023-11-07T03:20:28.813000
CVE-2020-2606,0,0,19018d7f204a6997b0438abcb1650c77b3f897fb486c631ac2b6337d0b21f095,2024-11-21T05:25:42.730000
CVE-2020-26061,0,0,3358d0b78c1e4eef151523d4a2dc48d10c740d1d5546b33adb2108328b6ee7f9,2024-11-21T05:19:06.930000
-CVE-2020-26062,0,0,ee0aa6d9900921b3fb00943bc419f6911777f7c55d2b22e86a0895cb40fd4a39,2024-11-18T17:11:17.393000
-CVE-2020-26063,0,0,8de54d3a22e587e2c19346a270d6d82ab1700cbf197f9d561e2994c940225184,2024-11-18T17:11:17.393000
-CVE-2020-26064,0,0,c32cb7afd8329d307aa316bb5d24e1d011fcfc94cc289292cd87c5072338ba49,2024-11-21T05:19:07.480000
-CVE-2020-26065,0,0,d3c06175ddb3a7f2aec06e3e16d9b0bf985360b3634cb1ac31748f730cafb4e7,2024-11-21T05:19:08.080000
-CVE-2020-26066,0,0,84d6722dd4cb218aea54c6b68635e1556b00d56c0168168023e7a7971857cfbc,2024-11-19T21:57:56.293000
-CVE-2020-26067,0,0,a924a2419eabd45d1909dfde5ae25a8ab5977675ce0bcb0eef02d3b423d83d2d,2024-11-19T21:57:56.293000
-CVE-2020-26068,0,0,625c8858a8e15f1077ba03610225851d8712b45a54da5d9aeaad9b36180a8202,2024-11-21T05:19:09.690000
+CVE-2020-26062,0,1,d41e428301c0b7156efb8dc16a14e1b88102f84e7f2b61ea48447e31fd923356,2024-11-18T17:11:17.393000
+CVE-2020-26063,0,1,331fc511f73827a86dfef19c2f00fcfa388fb65ac57fb4f31489d5c14a4280b1,2024-11-18T17:11:17.393000
+CVE-2020-26064,0,1,30481ffb18b1357731f53799ae0440d3e9a0390dd69efd74204c51ed31746727,2024-11-21T05:19:07.480000
+CVE-2020-26065,0,1,81d5ce435f838770bc29bd8e76383a22420c3c956cb83b3b55f57650b7fbde32,2024-11-21T05:19:08.080000
+CVE-2020-26066,0,1,7e50d19078080d8b92ed27e4c42ea5096808b302a561a1cdc7f14b89e64463ef,2024-11-19T21:57:56.293000
+CVE-2020-26067,0,1,fac453068b4c47f21b94773dbb105d44e28f6f954c4cd12683827a4c3493abb2,2024-11-19T21:57:56.293000
+CVE-2020-26068,0,1,dadee6f509a5ac29c78006523ed144e26c3999460b8fe5a781a900aafb68544d,2024-11-21T05:19:09.690000
CVE-2020-2607,0,0,3a9cf25847436bbfb34e547916cc997569ff3b2022d16f042a408040776d2c17,2024-11-21T05:25:42.870000
-CVE-2020-26070,0,0,961be733f566afc5a84b0dad57e992223b9bcd86d6848f8096f02da65db56bf6,2024-11-21T05:19:10.127000
-CVE-2020-26071,0,0,01f8cee45bffde4cfb7fcb491000bfd76041fc362de8a55bbc007c90118a7e22,2024-11-18T17:11:17.393000
-CVE-2020-26072,0,0,449297dcc1a77077ddb356fc23ee32a202918dad3f9fafae0d29ffa1acf80d56,2024-11-21T05:19:10.397000
-CVE-2020-26073,0,0,e0439c6adb29d26ec3950cc8552491247439235e02ac8df1d89eb05d016f3835,2024-11-18T17:11:17.393000
-CVE-2020-26074,0,0,f0e1d32189de4328fb092c0067797f82f7f06110542bdcdfd94a6440bd77ef85,2024-11-18T17:11:17.393000
-CVE-2020-26075,0,0,69e701fa9e3a71fea7ddc9fafff429d7b7be71401770becbde5b0f07ce836ee0,2024-11-21T05:19:10.853000
-CVE-2020-26076,0,0,a06a658e7fd29b00c48ee05f0ac1cd577c4994cf25409694dac5cb9ffa05446a,2024-11-21T05:19:11.020000
-CVE-2020-26077,0,0,350280a0e24d8dcde5a2893a29929be89aedff159bae5f6d13dfadf95b405892,2024-11-21T05:19:11.197000
-CVE-2020-26078,0,0,c7a71b6281e8e09710e0ddd21a12c233cbdf6777cb31a81e8ea141dd9669d5b0,2024-11-21T05:19:11.363000
-CVE-2020-26079,0,0,61cf93c8d1cedd516ac7e757c07a3436dd38229d2c784cfe08c369df9f17460f,2024-11-21T05:19:11.533000
+CVE-2020-26070,0,1,924746ce51e24368ef8feb9d6a608d22d544df19ef88a162a3b78a8ecfd05185,2024-11-21T05:19:10.127000
+CVE-2020-26071,0,1,0882d7dd45c6fa7e709fad6aca982613662ad3ae92005f2697a755f9e5cf60ba,2024-11-18T17:11:17.393000
+CVE-2020-26072,0,1,ed4a464a09ba04b8400f12b487d4af28b1fe8acbcbb89022bad43d66b1693b38,2024-11-21T05:19:10.397000
+CVE-2020-26073,0,1,a3c6693ecedcfd494e552859007d600e72822a8b33e09989c9447118abe80352,2024-11-18T17:11:17.393000
+CVE-2020-26074,0,1,47c25486660bad4c92222d2296232728f690202dc5c37c83f4b3e499d579f092,2024-11-18T17:11:17.393000
+CVE-2020-26075,0,1,25f8711bf4e2f90e8598e92b9c51b98dce59de1320a43753e474b34dec130fd8,2024-11-21T05:19:10.853000
+CVE-2020-26076,0,1,ac7f49982c6eb67f361d5f69027f832aab4d240d713758f9db39df42642b0dab,2024-11-21T05:19:11.020000
+CVE-2020-26077,0,1,f353ae7a21f1ecf278157200f508f04d17e49128489394b2800f0e593ee5ba8f,2024-11-21T05:19:11.197000
+CVE-2020-26078,0,1,3f431b9b6a2c0c8fbe437f7d73fb1bb8e3c6515dc5d7eb933c245d18662eb4a1,2024-11-21T05:19:11.363000
+CVE-2020-26079,0,1,b20bafc866ac7c9ec2f31a9e9398b9b30bed73447b7a39e82e6365ac018288ae,2024-11-21T05:19:11.533000
CVE-2020-2608,0,0,146d52baf92b4c8a819cf00da66d60eac7a899555a4f8f2253f24d03cfba7219,2024-11-21T05:25:43.033000
-CVE-2020-26080,0,0,e6d00332fba5bd2754c57692a1c6247e8572b8d4b96528aadde65ddaeaa813fd,2024-11-21T05:19:11.697000
-CVE-2020-26081,0,0,07f65f2944510662478c9e1ea63586acaf5592fc0218aa3d283f6f2e81bc057a,2024-11-21T05:19:11.853000
-CVE-2020-26082,0,0,b025fe9c1b3c0438b528f0778d7b18efa15767ef7bc36a5b6a30def85ceda66b,2024-11-21T05:19:12.007000
-CVE-2020-26083,0,0,4ef53abe4c127183f1bb6e11c55970a5cbcfae6351d60d2e86ed4d2fc2a428f7,2024-11-21T05:19:12.180000
-CVE-2020-26084,0,0,9f6faddfd81956c0bad79d0f7696522f90069c88da654189e578be26fa9f03e0,2024-11-21T05:19:12.340000
-CVE-2020-26085,0,0,4ad8aa122896777b9fa8370bf8e9c9e943e13a7e9474b0246ae1f39cc77bbad7,2024-11-21T05:19:12.493000
-CVE-2020-26086,0,0,6fe82a5120cf13d2d2d12db85c247dd432dab0c0618de03933ea48c3adb6a0f0,2024-11-21T05:19:12.650000
+CVE-2020-26080,0,1,7c4cd7f348c3b91666255756fc90d99a853c487aa52a782b1f4341597e922bed,2024-11-21T05:19:11.697000
+CVE-2020-26081,0,1,bb99c3ccab4309a5f10c26db67f4740d284cce78b245f73535d575c82138363a,2024-11-21T05:19:11.853000
+CVE-2020-26082,0,1,c4dcaa1d03438082a7a779e76c9bf69e6ee5e10e90f4ccc1d7c4b926ae039afa,2024-11-21T05:19:12.007000
+CVE-2020-26083,0,1,840530137d522c93e20b379b9a76ac5a1dad8a2c23eedc715644c72b8cace42f,2024-11-21T05:19:12.180000
+CVE-2020-26084,0,1,4b35cc7c6d04a58f8d9f1dd5a41416ffa5a4bcf2903df2f3a1954fe69ed703e5,2024-11-21T05:19:12.340000
+CVE-2020-26085,0,1,01234b79da4d2663807b795352cebf82ee4b3dd81b7f48d7948e4ee669e7035b,2024-11-21T05:19:12.493000
+CVE-2020-26086,0,1,c0991be3aa5b2942082491c717fd25dfa1dab0c3f76443bad6c75c48dd03d54e,2024-11-21T05:19:12.650000
CVE-2020-26088,0,0,45709e0b483409f9f9b0c3507012e3737bb1df92a01eab6d261947b3d20ecab6,2024-11-21T05:19:12.810000
CVE-2020-2609,0,0,c023719a5603c63ce66a14d01238d4a6a448d56b01e1792493617d2647f8ea6d,2024-11-21T05:25:43.183000
CVE-2020-26097,0,0,9f09d21a55850c2332c020c76f2f04f22467678c07a6baeb1ed6048deeb9e0c8,2024-11-21T05:19:13.010000
@@ -156133,21 +156133,21 @@ CVE-2020-27098,0,0,57ec9984fdf30740ba42544ad78cff9ee00d3af91367ec0a832b0816ffd5b
CVE-2020-2710,0,0,b83af41d31913f9731bac5a3ff81c0c9d5b47f43896218e2a7a934a0f8d44426,2024-11-21T05:26:03.707000
CVE-2020-2711,0,0,4d9efcc78dc3e6652a9d1b16d7a789a8a7814e844148424b84affe8e51ef1131,2024-11-21T05:26:03.870000
CVE-2020-2712,0,0,08b757c33677e175d88951294879c974e48b9d0ac3e1ae918d3e31cd8fee79fa,2024-11-21T05:26:04
-CVE-2020-27121,0,0,c6712f1ef7d891fb54e45bb6876b068e61d1447021da750fe100e8116ed32daf,2024-11-21T05:20:45.200000
-CVE-2020-27122,0,0,f869bf5f6a106be0196ac948764d479928750f15dd24c28fe634d310cc960091,2024-11-21T05:20:45.307000
-CVE-2020-27123,0,0,a2b71e150da8956fe75c6419c25d58cdaf2073864c548609f846904f3efb2a2b,2024-11-21T05:20:45.417000
-CVE-2020-27124,0,0,1a144df624b907e6724c8cc8cc7b1c2ace8bc63b0ca41a4ffda5e499c6afb4b7,2024-11-18T17:11:17.393000
-CVE-2020-27125,0,0,c67331c86d0ac4d18363dec8e4c776c894fe157f0fd727e1263f554a50325e85,2024-11-21T05:20:45.610000
-CVE-2020-27126,0,0,1ceaddb3b1bd7e8a074f8aa8012c9135d4b6eb10b841d87161a09dfd0da7793a,2024-11-21T05:20:45.723000
-CVE-2020-27127,0,0,90d1346616f72e3a39cd04bf765f599a9c1e3db375e8fc889db32700a471ec0b,2024-11-21T05:20:45.827000
-CVE-2020-27128,0,0,86bbb2fc2247f8a0bd6a4df3febf1824c30e9abd8e65716641e8094f4876d30d,2024-11-21T05:20:45.927000
-CVE-2020-27129,0,0,358f800ff4ce245b0f548bd31d5e68bf567add4f2ee74819daf0dc2b461aa7c4,2024-11-21T05:20:46.033000
+CVE-2020-27121,0,1,96864349ba1bf5e850f839bbd4e16ac66a324198ed52ac8c401514132c6d0718,2024-11-21T05:20:45.200000
+CVE-2020-27122,0,1,fa957e0af91c39435ee824615776b84cd23889a7a899bbfb33debd09710f1685,2024-11-21T05:20:45.307000
+CVE-2020-27123,0,1,a0ba357fc8662665039eb11976bc85300459347bdddccdbe265c65f80adcc57e,2024-11-21T05:20:45.417000
+CVE-2020-27124,0,1,db7c88bb81f36182bf1b61c85a42ea21d7d5327beaab1050e9eec62366314a98,2024-11-18T17:11:17.393000
+CVE-2020-27125,0,1,8c9a96945c6fd66026eecc8309688c22a9ffca0e0dac110c24d496cd3f2b71b9,2024-11-21T05:20:45.610000
+CVE-2020-27126,0,1,91c6b692ae64d424eb3ec7792cefbd39b9a25f64eb65dcbeccefa201f28f0489,2024-11-21T05:20:45.723000
+CVE-2020-27127,0,1,a2a3ba9c07661f3a98a8cdb2aba35bdd3f582693d9d210e96348b4502522f03f,2024-11-21T05:20:45.827000
+CVE-2020-27128,0,1,26d7dfa3be361b25c3feca51e565e6feb988af3c662684576470a58b1340968f,2024-11-21T05:20:45.927000
+CVE-2020-27129,0,1,4ea036129c88e6dcb91783174c550c7d2173667a43f00ae461e6d6be19a87fe6,2024-11-21T05:20:46.033000
CVE-2020-2713,0,0,3cb33014b556546e8a1d3dc0818f61683fbffdd12dee61ce1cf3d7eca7ffc4d5,2024-11-21T05:26:04.140000
-CVE-2020-27130,0,0,ef101fa8a9830ed307612cd834a86182a027770bf5472d56b81a846c619acaff,2024-11-21T05:20:46.133000
-CVE-2020-27131,0,0,d88515fbc2f659e662efccfadd5f99b27fd6fd9f41e17ea6d70ecbceb7ce62e9,2024-11-21T05:20:46.233000
-CVE-2020-27132,0,0,19aff00af6c29eea1450598333e5804ba92e0c379874d4e729c8514439226741,2024-11-21T05:20:46.337000
-CVE-2020-27133,0,0,892f5890bb273922554d8dbb3e992168adf07b7591f8b369fe6b5af889c606a1,2024-11-21T05:20:46.447000
-CVE-2020-27134,0,0,63029de508c89445c247473f68678ea9281ebcd9f2c6f42707b82cdbf64ac46e,2024-11-21T05:20:46.550000
+CVE-2020-27130,0,1,0b2ccc1f1f428390183a4d95e971f7d27fcbeac5ac7dc36f8a9faf9c1c656a6d,2024-11-21T05:20:46.133000
+CVE-2020-27131,0,1,ed7a95d92bc358338b5cfef9f904662e8b981d248ea696409571b632c82510db,2024-11-21T05:20:46.233000
+CVE-2020-27132,0,1,fc1f659515b5f9a9cc0f4971d5652e7bb43d859b5817a7dff57e58e87b0538e0,2024-11-21T05:20:46.337000
+CVE-2020-27133,0,1,e63826322690911bbfef1b7b43f8a3812bb9676ea7bdf743902941e67e5d85a2,2024-11-21T05:20:46.447000
+CVE-2020-27134,0,1,1c66d50adebbb1ea5097781ee1a2976fb3383e5115531b1e55af7caaf144aea9,2024-11-21T05:20:46.550000
CVE-2020-2714,0,0,e01cec13811060f1e71f6c5a6c84d2eb8546f3553789c42d6a08668e4d407376,2024-11-21T05:26:04.277000
CVE-2020-27146,0,0,ebe3bc4e3f9549323dd0ebffb49b0419d4341460df659d3440f8f2e7b3357848,2024-11-21T05:20:46.660000
CVE-2020-27147,0,0,3da12e460d4f754baad171774fe3dd269cb18d1c3061a590b76dc2909de171cf,2024-11-21T05:20:46.773000
@@ -157816,400 +157816,400 @@ CVE-2020-2981,0,0,afaa91d6aea5c4cbcbc5ecb2f13a27b6bbcbe9ded21a873788c273cd4ea683
CVE-2020-2982,0,0,e9530ce1f846cc0ca0fc93a82612ec3d5f8f28a3dea9716ecd34a6ae7245cda5,2024-11-21T05:26:46.710000
CVE-2020-2983,0,0,749aa4baa1ada3d5b359eacf7cbce408a695d734c0b5418cf6c5921bb90a06c9,2024-11-21T05:26:46.850000
CVE-2020-2984,0,0,401800c682153b5188296dd780a88f2ffaefadddb5732d4e18ceab9c7535f498,2024-11-21T05:26:47
-CVE-2020-3110,0,0,afd897a43bf1393ee586c15460f5e9ad2579beb366010e7b85db7357628fd324,2024-11-21T05:30:20.743000
-CVE-2020-3111,0,0,efe4ca8f55f3abd665459af444f2e2dcf586ca207190f5d44b900f77f13e498c,2024-11-21T05:30:20.897000
-CVE-2020-3112,0,0,c124a0b2f3d169945a762e3e5fcfa3fbdbf9b5dc741ea5c0d354311b9df88b0a,2024-11-21T05:30:21.033000
-CVE-2020-3113,0,0,becd25d828caec44f5381d5785d288da1184a19b41801196ab6e5ae478082ccd,2024-11-21T05:30:21.160000
-CVE-2020-3114,0,0,c3d7bb9678cfffbe76170ae3c661a408703e19b6ba25f4ed8c8024012f4db086,2024-11-21T05:30:21.277000
-CVE-2020-3115,0,0,069744eb310b1094e7641658af0927af25478e0c92ab55a2e05deaa0448539c2,2024-11-21T05:30:21.387000
-CVE-2020-3116,0,0,4e11a3589924f8d6c030fb47ecf4bc1f0b045980cf05551f23e5e30d45ef161e,2024-11-21T05:30:21.520000
-CVE-2020-3117,0,0,30bfc58b0f7a9b36bf9b1d83db5fbb203f3473a5b63c3b61fd6ae054dcca6187,2024-11-21T05:30:21.650000
-CVE-2020-3118,0,0,2d0f212069356878a64663817a00c1a29c7c28582a0ff53efc7ee6d7ad26f24d,2024-11-21T05:30:21.770000
-CVE-2020-3119,0,0,6592b94bc5eb3e5539c968c6bb3f8fc72bdd1d9c3ea4107251a5e0392507762d,2024-11-21T05:30:21.903000
-CVE-2020-3120,0,0,c6b16dd9ab4780b55c65aa38ebb4b20c095f34e3f65f8f83e11b191b4c05d011,2024-11-21T05:30:22.057000
-CVE-2020-3121,0,0,d00fb4350d17ef545e9c6ad7f87bd0e416560f097886740bbcde6fad5604d797,2024-11-21T05:30:22.217000
-CVE-2020-3123,0,0,89793a250c8569ffebba14566b75000fdf9f81b29055bb288fd4b760809a854a,2024-11-21T05:30:22.373000
-CVE-2020-3124,0,0,c9723d832a7136fe6db63a83723149ba7f19fdb14a82a11f6bc7d4c4866fe6e7,2024-11-21T05:30:22.513000
-CVE-2020-3125,0,0,6ca3a2ca40599a2ac6a747e56ed0ba8fe24f94a7d89619b03bd9c6d8f4db0468,2024-11-21T05:30:22.623000
-CVE-2020-3126,0,0,aa85db44db3b4b938735f2bffada1a159abb715ff6ec1be2a878ec9087ea78d1,2024-11-21T05:30:22.777000
-CVE-2020-3127,0,0,5da3717238e44887fddb7c00c0bf96f34626e880dcca59817584f13ccabb471d,2024-11-21T05:30:22.907000
-CVE-2020-3128,0,0,bc271ead6e1ad73d7376e0d84e4a3d5fa326684246c1e981d971b312425298f9,2024-11-21T05:30:23.040000
-CVE-2020-3129,0,0,16e0a0063b97b408dddd7a6d5c9f01e4ef157e9f5de4b62cc9ab3e7e193b631c,2024-11-21T05:30:23.160000
-CVE-2020-3130,0,0,cf437527e572133bb8fd621b26dfb81c9f34fa6b80d92183bb80d960606a16de,2024-11-21T05:30:23.280000
-CVE-2020-3131,0,0,5c690af3e8398694b48d3b99eb143f1cfaae1708b2d3c895cde5ba09ca5b8bec,2024-11-21T05:30:23.407000
-CVE-2020-3132,0,0,5553c369888360b537e9030195b119f8c8773d40e65359980c1ad66d86bc1a54,2024-11-21T05:30:23.547000
-CVE-2020-3133,0,0,1ef8c4661646bfa6af5c26d322860e9e8c9efc0801aab4da6e4d8f5ff2bc2afa,2024-11-21T05:30:23.663000
-CVE-2020-3134,0,0,e0da136ae8a23513fcd7c8bda8f890227a9c0400d2fe8b8c9b06208225994e8d,2024-11-21T05:30:23.777000
-CVE-2020-3135,0,0,a36504af06ab82cb2a9fc30e1239697d3d09ab251375aa76c9f46a4c7515b83a,2024-11-21T05:30:23.893000
-CVE-2020-3136,0,0,e80114a98ae07caeae19c190b1e30cce0deea8b7f4512146d13985d5ba14bd1c,2024-11-21T05:30:24.007000
-CVE-2020-3137,0,0,7711033a52b40505f23b7c083fe9338d53479d6c11ca98c806a180a15df0f6bc,2024-11-21T05:30:24.120000
-CVE-2020-3138,0,0,c059ac9680e9a4f1da1aefb3bf1806425c103747fb70ebf0f6dc575cafa80133,2024-11-21T05:30:24.233000
-CVE-2020-3139,0,0,74f5ac082f7091f0642d1e43076b7e0f8b36712d24b6bb4744acfc8af741e121,2024-11-21T05:30:24.350000
-CVE-2020-3140,0,0,5e2aa1cdbd5547049d304cea640ffdd027344d17e51d793d28d18f8736bd1baf,2024-11-21T05:30:24.467000
-CVE-2020-3141,0,0,00ab2c07582c2594fcabec05a7f37bd3e0e64a70a772d3a583145574e7ea02a1,2024-11-21T05:30:24.590000
-CVE-2020-3142,0,0,f4428689e9bb5500bc11f6047d796497d31ab8de6fd59052aa228d665d9c6e91,2024-11-21T05:30:24.740000
-CVE-2020-3143,0,0,fd3e9a67e60ed24e447dd777c3b37fc04fb7d15b4ecb97826431a75254ed2b96,2024-11-21T05:30:24.860000
-CVE-2020-3144,0,0,1816e7288d58bbe1333ab64236486ff0ab6023220abbd1b1fefc6275b9ea280b,2024-11-21T05:30:25.007000
-CVE-2020-3145,0,0,51b0bf2f6432f86481d332883bd4c76656072edd5714064b0f31b249c8a98612,2024-11-21T05:30:25.127000
-CVE-2020-3146,0,0,31fdf026841df01bfdd1daf298dbec591b3a92df1207d1c16b9685e9e89f7b16,2024-11-21T05:30:25.247000
-CVE-2020-3147,0,0,3321f686d9427eb87233e1249a62f5b8ecca80377203c34c710622754e6ab202,2024-11-21T05:30:25.373000
-CVE-2020-3148,0,0,9b48b48cd6f03b5549c9064780aa193e273a0543aa2f433e153c5d16dab21163,2024-11-21T05:30:25.577000
-CVE-2020-3149,0,0,43bb63d54ceff8f396a971dc0326aadc4bea499867cb24ac12099553d1b6b204,2024-11-21T05:30:25.700000
-CVE-2020-3150,0,0,b853f9e95d040468ee2f87b13cf6aba238538ea6e2beb43ba25f42ff4a36915f,2024-11-21T05:30:25.813000
-CVE-2020-3151,0,0,e8a1604da43961174a5327ad9d09072bb66ace31c6864c9d3421c03c7806e205,2024-11-21T05:30:25.937000
-CVE-2020-3152,0,0,4769760cb568c7f649331850de1c29385fbb17cee3a970bb157e6a057de79675,2024-11-21T05:30:26.070000
-CVE-2020-3153,0,0,edba375e573670105fc4d97de830c9304ba1a05d0cc56abf34f48c6525afd269,2024-11-21T05:30:26.193000
-CVE-2020-3154,0,0,4f063875ce0aab0e63b3d7fa930f209d7a4903b8f8c8c08965aebf21deabbb38,2024-11-21T05:30:26.333000
-CVE-2020-3155,0,0,b1370958d753b4a4b426067ee77ce701185d440543f1e69c077af814cc7121b4,2024-11-21T05:30:26.457000
-CVE-2020-3156,0,0,0a795d9f021c24be92c6f384d4821eed680415456345b335894dc027aa6d139d,2024-11-21T05:30:26.580000
-CVE-2020-3157,0,0,a50b9699c2e0276deac1d226a7f679b8dfba302d9ab934723ab0aa1212080d09,2024-11-21T05:30:26.703000
-CVE-2020-3158,0,0,d7826fa0a89499169b9703ca9dddf6997e23dfdd12f25e1445dd951d5cd8f1dc,2024-11-21T05:30:26.837000
-CVE-2020-3159,0,0,88280f3a74c743a4ddb71b282374f6c11f395d9201c1ed8bcc73eb39b52d843b,2024-11-21T05:30:26.970000
-CVE-2020-3160,0,0,2f36bac946bbd95681e9c41ea894272e9b5701a232509d7fe995e85fc06e7e01,2024-11-21T05:30:27.080000
-CVE-2020-3161,0,0,b113d38ae573e689c2c56153c55e05506ca87acbf0fc71401d8d0846c6ebec01,2024-11-21T05:30:27.190000
-CVE-2020-3162,0,0,b8c8e8661e3ddd6fcadf0b82adfe50dc83d522d53dc6707d7b2d64c2c10f9435,2024-11-21T05:30:27.343000
-CVE-2020-3163,0,0,c889c18124b0de8efc3ebb6640d37764cae69cc66c314d3ce4cf5eebe75894f1,2024-11-21T05:30:27.467000
-CVE-2020-3164,0,0,ecfd9e12fabc297822f59230f32f415c1cda5797957e39fc5787fc2e8fa424f4,2024-11-21T05:30:27.597000
-CVE-2020-3165,0,0,73910ada30f44b514b1e13776a3241c263d8572935aecd30277984bf1d2ce507,2024-11-21T05:30:27.747000
-CVE-2020-3166,0,0,cb56907a956d13cadf4277a809c8703990d803f4a03469a61c8254a36e1a05c5,2024-11-21T05:30:27.887000
-CVE-2020-3167,0,0,207c3818ae0626b944b77d0ec48d13104638ecda49f999d552cde33d37f1b4da,2024-11-21T05:30:28.020000
-CVE-2020-3168,0,0,c7d046d304b9d4335a821beee6ed857acfe1e0e865fda391fcaf3ab3952e7539,2024-11-21T05:30:28.170000
-CVE-2020-3169,0,0,94784d04a5dcaf2009380d467ba831b357c4866f85f4727b29e8fa1f319b5548,2024-11-21T05:30:28.293000
-CVE-2020-3170,0,0,e9b281508e46f4066da99dbbf97061e9936b832a8786545b06e461a9ebf808a7,2024-11-21T05:30:28.420000
-CVE-2020-3171,0,0,ff5165c19d486884889eb41ae4605649007f1b7950bfe179e4065dd38c29fff0,2024-11-21T05:30:28.543000
-CVE-2020-3172,0,0,fde8fe031aa8a78aaae255ea1a1e85fc344b8f5bded4df85585461ebeef96f69,2024-11-21T05:30:28.670000
-CVE-2020-3173,0,0,58f6ba48b1f82b0e37e2c5cb6b343134008351141a0292a7deea2ae5a4d66490,2024-11-21T05:30:28.820000
-CVE-2020-3174,0,0,c625cef78dd0552974ba7e290ae3c3c5202579889170b4616fe2195487b2f062,2024-11-21T05:30:28.930000
-CVE-2020-3175,0,0,6cdb9e4a669beb25e52bb642f1e8138f71322f5cc410c9d1187ba2824bcdc8b3,2024-11-21T05:30:29.070000
-CVE-2020-3176,0,0,e62811735a32a85efb9912f1eaaeb6b74448ac926e3ffaf0c5495661f3b1748d,2024-11-21T05:30:29.177000
-CVE-2020-3177,0,0,1eeec2252e06480b8ab71bd442ac44f5afc5055009d9e559831c0030a0e030fd,2024-11-21T05:30:29.297000
-CVE-2020-3178,0,0,510f4f95b6279c6d596542aab5c6c444b86559c6e933967f03315433b870ea8c,2024-11-21T05:30:29.420000
-CVE-2020-3179,0,0,551f1ee17360b9107df6d76ce4534cddf07d81f083568156baa53e56a246f93d,2024-11-21T05:30:29.540000
-CVE-2020-3180,0,0,8bf4b4c4a1c03f17bf94e7c79d99e5fe609c170401fb8ade4f59ebde7a2faf78,2024-11-21T05:30:29.670000
-CVE-2020-3181,0,0,a243e51d54ac1ff4a7added528ccd50690440d929bbf6bf311d15993dc2cc0b0,2024-11-21T05:30:29.790000
-CVE-2020-3182,0,0,3d0377a44a21133295b531cff4d4c7c0b8ffbe0c56e21c5bda05fa9befc054eb,2024-11-21T05:30:29.903000
-CVE-2020-3184,0,0,f6ed325776edf44a0e6954150b9e7ab8e5eaea566276d9503faab7086811d7c4,2024-11-21T05:30:30.023000
-CVE-2020-3185,0,0,1618e4791ef581bc33ac54bcefde01fa5ad3f084533825a3618b67976a6b4105,2024-11-21T05:30:30.163000
-CVE-2020-3186,0,0,d06e38efb7920fecf5583d1138de57400ebadc9536e8237a0b1f40e147a39c41,2024-11-21T05:30:30.277000
-CVE-2020-3187,0,0,2869f96d8fd0ddb685489427136cbba9fab4d898cd479989d9ccd490d7c62e4b,2024-11-21T05:30:30.407000
-CVE-2020-3188,0,0,4fcc3358f41420195c67a79bb7513345d5a76107b2d9196de55e20dee6818572,2024-11-21T05:30:30.560000
-CVE-2020-3189,0,0,35d71d5b9c90dc62f5f7dddf58e3c33cf4007d25e3b2ed609992f8a359e60301,2024-11-21T05:30:30.713000
-CVE-2020-3190,0,0,a19ac4c45b298820aad57e7ca2a69ef5f66f27d4e2119f76b703f91d24b4e3ec,2024-11-21T05:30:30.857000
-CVE-2020-3191,0,0,2826d8e0f608e29842b2ad26dc863955ba5b03983c8909bb554835abd0c115c2,2024-11-21T05:30:30.980000
-CVE-2020-3192,0,0,758450d5e7d8a862c7729c5c8cbd538412c4a009e32ccf20d3750d6f92d19dca,2024-11-21T05:30:31.123000
-CVE-2020-3193,0,0,7a612d8bb56e607a89cec0e275baaf94f79398c87d78d0ed088caaf0e0dea101,2024-11-21T05:30:31.247000
-CVE-2020-3194,0,0,f6e6ca2807a8c84d98f62e0acef66fba159a8be43fef526ba10a6e260ae8393b,2024-11-21T05:30:31.370000
-CVE-2020-3195,0,0,35ca5149b7f6c2a3453ab996115b615453927634534b5243686c3deacb374ed7,2024-11-21T05:30:31.500000
-CVE-2020-3196,0,0,509c0d0f4df6fb09586b35993ba259cf34f110513e5be6a55228a70c122257f0,2024-11-21T05:30:31.633000
-CVE-2020-3197,0,0,c0135af4c8701e11da9cee86eb2724cf3043d08599d60d78efee0722a323781c,2024-11-21T05:30:31.797000
-CVE-2020-3198,0,0,29a2e632274a54859e10ca88ebb79b8ada44c2ba617ed1f64bf1b47f5618d882,2024-11-21T05:30:31.917000
-CVE-2020-3199,0,0,447b96653facdf24e8a6ad6eee30016f6383b2051c4c4aeadd2ee7a314978db4,2024-11-21T05:30:32.070000
-CVE-2020-3200,0,0,ff86e47f2ea9b7319815882c17943409d63849c47458c7db8cca7eb077422bca,2024-11-21T05:30:32.197000
-CVE-2020-3201,0,0,be9a874aea582cbb3a106fb17c563ad5ff2c1af4387b19551bb043b26e783a06,2024-11-21T05:30:32.503000
-CVE-2020-3203,0,0,f90bc50dd8cf9e2be697eff3a389b82d297e8916197d29196dd0794c860d7aaa,2024-11-21T05:30:32.917000
-CVE-2020-3204,0,0,934adc60f8124bca452a5b320c8efd30af3fc50293fadfdb23b1f913186313d4,2024-11-21T05:30:33.050000
-CVE-2020-3205,0,0,afca35702945972f9a24872cbeacdfdf401b3d523641b78c8bea86a3f2f4863c,2024-11-21T05:30:33.330000
-CVE-2020-3206,0,0,5ee6d9cb132bb2974369447049b18991d16dd8ebfbe64bca61910114c8b3dbef,2024-11-21T05:30:33.470000
-CVE-2020-3207,0,0,8d25164fc4e6d9e10c6f41eff39399d47ee2a6583b7ebadb1cd0ff0462545ff0,2024-11-21T05:30:33.603000
-CVE-2020-3208,0,0,285d0031ac6e89298daeb7cac0060be5873ba06d465f4c5a7275d3ecccbc9780,2024-11-21T05:30:33.767000
-CVE-2020-3209,0,0,0d6c7a9d385b85c5f29b51e690f6618d5751f19b7f9eea62ca5a891bfe4a5cd4,2024-11-21T05:30:33.897000
-CVE-2020-3210,0,0,d238fb170f933e3d179871fffab1e1cdaf0cc6708e260a223735a36d402350fe,2024-11-21T05:30:34.053000
-CVE-2020-3211,0,0,9ff065097ca50244f37608ca5df6c3bc120b0c9206b5a5a642000a869fa019b1,2024-11-21T05:30:34.170000
-CVE-2020-3212,0,0,77e729e7607da40d9a53bad153e3cb39d599f1498cb7aaf61029ebe99437baa3,2024-11-21T05:30:34.293000
-CVE-2020-3213,0,0,497f44042186cf347e66cd0cc250c6feaea7e39f50e205ddb7edfd3075fc4753,2024-11-21T05:30:34.407000
-CVE-2020-3214,0,0,8740f61e0370162adf23b87077c8cf0e5b0f01dc4307847ccbdfb6ad130ea49f,2024-11-21T05:30:34.543000
-CVE-2020-3215,0,0,d969df46933d3194ca2188a1ad86cb70a7e1a8c6cda666492c46cd76846ecc09,2024-11-21T05:30:34.680000
-CVE-2020-3216,0,0,e820036d7e859cf865e60a2d52a0763bddf342f13827cdade0eace4eeba72401,2024-11-21T05:30:34.830000
-CVE-2020-3217,0,0,73687771835413af4b8d2ca5f3d7d391deb7ace7180b3a3a8cfd7f483b1481ec,2024-11-21T05:30:34.947000
-CVE-2020-3218,0,0,3626bf246e70aa45e05104a4aa364adf3dc612bdf176056ee6e88d97ba69ffd1,2024-11-21T05:30:35.163000
-CVE-2020-3219,0,0,1e05d2510b7e9d6c4c08e94ee8a62917eecc22eb7f09a717fcd599080b4d6d60,2024-11-21T05:30:35.290000
-CVE-2020-3220,0,0,e12465ba67cf90df58fea145dc75dd834ebf86aabe75213c5b2850b35fb94905,2024-11-21T05:30:35.417000
-CVE-2020-3221,0,0,a59ba3a8e5adc2eff4b7a174f9c44df6b2fcfad9ae4ba8057bd37a406e0c3619,2024-11-21T05:30:35.537000
-CVE-2020-3222,0,0,38c7847823dda45b77e775dc665eb371391a7fb8052665f6567234a36c5451fc,2024-11-21T05:30:35.660000
-CVE-2020-3223,0,0,3b15571678a0c775c4736134ba197e4f2433373b9f5fbcd288ce15d7d1295e52,2024-11-21T05:30:35.800000
-CVE-2020-3224,0,0,40cc616fb2a812d80faa1798eafa85a31cc12cc9b31e95b3002fcda3f7eaee1e,2024-11-21T05:30:35.970000
-CVE-2020-3225,0,0,bfbfc11e2af1ec97af8ff1f77721ed1e8273fcbc865e497c95ed23668fd64656,2024-11-21T05:30:36.133000
-CVE-2020-3226,0,0,5cfce5ef89086ba62d323f8b84287c27c40ecaaa3c4b950c3f7ba2ac9130e41d,2024-11-21T05:30:36.280000
-CVE-2020-3227,0,0,c042da75e677772374c0d514f4aa48216bc36747085227c76f1d01930b32ee56,2024-11-21T05:30:36.417000
-CVE-2020-3228,0,0,8a3cf3cf104b90b58fdfd9ecab26d8a817226eab7dcc3535123ad2fa1e4cd982,2024-11-21T05:30:36.550000
-CVE-2020-3229,0,0,f672d4ed9aad289fcf0e807d0956c0e78aeded6d833f22ece74dd72a3e6b6f69,2024-11-21T05:30:36.727000
-CVE-2020-3230,0,0,930f0cb25135f5c3ab29de15d47baf79c4967f08586bebe06e69342bff0b2f62,2024-11-21T05:30:36.857000
-CVE-2020-3231,0,0,bfc653228f99de20bbf739477472e9371ee7a04ad9642a7b17be80ffaf645a70,2024-11-21T05:30:37.060000
-CVE-2020-3232,0,0,615c17cfe89575d135bb2c2d87f767c395190a0c8330288aa5c672c919364895,2024-11-21T05:30:37.187000
-CVE-2020-3233,0,0,8d8523a3fe76e3c701b8a4475ab0840fb1f63b9e052f71cb5bf6eb6681c165eb,2024-11-21T05:30:37.330000
-CVE-2020-3234,0,0,c5dd218ff7f4b6590dc048673470150109e7e792f65ddbea873ff21315912c4c,2024-11-21T05:30:37.450000
-CVE-2020-3235,0,0,93704888d4ce8fade0fe2a83aebe276260b4684fd6701bffa614fce9f8099429,2024-11-21T05:30:37.590000
-CVE-2020-3236,0,0,bb023ca92c3b0fa2d4e9026bf0050ccceadd4c74c457dc8dbd7f5c6c40ce7e91,2024-11-21T05:30:37.743000
-CVE-2020-3237,0,0,521859bfa651d77fc3ffe559cc4703975be78a8a53549dc9ba17c8819d997b6d,2024-11-21T05:30:37.880000
-CVE-2020-3238,0,0,ab43c702925519c1b0ffdf4aa9b6bb7e1e80ace7871b8900ee956f62292823b0,2024-11-21T05:30:37.990000
-CVE-2020-3239,0,0,131b6a8aa32d804502371930a09a68486d63e5ba1b8fc054556a08f97f189e4e,2024-11-21T05:30:38.113000
-CVE-2020-3240,0,0,13d5fc7e3c183ba1c5769515c20b30f100801e5e07db969b39b5fe4f47af19c7,2024-11-21T05:30:38.240000
-CVE-2020-3241,0,0,7696f428c3a968710deacb4609ce0dfb480622b6e77271b1fa0390f344cb2dfa,2024-11-21T05:30:38.357000
-CVE-2020-3242,0,0,cc50288dbc203a7cf61f9bdab9e59fe9f22a91f615349ba1a8bf04d835471942,2024-11-21T05:30:38.477000
-CVE-2020-3243,0,0,ae5d8b6c37f092b7588d86eb9037367dc79b0479c905d4069c407356659b4d63,2024-11-21T05:30:38.597000
-CVE-2020-3244,0,0,bbbe99d97fadd4b6c68488319dc4e540754b9aa85c5f6ca5c6fb6de8d1904691,2024-11-21T05:30:38.713000
-CVE-2020-3245,0,0,1ebdf6f57a0c735a31e401ddff54f2751707008281da540c34b87ca7f0a083dd,2024-11-21T05:30:38.840000
-CVE-2020-3246,0,0,a534f3f6e7e577c20107edb5dfbd3a44ebe14244ec7647f63963f0c0e94c7dee,2024-11-21T05:30:38.950000
-CVE-2020-3247,0,0,5402487bc43ec923242c93b4d275c44cdc0f89d346a0fa0bebd59ef42bb6d83e,2024-11-21T05:30:39.070000
-CVE-2020-3248,0,0,3c56476f16d32998c5aba178d0f029676ae478281026186b664415ce80414d38,2024-11-21T05:30:39.183000
-CVE-2020-3249,0,0,8d5f5c89b57f3aba824e049ca36558f095341237dadf4247d2fb917ff15f50bd,2024-11-21T05:30:39.300000
-CVE-2020-3250,0,0,c313fe19a173e09b9bbec1cffd724610657815cfc2ba61d1e2e0613bbd0ffa0e,2024-11-21T05:30:39.420000
-CVE-2020-3251,0,0,5506660e1781eed7496fd59026728c6a1734b2fe24e6c162588ea51ca996d384,2024-11-21T05:30:39.540000
-CVE-2020-3252,0,0,4f3dc9a9f9153dad510a9c8bf5f0bdf98cfcb38670c1541c2aa5d2c385528cd7,2024-11-21T05:30:39.657000
-CVE-2020-3253,0,0,d87e9ff485e452060487e65e73d1e198aae8c943e3135cba96b55120d95defd1,2024-11-21T05:30:39.773000
-CVE-2020-3254,0,0,bb0e7a0057727ef3240d7cdf12b90ea193506d411c939a9d2ba50eaa29a30558,2024-11-21T05:30:39.887000
-CVE-2020-3255,0,0,926541502cc4174e9ad891f1295171e79c44398ff305bd2e8fd73e9713a29ac3,2024-11-21T05:30:40.023000
-CVE-2020-3256,0,0,ce7220074e2d069a45248d4036be3a07444de23b0db6517f696970585401a585,2024-11-21T05:30:40.163000
-CVE-2020-3257,0,0,9d53f8d363af57dd81ee3f3b93b8e6a67a0c6fc2ee98cb35908dfc084fd8952b,2024-11-21T05:30:40.277000
-CVE-2020-3258,0,0,2e292dee79d8ec00447313b10ad7e94211edeeef98be042392c45e98af1f09a6,2024-11-21T05:30:40.403000
-CVE-2020-3259,0,0,8a9f3696d8a4f0e5dce66ecef8df8a732f05b43cb75291cbd753ce1303aa9272,2024-11-21T05:30:40.517000
-CVE-2020-3260,0,0,e90cfb1c343c230599189af6c7910518d1c7006c8c0e4019d4043593eedfe076,2024-11-21T05:30:40.647000
-CVE-2020-3261,0,0,d0f9278214b0a2ded4cc163968c1ba38180348d1e0403bfbc5d25be7a361584d,2024-11-21T05:30:40.760000
-CVE-2020-3262,0,0,62b3760a9128f4c554d902744956a12a74bf501deb89c7eaa4d6171c8e39e395,2024-11-21T05:30:40.903000
-CVE-2020-3263,0,0,106cdead37f70c467aa54d68673153efd3be3a68506a12397b2c90402a439aae,2024-11-21T05:30:41.030000
-CVE-2020-3264,0,0,5cd216881c7db93aafdf14f6d89ad786ac1a5ee090072c906a4d990ff09ad536,2024-11-21T05:30:41.157000
-CVE-2020-3265,0,0,586296ba8bf8e3d1a894820a303c7227e97e02027af3a95cf5dbe01373116dde,2024-11-21T05:30:41.343000
-CVE-2020-3266,0,0,dbbab4af3b3fa4091c2ddc25943873203b7c66f71ad9fb5c7e582e9871476032,2024-11-21T05:30:41.470000
-CVE-2020-3267,0,0,03eeae3f6eca84d2cc4a6c98958565fb6b4b5c17f674ff46106a880860ab0250,2024-11-21T05:30:41.593000
-CVE-2020-3268,0,0,4381b0139d8fb37d2da0106e9cfb71076e41973fa629fbbfb6a3a3706a44da06,2024-11-21T05:30:41.707000
-CVE-2020-3269,0,0,6161190c03fe7437224c75abe3f6f3f5e1eaefd192732480aa3a1524ade5c5c3,2024-11-21T05:30:41.823000
-CVE-2020-3272,0,0,cbff2ca95ac73a051db15cb3265e591a20c30bbfe7b848629bd2668538e8fa51,2024-11-21T05:30:41.940000
-CVE-2020-3273,0,0,ab998cc3922fbb01bc6c9a6be7cc31b4f51406a5206e626437a183716a857d65,2024-11-21T05:30:42.057000
-CVE-2020-3274,0,0,1d6ad4ad105b67babebd095de5f356d344134c2c0789deb16dfa6e8176157694,2024-11-21T05:30:42.173000
-CVE-2020-3275,0,0,0cb8266654214af19384a53492138f75f879e455d4aff6ad8a8759effe4726dd,2024-11-21T05:30:42.297000
-CVE-2020-3276,0,0,2ccb019d9a73c692bc7054ce0507f0ad7ee4481ba71ea21e440f88e5b3947cfd,2024-11-21T05:30:42.420000
-CVE-2020-3277,0,0,47cd425e335d718c9cb29347426afc694184ae2bc91f732eaa6c2fe006771015,2024-11-21T05:30:42.540000
-CVE-2020-3278,0,0,4ba1d46f02b2d647c2adf20e15febf74b018a73e5e771e016ba29ae653a2f41c,2024-11-21T05:30:42.657000
-CVE-2020-3279,0,0,a6829674a280e57f4a0caa900341c63e3d9e0dc3d2a7606b8eecb47872803771,2024-11-21T05:30:42.780000
-CVE-2020-3280,0,0,651055902a7c35a881e38eea8fe2fa91c1846a65054dd5d418890f53b365d096,2024-11-21T05:30:42.907000
-CVE-2020-3281,0,0,e54dd8b4f84fe2dd45214b69df16938e181abfc6ae85ceb8115aa5a3e658ef63,2024-11-21T05:30:43.013000
-CVE-2020-3282,0,0,c18b419dd695d287321eed9f16a96ed53f4f0086310bbfe1d9948fabfa36725f,2024-11-21T05:30:43.133000
-CVE-2020-3283,0,0,7da87884f9fb3de9893b88f08ae9f42881738386056a9896a52184ea67f99d40,2024-11-21T05:30:43.263000
-CVE-2020-3284,0,0,70daea2046a3d16a9e86c2123844a5e4fa48bc6ff2f08b5afb918c40b36b081c,2024-11-21T05:30:43.397000
-CVE-2020-3285,0,0,02342fac8bd067bbf751f7e9c95053dcf352d604a428c3be2b46f01854c0e393,2024-11-21T05:30:43.573000
-CVE-2020-3286,0,0,190ba8e0ba17c8c5e597a754767bfebd272d8ac4d6993c4aaa809cf326dcbe1a,2024-11-21T05:30:43.687000
-CVE-2020-3287,0,0,8742f85a7e4fa29f1e393fab97508e216779d8c07e1487fd9e7352aedf9c0558,2024-11-21T05:30:43.827000
-CVE-2020-3288,0,0,64f212a9e3237ed019d62ea5a6538977c46e0ab6831a26055c6de698ab664f68,2024-11-21T05:30:43.960000
-CVE-2020-3289,0,0,34a52176c625d5faf92e2302c7ecb26779474282e39f86dee3b3162d66c79da5,2024-11-21T05:30:44.080000
-CVE-2020-3290,0,0,edd0790a0b2f0cdeed72a4d5cbd5caf6453eecce025fedc9272d2bcda3e48d7d,2024-11-21T05:30:44.200000
-CVE-2020-3291,0,0,c8106d0b7ea9582f8cad65a16adecca62a30f7ba22752aeca7357e68d685b5c6,2024-11-21T05:30:44.317000
-CVE-2020-3292,0,0,ae8d3d3e5a9b0d902e1ab8ed42c7a0415a25ac6e25c17828df01841d3bba85e4,2024-11-21T05:30:44.440000
-CVE-2020-3293,0,0,6304eb4cd6f4a2ca7aabd6e13eb8d4a722702618aed2a7a2449e4b995ef37f8d,2024-11-21T05:30:44.930000
-CVE-2020-3294,0,0,67be37d79b0bcba82110ca10287395c95d0d60977f49c611e6a54725a7474a16,2024-11-21T05:30:45.057000
-CVE-2020-3295,0,0,a27442a091a2a3a480c18b8d6b408ee13bfae750f2472ccd390b198e11809c1a,2024-11-21T05:30:45.183000
-CVE-2020-3296,0,0,b4d4d96d6b59a8ccfbc3ebc832a74e2d7cc587c484c9805502e6d8aca1839d14,2024-11-21T05:30:45.303000
-CVE-2020-3297,0,0,d62d980b48f2efbcae86b1a67d97aa93d55544af2958c57017fb432cfd735aab,2024-11-21T05:30:45.430000
-CVE-2020-3298,0,0,820960675ed90c84055ce32eea4e174d9caaf1dd8d29ad7ef2886e5b0fac9449,2024-11-21T05:30:45.660000
-CVE-2020-3299,0,0,ec946bec84da95c34cfb239548dbfa455edf9a406335ce726e2d9f2fd66a9792,2024-11-21T05:30:45.790000
-CVE-2020-3301,0,0,e086bee37bbd74d1abf7d11d6c4390586484670a1f77d1dd319215eea1e7f326,2024-11-26T16:09:02.407000
-CVE-2020-3302,0,0,c876429cbb4094c5431bc4dc74cf29e83104e0e7146e7557a95584f29245b0fa,2024-11-26T16:09:02.407000
-CVE-2020-3303,0,0,cfdd596ad80726fbbb6c2f8ea1e42e6c3c450bf4e28671b6ef1956ae8583d4a0,2024-11-21T05:30:46.210000
-CVE-2020-3304,0,0,eec24c69984f3ee2a21de53a57e7ff55ce11e3c8e99e8ac0d0e5256034f35a3e,2024-11-21T05:30:46.330000
-CVE-2020-3305,0,0,6b90ee37360765287f82d04a5c8dc2a040d2a3ab6c73dcfff62c7f50788673a6,2024-11-21T05:30:46.487000
-CVE-2020-3306,0,0,7ed6d7bd7a923bea93e32c6d87e562b842235f5292ca6f57dab97154415b3d2c,2024-11-21T05:30:46.620000
-CVE-2020-3307,0,0,d255082f25e2d84636c97695aaa03fb58e5a08e3048b197c9576a7820c133911,2024-11-26T16:09:02.407000
-CVE-2020-3308,0,0,3939161d64f45f21decdd473406f3214a305b5d3cce9b9708b1e7c9d5a9e3ede,2024-11-26T16:09:02.407000
-CVE-2020-3309,0,0,0721aa288c2ab372f082b73b7f9dd81f9a74a55dbec50451832764326ffa1e52,2024-11-21T05:30:46.980000
-CVE-2020-3310,0,0,b005cc6342460deb928f22262f88be15a8f3db8e5099a25fbbbf2ebba07dc833,2024-11-21T05:30:47.093000
-CVE-2020-3311,0,0,63de81a1c09cadbfa752ce92f3a29f9e25ecc8d5defed318de95a6d7aed761ce,2024-11-26T16:09:02.407000
-CVE-2020-3312,0,0,244bb637b24d28bae5980670369cdb1f11c80b9658383c49dcdabe9f7d58194b,2024-11-26T16:09:02.407000
-CVE-2020-3313,0,0,0af17830808fb59c517911163287690ea2b0c22af74fb95422371de814971011,2024-11-26T16:09:02.407000
-CVE-2020-3314,0,0,71a90a79d6355c056d65bc9eb906430a65cb0e6fc5839a3d77a943daf467af57,2024-11-21T05:30:47.533000
-CVE-2020-3315,0,0,7a5b10b8855f55990d70a11069f75b534ccc4b8abea59e22f719e3b1a6e2160f,2024-11-26T16:09:02.407000
-CVE-2020-3317,0,0,0fc668e2f378a96eb74f3402e736170f6df1c3594ddbd82d387b1ffd6dd850c7,2024-11-21T05:30:47.783000
-CVE-2020-3318,0,0,8d4942dd72da8c65d743d58d16f0412efd7bf89457cc191c05446ea7f5c85830,2024-11-26T16:09:02.407000
-CVE-2020-3319,0,0,ba4021a124ab01c1cbe9b37509a8373c561ed230de55d2ed0327efac210458ce,2024-11-21T05:30:48.023000
-CVE-2020-3320,0,0,08941708300cd43b55c7c509eab5addedefe82ae33611bff345431eaabf59b65,2024-11-26T16:09:02.407000
-CVE-2020-3321,0,0,210d5329747b6116f3ed581eaa011b0d85f3a836ceb64a8b68f487aef9740413,2024-11-21T05:30:48.280000
-CVE-2020-3322,0,0,9306cfde6c9a621a8574ce56e441b4e20a3a0ce5afffa81662742c8135c68852,2024-11-21T05:30:48.403000
-CVE-2020-3323,0,0,0ec07b5daf92a316b4a2ef9ec75b8f315fca64a18ce25622adec561d08fb8672,2024-11-21T05:30:48.520000
-CVE-2020-3327,0,0,aa0fa8476f84c4ccf1de882184b2ea8cd6e50b8c15a86d84f550f74772a10788,2024-11-21T05:30:48.643000
-CVE-2020-3329,0,0,826a529ae92641235b78bfed784a5bd9c113bbba41f77573bdf1934cb9729975,2024-11-21T05:30:48.813000
-CVE-2020-3330,0,0,e4863a28f9f5fe1f7067a22a49e1373cceb80dd2acf87ae3f81b283a2c973774,2024-11-21T05:30:48.930000
-CVE-2020-3331,0,0,b635522c3f62bc6f5bbf4051a6d05e4e4596ad1668acf254103b3705372fe2ec,2024-11-21T05:30:49.053000
-CVE-2020-3332,0,0,81b0dea0e79e3aa57dd3028dcc9bd3fa67363f7b32aae74773cc6009638f884f,2024-11-21T05:30:49.170000
-CVE-2020-3333,0,0,960bba6885c187c81f52701242154677cf0bfb5c9d0350e95b0c75158dd985eb,2024-11-21T05:30:49.283000
-CVE-2020-3334,0,0,88bd210bbd9135d8ec99553711776a82fffef2f1017f659fd1b3b6adf781e5b1,2024-11-21T05:30:49.400000
-CVE-2020-3335,0,0,37bf3ba13dd5297a1217d0da1c13d1253f919b5bcb21184a10db144ebbb6f0a2,2024-11-21T05:30:49.523000
-CVE-2020-3336,0,0,22d153f74d01ef865d03893ae7b235c53c412697c5b9666e04638963e17d1d75,2024-11-21T05:30:49.650000
-CVE-2020-3337,0,0,3f3fa835e42aae3b26c55306fbe8e2d05d04830232f9e24b6851da19d7405505,2024-11-21T05:30:49.767000
-CVE-2020-3338,0,0,d1ac5bf708c7db31041208f4691d1a563e6ef07fc251ec5b846425d6d3c6d89b,2024-11-21T05:30:49.880000
-CVE-2020-3339,0,0,d9e98391ae0e871453c3c400fef9b269199404270a6cafe7ffaef55961fcf283,2024-11-21T05:30:50.023000
-CVE-2020-3340,0,0,108fc1f72eaf9e0389924d2ce3020a0cccb0e40edb37e5be1c5031f022d32a02,2024-11-21T05:30:50.143000
-CVE-2020-3341,0,0,868961af1adb0e4f60ff6ea9300f2cb0fe95870299505cd6cc8492f604298136,2024-11-21T05:30:50.270000
-CVE-2020-3342,0,0,6634895ccad0b41f2f0d14918163b96c53880382205217dee42f472b705893e4,2024-11-21T05:30:50.390000
-CVE-2020-3343,0,0,c861fa4e1fb7d0bcf431420c7e7df06609f87614138df545ae0521fa7993514a,2024-11-21T05:30:50.510000
-CVE-2020-3344,0,0,a3949b67450b230409c8382a31704f6065e615490268be54a388ffa4a3d83e9c,2024-11-21T05:30:50.633000
-CVE-2020-3345,0,0,b620adddf9ab33f48c4a745c68ef4f22f21aa1164eb34021dec8c359db896c47,2024-11-21T05:30:50.750000
-CVE-2020-3346,0,0,2458e304427c73dc3f1d8c212f56ad4c5d4b9e7cf3d425e8a8672f7bbd2ad82e,2024-11-21T05:30:50.863000
-CVE-2020-3347,0,0,ca41fe415c59ecd09729bc0e6cb8abfd920c8b17eb85a26b7ecb41f550d0c2f2,2024-11-21T05:30:50.997000
-CVE-2020-3348,0,0,f01ce0dbbe1fdad093624788956e16f4af00f2a1ba22d233147763494a0be246,2024-11-21T05:30:51.110000
-CVE-2020-3349,0,0,46b78eed53a3a5442a680e9836033a825358a7e4ca7fd8f216b1a5e5e7dde5e6,2024-11-21T05:30:51.230000
-CVE-2020-3350,0,0,e634a958e9b846e8fd13005d3574ce2fddb61afdece8cbfaba8917ab814a2681,2024-11-21T05:30:51.347000
-CVE-2020-3351,0,0,0d4d186eb07c2809dacf176db7d9360741ca54ce9e0399b2e5ab5e39bb94388d,2024-11-21T05:30:51.480000
-CVE-2020-3352,0,0,6edacb28191122c668ab85eb5b2165d4fcb22a3a2b09a7c399df91baf98d8a4a,2024-11-21T05:30:51.623000
-CVE-2020-3353,0,0,4956bff6d81258ae88b813ac2156697469779d52af50db2c050b3fc331d9d538,2024-11-21T05:30:51.743000
-CVE-2020-3354,0,0,3895be11fe1ea5f97c3866feb9a052dcfa2b8bdb9c98e58337128414856f8c4a,2024-11-21T05:30:51.870000
-CVE-2020-3355,0,0,0753cc2134594794c8f65c82be029cfb722c8dfa81e11c72169ce3697a2cb332,2024-11-21T05:30:51.987000
-CVE-2020-3356,0,0,7319a54cc68b40fe0ecd5645a3e8c1c3f3291a94c1f61b789be4a838f6db7611,2024-11-21T05:30:52.107000
-CVE-2020-3357,0,0,1972f6206ba8f62ff474707781510603f3cfc543660db035ff09c82e84fe3b74,2024-11-21T05:30:52.210000
-CVE-2020-3358,0,0,6baef50d36c1253be0a8f00a89a41f1ff404eac4d38c28eccb71dbdd3f10cb0e,2024-11-21T05:30:52.327000
-CVE-2020-3359,0,0,04b2e9a2324a69717c6edb79b0d64b5dccb33d20e03b5c74dfefbcb09e0a33ea,2024-12-19T13:52:35.190000
-CVE-2020-3360,0,0,65e5efe6205de98c605b1a094c1380e007443e11181b408c85d233eef079b248,2024-11-21T05:30:52.567000
-CVE-2020-3361,0,0,cf291cc66b5b534c117aba0c6ae1bad8fa2989964749318528b63dabe3d3e8c9,2024-11-21T05:30:52.717000
-CVE-2020-3362,0,0,169869772cb31e60f1275ca6d634785d1796231011d38370aace094a60812d37,2024-11-21T05:30:52.837000
-CVE-2020-3363,0,0,3b6fa4f33d1058fba70257ac59b232efd363408d5e3fdcf4bef709007b6d4793,2024-11-21T05:30:52.957000
-CVE-2020-3364,0,0,e838fcd576401baa81f15be4797f55ac58924cb2a4a553439222176d2bf8a655,2024-11-21T05:30:53.177000
-CVE-2020-3365,0,0,589622df37f1bcbda5274b17e86c109d4f0702217ad20f123a0faa4467bf9115,2024-11-21T05:30:53.297000
-CVE-2020-3367,0,0,a13b1a08a2d6f35fef23c962bed42956930ccc01fb32cf94386e09b528082bc2,2024-11-21T05:30:53.427000
-CVE-2020-3368,0,0,f1b5958ce5cc51f4e7c0b0c237df0756179e2c686bfd6d91de239b5efa95c01a,2024-11-21T05:30:53.557000
-CVE-2020-3369,0,0,f702bc2a4897b1481bc5da67d19e71f7e4e1a533829ec525fbb88e86e74f3465,2024-11-21T05:30:53.670000
-CVE-2020-3370,0,0,4e3b7477eba3e104891c4eb3cc04ead3a11f7f9ac5d3e0e27d7143a86597be12,2024-11-21T05:30:53.797000
-CVE-2020-3371,0,0,eeb572d3b57e426fe4842aef871ba71c51f1722bbe7c32bd67e41a84d25858a9,2024-11-21T05:30:53.920000
-CVE-2020-3372,0,0,b3976dbdfd400a519860bcd514519875ae61ef31cc666dcf4acc4437da4c91ae,2024-11-21T05:30:54.057000
-CVE-2020-3373,0,0,46a764d191af10c1e3cd289f35bb5cc780e876c985943fdaff46a8fabce51801,2024-11-21T05:30:54.193000
-CVE-2020-3374,0,0,ae0fa916f4fcf57d033502bdba17895ed72881e46246db6e9f325c8f2d3b1983,2024-11-21T05:30:54.320000
-CVE-2020-3375,0,0,1aebaef8c9731171d1c08955cff03a1f5d94bf790f7e62d661a8cd6302810b96,2024-11-21T05:30:54.447000
-CVE-2020-3376,0,0,bb5d0da32f3102ef972392cdaa10a704cf4d942a81b236bd55698d034b852e14,2024-11-21T05:30:54.563000
-CVE-2020-3377,0,0,990ce847368659bce7b87e54da0890480a2e904db30dc59958899ee93bc193e6,2024-11-21T05:30:54.687000
-CVE-2020-3378,0,0,5ac7300db4aa63915cad5227382ad8a9399d44874b45791be8ab47922a297fd5,2024-11-21T05:30:54.797000
-CVE-2020-3379,0,0,6f9d6e13666550a9bfc14dca1fc5f129287f2668c0855484c048f7951f31fedf,2024-11-21T05:30:54.907000
-CVE-2020-3380,0,0,5aa0c97abc06282a62d6991ec00de4c34670afab49cea6ff1d77cf8a4e7eba59,2024-11-21T05:30:55.027000
-CVE-2020-3381,0,0,bbe7761015f501dd5e95737f33f3fe3d60636f907d399a480ae0fd1892d95e18,2024-11-21T05:30:55.140000
-CVE-2020-3382,0,0,2cb16a534a00804ee4a83cac94c075e5b555c40d85945a644735db88847278b2,2024-11-21T05:30:55.257000
-CVE-2020-3383,0,0,aeba7434f1c3144a26744d1a93d761a3d4fa3f0ce8c7aa16c1a54b41e45eb428,2024-11-21T05:30:55.363000
-CVE-2020-3384,0,0,79de46cb47c05a50022600899060a80bc838253bb4d98109426638e971c90f1d,2024-11-21T05:30:55.473000
-CVE-2020-3385,0,0,d42e2fb7261f1230e69854a2c838af269f5e0278a07a9547c9318c33afd08583,2024-11-21T05:30:55.590000
-CVE-2020-3386,0,0,f5692ae11f45d58264ddb8d6ff66a35a0ebddd3b52cc5f3d7919bdc835c0e3a3,2024-11-21T05:30:55.707000
-CVE-2020-3387,0,0,4b93ac6efae7c90dfe534abae09055c79cbff7b0a9c14dbfa8c64257ed0663a1,2024-11-21T05:30:55.833000
-CVE-2020-3388,0,0,22c32c10651ebf8b298fc898a7d40ab98e5099e6585996e8d220b1f59a9b2d39,2024-11-21T05:30:55.963000
-CVE-2020-3389,0,0,8c2e85e272ec460b2a3e5633519b2c431adb53b86419300321e14a4be1ee4e5e,2024-11-21T05:30:56.097000
-CVE-2020-3390,0,0,0b651df5da9d0920f0852f1c6b6585fc8fbf4fd717e8187d493809d77237d484,2024-12-19T13:52:35.190000
-CVE-2020-3391,0,0,0b25594cf1c2d26768848273409cacbac6d254fcb4aafc3578041fe9774d8fe8,2024-11-21T05:30:56.340000
-CVE-2020-3392,0,0,104474d1564235600d45fffcf193a3c8d8155e82ebbbd48ddf734e8706729400,2024-11-21T05:30:56.453000
-CVE-2020-3393,0,0,0d6f1230c2b196e5d24f7f8104e0e611d412ef68e42ea9fe9ae4b3ef2294c2d8,2024-12-19T13:52:35.190000
-CVE-2020-3394,0,0,25fca6a6684200fa0ada87cd25c0495147cfa85441051509526ced422c2ee69c,2024-11-21T05:30:56.723000
-CVE-2020-3396,0,0,ef719e7b808c4de9cf5e5a74f82ba105dc7f6a99959dc6dd7e1066ab8839e01f,2024-11-21T05:30:56.857000
-CVE-2020-3397,0,0,2d86635423b471e64bbae4a8d3d51f7fabbba054147e982523388d2abd06c28a,2024-11-21T05:30:57
-CVE-2020-3398,0,0,94912be4f05860cd7daf7d7e286609c80063b32af5867a4abf77cb9761302543,2024-11-21T05:30:57.133000
-CVE-2020-3399,0,0,df643ec32d5bb7dedf713a6001bb8f5bc848781840c3aaf26c00a72e2a9fac33,2024-11-21T05:30:57.277000
-CVE-2020-3400,0,0,d0adb823ce419e3ff93078d5c4371bffaa7c6d7abcb6d248e8579557550d4c49,2024-11-21T05:30:57.403000
-CVE-2020-3401,0,0,c97c4a8b7bb11dffabb28febb3dffe91e5da2410692c9b78404eba3ceaf8e878,2024-11-21T05:30:57.523000
-CVE-2020-3402,0,0,2d29d991cd09a093a124ec5b30916a23bf329e65824a8999288351f523a16a90,2024-11-21T05:30:57.643000
-CVE-2020-3403,0,0,3a242d0a2bd3e274c8e3e2e59cbba0ad3f1049e3b7cdb80ac5240ef9d3c3d444,2024-11-21T05:30:57.760000
-CVE-2020-3404,0,0,58e27fad3458177a782251ca4294880b47bb1078427de8cb901018c84487c774,2024-11-21T05:30:57.877000
-CVE-2020-3405,0,0,645a16c8bb6b336f6c9eeec79f4f5e24674627c825983c9f8cfe333afc2b81e0,2024-11-21T05:30:58.017000
-CVE-2020-3406,0,0,245b8e5a9b0c78c34b2d84e63b4d58d0c960c03b865ced867ca77014a4697af1,2024-11-21T05:30:58.130000
-CVE-2020-3407,0,0,3d6a2021e343e779182584423ea525b06147823e5d5212df64ad3c7878d7d31b,2024-11-21T05:30:58.237000
-CVE-2020-3408,0,0,0861cee0b5d5f0f3597d3e34299fc988f2fdbae485b3f999c25ecc564076241d,2024-11-21T05:30:58.377000
-CVE-2020-3409,0,0,1aedb4aede7eef08dea253e8e8e97cb3cab37ddeb057b63b67e8fdf67f2abafe,2024-11-21T05:30:58.503000
-CVE-2020-3410,0,0,a914619fa86d8b9e04a1cfddab22e231ef6bb9b3e188df7e98948986eed6f41e,2024-11-26T16:09:02.407000
-CVE-2020-3411,0,0,e110f1764f4e7c8efc07ceb576db316223902bcdb995aca10624795b57472102,2024-11-21T05:30:58.750000
-CVE-2020-3412,0,0,13b7f98ba02cff118466301a42c0e76bf817c916ad84d7361b3c6df65ba1be43,2024-11-21T05:30:58.883000
-CVE-2020-3413,0,0,0aaa014a12938f13a386e1c2e2737aab7e847a17b534d676131fed59dcd266c8,2024-11-21T05:30:59
-CVE-2020-3414,0,0,8a05005e875ac6b44c2dc0fe5a335113d480174a4df6babc220867f50c74e237,2024-11-21T05:30:59.130000
-CVE-2020-3415,0,0,d32f69fb1122550627ca68720fda7e96633dc85fdb5099f7c39b8762025b94d5,2024-11-21T05:30:59.257000
-CVE-2020-3416,0,0,d815984b7fc48d32e77427c1d949549365ee17222faae97d5b08f27811d6bf2e,2024-11-21T05:31:00.303000
-CVE-2020-3417,0,0,3c11ab10638f1bfef33e260e248b8c4a1bafd498a41577abc75c268559e02c21,2024-11-21T05:31:00.430000
-CVE-2020-3418,0,0,7bfed2cb9c966eee3a144c1432b95c5213ed64fda94f78e0d5032ac7fbb731c6,2024-11-21T05:31:00.653000
-CVE-2020-3419,0,0,91ac0353743b3bb95d24c90334d1b162d3ad36ebbe6920ce6666fa0f2f88c6e7,2024-11-21T05:31:00.900000
-CVE-2020-3420,0,0,7589b918bff12818863f0d57e14813cbc169fbccac4a609ecab204587f68b315,2024-11-18T17:11:17.393000
-CVE-2020-3421,0,0,ee4176534bef18bdf945cc236475a338aacb6639cc9ecec36a04f73dc2c7fb96,2024-11-21T05:31:01.467000
-CVE-2020-3422,0,0,1c2d22beb7b53df2caea8616d43a9a3c8721628512d902947bf896360314a9a5,2024-11-21T05:31:01.960000
-CVE-2020-3423,0,0,0d3c0df314eaa50a5d562c0e81fa3bc18199532af2b120de4971ab342cb19c11,2024-11-21T05:31:02.420000
-CVE-2020-3425,0,0,f732c2e1ed0529d1ff465dd810578426be35eb865576b3b38c7566fdb1daf737,2024-11-21T05:31:02.570000
-CVE-2020-3426,0,0,ba713915b8b5266d88d3a32e25ab758e6a79f0f271554d94189161e5b815af31,2024-11-21T05:31:02.753000
-CVE-2020-3427,0,0,429b341c35d8db0dbdbe9391336f3875cbd0912a96e773558c60a8f53446fd81,2024-11-21T05:31:02.883000
-CVE-2020-3428,0,0,e7343ba6d19036b066b847c5bcdd5ba9305394824177207029fc8642218b70cb,2024-11-21T05:31:03.023000
-CVE-2020-3429,0,0,814c5b0cb81fd2aef47b18d048bbf53afc9fd843a6261dc2c84874cca1600e6c,2024-11-21T05:31:03.167000
-CVE-2020-3430,0,0,9484f39b83f9b46c9e88870e745b17e1080bf3cf44b74f8b4f353d633b721f4b,2024-11-21T05:31:03.293000
-CVE-2020-3431,0,0,5acddac8083333e35ac43ae37dc83691c78b41f06d8e4b4ec090cef5dbabc4f2,2024-11-18T17:11:17.393000
-CVE-2020-3433,0,0,88087af4a20166090972d75d90f8af652c91e4cf77be133ec7a57f4187f3f88f,2024-11-21T05:31:03.480000
-CVE-2020-3434,0,0,b34f8d0879aa400e2c158fccf8d9ce2fa9c299e01d7e2d305aa698af0f0c604f,2024-11-21T05:31:03.617000
-CVE-2020-3435,0,0,5d5c7e750f1c8584f13569320c074e0904e2657fb1e285cc30157fb4acf38a44,2024-11-21T05:31:03.753000
-CVE-2020-3436,0,0,6f760c87cea0f1917544bed87a3b90733765280b4f132058ff7cd2c5c0c0047f,2024-11-21T05:31:03.880000
-CVE-2020-3437,0,0,879b285bda142a39d34741199eb1ce8c781660793c7d47c84a4bf054f7c24c3c,2024-11-21T05:31:04.013000
-CVE-2020-3439,0,0,919544fa4b1e2e7910e30f7aaa393d70798eeac29c19c59a5a0180c655d504ff,2024-11-21T05:31:04.143000
-CVE-2020-3440,0,0,745cd45cb8672a71705c1cadf9520305aaf2b97341a48ed6b78215f52e4a7c41,2024-11-21T05:31:04.303000
-CVE-2020-3441,0,0,ac9698c59198c9795b8e59da5a51a227944a17f7b4f99c9a138b2f5f6f105e11,2024-11-21T05:31:04.437000
-CVE-2020-3442,0,0,844e13423a53ee9ff141e0446b80f9305a8fb5f5fcb6feb772820e3962768482,2024-11-21T05:31:04.563000
-CVE-2020-3443,0,0,b339125c382466abf7e1f89d325cc4aa23e1555675bc73abbfc40a6e488db981,2024-11-21T05:31:04.710000
-CVE-2020-3444,0,0,75d3a404cb07e5473338c6184d26b158f5667a7d485bb900e38a6a8a94a1b57d,2024-11-21T05:31:04.840000
-CVE-2020-3446,0,0,2263406373b27d705890baebd71c5da0814ea4b88cba914670aaf336694775ad,2024-11-21T05:31:04.973000
-CVE-2020-3447,0,0,d3863aa51e88eeaa70683aab66bfab90c272f4a49b7ef0c4fd465222524b3eb7,2024-11-21T05:31:05.113000
-CVE-2020-3448,0,0,6c247e0a4824789a685c2e4e67347c7b8bcffe9bd1d43e0fa42ff714b4c91a66,2024-11-21T05:31:05.247000
-CVE-2020-3449,0,0,15a622c5a06017be9501ce9c73d708fe8f9bef9211ab86740d750717b5783a95,2024-11-21T05:31:05.380000
-CVE-2020-3450,0,0,4377ae16afb2806a0915a6aab10a0c7f357f0ff6852805ea870f519770b9fb3d,2024-11-21T05:31:05.513000
-CVE-2020-3451,0,0,7b2ab1503ca9c3e82e4197d8a2dc5d59c6f500eb8efbd5ca21950c6b75e7d832,2024-11-21T05:31:05.643000
-CVE-2020-3452,0,0,684987ab95bca74f8f3438c8423a653f9496433b1a48f993356f8c2f9ec1e93e,2024-11-21T05:31:05.770000
-CVE-2020-3453,0,0,69c9c07de01008ec2b66551e4222cd0858dcd9d9729c6196660043e46b1d8627,2024-11-21T05:31:05.933000
-CVE-2020-3454,0,0,5b2bde4b7d216ce42693056f944c21f965d6858df67311be109a189184706d22,2024-11-21T05:31:06.053000
-CVE-2020-3455,0,0,a1670a7b319da33028448fa81902aa0531c7bf1298ba4f6ba5c832329719a718,2024-11-21T05:31:06.197000
-CVE-2020-3456,0,0,bd24ed291eae2cd8e326af60d7e76409cc57ab24ebdd8f3f3df2c5f2423c0883,2024-11-21T05:31:06.343000
-CVE-2020-3457,0,0,a66bc1c3406f1c89348cf8bfe9f5e4d0743f9db218749393fde6ad8a72f14f80,2024-11-21T05:31:06.517000
-CVE-2020-3458,0,0,90744c4a4f403fe9f050563225c19e022cbb7393ee441e798bf282839ea96140,2024-11-21T05:31:06.670000
-CVE-2020-3459,0,0,bfe89d6626b77f13b4bc792c39b2e50b3fcf2071850e3549014a061ab576eef3,2024-11-21T05:31:06.810000
-CVE-2020-3460,0,0,0008dc64d9abfae208e2fa13098b6878868c0a444e84d15d87afc6963d4e8755,2024-11-21T05:31:06.953000
-CVE-2020-3461,0,0,8ab60436a083fd1c6208b835bccf788db34e11c403ac8b51884ffdebc634e92b,2024-11-21T05:31:07.097000
-CVE-2020-3462,0,0,3620761485329e7ee64cc866b963ac6f2436711cb1cac260145c3336486e5c6f,2024-11-21T05:31:07.210000
-CVE-2020-3463,0,0,bac7f4a7b881143c3a9f8befed6a9abfeedac67302cf3523dfdc908aaa7e87cc,2024-11-21T05:31:07.323000
-CVE-2020-3464,0,0,52d6b6fc2fec2d7dda4fc4eacb9463af878cc6e140f699db9941d14c08f9b1c3,2024-11-21T05:31:07.440000
-CVE-2020-3465,0,0,0cdec34aa463b57decad9f4e304fcc3097147f895ee0df82619a8c9c56fa3321,2024-11-21T05:31:07.557000
-CVE-2020-3466,0,0,297061bfeb888873d3bb5be483c1de0c62c0e5b6ebc53fbf5261c6493c9ebfa9,2024-11-21T05:31:07.690000
-CVE-2020-3467,0,0,0889d71e5ea0352ebf6a195c00aa8c5aea810789751b4291cddb137f75ce60ed,2024-11-21T05:31:07.800000
-CVE-2020-3468,0,0,de5d49ec27cb298d6045db22ba1de8b5ad907b1f738141ad14f6eaa5ef429b5c,2024-11-21T05:31:07.937000
-CVE-2020-3470,0,0,cd7456daa83989e7042106066d5c0e7b54c45a590b909f892fceab90c5e145a4,2024-11-21T05:31:08.060000
-CVE-2020-3471,0,0,41d245c34ae4bde36fb54ad382eb776a9d3717e7d86c0130f0934a80cc6f8e3b,2024-11-21T05:31:08.197000
-CVE-2020-3472,0,0,13b4c2bbefe560ed25c42078637e3c2f6a678c2a8fa795249b2638262aa72634,2024-11-21T05:31:08.320000
-CVE-2020-3473,0,0,0ba797774007a0f31b9dc682481ad4850229a554117bb5eda776db28fae25881,2024-11-21T05:31:08.433000
-CVE-2020-3474,0,0,083777a85282854d28788c3aeb03e3c2a7fe08e5ee861cd1cf1755567e487cf6,2024-11-21T05:31:08.583000
-CVE-2020-3475,0,0,953436fcec2b116498e842a994123c8deca0b5000699c3dbea9617d04accf281,2024-11-21T05:31:08.717000
-CVE-2020-3476,0,0,2e00f181e62bd28ea5e5ec602570d32e2cabb37f8374bc507ba91751fa64acd9,2024-11-21T05:31:08.867000
-CVE-2020-3477,0,0,47f33b383477cb20b7177a45d9fc6bf5de7a730974a1e7882c44e5774d0d2e38,2024-11-21T05:31:08.990000
-CVE-2020-3478,0,0,d0f5bb9c861a373c1c5fdd677c80be2e391269ef0da2efdf8a837ccb44b37588,2024-11-21T05:31:09.113000
-CVE-2020-3479,0,0,36d03cb56132ae9dc90e5a9f017092bd9058ae0fadc8a605195b7a8d809e0333,2024-11-21T05:31:09.220000
-CVE-2020-3480,0,0,e8984aa085d59a0c365b1da671babc3c452661ffe23ac69df350b09a3e588ed3,2024-11-21T05:31:09.360000
-CVE-2020-3481,0,0,70c57696c4c6a96394643cd1a588d1186cbb35b770a5adef1b28488f6764a220,2024-11-21T05:31:09.490000
-CVE-2020-3482,0,0,0a1d75c941ebbe56df87bfd7451bb380c4db2c3c1aef5fcaec012c7ab1cd20be,2024-11-21T05:31:09.640000
-CVE-2020-3483,0,0,cce000c1dd1f7e0cc62658fcf199864b6cc9e1eb90c794bbe20a7c0615b9db2a,2024-11-21T05:31:09.763000
-CVE-2020-3484,0,0,703833945e9fbea5b257f0cb30865f84150ba7c4c181b6578e18df0877182b78,2024-11-21T05:31:09.877000
-CVE-2020-3485,0,0,549cb825ca5cbdbe08cbee7d1db5ad8f4a40093cd55696b3af782ab1ca95dc7d,2024-11-21T05:31:09.987000
-CVE-2020-3486,0,0,95009436680005752936a9075537dd62ca5733c771a522d7a93d13c9771824aa,2024-11-21T05:31:10.100000
-CVE-2020-3487,0,0,34e92f8a226d27d1533de2ad49f1cf1e71b494e3845b599cf4fc3466826ff8f9,2024-11-21T05:31:10.223000
-CVE-2020-3488,0,0,a1cc878f34974a30866e6e0e3abcaf094529b9e681abf02184b103d2e51a463d,2024-11-21T05:31:10.350000
-CVE-2020-3489,0,0,6a6f6cd677f883375ff17acb65da87944f882a726e36bfa4067d1426c735ad11,2024-11-21T05:31:10.473000
-CVE-2020-3490,0,0,400ea30e07b0ba65bdf2acd52481c0a98d3519e466fba8335f7cb64333a8dfe9,2024-11-21T05:31:10.593000
-CVE-2020-3491,0,0,f6f9bc6aadf7302b3dac5f1d63a1a1ad9d0d937d0ef1b462d54897a511977e1a,2024-11-21T05:31:10.737000
-CVE-2020-3492,0,0,5a84cd1b4a0d18453336d15ee9c4b3d87eb4054813124c1aab8592e4f015dbbc,2024-11-21T05:31:10.867000
-CVE-2020-3493,0,0,d5646268d1d267295431e8c006b679e1154494dd549ae0d4525428e9624be236,2024-11-21T05:31:10.993000
-CVE-2020-3494,0,0,cdcb910d09318611194417521fd960f9a2818dd5ee8d2162c16266447ca8ae09,2024-11-21T05:31:11.110000
-CVE-2020-3495,0,0,8f7345bc037c9dea63359ac082791035540e71860d4575594fb2c44603237550,2024-11-21T05:31:11.240000
-CVE-2020-3496,0,0,02f58d4edf4bb104edacdb6f30491fd974360721bfe5c3c15e54263d1b5adf75,2024-11-21T05:31:11.363000
-CVE-2020-3497,0,0,650dbf2532d6e45c4513ebf74b2dedcff4f0fb7fa35ff9714f72d591cec8a411,2024-11-21T05:31:11.577000
-CVE-2020-3498,0,0,265c842fba02d8d4ae0cf0b31724d2a1b3813d84e56792b258ca0a729aa2c964,2024-11-21T05:31:11.687000
-CVE-2020-3499,0,0,4c090b5114e5508950a459b1e6d6b1864162f5dca42e1d202fd7eef34734c52e,2024-11-26T16:09:02.407000
-CVE-2020-3500,0,0,a0a6129343211679a02d4486d3af9c47b578067f77ae2ba33b66af9f64e67c93,2024-11-21T05:31:11.927000
-CVE-2020-3501,0,0,3b4f0fef4d8fe63611c421856606f5f9e75654123e2fb96e88425aea276769ff,2024-11-21T05:31:12.060000
+CVE-2020-3110,0,1,1a0aa43892019fb8396fdf50e0ffb4257179d5cf71f9be37a7c6151ff18a27e6,2024-11-21T05:30:20.743000
+CVE-2020-3111,0,1,47dd6529a84c528a508e694d8b85ed9773caa8eab18d63ccee5ae232094da508,2024-11-21T05:30:20.897000
+CVE-2020-3112,0,1,162d0eed94c9da5f7982549a19264318a7f18116bcd1fcb18a192bcd7d145795,2024-11-21T05:30:21.033000
+CVE-2020-3113,0,1,fb3b25f773922a89f707e56acd5e713d518454dec993f0499066f290014ae4cc,2024-11-21T05:30:21.160000
+CVE-2020-3114,0,1,377879646a6f39d980991c5ce9f2844ce896cec6719ea2cc176054a30b76557e,2024-11-21T05:30:21.277000
+CVE-2020-3115,0,1,cf3a7daa96960a42fcda3ee2cb9c8f7b6ecb105d40d4f3c5ba778c1d5b32347d,2024-11-21T05:30:21.387000
+CVE-2020-3116,0,1,e101d5393efea18d32a8fd8f8deb73c6d7ed7e2fc763fe4e1a74e8a2930964a2,2024-11-21T05:30:21.520000
+CVE-2020-3117,0,1,a9e064562ca1eba8e3711df0df8e2c9eb418c3175b3e2b6290bd2519bd06e78f,2024-11-21T05:30:21.650000
+CVE-2020-3118,0,1,bea5549d70c06d861d64fcf826e63ca2bae281a231b4f39301257074e19d9759,2024-11-21T05:30:21.770000
+CVE-2020-3119,0,1,0870dee6bca2f4249667243d4049273e03b842939953ccfd2796129499d443d1,2024-11-21T05:30:21.903000
+CVE-2020-3120,0,1,97360dafe2754942cbbb79bf509a7de595d46c19be8f6643a32688ca08cac22b,2024-11-21T05:30:22.057000
+CVE-2020-3121,0,1,ed15543005c12fde1ae863fa626214726d57ca2a6dce777d35eccc784c07b467,2024-11-21T05:30:22.217000
+CVE-2020-3123,0,1,df70284a76d5d85ce7336281e6eeb89c860eb74aca7c21d31d73f769e601aefb,2024-11-21T05:30:22.373000
+CVE-2020-3124,0,1,bd5bdfd427a38f4aeec68de1a9cfb55f706a375f16cf469eb125e2cdfe5e414f,2024-11-21T05:30:22.513000
+CVE-2020-3125,0,1,583946cdbeffea277d4142f6145ecc184f2fb93acdb5403daef2d93670740b6e,2024-11-21T05:30:22.623000
+CVE-2020-3126,0,1,575ee4624a4b65c5ac1a618ea6db3a7fbf18ac215a09b2bac88af2923aaa74fc,2024-11-21T05:30:22.777000
+CVE-2020-3127,0,1,b602c424f593031e0e7a889a5a35fb14e6df325a4eef4b403f4e63c88a48cc3d,2024-11-21T05:30:22.907000
+CVE-2020-3128,0,1,cafbfb125d3f9c7b95cb5cf77745d049b33f4af0632d7aee87e87b4649afb8a8,2024-11-21T05:30:23.040000
+CVE-2020-3129,0,1,121776984a396d3b1cbe0b7de56be62dae540caf0c569f938df6ec65d05a7310,2024-11-21T05:30:23.160000
+CVE-2020-3130,0,1,d82b8961a1ed80d8b0595656cf92a4b6291a35d33a8cb6849648fdc3ae99dae2,2024-11-21T05:30:23.280000
+CVE-2020-3131,0,1,2931776338cde962cff555e122260eafa69b3422bda565f8721d36adadeef84f,2024-11-21T05:30:23.407000
+CVE-2020-3132,0,1,a151c96ae6efa3e6629aaa529f774ae85c0bf10e6d38f7b77e74d59ba10ae96b,2024-11-21T05:30:23.547000
+CVE-2020-3133,0,1,ccb6b0d260802d1aebf59c677ba6fdf69b32a40d86f77cecf8cb4e6c82191384,2024-11-21T05:30:23.663000
+CVE-2020-3134,0,1,a6ccaf29ea76b0ba79c79f35347bfd0fb68b81ee12ca4c7fcbdb16f3ecf5e747,2024-11-21T05:30:23.777000
+CVE-2020-3135,0,1,8742dd50d99a5006c39109e60751d5112d95a7ae170719090e5215302a8da6b6,2024-11-21T05:30:23.893000
+CVE-2020-3136,0,1,aa760b776a37235a94aa1d81787509c5fd316c1385f23b1606c9b139f8472ccc,2024-11-21T05:30:24.007000
+CVE-2020-3137,0,1,ae485afbdc7162dc1393b4295663f048019ccb1fce955fbde8eb4197961f7ea8,2024-11-21T05:30:24.120000
+CVE-2020-3138,0,1,85244a07f59f602aa8afcad0bd38ef12fa83324a8a43af7afbce91533fb5a6ae,2024-11-21T05:30:24.233000
+CVE-2020-3139,0,1,d4e15aae3d124a2532aed6a3c325c30ded5a2dcab4c4600b0b5d7aac351a17a8,2024-11-21T05:30:24.350000
+CVE-2020-3140,0,1,41986b489a79c21d2f2fd775ec7e115eda44ade3e1a15bed0235a6370fc54e77,2024-11-21T05:30:24.467000
+CVE-2020-3141,0,1,c8600530b5c5143ec65cf1886fc43672143007ee75ecd09859150320158408b1,2024-11-21T05:30:24.590000
+CVE-2020-3142,0,1,fd8feb8e1b04b3cc9ce677cc8887fbc3f14e8827008ca2eee62319bedbd4d138,2024-11-21T05:30:24.740000
+CVE-2020-3143,0,1,0ec60e9015f97e1d9c1025529f9623a1f694c6a6a39f9aa06f09076c8459ac13,2024-11-21T05:30:24.860000
+CVE-2020-3144,0,1,0bbd28ed43c744c7243e9c992922d12ec4a6c454cd711c7df3ffa9d9d2185a5a,2024-11-21T05:30:25.007000
+CVE-2020-3145,0,1,3bb4ab8732fc549bb33560b10fd9e5942a29559a40f32c7bfda78c5d40644349,2024-11-21T05:30:25.127000
+CVE-2020-3146,0,1,4e7c67cd5a1e64e2b7442c289a690add8e31c28b12280d2ed12f4344b1e8a74f,2024-11-21T05:30:25.247000
+CVE-2020-3147,0,1,f124f406e966f8b48a0c340715b45b7d465cb75e6cc07514baca4c8bc1b77c4a,2024-11-21T05:30:25.373000
+CVE-2020-3148,0,1,4c3f9d5575547944b8fd23a633a2350fc14cc67ec279e7a4b42276ff3b071b10,2024-11-21T05:30:25.577000
+CVE-2020-3149,0,1,ea96e613578551c58dee903e04c2ace183432fd6908c433cc64cbf1c87c50290,2024-11-21T05:30:25.700000
+CVE-2020-3150,0,1,a6df5dca11e8ef39722b02b4786ce3e24a0af3ec14b5ea478f53527f3b448ef1,2024-11-21T05:30:25.813000
+CVE-2020-3151,0,1,41ae8f0fcb14ce7d5c825245834a3bb7c882d4ba784836f543a3559045310a9a,2024-11-21T05:30:25.937000
+CVE-2020-3152,0,1,1d5cd1f85e2c114cb3e2af3d881f39310715e75237dbd9ca470305cc51752332,2024-11-21T05:30:26.070000
+CVE-2020-3153,0,1,a5ba0cfceefebb88908ecaa605c4c942657567b8e10ff8c9371f5f39b9d64504,2024-11-21T05:30:26.193000
+CVE-2020-3154,0,1,d9e945aba2b66afbea398f5efe226493c960ef94620869d9e12ac22e6943dc52,2024-11-21T05:30:26.333000
+CVE-2020-3155,0,1,7be9d744e39e3bd78aa15d09734f70408756917adf5c50a6662565c9c35c834c,2024-11-21T05:30:26.457000
+CVE-2020-3156,0,1,227901c14d101b638f16e6a3628b350f533e846bb1938781f3b026b6880bc71f,2024-11-21T05:30:26.580000
+CVE-2020-3157,0,1,858f785d1eccfedf4855205a58f929659c60784006ba24e865cb1097dc4292bc,2024-11-21T05:30:26.703000
+CVE-2020-3158,0,1,d55fd1658d2550b83c2b52aaa7b40ba3e715ef740bb01acd34aa6e9688c93161,2024-11-21T05:30:26.837000
+CVE-2020-3159,0,1,07a43b41c8fed8a1f1a97b4f496ecf45805f8493fb663d49c8706cc023a5e4fe,2024-11-21T05:30:26.970000
+CVE-2020-3160,0,1,a2c8c20cabf843063b29826a62dcdb45cc7290bd8385bfb323b4046029c5a978,2024-11-21T05:30:27.080000
+CVE-2020-3161,0,1,85418ae50586a84c431b727825ba2f5eb5796fd3b8644caeef1912e7c1a2fc26,2024-11-21T05:30:27.190000
+CVE-2020-3162,0,1,84cacd319bfac765fb0f8cdc6c8fdf15f2564b4f7aff41a76a048cf5919c6a05,2024-11-21T05:30:27.343000
+CVE-2020-3163,0,1,5a5d623e72b7989768905a3d978185cae873553d8550f60eeecd3b63ea2a3f51,2024-11-21T05:30:27.467000
+CVE-2020-3164,0,1,986c03557815533ea36eacf809dd88ebc80f2090cdd8dd3a95a7427a4add3f61,2024-11-21T05:30:27.597000
+CVE-2020-3165,0,1,add18cefa5686d1ea73d03432aaf6e0850ef8a2936240bb3b1b3647d22e3c68f,2024-11-21T05:30:27.747000
+CVE-2020-3166,0,1,83e8bb48cd6f3c190cfa57c007c1af7182e51c6d1a262838d3c9d66b4870a99a,2024-11-21T05:30:27.887000
+CVE-2020-3167,0,1,037c5fd4f63d86f01b25dc79d53dcc20c81a36ff94518614d3e4a1165c4baa24,2024-11-21T05:30:28.020000
+CVE-2020-3168,0,1,c4bccde166f67ff41c658d781eef84d58a813b6277cb5e73ab6fbdc7798c9abf,2024-11-21T05:30:28.170000
+CVE-2020-3169,0,1,94fba9261bd25d771b6b0d6dd7676a9370e00ed11d80ab57a96f298956e8cbda,2024-11-21T05:30:28.293000
+CVE-2020-3170,0,1,7782a7688321144b24cc8abb83a10c96f89d3a0d4f791aa0653e1c23f430c95c,2024-11-21T05:30:28.420000
+CVE-2020-3171,0,1,6e85074b769f8cf978f9bee3a4adee0e8450983a1e55519d1f4e3664cf6cea9d,2024-11-21T05:30:28.543000
+CVE-2020-3172,0,1,0a7b24940f636ddaa4f50c56708dc79a13f0260ef5f526919ae753f4d2dd6b32,2024-11-21T05:30:28.670000
+CVE-2020-3173,0,1,fb5e92d5d3cb5ce3074a9e12c2db29bbd2848dde59ae837129a93cc1b987f119,2024-11-21T05:30:28.820000
+CVE-2020-3174,0,1,808af8c6b40da5eed5af1a3c036a2b89b54552df2cffcd84047e131772ba4afa,2024-11-21T05:30:28.930000
+CVE-2020-3175,0,1,8b180dd0289ca446337e231680101a1e3da951bf0a842ed5788b66be8cac12a1,2024-11-21T05:30:29.070000
+CVE-2020-3176,0,1,7d8f6a1214b3455530a568a5d1d009a6124e571c6ab7996bfe2deb51efef04a8,2024-11-21T05:30:29.177000
+CVE-2020-3177,0,1,7901773ff850700694dd0ff0fcc3a8265f8fec0c3ce94048e8f6ac7cfa9f825e,2024-11-21T05:30:29.297000
+CVE-2020-3178,0,1,512e6c08848e47c109dac6f029a11b4df3194ad5ba1ac68310762ddd0ede5710,2024-11-21T05:30:29.420000
+CVE-2020-3179,0,1,29190b37bb3f5d6046c2a2c93b7390e82edca1c15bedbafe1eb762832b45da99,2024-11-21T05:30:29.540000
+CVE-2020-3180,0,1,166c5ce5cdedeb7c9756e6171d9cf610c18c5c66b1dd7ff6924a9aa6d79a4ba8,2024-11-21T05:30:29.670000
+CVE-2020-3181,0,1,ccb3d3cab0837ec8160afc19e556f26705aa52f747c7aa23f490b8de4ae28b46,2024-11-21T05:30:29.790000
+CVE-2020-3182,0,1,f278bdc3f5fdca05c9fb550e90d047525728674847e5eb236749661fdfd507b6,2024-11-21T05:30:29.903000
+CVE-2020-3184,0,1,418b37f57f93824bcd99c7063edc2a189c0b37e454de6d769a02bf2347227453,2024-11-21T05:30:30.023000
+CVE-2020-3185,0,1,e1827af45785f99b4f1e52798f7f6eb0d330bd7f5c62ab4cafe28b682bcc6da4,2024-11-21T05:30:30.163000
+CVE-2020-3186,0,1,2bdeeac453722d522ed4e844a8d3dde8580b0605bd45345aead1b97b38b3fd09,2024-11-21T05:30:30.277000
+CVE-2020-3187,0,1,2a5c6f086117e35c68470625444dcd7a7543214d969e7ab2597e7e287dfaedea,2024-11-21T05:30:30.407000
+CVE-2020-3188,0,1,90571403d3c32d9d22e1fff7752d407c160454b8f43a6ba0354f60fc830b1cd1,2024-11-21T05:30:30.560000
+CVE-2020-3189,0,1,1dce536c61680c49c89d15f07d1a76e1eee70873fe38aa3aa58ce19683734011,2024-11-21T05:30:30.713000
+CVE-2020-3190,0,1,6604cbd9224040987481db15635be70a0ae7cb2d8cc226e01c17ec2703a291ab,2024-11-21T05:30:30.857000
+CVE-2020-3191,0,1,dcf1b4172d7383fdcfef1e936af046bc2c44f5ad218b6eb2541c464094fc1e8b,2024-11-21T05:30:30.980000
+CVE-2020-3192,0,1,27f07b8a5aa1278effdfe95d50c8f9d9d51b09cd840538dac11e12314e848887,2024-11-21T05:30:31.123000
+CVE-2020-3193,0,1,ff7721b9ad28101f88b172eeb6df8b2d78289339568cc8cdf3f06c9e0e50b1d2,2024-11-21T05:30:31.247000
+CVE-2020-3194,0,1,4e5286f633700597d9295f8aecd2ad48146d16f5b8d4553e4e6941fa8be13b23,2024-11-21T05:30:31.370000
+CVE-2020-3195,0,1,b950180be9ffa34422d098f7a0ef731d40098e5fd6fdf68226ef6c6b05080d3a,2024-11-21T05:30:31.500000
+CVE-2020-3196,0,1,4ea6868363888de1ddc81bd7c5360c9974d34afcfbfc5ab6920b2e3f665b42ec,2024-11-21T05:30:31.633000
+CVE-2020-3197,0,1,3326618ba98ddbd39120bfe694b1a0537ca1290deab2ab5ad1d38d451b0626f8,2024-11-21T05:30:31.797000
+CVE-2020-3198,0,1,e7b33cec1fe7491158f126155c1ac0e45a72f93eea6e052bcdcf258e8fb7218e,2024-11-21T05:30:31.917000
+CVE-2020-3199,0,1,a906d15b6fe1e0847c909646d86977eb380db19d8e67995fd036ef5b4197f2e6,2024-11-21T05:30:32.070000
+CVE-2020-3200,0,1,60ababa41fbfccb0a6783a8318f44b60bc13c892a6f6f75437e5e2009b8bc5f7,2024-11-21T05:30:32.197000
+CVE-2020-3201,0,1,cce1a0e6ea88fd91bcd3df7ed814df41f2e76ba1e8f38acc3f4e2d6906493c95,2024-11-21T05:30:32.503000
+CVE-2020-3203,0,1,0948e536986d8d07c43942e2eaacf1bde3b443ee3f66caa27fe29b69ea3d835d,2024-11-21T05:30:32.917000
+CVE-2020-3204,0,1,65106187292b0cf5b9fb2adfae56842ce4568329d3412236db78c60096c6ae95,2024-11-21T05:30:33.050000
+CVE-2020-3205,0,1,1f12b15b332a9826287865e24ae1c0fd7da7582180e85df2df36210377651c0b,2024-11-21T05:30:33.330000
+CVE-2020-3206,0,1,1d63e0e5c2610c2512c84496d23468cd66d233bfef48e7a57973d2577b48842f,2024-11-21T05:30:33.470000
+CVE-2020-3207,0,1,d7669ec3611ae1303af4a1c8722c2cff7310f1268fc63da5c689860f45e69821,2024-11-21T05:30:33.603000
+CVE-2020-3208,0,1,8d701f3c0bf1aecff1c8ae5f248189723b16b204cc2b96b78ffe382a2b4dbcb8,2024-11-21T05:30:33.767000
+CVE-2020-3209,0,1,9e53a31089c89c517e806f9f801876cdb56f8e69a181e8fe307c556231d984c5,2024-11-21T05:30:33.897000
+CVE-2020-3210,0,1,b326161d05e98219e3a27f6ecfa03d6fd8acc3aab5c3abe2cb3771f9dfb5210d,2024-11-21T05:30:34.053000
+CVE-2020-3211,0,1,5ffefa583cca8821fe1cc6f1d77fafd1b06659a3ef6a61a38ba63157c0c2c647,2024-11-21T05:30:34.170000
+CVE-2020-3212,0,1,bd8ecc804898e88a01c3698b4ceaac1095993bf51ffee4210239250c3cda77e1,2024-11-21T05:30:34.293000
+CVE-2020-3213,0,1,1e03e2d26be2748ea8df696feaa0a09148b094f65d4ca299055284e2abd788b3,2024-11-21T05:30:34.407000
+CVE-2020-3214,0,1,b9129de85aa2790cccf239f213d61da5cdcdab4f936cadcf77bbeb708af81846,2024-11-21T05:30:34.543000
+CVE-2020-3215,0,1,4eeffbb9b232ef53cea42623a39078350577eacd26d0fb8214e9ccfb4a815aa2,2024-11-21T05:30:34.680000
+CVE-2020-3216,0,1,c670feef9d37e831a764cbceb12a66e35dd48b27be91a06ea68a577baea4b33f,2024-11-21T05:30:34.830000
+CVE-2020-3217,0,1,8455ead721f70f65b5643ced68137ce9367230cba1c93b01efbee3aaeb80aa0b,2024-11-21T05:30:34.947000
+CVE-2020-3218,0,1,e0b26a747ce0402f207331df6211a5313ac86f13c85f33ebaf4dd3f71fb48bb9,2024-11-21T05:30:35.163000
+CVE-2020-3219,0,1,2971e431f0e79b089fabc9535a0a7db788a1d159df0cb9833727f1f1247e7b77,2024-11-21T05:30:35.290000
+CVE-2020-3220,0,1,bd8a535cc45837b64e07103a6f6e5be4c94b9277b41c743b80a2c717d86e56cc,2024-11-21T05:30:35.417000
+CVE-2020-3221,0,1,c6983a438782d906bd4813483bc8613a8d2af5c0ac5b285846f6c6e5729a5f6e,2024-11-21T05:30:35.537000
+CVE-2020-3222,0,1,11f66ac3822b7041bdb80f76b4efa9fa410a23e4a755e831a2891619302a3735,2024-11-21T05:30:35.660000
+CVE-2020-3223,0,1,c584116b720cedb370f8efacaafd5e4555ed5c2f934a2d39e653a36182084f97,2024-11-21T05:30:35.800000
+CVE-2020-3224,0,1,30beada97158d7c7a8f4ab6f9198bfdd5568062ebfea4e8abc2ef5e8376f030c,2024-11-21T05:30:35.970000
+CVE-2020-3225,0,1,0df7d043b0850cf9f3399b3969689766cabcf09d2e1e8b53426769c9b100c7f5,2024-11-21T05:30:36.133000
+CVE-2020-3226,0,1,bb5c382d3611ae377cffff487859403255a583e3a18a2fde557654a6ba19b0aa,2024-11-21T05:30:36.280000
+CVE-2020-3227,0,1,276cd13dace8d51f49a1ec587437b12637adf16fd3224eb49b3a14a3cd3cddb5,2024-11-21T05:30:36.417000
+CVE-2020-3228,0,1,6c06c8b878e7041c797e4d20c71ae90e7c8dd14d80cafb9132462639f5f53601,2024-11-21T05:30:36.550000
+CVE-2020-3229,0,1,88b9d6358ed7fa92e52f2f53cdc93eac5bb34dd069297eab67788c5213637524,2024-11-21T05:30:36.727000
+CVE-2020-3230,0,1,e8a17f4b7871f560008926f546e37af065bcfec740780dd8eb8d6c91fdba4b43,2024-11-21T05:30:36.857000
+CVE-2020-3231,0,1,5b3c3a7c779340c5c8c775dbaa08fdc1c9be5b7215f134ed128822c5c04da92f,2024-11-21T05:30:37.060000
+CVE-2020-3232,0,1,d157db0d00f866d0924bf9d625a9b2cac4c1d97027e251f5515696fb8bcd2d92,2024-11-21T05:30:37.187000
+CVE-2020-3233,0,1,4e249039a273590d4a0722821d599c1b41bc3891903b54bfff9ec32239e557ef,2024-11-21T05:30:37.330000
+CVE-2020-3234,0,1,a88d96d6b5702ab1c6604fadfa3f64c041de71e4135c9a345a409d0837000454,2024-11-21T05:30:37.450000
+CVE-2020-3235,0,1,ec8d1c6d4d04addbb0fab97af2745d9a6b4772d6c1a3bc5092d5bf9837c6b8c3,2024-11-21T05:30:37.590000
+CVE-2020-3236,0,1,9c048ef426000a95037c25fa03c0862c52fbd6b4efda350c48654e7c8439b170,2024-11-21T05:30:37.743000
+CVE-2020-3237,0,1,9709230664d040daa9a7f94764162f03b0bd1b7acb3d15e60877235f77af95c2,2024-11-21T05:30:37.880000
+CVE-2020-3238,0,1,1816a97b53c53b1fe6515b541e04c4b7bc14e94bfe392d182913f407a0a56809,2024-11-21T05:30:37.990000
+CVE-2020-3239,0,1,80b2b74f1b5d60c107d227f2aff275347f79dc5d0b9bf9d9c1b0e25ca4709c4f,2024-11-21T05:30:38.113000
+CVE-2020-3240,0,1,c91a3b4cb427694b49e0709b266052147619fca14dda8d97f9fcffa9dcb7dd67,2024-11-21T05:30:38.240000
+CVE-2020-3241,0,1,34e2a21bce400b64ea62f1c63195eb1b0572d044746a035b53d8d1987a581a39,2024-11-21T05:30:38.357000
+CVE-2020-3242,0,1,f7effe471dae3333a1484d1374033c513e1ca73d45299a14f9f9afb01e01546b,2024-11-21T05:30:38.477000
+CVE-2020-3243,0,1,acccf3930fc4a9118470f864127306371adf41a39a590b7827fdde845f4da5cd,2024-11-21T05:30:38.597000
+CVE-2020-3244,0,1,4d3e24fba93da55694cb8dcc29e03f52740a1cc3e7560777c72cf5b590a8df56,2024-11-21T05:30:38.713000
+CVE-2020-3245,0,1,7149de520bbf3adfd2f8bfbe4d0f4ef7d7d23d0725430ab427b4319ee9b50b60,2024-11-21T05:30:38.840000
+CVE-2020-3246,0,1,0b4b7d6bb46665bb4631321628850d046421a775c4bbaf821b5a9daea29ecf91,2024-11-21T05:30:38.950000
+CVE-2020-3247,0,1,2f71c02543b31211406ed8d240ac61c7d79bf90c7588b1d2d0a305473f6980b8,2024-11-21T05:30:39.070000
+CVE-2020-3248,0,1,dbc3124ccb529da495e3b3d647290fcbb33d25a90fdc2f9e6aa49ecfde262e0e,2024-11-21T05:30:39.183000
+CVE-2020-3249,0,1,594e11e9739ab023eca7d0d3def5ca52aba74ba90128da61c4145751f7732818,2024-11-21T05:30:39.300000
+CVE-2020-3250,0,1,7be763ccd63d162af30d0346c1165d81f915590c2d507b4380d7230daea87590,2024-11-21T05:30:39.420000
+CVE-2020-3251,0,1,769a8eac08e8e16e209badb276c302a81d3fc16aeedb72ca169aaead66803b68,2024-11-21T05:30:39.540000
+CVE-2020-3252,0,1,59424af90e6f9a58066faa69385e832a84563c9f37e5a9c786ff0e34a834bb60,2024-11-21T05:30:39.657000
+CVE-2020-3253,0,1,41028c7534dceabc79b57b3b5e6c1af7bbfd2396d0a5a45f35b93c69b47176c1,2024-11-21T05:30:39.773000
+CVE-2020-3254,0,1,6d7b1a0572fbc11b012c247970f4285396648d39183bbedddd57e8682dd7c17a,2024-11-21T05:30:39.887000
+CVE-2020-3255,0,1,804328c94eb6152b103d12a86180f75c8985b2e43eb08160465d0b52d393b19d,2024-11-21T05:30:40.023000
+CVE-2020-3256,0,1,43608713b11472eb86e51d7c58f543d7912fc864d33e88e1323e57d603676f57,2024-11-21T05:30:40.163000
+CVE-2020-3257,0,1,dc82d92d3b344393c5e6fdaf848a90c1b3b88fbe8e1a59bf683f046b3be27768,2024-11-21T05:30:40.277000
+CVE-2020-3258,0,1,c82cb449d38686f280bfef39355bcae95567e81ae3d66957d065d6c6fc2689c6,2024-11-21T05:30:40.403000
+CVE-2020-3259,0,1,fea96f2f687d8e0e1085c6113ef451591be04b4a6988a1ac698f50dccb6f4e06,2024-11-21T05:30:40.517000
+CVE-2020-3260,0,1,66b25f597087d125d6c6808981224f77985615beccda81f596818efef719ef74,2024-11-21T05:30:40.647000
+CVE-2020-3261,0,1,3706c6ce93988aa91e324004b4ae69dbcb49b8d404a2e308f3d36ab4f0f5b22b,2024-11-21T05:30:40.760000
+CVE-2020-3262,0,1,4cbbb0209e4a928dbabb51b4470cfe1f5a4ed7802b18f72e5cb0c42de14299ac,2024-11-21T05:30:40.903000
+CVE-2020-3263,0,1,136297574ba840e58acca68c9fc0c17caf43f7a242ce5c7611d9938c24a9c249,2024-11-21T05:30:41.030000
+CVE-2020-3264,0,1,808e574e74cef015dfae3b120ae4d4a44a0d45580cadfbcc35db335da4c7e59c,2024-11-21T05:30:41.157000
+CVE-2020-3265,0,1,ab3da9c5690875366632ae19efb4dd8b3c323945bb12a421e5102113eb8a6459,2024-11-21T05:30:41.343000
+CVE-2020-3266,0,1,50409b69ad035bb3b489b5d48eda8710b4daa41e8b776c4fd8d2843fa5ca98e3,2024-11-21T05:30:41.470000
+CVE-2020-3267,0,1,4b2d593107dd50aa25bb4ef34204fdb1ab886e3fd9fea8743335636633cffd27,2024-11-21T05:30:41.593000
+CVE-2020-3268,0,1,cd8f47140cfd0cc574d3c6bcba1324dcd0e605f42f0660d2ed4ff0b5ba4e4458,2024-11-21T05:30:41.707000
+CVE-2020-3269,0,1,b3582bda0dd9007267f68688608a81698012a8a9285558527843cc41ef792a8c,2024-11-21T05:30:41.823000
+CVE-2020-3272,0,1,c0e1ccdecea934831df2f69e43d07f2bf3c881b890ddf4fad6dde6a4387de854,2024-11-21T05:30:41.940000
+CVE-2020-3273,0,1,fefcd70a6d51037a425addad12badf47bda3942e8d1d3be5120ba9da171ead5f,2024-11-21T05:30:42.057000
+CVE-2020-3274,0,1,eea647e7adc671fcb32472cefaea7f16440967d6e2172547891656c9ad3b2e37,2024-11-21T05:30:42.173000
+CVE-2020-3275,0,1,ccdaf845e8b8c61ae85e366f8e4526c52b14d6c531fc3cf74852a39713d6a5e1,2024-11-21T05:30:42.297000
+CVE-2020-3276,0,1,9fd13bb0d630532b733469cca22ed6cb90b8fe1f567e443c355800d1460f8645,2024-11-21T05:30:42.420000
+CVE-2020-3277,0,1,83c814d7dc73762c24c3c7ddaf0280c9ff9cfc3349ab97a2fe57b843712b3212,2024-11-21T05:30:42.540000
+CVE-2020-3278,0,1,27a0acf883176220cc08c3c890596260d325734016fc72f23592dac14269cbbd,2024-11-21T05:30:42.657000
+CVE-2020-3279,0,1,b7732d15a0ddd14ff38b814f1e58e6282d0f00401ce62ebd9849b9d80b899e0f,2024-11-21T05:30:42.780000
+CVE-2020-3280,0,1,2330770bbd8e39a52a1cbce1e66712cdd82a972f19d3f7a1335d681376911175,2024-11-21T05:30:42.907000
+CVE-2020-3281,0,1,44b591ebde8bd0a58fcf423333c75521f8857e23ee44f27240ccaa613d1df6d0,2024-11-21T05:30:43.013000
+CVE-2020-3282,0,1,6231a009fd966b85d4a6d5bc217dbeacbad1ac6b177f38ca35caa2877965923f,2024-11-21T05:30:43.133000
+CVE-2020-3283,0,1,9526e8aa1e8c2707dfac4a8fa781403860df0803802806b2b00c8315911f4b86,2024-11-21T05:30:43.263000
+CVE-2020-3284,0,1,84a9e92278b9d80169273210823c5c7ff742dacdc692c705eacbe398933f98db,2024-11-21T05:30:43.397000
+CVE-2020-3285,0,1,e0816b6f70e8657d2525a5fe6046b266fca0b8dd28250f55e1aa21d086c1deb8,2024-11-21T05:30:43.573000
+CVE-2020-3286,0,1,e093d7a78686b1e8e71d8620a380e996ed7008b64e397805a850a04300231fe5,2024-11-21T05:30:43.687000
+CVE-2020-3287,0,1,4a2560f6dc60cc2154b10f4f5bc8c8537f9236a30885289719fe6b9fb4c13f0d,2024-11-21T05:30:43.827000
+CVE-2020-3288,0,1,a63784704a3d46a5af4a9ff0b20ce069d4bde1ada37a681ac9ca6fab43fa09c5,2024-11-21T05:30:43.960000
+CVE-2020-3289,0,1,99421cb135fe3f299ac525a36a5fa2bce6f4c925bf147dd3fe72944ae9f4c104,2024-11-21T05:30:44.080000
+CVE-2020-3290,0,1,d3d8a501060bd2fed24f48525f82591809c14411060680f0968839bcb6b53677,2024-11-21T05:30:44.200000
+CVE-2020-3291,0,1,b85dbaad6674f9df12d2c5e7fd75fb04899179a913d55b3a57cf56251d4bd956,2024-11-21T05:30:44.317000
+CVE-2020-3292,0,1,806a359cfd3c3ef833ad93167f281319ece716eb897aa74a236d6f64194eab0b,2024-11-21T05:30:44.440000
+CVE-2020-3293,0,1,095a85121409ee14a2760c3481348954f29b6e33aefab6513b210484a0613071,2024-11-21T05:30:44.930000
+CVE-2020-3294,0,1,370fe9e4472f964e32111410eb79d1740b225ac7bae30c4e80af8d3ff31bccf2,2024-11-21T05:30:45.057000
+CVE-2020-3295,0,1,50f24d1e2d1226c423249d369e8b00d35af6cbd3e87da2775365a2d0d9c2f853,2024-11-21T05:30:45.183000
+CVE-2020-3296,0,1,dcbc0ede18226d1c426f21977f40d42b0eefe215987c308d78218bf6adaeafd5,2024-11-21T05:30:45.303000
+CVE-2020-3297,0,1,c39debda7fb650e789f85f1c346fafa68cd5e373b24e8444d2590b9985bcf09e,2024-11-21T05:30:45.430000
+CVE-2020-3298,0,1,e46daac6ad94e15ecc0a860844824d7ff1bb2e9125c78a130fb05323f65fd2eb,2024-11-21T05:30:45.660000
+CVE-2020-3299,0,1,c47cb6a7579669bdb20c3632d60cd0a69c5e56523627970cb1868f5e26875d3a,2024-11-21T05:30:45.790000
+CVE-2020-3301,0,1,28071cdaf3713cbfb35da00ae55ccbd4a2d0fcfdb6b17906e3f94d279dcd39ad,2024-11-26T16:09:02.407000
+CVE-2020-3302,0,1,5d31ad9ecabb74fa90260b7ca75c563683ea4771d649529c6540ecad5587edee,2024-11-26T16:09:02.407000
+CVE-2020-3303,0,1,2041ac59551fda2d37c57aa0fade16e6a6197c50c33fa3eacf009fc65d4b5e04,2024-11-21T05:30:46.210000
+CVE-2020-3304,0,1,a6dc2f2c6be668714adf919b7130fbaeab86231a570d9d08c554ce3336edacce,2024-11-21T05:30:46.330000
+CVE-2020-3305,0,1,5b1543e4c933bfd5898efab8550db8fdba5f9209b2eb81f39fb1bc8ced7854e6,2024-11-21T05:30:46.487000
+CVE-2020-3306,0,1,73e25473a36a48263eefd7b1bb804cfcf14111737b3592838513fdb181848e30,2024-11-21T05:30:46.620000
+CVE-2020-3307,0,1,2a5b8232e52b3107990ec8c7245bfc57485e67828cdeacd4eef789051cbc821e,2024-11-26T16:09:02.407000
+CVE-2020-3308,0,1,35e8b2b93a1090ae3d208461fb99527f3660457a1aacba0979f8695eab7e86f9,2024-11-26T16:09:02.407000
+CVE-2020-3309,0,1,c02dfc3edeacfc657e8504f416d49675a90b11e3f3a8fc8c67ad8a8a501f10ea,2024-11-21T05:30:46.980000
+CVE-2020-3310,0,1,06bf8caecb9a886ad658c7bace52df4b03f3b513a8435a2ccc5261eb725424bc,2024-11-21T05:30:47.093000
+CVE-2020-3311,0,1,d661979e02c8be7f718f6ebe96ab2f8d4cf2fc600c9fdd80d1d5b28b74c71663,2024-11-26T16:09:02.407000
+CVE-2020-3312,0,1,d7502d26cd5eb0848367f1ea57d8d27f20f5d708ea5883688b7d705c6d4bdbf6,2024-11-26T16:09:02.407000
+CVE-2020-3313,0,1,e964339e0e25f5e6ee0824a06533352f636b73c8b7444b2ef1fa08e38634e5a6,2024-11-26T16:09:02.407000
+CVE-2020-3314,0,1,5a15392c92d4dc52e760366673695980ba296e816a798eb130c23beea60ceadb,2024-11-21T05:30:47.533000
+CVE-2020-3315,0,1,ecf2c22f4e8acb70e8d37bd8e2fd3fcf1617cb94fa3efd59b5764fa17405d392,2024-11-26T16:09:02.407000
+CVE-2020-3317,0,1,07bdfa116e5622403fb416f81fd140125227fdb04603b78c6152cf0b384cad15,2024-11-21T05:30:47.783000
+CVE-2020-3318,0,1,8ebfb08cbd4eac98bd36454a6b70e51017579d4a494a894d7a3f403aef754af9,2024-11-26T16:09:02.407000
+CVE-2020-3319,0,1,67fd30ab8c86969e61cbc527318043ad13f872717418a8d5b9815d394abe0b9e,2024-11-21T05:30:48.023000
+CVE-2020-3320,0,1,189c0b8043f20d4a4e7176e60d5d4c2c10abdf93d7d63280e7aef0ab78e08ba0,2024-11-26T16:09:02.407000
+CVE-2020-3321,0,1,718011e9ccc72f9c57f5eb71af6536be3c3cd1fb4e5f7d0362d0723089e46dd3,2024-11-21T05:30:48.280000
+CVE-2020-3322,0,1,afe264ed74c8c58ea5b4cc1dd8c73253350ad2b2f14f79c0928d8b4de09e937c,2024-11-21T05:30:48.403000
+CVE-2020-3323,0,1,d6250915b43757832b93e4192c4688536ddc4fc205615648c4cbac3595552851,2024-11-21T05:30:48.520000
+CVE-2020-3327,0,1,472fb61f660327ce88b842a9cc3232b5e4e165a463c6e1bfc5a4647b0af32aa7,2024-11-21T05:30:48.643000
+CVE-2020-3329,0,1,6872359b8347a5fa2c05bba8a3f09f3d3168370b2f8071354de7ca730641de44,2024-11-21T05:30:48.813000
+CVE-2020-3330,0,1,346c05c6c40c6626b624af041b24ba984e0a0c776f3a221cbf9ece9aff6e68c3,2024-11-21T05:30:48.930000
+CVE-2020-3331,0,1,65f1ad163ba8cf5a39467a2bf74122efcf8688428e9962fc57af75f105469b6e,2024-11-21T05:30:49.053000
+CVE-2020-3332,0,1,ec2b9b303eb94b195e02f6fdea930af4730bf9cbf04217306ba9399f67d4d016,2024-11-21T05:30:49.170000
+CVE-2020-3333,0,1,31e78fa779f3d3fb2542447387d4966e54188d0c395536591ae5bcb5aea35b42,2024-11-21T05:30:49.283000
+CVE-2020-3334,0,1,3a320ae555e8fce4d6398ac5a37b66ace8b0bbffade76a32ab109a7e2cb3df22,2024-11-21T05:30:49.400000
+CVE-2020-3335,0,1,7fc7219aa0897e784069e7fa485a54d22f787f688f83da30672073619edded7e,2024-11-21T05:30:49.523000
+CVE-2020-3336,0,1,fb977210b2cb9ac8f34b75b69fd75467ee24342716ebf0e0ba2e57e751c93ba4,2024-11-21T05:30:49.650000
+CVE-2020-3337,0,1,f80eb1b1df220a7dec6c469bc37353b2ba75f15d4bbf9d4b20497fcf8cd4ea64,2024-11-21T05:30:49.767000
+CVE-2020-3338,0,1,64f9f93b245d0e64eca468ab299a9eba1f9d7dfeb68cf7bc787612cc6d232b98,2024-11-21T05:30:49.880000
+CVE-2020-3339,0,1,5eb9f077d28a137bb854ac946d897b9669bb00385360408eded8a639ece761cb,2024-11-21T05:30:50.023000
+CVE-2020-3340,0,1,6cfcb934b2f44047fe16e97b047c07a0dcc9a49f4bd8539d3ddc8080c6c847e9,2024-11-21T05:30:50.143000
+CVE-2020-3341,0,1,4f9441d278ca304e5a840ccf7cca1d4ec8ff51370d0f6af0d5e160e3eb03c10f,2024-11-21T05:30:50.270000
+CVE-2020-3342,0,1,ad67fa799bfdf9da7e8e0b5787f468119831be1e652c5ecde64d69509d78f7b4,2024-11-21T05:30:50.390000
+CVE-2020-3343,0,1,c641dd59587f77b360d94b2defcbd497735831ce6e0497be3acf042abfb2d8e2,2024-11-21T05:30:50.510000
+CVE-2020-3344,0,1,35f17cb2c843dc502a2e971275a8907089ef820ab3203f7ce405620ee9f7274c,2024-11-21T05:30:50.633000
+CVE-2020-3345,0,1,02124b18d1f1769b3f6b5a32bd221188fe9054a27d556264c5983b915f8e392a,2024-11-21T05:30:50.750000
+CVE-2020-3346,0,1,9dc52846048885a2b9246d9fa6c72523f5fc4056bce348565ae93b631f04b165,2024-11-21T05:30:50.863000
+CVE-2020-3347,0,1,fcb110e8fda634867b6564cffbfac7cc73aac26ed6be2fae05f2bbae070c4561,2024-11-21T05:30:50.997000
+CVE-2020-3348,0,1,b16559aa7f9b2a7171e9fcab5286a960b6951e97323735536a1b5a5b27df5866,2024-11-21T05:30:51.110000
+CVE-2020-3349,0,1,545ba96468a200fdabad723bc09e1e36ff821ea1507a3f620ee0b2c287782c55,2024-11-21T05:30:51.230000
+CVE-2020-3350,0,1,ffd89b098fbf02c1a2097c782fda7318054f621366601e9427f1fd2c462a31a5,2024-11-21T05:30:51.347000
+CVE-2020-3351,0,1,9404575cefb5004e8de5f49be67d76b5db4ae8394ba7cb1834150cfcc6fc1783,2024-11-21T05:30:51.480000
+CVE-2020-3352,0,1,f7e937bf55ee68ff0e190f32044a40c0721b8d6c2e902cb86afdb2cd1cf3bd7a,2024-11-21T05:30:51.623000
+CVE-2020-3353,0,1,f3c99487976d137ed52d232f4ff31e7430105332e77ec690b6a3c9064b3cce4c,2024-11-21T05:30:51.743000
+CVE-2020-3354,0,1,ce34ae57e1260cbb731857f060cf3adc3b281e51a0796bc5648430a9650151f2,2024-11-21T05:30:51.870000
+CVE-2020-3355,0,1,722c83394f46adc3a33f4d61c13229db355c5f3b010782b889589ae0a2b6029b,2024-11-21T05:30:51.987000
+CVE-2020-3356,0,1,159a47be7211dc13081c3b8a052883738517d1c997f75c0dd412f51552aa3cb0,2024-11-21T05:30:52.107000
+CVE-2020-3357,0,1,72b7f2aa8a1fe10fb49ab87f3a891fe0d7ebc45b1c43c76a8ce016806980ce11,2024-11-21T05:30:52.210000
+CVE-2020-3358,0,1,7b2c84ce17460da73b998eb99925875c1ead775a8fd678a86b7e8ba0233a3a3d,2024-11-21T05:30:52.327000
+CVE-2020-3359,0,1,63a88ff799f53917430a33a8e405f572843e48ee6256947fd50ffa8918d373c5,2024-12-19T13:52:35.190000
+CVE-2020-3360,0,1,82b0d14e179562b7c8445c10f59ac5c35511e567ffcbd6babac59b25a4fe00f7,2024-11-21T05:30:52.567000
+CVE-2020-3361,0,1,e64f72f5c1fae648009203b9c04c3243d3ae9c124ece922650f574f3d3a27ebe,2024-11-21T05:30:52.717000
+CVE-2020-3362,0,1,04ae06c844278c31b16b1b867c671ec5cea9831ce4111b8886f803b74055abe0,2024-11-21T05:30:52.837000
+CVE-2020-3363,0,1,d53e76502e044deb2de74a80f855b8bcd54d35afb65240aa3c4c198c6d7d322a,2024-11-21T05:30:52.957000
+CVE-2020-3364,0,1,b8604105e0000dcbe716dc0be60cb4cd3bd01f43a0b594ed2cbf9223fe996118,2024-11-21T05:30:53.177000
+CVE-2020-3365,0,1,099654e86b39f53ffc51be734fc1dc8a59f767006d0f9cd00ca4ca7220924e04,2024-11-21T05:30:53.297000
+CVE-2020-3367,0,1,dec99a976f49756dc7f434d57a34a2d33612b6840f00213538f3cc29818b742f,2024-11-21T05:30:53.427000
+CVE-2020-3368,0,1,f398aa3262c467094d106109ac2b19fc3965921d35c7e49110fd8dc9c15b275f,2024-11-21T05:30:53.557000
+CVE-2020-3369,0,1,1959583d196cfdfbc6479a6b33b06804f1397c29afd4186fa0934dd63de9e9a9,2024-11-21T05:30:53.670000
+CVE-2020-3370,0,1,3e5f8ce29745c7b01b990406971fdecc7bba4b174385f0e17e3e75bf2c1c0f23,2024-11-21T05:30:53.797000
+CVE-2020-3371,0,1,27c77b2e7977f69f5dd8a611e491954794d892a302d60e5cb3fe07b9d3e1ca81,2024-11-21T05:30:53.920000
+CVE-2020-3372,0,1,d0f67e9e903327e89710e949aea45ba9e0a1b1982fc06483ebadf1613ebb0179,2024-11-21T05:30:54.057000
+CVE-2020-3373,0,1,1b12299992702e3c716248c48f51059f3215c08cd396de2f31605115e676a8ad,2024-11-21T05:30:54.193000
+CVE-2020-3374,0,1,d2488490d00901e44fec94b4138e61d750a4728af8b7786d8cb964cac127c3fe,2024-11-21T05:30:54.320000
+CVE-2020-3375,0,1,9605db66fc189120d243eafa42cd3a4049d0bd08429505afd7554aeb3ed53307,2024-11-21T05:30:54.447000
+CVE-2020-3376,0,1,5a80bb4570c3f4b30c1c4038dde37ec6e9609df62209a701fbad2ede4bd9a62a,2024-11-21T05:30:54.563000
+CVE-2020-3377,0,1,cf2c1b6985522cfa2f3dfc113769a4a3a3c344b595de07f0a5bec8d9758de1c7,2024-11-21T05:30:54.687000
+CVE-2020-3378,0,1,7df8a9611c1a3d89425d554c54006ae9a77269a420aac4f8ed79d6dbfda873ab,2024-11-21T05:30:54.797000
+CVE-2020-3379,0,1,3bd4efd5dff92b407b7d8a603d00ce69eb33173baa964ae79a7886680f2d9378,2024-11-21T05:30:54.907000
+CVE-2020-3380,0,1,0f7072e0e003e837cd57b3c4440c2cf6598b95710428561db9a04596157f2875,2024-11-21T05:30:55.027000
+CVE-2020-3381,0,1,93cb137046ec461509d3177a15d54e9a3e65ad9b0beebc12ccc50df937d12cdc,2024-11-21T05:30:55.140000
+CVE-2020-3382,0,1,a159a943b52ce7b7c6bbc4617c34a9e393ad14798795220ea216c2364333b524,2024-11-21T05:30:55.257000
+CVE-2020-3383,0,1,f4c4927af7cd5cf41c3319624f586a97ce223fca83d87b00ba8b797f1ca4af32,2024-11-21T05:30:55.363000
+CVE-2020-3384,0,1,1f1cf12b23f4e8346800785ca44950e2f8734d0461d4b9451e363db1c001a096,2024-11-21T05:30:55.473000
+CVE-2020-3385,0,1,f991d1042a0ec07fffcabac4c88167cf9b3582307e3c4b61579ee82fa8b79fa0,2024-11-21T05:30:55.590000
+CVE-2020-3386,0,1,b4b5b1a35c16676e050cc3012d8915416f246492b9c3e6f6c738a45a645ca164,2024-11-21T05:30:55.707000
+CVE-2020-3387,0,1,b0e7ccbc20885b78a868fb11cc0bdf326639cb7090e9f90876ca1e3ef44fde77,2024-11-21T05:30:55.833000
+CVE-2020-3388,0,1,bcda3fd6216858d1fe4f9335a65a5cc6ffd535f57886ef83c638e9470d16999f,2024-11-21T05:30:55.963000
+CVE-2020-3389,0,1,e32ccf75132cb717a8f2f53421f8e07aa0afbe3aba3973c1e76fbc9f08c96097,2024-11-21T05:30:56.097000
+CVE-2020-3390,0,1,7e1ea4dd280b061d1f66e5c1e11fdef2f97b9479dd0e8c505f42b506f1535366,2024-12-19T13:52:35.190000
+CVE-2020-3391,0,1,9544723ce29fdeb778e31e3ccfffd347090e715dc5efaade8ab63c5b254ac8f1,2024-11-21T05:30:56.340000
+CVE-2020-3392,0,1,25b6482c58a1406dfbce3f9e2871bd62029ba8baf208ce9365799da57565a6e1,2024-11-21T05:30:56.453000
+CVE-2020-3393,0,1,0374d56541d6e18ca1573707ef4d7a50456320c1b59380dd4792ee2d1857e0a6,2024-12-19T13:52:35.190000
+CVE-2020-3394,0,1,2f026939cbce449a23759d05dbbffa46a5de2aa81e69e1c17df466da035ff184,2024-11-21T05:30:56.723000
+CVE-2020-3396,0,1,a2a88d3763d988f8bf4c27e2ddc771e6ec0998801c0b22754ae21ff0838f5a04,2024-11-21T05:30:56.857000
+CVE-2020-3397,0,1,5fe4b543a4c40412221ecab790a993f72d01e4cc461c30e433cad5cd21870a12,2024-11-21T05:30:57
+CVE-2020-3398,0,1,421371d5497833b867022d333dd6a976dcb93d41227dd51a41e60a8a02529751,2024-11-21T05:30:57.133000
+CVE-2020-3399,0,1,d0fb80f750ac6d54df4c31cbca32710bda17c1068c988cabf74b5d27eebe161b,2024-11-21T05:30:57.277000
+CVE-2020-3400,0,1,52be98bec00b3ddd446c3e5e4b1555b876d79d86e8d68923f1f2b1777d638f4e,2024-11-21T05:30:57.403000
+CVE-2020-3401,0,1,e115502f206f750dd09b8f882aa6bf8d520ddda56a9ccd647121e638bac21fcd,2024-11-21T05:30:57.523000
+CVE-2020-3402,0,1,128eb35a320cc40bc16b2c18d12127ca1d5af80805879772ea34c074a035759e,2024-11-21T05:30:57.643000
+CVE-2020-3403,0,1,69bd3672c5407e5c81cc4eef3bb981eb824e4a0b6844a9cb58efab9b686ba910,2024-11-21T05:30:57.760000
+CVE-2020-3404,0,1,9f7185936f0e82ce8ce0b6fee322e702f40ee1f57b80c263d9bbe7f18e69503a,2024-11-21T05:30:57.877000
+CVE-2020-3405,0,1,6a1e2940cd4471e55c3296d64394df79d0a8eeb3d0955eb40d01db5f7c7ce7d9,2024-11-21T05:30:58.017000
+CVE-2020-3406,0,1,f95f7f032ecfa31eb39a53191ac9108ae4467ae9082213d7366f095647aec0f0,2024-11-21T05:30:58.130000
+CVE-2020-3407,0,1,2fc2c612c1729bb65fa4d7b6ba79ed8b471613d202de9811438645f91ca44976,2024-11-21T05:30:58.237000
+CVE-2020-3408,0,1,5208ca87a47528b29636ec35e9b9aab2126964309d24b7edc47fce88479261cf,2024-11-21T05:30:58.377000
+CVE-2020-3409,0,1,bf01a8b73fb97f7bfccedc0304d39b900557e442790a17af7656c0d8d8080927,2024-11-21T05:30:58.503000
+CVE-2020-3410,0,1,fe7107b2feef2a41deed0977c5624f0f72a09db097d289450c1153e95dd1dc3d,2024-11-26T16:09:02.407000
+CVE-2020-3411,0,1,ec1fa6c96e1332d08ee36fca1a6c370f59fc619b02e19fbaa3201e14151deee3,2024-11-21T05:30:58.750000
+CVE-2020-3412,0,1,7f7d6efa90bf1ae5fa6e0015ca5ca60a8bda66a2495e4d6ddc45801cee722c83,2024-11-21T05:30:58.883000
+CVE-2020-3413,0,1,53a655f927fd4bd69d8641284f1d57f45f5b0d9c89c23553a94f4228a1ad3822,2024-11-21T05:30:59
+CVE-2020-3414,0,1,4edcdeab8b7531e1eda4a256a19595b5bc5d001577ddb82570b102a4bb57a14d,2024-11-21T05:30:59.130000
+CVE-2020-3415,0,1,0df5380b7e2e12f5c87034893305a093324717e7efcf929808569ae7995bd459,2024-11-21T05:30:59.257000
+CVE-2020-3416,0,1,6c6843bb6bc3d6eeb7762a84f0befc306d9ea1b43177faccc038c7ac2475cd00,2024-11-21T05:31:00.303000
+CVE-2020-3417,0,1,55355954f62ab560da8192b90ebe812f7045e828410f75d01757c6f064b628d6,2024-11-21T05:31:00.430000
+CVE-2020-3418,0,1,807d2d4800f4ae7651d9b3e3fe1072597cc7afa9e01fe84df7a12a60b24f76ea,2024-11-21T05:31:00.653000
+CVE-2020-3419,0,1,494736f83dcad3c8987285188bd1153e9185374e820e09984e8ea8fde977fd1e,2024-11-21T05:31:00.900000
+CVE-2020-3420,0,1,255f8bb85b509fffe64c8c101f38a64712db4466e4768ca476621618467b85d7,2024-11-18T17:11:17.393000
+CVE-2020-3421,0,1,905f08509905b311a966dd7a33cb95c7546d47a579fa046c64e016b500b10a50,2024-11-21T05:31:01.467000
+CVE-2020-3422,0,1,abd5d6e7396619ccd284c6ea920292fa0066bddb0d41f7755933b6300148b94b,2024-11-21T05:31:01.960000
+CVE-2020-3423,0,1,4e7f7696d324c6f21bf60e4d9f3e7cfcf810a35f625cfe38f78b000770f0ac94,2024-11-21T05:31:02.420000
+CVE-2020-3425,0,1,9d132d246cd7bb6290cd0babc5ca93f5857d832d5203ab87a798ceab465aa9f0,2024-11-21T05:31:02.570000
+CVE-2020-3426,0,1,65006f536d2946862f551ba48f63becd79a49e447cf6ed299ad352cb901c7456,2024-11-21T05:31:02.753000
+CVE-2020-3427,0,1,7651ea0a7d839af677c7f53ba98be83341822964624f569f234acc1ac17576d7,2024-11-21T05:31:02.883000
+CVE-2020-3428,0,1,1d203dfb64afc88635ecdea956d4e399018ec66b0845e3a3c519582ad91af9ec,2024-11-21T05:31:03.023000
+CVE-2020-3429,0,1,101e53f438fdaab4d8036c36641c0ed4e00559faf42044f1ad2ece55c0b4650a,2024-11-21T05:31:03.167000
+CVE-2020-3430,0,1,98eeb5229dfeae10e40545efe1765338b1e8931dcbdcc810929adf0530704da8,2024-11-21T05:31:03.293000
+CVE-2020-3431,0,1,cd6d3bac32cfd8857a644f1078f419fb235151f316f0943be1e4e9e1b0583c53,2024-11-18T17:11:17.393000
+CVE-2020-3433,0,1,0e0fb5bb51a05c6c75a030d839f72e158a7c69e2a7cb7718d94fd50b680f41ff,2024-11-21T05:31:03.480000
+CVE-2020-3434,0,1,c8995b33bcde31c655667c0230d7d58e1c0dd14cc20aaace02cd27edf751de36,2024-11-21T05:31:03.617000
+CVE-2020-3435,0,1,42896a56717af6cb678dbb4889e2a239138d23b959eef5d7c82a355eef30417a,2024-11-21T05:31:03.753000
+CVE-2020-3436,0,1,040ccc9f433fab9b8d33bc2531e38ae49015225d6b0d7b208f29d38db33a50af,2024-11-21T05:31:03.880000
+CVE-2020-3437,0,1,3c72c06321173b3d9dbaa2667c54fdfb57a0733eea38f5b845c9fe4427b6b3ed,2024-11-21T05:31:04.013000
+CVE-2020-3439,0,1,679ff835e4791c022c087f790ca0c90fc8b9f8dfa37e525363d64806f22f38b1,2024-11-21T05:31:04.143000
+CVE-2020-3440,0,1,ecdce59deb2a5357b57f991d775a68d2edc595ff2bb91c66dbfbb226231e9950,2024-11-21T05:31:04.303000
+CVE-2020-3441,0,1,406e94fb77c1e497260e8c357781fd8fb2b091b64c3022be0eaef92c2636aa93,2024-11-21T05:31:04.437000
+CVE-2020-3442,0,1,21ea1581238272ae7aff606d7b8af4ba64a957b804994a674688a1c85e09169b,2024-11-21T05:31:04.563000
+CVE-2020-3443,0,1,dc316bbf3b243138f401bcaac14cc119a3f546751278e99593ce128d4db68a1b,2024-11-21T05:31:04.710000
+CVE-2020-3444,0,1,d85b865a38adea8047b87e9811f593f547ab034a7615107740bea6609a60816d,2024-11-21T05:31:04.840000
+CVE-2020-3446,0,1,dcaf69182b0b67914f0d0c5926c3fff0624cd53bd99c83d84ee88ae278a5a339,2024-11-21T05:31:04.973000
+CVE-2020-3447,0,1,d7fda6c27a366181b7c4dd7e5d841b2db391b623bd26615c556a613cfc0b0879,2024-11-21T05:31:05.113000
+CVE-2020-3448,0,1,16c7ae3414a0bd4b72c46f8efad5ee3d6c36821d705dc786111f80e681a139d0,2024-11-21T05:31:05.247000
+CVE-2020-3449,0,1,38bebf7f459d68f3af8a5d5d9b328934c9b75c7f91c707c129bcb9280458125f,2024-11-21T05:31:05.380000
+CVE-2020-3450,0,1,d785f218a360448ddf558a7264b717ac9dc79d7a55d00ae72e129f7015a41794,2024-11-21T05:31:05.513000
+CVE-2020-3451,0,1,79293baa2d1757e78bed131bff52a6beb0d01c4880956161b0ff1698c5ecea52,2024-11-21T05:31:05.643000
+CVE-2020-3452,0,1,6b499eaad4610867034a6fb6cffd446674506a895fdfd32489275ecdd639d43f,2024-11-21T05:31:05.770000
+CVE-2020-3453,0,1,36410e71346619ac9ad69e3a402e93ca8c313dca90bc2b497a11c14dffae1acf,2024-11-21T05:31:05.933000
+CVE-2020-3454,0,1,ae5c23e56b05b33d7574b4319b4d164f4b1844648ad8be0b1019a0c7b7ab89a3,2024-11-21T05:31:06.053000
+CVE-2020-3455,0,1,02ce289e70ef3409c5f26622fc539b8b37ea6b9bccf84fc82c301d3d6d946e05,2024-11-21T05:31:06.197000
+CVE-2020-3456,0,1,c3f600c664efaa7beddbebc8134b02b14f935e84d02dbdbefb5689ae942abed8,2024-11-21T05:31:06.343000
+CVE-2020-3457,0,1,3b4982c732602b90d64efb3768c9fcba49002bd94251096ed0f92c17ff21407c,2024-11-21T05:31:06.517000
+CVE-2020-3458,0,1,900533cc636987f765ba4964af239784f0c7936c7d8fe9cc46eda958da4fc034,2024-11-21T05:31:06.670000
+CVE-2020-3459,0,1,1d4d0f29bdc06ad99d5e9178fab148dba1459123ec792c2982403ab79b73349d,2024-11-21T05:31:06.810000
+CVE-2020-3460,0,1,525bbc056cfa6d16b5d9684f2d24906c8229cd5d0a91a138480bc0b8ba465141,2024-11-21T05:31:06.953000
+CVE-2020-3461,0,1,b3bbb314b327c2df8b020017a43763fd9d4030caf5ef2fe85b64bf0d6e5b6877,2024-11-21T05:31:07.097000
+CVE-2020-3462,0,1,a6e8cfc6144f0366997e26cb519ff8ee0365617077bdf0c885c0c6659da4c19e,2024-11-21T05:31:07.210000
+CVE-2020-3463,0,1,fe73c0faf4f57d0d92d6b7518f5ceef2af11828137612d85b5f50a7084d1a525,2024-11-21T05:31:07.323000
+CVE-2020-3464,0,1,fa127f5efbcee98e8fbbfa2979bc5aa6bee7d9d555e27a8e2d2b29062bb6bed2,2024-11-21T05:31:07.440000
+CVE-2020-3465,0,1,be031664a2dcc0f7c783affdffc67a7af570b9b63da7f182caccb38c917a35f5,2024-11-21T05:31:07.557000
+CVE-2020-3466,0,1,7afd97206c4b933ad419e20f84a36a83c140571a16ca3cfe5cd163c033999b58,2024-11-21T05:31:07.690000
+CVE-2020-3467,0,1,0971bbbfb341e2087cd236565c82a3739f2d46a2278ce546d4c6737dc0f1cd5d,2024-11-21T05:31:07.800000
+CVE-2020-3468,0,1,85e790bfb4369be26f6429110257372926bacf9f98c2d72b544c6a941ddc312f,2024-11-21T05:31:07.937000
+CVE-2020-3470,0,1,d238e9428261ad487e8df4747705e9e96acc3a328419f290173b1616df5b04dd,2024-11-21T05:31:08.060000
+CVE-2020-3471,0,1,cd63a07152ff098221a37e271f3b00cfb090e07fc3353d1ae27b6a66443e2369,2024-11-21T05:31:08.197000
+CVE-2020-3472,0,1,93f16cb61831e26998826634b167e3d2f84f6ea67538cab8a3b9b926ad4c4c95,2024-11-21T05:31:08.320000
+CVE-2020-3473,0,1,f878bcfcdf38a91c5ae3ad90dc91eea07fecf2d60ecedd5bdff8a25d47599ef2,2024-11-21T05:31:08.433000
+CVE-2020-3474,0,1,b95b9d00aaa820a9e156476ca812061c95557b3d23fb889e2cd4063be22f6824,2024-11-21T05:31:08.583000
+CVE-2020-3475,0,1,2ceee7bcc550172d5c1545c88c093bea5e3ed733b4edac64f4cf2487a4dbcf89,2024-11-21T05:31:08.717000
+CVE-2020-3476,0,1,fd5ed23ca8b6d816933efb597bd22b4241c4a4c302bf7fa2d1c99e49c6a8d279,2024-11-21T05:31:08.867000
+CVE-2020-3477,0,1,dbb5fef086188df1267f9b4c5c3a3cd5d24c55fde886b845c8f8e3f36e448e89,2024-11-21T05:31:08.990000
+CVE-2020-3478,0,1,8603e60e4684cde5939dfec7ee90130c2d7745db7830c9951b1b65a273776966,2024-11-21T05:31:09.113000
+CVE-2020-3479,0,1,e4af2d6bc38fef4363def2f74f930a7a4067793e110c39e3e1ce6d047f0a6485,2024-11-21T05:31:09.220000
+CVE-2020-3480,0,1,ddbd53f7c36e1ada00dcf5e5be65a4ef4807ddaf04f34c21c5ac6affcdd301ea,2024-11-21T05:31:09.360000
+CVE-2020-3481,0,1,3ad3f693d41b294e4e763d4286f6c89880d120ed2acb86eed1f67c893e60aed9,2024-11-21T05:31:09.490000
+CVE-2020-3482,0,1,12cb40da2b0e9fe4c592a0ffffe4ad43466d770e432d76c4cf0469c3685fab64,2024-11-21T05:31:09.640000
+CVE-2020-3483,0,1,a433aadb16b4c28f211c3d60ffc11665ffc31aeef88046b09a00fee18c27eaf4,2024-11-21T05:31:09.763000
+CVE-2020-3484,0,1,3937ae24bd42171bb875d318193f4230e360ffa5762be4608b98c180e3715dc0,2024-11-21T05:31:09.877000
+CVE-2020-3485,0,1,a5d83ff4878aba81ae85840ef7a9542f69e790dbd29972a5f3742c35fcbbaafd,2024-11-21T05:31:09.987000
+CVE-2020-3486,0,1,38f28b50d80eaec04386012d006a37f0b958d1a9489e4ab3b4896387201e4519,2024-11-21T05:31:10.100000
+CVE-2020-3487,0,1,4dfadb626ab8767a9390e01bb90eeb65e5a0b3da636a15a08bac3b74365c43a4,2024-11-21T05:31:10.223000
+CVE-2020-3488,0,1,7aa0efdfc4b89d1c7d313f673d03d1603b459e58e3ed8dfc00abd39c56a4831d,2024-11-21T05:31:10.350000
+CVE-2020-3489,0,1,6e684ee8ac7abdcfc2f807ee4ae19a346fd1271f5dd7ec6167ef64698213f34c,2024-11-21T05:31:10.473000
+CVE-2020-3490,0,1,3eb3e987a738d1f64a94717c672ed1a6ebac5b5dd9bc6ee35a1c605384b96d92,2024-11-21T05:31:10.593000
+CVE-2020-3491,0,1,c8cbc3aa69bcab836bf76228eecec94486a7d781c48595cf5cbda6b5fea28ffa,2024-11-21T05:31:10.737000
+CVE-2020-3492,0,1,3d5efa4a805ba4345603a58f22b5b1aab79d46133f6ee715c6c751d7d92f1d5f,2024-11-21T05:31:10.867000
+CVE-2020-3493,0,1,406f8841e57872fd7cf7fd282b0cf11f99a38f6fcf363e2b02bb435290d56fdd,2024-11-21T05:31:10.993000
+CVE-2020-3494,0,1,2a263f3fc841e76f8e728550d095324d93c35c17de68d439d8a7e8a41ad460c8,2024-11-21T05:31:11.110000
+CVE-2020-3495,0,1,4843fcc1fdd9583ade52f97c4100d8974205bfdc9b2c5e6863e8e1bbfad40f5e,2024-11-21T05:31:11.240000
+CVE-2020-3496,0,1,6a932c9e625efcd61aacb72611c661bbfdd83c8a00a7d6c13355185ad420a407,2024-11-21T05:31:11.363000
+CVE-2020-3497,0,1,e658625fff42f74cbbd92723ae21cc0fc4455eea6a0312c6c1faab988c601019,2024-11-21T05:31:11.577000
+CVE-2020-3498,0,1,deb4517af0a77c53d912f5b323cecaa3347ff3f00d4e02fd19241404d11c9ea8,2024-11-21T05:31:11.687000
+CVE-2020-3499,0,1,06664c1026ce8f2554986a0a7a463af3202ec1459304aa13e25329d5690b61ee,2024-11-26T16:09:02.407000
+CVE-2020-3500,0,1,573c77c1eda281c0e7c09f2c65c8cc802f215bd0cc5dc8f0abee6150b4f33e99,2024-11-21T05:31:11.927000
+CVE-2020-3501,0,1,c26f4a844a0a32178656e99c6e9fc0f7d8c450f8cc23060dd1e36a65a5e2e9a3,2024-11-21T05:31:12.060000
CVE-2020-35012,0,0,2eccd8b4634d38c79c4a049614e16d992339530a03c38cac69e25306cfc5d63f,2024-11-21T05:26:47.150000
-CVE-2020-3502,0,0,95b6b887a00506e85a7a00916e0619b18a4a2c381cd4cebbf37ed50740de376d,2024-11-21T05:31:12.200000
-CVE-2020-3503,0,0,ccc00cb5b034f9f32fa6d55d7071e827f3c092d5e6344b9f3f0a017192c4f51f,2024-12-19T13:52:35.190000
+CVE-2020-3502,0,1,dc77f2b805bd544a9504ac4e9542111eda753e55ed8f3dacc96d8241323674af,2024-11-21T05:31:12.200000
+CVE-2020-3503,0,1,0509234c0452662b48b2831e90a52bf45580c0baf1e8d76df1e354ce6b33e4a8,2024-12-19T13:52:35.190000
CVE-2020-35037,0,0,50483bb65cf6f2d2b2e13d30f299f20950668cee0807f1510510e253a5d74731,2024-11-21T05:26:47.290000
-CVE-2020-3504,0,0,67103fe449687d9f3a9dbaaf8a97d5e0b6b547ad04a6c9ca0129467d674cc16e,2024-11-21T05:31:12.453000
-CVE-2020-3505,0,0,77099b5686a878796cf0b7c22a22d3279cf78369b1ebedcc62205bb91d340bdf,2024-11-21T05:31:12.597000
-CVE-2020-3506,0,0,991649de785fb34ae79d3f6407a9e7f3b639f7a9eef95686db526e5202a8640f,2024-11-21T05:31:12.723000
-CVE-2020-3507,0,0,191f84cf81c1f2bb7121282adeb9f24c05a36ba38fae87bb040374f565cab1ca,2024-11-21T05:31:12.853000
+CVE-2020-3504,0,1,a7adaba454e6581a2cc730090af641c42249ae59d6a050d2d42b3d16d24adff1,2024-11-21T05:31:12.453000
+CVE-2020-3505,0,1,f123a35131bd490c89fd97e1d5abd0f0e2b076a249dd0e9a89253a20d1f0a687,2024-11-21T05:31:12.597000
+CVE-2020-3506,0,1,3a0036eb033e5c2d93176fa41eaf580fc0eed4b859214e8fd7aee3c016fdeb11,2024-11-21T05:31:12.723000
+CVE-2020-3507,0,1,e31abe0a138b4d8cee86519612d2f9d856685f8c48b1d23408bdf014053ba5fa,2024-11-21T05:31:12.853000
CVE-2020-35076,0,0,22c9010c756632d44618cf53e1d5b88eeb68c63d071d55c5c3197066dd1f9549,2023-11-07T03:21:52.237000
-CVE-2020-3508,0,0,6e0d72e7cb3031ec2632f94943731851a5002c80997c1d726b4b836af47e5663,2024-11-21T05:31:12.983000
-CVE-2020-3509,0,0,abfe7fec1c29180fb8daeca5b464bf1a299131b7d975f4c7441bcd3136e43589,2024-11-21T05:31:13.133000
+CVE-2020-3508,0,1,75294126938311fb52236ff00b2462c0e2ca2edf45cd442a1957382e77b8e474,2024-11-21T05:31:12.983000
+CVE-2020-3509,0,1,4284f5fc113631458ee3f6db0200f69535b67af9b404d6aa679ba2ff48855b91,2024-11-21T05:31:13.133000
CVE-2020-35090,0,0,b56f0e66f535f199fa2a8a51588e0422c11e739d461a2043995de4648e1fe96e,2023-11-07T03:21:52.280000
-CVE-2020-3510,0,0,0cfbea9ffe3c7efe7b249b989d298639431d05c180af8eca2835861def96fa74,2024-11-21T05:31:13.250000
-CVE-2020-3511,0,0,63c4a87114cbbdbb8b18ea68ec91cf41caf8c83f0439a13ff978e5840550b4cc,2024-11-21T05:31:13.380000
+CVE-2020-3510,0,1,68b015dda94249162394a7579758625f1f5c55cb25f721579aa2c0a75565af44,2024-11-21T05:31:13.250000
+CVE-2020-3511,0,1,cf1526b5bf0bed9c69f4d7f4888a5505de295f5a5e8c8156681953d66b3a43e6,2024-11-21T05:31:13.380000
CVE-2020-35110,0,0,06b6f7205e8634a6b139be853749dee5548f6dc8ce7a66e242bee31a5ce800a8,2023-11-07T03:21:52.317000
CVE-2020-35111,0,0,1d3217146d3bc4c0181e7eed7bcd22cd5252f0663175c1e9775d39e6d838f4f7,2024-11-21T05:26:47.457000
CVE-2020-35112,0,0,217d248178d5425d76c338d7c11da5dee78f9ec214b6da9397853b771c6f461c,2024-11-21T05:26:47.610000
CVE-2020-35113,0,0,aa72e4b1fdd4f4d638c0960d259a2a8fed65bebb4c631bb8ab22c15f3164a496,2024-11-21T05:26:47.750000
CVE-2020-35114,0,0,226082effffcaae329236ce375e7a083ee1f5b912e09cd8af53552ea049facff,2024-11-21T05:26:47.870000
-CVE-2020-3512,0,0,c0fa00b6416995264900ff68255a1834f28ba72905a9d220a1b2d2c064ad98b8,2024-11-21T05:31:13.510000
+CVE-2020-3512,0,1,301c208446e91b1de266a562a38df8bfdc5119fb7e9a2b9ef8e8e604ad7693e9,2024-11-21T05:31:13.510000
CVE-2020-35121,0,0,3d83ad484360f51ea1246daa1e8aa35b257fd6ae2996984ee30d81625ebfeb07,2024-11-21T05:26:47.990000
CVE-2020-35122,0,0,15175738af1945b2e787348d4b36e7e4ab9d726dda3ef9c4bd0796eed2842de6,2024-11-21T05:26:48.163000
CVE-2020-35123,0,0,47c1151234afc62e7fd413dcc83f44ee5fef8b50497a059ce9236546a7a5859a,2024-11-21T05:26:48.327000
@@ -158219,7 +158219,7 @@ CVE-2020-35126,0,0,567cb5a1c9dceb351a7cf865a07440bc30d3fb93eda9288100fb453ea98b2
CVE-2020-35127,0,0,0699b40157d8a44af8ae672e3602bfeb75425e8d42975bbc170100312768a322,2024-11-21T05:26:49.050000
CVE-2020-35128,0,0,2dc10d3c119b439ddabcada9991e8cf079d29a3c48d7624657f433c68ec403ac,2024-11-21T05:26:49.243000
CVE-2020-35129,0,0,647700745566fd7cf9578731268b3079d721f287310660783ff641ce2a1db34e,2024-11-21T05:26:49.427000
-CVE-2020-3513,0,0,4bc536eecb359d7495af9d700872fb82e78fe8ff137b06891eaf3168995061ef,2024-11-21T05:31:13.650000
+CVE-2020-3513,0,1,569a2cb795eee5f84bc6738a06e8509f0231ee19307bf2c0191c120088100e77,2024-11-21T05:31:13.650000
CVE-2020-35131,0,0,efaae5e8006d967ad4099e3093570f7c86f6cbe82d39a592563805035db550fb,2024-11-21T05:26:49.590000
CVE-2020-35132,0,0,6b35f0c46741651c7d26c8fe2efdeeb9a3e4bee8896c667623d7a763099298c1,2024-11-21T05:26:49.787000
CVE-2020-35133,0,0,ea718fa921f69368d79a39a6c480baf18c20662ea9200674c35d82aae166feba,2024-11-21T05:26:49.967000
@@ -158228,12 +158228,12 @@ CVE-2020-35136,0,0,3d2d871a5b6359ceba2dfc982446a270827641fa0735c06eef76d7b923cff
CVE-2020-35137,0,0,ebe677f91daab40d3bed867f26582b601439972ecdc2b977d6ddf802cec0ad31,2024-11-21T05:26:50.480000
CVE-2020-35138,0,0,53bcdf981ce1c5178dee31d919d7167894f89e2292d64d9c3f4e90eb8bf1a37e,2024-11-21T05:26:50.673000
CVE-2020-35139,0,0,72fc6f7bb98bedb38006061e53fc3248c100c8ea2f606b6be2fd28dc066eee21,2024-11-21T05:26:50.837000
-CVE-2020-3514,0,0,89d22da796c48cb604d2400a52e05f92f512e93b9bb7205907233edaaee91329,2024-11-26T16:09:02.407000
+CVE-2020-3514,0,1,6cd0e192a3e64e396ee056a3e2baf4ac5776e94c465138b6830585e36dcf2a48,2024-11-26T16:09:02.407000
CVE-2020-35141,0,0,5b92ebe187e75f139fcd97e5d81512a80809d7237726771df3865c7abe881d1f,2024-11-21T05:26:51.023000
CVE-2020-35144,0,0,d2624b867715b886126190c94dd0f1c44f539e628cadb0f4ac4a053c38b2e7ae,2023-11-07T03:21:52.727000
CVE-2020-35145,0,0,433c2bcb51b386b89bbfafa94ad3c280427d85e1af8e6f75eb7a817cdef47dd1,2024-11-21T05:26:51.220000
CVE-2020-35149,0,0,922fd204ba3e0fc505a284c5c083b6e37f5b0be5dc63ba4e03064ce9fea838a6,2024-11-21T05:26:51.390000
-CVE-2020-3515,0,0,400793dad29c6285eed921598cdd99297fe422d268bc28e484adc15fa77f669d,2024-11-26T16:09:02.407000
+CVE-2020-3515,0,1,07390c895cf06cd7a3cf58122b5033d3075ed73ed6b0a3910a82dc28f132bab6,2024-11-26T16:09:02.407000
CVE-2020-35151,0,0,aec2be470aa2accf3a6db4d12a03fcdb3b60de6150047ac3b3774a9c8176113e,2024-11-21T05:26:51.993000
CVE-2020-35152,0,0,f8e9280d313ea2aac3b9fdca53f420077ecf7ebed1a03d086bfa2e017f6d87c5,2024-11-21T05:26:52.477000
CVE-2020-35153,0,0,31c868ea5334e0d3da13280fb37e3b3348e871518396f333994386c2150bc6c7,2024-06-05T00:15:09.680000
@@ -158243,7 +158243,7 @@ CVE-2020-35156,0,0,8271fd26b2ddc0dbb86a22aa825bc3a45c02441536d2b707a77fc8a403824
CVE-2020-35157,0,0,22630ea98e3c343d999b75e0044dac7fdadc17c3f643267704842fc07b7cdc22,2024-06-21T00:15:09.640000
CVE-2020-35158,0,0,b8effdda81d90ce022b98a1107df6018a5e6db28a83b63fadc4586ed3ee77300,2024-06-21T00:15:09.713000
CVE-2020-35159,0,0,e88801bb36a1e81baf03df65252f0d8cf6d495a3ba6593be81884bb64031fbf5,2024-06-21T00:15:09.773000
-CVE-2020-3516,0,0,50a709b3a926ca74a5634d2a01cf08aefdd41b6cd9aaf82a3b13840ebb5a5d33,2024-11-21T05:31:13.990000
+CVE-2020-3516,0,1,8cff059d9c2a350a3d4723006a6097cd9bbbdffacf4e750f752f1ef334e82008,2024-11-21T05:31:13.990000
CVE-2020-35160,0,0,14ec0a6387e6cec7fcaf6d3422245c48e4a45809fe7eb214832d9dab18c60b2f,2024-06-21T00:15:09.833000
CVE-2020-35161,0,0,6504e0bd9bd5d152581f6189adb48c709dd7e64a367272ef78d28faee17f99df,2024-06-21T00:15:09.897000
CVE-2020-35162,0,0,8f14cb97d78ee221f1db3fd364291b1bdd84b8ac5d3ca9f06b3a70a609a37f64,2024-06-21T00:15:09.957000
@@ -158254,20 +158254,20 @@ CVE-2020-35166,0,0,bd9a621628f2c379ef3f4f1cc298df92e2b845e0de10649318652cc6be6ab
CVE-2020-35167,0,0,97e5364ca49f12826b359a6c08db7e6f616f5fc57f4e1ef604cd1c42f098afbc,2024-11-21T05:26:53.370000
CVE-2020-35168,0,0,b9b29d41f74df6f64f0822f2becb8264f25d40d6e5aa235b4cec29885eae6b28,2024-11-21T05:26:53.520000
CVE-2020-35169,0,0,aae206d68c4a1171cccb5c27a5e435a70280558d272e34581b71bbfc6bb4e201,2024-11-21T05:26:53.670000
-CVE-2020-3517,0,0,c76918ff3bc1c361191c2c62ada5036469fb6b1a93349e8cff4691daeb57fb43,2024-11-21T05:31:14.100000
+CVE-2020-3517,0,1,5c088bdf81d9a0add74647ac37af402f4c27718ace239ff6340ce89ee0bfc02c,2024-11-21T05:31:14.100000
CVE-2020-35170,0,0,3d2934f4b8358243314d500ad03fa60154780d8df7147508cc482f1295670195,2024-11-21T05:26:53.820000
CVE-2020-35173,0,0,445bbf73efdb09281382d01ff8148350fc532d790707cb416892b2a5a6056a2e,2024-11-21T05:26:53.953000
CVE-2020-35175,0,0,f15454ccd1be88825d67beead1dee78910ae78fe0fc5bd5fbcd68e5b89136d15,2024-11-21T05:26:54.130000
CVE-2020-35176,0,0,d0326e38c9f72922f7176a13bdf9e2fd9e2f1f06b2453aa593fef305a00227b4,2024-11-21T05:26:54.303000
CVE-2020-35177,0,0,cdc486a0d62a9e3d490337c2f301f21109e057d6ce9656823f16ea9d1ae51981,2024-11-21T05:26:54.477000
-CVE-2020-3518,0,0,c3144c73b862eaa878a33b9d8fc5128a6d049a532c3cb48b9caabf75bcdec22f,2024-11-21T05:31:14.277000
+CVE-2020-3518,0,1,05bca681a5fe5151fe1e74478db54328f06e59140e2856a1e085c62e9a9f228e,2024-11-21T05:31:14.277000
CVE-2020-35184,0,0,0c55e99797099025234cfefb240ad3eeb01015aee801f34b1dbf873f7832f3f4,2024-11-21T05:26:54.653000
CVE-2020-35185,0,0,66668800dea532bc2e660832e477f543d8f877394ce418d9eb13686e88ccd4ae,2024-11-21T05:26:54.813000
CVE-2020-35186,0,0,3ccc5cee699b27cb46b073d8048a75bb8140beff011bd537a819bf96a152c006,2024-11-21T05:26:54.970000
CVE-2020-35187,0,0,1fade1fdcb95968ccdd0788d86cb809e45d6c027dab5926817887aced684a4d1,2024-11-21T05:26:55.140000
CVE-2020-35188,0,0,331d48ccf60c2aa1fda8f67130a59e65dad88c608f306b93da66cbce74c421d2,2023-11-07T03:21:52.977000
CVE-2020-35189,0,0,15678bcfcbd28cf068e6e0aafe5bda5be4fd5a29041225833943eae709f71006,2024-11-21T05:26:55.307000
-CVE-2020-3519,0,0,e33ed37e2047c13bd3061ba738cb98f29298d53ffba519e94d77c0b441c8fbf6,2024-11-21T05:31:14.390000
+CVE-2020-3519,0,1,ea846c1aff463b34f128dcf5e8c2ec3754d152ee32622fcd9b8e9f489a674701,2024-11-21T05:31:14.390000
CVE-2020-35190,0,0,809d2675144860dbd3127b960b8312dd9e9b1b23f5fbacca50564230b78a27c0,2024-11-21T05:26:55.450000
CVE-2020-35191,0,0,3104f408b3002f4e73cdb63969e1c556a4ad656daa90c0d566f11dd52fcc4d20,2024-11-21T05:26:55.607000
CVE-2020-35192,0,0,0a39cc8b7890c13568f1b2d4ed92fbd5fdc72a6eed7387a32450c9d5f10d42c9,2024-11-21T05:26:55.770000
@@ -158278,7 +158278,7 @@ CVE-2020-35196,0,0,8b61af6bbeba7166b7d0dd9136a6476f0817e15663a572f83b092265b1a0d
CVE-2020-35197,0,0,e17fabd579253704a6fc53049a8be8c87062cb36798491304d0e86766b7e83aa,2024-11-21T05:26:56.443000
CVE-2020-35198,0,0,0828e6bc7458a52e051e3fe224cb0766d71c36b172981e50ce9b7bd10e235ab9,2024-11-21T05:26:56.603000
CVE-2020-35199,0,0,9b07e96ba80732ca8964aba9b57d8eede0ab425f19817f66c599f79f808f1b89,2024-11-21T05:26:56.870000
-CVE-2020-3520,0,0,8dd65bb10f6a62d05bc47151d14c4ea15381dafe3b1c6ccc4016a25344b7297c,2024-11-21T05:31:14.530000
+CVE-2020-3520,0,1,73d89b8dddfb395baa6f4966f4f1313697f492030e9726f7bfd266f79f3ca027,2024-11-21T05:31:14.530000
CVE-2020-35200,0,0,8e81030b1991e232aac2a74d691f88dba26ce25d327da2c1d5b01b2205bbbef8,2024-11-21T05:26:57.060000
CVE-2020-35201,0,0,9fd09decbd1ba9843112f788b41777cf297dab276db08b1968fbae11390af896,2024-11-21T05:26:57.217000
CVE-2020-35202,0,0,30a772cd04f7eeec270fc0866c27b8a6dfabec99546ed72cbadf065a7abbd653,2024-11-21T05:26:57.403000
@@ -158289,7 +158289,7 @@ CVE-2020-35206,0,0,c22d57618d3c2d3d2459df44b1ad4fe1195ff474ed7bb7a0d33791116da8e
CVE-2020-35207,0,0,3bd1ff8eaaf959afc8efb5d4db8aa63b0e0d3fe72144fa2234bdf2e93ff73a72,2024-11-21T05:26:58.933000
CVE-2020-35208,0,0,b224d34baa29f1d1d8aa2c7b096bd33961f2eeb1d2b311c4a0a25926d60f7e05,2024-11-21T05:26:59.430000
CVE-2020-35209,0,0,df1bb4ded37ccd9279757bd63fce5b07cd6c7e8a95f521d5e6f1d712611e056e,2024-11-21T05:26:59.937000
-CVE-2020-3521,0,0,1bf8f9f0b0a3c2e242c2843a02e5d7a73783458c9c98f18de2bd4a430cc3eaf0,2024-11-21T05:31:14.643000
+CVE-2020-3521,0,1,39e651a6a21756afb3fdcbd1108ac2134723349da15401384a7719a4aed1c627,2024-11-21T05:31:14.643000
CVE-2020-35210,0,0,5d95f8e727c9e2848701322de835f2cd50917ba7d359db443761a3c30d27fc8d,2024-11-21T05:27:00.867000
CVE-2020-35211,0,0,583817c2b381130b9104eca433f471de22b50a4f0dd39ab8243c20456779fee0,2024-11-21T05:27:01.337000
CVE-2020-35213,0,0,69a307df75c720dc38508692dc8dcb56d2adeb34fe3b57cc2de33280cbe6d105,2024-11-21T05:27:01.617000
@@ -158298,7 +158298,7 @@ CVE-2020-35215,0,0,cf7085ed3021f616907aa2d9d20d71ab9581aa97fb7692d0b9215ed53cff4
CVE-2020-35216,0,0,5ad0da51bff895765c54c988b8c92025bd16fa5c07aa8a34525dd02cfacad384,2024-11-21T05:27:02.170000
CVE-2020-35217,0,0,fb216fcb30858fc0a40013c959bdf839fec4ecdf579a4691e4d210655a416f59,2024-11-21T05:27:02.353000
CVE-2020-35219,0,0,28ec53a5859e7c23bac57ec50c09e0f932fac3e38a888794d9a628fe22b32903,2024-11-21T05:27:02.590000
-CVE-2020-3522,0,0,6a2f3d9291685a9ac1fb15f12cdff9c65f0abbdc72c316adc878f5940a2179f8,2024-11-21T05:31:14.750000
+CVE-2020-3522,0,1,348a7c8d9202366a639f0077cae001b2f4cfa23d9bde0feed078877f1bd9ec9f,2024-11-21T05:31:14.750000
CVE-2020-35220,0,0,e36cc2ac601a9ef2df417457a22270bdd89d9d7e7bed82ff6b2e5ccb313453e7,2023-11-07T03:21:53.560000
CVE-2020-35221,0,0,54244d0abc2d6a7e433f64a2822a45ec916055c1cd7c42d608fb98b3a8b85d90,2024-11-21T05:27:02.817000
CVE-2020-35222,0,0,a205c84eb3d4b89dfc18db0f8ff384a61888e259bab4b02da15bc300e37c81c1,2023-11-07T03:21:53.610000
@@ -158309,7 +158309,7 @@ CVE-2020-35226,0,0,e95700b5d4305f8111cab2eaa6fcbf16ea14d4dcd9f1f7e202d7f0394974d
CVE-2020-35227,0,0,5932b66955f57a277e3e4d755104488c04646fbb8d5c4a0aaa1792c40b6dc12e,2024-11-21T05:27:03.757000
CVE-2020-35228,0,0,31b887316545506d7c23daabf339c38645ff590c2e90068cc55274204b571516,2024-11-21T05:27:03.940000
CVE-2020-35229,0,0,d5dd99a8af6d3741ed32c7974c918e1a669032ccf3720d132f5c3afec184a685,2024-11-21T05:27:04.110000
-CVE-2020-3523,0,0,f096350b7fdc8a270de660a1158698caf3b2832a9b56107dd4065bb5496370e7,2024-11-21T05:31:14.860000
+CVE-2020-3523,0,1,c84d8a82c35461cf85fdfa2b8ff0bdfa3c690330c296f1a22c9849bc2cc1ffec,2024-11-21T05:31:14.860000
CVE-2020-35230,0,0,1db6f51772bdf4878ae20e3e47012b82893615052306450d527f3bc682c2b0a1,2024-11-21T05:27:04.280000
CVE-2020-35231,0,0,4347b94a0940d1ed04893c74d7271f67073520fe453e9ebb6e1a6e2086bef268,2024-11-21T05:27:04.453000
CVE-2020-35232,0,0,e4f65cda08c8a44a50f92b71700378f46b4301e587af40ffc8b3899dad37fcd8,2023-11-07T03:21:53.700000
@@ -158318,7 +158318,7 @@ CVE-2020-35234,0,0,04538980d1b112257f8d7187b77fe0ea9d36a9b941f39a1212213bf37262b
CVE-2020-35235,0,0,d1eb752cd53810914e623726b40783963bfd6e9911f4a2dbf50c34373066465a,2024-11-21T05:27:05.023000
CVE-2020-35236,0,0,eda0aa85a0c848870c6778d4722c013f1bd48409dad80c7ad26072e61af727c8,2024-11-21T05:27:05.230000
CVE-2020-35239,0,0,6f2bbc9e4614df7bad5be81689186a4ccde18eb4960e1c1eec882ef0d0e17935,2025-01-15T17:44:05.873000
-CVE-2020-3524,0,0,8e6c41d84d9349a8490c7cbc9a9c74b97bf43e23c89cce78debc5c3c5e572df2,2024-11-21T05:31:14.970000
+CVE-2020-3524,0,1,2c7bcd09ba60d38040d76ced33f36d745237b413b5a4c467a7d13ae0f305416a,2024-11-21T05:31:14.970000
CVE-2020-35240,0,0,fa56e97405c34738c82324ae3ae0827b529331bfd87fe06657b675a54d4a4f80,2024-11-21T05:27:05.607000
CVE-2020-35241,0,0,28104699f687c4be47c2b8474c98d883411b5e8ef95cd412bbbe1157f4701428,2024-11-21T05:27:05.783000
CVE-2020-35242,0,0,635dd3ec49baa3205cc1bf85ebd631fae61343d1ed205acb9c70ddce515b126c,2024-11-21T05:27:05.957000
@@ -158326,16 +158326,16 @@ CVE-2020-35243,0,0,18893d68ef1780e2ce469b12af53e8116cd719c76e9521a6ea363c32c5e75
CVE-2020-35244,0,0,051152d2acc1be86d7ece95b290c88e897d118b2f934a52c5f7ee5abdbf1b249,2024-11-21T05:27:06.310000
CVE-2020-35245,0,0,b06197614818bf79dcae452d04b77070c154ac71d7d86e1f216d206db622e7a8,2024-11-21T05:27:06.467000
CVE-2020-35249,0,0,f964ec7c4b9a843ad5e9297c65e41bfeaa4ad42a241bd6a2c1546de368c21032,2024-11-21T05:27:06.623000
-CVE-2020-3525,0,0,eb58c1e9bfd7747572448cb029033efcdb41acf9d954c83da8237477d774da1a,2024-11-18T17:35:05.240000
+CVE-2020-3525,0,1,8f589f92f80212c9d320dc861bde249782deec7f30630e9701dff02049e9e084,2024-11-18T17:35:05.240000
CVE-2020-35252,0,0,6611d4acd783440c6d2281ae5c43957746697c606e4290e22fefaf955d2a653c,2024-11-21T05:27:06.807000
CVE-2020-35257,0,0,428fff52645584fd3da00450f464f9fea6f07b07d9091488b56a04c08c8056f7,2023-11-07T03:21:53.853000
CVE-2020-35259,0,0,5a73a66e5aabfa93d670cdb2ada20d3dd60d9f8357bb9343366839914ee5fdd9,2023-11-07T03:21:53.900000
-CVE-2020-3526,0,0,2c49ee75373d8cd448d220e9ac2e00c13dff78205bc0f62e0083bdad6443310a,2024-11-21T05:31:15.200000
+CVE-2020-3526,0,1,2856497c08d1e87b86e743b3b6ef5df949f578d97522208bd510049c1bd683a9,2024-11-21T05:31:15.200000
CVE-2020-35261,0,0,e822298d64d39d4b27767f08ae73f2baa2dfbddea0ca790549ac91a63fc119bf,2024-11-21T05:27:07.017000
CVE-2020-35262,0,0,106f9f810cb4f317e3d6ad3eb8f55259bae27ffd562f85fe6081c705f2060a1e,2024-11-21T05:27:07.243000
CVE-2020-35263,0,0,9ef0a547300e9cce73d9f4327f69f47bf57700e5ca9930c4578bfab305930b58,2024-11-21T05:27:07.443000
CVE-2020-35269,0,0,019a97c75305bc45d7ca688ed262c5578f3c587f771afacfcf8d1bb295652f98,2024-11-21T05:27:07.623000
-CVE-2020-3527,0,0,260101c9066cc9221c4eb65a407c6bf8173e8c8da36d39f2e00f9dcb613ad092,2024-11-21T05:31:15.313000
+CVE-2020-3527,0,1,7e9f268bffa09db942b500e8d1741a6b8e071f48f575460e128a50443cac4de7,2024-11-21T05:31:15.313000
CVE-2020-35270,0,0,32299bc4f3b9dba4751aa6dc213f9bda34b6648c81b1d6920759777e39e4ca0c,2024-11-21T05:27:07.793000
CVE-2020-35271,0,0,aedcfcd0d903fead43401358b2775fb74acd8b46cd5c7bdac9601b41191b660c,2024-11-21T05:27:07.983000
CVE-2020-35272,0,0,1c9c649c83b722274a96366dafc6cacf79d25eebc18e721e389e2d18b0ad6404,2024-11-21T05:27:08.197000
@@ -158343,24 +158343,24 @@ CVE-2020-35273,0,0,7c48483f8bf71b5f4c2eb99469af1ee6c4e0874996f4535be353b8d85aad0
CVE-2020-35274,0,0,2a2cd98f1ba0a189fcabfa0709ed595f0700bda801492ee0c7a6b2509136b5a9,2024-11-21T05:27:08.533000
CVE-2020-35275,0,0,33414c3dec8dc72781fda18da7c18ef6229c8eb0d2e19b74a097be43626ad3cd,2024-11-21T05:27:08.703000
CVE-2020-35276,0,0,2a0e627f22fcc6d4b1abc972f06e376408e70d940730d0db3916154463a30e3a,2024-11-21T05:27:08.903000
-CVE-2020-3528,0,0,a4468318491d7223fda7c046a9caa497c5bef443302ba308599af1b52acc55b0,2024-11-21T05:31:15.430000
+CVE-2020-3528,0,1,a5140793f8ff275e47eba920a2a2f5ce51a1c99f325371b7c42bc697e12a5112,2024-11-21T05:31:15.430000
CVE-2020-35284,0,0,bd02be61dda3cf21346f63887eb8b4c3947a609cc868af5888db3474d7bb5aa7,2024-11-21T05:27:09.070000
-CVE-2020-3529,0,0,423df47d0cc467e13ab1e8fdcec0aa3f59b8b10dede0e31080b07d49979f0f84,2024-11-21T05:31:15.557000
+CVE-2020-3529,0,1,cb365fb2b477800532084fe068535bce4c8b8a54a201bde9f264b17958a5f8c8,2024-11-21T05:31:15.557000
CVE-2020-35296,0,0,1c09853debb8ef5e6b91ec0c8670a6e512d70ee06e6ef44da059677685dfadc5,2024-11-21T05:27:09.237000
-CVE-2020-3530,0,0,bd378e5f73522ec2af3b1aa38faa924c397c66731bcd2964f93f7bf73c7a726b,2024-11-21T05:31:15.670000
+CVE-2020-3530,0,1,12bc66126e53c5a821ba249598644ef8dae78f4ca3f736a94ba30648b58214e6,2024-11-21T05:31:15.670000
CVE-2020-35305,0,0,98a1305f43fe3e8ddef76b04b3c0deda40cc6eca971db4e6e77be7d256bdcfdd,2024-11-21T05:27:09.460000
CVE-2020-35308,0,0,0cc75c9f385c31d2fc973db66e0f51d8739b07773a6d339e270dd61a7d50a7b5,2024-11-21T05:27:09.680000
CVE-2020-35309,0,0,3e2f402abc71519c7597d1f7e895178c7f563ababbe88551e51f85a8986488d0,2024-11-21T05:27:09.897000
-CVE-2020-3531,0,0,3b6d830976d593211e3e0e32044352c2a2bf83a92315d54fd5a4fcbd9c643b6a,2024-11-21T05:31:15.800000
+CVE-2020-3531,0,1,9091bff0afd53f02bcb58facd7f598228164d024e1ccacbef072d293c2e1d72b,2024-11-21T05:31:15.800000
CVE-2020-35310,0,0,1d2d893793cc2e3fc93b8251bfa436dba6d8953efb49989492dd75cb5b7e1677,2023-11-07T03:21:54.030000
CVE-2020-35313,0,0,0a14aa7e6308f898b02a5fa2aad822adc39945d9804d675bce8686927de59cd3,2024-11-21T05:27:10.090000
CVE-2020-35314,0,0,57951e08f56c4d0bde38930ede663a668cdfb5d8361f352f2f1d812a7503f090,2024-11-21T05:27:10.300000
-CVE-2020-3532,0,0,c977597d43dc5e71d4e139bcb77174e2229a2239d67cabd07fcb8ab128540cec,2024-11-18T17:11:17.393000
+CVE-2020-3532,0,1,b9e1cc6b9ca47d60f39dfab759eff6b5b85c1871fe939784ec5d0a1a98ca16db,2024-11-18T17:11:17.393000
CVE-2020-35326,0,0,50346ea1a4fcb0817bec4bf9ceca858801548d31756e80c403ba87244288db6f,2024-11-21T05:27:10.473000
CVE-2020-35327,0,0,22022c8a3177a426d9ce17ad5212e84b10d278ce0592c22e0ac33520baf94c64,2024-11-21T05:27:10.697000
CVE-2020-35328,0,0,fb3087ea88c8ceab32a806508484c2a1a597fcc81fb212264d511cd1b23643ac,2024-11-21T05:27:10.920000
CVE-2020-35329,0,0,df72a4e25de70e0e73e4fcec57137a0408e72c3941c4d2683e91509e523cdc59,2024-11-21T05:27:11.087000
-CVE-2020-3533,0,0,ff361851bd93b82e5355b7e7324bdb328057fd85f8bd5d1b949b303631f697d7,2024-11-21T05:31:15.980000
+CVE-2020-3533,0,1,3a6f70141e440fe6f6c8fe853736c11880c1fefb0d9609aec650f1d3bcb00d7f,2024-11-21T05:31:15.980000
CVE-2020-35337,0,0,d86dcbf60a3841cc4a36898818fc878272e844c1a58a230d3106b8db963cad98,2024-11-21T05:27:11.263000
CVE-2020-35338,0,0,2efbd284bc345e71471538512fdd118b88fd3b1ee3300bc3638e26c37c32653a,2024-11-21T05:27:11.497000
CVE-2020-35339,0,0,758d04bb1664f2d4fc90aa2c6665207c951a1060cf5c2a40814bab4fcfdf7d1d,2024-11-21T05:27:11.700000
@@ -158369,43 +158369,43 @@ CVE-2020-35342,0,0,3952e50ef24602a97b676209c8301db8ce13179ad84e05725a181e0c7685a
CVE-2020-35346,0,0,57aaf936e8691e832cddb6b1158eefc5b43567c9fa9f153bda4880b06c2ff3c2,2024-11-21T05:27:12.390000
CVE-2020-35347,0,0,496235c35e2258d29705697a0c27992de1e6feb3a1fbd1a3f0c1d918a71dbbc9,2024-11-21T05:27:12.567000
CVE-2020-35349,0,0,2d2266e779d90f53ad80a4f806ad82fc0e4f3f6884f0522485a4d85e278b34a8,2024-11-21T05:27:12.753000
-CVE-2020-3535,0,0,3579ef8fb52c957ae27f653064076df4441b168eac00e80e43be3fec7cd6192f,2024-11-21T05:31:16.103000
+CVE-2020-3535,0,1,a08c13f8f940dbf9da343ec7d1d58514a902cf2402bc275dc32aff681e2390dc,2024-11-21T05:31:16.103000
CVE-2020-35357,0,0,7147a6788703a3d06ae50e626b8b0542ae00b4724c619991bca10afb3504b7d6,2024-12-07T21:15:16.423000
CVE-2020-35358,0,0,5f26e7d6ea73b3486ad287da7f925fed892ec9bfdf8ca864a9f45353392a7e2f,2024-11-21T05:27:13.163000
CVE-2020-35359,0,0,44b942d8fcb0f4fc80e794ec440935fcc3f3669059e3240c91ee5245409703e6,2024-11-21T05:27:13.357000
-CVE-2020-3536,0,0,2aaa673604401a5de833a86de153b3ecea9ed0f0505e6dca582f9b5e342214b4,2024-11-21T05:31:16.230000
+CVE-2020-3536,0,1,e0eb6e8c94229dc653daf102d2f88435cd1f5817666bc1c6ef19f926ba9df606,2024-11-21T05:31:16.230000
CVE-2020-35362,0,0,054246e4992e3baa34fdd9aa5b8574731b325e00a0138d5a83d1f4879b0a06a7,2024-11-21T05:27:13.530000
CVE-2020-35364,0,0,a31032ba65ec148764349051006abbae0b29bfa49175779d0632d241d9cb6ad0,2024-11-21T05:27:13.707000
-CVE-2020-3537,0,0,a485e5a49b57d691a98829d166c0b508a1297c91353d0934a200476e1c3308cd,2024-11-21T05:31:16.370000
+CVE-2020-3537,0,1,f4dc71be552625ebd1b853c35b75004e38af9f8c6e76d2b223a11bd64670cc1f,2024-11-21T05:31:16.370000
CVE-2020-35370,0,0,41da02e5f774cc24bb16a586246c5a65fdcc51f7ffbae428fc69998d7882ae21,2024-11-21T05:27:13.877000
CVE-2020-35373,0,0,493a39436c9ebe408b776ba4ebe59774ed2dd70699c940e19ad3dd5d39c10cce,2024-11-21T05:27:14.063000
CVE-2020-35376,0,0,e7f76a105904612fd57ce404eae92cacd13365611ff84af3803a7da58f99b7db,2024-11-21T05:27:14.280000
CVE-2020-35378,0,0,0dcfe574b37f1131e1faaf5cfbdd7837be5453150ac738e7bb16476cffd12836,2024-11-21T05:27:14.470000
-CVE-2020-3538,0,0,0369a41faadff01a426e94436c7c7f392cc11341a2c712351af198b9cbdce485,2024-11-18T17:11:17.393000
+CVE-2020-3538,0,1,ab7f1020628cb2bdbc0dbe0fcfdde5e98f67eb8cc0cacbf37e0aadd6b51c67d3,2024-11-18T17:11:17.393000
CVE-2020-35380,0,0,34e8d876cfb470628b1cb2c47ea28cd36ff32d9836124f30beb0df5b12b7dd29,2024-11-21T05:27:14.620000
CVE-2020-35381,0,0,d438d71839c239939bfaeae8c77c53d698da8a893f53dddae05fb532d86086c3,2024-11-21T05:27:14.800000
CVE-2020-35382,0,0,7f7a156d0f1f6689c7f3dd81f57a5e7772c2ff0bdf64cda8d82101810e0a00cd,2024-11-21T05:27:14.997000
CVE-2020-35388,0,0,1727b077a60d42af03b689a5391b930a133a8b64b085b94905633cd7767ae66a,2024-11-21T05:27:15.153000
-CVE-2020-3539,0,0,5e75dc52665e2fc8a8c72e279be2bac39b4ce8652c100cb70ba1510beff4dfe9,2024-11-18T17:11:17.393000
+CVE-2020-3539,0,1,673f0d1d49d2d474f9312f16ab13173f9dfce3a6782f5d36a9fc3b6527d7f322,2024-11-18T17:11:17.393000
CVE-2020-35391,0,0,a28b772a900bef7b098abb7e7b4bc716015f378c6dabb49951c8231b19c344ec,2024-11-21T05:27:15.310000
CVE-2020-35395,0,0,62e46f40f4d10aa8c19568989a9761b037eb90b9773e48ff833c0e5ecb883d66,2024-11-21T05:27:15.537000
CVE-2020-35396,0,0,3e914f6aa3d5fb5df689b83be81209ccd9728be48d92744bef166857f49fbf84,2024-11-21T05:27:15.713000
CVE-2020-35398,0,0,51ce092b60d8e25c9b2d00daaab7fc3d9fe3d91172ba2d1b5511cfb96472be69,2024-11-21T05:27:15.880000
-CVE-2020-3541,0,0,2df6b5946cfe21c0c0a37430029b8c71c84277072404ed023d3c6b619c3969a7,2024-11-21T05:31:16.600000
+CVE-2020-3541,0,1,17d00c68649d36d9e3b5f53d27a8f2e045a3962a0a47e55f4fee582e2d693878,2024-11-21T05:31:16.600000
CVE-2020-35416,0,0,27429862c9cf9db99938bf3e459c2c97186e635d8d44e4e4c6715753abd8fac8,2024-11-21T05:27:16.100000
CVE-2020-35418,0,0,5ea05b7156df4b45cc6c3918b28eac781c16cec7c324ef1df4030d6113689ee8,2024-11-21T05:27:16.290000
CVE-2020-35419,0,0,e70697612c3ffe92e29d890310d069fc2d0a5cb9fd17b392eb094203e5275867,2024-11-21T05:27:16.487000
-CVE-2020-3542,0,0,2bb2dfc8c70a66702d755e2d8d4fbd8c8f3e0c5c6d0836aec4b69a25d004446f,2024-11-21T05:31:16.720000
+CVE-2020-3542,0,1,f59292d878ed2250b5b3b761610d09eea4823f75a23bd228fdd0f5205d289704,2024-11-21T05:31:16.720000
CVE-2020-35427,0,0,12887c2555ad8338bd05081b6309957737dfdcf1ed6cf1983e5c4f8fd09303df,2024-11-21T05:27:16.667000
-CVE-2020-3543,0,0,a82f163c2a6e264aa35bc8b776fafeaaf35753e353101559d5debb38613a899f,2024-11-21T05:31:16.837000
+CVE-2020-3543,0,1,9483d202963739146f18cbffe36f0e1ae05dfa31341a44ddf4c7076b0045fccd,2024-11-21T05:31:16.837000
CVE-2020-35430,0,0,a6a0466aa5a6ef740b00250248de670296e257673dbe1a29cf27835e11b16693,2024-11-21T05:27:16.877000
CVE-2020-35437,0,0,1d75963bdb5046d54deac3c4b2e851c8852b831807107340445eee37fa41f295,2024-11-21T05:27:17.093000
CVE-2020-35438,0,0,c600b743926a3d7c8be698fd3b34cada41d1ac36f4ed7c0ba2d8d02a1855d961,2024-11-21T05:27:17.277000
-CVE-2020-3544,0,0,1950244255ab9448fe4d90c88b62bed4f17ae64aff21f40d1bc7fc664be166dd,2024-11-21T05:31:16.967000
+CVE-2020-3544,0,1,5a1885ff253147bab90272430081afa36912adc063cddc7774db03899f1461d5,2024-11-21T05:31:16.967000
CVE-2020-35441,0,0,35463ca1070bb92eaefbdf786bbe9f408fb265148ef9114eb0310a7d008c850b,2024-11-21T05:27:17.487000
CVE-2020-35442,0,0,fda96c7257227407d66c1ef8b29a519b19064d7c025f07638149dd9c18d45a99,2024-11-21T05:27:17.680000
CVE-2020-35448,0,0,9ac8ccf33a101f1325c7d1b38642bf74956c0e3070893238d5f482e5c2509550,2024-11-21T05:27:17.847000
-CVE-2020-3545,0,0,30b71aa2d763f0d9bf3f268989a7aca9003a6b29a3832457cccdaff025cb6060,2024-11-21T05:31:17.093000
+CVE-2020-3545,0,1,5b58485d3b5e5b527d21bec49c17bef41d4a039c759e210689f386bf58b318c2,2024-11-21T05:31:17.093000
CVE-2020-35450,0,0,62c04b68db767c01849221c91b580088a5279d0f2849536e23d737fb4efcec4d,2024-11-21T05:27:18.050000
CVE-2020-35451,0,0,263a36cd0adc22bf7aa08980f26d0bb0fbb4f1ffeb781653cb00c9bdb1fb01c7,2024-11-21T05:27:18.210000
CVE-2020-35452,0,0,8a10fa3e3aa2a00f4b4084eb7044ed43a99f34b37f609f44024ae6fdc616538d,2024-11-21T05:27:18.390000
@@ -158416,7 +158416,7 @@ CVE-2020-35456,0,0,107908fb34e22c3b488f28e4a652b872ccca559a28358d46134b37e37344f
CVE-2020-35457,0,0,7ba6d0c3322ebaeb96eda05afbb2ae67f691dc31a617c48373af0cd3991d2e47,2024-11-21T05:27:19.393000
CVE-2020-35458,0,0,b580252ddc71ab795cec4c07b676f997af7cb60b0a351da472449b6d4aa8207c,2024-11-21T05:27:19.577000
CVE-2020-35459,0,0,f6b69c3e31755dd7eed342ddacaab60b5fb2c89060c04526df1bc4d782fc23a7,2024-11-21T05:27:19.803000
-CVE-2020-3546,0,0,50e3657ab0c51ef82445edb91520553739aed47a147b6843c2f38e5351c4df4a,2024-11-21T05:31:17.230000
+CVE-2020-3546,0,1,c3da9004aa975b5b8fa676fe86232a63d34dac01089b113b80b8ef73c422e1d1,2024-11-21T05:31:17.230000
CVE-2020-35460,0,0,d83bd3ac739897ab7a527f888efd9b923730db986b65d319c2b249325bea9bcb,2024-11-21T05:27:20.007000
CVE-2020-35462,0,0,075072bcbbfc846f3ead1aeda385dfc3ad97ad579b0ad2ae49f4b5d2e251b9fd,2024-11-21T05:27:20.207000
CVE-2020-35463,0,0,c9ca38d2f054e3407cbdb407458fc235a3953ae1a5addc37899f0117e0e236f4,2024-11-21T05:27:20.347000
@@ -158426,7 +158426,7 @@ CVE-2020-35466,0,0,a5e9b0534caa256f4d1b9dedb21bfe3e452403ca5ebea85031b00398ea7d9
CVE-2020-35467,0,0,163e5a3f57b3cdfefe8eac200872f794ed1d3bbebfdc24fd1bf73cc9b57d3aa1,2024-11-21T05:27:20.827000
CVE-2020-35468,0,0,6ba5475329731db670352a983a4c833cacdb0499249740492120941a1073558c,2024-11-21T05:27:20.990000
CVE-2020-35469,0,0,93f77a408df257cca9f918ec477f288766f16ff5cadfa6706f39dd968ff5860f,2024-11-21T05:27:21.153000
-CVE-2020-3547,0,0,12571fb057a4bd3e9b7cfc952bd0438051c432158c2d9231d0569e0d1dfbbe7b,2024-11-21T05:31:17.363000
+CVE-2020-3547,0,1,8ef306bb3eab8d897bf7e8da0800724d0bd158c4f6a961aa4950edf10e08cdce,2024-11-21T05:31:17.363000
CVE-2020-35470,0,0,81129943ada8d7b6da46d974332d45ee7e06dd536590da90d30976372e1db1ba,2024-11-21T05:27:21.310000
CVE-2020-35471,0,0,4ead96e9d8d3a8719f2bd9d4c90c699dcb957e13934fa97422d5f474a36edb28,2024-11-21T05:27:21.490000
CVE-2020-35473,0,0,9fc6e8fa03c4d210ba2a3d089f075bd0d3161e56723606af5bf2a82f134d79d7,2024-11-21T05:27:21.667000
@@ -158436,14 +158436,14 @@ CVE-2020-35476,0,0,8c9a815e9ae47a9757f101cda8603279b34051e1d17d0614b8e198ab3323b
CVE-2020-35477,0,0,42db54ffca4d5d287b23a034c613c9fa2230ee163e1c541d10ca5b481a236583,2024-11-21T05:27:22.423000
CVE-2020-35478,0,0,0647d1b93115a634dfbd3d99b8e8a0dd563186555e6a618e3d08e9ca11cdd6b6,2024-11-21T05:27:22.620000
CVE-2020-35479,0,0,12e50e066b5a20ef17375c6e52544bbe8ff692ed5913abd9a10661218e5a460b,2024-11-21T05:27:22.807000
-CVE-2020-3548,0,0,2daa15068ac5934e3b82f2b646abef07129e3b27310e3778eb12feb687a8abb3,2024-11-18T17:11:17.393000
+CVE-2020-3548,0,1,17d6f4cef8a7d06e3d8f92cec66eeb2c7c9ca0de4a1a1b27ac7f80c8a0f3d953,2024-11-18T17:11:17.393000
CVE-2020-35480,0,0,30edeece02fa6531be3537b318c24740836929549d74d97c9497603bbeff75ec,2024-11-21T05:27:22.990000
CVE-2020-35481,0,0,dbb3b8e4438e21bf4bd682006ca74d3daa53997b5264e72f42af915fe773ce70,2024-11-21T05:27:23.187000
CVE-2020-35482,0,0,39037b317bd004510eedef050efbeb8139b1a950377ccf70d1416c0fddbd9130,2024-11-21T05:27:23.363000
CVE-2020-35483,0,0,88a3f7f0e806ba4071102ff9fe8d3e0738fe58160d6d3d46eb15289628d7d7c2,2024-11-21T05:27:23.537000
CVE-2020-35488,0,0,4adea8756bf9c149c429c8168d7ea446f447b90781a59e7ba7b50c8ef33c38cb,2024-11-21T05:27:23.733000
CVE-2020-35489,0,0,11a86f54e104e6ea52826fdcd124ce8c287b07e6a60286592936bde3fe1e87bf,2024-11-21T05:27:23.937000
-CVE-2020-3549,0,0,d035e6f76da198d32bb4b43121be568e5793abe7545bdffd16d45802c6a7a11b,2024-11-26T16:09:02.407000
+CVE-2020-3549,0,1,d76cee24f8ce7d3bcb67a4bf896543cf263d182225422e111389ca63c4463543,2024-11-26T16:09:02.407000
CVE-2020-35490,0,0,3cc08839f4809111e4ec079eccf443ec420af4d497f0606fe8a70bffc4f8a4b5,2024-11-21T05:27:24.163000
CVE-2020-35491,0,0,846fe18ce0313b4c86fb6b92ec49ded9e442b2c752368cff877d302f333db49b,2024-11-21T05:27:24.527000
CVE-2020-35492,0,0,b7c5f5f259d12ff8c6d2e71fba6607975c2165ebea1a56859ff5de5e716ea335,2024-11-21T05:27:24.803000
@@ -158454,7 +158454,7 @@ CVE-2020-35496,0,0,e0e6d53f414ea869de80cffa818d7ad32a3b25da6df5f3862e968dd661ff4
CVE-2020-35497,0,0,f3d817cd55d352a4c942a05db36e68b6f7e7f130c51b382db46e033603b38b9f,2024-11-21T05:27:25.683000
CVE-2020-35498,0,0,e4b1e67223663864fef15272b3d25dde7febc24566f68a0d51833bfa190ecd6d,2024-11-21T05:27:25.830000
CVE-2020-35499,0,0,3fb135ccf764d2a3b08047e2a1d9e264c47f8fdbdd53abaa6e4f14fef1a159a1,2024-11-21T05:27:26.047000
-CVE-2020-3550,0,0,386e08f6953cd8d2811c10cccde100d0fac64620434b415e330d987721c8b5e0,2024-11-26T16:09:02.407000
+CVE-2020-3550,0,1,0c32f889d4b29bb4212e29e81426c1940f0ef51876b00b32274f1b8089ebde91,2024-11-26T16:09:02.407000
CVE-2020-35500,0,0,eedf5ac934ec493093f83918d878ac574835597f1a3474589863bf3f94afed65,2023-11-07T03:21:55.970000
CVE-2020-35501,0,0,c11f7f9143aa129702ec0b0c2585f00e20308f3810331a32d0fe031f895f47fc,2024-11-21T05:27:26.220000
CVE-2020-35502,0,0,bb800110e727a19004c891c236059da23cea34fe018f90f5e06f4986adfbceee,2024-11-21T05:27:26.427000
@@ -158465,7 +158465,7 @@ CVE-2020-35506,0,0,33b93d1cfd445ebb63899c3d2e38e8086b8638bcd650661e9ccbc15894ee4
CVE-2020-35507,0,0,57f9e096707a4d8fbf0c5ce71044d1779dd71bddba62f87e19b804a5c62f4e46,2024-11-21T05:27:27.300000
CVE-2020-35508,0,0,0ac772d7bb15681ec0c37ccf1b311d39c30c04fcc3e8f27e410767c462c713e1,2024-11-21T05:27:27.440000
CVE-2020-35509,0,0,d78893444fc140de3124914f0175a2d35eca4389c2c0f69826e8fb1692f59ee0,2024-11-21T05:27:27.673000
-CVE-2020-3551,0,0,a364e8caa5d7c11fc2f955771051a4ae1bdf086c377978dbeb3d361782d2510a,2024-11-21T05:31:17.880000
+CVE-2020-3551,0,1,ac308a65f340964772685ec9d81937551d12cd26ed99aa7e40f2694ea6998e0c,2024-11-21T05:31:17.880000
CVE-2020-35510,0,0,16e0bd865e221548e20364aaa480d9778ef185c841da4ad41748a28cbda05854,2024-11-21T05:27:27.853000
CVE-2020-35511,0,0,27d1351cc643251d551683a18539bd127c4c78d6c58a3938ed06f237412fc471,2024-11-21T05:27:27.993000
CVE-2020-35512,0,0,98cc72323b14de9dbb9e6fc0d81b7f359715c43f61d993ba0a822c7e3b840e7e,2024-11-21T05:27:28.203000
@@ -158476,7 +158476,7 @@ CVE-2020-35516,0,0,aeb40176d3f6d637d1cafdebb28a0d17ed81195f073e037e446d0cbd8db25
CVE-2020-35517,0,0,0f1f96b5e3c5ae20274de27d66db0a789f1c774510c1570ef24b90b42c3f1d62,2024-11-21T05:27:28.727000
CVE-2020-35518,0,0,5884222890ecc610196e2549a9e38cfe1afa3bcc3711a691d34825f7df10436a,2024-11-21T05:27:28.920000
CVE-2020-35519,0,0,6137f05de92b4f642f5b45e7fa82321b81f888609ac2bff543d778d446c3050a,2024-11-21T05:27:29.080000
-CVE-2020-3552,0,0,6240ea82a7e17fd7fdac895eaae640624768aa363a5cc7794547652a24e319c6,2024-11-21T05:31:18
+CVE-2020-3552,0,1,58a48d69a35167814a8350aacf274b51f014ca095ab5321c4f2590ba14feaabe,2024-11-21T05:31:18
CVE-2020-35520,0,0,7d82e9e83928826e6566839e39fe887b0f7ce7388aba48219b323b406273a686,2023-11-07T03:21:56.940000
CVE-2020-35521,0,0,a4a3ad880569428f8d7e2a264810e79d0c24e123cfd7ed650b9c206dc25f4aec,2024-11-21T05:27:29.287000
CVE-2020-35522,0,0,0edfa0e0d770c678be88069ef01a2471a0fe470d5da6e847ceeed61ec3968d49,2024-11-21T05:27:29.483000
@@ -158487,7 +158487,7 @@ CVE-2020-35526,0,0,0e3c966162550143972eefc6edf32baa92e55c2d3ed80b09aa0558b72d62f
CVE-2020-35527,0,0,5cd42e1fd2868f78c04f51d8ad8e33e12c1bcddf0ba9f1d14128431b131803ae,2024-11-21T05:27:30.243000
CVE-2020-35528,0,0,16dbe4316384ea56694f8528cde2134fc18af2189e7bb758ff289a1af1df353a,2023-11-07T03:21:57.743000
CVE-2020-35529,0,0,bb1ba886dd2ceac179cc5ff451efdc295c8851ba9fc202f8fe1548401a499039,2023-11-07T03:21:57.980000
-CVE-2020-3553,0,0,543222d5a18d5dab7eeed38c349d6275c1b6d9a3c58dc4f7ce377808f4d0cafb,2024-11-26T16:09:02.407000
+CVE-2020-3553,0,1,d1dbd20f76d2e783df09e230e9fe62cd62e40709a862f17f4819631ae38b610f,2024-11-26T16:09:02.407000
CVE-2020-35530,0,0,d0bbd00bab655208f6bda1d851a9403fe414a470f0ae5fcbf7ef1fbcc038d124,2024-11-21T05:27:30.420000
CVE-2020-35531,0,0,8d6b5e14a64674f03c0b4a0b74039a3829e19d501dc6011c80376fd8390a353a,2024-11-21T05:27:30.597000
CVE-2020-35532,0,0,31272446ca80959ccb25e4d52d069feb13f1cc9f299f7474e9e416ee35d0e83a,2024-11-21T05:27:30.763000
@@ -158498,7 +158498,7 @@ CVE-2020-35536,0,0,b57169e1f64cf5899e1f60d03e8a827b291cd0f7289382f43d9558df334ed
CVE-2020-35537,0,0,ae83ecb6de9dbe7fbb08e6d92463ba873f599a087c2308aebb1639ff91f57a8e,2023-11-07T03:21:58.327000
CVE-2020-35538,0,0,b932971079e9c8fd9f6e08bb4ec1fc85b00e8a59bf5f15e04aee6717268f789b,2024-11-21T05:27:31.440000
CVE-2020-35539,0,0,d591f67f731a0a92857a1e2fa7097e36e31952f29bbec00f268db84e880cd698,2023-11-07T03:21:58.370000
-CVE-2020-3554,0,0,1b71f3450cea6eac721a52a5d2a4e02d7d38472d79b85747c914ef0f81a1fcdb,2024-11-21T05:31:18.257000
+CVE-2020-3554,0,1,72265bfecf99fb8eeed6c2da239fc8d11b74421dda04b44ba916464d0b27585e,2024-11-21T05:31:18.257000
CVE-2020-35540,0,0,6bd64b059b520580fc1288131d694e2faf21edb8f793d207b450f97b8fdf588a,2023-11-07T03:21:58.410000
CVE-2020-35541,0,0,8d5365eb0cabd9fb3bbef386a7a8573f0770d7f02e50738d63f9bc34f5836ae4,2023-11-07T03:21:58.650000
CVE-2020-35542,0,0,cf77cdeac798a3a257ffcb234660d4518d214cb4498ec8c17e86fd96ebfc678f,2024-11-21T05:27:31.673000
@@ -158506,7 +158506,7 @@ CVE-2020-35545,0,0,90718e2ddefe9ba5082932c97e23e972baa70313d1d4fdf00f695b1d71c6c
CVE-2020-35547,0,0,0b56fd34bbcf6f73360d1254a0790470258ba9dfdd070f322adb5be0ea6a8538,2024-11-21T05:27:32.053000
CVE-2020-35548,0,0,d7355cb5b84b5b614d93237f5cbb2796f3a81213009605c0528bcf58e0d77ec2,2024-11-21T05:27:32.280000
CVE-2020-35549,0,0,6a5d8eef45e56534ec7da225d0cd05db4848ea6f60c0898ba9512b7ec9f90052,2024-11-21T05:27:32.460000
-CVE-2020-3555,0,0,b7fffed1a04fd45ab50947708db3bd8109c35c6f78da414f6ca3ff74581e6c64,2024-11-21T05:31:18.387000
+CVE-2020-3555,0,1,dd17a8658b6856456c90bb1c7a7c62a2f4ed91311f706ba8e3528676b44f7c3a,2024-11-21T05:31:18.387000
CVE-2020-35550,0,0,1b5d50e86732f2c376359b2abd015387f3c4af322d2853e8198270af5778f5fd,2024-11-21T05:27:32.633000
CVE-2020-35551,0,0,7cc6ce908a7e5f8c6728db28b1ec8fc7a008d0e5068a2b9cdb423ee84d0ad33d,2024-11-21T05:27:32.813000
CVE-2020-35552,0,0,7a79f5c8f18cfc8532771dc38c26fece49096abc49bc91c691462a7f61d641bb,2024-11-21T05:27:33.007000
@@ -158517,7 +158517,7 @@ CVE-2020-35556,0,0,1195ea931615dbe7faaf49bbe3e8b001d9d5b7cd3278bae1deb2ca65da796
CVE-2020-35557,0,0,f84f54d7ba45c07624b231f9178fe7901251a067a71ef1340f1c0e75326bf9fc,2024-11-21T05:27:33.903000
CVE-2020-35558,0,0,7f02959f18e713c00ab6b94fa30658d1d98d404a2053466f01ffcbc7700171d0,2024-11-21T05:27:34.173000
CVE-2020-35559,0,0,ea904c01e0412fac377cb231630f1e6b0e2fd42d8e1b6b93c48ae51db42ca43c,2024-11-21T05:27:34.370000
-CVE-2020-3556,0,0,29825c7e1d4332d8fd977b46ea844932e5a1dec7419254e20fde2861232022b6,2024-11-21T05:31:18.510000
+CVE-2020-3556,0,1,b2a46577cd65e8c2a6f1cc718632b86f73cb3a44f7f533a92664d39ae10e631c,2024-11-21T05:31:18.510000
CVE-2020-35560,0,0,f0cf96ad86e64443f17f2ba84068daed04ef9a24699acf2e1eb576bae85be1c5,2024-11-21T05:27:34.560000
CVE-2020-35561,0,0,a69fd84b8d8bd80cd3ae64376462aef8b0ff07156fe62ca8a15ead77c16faac9,2024-11-21T05:27:34.750000
CVE-2020-35563,0,0,f0a04fb876e770b777aff6e9d0e860284d1d9491237f4996558c56f8a529d2bf,2024-11-21T05:27:34.950000
@@ -158527,7 +158527,7 @@ CVE-2020-35566,0,0,e489dae21821f236168f03bc95462139bfbcd0ec91d32bfd1e93dfc38d88b
CVE-2020-35567,0,0,791febc61b789cda06aab2b3337a585ee16bf058a7467d3690db3356b36ea606,2024-11-21T05:27:35.640000
CVE-2020-35568,0,0,c0f4c30bfe5ded24789575b28a82b23f836ad6475a87e42ed1ec25cbaf7c6151,2024-11-21T05:27:35.817000
CVE-2020-35569,0,0,dbfeee110c08f5f2e274317de7e50ee0d26234386c7ce16ade6ca550e5406366,2024-11-21T05:27:36.020000
-CVE-2020-3557,0,0,2045a04acf7cf878035d608732a44725115a3446db9a2c5463cf812c8f3e69c5,2024-11-26T16:09:02.407000
+CVE-2020-3557,0,1,4af93a6ec828d0421e5978b1e5098a61b234ff3dcc859ef00ab42c69ab666974,2024-11-26T16:09:02.407000
CVE-2020-35570,0,0,376ac1d0f9587d0d88b5f39b51b966b328d95176c4e0397114398daf474a5b51,2024-11-21T05:27:36.200000
CVE-2020-35571,0,0,c3f20ce54685be48734acd5ae40e515257a247d4543d7d7db128975328f16866,2024-11-21T05:27:36.377000
CVE-2020-35572,0,0,21a5d0db76ea9d70d89b7d4a8ba30619ca1ebb491db077c5618df36454fa809f,2024-11-21T05:27:36.540000
@@ -158537,7 +158537,7 @@ CVE-2020-35576,0,0,3dc655afc0b5c5f28d0d5c9fe14df4fc23b80a1ba74de602e36cc390821e6
CVE-2020-35577,0,0,fc6233804c0d4f611362279afca9724d07cbacd9e8c3f31932fbed030a630053,2024-11-21T05:27:37.310000
CVE-2020-35578,0,0,9764353ebb5d91c6154226a22fb77aa0da6631a848a9dbc0b5128baae1b66d47,2024-11-21T05:27:37.497000
CVE-2020-35579,0,0,a131cb5d4b9ab0aef7d4145c6d1f8c30ce9061285477055db4cce6cab17a7a05,2024-11-21T05:27:37.717000
-CVE-2020-3558,0,0,8dc7d79be509f1ef0c46515190580bfa9cd9cb39887d3d0de2980346186e68d4,2024-11-26T16:09:02.407000
+CVE-2020-3558,0,1,d12ae8771235bd07963f69490fa37ac1a3d51e8058c1e34318f480d0169e54ae,2024-11-26T16:09:02.407000
CVE-2020-35580,0,0,6c9edfb39466d65346103ef798179e7c9932bfa54ee145bbca014895e9f7f5e1,2024-11-21T05:27:37.903000
CVE-2020-35581,0,0,5dc356a965e5731a018fd1be340dea73edfda2d186c93077b602023628410aea,2024-11-21T05:27:38.123000
CVE-2020-35582,0,0,2f10f14493c13f6f5088fb519e4c28e0c6d2644219934356c84da9311ea1b638,2024-11-21T05:27:38.337000
@@ -158547,7 +158547,7 @@ CVE-2020-35586,0,0,854c0564e69bf688d175778706c45de27a7e127ec42c02e834ed213b8fe40
CVE-2020-35587,0,0,8b7ec03b7e314b8675274b7ccfd13491dd5b7c3ec325f444835a3dde6fc75158,2024-11-21T05:27:39.100000
CVE-2020-35588,0,0,c5bf2ddd7c0e717a13b969ae7229a992aa109101a6a10f16cfd56f1f83b740cf,2023-11-07T03:21:59.303000
CVE-2020-35589,0,0,3d6db80081d98790667951e7ea7321c2dae88771c20ce443f54b0f1670ffbf16,2024-11-21T05:27:39.350000
-CVE-2020-3559,0,0,e21e17a46e3109768aeb60b57abfc82e52d1d30604a3ae5bdbe9b0822fcc3d01,2024-11-21T05:31:18.883000
+CVE-2020-3559,0,1,bdf2701466b82c6a4742b678d276943467fcfa263f672c6018903a719888be5b,2024-11-21T05:31:18.883000
CVE-2020-35590,0,0,945aba45b570964f2b2682b326594646ecf4865094231a251b0dd59e26c3ea93,2024-11-21T05:27:39.530000
CVE-2020-35591,0,0,a5a785645beb239b331b4875e93bf710fd2f88c855a1019775f407f5916313d8,2024-11-21T05:27:39.700000
CVE-2020-35592,0,0,8efb03d0dfe81e2313a0b62c4501f95c16a927f01c3644e989e6a00d12135c21,2024-11-21T05:27:39.883000
@@ -158555,13 +158555,13 @@ CVE-2020-35593,0,0,09bdf3cd5e147846e77eb50e4f4fbe08a28a126e2f41fd7b91ad849ad6448
CVE-2020-35594,0,0,67cffb3c259451abef943dcf9a59b5f5c0e193669b85357c96976d6b1010b67a,2024-11-21T05:27:40.370000
CVE-2020-35597,0,0,f5d7ee1ec08feb20ef70bb5408131b50a4c22aa56539b992fce65fb91b96b659,2024-11-21T05:27:40.567000
CVE-2020-35598,0,0,36bf12a46d02f0120aea53b650c8acd355adbdcaa7099b31086af6e32bc0a615,2024-11-21T05:27:40.780000
-CVE-2020-3560,0,0,0d62400fbca9c235f450caa6dc86644ddcefd70cde6663ff3db772f2963de02b,2024-11-21T05:31:19.017000
+CVE-2020-3560,0,1,d417a9501b3cfc5412ca61e930a2297b9ff83f3a08349af1da1133e8e4b393dc,2024-11-21T05:31:19.017000
CVE-2020-35604,0,0,eb8b4b83bf0c21120968bb3fdedd2a0d1dadc9797f66e87589c9eb7c014bc7b9,2024-11-21T05:27:40.960000
CVE-2020-35605,0,0,69c6761002a8cf25f89c1676f43e77fea2f712f37ae0c0a028bb65bc0f7007ce,2024-11-21T05:27:41.140000
CVE-2020-35606,0,0,0ea6d41d1acf4c4cbe9b5a6631ba1803e06b82d13a72f0090f93cf1e0aa9297b,2024-11-21T05:27:41.330000
CVE-2020-35608,0,0,91f896556755dbbeed5d3d463c83d448a128869d1b1fa0f45a2ece5a3aa5d968,2024-11-21T05:27:41.533000
CVE-2020-35609,0,0,a3d58bce18bf9cf78ce6f7693c24cd00335f2e07770683eeeb3274bae2bf6320,2024-11-21T05:27:41.713000
-CVE-2020-3561,0,0,42ad5774912ba2db9c4186dd1f89da410e5f0c7925864a6526e2a9654cb6bff8,2024-11-21T05:31:19.147000
+CVE-2020-3561,0,1,ffd3348916646e28303a5bbd3f924bb79056b9db920752c2909262e6c941653e,2024-11-21T05:31:19.147000
CVE-2020-35610,0,0,70bd80febffa521559b3f6a9776d8606e978df3e2378b195bb5d702558ffcfc6,2024-11-21T05:27:41.890000
CVE-2020-35611,0,0,2c81837ee5f31796ec721366b40a3c366a831e1e850eeb1a2ec3d07a4efcb6ee,2024-11-21T05:27:42.077000
CVE-2020-35612,0,0,065f7e4d76d48d3d0f04adb8f05ff7fa999f19bca4397615f646dad846af7704,2024-11-21T05:27:42.217000
@@ -158572,7 +158572,7 @@ CVE-2020-35616,0,0,80670bc201fb0dddce70cd38452c6fea54a028226ea87eb64498208aa41b5
CVE-2020-35617,0,0,767057cee7b8069482185f5fed8098b13d5fc91ca65869cce8470b6b9ae6e0e9,2023-11-07T03:21:59.687000
CVE-2020-35618,0,0,11a506151c7315a7e3a686b318ba0c7ff6ae65059fae42ff39ff2050ddc42138,2023-11-07T03:21:59.897000
CVE-2020-35619,0,0,c90e0a29fab6b97294fe5e01fc4c19bc6b5724259c3ce253903570a8cb1ca0a8,2023-11-07T03:22:00.140000
-CVE-2020-3562,0,0,d7346afd296e6b35e82427805e0ea45213463b849355a5b00f2cfbaf00510fae,2024-11-21T05:31:19.267000
+CVE-2020-3562,0,1,3608231dd6878e92d2a8899e4c14fabb339fdb745b48f9b6e7cc5225669d5b63,2024-11-21T05:31:19.267000
CVE-2020-35620,0,0,b1bc6071afbd96af680ae9a2919fd2539a8f95fe98c86edacf3c1c4c5f11dfa6,2023-11-07T03:22:00.380000
CVE-2020-35621,0,0,f6768885319f6a0f8470e2bca9f1d65c6bd696ad638297ba6ebd36cde1908325,2023-11-07T03:22:00.637000
CVE-2020-35622,0,0,c49e32dc92ed6575786130c9e87cc91f856966f02a6760cb4deb8d882b88bc84,2024-11-21T05:27:42.983000
@@ -158583,7 +158583,7 @@ CVE-2020-35626,0,0,edab5041433e5927b425233d0ae40b3035b0d878c481750db5dc2e6da5a0f
CVE-2020-35627,0,0,9ec402c1d3898343c145c959609dcb81094a78eb7b631fdd89c624edf6112a2b,2024-11-21T05:27:43.850000
CVE-2020-35628,0,0,4fc8ec6113fcc2a65d9696d5dad3821fd1b6c9f9057c8b1b40c86d25e1b9afcd,2024-11-21T05:27:44.030000
CVE-2020-35629,0,0,282458dccb7edb90ad5e05ea8349bb8d2614ae0da0e0ca801559f87c8d63a7c5,2024-11-21T05:27:44.287000
-CVE-2020-3563,0,0,8dc6f40c71702451261ee6c31ae540cd706622d008d0aa71125395c3ac8e4221,2024-11-21T05:31:19.380000
+CVE-2020-3563,0,1,0faeaf61bfef333bf10ae6283e92f942f29e67899894e044b1eba0b3a056946f,2024-11-21T05:31:19.380000
CVE-2020-35630,0,0,f1466ab7d2e874ac84d320c28ee21a45ab52d05d93848a0d7370dd827c07d11f,2024-11-21T05:27:44.493000
CVE-2020-35631,0,0,78a16a1233851688354ef0d0300ad775d52dfe194cbe707a36dfd1f0981001e8,2024-11-21T05:27:44.643000
CVE-2020-35632,0,0,117580cc6a96e5bb4824209ee53a76c64bd504a5c07d9e020568f24ecadd9f10,2024-11-21T05:27:44.800000
@@ -158591,8 +158591,8 @@ CVE-2020-35633,0,0,87916e27c2d146a5813a5fc513e2aa58876066060e369bc7b04e7f63f7100
CVE-2020-35634,0,0,3e91923ed7477256970d9264a1f7331574f79ec588d0d336aa753c304cb945b2,2024-11-21T05:27:45.177000
CVE-2020-35635,0,0,8707433905aca32b9b48734124fee267cd55265af77c90370c5f09136b28ee4e,2024-11-21T05:27:45.343000
CVE-2020-35636,0,0,65699f14fcedd833831c80eae1c03829c8748b1c71119a0856ba4853304a3ddb,2024-11-21T05:27:45.493000
-CVE-2020-3564,0,0,9504d9e66f82cc6bccb2f0468b05f5a294212f564cb17effcb4ed7de79571a1e,2024-11-21T05:31:19.510000
-CVE-2020-3565,0,0,ce5f9a925a580d963ba1350dd954e7d9da06b957013fef67f2557d05608dc8f2,2024-11-21T05:31:19.623000
+CVE-2020-3564,0,1,3b7a64795f4014ac25a627e1321422ab63e1a53481ec3fda6fd21ae473cf6cdc,2024-11-21T05:31:19.510000
+CVE-2020-3565,0,1,904b6b04b7cfdea6ee5626fe2fa9367693f005190d6b15f32a8c7f31538ecde7,2024-11-21T05:31:19.623000
CVE-2020-35650,0,0,4abbedcf77af01e6160af3eececcdfa28a198eef91246e780f85ee2bfc959bb3,2024-11-21T05:27:45.653000
CVE-2020-35652,0,0,16276dd5fe32c74061f58a646b29a593cf7a0317036a8160d9b1eb42c10a9005,2024-11-21T05:27:45.820000
CVE-2020-35653,0,0,6fbaa588fad5c709e92c169666a254a94bec863cb168fea267e0dd5709c8101e,2024-11-21T05:27:46.010000
@@ -158602,7 +158602,7 @@ CVE-2020-35656,0,0,495943dea16d1cd4e7a937ec1a9712e8c40316322dc99ce5159b033e35d1d
CVE-2020-35657,0,0,5a0f67ca966195383639c1a5cf80c3b8b9a5b507cda8a9b641ab9b553f4de546,2024-11-21T05:27:46.800000
CVE-2020-35658,0,0,fe025ab272438ea534b29038fb88f398672d82b57c1a2957e1154c2113a3e81e,2024-11-21T05:27:46.940000
CVE-2020-35659,0,0,4069f57874e825df82988e2830f0222212f562e099b64de9d921b09257ee9389,2024-11-21T05:27:47.110000
-CVE-2020-3566,0,0,3e602e53777d33ef721c47fd424060a767d0cb338f1482e04bc75a922ede4cf8,2024-11-21T05:31:19.740000
+CVE-2020-3566,0,1,9f95473586309219a4b342827c24df4e8570d9849a289526a2bde31c4e9e5ff6,2024-11-21T05:31:19.740000
CVE-2020-35660,0,0,453fceb014d20fa28c9e2d01a01c819155e855906fb6e377514499ed2ab20777,2024-11-21T05:27:47.283000
CVE-2020-35662,0,0,c27c3fac9f83a2026f4c6bdc7457fc7bfdad17a73c0922b2072a091955deb967,2024-11-21T05:27:47.453000
CVE-2020-35664,0,0,45e63c2300f4592eb8b26a7568acaa3e7a661e4188c9f19cd55a22a95c1f672d,2024-11-21T05:27:47.813000
@@ -158611,14 +158611,14 @@ CVE-2020-35666,0,0,456cfbe91bd743884d66dfd60370f4b75195098cf029b248957af14f338e7
CVE-2020-35667,0,0,fb8e63b0a6f572856a4cda7501493eb7f37fd87c35faef967612086437d96b5c,2024-11-21T05:27:48.350000
CVE-2020-35668,0,0,82d99909626cb386ed6d38cb6648be9eb6c79b04ac1a82b8ee4c04f545e54ab7,2024-11-21T05:27:48.513000
CVE-2020-35669,0,0,132e082690b395d8cb82b49516d2691aea33b854f57c8b7f57f6b6b2b60bc0ef,2024-11-21T05:27:48.690000
-CVE-2020-3567,0,0,0414cf1af57d59adfaf5073f9274eed43ed29988f4283c6a16d64f353c92ce61,2024-11-21T05:31:19.877000
+CVE-2020-3567,0,1,97400370bc63fd5533b923ad6ad39d222805d555405e8fecf7894c9b4c2d4677,2024-11-21T05:31:19.877000
CVE-2020-35674,0,0,5a131822c672086742c0b00941c77136605d676a1ebbf45e6c154acc2844263b,2024-11-21T05:27:48.863000
CVE-2020-35675,0,0,a78ca225bf997a7e440be22233b097c682a411cbed27b6e5baa6b57bac0101c6,2024-11-21T05:27:49.050000
CVE-2020-35676,0,0,848409d7907696eb15f13d1f95c521d422971ad842f0bcc34d1585a7dd0972ab,2024-11-21T05:27:49.227000
CVE-2020-35677,0,0,b2c9bb12ad9265bee0d8f4955e5ee889f24c867e2fa44ec8a8d3d575744ce867,2024-11-21T05:27:49.393000
CVE-2020-35678,0,0,fcbd4770ef8b1975117a0369ca2a9a4427aa14ec4c722598f9d797735492d526,2024-11-21T05:27:49.573000
CVE-2020-35679,0,0,7514f1126157b088d685ae274f71dfb1919b8607ede16c8257976f23a3f97b5c,2024-11-21T05:27:49.763000
-CVE-2020-3568,0,0,2b8d898fdf3f742edf78bfb5a39239424e1c2a1d84f7d3949b2d3cca1d51db05,2024-11-21T05:31:19.997000
+CVE-2020-3568,0,1,cd3bd673dfd717349973108767ed0671423ed9c5b41d55f78eeb500ed0b8c7af,2024-11-21T05:31:19.997000
CVE-2020-35680,0,0,7669e0f8b5d52b861586959655899dd94976246a48f4edd22c3c0790d71279d2,2024-11-21T05:27:49.970000
CVE-2020-35681,0,0,49f2c9193896d77e31744cf3d6f8ac67cadcb36a1a28fd4a5f5f6ff4030a9589,2024-11-21T05:27:50.150000
CVE-2020-35682,0,0,4ce79fbcb8e5170dc4654efdce0b3da9c582648729ffb28da3f4b932300c7700,2024-11-21T05:27:50.363000
@@ -158627,7 +158627,7 @@ CVE-2020-35684,0,0,2c9b8de68c5be7e19ce60ba2a04621b32a86c366ed35c8fef392163545f3b
CVE-2020-35685,0,0,8716243572a509b5c9e561ccebaceb637401b931f64f5f50f9728ff4b7fb2a3e,2024-11-21T05:27:50.993000
CVE-2020-35686,0,0,d6b8e057d76db83e1d5dadaf5dc54cc25c61d2322bdbd88c4fd43b14e4502e61,2024-11-21T05:27:51.177000
CVE-2020-35687,0,0,417bc14ae03655c8c37901ea819c14198b021dde526e9cb798393be6ac8cce35,2024-11-21T05:27:51.357000
-CVE-2020-3569,0,0,2d89f242b7cfc0095c2174b2910c209206f5b79238e316be2e73b04f72779ca7,2024-11-21T05:31:20.100000
+CVE-2020-3569,0,1,942447488e9ab6806d093f65db706dab3d77ec425f1f2f77fbb5374867825c60,2024-11-21T05:31:20.100000
CVE-2020-35693,0,0,91adab232264d796a89a07c074590caf9f02f0c9469c0ecd5c7829fdc3bb907f,2024-11-21T05:27:51.537000
CVE-2020-35698,0,0,4d0e770ce8a3d7c91e336007a5ad9a7ca29a728ee4de118a3379880afd672dfc,2024-11-21T05:27:51.713000
CVE-2020-35700,0,0,489a0005e34d52d79d309e9505cc41b292b0c75cf66a29f4ed9c18580c913ea7,2024-11-21T05:27:52
@@ -158639,7 +158639,7 @@ CVE-2020-35706,0,0,ce2f30032eb330510b47f9b45cd3227993ff5c50966afa90319d97e3e005f
CVE-2020-35707,0,0,ec0c6c7966a3ecd3398c230ae36057ef3690726c18df3a83b1891f6fffccc60c,2024-11-21T05:27:53.173000
CVE-2020-35708,0,0,93927704e0eab05ff5804cac644feb148212bd331d6b8add99ed2176edb261af,2024-11-21T05:27:53.337000
CVE-2020-35709,0,0,896820314b5f9bfaf381cc0b50b098d7f5dd416fe01f507f515ecf96ba84b24e,2024-11-21T05:27:53.493000
-CVE-2020-3571,0,0,d472ea592f5e3e101e14065bab710d3938c12495a2dfc89516a19e0e08f282c0,2024-11-21T05:31:20.243000
+CVE-2020-3571,0,1,a3b7a199a89fe3a3e704db7d8daae8a41ccd30ec13609521ff42cb12ac887f30,2024-11-21T05:31:20.243000
CVE-2020-35710,0,0,56b54a7f182aa2d4dc71efbd47ca757866ae541d34791310722fe415dea76a18,2024-11-21T05:27:53.670000
CVE-2020-35711,0,0,2252656632d0a82d85ea64deee27fe3196622d7af0086958512e27929396cadb,2024-11-21T05:27:53.847000
CVE-2020-35712,0,0,13cca04766f5bc97937c6b6fbee8afe2c14f4741ee0648d8b021915f3522058b,2024-11-21T05:27:54.033000
@@ -158649,7 +158649,7 @@ CVE-2020-35715,0,0,f55e00b35919e51006e0aaa2a232c64a10f1a5d6c6f1537400d3c5455407f
CVE-2020-35716,0,0,0919a0702f5bae13ef05105e3e2fdbc276779d34e7c4332181c5c0bf05ad075a,2024-11-21T05:27:54.767000
CVE-2020-35717,0,0,146f8c175d12d33359f5c898cd521ad9dfb38f890fbf1eb8aa086c439cdf7aa3,2024-11-21T05:27:54.930000
CVE-2020-35719,0,0,368ed35455eb7a037e00a2e26b1bdd34a2caf2cf6b86741b9064e94dedcd5f97,2024-11-21T05:27:55.133000
-CVE-2020-3572,0,0,593945e69142b309e56c4f6cd1c5dc6a11bce28dba88e5d952d12cb1aa7c7b3e,2024-11-21T05:31:20.360000
+CVE-2020-3572,0,1,00f1c823b9e4933c53cb39031f219e5649a4eea0bdb199cc2875fd77e0af5f68,2024-11-21T05:31:20.360000
CVE-2020-35720,0,0,80e69c22839485d85abeb8ed4a902d7ff7049cb724ec7a2176f67d6031bfcec1,2024-11-21T05:27:55.300000
CVE-2020-35721,0,0,a0b58e5b87a6a402c258d619b873e793f71921ab5b481ba15313185bed3f1290,2024-11-21T05:27:55.480000
CVE-2020-35722,0,0,caa356c61d86af35e7dc9d97ce0f2cc2055dd2936ed1cff7dc4e9218c9baf8ef,2024-11-21T05:27:55.657000
@@ -158660,7 +158660,7 @@ CVE-2020-35726,0,0,d3e39d8b2e25eb8c667870f5294822658a7f1a713e31921f19f55ace20582
CVE-2020-35727,0,0,f0dd223582d6309ce179497a9b74e987555b732bfa8f631dd955b0b9a61e1975,2024-11-21T05:27:57.263000
CVE-2020-35728,0,0,99fed61d496a6a5c294587255ba0c17afa8c36ec21a65e421be4e3e3640f1f16,2024-11-21T05:27:57.440000
CVE-2020-35729,0,0,73b791035750e29920d34fc3318c4c53df54886e03c72db4c4c47435377ff0e9,2024-11-21T05:27:57.760000
-CVE-2020-3573,0,0,dd60110e8eb19477cb3925e952fc1aef285a0392116653e7040ed88923265fd8,2024-11-21T05:31:20.473000
+CVE-2020-3573,0,1,2428323c31c74dfe8ac763df12cf371bf8979fc323cca23115d173e506b9e5e9,2024-11-21T05:31:20.473000
CVE-2020-35730,0,0,b1bcb1a07bf0459cd1e3f4140f9ae165d2b8b1407463c1ccf3386d83cdf8ef0c,2024-11-21T05:27:57.943000
CVE-2020-35733,0,0,b028818da92f1c6c012520f779905a1cfb1ea5019b64f07e8c5b3e86f104cb4a,2024-11-21T05:27:58.170000
CVE-2020-35734,0,0,35b93685fa197211641fbd36f388c497f1ebdd34985df5fe2344f370ce01d4e2,2024-11-21T05:27:58.373000
@@ -158668,7 +158668,7 @@ CVE-2020-35735,0,0,8ab12734471d586080bb2440d148e75bc3179f443ffe3b1a5942e143406b7
CVE-2020-35736,0,0,e8b9762fb655f8a4cb2af679e20eab42c0f5a0b6f1022aa0f24bf1d01c5f2dd1,2024-11-21T05:27:58.790000
CVE-2020-35737,0,0,32d1d82382d181f317b07ddd7c5ee83af073ba07dd21bd7f8ffdbf3f07d52778,2024-11-21T05:27:58.950000
CVE-2020-35738,0,0,8f4afc3eb1df9b631ad103f0a8e2c4182aa0d03ae6d78a6c6a8e7a43e154b306,2024-11-21T05:27:59.120000
-CVE-2020-3574,0,0,70c61845311e751eb117aa7b413f03463bb21ef9905cde1b0a6052e144e37731,2024-11-21T05:31:20.600000
+CVE-2020-3574,0,1,58fc1176c831d4d8f3934f5bba259849d04b2189081db4f4f767a1d4decca9be,2024-11-21T05:31:20.600000
CVE-2020-35740,0,0,99b2baf8f9c7d48a48595e2fdaaba41d3a4c93ef2ce52c3ac5fa76a581d1d322,2024-11-21T05:27:59.320000
CVE-2020-35741,0,0,4f6c6d590b63ffddfd2fe6b28bcac087d21b0271ebcf71818279a970e5e3e9c0,2024-11-21T05:27:59.487000
CVE-2020-35742,0,0,384381df71b7eeeec0f843d7398c41f0f01b5306846106a4b6887138f1bd3e22,2024-11-21T05:27:59.630000
@@ -158690,7 +158690,7 @@ CVE-2020-35762,0,0,22ce1731b47bc343b4aeeb4e5cc555d9dbb98867add62d482eaecc7e84d84
CVE-2020-35765,0,0,117a0c1f1663545829531ba351515f029d3f6d1a7fc04c0bb46588991c95ee55,2024-11-21T05:28:02.447000
CVE-2020-35766,0,0,f81d079785df5a44bc0e3feb9ef219886df4d7596c0bc033ca3d7d1683713588,2024-11-21T05:28:02.660000
CVE-2020-35769,0,0,8bfa84c26fed83cbb019e8e7f70f1129ea4d6f32ed9d6c7715ac62b37aec04a8,2024-11-21T05:28:02.853000
-CVE-2020-3577,0,0,785e5f9f3847b7f995da38112d180af3b6081a9d4c73df03966f9d3af5d40625,2024-11-21T05:31:20.723000
+CVE-2020-3577,0,1,2353ea190ea8f09d2e83e54c037ebe5f78c78e7a98f776a960977c63359edc71,2024-11-21T05:31:20.723000
CVE-2020-35773,0,0,7e07e0e7fc5b83a5a9a043ee28e58e1b14b05edad74eb17020c19b4e5b7510cb,2024-11-21T05:28:03.040000
CVE-2020-35774,0,0,7714615d0b3eb878dc8be72c115b3370bfed3ae783ead678ed135d7fa944f1c9,2024-11-21T05:28:03.257000
CVE-2020-35775,0,0,efb90185744f05b9e391a2114d8952944ce0d949d2bbd118aa10ebfc2e33b53c,2024-11-21T05:28:03.453000
@@ -158698,7 +158698,7 @@ CVE-2020-35776,0,0,346a665795c77ac0d6c835aa6d91dd49b4e4fd9157bc9f1af895a859fed4a
CVE-2020-35777,0,0,dfc7692f874af9cc8bdd71147daef6cf0372fb6b4d4d67a591b4f6d65aa10695,2024-11-21T05:28:03.887000
CVE-2020-35778,0,0,d25687ff4c8a24e12fdf1f44f96d32d769f443dad87289294ce516306ccd5cb1,2024-11-21T05:28:04.097000
CVE-2020-35779,0,0,d75dd576a310701b3e484f28a7363aa5eb09a51affab4d6e90e087076e1f17b7,2024-11-21T05:28:04.283000
-CVE-2020-3578,0,0,dc767978457869af234b814352215f499afe5d6f7f51d28ff7b62683b6e9bbf1,2024-11-21T05:31:20.837000
+CVE-2020-3578,0,1,b82e7ba4392d0d58a8706a50b52779423b1d8ddb561d1beee30a41d8fbeecf5b,2024-11-21T05:31:20.837000
CVE-2020-35780,0,0,95d301e74db4db338f8c8d1dbd443691d6d1e31d72d63c2dd16611931d1e1268,2024-11-21T05:28:04.487000
CVE-2020-35781,0,0,3143d1b6dd608aaef1142c7205bafb0e2490d9cd6fff698f0e11d80ef16d451b,2024-11-21T05:28:04.670000
CVE-2020-35782,0,0,d80822da8cb1d3e422598e4ef96862c95690f8a2e207d428e3adae677cbe19cf,2024-11-21T05:28:04.850000
@@ -158709,7 +158709,7 @@ CVE-2020-35786,0,0,2fc102e20116bb8eea367d8af8051696173fcb76f01d146605e67aa3c1038
CVE-2020-35787,0,0,7b6523336519ce6192f401e0f1bcb478426b9cdfb78247e2b802e4fe7a72628d,2024-11-21T05:28:05.810000
CVE-2020-35788,0,0,8b609d84c6c2767969f679ebc44de558b29adb49f14f9880a2803d339f9594b9,2024-11-21T05:28:06.053000
CVE-2020-35789,0,0,a404627c771a76155f3a509814def78984af7be98d47164e3d6c46eb1e9e8810,2024-11-21T05:28:06.247000
-CVE-2020-3579,0,0,059e29aa8ae6371620e85066f1290d35ab4a55ec29db41f8d73792ab7cb252cc,2024-11-21T05:31:20.967000
+CVE-2020-3579,0,1,9e9dd389d7e899c7770dc461c9d72f79055e69c7199e748ff093270e68b787d6,2024-11-21T05:31:20.967000
CVE-2020-35790,0,0,681bbd69fbe2efad7f53f2ac9bcb0e77c4b9fae097053cafccfe89baee90a182,2024-11-21T05:28:06.457000
CVE-2020-35791,0,0,ceab336598fa8b003a18492e2ca0558a10a2b0d2ae112c634d06a5c208569d3d,2024-11-21T05:28:06.670000
CVE-2020-35792,0,0,7c2408bdc62fcbb417862e4c314af721a338c02332ff38b869a69ee3749db661,2024-11-21T05:28:06.850000
@@ -158720,7 +158720,7 @@ CVE-2020-35796,0,0,31a3b83f53c539296aed1df9f55c24771e7bcd54881f59903be624d0052d4
CVE-2020-35797,0,0,a3bc1f316b39a99fc3ae258e06cbd70ea7d67ea59c30ca9793a9489542dbce0e,2024-11-21T05:28:07.980000
CVE-2020-35798,0,0,2301e0d50968247b1454003c8168b1fe1c7b09170027d90006c4efc03a06f0b2,2024-11-21T05:28:08.150000
CVE-2020-35799,0,0,38304cb1c423b61afd592948d833cb588d2984165c467f11569a85fbd6d43832,2024-11-21T05:28:08.360000
-CVE-2020-3580,0,0,6679a1f82341ba8c0c81231e52d67067212893cb720bc3e456d811ac7ba74513,2024-11-21T05:31:21.103000
+CVE-2020-3580,0,1,c20f7ceadb7ed2276a415bb77845d7bd7452c6e21ffc793298caba4a307942ea,2024-11-21T05:31:21.103000
CVE-2020-35800,0,0,3c1e6b63735596604d5c4501d05acd1eddeafad528ac726c49f7a16a23e9a4bd,2024-11-21T05:28:08.620000
CVE-2020-35801,0,0,87833a41c39c2ec59c3bd36b610e5345cd7c11bb8ca5710c64a5a6a0377a40b4,2024-11-21T05:28:08.977000
CVE-2020-35802,0,0,c0dea1aab72a07d3d7f06ad309850f1fa463b9de58bec993442ae3d4fc8b8e49,2024-11-21T05:28:09.167000
@@ -158731,7 +158731,7 @@ CVE-2020-35806,0,0,64dc1df5dfb88ee5136145454ba6381e4b67523636c1832fecbf70f488468
CVE-2020-35807,0,0,15a5fce41a4a3c44b4843344cbc2faf81066fa0adc50356dc9a5b044bdeda835,2024-11-21T05:28:10.113000
CVE-2020-35808,0,0,7f19da722e38a6116a58a0adcb755e7b63024a5be72e7102590a8725900e0e9c,2024-11-21T05:28:10.323000
CVE-2020-35809,0,0,38157167e38e4773428110ca49d207d8c0f93050c6ad802f01efb74ebcc433b7,2024-11-21T05:28:10.530000
-CVE-2020-3581,0,0,64b7e9343080b91892f228e2e6409577253dcf8df26420c7437050e49bbd7ea2,2024-11-21T05:31:21.237000
+CVE-2020-3581,0,1,699822459a323c415dba651144a5f4495e288d89236ef1491d8eb77100b79e1f,2024-11-21T05:31:21.237000
CVE-2020-35810,0,0,bb218affc09926627153e1ff0a27576a82a219957dd33be2853863988909f928,2024-11-21T05:28:10.713000
CVE-2020-35811,0,0,9272bea9fcf24b2913a51f39d02d447e49e9afb8bafc04e9874d7f02aa4f2a1d,2024-11-21T05:28:10.950000
CVE-2020-35812,0,0,2097e3cf87cecc595f10b71bed2d37de5ac82aca885058d848369817fd2c548d,2024-11-21T05:28:11.160000
@@ -158742,7 +158742,7 @@ CVE-2020-35816,0,0,0a09c0f034ad001b74cdd869298343a02fd48991c73ac1d89c052e10c6add
CVE-2020-35817,0,0,67d8aca2712f2b77ba89de59a6642a754abf2890c7dd8968614fef6fd8359b1a,2024-11-21T05:28:12.140000
CVE-2020-35818,0,0,cf647ad051b675abd23b08ec21ce9dc09fd96effc888f006ef6345d33cba311f,2024-11-21T05:28:12.320000
CVE-2020-35819,0,0,fa41787d955bb8a9aebe7e8ff0818ac364a09287d36405b215b099d25c06f1a2,2024-11-21T05:28:12.527000
-CVE-2020-3582,0,0,8255248688f66c5d94ce16f572883618ad1f91d8a8e3127bb2652fdbe1c17840,2024-11-21T05:31:21.367000
+CVE-2020-3582,0,1,c74ec56c19fbb7a6ffb53fa2121b9032b6c9c040bc7fc0db0fe4547fadacd23c,2024-11-21T05:31:21.367000
CVE-2020-35820,0,0,32a94c5f375c972aa85770961d91f7689267d6247b13ded989f5df97685a6399,2024-11-21T05:28:12.737000
CVE-2020-35821,0,0,9f1ab729d20b706032fcf00c4a01de5386a132522ae104d060304f2d715aa7ee,2024-11-21T05:28:12.943000
CVE-2020-35822,0,0,58a83ad10a643d340c79e25817fce477952e3de41755184a3145f9d78d1f7bfb,2024-11-21T05:28:13.173000
@@ -158753,7 +158753,7 @@ CVE-2020-35826,0,0,b0d8ad4034eb2aabdfbd0b17a1809f0cf45fdfe48cb77b34ed3b7b9f98190
CVE-2020-35827,0,0,7508352606f18bb2f14a6935d1f2531379e4ce59497273163777d52c5e78ab9c,2024-11-21T05:28:14.210000
CVE-2020-35828,0,0,888ad7b9c970640e5a500dd69fe0bf0c9144c8a741a9868743173c5736f26e00,2024-11-21T05:28:14.410000
CVE-2020-35829,0,0,b4355f66648e310df57a95d7fcf525d869341550a0dfd0bf1a4da759a87318ba,2024-11-21T05:28:14.630000
-CVE-2020-3583,0,0,1ffef32191f6e1c51b1bfde777764b6014c1a9fec3f4899cba26b2206b24ffd7,2024-11-21T05:31:21.503000
+CVE-2020-3583,0,1,9278e77edc86c625c3308feedf4d8a4bb1a50ff88d5ae214bf5de5be5f5b8388,2024-11-21T05:31:21.503000
CVE-2020-35830,0,0,92f83f9d361e8a751f02b42284c6fff71a874ee339f591d44d069e2b0c7e6747,2024-11-21T05:28:14.837000
CVE-2020-35831,0,0,461ea1572997689db6e86603673f299e1ad2457b893ec236f6ec42ccd1460b80,2024-11-21T05:28:15.063000
CVE-2020-35832,0,0,f12cfad5e9a844881345b3c6dd0dc2bc817313d4f2bd755dcdedee8654a91117,2024-11-21T05:28:15.257000
@@ -158774,7 +158774,7 @@ CVE-2020-35846,0,0,3929933568f1df900dd0406022fc4e4fe61655b96ebd197c4c4c1196475eb
CVE-2020-35847,0,0,53030b238221befd4c45ba8ef743689d734e6f5e53cdc273ac982ec22519e35a,2024-11-21T05:28:17.997000
CVE-2020-35848,0,0,89a3a278613fa94b803b9549cf58b46dc6774a2eb9bd670a0757e93518fc7b1b,2024-11-21T05:28:18.177000
CVE-2020-35849,0,0,a465dca22ef2e506ba63f8f291d7e6c33411a9824ad2da63b65c6ad33f18a984,2024-11-21T05:28:18.360000
-CVE-2020-3585,0,0,d46f3f4c13d3a5803c9e14b073ef8aa9858c32ab2fba9fb5c2340e5e7644191e,2024-11-21T05:31:21.627000
+CVE-2020-3585,0,1,d6fad45caf8d30bb4c027570167884afdaf98921ca09c79b81660bbd8e055646,2024-11-21T05:31:21.627000
CVE-2020-35850,0,0,7878fa0eba0425e449b48463932f88113804b3e0f08654d7309de66c3b419b6d,2024-11-21T05:28:18.560000
CVE-2020-35851,0,0,6fa8bcbb4bbe95ef0040f3e61aca0abef33ba62fd83202704caa499aef347b5e,2024-11-21T05:28:18.750000
CVE-2020-35852,0,0,aa9e85859ea279a59f03a60f6b9ee36bab62802ebd773b642c2b51e73f5bc989,2024-11-21T05:28:18.907000
@@ -158784,7 +158784,7 @@ CVE-2020-35856,0,0,6a69b2d2852d974818398ae88b7c0bc50d772470d0b43fe8be8f4f4179207
CVE-2020-35857,0,0,6fd6d3773849c87024e691553b8dfcd4ce0e038ccae8aed5cdc504d91680fc31,2024-11-21T05:28:19.650000
CVE-2020-35858,0,0,0b3caeacde96b13c12e2971b3db147fb8a44c9cb7b06534a3c26fc188dba7760,2024-11-21T05:28:19.837000
CVE-2020-35859,0,0,ee5742a317d69c73f354ccb4525a1c8d1e07efcf046baab78f75112b8ede766b,2024-11-21T05:28:20.017000
-CVE-2020-3586,0,0,c62eb216d53bc17cdec3c842cff56d76388f33a925812ff3f52a1391f39b5228,2024-11-21T05:31:21.747000
+CVE-2020-3586,0,1,47f41bf80193a6ee408df14f1f572165fe8681daae65953afdfee945995ad16a,2024-11-21T05:31:21.747000
CVE-2020-35860,0,0,8cfe467062e200b3bcc3483ea0819dea89b54f8c34968c48a60ab83d75be62c1,2024-11-21T05:28:20.177000
CVE-2020-35861,0,0,9fc4269d81659b974b560c79c8620d56efe7ae317c5ef04fd375cbc0014c4dee,2024-11-21T05:28:20.343000
CVE-2020-35862,0,0,99ecd650cdd2ac14b3d98f8a9e9ebf42bbdb3b3d68b5a7972f9a428a62e39795,2024-11-21T05:28:20.530000
@@ -158795,7 +158795,7 @@ CVE-2020-35866,0,0,e079f8b358806148c8746d23bb05e36bc653db1997d416710941fd92fe936
CVE-2020-35867,0,0,c7f3bbe6582b93c63527a2e4fcbd8fe2f668a3c152d0d81ee1b8aac79a844c08,2024-11-21T05:28:21.447000
CVE-2020-35868,0,0,e1068b6a6cb512468e3ca5584f249430348ffc42f5b31466db88971f35f9c0c6,2024-11-21T05:28:21.627000
CVE-2020-35869,0,0,c3eb083d6451f19fd8684275c34dbc18768bbc035c0d63af7dd2c64076967997,2024-11-21T05:28:21.787000
-CVE-2020-3587,0,0,768b80fa211074b2a0c3b4373853380a45a96dc382ad62bccee6fd148d2ae204,2024-11-21T05:31:21.863000
+CVE-2020-3587,0,1,c11ed7ea49e68327a086be40f0438db04c2e739f540fb56be8b9c10a5e893f2b,2024-11-21T05:31:21.863000
CVE-2020-35870,0,0,fe63fe5d234ca054b737b736a235cceafc018daf46a8058befe924dbb489ec62,2024-11-21T05:28:21.973000
CVE-2020-35871,0,0,b811ac186a83f175e2b4116510080fedd7388c8c6917149869d10e5dc2cca5f4,2024-11-21T05:28:22.150000
CVE-2020-35872,0,0,38b68b50fde5376fc8e046917dde10a42a0005cdb083d19287c8e91814a2eb1e,2024-11-21T05:28:22.320000
@@ -158806,7 +158806,7 @@ CVE-2020-35876,0,0,45ed45ea1876cdfa9d29f84ea2b5e8d118234c424c2b51246ad1488f050c8
CVE-2020-35877,0,0,e60a040539db529f7de2d43e6e53d50a3e0f1c7e7efe092a6de7aaab0fd52b09,2024-11-21T05:28:23.143000
CVE-2020-35878,0,0,630501d4816c2eab93f7082a572e7ede9671d97d003a74ca34e65a393b912580,2024-11-21T05:28:23.300000
CVE-2020-35879,0,0,bf650ee2340f049f62e28a7621cf41326625181af3da350f23ef3d468068bdfd,2024-11-21T05:28:23.470000
-CVE-2020-3588,0,0,6a0895ebb214b3b48eb1d2e737be80cdee44aab21d6acc1acbd3940c13950fd5,2024-11-21T05:31:21.987000
+CVE-2020-3588,0,1,3ef6fbc187731ed64124d2dbba0d428a72deaae249ab8ad9f8e05c0a5f9994f0,2024-11-21T05:31:21.987000
CVE-2020-35880,0,0,bd999704d8f40d9a7f33e75d0cc623ceb4c945fcefbb0d731e218d9121497ff2,2024-11-21T05:28:23.667000
CVE-2020-35881,0,0,db11cdb31ee7312e339e6ba19c46dc8ad78713dcb1077fe8b81b3c3ca1b95f31,2024-11-21T05:28:23.830000
CVE-2020-35882,0,0,07f906cded4a0edf4e882ce8119594c02e44b2232deb1348fd1fe0352be67bef,2024-11-21T05:28:23.983000
@@ -158817,7 +158817,7 @@ CVE-2020-35886,0,0,ab2277413d200f1d4aa7907e4a9bfbb1bd83f3c48a9f31916580e34b61368
CVE-2020-35887,0,0,631650ac91d6cea2d72fb265b76e7094314544d2cc3093b8fffc236fbfbe91b6,2024-11-21T05:28:24.900000
CVE-2020-35888,0,0,761eda8a40b5c047a2c4be30d5ce573ef196d1180441b7ad14c2ac22bc558d29,2024-11-21T05:28:25.073000
CVE-2020-35889,0,0,1c3ce7417d5388b5b02b8fbcf3f4531dc8c539af534f8ec69c7a05a3698ca15e,2024-11-21T05:28:25.243000
-CVE-2020-3589,0,0,7f4db1d33e6e75738a38a83775c8704d5413409360f5c0be2b11b7a9899b7ddc,2024-11-21T05:31:22.103000
+CVE-2020-3589,0,1,f221a03c667bbc4ed8aebd715b7914257f942019f0fdac26e1ae241f494bc4bf,2024-11-21T05:31:22.103000
CVE-2020-35890,0,0,f76c9513760c1bfa9a6f19d58ee300e652d95696590a75cda60e90ad3ef27e00,2024-11-21T05:28:25.403000
CVE-2020-35891,0,0,d16cc803c6ebd590d719630404954d761d53f685e9fb1213c9926eb7afaccf04,2024-11-21T05:28:25.577000
CVE-2020-35892,0,0,0884b6014b51acd564fe1abb5af39b1b873ecb7f7c4a618a6a844e503432aa83,2024-11-21T05:28:25.767000
@@ -158828,7 +158828,7 @@ CVE-2020-35896,0,0,e85d19d4d029600d2526ed457a07bb658077ba00c78b5c7ec6b1ff6913aec
CVE-2020-35897,0,0,9b951859b5ae8733a50e81daa86db6861ac072057a0cc097a11f1cf041752471,2024-11-21T05:28:26.620000
CVE-2020-35898,0,0,76d334feb0758d90c644d89eace434b652a9813d1c09f11d7a12dd5fe9538b4d,2024-11-21T05:28:26.787000
CVE-2020-35899,0,0,3bcbe5c8f91e9cf99444a5efcadd8298e50f96669eacb5502b489108321a039a,2024-11-21T05:28:26.950000
-CVE-2020-3590,0,0,8fef12bca74b1b299d509b5a4a7f08102b49dec445c8c6264ea5d0c05da118e7,2024-11-21T05:31:22.247000
+CVE-2020-3590,0,1,01bfee059e55f1db1876c094b6325a52b30c8a6700b6399ee23b4fe989580142,2024-11-21T05:31:22.247000
CVE-2020-35900,0,0,c06d4b896ad5ea06a5ee6b8790bcd79588ecdf8012c25398a08bd3ab65e52102,2024-11-21T05:28:27.133000
CVE-2020-35901,0,0,b6b59726f09de89edb2df1d3aad4ced1ba5c6c79a60f2d3e52131e45c054d833,2024-11-21T05:28:27.313000
CVE-2020-35902,0,0,42ea1ecdbc91b3ef1dbf3886b6b30f4fdb209eaeaa46506b3782e5a1b00cbbb7,2024-11-21T05:28:27.483000
@@ -158839,7 +158839,7 @@ CVE-2020-35906,0,0,302d248d8429ec2a6c7d7b6ae34f1a66c8b46b0172dde995e3390890dbcd3
CVE-2020-35907,0,0,cd47a97bdc778a6d6ad36b9067558a67ac9ede1bd48919b25033521e90221133,2024-11-21T05:28:28.300000
CVE-2020-35908,0,0,f3733ef63ecc5c108cc7069f1680a7a28c9fedc8974a46af56fb5510e2217711,2024-11-21T05:28:28.473000
CVE-2020-35909,0,0,decbb99f9e00d95180a6739867b75bb412b0cf739a51798c69befe53ffa0b572,2024-11-21T05:28:28.663000
-CVE-2020-3591,0,0,c864c4a005f02fee25df16491c2971e0b37ff5c57f8ce49213dd5db7a9afb904,2024-11-21T05:31:22.370000
+CVE-2020-3591,0,1,427fa97810f32f209498ae4c32118e5b2201e61de8b486e31ea51add23499aa7,2024-11-21T05:31:22.370000
CVE-2020-35910,0,0,87149bbf687afb3343add6a6c801b1eba977529841628e99a72798dec0af1e09,2024-11-21T05:28:28.827000
CVE-2020-35911,0,0,b4300f58fe09e10a6e40116551af52db938ce8321943970f48524d6c1964d83c,2024-11-21T05:28:28.987000
CVE-2020-35912,0,0,87b0da7faf731db39db60e7520476c05a01633dd2cfb55d0f0ce54505d4fe03b,2024-11-21T05:28:29.150000
@@ -158850,7 +158850,7 @@ CVE-2020-35916,0,0,36590e6595c61dab1e464ff09a2a5f3e78d503d666c129e5a97abc64cf263
CVE-2020-35917,0,0,6b2920a0683db665142dfec9fcfc1a416482178055c1878beab15e6729efed66,2024-11-21T05:28:29.980000
CVE-2020-35918,0,0,f0ed63f1cbd79c62cf5f644785cef76b541fefab9cc61dd656fdcb4844a9bcd9,2024-11-21T05:28:30.137000
CVE-2020-35919,0,0,10785680e425d328878958c0a864b3b5cf34afbab165f863d01c648e548918d8,2024-11-21T05:28:30.303000
-CVE-2020-3592,0,0,b1bcc137ceed7ee7b6bc8be6d701c9de2c940a8d408f34fb57f80df576638d47,2024-11-21T05:31:22.510000
+CVE-2020-3592,0,1,3c3418d408fa00db31f9c4ef79ee42bdd14759e113817a2c4d471c699d76a951,2024-11-21T05:31:22.510000
CVE-2020-35920,0,0,87f9029f34ac97a8e38270431ebab02179ec84095f4da4afe8d6429342a0f365,2024-11-21T05:28:30.467000
CVE-2020-35921,0,0,61def0b0b0e924c3881b67e4626b1bea1b2b3d79593d02b6c5862acfcff53a9c,2024-11-21T05:28:30.633000
CVE-2020-35922,0,0,9fe65abb88db3a6ff2e1c65cd372762ffc130acc7fac6327ec7f9238e3474e3a,2024-11-21T05:28:30.800000
@@ -158861,7 +158861,7 @@ CVE-2020-35926,0,0,75e4f926dcfb46e08ede222903f7e5c5a018b187510f866631d0bcd4a61d4
CVE-2020-35927,0,0,fa055553bcbe6e91ff46f68f6c3d4616ccfda7f3238f67de1d9410b8dce4a97c,2024-11-21T05:28:31.703000
CVE-2020-35928,0,0,26278e0adc2c96fef9e08e12d3241485514e1c6d64b42dd33c0102b51555cccb,2024-11-21T05:28:31.883000
CVE-2020-35929,0,0,df094a5294343adf6f064612e5944e5d8580ccf3d8dd585fa9006b39c41a26e4,2024-11-21T05:28:32.063000
-CVE-2020-3593,0,0,775c9b8d4b411d5198a0da00255f508edfde9488c7b0e6e84bc4c08036be23d1,2024-11-21T05:31:22.627000
+CVE-2020-3593,0,1,c194f9dd0487faddc90d91d6349af290e6f6f1f1e2558a91a466103b015e3a5e,2024-11-21T05:31:22.627000
CVE-2020-35930,0,0,7619e75c1ac74fdc798e48042c38bf0fe5eb66c525b14cf6462e928cb3aa1bbe,2024-11-21T05:28:32.223000
CVE-2020-35931,0,0,6ff905cd35b02f61a7291125f8acf065bc77c57d2b0eaab116f67c72ece9cd51,2024-11-21T05:28:32.400000
CVE-2020-35932,0,0,0fd1ab8ff07720ff22a91ca49205f0d5ec50a6afe12a1d0a538368f8881d61e5,2024-11-21T05:28:32.580000
@@ -158872,7 +158872,7 @@ CVE-2020-35936,0,0,f9d4cce6b6e8e65b694df01e560e48b3eea0ab143fe6a7d51fcbe3e734a15
CVE-2020-35937,0,0,4c4a44f2e5ff81ac9ae7836bc032a6fd1248fabd33f8e56cab0db5f6bf796dd3,2024-11-21T05:28:33.480000
CVE-2020-35938,0,0,6a48be2e02aa3c8905dec2d6fbd4f2b40f5f4cf2b32014ebe59238348f093d55,2024-11-21T05:28:33.657000
CVE-2020-35939,0,0,2ded5115a7d5e255566be890cecfb5f6dfb6bd524b62f8fa564dc177d81fee54,2024-11-21T05:28:33.820000
-CVE-2020-3594,0,0,036dd74c0b4da4a0e6cd8f4858c0161627ed64a82932c5a8565c5c25e2d4ab95,2024-11-21T05:31:22.753000
+CVE-2020-3594,0,1,b918ff752c80dbb75f81f30ddf3cb056c9e09a68662990fa0c8035a0dfc21ee5,2024-11-21T05:31:22.753000
CVE-2020-35942,0,0,342ee6e74f9f531f3d6f1dddfb1f1e039dc32c952ce99ea682a8f11d47cc0896,2024-11-21T05:28:33.973000
CVE-2020-35943,0,0,c73b4faa4f02b6c7483a2f2c2bf4c10984d7cee72a4f67a1c3a5a5487e2cdd1a,2024-11-21T05:28:34.137000
CVE-2020-35944,0,0,a4a31e24c2d778a18eaa015f17f9062a81e046cf4765e27d745db8d8e7378579,2024-11-21T05:28:34.283000
@@ -158881,22 +158881,22 @@ CVE-2020-35946,0,0,5212a7669181d28ce229c93308983a0660c0434d4b48056169468d8c1a88f
CVE-2020-35947,0,0,610c5270a77e20c3066f2742360b7e40a3e357a5c7b4b820670e743ee609b3f8,2024-11-21T05:28:34.823000
CVE-2020-35948,0,0,f6922c34f93f40d48f043da88103d828fc5baed65ae66079124b0bab1c83d286,2024-11-21T05:28:34.990000
CVE-2020-35949,0,0,755bae34e96e9f60ea1aa574a36af84efd0aa9d4573d279eec5febb05af83cd1,2024-11-21T05:28:35.177000
-CVE-2020-3595,0,0,0987cbd7a2035baa24cb6c5e4ac01abcff35cef1723dafccf90148e7a606a814,2024-11-21T05:31:22.877000
+CVE-2020-3595,0,1,a83dfdb7699aac43abac69b0270956b6fa80aa52c99358124dab21abdef0f2c4,2024-11-21T05:31:22.877000
CVE-2020-35950,0,0,f63e997d3332544e90b721ae71d84f7dbbc28880154170ce1ae2df154691ed13,2024-11-21T05:28:35.340000
CVE-2020-35951,0,0,abdd0fae9ed9beafa9690622b66494757c415d4477b817f2ec09a1c2dbe67b99,2024-11-21T05:28:35.523000
CVE-2020-35952,0,0,8b37c702076a997feabf04af475225704d8dbd286854780ba76421ad010fcbdc,2024-11-21T05:28:35.700000
-CVE-2020-3596,0,0,48e244639ccdcb517f70f223e66087cf42846e3a5b51d338a006a62f5f9432cd,2024-11-21T05:31:22.993000
+CVE-2020-3596,0,1,496fe06230a5d80cc36bce7355a44464084cee47df8d151fd57b95643ea4aa54,2024-11-21T05:31:22.993000
CVE-2020-35962,0,0,fb9b60923932af02fb8c044195d1c1b84e624e66ea318475bdb12b6ed4776ef3,2024-11-21T05:28:35.877000
CVE-2020-35963,0,0,f58964c6f8cc735bdf486638910f57a7a16e9057da9cd99220740b37d2fdd17c,2024-11-21T05:28:36.063000
CVE-2020-35964,0,0,33538db49281c5bc420c7e703cd1fb2d4352326cec37e1efe78fa426820c77da,2024-11-21T05:28:36.243000
CVE-2020-35965,0,0,f32e242cecec15ed2d87e666057c9e1bd1c6fdb97c80cdea833ebe9152b5d9fc,2024-11-21T05:28:36.403000
-CVE-2020-3597,0,0,7c10d033c5f5590c035076fcaea33538fda58492ca83cb469b2478f9b422eeee,2024-11-21T05:31:23.110000
+CVE-2020-3597,0,1,fc1b061a6c521f0b09ff3e771a6d8d9f71f47f03c93ac8162e65489935f0033d,2024-11-21T05:31:23.110000
CVE-2020-35970,0,0,17f41bbd7e1be87b8c542b89225ea1b0e4148050ccb7c39e40d50e311a0ac7c7,2024-11-21T05:28:36.623000
CVE-2020-35971,0,0,f2a55016b6b093d56fbefa183186d67b7e30cca53f65c9ffae4b1364ac4818f1,2024-11-21T05:28:36.803000
CVE-2020-35972,0,0,838282ba8b3f1c57ce45a1c32903a3cb5252cfb20cfab2ff90fdcf39ce060fed,2024-11-21T05:28:36.957000
CVE-2020-35973,0,0,d1b292ba48931ec941a31b0eb5ab004d9aeb27f58b7dac2ed8a7c40c2158efc8,2024-11-21T05:28:37.137000
CVE-2020-35979,0,0,098fd66bf0cfe0f35d323dc2e75d40ff49bb721d35657d2f9ed2267a57bd8a75,2024-11-21T05:28:37.307000
-CVE-2020-3598,0,0,bc3cec362ffe8e137211382c7182a60a4cf1b928f01e29d91d365e8e78cc74bf,2024-11-21T05:31:23.233000
+CVE-2020-3598,0,1,58bac9279c924cdf943e2b5a12a0f85d4db21442aba8bc315dc6644b375b2f44,2024-11-21T05:31:23.233000
CVE-2020-35980,0,0,21a66001f2025da94f64db09782666bd4baa7fce6cf7a86e453ccbf4da40c27a,2024-11-21T05:28:37.487000
CVE-2020-35981,0,0,227bd9a70975b2ed4e1f6c6d94f807a31e932e9af42b84c24a0518bfba15dafc,2024-11-21T05:28:37.663000
CVE-2020-35982,0,0,f661122f9892d93e10324e294e00c9d3f221685fd66d356077ea4a2f3a602ba7,2024-11-21T05:28:37.837000
@@ -158904,10 +158904,10 @@ CVE-2020-35984,0,0,31bf7033d9eaa051d8deb7a676989f6bd9d28ac0e08f522b1a06ea1d5630c
CVE-2020-35985,0,0,5be80aea4a0df543c7acfca539919b5d28b2934c6554764886254a1dfa67a54d,2024-11-21T05:28:38.207000
CVE-2020-35986,0,0,729a5cf1a04d4bf18b06b665cd5a8794b9ca9469af4bca430c0a231f21297025,2024-11-21T05:28:38.357000
CVE-2020-35987,0,0,708898b4192d60059c75e07e83417867e1c3c84728647b68d8b9d42ad46dc9e8,2024-11-21T05:28:38.500000
-CVE-2020-3599,0,0,4a05ab792e6dc572e60e20932cd571d4b5c1287f15efecac0893aae05b588ad6,2024-11-21T05:31:23.350000
+CVE-2020-3599,0,1,ab9a32a69203c0be3f4fe53ba79cdd6404cf524973ab0bf39079ac8993db045c,2024-11-21T05:31:23.350000
CVE-2020-35990,0,0,98d0ebdd3882a7033ad36562964283d3d2f1afcc876a708b16e74dc8db5ab852,2024-11-21T05:28:38.657000
CVE-2020-35992,0,0,9c867942aee136e276f27e58c8b4a2d1acd7e1465cb5afdb0c25c1554c7fc51b,2024-11-21T05:28:38.857000
-CVE-2020-3600,0,0,30f333a7dd21f36d98a4603b0aa7306a235fd79a193b9c4a70932557c59d77a7,2024-11-21T05:31:23.467000
+CVE-2020-3600,0,1,87a4ded7898c2f3d52a378e12a0820a70f7d49af1c87afb6cd3547639b2fe80b,2024-11-21T05:31:23.467000
CVE-2020-36002,0,0,a0b63fe2a6c86863a78f2e2e76390356afb5d131a5639945197b69800e6fa488,2024-11-21T05:28:39.023000
CVE-2020-36003,0,0,9cc148630cb56763b74479a9b7175bd1be754f7e7071103a35d92638a8da950e,2024-11-21T05:28:39.203000
CVE-2020-36004,0,0,cabbdc6679ec76388a4c81751626a6665f5ab03d47bc2dd733e549d5e3a4a2cc,2024-11-21T05:28:39.380000
@@ -158916,17 +158916,17 @@ CVE-2020-36006,0,0,0762fcaa826b9925ca438122120d4b7a446da4022108b4fa797ab8f6eb96b
CVE-2020-36007,0,0,99fcc41ad72e928e758be7aebfd1c12f30e27fcf29111a7fabf588a5f1ec18f6,2024-11-21T05:28:39.873000
CVE-2020-36008,0,0,67f60f40bcc1dc09db260684d691505f7db9bd4299eb1f71bfe7643cfff02728,2024-11-21T05:28:40.033000
CVE-2020-36009,0,0,b77866849c62e018568c79218150cc0826bebb9794fc36c6778a1f36cdcf8bb2,2024-11-21T05:28:40.203000
-CVE-2020-3601,0,0,642d95a18f00499d8356d9741311e12ed1579185f55ebd5c1a41e2315a92eff6,2024-11-21T05:31:23.590000
+CVE-2020-3601,0,1,eb0a8f0a063531637d7379381519bcc6a8f8427f8178224ed4b8f2fe51d58c87,2024-11-21T05:31:23.590000
CVE-2020-36011,0,0,bd3d3e51c6c6b894dc2cab574bc3cdb16b3fd7a47e9601919601c96747477a4a,2024-11-21T05:28:40.357000
CVE-2020-36012,0,0,111f35b2cae5376d06e89eec18334bf63ba35152f18542172d6e9811a6b9cc1f,2024-11-21T05:28:40.513000
-CVE-2020-3602,0,0,2a510b9c99a24920586dcb2c707135b4a156a6966937b4f73b6117479547102a,2024-11-21T05:31:23.700000
+CVE-2020-3602,0,1,1fbfdba2069ee3b054f2f3bf93f87fec2feef826d860e8187b0a09d18c184177,2024-11-21T05:31:23.700000
CVE-2020-36023,0,0,96a1fd284e56d2bb0d6b590f360bbf144c73afe5c5b909152644c2062e7cba3d,2024-11-21T05:28:40.690000
CVE-2020-36024,0,0,cac9d9e2b6109886d4aee2f9ecbdac8d0fdb60f0a8048af4f814017300ce5d14,2024-11-21T05:28:40.890000
-CVE-2020-3603,0,0,5844816415d885e704470e7ae44753090c198d8618876e83ea85fe72228fd569,2024-11-21T05:31:23.817000
+CVE-2020-3603,0,1,1bf5a3dfd14671afbe6f4f6e1a1403c008de00a5652e22585d9f335d69cb4bcf,2024-11-21T05:31:23.817000
CVE-2020-36033,0,0,b0d5120e7037046d0cd5faca28f157cf9b8eaa4efa766c3738d3e1232d985374,2024-11-21T05:28:41.070000
CVE-2020-36034,0,0,714e267c18ba63eb72846178e9220ac936027906890814c4059dda2ae9f36b85,2024-11-21T05:28:41.260000
CVE-2020-36037,0,0,3014d65ac3316ae4a85967fb5d408ccd73a76e5b472dc07aa086432e5bfe50f0,2024-11-21T05:28:41.483000
-CVE-2020-3604,0,0,8846fddee8052a9e687bf375fd68e80ff89a280bdcb6f62d3f18dd68d8fb69d9,2024-11-21T05:31:23.940000
+CVE-2020-3604,0,1,0a1bbd9bb85014bff79b501f4c7b3f44688e476cd8744c28fe7909433be73ec5,2024-11-21T05:31:23.940000
CVE-2020-36048,0,0,73c7adaaf9eb00a6fad68aa4201535088b3c411af18c42020b93069114ef155c,2024-11-21T05:28:41.677000
CVE-2020-36049,0,0,78135c52cf120f1b2ca1043d9400b24df11bdccd6884a74a5f8bb5f72cce41fe,2024-11-21T05:28:41.867000
CVE-2020-36051,0,0,7dd8c99498f93643218dc80e6d95e12e14f0a21f90318ee28f787f87151d4f4b,2024-11-21T05:28:42.043000
@@ -165773,501 +165773,501 @@ CVE-2021-1121,0,0,2ad45ae47663833328ade2d108b9311dad298ac9aab9a8bb50a34395b50e30
CVE-2021-1122,0,0,9102718ae689ebc7052a3ff83b6dabc47507e6d0e591e1a745dcc3e7fdbaba33,2024-11-21T05:43:38.423000
CVE-2021-1123,0,0,d0daea0c99ff0402e0c51d71947f0897fd57d022c816c1577246e1287dc54a8d,2024-11-21T05:43:38.560000
CVE-2021-1125,0,0,1d3c20d57a52d380a15ada71e515e119618db34ce298da852812e3f73ccdbc51,2024-11-21T05:43:38.677000
-CVE-2021-1126,0,0,07b303f69ca38831e7e7f24669f0c3c2e515792509afff3059a01282fd1f416a,2024-11-26T16:09:02.407000
-CVE-2021-1127,0,0,53b473537797ac6e68e93d072e652df862a370758138ffd3ed0f3a4ac3e7c07d,2024-11-21T05:43:38.920000
-CVE-2021-1128,0,0,9b4603d258d601c2a3ce8f6d3d4f3ae389f57ad70219d35ef635199f3d0ca6f3,2024-11-21T05:43:39.040000
-CVE-2021-1129,0,0,f88761bc8b9b7f2fa246e7a186fd1e9cced5a2448097c8393bb70efff5a6070e,2024-11-21T05:43:39.177000
-CVE-2021-1130,0,0,c984df52e044e46b988446a5bf89dc817716966e6e84f1ef391f15493d27b722,2024-11-21T05:43:39.290000
-CVE-2021-1131,0,0,4a849c2bc7d646130058f2f3da83b355d6b67400709ac0fdf54ca3a777e7657b,2024-11-21T05:43:39.420000
-CVE-2021-1132,0,0,97cd1bd186fe969e86addd356e4997950aed9ec59262f78cde1bfb5bc2b9c782,2024-11-18T17:11:17.393000
-CVE-2021-1133,0,0,c759fea0a6583157b6612f8cdb717b5f5d07ad783ef8a4bc3374991b16f1c70f,2024-11-21T05:43:39.700000
-CVE-2021-1134,0,0,54542782d5ca6d0b1ebda38811333489f39f19007c635963dc52c0a22c6cb413,2024-11-21T05:43:39.847000
-CVE-2021-1135,0,0,63cd0beb52185f0b4b84fdb94f60cb509106a0a8bd442641261c57cafdadaa38,2024-11-21T05:43:39.990000
-CVE-2021-1136,0,0,bf61eb125cc0a3d163e4d526a972e7d03df22c6bfbded67618dda88bfe091af0,2024-11-21T05:43:40.120000
-CVE-2021-1137,0,0,9c1191e50b8b9102f3d81aeec255b947f79897d50e9aa4124c596eca5ebce0df,2024-11-21T05:43:40.260000
-CVE-2021-1138,0,0,adc7781431bf497bf4c6fef432fa24d3c11f2051e60aa9e18ab38905fb8ab3d6,2024-11-21T05:43:40.390000
-CVE-2021-1139,0,0,b39757e67af076c44d5731d589cac8a78b3d7bb96d39eb53f8c8be8c98b959e3,2024-11-21T05:43:40.520000
-CVE-2021-1140,0,0,bb8cec50539b0534540007ff6cd851333e75440c3fb1225fe6744b492c3ea61a,2024-11-21T05:43:40.650000
-CVE-2021-1141,0,0,c52ddc8154657c2f3c97a8a3ba632b9480b036b15d7cfd5c70c10377646c1465,2024-11-21T05:43:40.783000
-CVE-2021-1142,0,0,83b781f6b2eba8974b5e00ec0a574587190e87d40cf9c2ffd1aa4f4c62df61bb,2024-11-21T05:43:40.903000
-CVE-2021-1143,0,0,c503f77bdbe89c84ad16831e4c4dc2dca915016cbc664f09b39a3dd14f071b9a,2024-11-21T05:43:41.030000
-CVE-2021-1144,0,0,6a9e80a72255e85f21d89bbd416e13938e30029529a60ecff69fe259d2c61c7d,2024-11-21T05:43:41.157000
-CVE-2021-1145,0,0,75249857ceaa834c1556af7039c9d3758cf9733d5041791d1e4f56f731dd1353,2024-11-21T05:43:41.293000
-CVE-2021-1146,0,0,bfa3144c1d0b65cb217f454e07fef640c1665204b9657d23f9e34f0ff6cafdae,2024-11-21T05:43:41.413000
-CVE-2021-1147,0,0,d868286353a347cf9648c68661e44be6e40e8b8af1bf91f8d23a95f8de664353,2024-11-21T05:43:41.543000
-CVE-2021-1148,0,0,b31e803e3f1063257e638107aeb14f0b9df5e3cfac0a36119e1dd0a17f60e3cc,2024-11-21T05:43:41.677000
-CVE-2021-1149,0,0,4e68884475d81928b1346799d0c226d9c6b7fd791f032cddfa835c6e7c03b149,2024-11-21T05:43:41.807000
-CVE-2021-1150,0,0,6b2a2ad5437d0efbd35f5c933a60a86e80e4069075460c79a1236f8407618b75,2024-11-21T05:43:41.937000
-CVE-2021-1151,0,0,09a28aecc4cbaa3f3834a86ba04c21f4f7ae36d58e660d8e2284071629ce4edf,2024-11-21T05:43:42.070000
-CVE-2021-1152,0,0,95e20c52fe901b74c3a79e03603a12c36c550aa8d6c7d3ec22320a1efd53f675,2024-11-21T05:43:42.203000
-CVE-2021-1153,0,0,3af5cfd30b4dc510460c730911bc14e43dd3df08a7e8c04e5cd5e21e4c621e4a,2024-11-21T05:43:42.323000
-CVE-2021-1154,0,0,074977fdbbfd4afe7e85a2b500f35040e40ebe859ce9f82e5e28c3bf2917728b,2024-11-21T05:43:42.453000
-CVE-2021-1155,0,0,89b7b18ec788a981c1a07d7c5f876a9456b174bbb7d4e3da753ec728254fa873,2024-11-21T05:43:42.597000
-CVE-2021-1156,0,0,7e06c493829656666e9ac6af31f7b2d43061ebf837494f28948f12db2615298a,2024-11-21T05:43:42.727000
-CVE-2021-1157,0,0,a9939ac4e8eba4ef5ab0444e99181178952571d6679996135c3e80a82c1c54d0,2024-11-21T05:43:42.860000
-CVE-2021-1158,0,0,e3131f4c88cb66f82d5c8a79dafeb972892bdd4381c9b7590203c87beb9a7966,2024-11-21T05:43:42.997000
-CVE-2021-1159,0,0,78a7014989635248ada85ff24719932d294f847772ce98c4398400c8c7cb3e1b,2024-11-21T05:43:43.140000
-CVE-2021-1160,0,0,25fd20f96bacb7e539b4aaad5838f0cd08e00de78dbeb38666b6423c5bfe74ea,2024-11-21T05:43:43.300000
-CVE-2021-1161,0,0,872ec48b6854fb156d1542a2c9c7d982616039de09c59ac135ea3d32cf0bc361,2024-11-21T05:43:43.440000
-CVE-2021-1162,0,0,637c0cf7dad1e466c9e4eb0b8f90fb08a4b69c95104a0f5864f1359d0c1e4c2c,2024-11-21T05:43:43.587000
-CVE-2021-1163,0,0,424950f30b0ab5c195aac9c73e04cb55562462c92aaeca14d9857f43b439ee90,2024-11-21T05:43:43.727000
-CVE-2021-1164,0,0,de7f8e37a63b1874b6725bde7366ac02b1599ca4d15b5f47027563fef77dfc5d,2024-11-21T05:43:43.873000
-CVE-2021-1165,0,0,1bdbaccca32719d053ae75e4081e2090378a16e0c6bfb2a2f1e4283171745252,2024-11-21T05:43:44.020000
-CVE-2021-1166,0,0,4e92862fa2a5f585adf0001ae2e51bf5042274956568ab4f6db512a976b87635,2024-11-21T05:43:44.160000
-CVE-2021-1167,0,0,3f25196a50176cad3522fd815c96cf81ee709114e15a7b1dbeaea20f2f2958c4,2024-11-21T05:43:44.310000
-CVE-2021-1168,0,0,81e6ee62f86f06ac45d7c9c24d20ff1a7622566e7900975c3972ba0e16701b2c,2024-11-21T05:43:44.453000
-CVE-2021-1169,0,0,0a4e02354918004fcd49b2ea3ff2d2c09417c4b53e19f226d470ab4bfb962dfe,2024-11-21T05:43:44.597000
-CVE-2021-1170,0,0,7fee72626dfa14408d0683531bd83d0c4e9ca2316605af3e81f710342b78c3d6,2024-11-21T05:43:44.757000
-CVE-2021-1171,0,0,8c39809b69535323578f9c3a72f51afaf47872248d787fb2ec7f7aaf48fa9342,2024-11-21T05:43:44.933000
-CVE-2021-1172,0,0,308c2c6b7384d5b402b7f246afede032d81559f19d22fdeabc145fcdfdd79435,2024-11-21T05:43:45.073000
-CVE-2021-1173,0,0,f6388c030ff5c111fb5452d882c36ac7a8470e76df02ae078da6bb671c6fb446,2024-11-21T05:43:45.203000
-CVE-2021-1174,0,0,ae7b5a19b7c86cfd7cac409442555557edf6f100926935282e551c22f500382c,2024-11-21T05:43:45.330000
-CVE-2021-1175,0,0,797f9983722785788cb783aa608b7888c291d32d759016dcd1ef7b8a19b874ef,2024-11-21T05:43:45.460000
-CVE-2021-1176,0,0,c60a7ae97b18390e7f2c245c2f8877702e44794b8fb7dbaba3216174c6b02bcf,2024-11-21T05:43:45.580000
-CVE-2021-1177,0,0,3ae622717f3560955db95693ac2d782847c74b3c88f262508ead59862fd6cf2f,2024-11-21T05:43:45.700000
-CVE-2021-1178,0,0,f1b4bf86b7716df5a401e5ccd9b7ffb832f10da23a0611c6989555ae29758726,2024-11-21T05:43:45.813000
-CVE-2021-1179,0,0,965ddf301573cb1c56d60dfa38542da25ae086238eb8267509d85d24f8dbc9fa,2024-11-21T05:43:45.940000
-CVE-2021-1180,0,0,9ef21b2cd6f5b04cbb9150d4bce841f63ae116a94099e2e49edecddfc8f3ae4e,2024-11-21T05:43:46.057000
-CVE-2021-1181,0,0,1570309f6153b68aa5aee0167bd98e572b8b96ec43db01297f1a5c7dfcbc7598,2024-11-21T05:43:46.193000
-CVE-2021-1182,0,0,1534fb9055d5ee071797bc1ba8ad55fecc4c590d23840b6b594d96091a0076c8,2024-11-21T05:43:46.307000
-CVE-2021-1183,0,0,d0f593f7f8310f1d52085b74d35a162d32a88aedf9cf08529450568570a85a24,2024-11-21T05:43:46.433000
-CVE-2021-1184,0,0,5cabbe03ff75c5f080ee08235311c259503e1822ce24df8a71f70715b80752f1,2024-11-21T05:43:46.557000
-CVE-2021-1185,0,0,20a0b7ee9c08543571e9a60e4a04fa5e922db2dea94b8c9f7ac2a9848658342c,2024-11-21T05:43:46.697000
-CVE-2021-1186,0,0,2129cd33c4dd407bfd2c031b660b051acbaaa7620ee9a453f02ef4f269e606d8,2024-11-21T05:43:46.830000
-CVE-2021-1187,0,0,5754be84d9fbe44b15006415d0087b00ff5f64fc8d6c520ccbd9b1d967ab713b,2024-11-21T05:43:46.967000
-CVE-2021-1188,0,0,b4634c0a2b73fff1468c876b55312ff6a163767daab0102ded16861ae1496701,2024-11-21T05:43:47.107000
-CVE-2021-1189,0,0,ee4957f4f6c2f81e2106a4d2c01c0856485fda111ae53a18512bd06311cfcf3d,2024-11-21T05:43:47.233000
-CVE-2021-1190,0,0,9f3aaa2b487ceb6f1184a5c42e8b1c6ca76e77dd736a1537deb62358d0e9821b,2024-11-21T05:43:47.363000
-CVE-2021-1191,0,0,1bec083f5e4324ecdcdb449a324efd4ba6577bf94a6c747763c2cec81691867e,2024-11-21T05:43:47.490000
-CVE-2021-1192,0,0,5ff4f9e3e97525bb00d6e9ea668a08d933c0f9fb9b3067e156efc6557a62a013,2024-11-21T05:43:47.617000
-CVE-2021-1193,0,0,a1f5ea310478338535373f38185975e2b6a9105b34ae13f3d37fe149064bb30a,2024-11-21T05:43:47.743000
-CVE-2021-1194,0,0,cf0d649b1261f29248c37917a25577fccad1a80eaa1539e443da4e74992c414f,2024-11-21T05:43:47.873000
-CVE-2021-1195,0,0,2d8182ba2e04d32b1b4f62f057ebd2f5e6ea9e3f367474b5395691722df96014,2024-11-21T05:43:48.007000
-CVE-2021-1196,0,0,77c568841e1c3f0328cef04b8129e62b4c38e4b018f3c712e37a2103ba985a3b,2024-11-21T05:43:48.140000
-CVE-2021-1197,0,0,5a13675335b2a4f893ac68175f195042f6f2b83d84d06de8f4533a148af971f3,2024-11-21T05:43:48.287000
-CVE-2021-1198,0,0,8874bb8722189b63d5a81867e26cde144ecd4f04c0570175e486443f9952c861,2024-11-21T05:43:48.420000
-CVE-2021-1199,0,0,1c1dcca1277e3b17ee159b5bb91a9b89c3bde8da0845b0e3dd919fd4b17e4d2b,2024-11-21T05:43:48.560000
-CVE-2021-1200,0,0,d01f8a54e86b7cd460550f7c385902ea2a319bad4aec9c199d8bd3725723affc,2024-11-21T05:43:48.717000
-CVE-2021-1201,0,0,fcc857059897e41d7ddf62e61c3f174c9f4e6ad73403febd0892093d5c0fa03f,2024-11-21T05:43:48.873000
-CVE-2021-1202,0,0,36612f52376de716a6ef00ca3d3cffb55aa4a5b338917181bd0b56371ff1d051,2024-11-21T05:43:49.007000
-CVE-2021-1203,0,0,34b216ebfcfcb74286de984565c9246a68b5e0c7170dbb4c4b905f8fe824c4c3,2024-11-21T05:43:49.140000
-CVE-2021-1204,0,0,3062c06364be002289dfeaaae79c50b6a495e7f0eaaff6c6534197d21c4e3e7b,2024-11-21T05:43:49.283000
-CVE-2021-1205,0,0,2a2846677d73ce5aa42671e5c48d3c1b14f17d991f6db18bb312e6c5d4a0d1c4,2024-11-21T05:43:49.420000
-CVE-2021-1206,0,0,6e71a64b3d6358bfcadbe9e322c81b134d9d1bd3322c48aa1adcd99db205ee65,2024-11-21T05:43:49.560000
-CVE-2021-1207,0,0,707529b031712cc7ce27db21363d689687041ee7a6e9470f44b0930697aba6a4,2024-11-21T05:43:49.703000
-CVE-2021-1208,0,0,3681c82eeb6564fb1a1d57c319dfc2d33857e92b78658e94cb859920d0459a35,2024-11-21T05:43:49.847000
-CVE-2021-1209,0,0,b301c839f031bfa048d320f12793c4dbc409cd4de6ecbb5707aac6102a0c2752,2024-11-21T05:43:50
-CVE-2021-1210,0,0,80d42cdcde23f791852feb7e7a210664cbe54f0b6a418fa28dbeb31c0c860a52,2024-11-21T05:43:50.147000
-CVE-2021-1211,0,0,9123bc3be77f05183eb7175e218e55aa96e430e5f2e1b79d6deafa24c2528c4f,2024-11-21T05:43:50.293000
-CVE-2021-1212,0,0,486017d5fd7fc150fc3a17bfddbf5cdb81b68a735e361eedeca6250305a61717,2024-11-21T05:43:50.433000
-CVE-2021-1213,0,0,e9357ffab5b6304a669635c4443ae9bb4516e4298bd79f7065838812fe7f390d,2024-11-21T05:43:50.577000
-CVE-2021-1214,0,0,1174bd1c78eaa8f4bf318ad60d1f8947efce3875a8b8772bd84e05358794e37a,2024-11-21T05:43:50.717000
-CVE-2021-1215,0,0,72d4ce4f4a5b6de7c50b8e8ca33655015603a2966566db576b83028d500f1aa6,2024-11-21T05:43:50.857000
-CVE-2021-1216,0,0,fb65fe660ee2ae8211b031987808359479b03ba92514412ad380baf26d615cab,2024-11-21T05:43:50.997000
-CVE-2021-1217,0,0,c5f37806e3400e159f848806ea829fd8d52c712e2173e52fbae744e8b5be187a,2024-11-21T05:43:51.143000
-CVE-2021-1218,0,0,463204d8d30e1308cb4c26568d8c37b69cbc9e6df5ffb18e16287570a91f1d7f,2024-11-21T05:43:51.283000
-CVE-2021-1219,0,0,c5bb2e595c45bbaede34b823d1a4f7486c63bc10c7eefb7a38ded3edfe9f48ff,2024-11-21T05:43:51.410000
-CVE-2021-1220,0,0,e2d599b642f9b1fd58cb293dd2ca1fcbb8f8db0a6d3f1af608870142d5018c03,2024-11-21T05:43:51.540000
-CVE-2021-1221,0,0,dc793ff8a1f74a0959a8d52e340ea50ec5838281774a5250913e9ceb0ab5927d,2024-11-21T05:43:51.673000
-CVE-2021-1222,0,0,740c490f00357bfe289a238ea7d8b7222a05698fc4eebeb59003558d22fc00a7,2024-11-21T05:43:51.810000
-CVE-2021-1223,0,0,eb3f9bb75405af2fae1936d8c09b532db34c94ca02765ebdcf1a875017147d03,2024-11-26T16:09:02.407000
-CVE-2021-1224,0,0,24e4926a2594e616cebf3c0413319ecad8e3b47605617cae7d6e5e6b3f1cd081,2024-11-26T16:09:02.407000
-CVE-2021-1225,0,0,fbef5da86e658a1c4fb6cca7aa13981521dc5fd8897431e46940248074ce28d9,2024-11-21T05:43:52.253000
-CVE-2021-1226,0,0,7dc7f5f65f34ac1e83a96e259decc179cc3559bba1a247755e7d1bfd6f8cfec2,2024-11-21T05:43:52.397000
-CVE-2021-1227,0,0,bddd0eae807a654123ab87d746ad4658c7e8111262f8c355564294efd0598060,2024-11-21T05:43:52.533000
-CVE-2021-1228,0,0,a712ee4ff8b62c9059114d8b737efebd34f1f9c8cc204b2deafb9f983a8d4b99,2024-11-21T05:43:52.683000
-CVE-2021-1229,0,0,f20d4f3e235546871325a5017d4a6488d99e379b280c9623b73b6beaacf72059,2024-11-21T05:43:52.847000
-CVE-2021-1230,0,0,163e95ce06f86c8db9e758f4cb772b049b2d8eda41ea38cda65e67917d6954eb,2024-11-21T05:43:53
-CVE-2021-1231,0,0,6bb6fea86b5ce32eb20ce226ca228b55dfeb01898e1f1df4f9511de85bd9cd61,2024-11-21T05:43:53.150000
-CVE-2021-1232,0,0,0aa6a3de2ff23af9a51f0061eb00a42b6a4f789dae6bb4d96cc8f4b4dfdea2df,2024-11-18T17:11:17.393000
-CVE-2021-1233,0,0,3873036163d9da949de832863a2ac7fd9476ec25dead3a3fcaad61277a4160ea,2024-11-21T05:43:53.390000
-CVE-2021-1234,0,0,ef7bf06f622e4fccb4eb873a71a71b105f0815194a2aa792af6a15d0ad7ab26e,2024-11-18T17:11:17.393000
-CVE-2021-1235,0,0,4c992f859541bbcef0442ca254f457cbbe009a1e98c37f571c19d3f72f908321,2024-11-21T05:43:53.643000
-CVE-2021-1236,0,0,2c62bba2729440598766abeb14c7973924d3815eb972251b7476cb94c4b73243,2024-11-26T16:09:02.407000
-CVE-2021-1237,0,0,1bce1b6a305bb8d4c46bc96eec82879154a532ac3b25fa701dfee066187f92ab,2024-11-21T05:43:53.910000
-CVE-2021-1238,0,0,6c69b94fb679b4905cf0014c61ccd0a14f9b7efd743cb18df879350d2346b461,2024-11-26T16:09:02.407000
-CVE-2021-1239,0,0,741e759ee5b30495c48d24398aaaeb6060d449f02ebb8f21b8e9ed375c31cf56,2024-11-26T16:09:02.407000
-CVE-2021-1240,0,0,7335d4eb8faccaa88d0d5c5714deaf60538b4c5c9721f7e6515fc75e2c047f1e,2024-11-21T05:43:54.273000
-CVE-2021-1241,0,0,c37dc56ac55b75d60f24231ef9f5859a8f795c74cc721e703e7c8f3df25f0e6f,2024-11-21T05:43:54.397000
-CVE-2021-1242,0,0,2b79cc50b7b30b9da5cd03f7122d5a38b5dd3909d24a53b283ecdf14e1d5a909,2024-11-21T05:43:54.527000
-CVE-2021-1243,0,0,fd816225bb033289659392b63c868c57029dc293c0d6e05dcf3d3e10089a5ff2,2024-11-21T05:43:54.650000
-CVE-2021-1244,0,0,cdddfc0910133f59ec839a38caf5d83b314e9c6e87708001e554150c055dedc1,2024-11-21T05:43:54.780000
-CVE-2021-1245,0,0,ef029377e1598589eb86e7e384f8587fae3e6e32ec7054356c7240cb56596b19,2024-11-21T05:43:54.910000
-CVE-2021-1246,0,0,cc5d63c99ced31c89e2bd184e62f127de17df9340c82d33bed9aa98e9153a00e,2024-11-21T05:43:55.060000
-CVE-2021-1247,0,0,35d9417ff77eee735b24e4ec5bc21e9aef5628d8a69f75f13883507cead58454,2024-11-21T05:43:55.220000
-CVE-2021-1248,0,0,a5853271352250a3f22c1639d4b321479d96b35a63f6b728b0289847cc7720a4,2024-11-21T05:43:55.383000
-CVE-2021-1249,0,0,b97f317ddaf2d564c502e4ad64acc0a387939d1f452809e7817fe11b26c832d6,2024-11-21T05:43:55.517000
-CVE-2021-1250,0,0,420114e46c6d92107a75d8c9100ffa6c190c9b30a476460eb9b1c9a9e0c31595,2024-11-21T05:43:55.643000
-CVE-2021-1251,0,0,adb34944053b41027c6ca013752855a9b4a90169b2ff1ccab801c0244f1787e2,2024-11-21T05:43:55.783000
-CVE-2021-1252,0,0,183e680404e824fe0e7d664b252eb28f1ec3aeb41500a62b7293e67bd6a57781,2024-11-21T05:43:55.940000
-CVE-2021-1253,0,0,079fc19aac3dd35858b5ab453e05f7cc73ca293b54ebe37f7b2d44027619fe7b,2024-11-21T05:43:56.070000
-CVE-2021-1254,0,0,5fea09e8cb58ab165718a09008b76819e7040637aca4191b77de61b9c6d6755d,2024-11-21T05:43:56.193000
-CVE-2021-1255,0,0,aa7604fbe468ee5adde48c0ff73af62de42b23ba68231a0ad4f91c6a44192b28,2024-11-21T05:43:56.320000
-CVE-2021-1256,0,0,5f81eec180f55f48cac0be9aafea524c890a8d73aacdabbbd79c7f2b35cca5ca,2024-11-21T05:43:56.447000
-CVE-2021-1257,0,0,ef949f7ad17eadb8e608ab90f04e67a4f3aae889e0da9a688c42dfdc05c77975,2024-11-21T05:43:56.587000
-CVE-2021-1258,0,0,0aa320bc1bdaf8dfff3c55916db00aeb7482f28f1e20cdf356eedd4546c0995c,2024-11-21T05:43:56.737000
-CVE-2021-1259,0,0,fc366d32d380b82d5c2fa0d2bb770d3b7182f21402dfa9de8b23c16c22d1aa23,2024-11-21T05:43:56.873000
-CVE-2021-1260,0,0,a8e369e71066c0d7019d1ba74a37b9d65f61b6cb9d305090dcb0b4343c792e51,2024-11-21T05:43:56.993000
-CVE-2021-1261,0,0,916c11f5bb7371c4fc0e93c6c8cba0ac1f59f9a09eb5d55f5af749cfb607cf07,2024-11-21T05:43:57.127000
-CVE-2021-1262,0,0,f20f5c09196f029ab76c9f701c65ac8418d87a2a1009b50fc842851ebda89545,2024-11-21T05:43:57.260000
-CVE-2021-1263,0,0,844a1f72b9c7388d1b41173e4988abed5aa944eb7e22103561a2a52499e9ff4c,2024-11-21T05:43:57.417000
-CVE-2021-1264,0,0,ebcbfbc9fcfa23f606fdbebd7e835c3f1e1b88204d7bc549755b9c8ebc13020d,2024-11-21T05:43:57.560000
-CVE-2021-1265,0,0,30cebc59504efa99a9578ab1b4e9181a8784edbb7274a54ea8f279d63e686a4c,2024-11-21T05:43:57.693000
-CVE-2021-1266,0,0,1ec8e40074bf8fb2cb40b51a03af538de866518fb355b2e216ade9d6edec167f,2024-11-21T05:43:57.827000
-CVE-2021-1267,0,0,05eb0bafc821432103ba2d259ae57ce11262a89b90eb632728c447f1b0027a09,2024-11-26T16:09:02.407000
-CVE-2021-1268,0,0,eff0df6308fb42eff77e69b6acf90627cc7c32e3b5077a6df05e5c751894c0d5,2024-11-21T05:43:58.110000
-CVE-2021-1269,0,0,cda4184551fac93c53304a5bd77734c2f1a568c72e0f56d5064882c79ef58f1b,2024-11-21T05:43:58.260000
-CVE-2021-1270,0,0,c9ddfc634a6bddfbee6ec8a3a7618393645739f8ac8eb32df63b64f873d142f8,2024-11-21T05:43:58.407000
-CVE-2021-1271,0,0,27292f9f8c1e7f5251530e813c2482f9f12ddd375979d4043a15bd9c887f2374,2024-11-21T05:43:58.540000
-CVE-2021-1272,0,0,332fde8ba016487fa12dce07e5b345c08e654a2d8fcdf8dc78a9c55b50307b64,2024-11-21T05:43:58.670000
-CVE-2021-1273,0,0,c0cd69098c85f45b89be6c056eea5f01b60a68145a64a500822887e61298d361,2024-11-21T05:43:58.800000
-CVE-2021-1274,0,0,2dc6b0f216dc529da95fb69c7cf2a4a8b5acaec72a6f3e15524f02658c941efe,2024-11-21T05:43:58.963000
-CVE-2021-1275,0,0,1107578ab0f79c7e6a530e3d47cc9b94b4aa0470d5150f7ac889bef9ca91790a,2024-11-21T05:43:59.107000
-CVE-2021-1276,0,0,634f652d7f54230b38c5a53415cdc7edf2a137894667a9ccecf03cc1f7ff100c,2024-11-21T05:43:59.230000
-CVE-2021-1277,0,0,d55b06c4a936f71ad97383dee74454f0e084280366f703ffc40ff55f9ee4aaad,2024-11-21T05:43:59.347000
-CVE-2021-1278,0,0,e8cb3fcd2c61f73aa73cf34b5c7cea99e3b1b93f9a13f29f1690b273ec2cc651,2024-11-21T05:43:59.477000
-CVE-2021-1279,0,0,effce73e4318e0361f71acccd5d93c7d2a79ff46ad1ba3688d31ec054425ff79,2024-11-21T05:43:59.593000
-CVE-2021-1280,0,0,3338c6e5356433705ab17ee98dfe9f337863f84bd9182de15cc111ceee2dfa17,2024-11-21T05:43:59.720000
-CVE-2021-1281,0,0,c45ab29af17cfb57ebbae9162a3603d55e0179891d8b626980116e5c88cdad69,2024-11-21T05:43:59.830000
-CVE-2021-1282,0,0,e86e3d490408db0f20116e9191b1f768ac2a646b88651f55923d33b1bee8dc67,2024-11-21T05:43:59.963000
-CVE-2021-1283,0,0,81793034265817ed2f2d2d36a0ab02d4ded0d4f98107f56ccf0e26bfef39e0e5,2024-11-21T05:44:00.107000
-CVE-2021-1284,0,0,96d84ab61204e9e490fd3c93a12bfe1f49282b90ab0af4abeb412cdfff5fdd2d,2024-11-21T05:44:00.237000
-CVE-2021-1285,0,0,6722121032fa069582e484c97e90a1c6d148341e4be3806503d0721a5050b096,2024-11-18T17:11:17.393000
-CVE-2021-1286,0,0,638ea91d1d3e487235ef2fdd96025c714ad5555b20815540caf2eebed46cc863,2024-11-21T05:44:00.453000
-CVE-2021-1287,0,0,5fcea28e53c5aa320d102451124445cc13b83f40688b1e5e629b816f5339c940,2024-11-21T05:44:00.573000
-CVE-2021-1288,0,0,eb26570f00d83602e25b0822a38abf6c5ffda3b1cbf79ba9025352d21a30ca49,2024-11-21T05:44:00.707000
-CVE-2021-1289,0,0,81221dd185df3d4051aa593ee594f719e59c42a37196daf37ef6d6e60bf08f5f,2024-11-21T05:44:00.833000
-CVE-2021-1290,0,0,d98d53472b6b24cfd7223dbf1ccbad827ababea32b2068fa19d6f1b2fe95eb8c,2024-11-21T05:44:00.967000
-CVE-2021-1291,0,0,0a6a8fc0102d87b4527febd4c5b47f9f47992e25c75bdfd3ceb5ff2c23c12e24,2024-11-21T05:44:01.103000
-CVE-2021-1292,0,0,cb5571521f44b5025535d2e5f46e68060f1cc6d7f39a32e99f88be3e228a8d6e,2024-11-21T05:44:01.240000
-CVE-2021-1293,0,0,ac1523123f4d18b1f504517bf2b7741a61b6a1ffcf961feeb3cf9321407e5b6d,2024-11-21T05:44:01.383000
-CVE-2021-1294,0,0,0d58063e6d87e097c04831f6cd23fc99fe9844e1d9b3d9105214b848a69ccfbd,2024-11-21T05:44:01.537000
-CVE-2021-1295,0,0,4b0b381f673476d4551a5b413c1a60d7080d984be463ff14aa83df699d838b39,2024-11-21T05:44:01.687000
-CVE-2021-1296,0,0,efa8bedb9c3ea84daf8d0b026ed3ff8d08e6b8354a63dab3c2aa7f36091b486a,2024-11-21T05:44:01.833000
-CVE-2021-1297,0,0,28bd84c3db1634c1ab7bd5f40866ea450ffca119d3146ab0316c97201299231b,2024-11-21T05:44:01.977000
-CVE-2021-1298,0,0,e914111f72ed42f52ce7d78277da6102ec6a345746a1d2483ed99ea844a1a062,2024-11-21T05:44:02.117000
-CVE-2021-1299,0,0,b1cc762ce1feeaa7014f628cef5c8a2820b5f67e855adbfea5865fa8c9eb4621,2024-11-21T05:44:02.263000
-CVE-2021-1300,0,0,e4d7f6feefeb45104806791d1ca3d9df832504131d355c0b22d50cb07c1ec5c8,2024-11-21T05:44:02.410000
-CVE-2021-1301,0,0,a4eb315dd6d0a8a050456e68991bc57e2b214584150a339d0bf66b4384d89d8c,2024-11-21T05:44:02.557000
-CVE-2021-1302,0,0,7ce3328d86d6449a1fc2a6001cafdb6e8cc2b98f8177f67496498daba39bb619,2024-11-21T05:44:02.693000
-CVE-2021-1303,0,0,7679fae8f9190f704514815f5bb2ff9f510ace935200ef409937f21741ae96ad,2024-11-21T05:44:02.830000
-CVE-2021-1304,0,0,061b77b4f38ba46bebab544f0febf22f6957f78a7d268baa9ccaf013f95a28d8,2024-11-21T05:44:02.973000
-CVE-2021-1305,0,0,da3ed3587ecaedc796818f448962bb40e4b4218f882f93df0114d9b223be71f0,2024-11-21T05:44:03.123000
-CVE-2021-1306,0,0,35eb47be59e9838c1f91534d5b570380e860107493652c9cfa38615c8f764f30,2024-11-21T05:44:03.263000
-CVE-2021-1307,0,0,65ee9b7a9ab04b4f60d31cce3bcec96fdc28fe3c179a1f63a61fa5878174a965,2024-11-21T05:44:03.407000
-CVE-2021-1308,0,0,8619bc97f384569fac546362ac624db29548c3f30a69b75d7364fcc5def18128,2024-11-21T05:44:03.550000
-CVE-2021-1309,0,0,0b14c219521d671109d6445a6002960d7561a371ac52f9f459383805937f7b0a,2024-11-21T05:44:03.693000
-CVE-2021-1310,0,0,90a84c8d44ff56f38e1960009aa36acc7d39120715ceca9d2ea0981ea697bb27,2024-11-21T05:44:03.853000
-CVE-2021-1311,0,0,f9e4da65f61763cae4557d27e9347f639d6b4e35d6fc1b685a37e3406fece617,2024-11-21T05:44:03.993000
-CVE-2021-1312,0,0,82aebd72d50d673782401599fe94be436aaccca55cf9b2553ba49f6d0a77b3ae,2024-11-21T05:44:04.120000
-CVE-2021-1313,0,0,7f333b353d8c0c5675297bfb4f7fe0fe131546dc58c4dda9a49b87dd825659c5,2024-11-21T05:44:04.250000
-CVE-2021-1314,0,0,854defcb75e7f9d134bd66f87d72c5aa2ced6166643a402fc4dee2fa3bf687cf,2024-11-21T05:44:04.380000
-CVE-2021-1315,0,0,d26a9f88847aad0adec74f97ed1e1f6f8316ebb19086493e91a52af0aef6088d,2024-11-21T05:44:04.517000
-CVE-2021-1316,0,0,3683feae90099025812f97adfbef1d67c147502c67cff0c9363294dfe6754afb,2024-11-21T05:44:04.650000
-CVE-2021-1317,0,0,53066ec40498de273dd4ce015cf4abcca01faea12865aa7612bb4a8528d97f70,2024-11-21T05:44:04.787000
-CVE-2021-1318,0,0,1f8804cff0e08bd7e0b82439cfe6c57724420eee940efb2d109c7b0bd32ca4c7,2024-11-21T05:44:04.920000
-CVE-2021-1319,0,0,ba08c161a9187a8859ccb0d18af4338321bebcdd5e221302bb0f32ec97b1dea3,2024-11-21T05:44:05.050000
-CVE-2021-1320,0,0,0381f3470c254a5215565633d5309149a7eee2def57e3c35e840da97bfe58d55,2024-11-21T05:44:05.193000
-CVE-2021-1321,0,0,913a4b6e4ed5df1225c7baef2936f39ec9af53af594985c9eb69f17b722a9c1d,2024-11-21T05:44:05.350000
-CVE-2021-1322,0,0,ae3c3ff17520723d165c1cbf4b6bf717f6fb6e104f78b520be841170f1104531,2024-11-21T05:44:05.510000
-CVE-2021-1323,0,0,04f35d5b59329a7be93be8e589aa960708949c2e04dad54b16826dd9ca95636b,2024-11-21T05:44:05.660000
-CVE-2021-1324,0,0,4cc72f718a84fa04192d2f124326d4933bed7b316d218ac12d3217be2bafa6aa,2024-11-21T05:44:05.807000
-CVE-2021-1325,0,0,c1fa634648d6a76f4ecb5d1599abe0f32a293722a7e54ba15bf0f7287f67bf64,2024-11-21T05:44:05.943000
-CVE-2021-1326,0,0,33debeab20af4c542d5636a4c167de9ab18f15627cef5bce3ce49477fea4bec1,2024-11-21T05:44:06.140000
-CVE-2021-1327,0,0,7b21cd508a9eb13b31d90b7ec47227add22ffe40d03ae09c8dbc7b485818486b,2024-11-21T05:44:06.277000
-CVE-2021-1328,0,0,8fdb4b9a49a48360e74f13336fe3dd20b9cf802bcddf1e47dcd716ac2b9bf994,2024-11-21T05:44:06.410000
-CVE-2021-1329,0,0,0ffa79bb51f60e7051abbd59eb30ad4d458e5c3403d3bcbda2b91bd431014a61,2024-11-21T05:44:06.567000
-CVE-2021-1330,0,0,309965621a27e57203618b886143f6b86320a1e382bc008744ac930dbbfb6656,2024-11-21T05:44:06.713000
-CVE-2021-1331,0,0,e139c456e762d4b7d2bc14262a5fe70e73f517ffb8a47a1c661ecfeee26511e1,2024-11-21T05:44:06.840000
-CVE-2021-1332,0,0,6d64daa8848240ac78544a659a660c231d824b94f564938884d17621d9a8c159,2024-11-21T05:44:06.970000
-CVE-2021-1333,0,0,b07bccfd08a8189273d6c8e1b5699a542489dd9cf731a8dc9fdb095ccea6857f,2024-11-21T05:44:07.103000
-CVE-2021-1334,0,0,2b900299f51c747e9f957e9359b42c5cb5e5532c08128809b212984618bb993f,2024-11-21T05:44:07.240000
-CVE-2021-1335,0,0,1ea7657a6b0455786367145445be726056b927f03a58a5240d254de3aa01fd9d,2024-11-21T05:44:07.367000
-CVE-2021-1336,0,0,89616290715ca0940003f8f651df28cf9c651e765f0b522882a0f011857ddd11,2024-11-21T05:44:07.493000
-CVE-2021-1337,0,0,742ea3edeba28d08e129cd57ed3b43346436d129a2503436fd45226c0b2b8211,2024-11-21T05:44:07.620000
-CVE-2021-1338,0,0,4653cf4b0cbeba4dd4c9bbb661e40b916801f3d48935a336900630012b88fe8d,2024-11-21T05:44:07.760000
-CVE-2021-1339,0,0,856ec8fe2009acbfa8c099ba271be3d154be1bd81f813f5a271fb421df229206,2024-11-21T05:44:07.887000
-CVE-2021-1340,0,0,3440043232d2c9916b49d53bb381c78ac99719e029f8675a96f0408182b36d2c,2024-11-21T05:44:08.013000
-CVE-2021-1341,0,0,1275aff869c03c498584df753bdf363fec42b7423d74fc748efaa8a5ce543dfc,2024-11-21T05:44:08.140000
-CVE-2021-1342,0,0,c4bf28a797584b0f4e7bc1b6b5a67c219a54274b952b16ee1ec7a30bf1e7eb8a,2024-11-21T05:44:08.267000
-CVE-2021-1343,0,0,c5edd53ffd9661ef9ab988d9d0e70d986356b4954338af4367a01d894175b6ed,2024-11-21T05:44:08.393000
-CVE-2021-1344,0,0,158baba3b05901090213edcf14c5cc5217bc61fbaad3ee73bdfe3b612a89f0b9,2024-11-21T05:44:08.523000
-CVE-2021-1345,0,0,3de9b05684cbfb1f6845481390496b353f1c871a36ef53cef7c3f6d93c1e98d9,2024-11-21T05:44:08.650000
-CVE-2021-1346,0,0,ee1b24ef6b0d6bf882a9f01eea30cd005d7e94440555b39989689a97afe4aff1,2024-11-21T05:44:08.777000
-CVE-2021-1347,0,0,15b67fb1b8ae87d566a3c2f36e4ee32495052d8482b0eed7fd3b4d8b3ad946db,2024-11-21T05:44:08.907000
-CVE-2021-1348,0,0,0e2825ecdf20d439515559a8a9ea086caf928cbf034db10df15acb1ac77da3f8,2024-11-21T05:44:09.050000
-CVE-2021-1349,0,0,2622af0b7a20d9d4feeec0107d575b136bd9a66e87c8fce430974cfae5b7c727,2024-11-21T05:44:09.207000
-CVE-2021-1350,0,0,92d2adf875078d7ace4b9387176084f52698aafff16fc2af4703a29bc0136173,2024-11-21T05:44:09.337000
-CVE-2021-1351,0,0,692720e6dc00c63b4e3d878fab1192027fa36ade7c53f6a17f455504f041c235,2024-11-21T05:44:09.457000
-CVE-2021-1352,0,0,60919c03029986cc3ed25f20e50db9acafa7ea7f284c8e65cbdffe1233e3d896,2024-11-21T05:44:09.593000
-CVE-2021-1353,0,0,001dd3079154d696adc4689685fe6b32abc82830c9e934b5ebb04766d91ae015,2024-11-21T05:44:09.737000
-CVE-2021-1354,0,0,ec2b4ad95b4db150cf69b3c512850c7046e699078b22e60f6337986d9a374e5d,2024-11-21T05:44:09.857000
-CVE-2021-1355,0,0,5b46e49e8ebf3e1aee3f658566f348b3a867950f28801375bb39af9732042bac,2024-11-21T05:44:09.980000
-CVE-2021-1356,0,0,30913ff8bd220e3d7306a25dfde52f160ccc9ef4bcbf9f9f76c3ea7ec0e1beb3,2024-11-21T05:44:10.107000
-CVE-2021-1357,0,0,47b6925f457fb33314ae079745e9d499cb2c87f70ce74aa94a9d8352e2001da2,2024-11-21T05:44:10.233000
-CVE-2021-1358,0,0,05758684372aae4f127663190ac4fd5b6d4a891b8297c515e89950259a7fc4df,2024-11-21T05:44:10.357000
-CVE-2021-1359,0,0,1b60526b41a0a422c9e12c2cb424da6199f2aba3ca13484de63b5ee59173d4d5,2024-11-21T05:44:10.503000
-CVE-2021-1360,0,0,3508336a0f95b5d0367e136fa687a39834a140c61c30691f06272039abe46d13,2024-11-21T05:44:10.660000
-CVE-2021-1361,0,0,9f7e7c6ffdba2aad29c10efbaa2d6b2fd3b4f502abbbf574b062c9ab3c13bfb1,2024-11-21T05:44:10.800000
-CVE-2021-1362,0,0,f45333b44a6be994002c17cc3712db167c0e53c2a80431840aff140109eac74e,2024-11-21T05:44:10.950000
-CVE-2021-1363,0,0,f1f9f2704113f16df7bf2b93b069881e34e5275babdc08f39b830ebcb73cf244,2024-11-21T05:44:11.093000
-CVE-2021-1364,0,0,14b7703a5e845fe7f5c38bce756661241fa29a50cd5125b3dc1040748dfab48d,2024-11-21T05:44:11.220000
-CVE-2021-1365,0,0,26fc3204ae72af2dc4a62c128dd5dfe8fe51de5a51751457e0e0287b1d649559,2024-11-21T05:44:11.357000
-CVE-2021-1366,0,0,9d770e59aba594ffa257022f8f045700fe99b7fedc4aa8850edd83e368949bc5,2024-11-21T05:44:11.470000
-CVE-2021-1367,0,0,5d8007aee890806665fd3e8a5e1e541c3dd0ae15019affaa954bee79fcb2aea2,2024-11-21T05:44:11.587000
-CVE-2021-1368,0,0,4891edff2ebaa9c1fd5ebbc9a043f45b9b7bb2ee5c1beb97cc2a8e99df8e146d,2024-11-21T05:44:11.723000
-CVE-2021-1369,0,0,16e1e73eac261afa281d82ea84282fbf3fd8111f9a564790ac8f2298386bc214,2024-11-21T05:44:11.867000
-CVE-2021-1370,0,0,adc90fc3dd9b47d09908dc99dbaa799be0dad23ee286897665fd41598170b6d2,2024-11-21T05:44:11.983000
-CVE-2021-1371,0,0,4ec6d5039f15450cf783976485cc2c67c598bf53a9d3a35f953dfd6669d36af7,2024-11-21T05:44:12.110000
-CVE-2021-1372,0,0,51f55e88d47bfbd22b3e5d65672e0baf58c19eb78e1444481a5edbeca27a334b,2024-11-21T05:44:12.240000
-CVE-2021-1373,0,0,c2c4d68bb25d9289bc27f620efe1ec5d38609a5aa06c2229bd97b670eaf0d571,2024-11-21T05:44:12.353000
-CVE-2021-1374,0,0,5818edc51027c249f2eb347e45f2b6cd1a13276fa3ba675176a38ef4600af068,2024-11-21T05:44:12.487000
-CVE-2021-1375,0,0,100eddd49a4ff942c30a9a5fbe950e88507e4b496aa8c6e900f2c7c4576cdf1d,2024-11-21T05:44:12.623000
-CVE-2021-1376,0,0,802aee0b4d09f6825236afcc53928a821dae6500c1d00cb9bf6f196e9ac7a787,2024-11-21T05:44:12.747000
-CVE-2021-1377,0,0,5e03ab7610971044240eb911036a30e248b278f557cefe0bf7f943cf850d488e,2024-11-21T05:44:12.877000
-CVE-2021-1378,0,0,4e49a37c1d71befc0f7e6b79a80f675a0e5bbfb065a139d96af5097485807f39,2024-11-21T05:44:13.047000
-CVE-2021-1379,0,0,21d1716db41e00b7f972ab47916e802e4d61fdb0faf20ad9c940ad5ee43c2d06,2024-11-18T17:11:17.393000
-CVE-2021-1380,0,0,f85dacddc8bb7738b7b814f6d92787e7c5ab471f1e41fd191fa80cdac2bd5bcf,2024-11-21T05:44:13.247000
-CVE-2021-1381,0,0,a0e2279e7f9ffee69c7e1f3b2ffaf54f3ecff6efef9d067095c765e0f1aec7dc,2024-11-21T05:44:13.377000
-CVE-2021-1382,0,0,b3a6e0c46ac764973ce1014bda5501afe6ea495f60b9f40f3011c6645028096e,2024-11-21T05:44:13.500000
-CVE-2021-1383,0,0,00e9499cf6edd738dba1a32d7524de5a6ad79a981fe94a0fd281c39b18191574,2024-11-21T05:44:13.630000
-CVE-2021-1384,0,0,0c42c3321f349a29f4867d2baf604fbcc779b82c89c844e556bbac080030f9c6,2024-11-21T05:44:13.780000
-CVE-2021-1385,0,0,0bfe773f87418ff2bc2e19742c8d47927723c618882252909a3126833d9032c6,2024-11-21T05:44:13.917000
-CVE-2021-1386,0,0,7c79ee3c398bf3ed55ea45507faeec706bd5988c4001aefe641369bc1a3408ce,2024-11-21T05:44:14.060000
-CVE-2021-1387,0,0,ee8a1d9cd04518364f50b42eb5fc196fbe04d0f456691c3cb6db0086a8c37e34,2024-11-21T05:44:14.203000
-CVE-2021-1388,0,0,ce34b1937dcdc42c5d67c9a1c68e8f34fc924b4e27238b02f9755858e51345f8,2024-11-21T05:44:14.400000
-CVE-2021-1389,0,0,93a136bdef3eb902296ac7a1559bd4f906b8e8fe8cc7bcb5c387287587c7cd5b,2024-11-21T05:44:14.533000
-CVE-2021-1390,0,0,8a3934cb6367a0a53a3f81749f84af72ae51c9f828f4412f3ba28237e5e4e12a,2024-11-21T05:44:14.663000
-CVE-2021-1391,0,0,75bc80816a087ecb1fc54bbd9add28389cd9268ea8648597a03cb76430e73b74,2024-11-21T05:44:14.797000
-CVE-2021-1392,0,0,6406922a1d57233bd6312e6714ee91e482a97fa9d33f99295e1f4c197bbfb21e,2024-11-21T05:44:14.933000
-CVE-2021-1393,0,0,681e574c1f9849d5e486a71a26fd0b6f81b79686e0216b9064b2e9aead12e3f4,2024-11-21T05:44:15.090000
-CVE-2021-1394,0,0,a2c188e4c1c3cc984b8ae06f6cd8571c127ff9f4a4aff450b43f54249a7d27f5,2024-11-21T05:44:15.220000
-CVE-2021-1395,0,0,5faca997e872901570aee9982e3cbb6eb72ce5f12fddd53c9a2f03b57ea9ec73,2024-11-21T05:44:15.360000
-CVE-2021-1396,0,0,a49939c2bbb797c7c9c6409eae39446fad530c6c17adc7ab927f13c7d602f0ba,2024-11-21T05:44:15.490000
-CVE-2021-1397,0,0,2bd0f66290677f95664431295557cf35c0bf751e9ec09a1ebe40e0d41de6017b,2024-11-21T05:44:15.633000
-CVE-2021-1398,0,0,b9c491db0967c26337edec7cbb0a9a9cbb2e2d4418117aa886b973b84053379a,2024-11-21T05:44:15.817000
-CVE-2021-1399,0,0,446dc7a186efc1a593ed86a4e9e3c1a2d6e447ddcb72427dee91e5de3e96befd,2024-11-21T05:44:15.987000
-CVE-2021-1400,0,0,55af5910527a4b1d4a138bb27033edd4f09070dc6f4eaabce9018499cc57ac49,2024-11-21T05:44:16.120000
-CVE-2021-1401,0,0,c813ab31fb1f429f74828bb7484da434aeccf84e90948a84aa09b5052b653492,2024-11-21T05:44:16.263000
-CVE-2021-1402,0,0,db8dc1919fb23ac9fb423cee1491d6c2900dee5e2e532a272d4c17f17edf401f,2024-11-21T05:44:16.410000
-CVE-2021-1403,0,0,1e9e0075e3c271bfcece5388839e97757952e6e07a1b632ea88b7c64ebe0e38f,2024-11-21T05:44:16.550000
-CVE-2021-1404,0,0,f6f18657e8f6ae877b9771e6b7cbd0554457795fb29abda35846f3b423b1abbb,2024-11-21T05:44:16.710000
-CVE-2021-1405,0,0,8cdf5103ffcbc32c8a45d0ef3143f61b0a264ec231bb33759cd4160f3ada324f,2024-11-21T05:44:16.853000
-CVE-2021-1406,0,0,5aa049e66cf18b6d9e970bbc107e9a126051d9381816535f60a7c05083115490,2024-11-21T05:44:16.997000
-CVE-2021-1407,0,0,ce3b48b8b691efcf5f96b2af3b2b09780c9ad98f8cb761469143e31b65cefbbb,2024-11-21T05:44:17.157000
-CVE-2021-1408,0,0,57230344f7728e6a64679f078d5172e082ae61d42bd983756fa9bfe8dbc7906f,2024-11-21T05:44:17.287000
-CVE-2021-1409,0,0,6e81b03d6f892410e0cc831fe354d0f15a1e6d0ff5921e90b23f0c421839348b,2024-11-21T05:44:17.407000
-CVE-2021-1410,0,0,310cf932b88aec132124622adb182811a6b27e4091d84331011ef8c47973ac51,2024-11-18T17:11:17.393000
-CVE-2021-1411,0,0,906fdad35cad9f211d1c9c9466479cc9ea40da0020f9492e90b42ccab0593489,2024-11-21T05:44:17.583000
-CVE-2021-1412,0,0,c680b25a9984dcfa5cd5a26e4a81937c94507a3cb9d4abd2784ab9d4426d0dfb,2024-11-21T05:44:17.707000
-CVE-2021-1413,0,0,b20db4887d5b69f973cb799d333426f29161c5a2a89cef6f0108eb2b07ba8656,2024-11-21T05:44:17.840000
-CVE-2021-1414,0,0,0d6e77290b9645d33d1c23d5643bc4b725b4981b74ed58e1ce5732c7014366e7,2024-11-21T05:44:18.567000
-CVE-2021-1415,0,0,1c0b7677ae0005de6c045fc6149e9ceac9a047f4bcbc4e1fa874e9b1bbc1b934,2024-11-21T05:44:18.690000
-CVE-2021-1416,0,0,fba3cad191a42ace09ffc534c9a9fa3f9b8d538106b95f28286396d874055558,2024-11-21T05:44:18.817000
-CVE-2021-1417,0,0,e6821a23064da93a3ddeea453c019aa5f191dfb343ab96afdcd0469b342d2c80,2024-11-21T05:44:18.937000
-CVE-2021-1418,0,0,1a67bd352a0d0d61d7b175af89a86c05958f1909f251b84085166ca9b808700d,2024-11-21T05:44:19.057000
-CVE-2021-1419,0,0,81454647e86e00e55970424cd15da1559529cd63839d26c5a79ec173cd14f3af,2024-11-21T05:44:19.193000
-CVE-2021-1420,0,0,e7dd963f39087ad1f764df2dc76d9bbecbf6927ac18213cc1bb7ebeb4c69b0c3,2024-11-21T05:44:19.410000
-CVE-2021-1421,0,0,322f6537c22fd4a6a230c9865ff84f633f540aad294ea12bf3b1e23aae77c2e2,2024-11-21T05:44:19.547000
-CVE-2021-1422,0,0,a98f78bf1caf3bd28146699342a548944ddb3cedb3a85c7ba0886a61b43ea2b2,2024-11-21T05:44:19.693000
-CVE-2021-1423,0,0,a2e17bef112296d94fc0d0813b797b097b5a9db32c83a2a42035583bf8298b7b,2024-11-21T05:44:19.837000
-CVE-2021-1424,0,0,c7a55578bc42db019e21dc501f36a487244bc00428a64b32026a07c00f07d09e,2024-11-21T05:44:19.980000
-CVE-2021-1425,0,0,fa99d63f4a613afadad865166b5c231234db2378a0b190ff19c96b25901df292,2024-11-18T17:11:17.393000
-CVE-2021-1426,0,0,976cc589529f07cb0d42e357f9ab1a60047a150d4b47d849cccf917842f76fd2,2024-11-21T05:44:20.260000
-CVE-2021-1427,0,0,0182410b1593ac064f54d4caf7fec487ecb50f9aeae6e0a64ebb2ea77bff4429,2024-11-21T05:44:20.373000
-CVE-2021-1428,0,0,9dd93a19d979304cd30642ca2a9e41730cb04e7bd3dee5586fb7c6ef5f01e769,2024-11-21T05:44:20.490000
-CVE-2021-1429,0,0,3d38891bfc87e31a7b79099bddd0de4af8e25aac8ed3cbc2c8f10b91cda6224c,2024-11-21T05:44:20.610000
-CVE-2021-1430,0,0,f591dcd419870ab6bf81a690ff0a8259bbca066446fb59e33997f925ee920d38,2024-11-21T05:44:20.760000
-CVE-2021-1431,0,0,2f1bc744961d1a2588d9c4967093a9209fba2eebb8934835c18b54f06c305c40,2024-11-21T05:44:20.893000
-CVE-2021-1432,0,0,5d81e519849b1f3f7fa6cc2d0069fe0e177719a2f5dbd6270ed85e70cff73094,2024-11-21T05:44:21.037000
-CVE-2021-1433,0,0,733d051d37c1693e75513f49ff6165bd6a0faa47bc09c1acd55302d50ca03f82,2024-11-21T05:44:21.170000
-CVE-2021-1434,0,0,69e110fbb97748a005e0d1e5234c51590de1d596855ae24c13031060672d0cbd,2024-11-21T05:44:21.310000
-CVE-2021-1435,0,0,a6146a93e74d15528439ff85e09eab7b4dd774f1d6e1ec5618a6166ea1651e71,2024-11-21T05:44:21.453000
-CVE-2021-1436,0,0,91ffb8f88ae6e4c7d13b0e8be9e0c8a5a6a2a58190eef3224f30eda78bea5fd4,2024-11-21T05:44:21.590000
-CVE-2021-1437,0,0,0fc4efdb4004b133844670eadfd82bbe08655c65584db2696b8a81c26207e5c0,2024-11-21T05:44:21.730000
-CVE-2021-1438,0,0,5acca5a16ab23dd161beb29dfe4e8a52ddffd15af19f749ce9d77b492caf831d,2024-11-21T05:44:21.870000
-CVE-2021-1439,0,0,655903c4468d29d67defb20ad59d2111a617389eac43cc1af52858bdd2c6d92f,2024-11-21T05:44:22.010000
-CVE-2021-1440,0,0,eef1cec179d72e13e58277dda2c9596f4ca098b05306373852ae4f9367a680fa,2024-11-21T05:44:22.147000
-CVE-2021-1441,0,0,1fb6448bb7cd8946bb7c86abeac41fa8db5aa157e5ae396db0a9a065aa626fbc,2024-11-21T05:44:22.270000
-CVE-2021-1442,0,0,2295ab4942cb46c70f235a8a7579965fb17e820254d7d11d4948a54d7bfd070b,2024-11-21T05:44:22.433000
-CVE-2021-1443,0,0,ed0dbf42227db5dc1936984f0375b5bb3e04d2df5a9350f93e72314b718c37c2,2024-11-21T05:44:22.597000
-CVE-2021-1444,0,0,36e2f49c86b088df158a80d1669b58c32ce16c5155218a46b92bdece37978ee0,2024-11-18T17:11:17.393000
-CVE-2021-1445,0,0,f5e897a06b6f8c79af0d68d5a0033a0eb7169437fd70faa94fca46daa8bceec8,2024-11-21T05:44:22.823000
-CVE-2021-1446,0,0,c8ea1b258d1567a295536827a9793c4d4b81c782500d93372621a65b98717620,2024-11-21T05:44:22.957000
-CVE-2021-1447,0,0,549779259c216ca6033a7d5aef109f5b2da8b56071491a71eb9759a9e225b977,2024-11-21T05:44:23.117000
-CVE-2021-1448,0,0,416560c62295d8d0cd9e1a17d090c13aefdec94c390fa0ef7eaebda4819124ef,2024-11-21T05:44:23.240000
-CVE-2021-1449,0,0,7a4be8684224f150889455b3d3b319209e31dad5c82c7e80979830f9020150f0,2024-11-21T05:44:23.367000
-CVE-2021-1450,0,0,b6bef547fa14d4541c0aa6bd466aabdd92b3b555bd4aa541779a5392cd247e91,2024-11-21T05:44:23.497000
-CVE-2021-1451,0,0,31670a2b954a92703492a19ff140b9e76330bab579cbe824ccead76c2b02fee2,2024-11-21T05:44:23.623000
-CVE-2021-1452,0,0,48152ac2fd3514b01b7e8346edf6f51d951a491f92f67815e1ac35741bc662ad,2024-11-21T05:44:23.770000
-CVE-2021-1453,0,0,3e885b0293e67991045347b5cb0e7f8f2e4414777f299bd6bfcf66182307f33f,2024-11-21T05:44:23.893000
-CVE-2021-1454,0,0,bc44ccfedf5587debbe99888edd5ac2fe70c01c7f16d3afb8adbf6aa56c03001,2024-11-21T05:44:24.023000
-CVE-2021-1455,0,0,a1f8acd72c3790887591f89724fe68cb20db199eb7707d1f99785d01bef03781,2024-11-26T16:09:02.407000
-CVE-2021-1456,0,0,3acaf66a5529bb920efc2d6eb201038f812700de1b1c59a1786d85422df39ccc,2024-11-26T16:09:02.407000
-CVE-2021-1457,0,0,48d923c947b404bb00348ac48a57152924cd04997cfbeecae775d2577db7fc81,2024-11-26T16:09:02.407000
-CVE-2021-1458,0,0,32f9028050814c852fc4fe9e033c3286fb184a08fe44e3b8b8459b7eb4aa9980,2024-11-26T16:09:02.407000
-CVE-2021-1459,0,0,3d6547ed3d71fd027bbfb23dcc2f747d12a6e020e8ce14c7f2802fe9721bcdb5,2024-11-21T05:44:24.603000
-CVE-2021-1460,0,0,22e1d485c6c5e4f1b6c86f382dea1d3de5d2d6204e38941c3e05771d140c8e5c,2024-11-21T05:44:24.730000
-CVE-2021-1461,0,0,020acd0c8295d4b742608ccfd03e6352fc631b937513fc400e744a4262481489,2024-11-21T05:44:24.867000
-CVE-2021-1462,0,0,a3176106844cfeca56a41ac75ddfa8624fff2fbdef109905c52a11235dc8b966,2024-11-18T17:11:17.393000
-CVE-2021-1463,0,0,ad880bc76bdb8edf665985f27090d7e90166d83a2a1cfd78a6d9b7c96910b89f,2024-11-21T05:44:25.047000
-CVE-2021-1464,0,0,dec369cafd84b7875a572d0cf932a19328f5b782dc260c64e02cb1aa77703424,2024-11-18T17:11:56.587000
-CVE-2021-1465,0,0,2b9f885535d522eec334e13d3b4661e4c8b0c31ff5a27e6de72b55186f00ec30,2024-11-18T17:11:17.393000
-CVE-2021-1466,0,0,6ec4ca8252e380bf807fdcabeca3556516482037c84904f168e054e5de6350a4,2024-11-18T17:11:56.587000
-CVE-2021-1467,0,0,1f310547fc14191c96f01cdc409a3e906e511781f29cafe1a64fdb5ebea799f1,2024-11-21T05:44:25.383000
-CVE-2021-1468,0,0,79076b1dbc610809f6b7768f73557ce6cdc30637cb725d5ed589b945350e04b0,2024-11-21T05:44:25.520000
-CVE-2021-1469,0,0,a422406a4f8ffe6a155b348109d39db3daacfd4e9a64ce4ac7da3859318a6b14,2024-11-21T05:44:25.653000
-CVE-2021-1470,0,0,eb8331fcb16971c33f8046f9cd8ffa1ab036094186a3d9f5a9fde2a9d79b1e32,2024-11-18T17:11:56.587000
-CVE-2021-1471,0,0,e0594433adfb4ef9f434de7abfcea38e86d16c7bef2ca5738c33c6a488cb0277,2024-11-21T05:44:25.900000
-CVE-2021-1472,0,0,c4a06ff9221e9bac89be5ddebf99b26d28cfa376dfdaf00c0a1b9b6de031aca0,2024-11-21T05:44:26.040000
-CVE-2021-1473,0,0,07ffc05aedd9bc522016a2e3c7723ce4ed0d4314d4b8031e8f7a78dc0c2b1a2b,2024-11-21T05:44:26.183000
-CVE-2021-1474,0,0,daf0c55c9028419908f926460dafe5f13b1e04d3d3cfb77e8d1da1c27a407e91,2024-11-21T05:44:26.340000
-CVE-2021-1475,0,0,acd74450e0a0ff17d4c3cb5bab6329d6364bd73d83312381760931225a5bfc38,2024-11-21T05:44:26.473000
-CVE-2021-1476,0,0,ff3a454af2df18496b6c871bdb93737fab391a1c8604527957454c27aac00ead,2024-11-21T05:44:26.607000
-CVE-2021-1477,0,0,ee42fe315030c022c7a4b010a4a8200aa5038d27c12414c01e74add38944df17,2024-11-26T16:09:02.407000
-CVE-2021-1478,0,0,79731d0309b4cc44f673ee0e3e7d0efa686d5f7d16f036b25bf432c048b6d8d9,2024-11-21T05:44:26.880000
-CVE-2021-1479,0,0,dc3586d8da262b35139b1dee18d87eef56535a439f6c8d3763a1cc9320ffe3ff,2024-11-21T05:44:27.010000
-CVE-2021-1480,0,0,ce322d63ee57e88f2635459b2fea5c1de11c38e6a06eafa15659a8d20ad57de7,2024-11-21T05:44:27.147000
-CVE-2021-1481,0,0,7e630d6574ff33ac491df73494eaf2e0f6a269e528c48598540c5b5d1a03d015,2024-11-18T17:11:56.587000
-CVE-2021-1482,0,0,09a74e65dfa26db7ae50a33ea9c67b43dcd7cf7389820903f5390d6cef9e93f1,2024-11-18T17:11:56.587000
-CVE-2021-1483,0,0,de4085a6e73507223b4aeea7d36044559521e784b8f0f4400911c2064b701204,2024-11-18T17:11:56.587000
-CVE-2021-1484,0,0,6650037fc634fde2d0308c0ebe65528eb7b30e0766fda2ccd0d0dcb7a66cfece,2024-11-18T17:11:56.587000
-CVE-2021-1485,0,0,4e1861b0ae48256c2647468867263fc3fbdbe8b7855fd14e0b2921c5c458f691,2024-11-21T05:44:27.663000
-CVE-2021-1486,0,0,43b894b99ff254e45e80fc98ce66233413f84febc5ecaa9d3f7f8214df771306,2024-11-21T05:44:27.800000
-CVE-2021-1487,0,0,b27f22fe4663aac08aff0d8efffd2c855e96508150661eb950d8f9923631b7cf,2024-11-21T05:44:27.920000
-CVE-2021-1488,0,0,4c97698452df7be9948ec5a2158bab3ee1296945a2c37515ea1fad618f526c30,2024-11-21T05:44:28.050000
-CVE-2021-1489,0,0,386c09b72a171a78d81881bb21a75b2cd678fd602da5970fdc2c85ef0392b18a,2024-11-21T05:44:28.167000
-CVE-2021-1490,0,0,88aad6d3fc4b580b128d5d6d6fb38c9b80fa084a6cf2f8d896fb22067953f522,2024-11-21T05:44:28.290000
-CVE-2021-1491,0,0,73b8ecfa3fe687de57cc6006f20bc98dd9c7b8fed50b3fe37bbd312b54523a59,2024-11-18T17:11:56.587000
-CVE-2021-1492,0,0,8cd26477e2bb53ae2096b050b2de7bd2009d8a5f9a67d0768bf46f94d88f8f4d,2024-11-21T05:44:28.467000
-CVE-2021-1493,0,0,8d1c022ebf608b6d284568d0d0d80991b21f4c039d55b3ab066dd6f1e2d57bd3,2024-11-21T05:44:28.583000
-CVE-2021-1494,0,0,5fedef74e4ee09cecf66d8b06c1b4d3c40388791b1d136cfd49e2e6864f6c53d,2024-11-18T17:11:56.587000
-CVE-2021-1495,0,0,e4380a2d04a9d354fca605a899f44423c1e3fe5cc6164711509a523a8a2c7c11,2024-11-21T05:44:28.830000
-CVE-2021-1496,0,0,171a94fa79e94a40eb4fccb6ff661f2a640f67b35b1c9132289a142014b537bf,2024-11-21T05:44:28.950000
-CVE-2021-1497,0,0,4ff07173d8eb894841c8a0419fe5f68b804c7a5206cf3a58f3a6599bd280bb23,2024-11-21T05:44:29.070000
-CVE-2021-1498,0,0,aae26f28c680a97d1b7904e1260e2e928bcc59953a404a41a77f3c8ad7dfca3d,2024-11-21T05:44:29.210000
-CVE-2021-1499,0,0,042b06a863bcb8675a20e3945fff2ed54ccba2b645deeb5725dcec6ccb006f81,2024-11-21T05:44:29.350000
-CVE-2021-1500,0,0,169b0739ed1eccd641f56a843549a01dbccf1f0765b4d5216d1730f5f24826f5,2024-11-21T05:44:29.503000
-CVE-2021-1501,0,0,57c0cd364542d1cb84ec86be82469d37d0dd148414d8a85b7a1b39c94fbd4275,2024-11-21T05:44:29.640000
-CVE-2021-1502,0,0,161b490e1af36cf7d0a720e261c44405bcdaf16f0579a7db55b6df159fc4ff61,2024-11-21T05:44:29.780000
-CVE-2021-1503,0,0,fce0635ee0acc4815639504845d8355a87c57edff404ec7652ac3aea2dcf783f,2024-11-21T05:44:29.907000
-CVE-2021-1504,0,0,eb95a4494a0e5c27c6a2f8375831d1169192308c758a3ffb3a2f9dd4804699be,2024-11-21T05:44:30.027000
-CVE-2021-1505,0,0,c75061f811736691891ed0f664d67fc001170625569664ad4a1581c1ac29396e,2024-11-21T05:44:30.143000
-CVE-2021-1506,0,0,c5d7e8f2e53dc96be16b1d99ec46d684bdf2cbd14168c0be26bddb3aba8279d2,2024-11-21T05:44:30.267000
-CVE-2021-1507,0,0,47e979b374cbe05f18dd5f128df33af796ce497146a69910e81ab748049f0cdf,2024-11-21T05:44:30.383000
-CVE-2021-1508,0,0,df607be0e7f53aa3373e95ebbabcfc611314ba187e8f9d7132a408d503bf9de1,2024-11-21T05:44:30.507000
-CVE-2021-1509,0,0,81b7f3e5b058d6772ce0233460846d57976c135db5d1cd8eeb4cf9149e38d3db,2024-11-21T05:44:30.627000
-CVE-2021-1510,0,0,4446395707bd5039be12f866c2be9166a708a5c0b948c1a10dd9697e56fea4e3,2024-11-21T05:44:30.783000
-CVE-2021-1511,0,0,49f018950d9bb40ab5b6e2ad5b623d81bd053216c76941222277c95a6e51f4e7,2024-11-21T05:44:30.937000
-CVE-2021-1512,0,0,c5b06924e90266c100ebd3fe169ebae2f8bb0f97db0e8668e13cb2695bc9a304,2024-11-21T05:44:31.073000
-CVE-2021-1513,0,0,50acff0b8b03ce44d2f6791c665838ab963dbebb1c8f709a2b9a9042aa4f2eb4,2024-11-21T05:44:31.207000
-CVE-2021-1514,0,0,15276e0d5c5ac0867d2dbb11184be5e796fb55a4951a89a0cf33b9532133d71b,2024-11-21T05:44:31.353000
-CVE-2021-1515,0,0,d9b5c571ad1a9ad94f666b2ea13767e5c170e2f196f899bcda77d3cca4dbdf67,2024-11-21T05:44:31.510000
-CVE-2021-1516,0,0,a513494c1384c78cb44ddbf6e085ddeaef5128b5cf04bbf75705034c029f9660,2024-11-21T05:44:31.637000
-CVE-2021-1517,0,0,ff6c1d517122025e997486a286c0b6c74d5421c21a27dc61c30356cd65577d18,2024-11-21T05:44:31.767000
-CVE-2021-1518,0,0,52702993f1103bcd42b20b895297e9c20fe5220467493d5895bf331dc00a74f8,2024-11-21T05:44:31.900000
-CVE-2021-1519,0,0,ea7fce92c0ec82b7338d6da9c087157f31f93326148bfb7ce074d78b9ef8d07c,2024-11-21T05:44:32.030000
-CVE-2021-1520,0,0,9beab3e6917cb3a2127cabfb321f436ce82a850434c954e8587e77d60ffb4138,2024-11-21T05:44:32.147000
-CVE-2021-1521,0,0,33848677ab2fe4d5268b0b5c92ce4c9a67cc57098e2ed19cab82d2bc631e795f,2024-11-21T05:44:32.287000
-CVE-2021-1522,0,0,372cd3fed417c688211a157282ad1bc264784ee3fa63b8f2f568fd5bb609817b,2024-11-21T05:44:32.447000
-CVE-2021-1523,0,0,f795d5505f563f7d7bce09b4938ddf29645ea7ba3b8df89a31dd6d2d8cbc0a9b,2024-11-21T05:44:32.577000
-CVE-2021-1524,0,0,238f8eeeb9ba68f441716c0ed988d3add0ec1e4193530e0faa96511010ea1016,2024-11-21T05:44:32.730000
-CVE-2021-1525,0,0,d8e791b1829ee00d8974ce761bb5766ba72012052155817f8608206384198706,2024-11-21T05:44:32.863000
-CVE-2021-1526,0,0,9df12baa54da7f540669f03a6c1b16d6c30810014351a57480cd8b7071bdeb8b,2024-11-21T05:44:32.997000
-CVE-2021-1527,0,0,b80ce3d16c8ab799c56a54ba2343b1a6235c9f62658b7785d3667d8791030a68,2024-11-21T05:44:33.143000
-CVE-2021-1528,0,0,5e52544f7bacb4d52e1d16a418358a98341a99c6e1a949bdd53147205fd63cce,2024-11-21T05:44:33.277000
-CVE-2021-1529,0,0,3caddf2d49013242f4373eefedd853fa87534cb9d629aa20ee6bc3d7e5c583e4,2024-11-21T05:44:33.437000
-CVE-2021-1530,0,0,6dde2c923bd0ed3e3f0972ee5516ae7d0e6e19146ad2891e0795e12ec33eae20,2024-11-21T05:44:33.597000
-CVE-2021-1531,0,0,13a9ae9d05d57312bb474de585e5ed225248638e2d0f9d1e3b7ac4e9fcadb84e,2024-11-21T05:44:33.730000
-CVE-2021-1532,0,0,a80a47c91580b0d0e8d15003642e803e9d4754e923423200951fc62d4490ba44,2024-11-21T05:44:33.877000
-CVE-2021-1534,0,0,73e22fff2de3440aea988911a2fbb3eb3c3ff564b3ceec753233a0312952a229,2024-11-21T05:44:34.010000
-CVE-2021-1535,0,0,ec3eb6c21eb61458e3676952ed030b9e9a7bf6071a73d0dd58463b24dcf6e708,2024-11-21T05:44:34.160000
-CVE-2021-1536,0,0,f0699a4b662ef030d29642d443a88e014bbfdb2643003b4b0ebabc7c4d7e6a00,2024-11-21T05:44:34.297000
-CVE-2021-1537,0,0,58dfca24e0eccb05971046d4566d14f08b34f3879bf00c59da66a2fb727574be,2024-11-21T05:44:34.423000
-CVE-2021-1538,0,0,3966affc182cd9b6298b0645dcb3b293df4dd19204dbb14d37aed83cdbef095a,2024-11-21T05:44:34.560000
-CVE-2021-1539,0,0,74e42d202c90eaaacf129ef8234b091082f91082473abc097463d68e9ffdd109,2024-11-21T05:44:34.693000
-CVE-2021-1540,0,0,aca53be6d14c756daf5443ece41d1b3f80562052ee13ade080a7164ff77e7bf8,2024-11-21T05:44:34.820000
-CVE-2021-1541,0,0,2fb9104959608985e557408f144c4659e11bb7bbeeec6282d04c61966a87307e,2024-11-21T05:44:34.950000
-CVE-2021-1542,0,0,44206228ebeac0f5a4a95a93378c15d8c4474ebb92c44f5ebf38d1b71370ea73,2024-11-21T05:44:35.087000
-CVE-2021-1543,0,0,d2d5155e8649a8c8e43923407bceaa442d877507337b8b4d08ac178e6725534e,2024-11-21T05:44:35.237000
-CVE-2021-1544,0,0,4ac016beebc0f83622b760183e7744ba26b3420e0ef9cb65962cfa3065744193,2024-11-21T05:44:35.397000
-CVE-2021-1546,0,0,befe1d9946b4c15f1b17d79028840a49f6bb75bdc8819ac52e53706e4adf4e72,2024-11-21T05:44:35.523000
-CVE-2021-1547,0,0,b31c967b21f34ff3f6abd9ea935c7948e2a33d8809ff858129d90c0d298b572d,2024-11-21T05:44:35.670000
-CVE-2021-1548,0,0,2585adb43c38fd53e9f8b19c10e96e4f2600be18cc74038e9d30d5a13cf55020,2024-11-21T05:44:35.817000
-CVE-2021-1549,0,0,7b25a5244b9e164f8a21c22c01960848b8f5ec690ab0c81b74202fcf82cc8a6d,2024-11-21T05:44:35.967000
-CVE-2021-1550,0,0,1df745fa99204c15d9a05d029053286a29a55aba30147e9052636b5dc96ba68a,2024-11-21T05:44:36.127000
-CVE-2021-1551,0,0,c9ef339556806c820c64dd76d4442c2ab28991154a2811eb48f95ede8cc280a7,2024-11-21T05:44:36.267000
-CVE-2021-1552,0,0,ebb52691747cd7e61eb5ea4216d9d709ed700b2aca7b25ace1218430a6887254,2024-11-21T05:44:36.410000
-CVE-2021-1553,0,0,2d88c49a9e6cca95aa8ad91a04f0a96348ea2b11498cef4eaae8d14341fe89d2,2024-11-21T05:44:36.563000
-CVE-2021-1554,0,0,7d30c0584c0de2df1bdc8b05cfe48bee0d52f04ccdaee18a241ab12e8481a74f,2024-11-21T05:44:36.707000
-CVE-2021-1555,0,0,bdb926bf0d8174389a32e3fe79594954842ca608e89230054e959713f5cd7c49,2024-11-21T05:44:36.857000
-CVE-2021-1557,0,0,44ef4079b0aa0b6282bf88683acac8bd7ef18aa5957df841894bbe35867e8cb1,2024-11-21T05:44:37.003000
-CVE-2021-1558,0,0,6aef1251362d241936f3a83a4418b38ec2a1d6cec2a011bc08ff0b328ccbd5f5,2024-11-21T05:44:37.147000
-CVE-2021-1559,0,0,efaa2556faa4b4d62f0ce7c69b30d52afb0d8b6aaab03079c78dd3dd7b693281,2024-11-21T05:44:37.280000
-CVE-2021-1560,0,0,59f315650a641a4edfbffb5d01a4cd20f939b1955dd8bbdb2a2569c504830645,2024-11-21T05:44:37.410000
-CVE-2021-1561,0,0,637228cf816b63aea182b8e712a32ed8b2f0c850adc9dc859c55c7c66860d1e3,2024-11-21T05:44:37.543000
-CVE-2021-1562,0,0,23b669f3fa1d41d452baa3146db5ac2b0e036e83a0c827be97593e209db57ada,2024-11-21T05:44:37.687000
-CVE-2021-1563,0,0,16c21e2115422c1956c8ea1b6edc06752d86c42bcb6de354588bb5433fc6006a,2024-11-21T05:44:37.820000
-CVE-2021-1564,0,0,75b9ffadddeb20d896d967bf4e96bd3a8c2f30dfce3a47bc4cac2af94ae2fef4,2024-11-21T05:44:37.953000
-CVE-2021-1565,0,0,b2d2e16f4eae2b285e6d0723dd4032db4b960bf354e31e2fd944fc1f25312d65,2024-11-21T05:44:38.083000
-CVE-2021-1566,0,0,aad91c5ac351f285036e78aa892db5e71f01773ee30e2f40a376ff19182f109a,2024-11-21T05:44:38.237000
-CVE-2021-1567,0,0,e4fc14915107e5bb3c00f0b0ebba0dcf7628e76bb06b222eb5da57cbab4a100d,2024-11-21T05:44:38.390000
-CVE-2021-1568,0,0,81b9f7541c5295ed946faa2d9c3da0f2683c157d08aff393f86573be44e63e8f,2024-11-21T05:44:38.517000
-CVE-2021-1569,0,0,e1bf728ac9d516f14574ad3054866f3c495ba0d05ef8965ccb7de18f9cc40110,2024-11-21T05:44:38.637000
-CVE-2021-1570,0,0,1adb0216aab9911631396b04ae7f5fad1850d4d75aaa31b8c02dd19f9c415bb2,2024-11-21T05:44:38.757000
-CVE-2021-1571,0,0,be2cccd5fc36b3117f07b85b2031211e01e72aa9b2e2742e8ad5e850a3d1aede,2024-11-21T05:44:38.893000
-CVE-2021-1572,0,0,588fcbacb8cdb25f96db71def22ff0b4ccc59f944ab26bf736db3552dc97c277,2024-11-21T05:44:39.023000
-CVE-2021-1573,0,0,89b714ed73a38fa77e71ec6c986c9bfadbe24a41663a179565b3599f99110b10,2024-11-21T05:44:39.157000
-CVE-2021-1574,0,0,8de2761a4a94f01a93585d08c7896778a1d057489a723f2239d7f14036c4c212,2024-11-21T05:44:39.297000
-CVE-2021-1575,0,0,cef140b09726c1703e7c4cf9d48fd834d9e3e5c522296ec336217dc4e7dbe29e,2024-11-21T05:44:39.423000
-CVE-2021-1576,0,0,feabaff63f449a58c71de2cbaf7d29a5431fce594e7db6e4b3fb0f4a4838ff08,2024-11-21T05:44:39.557000
-CVE-2021-1577,0,0,ae5f1ade4442a5c020de32613b0021e15ccd15f536ef02d4b4c4d5e36e9411c9,2024-11-21T05:44:39.720000
-CVE-2021-1578,0,0,1e72d32d6f4727b259fcb19dd254f7f53f70fa660aa95dc0c6b52d0bbdfd8974,2024-11-21T05:44:39.860000
-CVE-2021-1579,0,0,9c4a2da0684b98dd0159c6d772df245e33bdbfa5159299986582a5903bba10f9,2024-11-21T05:44:39.990000
-CVE-2021-1580,0,0,67e5c0c654180255dbf1b44722ab6e30469bdf759336ca6fe3860e270bed1604,2024-11-21T05:44:40.123000
-CVE-2021-1581,0,0,1ac29ab714cc4944d1ec685c73f16ce4edfd36832796e863527b910236d26ad3,2024-11-21T05:44:40.260000
-CVE-2021-1582,0,0,d6ed9dccb3483656f141d9a38f61d31d4540a4012b32c0c329a2d71805a75804,2024-11-21T05:44:40.390000
-CVE-2021-1583,0,0,ff6c8bf7f1c5ae2b8229399fce73acb4845dd22593e169b7e073e55d7d22444d,2024-11-21T05:44:40.523000
-CVE-2021-1584,0,0,24adcaa4e6493067819aafb00e1b6402a3be99e83fc838fb880274171220ce90,2024-11-21T05:44:40.663000
-CVE-2021-1585,0,0,e03f4f1cc9e520598b6d97286cffaf0ac381f9302dfcb9c57fbe7bf454b3de19,2024-11-21T05:44:40.813000
-CVE-2021-1586,0,0,7707cf15c2a7f59744c83527e5428e27b7ba7e715a1db88800cde8c6a0c4361c,2024-11-21T05:44:40.963000
-CVE-2021-1587,0,0,6211704cfe98c814285c31607ca6e458fbf09d7619b7dd0fc8698b4a072f9704,2024-11-21T05:44:41.113000
-CVE-2021-1588,0,0,1d462e99674d3db256eb7dc82dfcf64d263fcae3beb2d5f5ef91a91e2cb5361a,2024-11-21T05:44:41.290000
-CVE-2021-1589,0,0,cfcff5cbd43c5c31fcafff0757a5839def8620399f49047b830bc8b2f7ab8bfe,2024-11-21T05:44:41.450000
-CVE-2021-1590,0,0,6b6c801acedbbc76d285ad21fd8a286014d7e6e18d44ae50fbffcdd6356a4c29,2024-11-21T05:44:41.597000
-CVE-2021-1591,0,0,5bad505a8c96a68cfe646312bfc28e261530fd42853cb4152541766f008a13a9,2024-11-21T05:44:41.757000
-CVE-2021-1592,0,0,d60e97ae51a05dae15a4d08cd3cd5ae4efa1a66c18757e4ec97c43f26ac636ae,2024-11-21T05:44:41.907000
-CVE-2021-1593,0,0,25844f55153458d2477b092182d3c680b105db86a7c9b024cace6c68fc01e23e,2024-11-21T05:44:42.037000
-CVE-2021-1594,0,0,1cccea8b4e11bb54bea9c2cff0fc7a1993d382b57404d1584e1f24dc8a6e1c12,2024-11-21T05:44:42.170000
-CVE-2021-1595,0,0,751f045f9af23355c56ff0c1f58734eb21bc4e4f512a6ea570a72f9b3116f8ad,2024-11-21T05:44:42.323000
-CVE-2021-1596,0,0,131f4a3ddbd1d86979e4b82a6beb2c332230f42084adb3dfd190abb6df9338f1,2024-11-21T05:44:42.463000
-CVE-2021-1597,0,0,50325818428557f3c015329d95ffb00d4273983303141617ca1c88177308c249,2024-11-21T05:44:42.600000
-CVE-2021-1598,0,0,33ca8fbd6eeaf6a0e834d6f47edde1d8cc94e71848e525919fb669d4a31d6cd8,2024-11-21T05:44:42.737000
-CVE-2021-1599,0,0,1ed59594edf0ab214a919d95221d504eb8f1344972b639521eb7a34aaf690221,2024-11-21T05:44:42.873000
-CVE-2021-1600,0,0,b90133befb7c60fd939e5da5338acc54a3b4294376eaeb7c42c7680dee71e646,2024-11-21T05:44:42.990000
-CVE-2021-1601,0,0,b9b5fa5a1e4663dc1e7c83c88cc3bd83c4a9268733e6d8b9618aa602315df8af,2024-11-21T05:44:43.103000
-CVE-2021-1602,0,0,4a90cd57c37b3aec986402f6fe375d3b819043160492ed82f3cd5619a3530e9f,2024-11-21T05:44:43.223000
-CVE-2021-1603,0,0,43f5ce3c90341d5d49ac3f02001eec14fa81d418d1bfc20d3ebde06f879ff967,2024-11-21T05:44:43.360000
-CVE-2021-1604,0,0,582a2746ff2a0b438a42222da3329790bff6bc2c345425b1191497c63301357b,2024-11-21T05:44:43.490000
-CVE-2021-1605,0,0,de685ac1ab557d582a225ae8bb4a2b96b73e9a423355d2a6c17306a78b5b068f,2024-11-21T05:44:43.623000
-CVE-2021-1606,0,0,cd6b00b417e8ced7f7dc03eb23a805d73226ddb2742e2c15b17a5aaccb8ba59b,2024-11-21T05:44:43.753000
-CVE-2021-1607,0,0,580caa5a82ea1a69a0e42f866aaa84818940079b7b1bce80fe80267f08276e81,2024-11-21T05:44:43.883000
-CVE-2021-1609,0,0,76f0b9d09e75081ea4bca18aef1d8c61332b30b039d52d07b74b92f760d1c91b,2024-11-21T05:44:44.017000
-CVE-2021-1610,0,0,09984ebc876e9286b518deba732c898bf42c992456ce7236e4e09576c69a1d3e,2024-11-21T05:44:44.150000
-CVE-2021-1611,0,0,126f355c4400f97a52e86188bfee72287cccb077c20cdb3f7344e42077bb8408,2024-11-21T05:44:44.283000
-CVE-2021-1612,0,0,013c9347256d211ead0c7cce16bc6be098abe5f33134f04d75e0b25da8ad33fe,2024-11-21T05:44:44.417000
-CVE-2021-1614,0,0,bac99a007f6a87eb1045031468a7966d8e547528639c7d810e7635d7f13a938a,2024-11-21T05:44:44.550000
-CVE-2021-1615,0,0,2c098a0b78c044f0fd5cca2fc3384ef186031f2980afe73bbadacedf59bc8a45,2024-11-21T05:44:44.683000
-CVE-2021-1616,0,0,1c141e7d443aca06bb86a25591871a50a8f76a09b42b21ced4062ec763ba35a2,2024-11-21T05:44:44.827000
-CVE-2021-1617,0,0,ba8900afdbf3ee854bdabfc0e928d29b869749c1f67b3d6cb039ee07ac48a7f0,2024-11-21T05:44:44.957000
-CVE-2021-1618,0,0,676879e3c465ef942f6c60fcf91574fa81961ace040c008d2827645cdc81ea2b,2024-11-21T05:44:45.087000
-CVE-2021-1619,0,0,86a2be591bc3a478d46218dba30ddc8e7e5a77597ee7bcbb5dd1dacbdbbcb168,2024-11-21T05:44:45.213000
-CVE-2021-1620,0,0,24d94ce1dfbe2eb3d9c2e00f12422390dca84c6e3be9a964b1813f05799fd7ab,2024-11-21T05:44:45.400000
-CVE-2021-1621,0,0,7c012a712a1147dd6f2ec6a3b97d898a5734bfb983746eb87c7e265bf34ef064,2024-11-21T05:44:45.667000
-CVE-2021-1622,0,0,6ac41f7c55a8cef7f71b4bcffde4c0d751e615d9c0f371f95b3ccbaa079119dc,2024-11-21T05:44:45.800000
-CVE-2021-1623,0,0,38878875dd6d22befd329772bc456d3b59f994601326e56e8b1e0516de2e62db,2024-11-21T05:44:45.930000
-CVE-2021-1624,0,0,bb0aed4f269012b24fd2facdf8fa23b607985bf920fd49d0bde95c21d1729768,2024-11-21T05:44:46.050000
-CVE-2021-1625,0,0,da0bd342ed262cf192317964c757bc5096556d8590d2da5bb979d28a819f864d,2024-11-21T05:44:46.170000
+CVE-2021-1126,0,1,f695f2c9298903c70375c8a0d4d3c47614a1498bfc33843d28a316b92a769011,2024-11-26T16:09:02.407000
+CVE-2021-1127,0,1,297ad85914f99cc4ba143c680b4ab2445213504edbef3e5e41b270464d94cf54,2024-11-21T05:43:38.920000
+CVE-2021-1128,0,1,de44aae037ebe07ef980f813986bd40e2631f7d49ac251f1823f2f78fda9c9fd,2024-11-21T05:43:39.040000
+CVE-2021-1129,0,1,e2e250346828feb57b124176f7495c93e7217c60d9c7277592d1757c8a750b18,2024-11-21T05:43:39.177000
+CVE-2021-1130,0,1,3379bb39e14e7a9b6268a2132342b5b8ea024d21eb6b531c32716e69bdf27535,2024-11-21T05:43:39.290000
+CVE-2021-1131,0,1,5aaec7399d1bc7ea8bf0208b03b36d69c40405843742b6005baff28febf593ee,2024-11-21T05:43:39.420000
+CVE-2021-1132,0,1,7b464ac803be3f83423773df9da5f54af4dbbd4d81a2ace077a1f7b2bb728cd5,2024-11-18T17:11:17.393000
+CVE-2021-1133,0,1,4e88332eff9ff3f38e44ae8e3049afcfb12089e60398b05d2cee4cdd10b9105d,2024-11-21T05:43:39.700000
+CVE-2021-1134,0,1,ac5b8d1e97008d23775b6c829ad384580ad322cfa71acd8f89de550b880faab0,2024-11-21T05:43:39.847000
+CVE-2021-1135,0,1,b03a29758136a18a0ed645d3aa97eed54cda24f84b2543ac19d1b135e8e750b1,2024-11-21T05:43:39.990000
+CVE-2021-1136,0,1,3dc770ff667fe27882de2acb8bfd612f70927d26a5f8cf8d0cd229666381dd16,2024-11-21T05:43:40.120000
+CVE-2021-1137,0,1,e347b86a9468829b5a1ad2de8a86112bdd7622b9cc0d97553f6daa24c3de0dc1,2024-11-21T05:43:40.260000
+CVE-2021-1138,0,1,d72753503028c8d3fd3d7da7738e5ee7c2926f3cf955227e984871745f961732,2024-11-21T05:43:40.390000
+CVE-2021-1139,0,1,87364bb9841ba3e912a31d4e6bed99f18f82b37e919c3b1e9d400ed6a1a12ed5,2024-11-21T05:43:40.520000
+CVE-2021-1140,0,1,aa180ade931306d4b9206894edc809347ad850821d9b70f89390d6b9ebd3f23d,2024-11-21T05:43:40.650000
+CVE-2021-1141,0,1,628c5d24671d32d5e5a449f245067b44a5d1a78015b3bdf687a411d553509b0c,2024-11-21T05:43:40.783000
+CVE-2021-1142,0,1,14bf52b7c213a70b31239983b1e715f2599f77400e93da9e85dbfbf0ebdf4b3c,2024-11-21T05:43:40.903000
+CVE-2021-1143,0,1,6ffca922ed75a1508712b242902b9f63ecf8f395bc462cfb178287f53f1b300d,2024-11-21T05:43:41.030000
+CVE-2021-1144,0,1,ca04bc3af4ec7023237e94e20bb25346a13d1034582de15fb96da40e67e49af6,2024-11-21T05:43:41.157000
+CVE-2021-1145,0,1,a48c9ddafc5657c165a4ecd7d0bfab236e4885bd4bb7446845ccf4d771a59449,2024-11-21T05:43:41.293000
+CVE-2021-1146,0,1,e079102af558303120ec35bfc2c7d63fd9db89bd2a37f0d86c0b2348ec49e0fe,2024-11-21T05:43:41.413000
+CVE-2021-1147,0,1,0ccb9390557c94a98ded484c2019a6eaa061f6fe7d42251f9e717f5a0248a015,2024-11-21T05:43:41.543000
+CVE-2021-1148,0,1,0a41e3afa96cacf27a2aa13ed08091e77b2162f1064c27b3928b3af369f07150,2024-11-21T05:43:41.677000
+CVE-2021-1149,0,1,3c02cab75ce066aa1ffe3243904556dc7d84774b80b04bbaff2cdb99ebee6bad,2024-11-21T05:43:41.807000
+CVE-2021-1150,0,1,22ee1e1c0bf4da31f1330a3ba1acad78bfab6bb08f81e4c30d1b2f35dc9f8ae6,2024-11-21T05:43:41.937000
+CVE-2021-1151,0,1,3cfb27aeefae5959a51c2f01802d62bfd1e5792dbc2b354b6977c442faa0daa0,2024-11-21T05:43:42.070000
+CVE-2021-1152,0,1,76194e8981818a504d11ef8f1f2af38c10f29fdebcc9647127d8c9ac9c4d1a5f,2024-11-21T05:43:42.203000
+CVE-2021-1153,0,1,8610e66804a7fa76b7ca5c711e42c2e92da9e11b9daef3f5691adadad29f9a57,2024-11-21T05:43:42.323000
+CVE-2021-1154,0,1,f0213695d3dc11456a7c98ac14c3404c7a4b2398286319cc77744d93b6f6e4f9,2024-11-21T05:43:42.453000
+CVE-2021-1155,0,1,e58bd6a782f0958416362ef5f9e1126e32c7785d55cd83d11bb94dce5af0cb4b,2024-11-21T05:43:42.597000
+CVE-2021-1156,0,1,10143e7f27c9e9e60ddb2aa054c4c5071b56eb3ba4dab15764ac7b0d0da13cb7,2024-11-21T05:43:42.727000
+CVE-2021-1157,0,1,b0f111092550a7b91911c0e509eb01e182860b1c1de3f5bb68fcba828eea545d,2024-11-21T05:43:42.860000
+CVE-2021-1158,0,1,43677a508da03ab961f7f55af2796e027331e2491d9d56fb88be63a251751e44,2024-11-21T05:43:42.997000
+CVE-2021-1159,0,1,b7f09175413beabff547fe00d09fbd9e723e9d43823bfe36668aebd2a07871ff,2024-11-21T05:43:43.140000
+CVE-2021-1160,0,1,a21a49609bb25a4499f5a762fef6c067f971c120bee2ae83b5e8759147e58402,2024-11-21T05:43:43.300000
+CVE-2021-1161,0,1,7a37b822909aa4f17d521b01c29e1c1115c67eedd77bbb985b59277dd937ccbe,2024-11-21T05:43:43.440000
+CVE-2021-1162,0,1,37add1a3b6284e0a8f7ad260297aa30193caeadace1c270d9ad096c4472c69bf,2024-11-21T05:43:43.587000
+CVE-2021-1163,0,1,bf20893b2d89fca017679e2805a5efc80fc71d18c2d8e264bfa12b09fc9f98b0,2024-11-21T05:43:43.727000
+CVE-2021-1164,0,1,6f825957e3b7d2b1355f3e670b0b7dc82d3778e866bdb0f0026ae6d66b66eeaf,2024-11-21T05:43:43.873000
+CVE-2021-1165,0,1,92b9b9f4ffeb290ed6e8f5a5b57758c976ab54c093396803e5eb281bf6076a25,2024-11-21T05:43:44.020000
+CVE-2021-1166,0,1,507647a3fa4b431b54d66497a937d371e1e4a58081b327766bb11b736e8c0790,2024-11-21T05:43:44.160000
+CVE-2021-1167,0,1,e2c2d3aaebc18dc3a18c52d1d68d4ddac4518088e7ec8efe74589207b278dddd,2024-11-21T05:43:44.310000
+CVE-2021-1168,0,1,54a3e62954a3701a3816b88a9441399c36746d232553ef0296dd4fe9f983d589,2024-11-21T05:43:44.453000
+CVE-2021-1169,0,1,2f80ac8678ed8a848dfd1390b03de090d68811f5d7f463776c8c0346789aa769,2024-11-21T05:43:44.597000
+CVE-2021-1170,0,1,9708c270ac903cb8c9070f739f14d696608a56771bd72700732c8af3c1aa1787,2024-11-21T05:43:44.757000
+CVE-2021-1171,0,1,89a507ea9a29d6d073d8a2963d8629e118e432c05c695f80c3e65ad2b0d626eb,2024-11-21T05:43:44.933000
+CVE-2021-1172,0,1,1ad0fec3372619dec2e235b064798aefb34d938817865f3bb9fea270490acd4f,2024-11-21T05:43:45.073000
+CVE-2021-1173,0,1,a846855ee705f423689df5c10564639bac07e8cfd621df210d00f83f03f918b0,2024-11-21T05:43:45.203000
+CVE-2021-1174,0,1,dc88d162d2890f3e6bb8d4a6a1e29042006a0d490544384cd323ea2c39c21fbb,2024-11-21T05:43:45.330000
+CVE-2021-1175,0,1,922bae54d98128adb970a36158ee4f0ef8d331491abfa73ffa823d42bf9ad1f0,2024-11-21T05:43:45.460000
+CVE-2021-1176,0,1,a0986c884c7767e576ea4c8f23e5a5898aa58e51ab921e3c67a518a3929077a4,2024-11-21T05:43:45.580000
+CVE-2021-1177,0,1,e0635f654ea847f74268fbe3ff05078bcec317b6f4ac669dd0234e27bd325153,2024-11-21T05:43:45.700000
+CVE-2021-1178,0,1,8d601cff06917dbfd4d428c0c112880fcbffd64b61bc8e580eed58c9ddcd43f6,2024-11-21T05:43:45.813000
+CVE-2021-1179,0,1,05d0e78094debc2838261efac896cdccb7e86306af86daba4068dd1c552f77ca,2024-11-21T05:43:45.940000
+CVE-2021-1180,0,1,e704230cd1de22e3710a10d0df8ee41d5de68dcc1454c9031efafae941d8ccc3,2024-11-21T05:43:46.057000
+CVE-2021-1181,0,1,147a8515fc48fab093ce8b97782c0a5714fd6237a2319eb6d8dfb087bce1605f,2024-11-21T05:43:46.193000
+CVE-2021-1182,0,1,108c8b7933cd31e14395b35dbfb830436eea31fcc0a6007be63522f8c2b438ed,2024-11-21T05:43:46.307000
+CVE-2021-1183,0,1,5e8ee0f21cf88cdad4c3cb8585cae7be538ff5fd8e59dd9d3c1cc009f93572f3,2024-11-21T05:43:46.433000
+CVE-2021-1184,0,1,57c86abca5a6da03d7bd84de747098f6875b696bb85e39a2fa4b38532370cc9d,2024-11-21T05:43:46.557000
+CVE-2021-1185,0,1,53b6db62437b9bb6779bc1f813238b0023156d6505f60fb9ebfb7a848d4087c5,2024-11-21T05:43:46.697000
+CVE-2021-1186,0,1,984061c3cefc8bf7c57ab690687fc932c7b45ba2bd57830c5e54fd66147c5d21,2024-11-21T05:43:46.830000
+CVE-2021-1187,0,1,f654d1708f4f6549d8996dab019c371681116bb618b47e41846f1b58b3e99dde,2024-11-21T05:43:46.967000
+CVE-2021-1188,0,1,2dbeb42137527efd68e61558de598e96de6d03d9d8d32ee70e97c2b007d5fb51,2024-11-21T05:43:47.107000
+CVE-2021-1189,0,1,13592a440bd64dd1b5809d2519d03e7602daefc4450192e111856685a3c95f0e,2024-11-21T05:43:47.233000
+CVE-2021-1190,0,1,18d11112400c24d19960bb4f95f2b3ae2c9091d1540d1d1f82e12abb114f39f4,2024-11-21T05:43:47.363000
+CVE-2021-1191,0,1,3a4f95b2b8f144b0eef98f6d69516728c34018549d144469f623f514a8af77be,2024-11-21T05:43:47.490000
+CVE-2021-1192,0,1,d7de6b0d8899913a7519c323a2e02839872d3159d898aa721663bc6d5c42cde4,2024-11-21T05:43:47.617000
+CVE-2021-1193,0,1,a107d0345249a29b3cb3229378bad28d2ab083c348b6366aa0dbf39b38c30c9d,2024-11-21T05:43:47.743000
+CVE-2021-1194,0,1,483da9c630debafdd18f49679d12a816bcfbde6fc98ce30e3eb818e7903e20fd,2024-11-21T05:43:47.873000
+CVE-2021-1195,0,1,363cde9373d9ee3acb49614d802469718323ee5562bce6e65a2879fca19fc0f2,2024-11-21T05:43:48.007000
+CVE-2021-1196,0,1,1f4f5384de320daadfefdaeec2bacc7780e1db5a688578b6cfe6ed05e91f0a25,2024-11-21T05:43:48.140000
+CVE-2021-1197,0,1,9c242f3374faaaa3c620009e832c66de5beeb743a0972f0d2993d95cce1d7683,2024-11-21T05:43:48.287000
+CVE-2021-1198,0,1,542d0b1bb7cdc56baab33df50a9a47bedff26f0409e3172d35a9167799002dbb,2024-11-21T05:43:48.420000
+CVE-2021-1199,0,1,6313272bb96260a61c05f74315eb9ffd5bee4dc4f7e52769951b25c611f80878,2024-11-21T05:43:48.560000
+CVE-2021-1200,0,1,1ed8c180666025094f5d6950d53717b02108dc3ff2e13e956418a91742d33fc2,2024-11-21T05:43:48.717000
+CVE-2021-1201,0,1,5c8b2b9f0318a3a36a98dd952a337369e8a3e5656450ed9611f26b74d20c111a,2024-11-21T05:43:48.873000
+CVE-2021-1202,0,1,c985984c77eadf08068ecf62adb1f09f68bbe006b9215aa2f3758ea3668bc11b,2024-11-21T05:43:49.007000
+CVE-2021-1203,0,1,c5c4766032b7352ee052479c5cbec564aa40d2b2f5ed8ddd4b5014759f643157,2024-11-21T05:43:49.140000
+CVE-2021-1204,0,1,25f218fc6f707f45193dd03b0a61a54111a39aba8076500229262d109d5d4b13,2024-11-21T05:43:49.283000
+CVE-2021-1205,0,1,0d068218867882ef6d957f243bd8ee349d6a352f665a3418c45651a989f0804d,2024-11-21T05:43:49.420000
+CVE-2021-1206,0,1,2bdb2ef579b074175a29d0d26308cc27c94209e0dbe80c0249e68d0d7d9eebd5,2024-11-21T05:43:49.560000
+CVE-2021-1207,0,1,56d08c7351cca0560350525a6b16ef5099d43e623c19ae202671b94f071aa5d9,2024-11-21T05:43:49.703000
+CVE-2021-1208,0,1,2e8373565a7b32dd1f5697b5744737fd7f3ad4115fea41c46878c94dc5b26208,2024-11-21T05:43:49.847000
+CVE-2021-1209,0,1,f205f5e818c36fe1d12b927389247af03683b8e1cb1c96b3d74ba0d0d6bb08a1,2024-11-21T05:43:50
+CVE-2021-1210,0,1,c7c131c7479fe314fb20b71fdfa7aec773e510d87c756a89c1d8e4366a9a1653,2024-11-21T05:43:50.147000
+CVE-2021-1211,0,1,c5714b8888bb847adca7ff974d8ac4e51309a0c5bf429b0a9d04ca6c7e28f30e,2024-11-21T05:43:50.293000
+CVE-2021-1212,0,1,be171ae97967e4eb2af933c042ddeee84fd428ddb229cf0e462d774ffd1052a3,2024-11-21T05:43:50.433000
+CVE-2021-1213,0,1,905cdd57a8418911097889077f3ae4368ee66b089f9dbd9fdc38919ada2f6958,2024-11-21T05:43:50.577000
+CVE-2021-1214,0,1,26b0fb112810b88e69ddf715e03d6c7e31ac59bed080b60e9e54d278506a584e,2024-11-21T05:43:50.717000
+CVE-2021-1215,0,1,08bfa90f49c2c4065fe50bea409b4668add8e2cedcc79b87c6c380d79ba5e8fb,2024-11-21T05:43:50.857000
+CVE-2021-1216,0,1,dd2913d3245970376cb136479722e01499dfc07180f1afd6f932b44f6316f758,2024-11-21T05:43:50.997000
+CVE-2021-1217,0,1,6ce3b3842240ac2f2a6346b12e4749488a0eb62089b6a538d404098b015193fe,2024-11-21T05:43:51.143000
+CVE-2021-1218,0,1,23af046c9c384712ecac9a46af0e59289435c6b5fc3136c115eee52d6e48f461,2024-11-21T05:43:51.283000
+CVE-2021-1219,0,1,b035b0f3c2b43cdd92dbd0beac6a6232d0c59a28fadae17c75c4263377bdcfa0,2024-11-21T05:43:51.410000
+CVE-2021-1220,0,1,5bb05a0e4bf92a41b2584c9afa81d53ddf4184cb4287792aa19b208777edabeb,2024-11-21T05:43:51.540000
+CVE-2021-1221,0,1,4d7aeb768f235bbc6d8170b9dc75bbe937cc9ae267c8ac7339d9c516883abf5d,2024-11-21T05:43:51.673000
+CVE-2021-1222,0,1,d82fa8abd3a843d3477da51cb46dbaf852f883ab64b1d5d6288d2610a7b7f79e,2024-11-21T05:43:51.810000
+CVE-2021-1223,0,1,feb14da65b42cb91313d09ed62216d4ede60dc3e2acacc9ac2ac95046ac10f94,2024-11-26T16:09:02.407000
+CVE-2021-1224,0,1,76346e7b6cf655b1193e8286cd5f222c0803cd37ddd01c26d37f4eea26379b9d,2024-11-26T16:09:02.407000
+CVE-2021-1225,0,1,8851491208fa70e0e015a9b4a5a9b0d4f90e7af3f290d5abd67faee34c12ff25,2024-11-21T05:43:52.253000
+CVE-2021-1226,0,1,c0ae083f223993c6e741f11146a73788a252e69fbe90d846fa0c39929412adee,2024-11-21T05:43:52.397000
+CVE-2021-1227,0,1,e42960d76b5c9f9cd90ce19aec1e13fe0378ff0d378410eb97a6283552be8717,2024-11-21T05:43:52.533000
+CVE-2021-1228,0,1,b577f54f8e4096b19d55cb5e0239541c9b26755f6a32b7fc3aac556e3c8bdff1,2024-11-21T05:43:52.683000
+CVE-2021-1229,0,1,d86b9bdcc82e60d72147643fbc6866bd998b889f45aab6fcaee2308bf94a1081,2024-11-21T05:43:52.847000
+CVE-2021-1230,0,1,31f1aaea8f2f29c7f216996b20a6f0ceaef9e8e921674781d82edd9d07c9e658,2024-11-21T05:43:53
+CVE-2021-1231,0,1,d52894bb6e6e009fa6e7df4f36799b816400c18aea2381432970991b33e939aa,2024-11-21T05:43:53.150000
+CVE-2021-1232,0,1,5adaef8cb636cf0db4d27ceecab17ee882ba38029aa6208ad72c57f29802595f,2024-11-18T17:11:17.393000
+CVE-2021-1233,0,1,7202750241257d1ad35d3f8599bce6ff4598f3ae4b2429d3579f5eeafa4eaca6,2024-11-21T05:43:53.390000
+CVE-2021-1234,0,1,aba221717d2c8124b0c61cee024c31163b114e91206679eb30810697c67e3b6b,2024-11-18T17:11:17.393000
+CVE-2021-1235,0,1,38e5ee3205fa822c23892031c56eb50298d0b94b055ca9267fc153ae8f2ea814,2024-11-21T05:43:53.643000
+CVE-2021-1236,0,1,7ca7876a6e7d6c7e1d13c2b54edf06a59b1fe319c4ed0731ed9197429bd9699e,2024-11-26T16:09:02.407000
+CVE-2021-1237,0,1,346ac66491e726d45419acbeab18764c7e91faa8bab62b5e15c005475fab37d0,2024-11-21T05:43:53.910000
+CVE-2021-1238,0,1,275d8cfe4d19cbc384a72d516325a27288e0c3ed48037f8df5cfba2fd4fee4b1,2024-11-26T16:09:02.407000
+CVE-2021-1239,0,1,c5716bea8758e99d44ae006e02da6c050e74c17f31ef79b012be3a5984314a67,2024-11-26T16:09:02.407000
+CVE-2021-1240,0,1,e1dd8a1075cd0aca2374d84e555b65ae4f82ceec5fa48a800e1ad768aaf92d2a,2024-11-21T05:43:54.273000
+CVE-2021-1241,0,1,c301fb3d47a5174a5480e44240b3245cca0fb7114fd071c052b0e6942265bf3e,2024-11-21T05:43:54.397000
+CVE-2021-1242,0,1,e8b1dd1b470a16b61d7947161371850e15376976c356a565d4587cb2d1baa0af,2024-11-21T05:43:54.527000
+CVE-2021-1243,0,1,c7db0341ea95802c760219004a3e6e8bcac511322822efb5852993cdf8273722,2024-11-21T05:43:54.650000
+CVE-2021-1244,0,1,1baf96dc51cafd70ce22d1f282e59f585563d30ac534963c8e761d962ce664de,2024-11-21T05:43:54.780000
+CVE-2021-1245,0,1,230b3d47f09a8936d62c2491bcdbbe8375e67a16a3d6f2e0604f2b54593a96fc,2024-11-21T05:43:54.910000
+CVE-2021-1246,0,1,7a47576193355066e18d3768a92edd5eabe676004420fe82f176f4d2c95e7e09,2024-11-21T05:43:55.060000
+CVE-2021-1247,0,1,96e183d665d4bfdc4eda621e93b14b07934c524653037a164746e025a23102db,2024-11-21T05:43:55.220000
+CVE-2021-1248,0,1,e6dee615b4ff4300f91970a548ee1eedda2864c46ea35721990899f8e53bee4c,2024-11-21T05:43:55.383000
+CVE-2021-1249,0,1,517bcf4de07dfe57d09bf7c39eb347816b13c64b015ab54eea1ae2ee2ad24078,2024-11-21T05:43:55.517000
+CVE-2021-1250,0,1,5b756139588019b33cf1c1881afc5a96e02fd1f5fd97b61b0bf7faa3f67e8d95,2024-11-21T05:43:55.643000
+CVE-2021-1251,0,1,c7b191d03e9e381f55ceb09d848d2ac8b1dbfc8f60cad8c2be943ea1b79492f1,2024-11-21T05:43:55.783000
+CVE-2021-1252,0,1,dd790162c63fce61e9b7fbd7d9a10dcf767da13d31e6d7414e4bb711a4d7ddc4,2024-11-21T05:43:55.940000
+CVE-2021-1253,0,1,09b36e67686c86ed9b62b15152ca575847b1b5718136258c6cad33f9bf77a99d,2024-11-21T05:43:56.070000
+CVE-2021-1254,0,1,ccab989a45de0e7817ea89e97f80f8305b4d6f9348ef1cb0e11f228a59e16b08,2024-11-21T05:43:56.193000
+CVE-2021-1255,0,1,02171c7000c755f2594c628481045ec2736cf651a220e7d53e2aea884d496abd,2024-11-21T05:43:56.320000
+CVE-2021-1256,0,1,5078577a14a89fce4e541ae7df026332e91c4d55f6d8dc66680cacd9d41e2dd6,2024-11-21T05:43:56.447000
+CVE-2021-1257,0,1,9c3dfb383f911909b3c65501e0db54287974c61c180be6e8e5723639bc5cfae2,2024-11-21T05:43:56.587000
+CVE-2021-1258,0,1,55b75e7209989c676605276d450882c7e0ed527b4b5e8e3eae595e718fb616cb,2024-11-21T05:43:56.737000
+CVE-2021-1259,0,1,0d0ba81d08a888d92b2aacd7d6fadd2e0b0094eb716efce8396c0f9e5147d8f5,2024-11-21T05:43:56.873000
+CVE-2021-1260,0,1,61c37ea335fc93bae61a21bea7406580180f36ad6e84ed589182bca051f5f864,2024-11-21T05:43:56.993000
+CVE-2021-1261,0,1,2a308d1136f76043551c8408016ca7523bcbc66ad2d5e2096090a982d629c8a6,2024-11-21T05:43:57.127000
+CVE-2021-1262,0,1,5ba45a3d6400cbbf3299e1ea38c7ff34edeeb5bcb32cd52d37a3d17e1d4bc0c9,2024-11-21T05:43:57.260000
+CVE-2021-1263,0,1,65add51bf2c07abd1c4aa43f75d092e789937a5a8e17658b8814140fea847128,2024-11-21T05:43:57.417000
+CVE-2021-1264,0,1,f10eeeb52690fbca21d98b9f49b2768a648b0adf91b4a42749142ab135e0e563,2024-11-21T05:43:57.560000
+CVE-2021-1265,0,1,fc73460a6e80d974fb91533f1e7c5ddd4c85345ce240abf0fee75f7c451eef20,2024-11-21T05:43:57.693000
+CVE-2021-1266,0,1,5a10e1b3dec6dafbfc9883f6c7cba5c4a5cb764396919c9ae91294f2bb50f9f2,2024-11-21T05:43:57.827000
+CVE-2021-1267,0,1,bb0ea59a79225c4dfcb7dcb49e4675eeb866517676557b2827bc11446534af07,2024-11-26T16:09:02.407000
+CVE-2021-1268,0,1,6877fc1852ace55e6003cc1c4e74ff224ef6890d1356532ac4cb4e6e7b3d11b1,2024-11-21T05:43:58.110000
+CVE-2021-1269,0,1,2f9cf699a4f1fce0afdbc81442db41f6e5a99cec946fe89fc3d098133860b288,2024-11-21T05:43:58.260000
+CVE-2021-1270,0,1,97389f0f31334b630deb26e41f63fa356a670e27ecb477ebf42ff99e697d5e26,2024-11-21T05:43:58.407000
+CVE-2021-1271,0,1,f670beaefd5e7c1e4bd50b4c34f90549e53b4086d2a22eadebeeb594cf63147b,2024-11-21T05:43:58.540000
+CVE-2021-1272,0,1,fdfb509b1dfd73d8543db4c5833688d1f5e8931c0be981bf806481dff38fa52c,2024-11-21T05:43:58.670000
+CVE-2021-1273,0,1,55b38224fbff1e74a2b1ba7060d61409b62939b0ddcff25c9af71e9ae06927e6,2024-11-21T05:43:58.800000
+CVE-2021-1274,0,1,ff49fbcee46f53908d7cdb9d36529386dfa372206606fc3a6d0f724aaef52bfc,2024-11-21T05:43:58.963000
+CVE-2021-1275,0,1,1e4ae3ff026b7aa45040e01dc7318f0a9efa0f206f0948f0da542ac59128d596,2024-11-21T05:43:59.107000
+CVE-2021-1276,0,1,d5ccf0a8e2e345f9b41729bda0f33563f67d9712abd94934c6dd8201044bb52d,2024-11-21T05:43:59.230000
+CVE-2021-1277,0,1,4e3205eb5dc165d5c07f7514159aed1080336acdf2338167397f62c6eb82c227,2024-11-21T05:43:59.347000
+CVE-2021-1278,0,1,f27e2a7aeeb79c77604ad89dde77060f3b0896710256f671a33fcb026b1d541e,2024-11-21T05:43:59.477000
+CVE-2021-1279,0,1,c40c00a41599c2e28650a31cbbb4201e1a987b72222b4ef1e1e82116157c70d4,2024-11-21T05:43:59.593000
+CVE-2021-1280,0,1,442f3f611d3eb87213398e1b8eb0c45b8f2f887de05d0ac092b6b0ba58c3eccd,2024-11-21T05:43:59.720000
+CVE-2021-1281,0,1,56bf9bb10868f20f670279973dcf70a6940db03d887b1bd956faaabe5176d95d,2024-11-21T05:43:59.830000
+CVE-2021-1282,0,1,375ecf1e05cebc381eb6edbbd35a07333289235f972810b39b826974a7f1bdf3,2024-11-21T05:43:59.963000
+CVE-2021-1283,0,1,93790430b175d665a7bdc85458b84a32f228242d5fafdbebd6cf1d4ed0032762,2024-11-21T05:44:00.107000
+CVE-2021-1284,0,1,dca59fa6c561bf177938869070ea339ecd77cd823374c55bae9a5913703fdcb8,2024-11-21T05:44:00.237000
+CVE-2021-1285,0,1,f1e5f99373e584abe8c5826f5a9a2527dae63fe64e24c9db13ab0b14f9a02ad1,2024-11-18T17:11:17.393000
+CVE-2021-1286,0,1,6b9977aa686c931111e2c2ef41d5b4899e42aa7c4025ca4a7698e9a44635d40f,2024-11-21T05:44:00.453000
+CVE-2021-1287,0,1,e1c848f1d1ee61b3e8fab40d9e4905e1ca123c063664f65b5ca508354be6573e,2024-11-21T05:44:00.573000
+CVE-2021-1288,0,1,a3bec74f0132c9398e266665c9fb6cba59197ad8e1ea75357a24b2e7dd35884b,2024-11-21T05:44:00.707000
+CVE-2021-1289,0,1,76cecfb802aa493f7171c3181143417e33f7b4251c6a722d820a64325294a072,2024-11-21T05:44:00.833000
+CVE-2021-1290,0,1,2d8c91320dd77f36034be8fe3247dbeb94a34812241fab34045045c94fb248f5,2024-11-21T05:44:00.967000
+CVE-2021-1291,0,1,d34853f1e028641ab765f6ab5f26db545b566f67dbb20a20ccaaeb9a58bd0731,2024-11-21T05:44:01.103000
+CVE-2021-1292,0,1,15845543aafafbc4fe793033e33a88bf5a146814d92a04fe5066c49c9e3bd5d1,2024-11-21T05:44:01.240000
+CVE-2021-1293,0,1,b362b7f1b90ef2cdd14177128956f3cbb5f4bbb93ec3b25036c409b69007fa34,2024-11-21T05:44:01.383000
+CVE-2021-1294,0,1,60cc5b18bca2980b560425c1c173d8a1800d612e6a9bcf4c2811aa57abec0938,2024-11-21T05:44:01.537000
+CVE-2021-1295,0,1,593552bb193578b7c326fcf9d2f4865b6d222c7cdfcc869b0b4f1b6b9aafb06b,2024-11-21T05:44:01.687000
+CVE-2021-1296,0,1,a3b132c40db1f9fb10046bdba8834c5bb8bb9136bf85495925348a94725d898f,2024-11-21T05:44:01.833000
+CVE-2021-1297,0,1,29e0230f0637904a0c2ad4121754e572fe270435ea18a6eb9b1b85ca65f4b7da,2024-11-21T05:44:01.977000
+CVE-2021-1298,0,1,e0c271b0e32f07c5d73af5f5209ac287ee3c5f4f1017a0faa28c2e1df9c04dfb,2024-11-21T05:44:02.117000
+CVE-2021-1299,0,1,c7ddb799b1da625e681dffaab2d1d37c0b47b3fcd376173be18c8f4f783abdcb,2024-11-21T05:44:02.263000
+CVE-2021-1300,0,1,b00185e2186ba490a78b8d59972e7c55576b7a9b2ad75c9e2b11e36423695687,2024-11-21T05:44:02.410000
+CVE-2021-1301,0,1,3701d295bd48f57fe47734a4e49b445947541f524f1d618a681d45a06cebf9f7,2024-11-21T05:44:02.557000
+CVE-2021-1302,0,1,609543c37f766ab1e42b9769f635856306e144c468ee5648fe27a2f8c3184e9f,2024-11-21T05:44:02.693000
+CVE-2021-1303,0,1,7fc226f10ab374931b5a62b75709bf7750ec15a811b3053d47c74100e9636d85,2024-11-21T05:44:02.830000
+CVE-2021-1304,0,1,c60d7a028c6b4279a6122ed60accbb4245e7ea3e57fa83b9a3f3d657cc7d0d99,2024-11-21T05:44:02.973000
+CVE-2021-1305,0,1,22dc5a27402743b3e940d996d3ec7ae229bf59d363f613a7e24815fe1789e7d0,2024-11-21T05:44:03.123000
+CVE-2021-1306,0,1,5af13cb2ff8027062771d7c247895e54e5aef3150b8ce2e0ddf7091b853a1eb4,2024-11-21T05:44:03.263000
+CVE-2021-1307,0,1,49ce8947fc36b8eacdfc31fb1289451681b8c18f84b4f5e889ef5519a634748c,2024-11-21T05:44:03.407000
+CVE-2021-1308,0,1,d84e2cf11f679b4124bf680c7d18ae548022e7b58a7843172b926aa0c191dfcd,2024-11-21T05:44:03.550000
+CVE-2021-1309,0,1,a98a2cc1abf46f602e1d368a65a4a69427110b88e377c45feda0f6edac52d3cb,2024-11-21T05:44:03.693000
+CVE-2021-1310,0,1,1f14c0121fe4c41cb78d7de878d40a5898c6234aa85f72df1b7477a1e456569f,2024-11-21T05:44:03.853000
+CVE-2021-1311,0,1,3e59e33749dd822d7fa7b6484f5a401601444a4447e427c4b631edde57192151,2024-11-21T05:44:03.993000
+CVE-2021-1312,0,1,d542ea2e8589b542c192f0a12506caebfedaff7737f1ae66ba1b71d56cb79f86,2024-11-21T05:44:04.120000
+CVE-2021-1313,0,1,4d58ea673bf6b8b34c2458efdc665c75ea0566a61b05f5ea79cfa47073f9dac1,2024-11-21T05:44:04.250000
+CVE-2021-1314,0,1,4bfe94ba912065ea2b3de40dd9d9f9a89efeff8e089d692f18e7bbf5e022d275,2024-11-21T05:44:04.380000
+CVE-2021-1315,0,1,96e3cf16af651700c31d772c4757ea050a2e64d38c94e441ca17ed30f0d07a70,2024-11-21T05:44:04.517000
+CVE-2021-1316,0,1,a693ffe61c1f14abd7680effa4657705d744b9f91bbabd8344bd927a1da50b79,2024-11-21T05:44:04.650000
+CVE-2021-1317,0,1,e769bd11764dfb330d8e9eec9f138be605936aaa33b716ac30bee7c9eaf4d6d8,2024-11-21T05:44:04.787000
+CVE-2021-1318,0,1,b0b88856994df9905e1b49a5c03b104acac515d7ebe62eb3d6edf2f488e79cc2,2024-11-21T05:44:04.920000
+CVE-2021-1319,0,1,b038bd97f2697b1dc105df13d54be5885c22b55e7b554945106c846c3cd3be6a,2024-11-21T05:44:05.050000
+CVE-2021-1320,0,1,198c2916d3b01b56576f20cc88434564df1e49b90db5cc2206af00df67d01f1b,2024-11-21T05:44:05.193000
+CVE-2021-1321,0,1,3670df2f51c474a2277fe329dae78f300323600a093f0bfeb3601f85c1a2b83f,2024-11-21T05:44:05.350000
+CVE-2021-1322,0,1,513fb55023dd933bf91bee22979fa10860fcdcb4d96be2fa4327f31629a446a5,2024-11-21T05:44:05.510000
+CVE-2021-1323,0,1,b944ba83bea1aea7e49d2b7038040d28bfe1215ab8e02b798bee9e66177bbb43,2024-11-21T05:44:05.660000
+CVE-2021-1324,0,1,56c3923f6a79b878caae0e66d8e816346157a1f4abb799895bcd5e6eba22bbe5,2024-11-21T05:44:05.807000
+CVE-2021-1325,0,1,29db0b049cfa5898a4746db202ffa8abe318d44d772ec9baa9cb0dc2955cb04a,2024-11-21T05:44:05.943000
+CVE-2021-1326,0,1,0f5ccd848834cc281a9fffc9935a740a19fbb375f2ba9f66781f1057815a4519,2024-11-21T05:44:06.140000
+CVE-2021-1327,0,1,0fda86cd309529aae60717bab12b82d35b20b707c228faf147ee3b86b843962d,2024-11-21T05:44:06.277000
+CVE-2021-1328,0,1,e767e9ded58b2d150338af6b11d61fa85379ac7c1e6db9ec081dac8a0f6036d0,2024-11-21T05:44:06.410000
+CVE-2021-1329,0,1,54ff4a363eb488ae06095545d9247212bb34e20d5fe2f76775ae7439abb925cf,2024-11-21T05:44:06.567000
+CVE-2021-1330,0,1,911bcbdde5375d409e6243741a37ba200a794d54768b83c03c98cc22c512c59e,2024-11-21T05:44:06.713000
+CVE-2021-1331,0,1,8586a10f44dcd42eba615c04d0de457ac6962fe08723333812f3bbe3b52f95d5,2024-11-21T05:44:06.840000
+CVE-2021-1332,0,1,e3567f6fa4dc68e1420d93547051f4dd42155917fd6087d402720b7edcce1bdc,2024-11-21T05:44:06.970000
+CVE-2021-1333,0,1,5e2172bd6aa6185dc210d256d2bfad09ba29640f7ba95738535b5d14f2ec3375,2024-11-21T05:44:07.103000
+CVE-2021-1334,0,1,0bc8c36bd2567097b9acafeabff1c7d6202236f0c14288bb96b3728025546aa4,2024-11-21T05:44:07.240000
+CVE-2021-1335,0,1,5b39e56ff2a5dad808826fd3c1d21bc2c678be1439a5638d930a9c9dd2d1ccdb,2024-11-21T05:44:07.367000
+CVE-2021-1336,0,1,bc9e979eb423f280fa65785cbc0a39b0d55101a81da6b6ad3115e36484091ab2,2024-11-21T05:44:07.493000
+CVE-2021-1337,0,1,bcb1cb1ef7bbadb03833774b892e46d2e92c53735c655a6c5d795f52934c1043,2024-11-21T05:44:07.620000
+CVE-2021-1338,0,1,bb77695dd7e486ae2524e868c1dfb2ef712974e44a8dd9b615d538def4d1460a,2024-11-21T05:44:07.760000
+CVE-2021-1339,0,1,97cbc72b28027d6bbd739c28a2aa23ed0144a0513bfa26f7470eaa8570afaba1,2024-11-21T05:44:07.887000
+CVE-2021-1340,0,1,3cd061e07d53f938a037bdb204fa340bc4798b21ef63cd29730ea5077c09d04b,2024-11-21T05:44:08.013000
+CVE-2021-1341,0,1,b47102f4274118c35750b18e65e00b8e93575eef5a74548e85b13b1b56075802,2024-11-21T05:44:08.140000
+CVE-2021-1342,0,1,88485980d1e1daac74fbb371bdd7939afb4bee5cb70f691435a619ebbafc7f03,2024-11-21T05:44:08.267000
+CVE-2021-1343,0,1,aaa6afd5057a32171fabeec73a7f30e09cba1e314886efc923a72481b0b2d630,2024-11-21T05:44:08.393000
+CVE-2021-1344,0,1,d01190f88347ec1942618271a88441893572758191d80757e267d99295bf1a68,2024-11-21T05:44:08.523000
+CVE-2021-1345,0,1,2d25b0599bd20f9f72a8b52f504043f59f5ff9574f27baf70d8e23d3b9b7fb57,2024-11-21T05:44:08.650000
+CVE-2021-1346,0,1,8e59bf93417eeed272e880f245c91fb1e3e21a2da7d11af99cb972f6c2245329,2024-11-21T05:44:08.777000
+CVE-2021-1347,0,1,05216dd1b46414d6bbfde5c5b2c3f4a84e54f95b023c3517bc008b94885f7473,2024-11-21T05:44:08.907000
+CVE-2021-1348,0,1,3fba224f99cdfe3086acf91efac2815fc1bea9ac6aa32ceb73070240a226da0f,2024-11-21T05:44:09.050000
+CVE-2021-1349,0,1,a0cfe6c64519ec254c58625f041e609abbdb2c4abf09f1d410a78a68b8c04826,2024-11-21T05:44:09.207000
+CVE-2021-1350,0,1,13a48537c97a959a7d4dbe6e79cf0179e87051a3cc856dfb6bf4d2045d0af917,2024-11-21T05:44:09.337000
+CVE-2021-1351,0,1,9eee8f39403fa8e9c9b4ce39ba46c1eb782a551768f848761dbac8f09086691c,2024-11-21T05:44:09.457000
+CVE-2021-1352,0,1,d6b7a711279babd6c49809598e8ee658adbf5d2bdd1b8f66664cf63c6975f15e,2024-11-21T05:44:09.593000
+CVE-2021-1353,0,1,0878efcb45613bdf3bd650a381a3abf0132aec0dda833256ac12d49bacb78f37,2024-11-21T05:44:09.737000
+CVE-2021-1354,0,1,456cacc7bdaa0f9b490081e1449584fb7e82cde887c4e46b5c06ef6c8865118c,2024-11-21T05:44:09.857000
+CVE-2021-1355,0,1,dab99b231aba111783c09f480d9243e291edac1071aab3225943db1f8cd64d52,2024-11-21T05:44:09.980000
+CVE-2021-1356,0,1,f3d031cd586b3249a64c89a86214b51adb5d6918da36680bd4094572432cd8b3,2024-11-21T05:44:10.107000
+CVE-2021-1357,0,1,84165994b02cd9356a03b32bbe3e1f62d146aff90bf55e5d246d57e9c38b5ecc,2024-11-21T05:44:10.233000
+CVE-2021-1358,0,1,6f4765b27ba174035d718f7442d07571947fe00c043229d2a01968e05a13335b,2024-11-21T05:44:10.357000
+CVE-2021-1359,0,1,ec33895c6a379d489c86e8f753869b2a92ab5058e11c5e47a8054dd8656544ee,2024-11-21T05:44:10.503000
+CVE-2021-1360,0,1,51ecefdbc19f99354c36f43c3f57a441018ac629e12d3065cc7d30cc368db759,2024-11-21T05:44:10.660000
+CVE-2021-1361,0,1,02e74440dbd965065d6cb6c30e2dfe8a9d898d7c180cbb54b048a0b3c611c0be,2024-11-21T05:44:10.800000
+CVE-2021-1362,0,1,c208230bfd35e72cca210c975ba365a22a69e558da94b55ea9368663385dd0ca,2024-11-21T05:44:10.950000
+CVE-2021-1363,0,1,30e05894a46e3ce95c231d21b20c9ad542de46dae26db85e9929741dde3e31b4,2024-11-21T05:44:11.093000
+CVE-2021-1364,0,1,1d3b5eec339005ba42ed454f98934106cda7d65263aff85ef5c956c43bf6a08b,2024-11-21T05:44:11.220000
+CVE-2021-1365,0,1,483934f8a3ba62974671b66472a631afac72f4d545446e63ffec00bdcf2532d8,2024-11-21T05:44:11.357000
+CVE-2021-1366,0,1,82eb39f9f5ec6002af490317a6574d237d7b70d25e0bb447874c093cb343022a,2024-11-21T05:44:11.470000
+CVE-2021-1367,0,1,2fa54418b780e5c793082cfc6ebb5fe91c48bcf9d83cb741fb081c69119f85cc,2024-11-21T05:44:11.587000
+CVE-2021-1368,0,1,08b73ba05e3e1d762566bb7b26597f514ee4540b675a8ee23a5e4e7f69c44473,2024-11-21T05:44:11.723000
+CVE-2021-1369,0,1,4e22c07ebae4457b653f959c38212d9d8cd29a28a19bec328bedf4caad543c20,2024-11-21T05:44:11.867000
+CVE-2021-1370,0,1,4226a75f1c99891a358491bf98984b75c541828cdeb142ffa3b23365544c9130,2024-11-21T05:44:11.983000
+CVE-2021-1371,0,1,22508843ceb9bfef4a953a9df985795857139a9b5cadfba1883f7c0c48fc803a,2024-11-21T05:44:12.110000
+CVE-2021-1372,0,1,8ec1c2b961803f9ac3b7b6a3a54cd8309144a23f3c8f2731d9d9a2cce1e09bea,2024-11-21T05:44:12.240000
+CVE-2021-1373,0,1,5d699a337abdf99fdef11e2cc634f0e33e6ddbab883e475b575fe1683eaca1a3,2024-11-21T05:44:12.353000
+CVE-2021-1374,0,1,87fe338832df162a2da006298609b7044771261e3e5c6a56b9363d3541aefd92,2024-11-21T05:44:12.487000
+CVE-2021-1375,0,1,2a8ab5c60f8fcff588cfba47d743e35796f5dde6035260873f046efe1acb78b2,2024-11-21T05:44:12.623000
+CVE-2021-1376,0,1,97b8ae83c4ced3e16879d931bbf3e71c69b8b6d51a0ac8a9fd88da14081bb28e,2024-11-21T05:44:12.747000
+CVE-2021-1377,0,1,05f5b82c949ece5046ae06f68811a08b1c11da4181ef9929715e343bdb491dd1,2024-11-21T05:44:12.877000
+CVE-2021-1378,0,1,ba119a63bc0b0c09686d85996fcbc180235a1c44af9cccfbdf52106dd1cfc858,2024-11-21T05:44:13.047000
+CVE-2021-1379,0,1,961e68c8ddf3c27ab3e03e199af0d6117ba54fdf694b8a771f2720a562c29136,2024-11-18T17:11:17.393000
+CVE-2021-1380,0,1,efe5a4c89fd78e354f3a683796aedb4a69c5177390728c886db304a2a645c2b5,2024-11-21T05:44:13.247000
+CVE-2021-1381,0,1,91d85d596aac7b2787ff7d770914905ed7038363fd62f5c9b5372b4de5f7e660,2024-11-21T05:44:13.377000
+CVE-2021-1382,0,1,f833a354cbbe13757ecc2658a14dd8a9a35af21cf6a89981341bcc23f2cedf37,2024-11-21T05:44:13.500000
+CVE-2021-1383,0,1,21898895d3689a17679d4d0c69405f4fbdcd9fe107ae266bd2d88a1cd3117068,2024-11-21T05:44:13.630000
+CVE-2021-1384,0,1,504702ad644f5de63103cb28cdd3528b21c4d25eda1479379d8fa72c0e296259,2024-11-21T05:44:13.780000
+CVE-2021-1385,0,1,2f10cca0a802ad1b4166a355d1f5776c09550d7a697b2078cb652ab507d248c3,2024-11-21T05:44:13.917000
+CVE-2021-1386,0,1,0c756dfefdabb76c55e0de41414fa65e22947808cf1401a989bb8a5c422af7e1,2024-11-21T05:44:14.060000
+CVE-2021-1387,0,1,4ef7eef70c9674db4294552f036c1132d612cf96d0e0b79f01553b14af8b58fd,2024-11-21T05:44:14.203000
+CVE-2021-1388,0,1,0a773d163f0a18405b8b2ae5eaeea295158efb635100d9cfb40e19a8db174aef,2024-11-21T05:44:14.400000
+CVE-2021-1389,0,1,2b1d3c2d13d2f693c83a98d53d2b52ebcc68b164d3e322d89b5b9ce0d5c550f9,2024-11-21T05:44:14.533000
+CVE-2021-1390,0,1,8643e2d75ab37d7d76c6d966b39f4fe5f693f1d16db1217c897fa4cea26c7f74,2024-11-21T05:44:14.663000
+CVE-2021-1391,0,1,239f4f45f66b67b712216fce1d43bd916327ac2cc27b7e87c4f327e9a005d5c8,2024-11-21T05:44:14.797000
+CVE-2021-1392,0,1,56d14e4fa620817538dcf07ee30fdeb3de7a3bf59feee74a1a8ba7f2e74f1002,2024-11-21T05:44:14.933000
+CVE-2021-1393,0,1,d8f89526f66304756d2cf804c702e5da8f560542586669fa0e5d66b2524789f8,2024-11-21T05:44:15.090000
+CVE-2021-1394,0,1,b63182f78bbd330b91c851511bc02e627c44f3eddbc186f179f7130c9ac26a45,2024-11-21T05:44:15.220000
+CVE-2021-1395,0,1,7a1f59b8b716ca6e541e1d95d5c67bbc17aacec8ba0acee7ff5c92e419d3b63e,2024-11-21T05:44:15.360000
+CVE-2021-1396,0,1,4d13a2e9f99d5922e3930f8705d8e5ee655dae92f81c1eab51844aa3272ad333,2024-11-21T05:44:15.490000
+CVE-2021-1397,0,1,cb586f746fb6c8f064471f8a9a8c6390f46403fbadf89896d85aaabb707af497,2024-11-21T05:44:15.633000
+CVE-2021-1398,0,1,0bc08ee74d86a7a1331cbe8f8583122054be7088565be5be00d11153d4301e59,2024-11-21T05:44:15.817000
+CVE-2021-1399,0,1,cc114fee28fe85058e82629317cae018b38fb51fe71993a8c76cf7b9f7c5dc28,2024-11-21T05:44:15.987000
+CVE-2021-1400,0,1,ed878f074705b24a708e2afa1e70ace6dee4cebc2879ec8a05ba20eca183fc7c,2024-11-21T05:44:16.120000
+CVE-2021-1401,0,1,f7e6a90e96d1cfe91664338fea98703845920c1cd6e4d772ad73553463f51604,2024-11-21T05:44:16.263000
+CVE-2021-1402,0,1,c61deb973c96e520f9d9e797ead70bbe3d1bcda78056c3f53b57d83e58bcf8fd,2024-11-21T05:44:16.410000
+CVE-2021-1403,0,1,1abbb53e32fc9e157aac7c6f0f6d43584b0498ecf3483278ddbce6227c8954d6,2024-11-21T05:44:16.550000
+CVE-2021-1404,0,1,d6e83b74b10f3983f21b33ef7ad0423f334669c52a34e1ac2f981e0832c31102,2024-11-21T05:44:16.710000
+CVE-2021-1405,0,1,525564d221635bb41b47f4b7764dac600fa7ed8bce46fc0abf730b5061b957e9,2024-11-21T05:44:16.853000
+CVE-2021-1406,0,1,9aa5db0cdc141cfab6def7d35f5f6647588f76b775aafaf4c350bc3baa604d4d,2024-11-21T05:44:16.997000
+CVE-2021-1407,0,1,8039be4005ed43652110e68984d14750d2634a9e8e80bfa590d13301df2f15e7,2024-11-21T05:44:17.157000
+CVE-2021-1408,0,1,9ee44f1e15287155043cc4ab882ec07cdd56da39c1bceb9dd6bacff385927518,2024-11-21T05:44:17.287000
+CVE-2021-1409,0,1,d8c6726311d7ecabd14e408a75cd9225691931ad724d8f3264e1b1433362e0d2,2024-11-21T05:44:17.407000
+CVE-2021-1410,0,1,dad50356dbeb7ff685d820380e765ed00e89fd99551d03422c5f3464c01da647,2024-11-18T17:11:17.393000
+CVE-2021-1411,0,1,ce47e4e496403d8c113b7a809adfc039298a9e57ab76c7afafb0475bb069e1b6,2024-11-21T05:44:17.583000
+CVE-2021-1412,0,1,556e25693d8498139707558c46bb08839bad944a806a1e79b9036e86f36b04bd,2024-11-21T05:44:17.707000
+CVE-2021-1413,0,1,a1be57fac7f99d3e5cf15a149871bbdd993afc3da3058ac195d29c1e5a0776ed,2024-11-21T05:44:17.840000
+CVE-2021-1414,0,1,d2a5a20c6e89827585c793f81015e39b3a83a8421ae4457769b8fcab4c0a2c74,2024-11-21T05:44:18.567000
+CVE-2021-1415,0,1,a91229deded604b71b1c5daa2f6a1055320a13280989a98cc54be1ff6e450b0c,2024-11-21T05:44:18.690000
+CVE-2021-1416,0,1,b56b2b0be14040614ad62cb92da51bbb2b9bc999e610d4808ee84a9268c887a1,2024-11-21T05:44:18.817000
+CVE-2021-1417,0,1,8ee0031eb4b1c6ff0f2341e8e0e7f2176683591b9da13b4a13da618d0e3ee50b,2024-11-21T05:44:18.937000
+CVE-2021-1418,0,1,0b5566b8cb261e366ae23d166f34885659fe4a9807215683aabc85ea8c23ee95,2024-11-21T05:44:19.057000
+CVE-2021-1419,0,1,61ea703da663dabbadad5e3ccbd31b7a672e041389b70fcfaa9b392fc51b8e7d,2024-11-21T05:44:19.193000
+CVE-2021-1420,0,1,e8f5b0bc27587e971456afb62afaaba675edeb014c96bf99b88350aa99d8ec02,2024-11-21T05:44:19.410000
+CVE-2021-1421,0,1,25fb106464599670faa5c26c89c6c0166828f7dff12fd992f0d825914b414bf2,2024-11-21T05:44:19.547000
+CVE-2021-1422,0,1,fbc485f254c2a720303ef16b7e2c2ab5f8fad262328bacdd4954eeee5ed53e0a,2024-11-21T05:44:19.693000
+CVE-2021-1423,0,1,9f8ea79a678fbe3c85df9aa886f8193fc1954f1fc72bd5dbb6dcaa6d6feac21f,2024-11-21T05:44:19.837000
+CVE-2021-1424,0,1,32b23ce53c751643ef8b2fab965bf2984071b44ff4d23491283c13f8c7fc69c1,2024-11-21T05:44:19.980000
+CVE-2021-1425,0,1,8676ba6453902dd0910e10a2581ac7885b9814b970561333e2bc7cb860361d71,2024-11-18T17:11:17.393000
+CVE-2021-1426,0,1,49fabfa63a5020fe8028e705fbadf351c1844ba9698ba8bdea7e35cd402f1ee7,2024-11-21T05:44:20.260000
+CVE-2021-1427,0,1,928d5c3131cf102c032b238434aba49b43189b22f06b7d0ad56ba4a51e5c9889,2024-11-21T05:44:20.373000
+CVE-2021-1428,0,1,b5894693672f46f4feb86f875776e225b2331f949d63717ff2d98c52320176bb,2024-11-21T05:44:20.490000
+CVE-2021-1429,0,1,3327bd5ac47d590ea32d5d9b0f9c5ee36417abb6cdcb1b47aaa7beadea429297,2024-11-21T05:44:20.610000
+CVE-2021-1430,0,1,83e6e899a913de3629bad2baf74cafb15dfd7ae0fa444339a257d832c942d47f,2024-11-21T05:44:20.760000
+CVE-2021-1431,0,1,50e390e391b0266eb6143dcf4cced99f7c9d23be4ecdd389975baa0d341a4234,2024-11-21T05:44:20.893000
+CVE-2021-1432,0,1,6297c94fba9a0b330e6f781527881b0b15816816c9e03d0039033dce5e7066f6,2024-11-21T05:44:21.037000
+CVE-2021-1433,0,1,e9b64cb06638f16633b60be2a4e1178cc34500995710389192a27409e7c8a72f,2024-11-21T05:44:21.170000
+CVE-2021-1434,0,1,67222d528ddbea2449e40835c33c3acbe519e8810e809c5a2728bf8d041f23aa,2024-11-21T05:44:21.310000
+CVE-2021-1435,0,1,70624106ed6e3fd1d3b791fff658a38fd688b85cce32016d10634f05e769d836,2024-11-21T05:44:21.453000
+CVE-2021-1436,0,1,7c6ba480f33943d193579a890e0fcf1f6d5cf7f29361961078caf65778e6856e,2024-11-21T05:44:21.590000
+CVE-2021-1437,0,1,15eb1b59af78d9484b262da7dc5838bcd3f1aded3e7ea59c1fa2acfb9241d98d,2024-11-21T05:44:21.730000
+CVE-2021-1438,0,1,72f5f7af64db0ffdc603b01bb9788e8fb27810abfea1ed3d54aaad4463772144,2024-11-21T05:44:21.870000
+CVE-2021-1439,0,1,b14a3c894abb377bf7e81eb6341c4e8dbda4dd557f1a32ccaca0046383cad50e,2024-11-21T05:44:22.010000
+CVE-2021-1440,0,1,15af119bbb659308f05bc579c65a023f2a016e78cde5062750f48a5508a5bedc,2024-11-21T05:44:22.147000
+CVE-2021-1441,0,1,569f50679bee5fc62102b2e2dd77592729fe47b87db3f5ec6d5041a70ced90f3,2024-11-21T05:44:22.270000
+CVE-2021-1442,0,1,faa94212ae7a5994c284bf910d23c60a39cd2f14fb1112828c5a7fdc30d9d5a9,2024-11-21T05:44:22.433000
+CVE-2021-1443,0,1,2146d78f8dbd75e5d2ad1ed39254be2d115504235a5cc6d3d995ac5ee4406681,2024-11-21T05:44:22.597000
+CVE-2021-1444,0,1,8ab4c4200096fa7c26e0cbe6b9380dea1e7e03882eed1bf0572218a54d3501ee,2024-11-18T17:11:17.393000
+CVE-2021-1445,0,1,1c5b61d093fd8c35cea29a2dd315863d56ce4d27be822bdad760c6ff691d3a5b,2024-11-21T05:44:22.823000
+CVE-2021-1446,0,1,5799ed2df022d35a03cc3aa9b5a6a21b4897560e683fc1c49c93c6db39cb2d0c,2024-11-21T05:44:22.957000
+CVE-2021-1447,0,1,4cb817e9d4a4255a972bbc74d744b37fb4738c944b6fb813323c7efd9646954f,2024-11-21T05:44:23.117000
+CVE-2021-1448,0,1,c4de25fe933bebb1c7610ba857ead286676bbf170b85b98178a92378d58c20a2,2024-11-21T05:44:23.240000
+CVE-2021-1449,0,1,fd2aa67f52a00295ea5605a2138f97feef67993db1d12afda77291f501e52f38,2024-11-21T05:44:23.367000
+CVE-2021-1450,0,1,a5466e747f61f1d1675bef15e3302072738d6bf8e1855e8c512eae3578e7096f,2024-11-21T05:44:23.497000
+CVE-2021-1451,0,1,3d2f75fdaff146321e176b9817e23cd9e8659d68b27d2a92cea146678ee14d8f,2024-11-21T05:44:23.623000
+CVE-2021-1452,0,1,4ac9b137e6c38cd61f13a97400b6b60c23aaadc9aac9684ff3d7bc1b6f492992,2024-11-21T05:44:23.770000
+CVE-2021-1453,0,1,e42d5f0859ae43381fe9ec288c65b2db9d6559c7814e4ad425ca3471b4d6071a,2024-11-21T05:44:23.893000
+CVE-2021-1454,0,1,6df79c01f6821c7efbb9b4e988b6992862058af70f1aea2e7b2f54c8a078c9aa,2024-11-21T05:44:24.023000
+CVE-2021-1455,0,1,c339f9a440ca2f7033d7671195a64382197eca03bed8f79407e4f375ae8166ff,2024-11-26T16:09:02.407000
+CVE-2021-1456,0,1,904f86556be6236f074dfbe1fecd64c5fad776edb95fa6784958e57bc2d0669a,2024-11-26T16:09:02.407000
+CVE-2021-1457,0,1,0e8b7352406139387332cc6aa510fab25b93ee105841d4583d8f929a7518bdac,2024-11-26T16:09:02.407000
+CVE-2021-1458,0,1,d263c7c4fff5d729c750b9d9ac8736dc61532115441d1988424e458b4646ef31,2024-11-26T16:09:02.407000
+CVE-2021-1459,0,1,2f8ba674fba87b99e079e6766812d20724ae79467f0b7ebcf53a7696049c2f04,2024-11-21T05:44:24.603000
+CVE-2021-1460,0,1,e98e88abc8307d6890cb9997d7c12061d9a77380e63753c1d1e40010fc7a91c1,2024-11-21T05:44:24.730000
+CVE-2021-1461,0,1,b3eb5a398d9ca2d8c5d2031e40b07f347ac163b4a479b285b48baa3ed9f3a1d3,2024-11-21T05:44:24.867000
+CVE-2021-1462,0,1,65e83d4f46d5d39b7ec8383556ab345cc731480998030e5f6be706a878ac1898,2024-11-18T17:11:17.393000
+CVE-2021-1463,0,1,acb9fb1527eccdce726d15b2d850735ee5cbf7223a7a61ef9d9995e39e37095a,2024-11-21T05:44:25.047000
+CVE-2021-1464,0,1,771ca9868664a6c4eae59d069305917fe5abc48869539494402875fbfe587881,2024-11-18T17:11:56.587000
+CVE-2021-1465,0,1,49ad771213520cfc03f0cf99673134e744c2593c1406169dc6b3fdb9e3e31cd3,2024-11-18T17:11:17.393000
+CVE-2021-1466,0,1,73d1ab1dba7b93614d4456f7c4154a9051b3311fd597548613460e253f8816d8,2024-11-18T17:11:56.587000
+CVE-2021-1467,0,1,37cd1b0388d59a074ae1b248547247cab652ecdcf418f496874b46d7894f4fea,2024-11-21T05:44:25.383000
+CVE-2021-1468,0,1,94dddc2bb33a1a5bbdd2a5ca364627e60173fbecdf4e1a69011a7fe666c23acd,2024-11-21T05:44:25.520000
+CVE-2021-1469,0,1,a249832e104b4956ca7a008b4b77116e8fcef6bd075ba8cd8efd905250eb8669,2024-11-21T05:44:25.653000
+CVE-2021-1470,0,1,b19148fbd05428a7d79b2eb78a799c57c7354cff2b4c3978a4cd26e7b68edaba,2024-11-18T17:11:56.587000
+CVE-2021-1471,0,1,d8e00b3f829fdaca83472335b9607fb434f6533d18f09e893d5e153481995271,2024-11-21T05:44:25.900000
+CVE-2021-1472,0,1,cb714db37398c37a1853461ae4302afc31c17d76f152f27fa18411a5240b948b,2024-11-21T05:44:26.040000
+CVE-2021-1473,0,1,d51b1ce3c7393305aafcc238a46d576cb7b56fe45fcc65110bb32c966ff5cc45,2024-11-21T05:44:26.183000
+CVE-2021-1474,0,1,876b6a5df5f0a69f9bc30e33f4a71db7fd9560d846c210ff9ff8f930b913617c,2024-11-21T05:44:26.340000
+CVE-2021-1475,0,1,a27118142a1efb67ee6c49fc37ab644eb5416295e7ee40385cbee89f05e801ef,2024-11-21T05:44:26.473000
+CVE-2021-1476,0,1,7e05f13528c8ca6be89e06af43c5d23756f42ac9cf7b5910f7227b52b453079e,2024-11-21T05:44:26.607000
+CVE-2021-1477,0,1,07e004a1a354f11ffa7340f5726d4f80643432f548b6549bc99c345042a75b92,2024-11-26T16:09:02.407000
+CVE-2021-1478,0,1,7e96a92cb3e20bb71aa350eb6901d2d6b69e329a135b37ab148ebb0a3866e31a,2024-11-21T05:44:26.880000
+CVE-2021-1479,0,1,00da61babd2f5abf73e975f6b318bc4b742e0322de4b0bb962782239702a113c,2024-11-21T05:44:27.010000
+CVE-2021-1480,0,1,a71bfc4b6d46dc0b1fae92c3a07c74a84cdbbe3ae8987cfcfe52c3941edb4aa1,2024-11-21T05:44:27.147000
+CVE-2021-1481,0,1,18a331528c61b9d4f24c1d81d578c349ce72d8925007c1f4b1c846057d52b577,2024-11-18T17:11:56.587000
+CVE-2021-1482,0,1,b41a96f1fd3b9702e23a6baa566ba0766aeffc58a9c2a34150c1183b75afa968,2024-11-18T17:11:56.587000
+CVE-2021-1483,0,1,d784abde163ec01c64a27d73fac89b07bf3235a1191a82ab5c7e896faa82ab1e,2024-11-18T17:11:56.587000
+CVE-2021-1484,0,1,269f6b6f003a85a492f1127300ee3b70d30232eeb977d76a932be87d1b5ee3da,2024-11-18T17:11:56.587000
+CVE-2021-1485,0,1,fb524a968f0f70d072b3653d2640debb11078eae478c6576312c035e9e70fb6e,2024-11-21T05:44:27.663000
+CVE-2021-1486,0,1,937638ba851c5928d371a22e1c2d34733c6a3abd2a3adb9bea4e4bdf06304fee,2024-11-21T05:44:27.800000
+CVE-2021-1487,0,1,8a80d73706ac29fa3c0a4a7c62e449926586ed7febbf1675823250ef82474e31,2024-11-21T05:44:27.920000
+CVE-2021-1488,0,1,87dc24511c5c50b9fafb93188489a9374e0e05d9307c9894a6e52079c98e6d92,2024-11-21T05:44:28.050000
+CVE-2021-1489,0,1,364434935d6fc63638788d08a5d9321a443b22008779b343d3c9146eec1c5fdd,2024-11-21T05:44:28.167000
+CVE-2021-1490,0,1,53ad35b04ecff7add34978550fd988453a8f4aa69a97a68c6ca651572564615c,2024-11-21T05:44:28.290000
+CVE-2021-1491,0,1,0b8bba944ca2fa25a160f42328f34827c5f2a40119150ddb76d26d3d511fa27c,2024-11-18T17:11:56.587000
+CVE-2021-1492,0,1,0b15b1eb162036cd62f41c15cc1f11542d2f6a9e3085ba1f7b20947d945cd7d9,2024-11-21T05:44:28.467000
+CVE-2021-1493,0,1,d9d55dcde245958b0ba49c9136722eb20c8ccee4608bbd292194c81a5e4172d6,2024-11-21T05:44:28.583000
+CVE-2021-1494,0,1,2fdda37344773c09c498c942fc56d92ede935611ef773f0132df966703c1ac1d,2024-11-18T17:11:56.587000
+CVE-2021-1495,0,1,492bc57403dc8d739d012384ab476d3878e399d6b7568a9b09b00cce42738ec5,2024-11-21T05:44:28.830000
+CVE-2021-1496,0,1,6f49b90d98ab17b8133e0b14929f201844da53f694ce0bb5444d990c765ffcfc,2024-11-21T05:44:28.950000
+CVE-2021-1497,0,1,9ae760081239d6299d8a81e130a5f78a32670d1dd81ee2a1c1e35361322a74e9,2024-11-21T05:44:29.070000
+CVE-2021-1498,0,1,97d074bf52e43de31404894fc9272d97287859397a7acd230467c4a47aa09cb8,2024-11-21T05:44:29.210000
+CVE-2021-1499,0,1,bf358ffad98f8a6b7e0e1826003094df54246a52dc683b0b2ef057085ff9d722,2024-11-21T05:44:29.350000
+CVE-2021-1500,0,1,8a934316c9d00de7d20fd1960e8e870dbbad5854eeff946c5aeaa2a3ec976565,2024-11-21T05:44:29.503000
+CVE-2021-1501,0,1,ab416d10b8205b761a6e3be7ab14635b8d5fad5c6df8f0660dda6eef39675997,2024-11-21T05:44:29.640000
+CVE-2021-1502,0,1,0e3833f680e6428006907da39a9f77432aaeabdc84a276b8d33a118d06529630,2024-11-21T05:44:29.780000
+CVE-2021-1503,0,1,10506e522133b631cb0841196b0b91761befd6faba51e5f6552bcdfbfab11403,2024-11-21T05:44:29.907000
+CVE-2021-1504,0,1,01a4c3ead089269dc2ed84549eeda276626cd7c0f29bfecfdc5d12d0ddc18605,2024-11-21T05:44:30.027000
+CVE-2021-1505,0,1,f6f8eba82df4ae8810a72bc2064b08ab69388005a7d6db94e8acb960212a4552,2024-11-21T05:44:30.143000
+CVE-2021-1506,0,1,e08907ff78653aa96e6db322b1b1891ab3c7f70c612a285eaa4449d29a11bc93,2024-11-21T05:44:30.267000
+CVE-2021-1507,0,1,a22ab23e2fc3ba22a63e41d67ca589b213c0ed00a0376011048a9c6a9824164a,2024-11-21T05:44:30.383000
+CVE-2021-1508,0,1,c6ad3dacf587155b2e3b9c534a4da76b6e23ce89b026a2572a1b4c23eded4f47,2024-11-21T05:44:30.507000
+CVE-2021-1509,0,1,f41e4056d169797386f0987a49288070a4ad0a0eb0f9dce22d3457136c654a67,2024-11-21T05:44:30.627000
+CVE-2021-1510,0,1,9c1620d3466e1fe32c2fec1398482b910125a23b4bdeeea8cae47e9600c4dc01,2024-11-21T05:44:30.783000
+CVE-2021-1511,0,1,6925073b32d1737a1684a156b46a11d9b4b24052dde0b3d344e38a0ed92b1f8f,2024-11-21T05:44:30.937000
+CVE-2021-1512,0,1,9f71bbd35037a181085a47aaaaac41532f206c3e191ef08632cd0cef67e47129,2024-11-21T05:44:31.073000
+CVE-2021-1513,0,1,530d4bc7616c9e1f6754a6b3dc2f11c5ad440a805bcea4c9bdc19d2fe2b287e2,2024-11-21T05:44:31.207000
+CVE-2021-1514,0,1,e1731c756bb46af762573ebdee74c764c9a1f7d6988025f4c53018daf20fa525,2024-11-21T05:44:31.353000
+CVE-2021-1515,0,1,657b11bef959208786d732cce2895e24fb2ef88db1a8fd8a734239285cbf6d73,2024-11-21T05:44:31.510000
+CVE-2021-1516,0,1,72eca4feb1ed21a33218e9e2b8caa2ee710f32f253eb77f4938d7455ea5ef7b5,2024-11-21T05:44:31.637000
+CVE-2021-1517,0,1,d5760c9c5c203e3edf76633447f3fb761b7920367dedb51b5c65a95312ada0c1,2024-11-21T05:44:31.767000
+CVE-2021-1518,0,1,4adcdef15c810df68dc5f026d68789c555065df29010d8651161c445d15c1ef0,2024-11-21T05:44:31.900000
+CVE-2021-1519,0,1,fbdacfea73e1ad5d33aaba462da05a335e3a14e8063ee1983548cb542a3817c8,2024-11-21T05:44:32.030000
+CVE-2021-1520,0,1,1d45093fc05e9eaa304f075f6b6a5a7cd6e2a482d5e39a9d6fb27a6b32cba1d6,2024-11-21T05:44:32.147000
+CVE-2021-1521,0,1,2ab1e96e0251cafdb244180bae60da53293a30db6fdd7671a1602b14831814ee,2024-11-21T05:44:32.287000
+CVE-2021-1522,0,1,5eb6998b41022ace0b9ccb8e5a4bdeed1fd1b7f0ebd53d8789223a9f8eaebf9f,2024-11-21T05:44:32.447000
+CVE-2021-1523,0,1,2856d09527dc6fd4f33e6b62dbdf54a13c7ce4cc6e84aed9bbfdacff9a1d0808,2024-11-21T05:44:32.577000
+CVE-2021-1524,0,1,5d4008d83faf7ca314289e5fad7892320c0ba35f7e643942e2e68975f0ef09a4,2024-11-21T05:44:32.730000
+CVE-2021-1525,0,1,86e8b22192921261f162d1912ce07bb5a7f422ac9fa17aa5168b9db33596023b,2024-11-21T05:44:32.863000
+CVE-2021-1526,0,1,dd0b575471476926072734fff0d6411e6b7b4c38d840ea1a65c7513805981604,2024-11-21T05:44:32.997000
+CVE-2021-1527,0,1,02d8834b27a0019baeca1fe37b709ff6046b9fa0620c776aade74225bb31334f,2024-11-21T05:44:33.143000
+CVE-2021-1528,0,1,8ea1176300edc292dac2d5e8106f3c89d1eaa63b081d5d4ce2777520a33d7b33,2024-11-21T05:44:33.277000
+CVE-2021-1529,0,1,e51944aa922d07cfcdf33ccf485b867becc5f6b0ed8cf7fd20fe649dfe6f8a50,2024-11-21T05:44:33.437000
+CVE-2021-1530,0,1,95d0c8ed05dac54b1fcf13165aed9be4a05415146deddce3e2ef36716e7acfc4,2024-11-21T05:44:33.597000
+CVE-2021-1531,0,1,d0530000e08d207d3f48ff7b8a9311a3ae5fc2165941a7b02d6f6c876ea158fd,2024-11-21T05:44:33.730000
+CVE-2021-1532,0,1,a9859385dd422cd825b5a41cc56f1b83a41aa7aaef63a5950ca39f1e677ab9dc,2024-11-21T05:44:33.877000
+CVE-2021-1534,0,1,f9014c9675441c582ab4cdf86b75385d1d0a47ef1b5da9f34b0f126236bd53f0,2024-11-21T05:44:34.010000
+CVE-2021-1535,0,1,2473c0ded0129b5736966339782f990066fbe9a683f1eb5aea7dcd31311d05d6,2024-11-21T05:44:34.160000
+CVE-2021-1536,0,1,6aaf5cb6f61d40d6fcac6aaa92d807dd8f56c71c5d29e9972e8cf2e46c7cbbd2,2024-11-21T05:44:34.297000
+CVE-2021-1537,0,1,742ec6f3ce95a402e1e5752684f9de27c112b8b35191032265277a465555cfb2,2024-11-21T05:44:34.423000
+CVE-2021-1538,0,1,0c57e5ac6df22fb683c80e1bfe8b6da142a67e0e13b78f6a3314ac334aa0d74e,2024-11-21T05:44:34.560000
+CVE-2021-1539,0,1,b2a507cd5e70445f08ece7351d966d890cffde53b5bb5beb466f56d813b492bd,2024-11-21T05:44:34.693000
+CVE-2021-1540,0,1,b78987cb2927a334ee1ea23a09a8fb6d100941e29eed09e4e73a32716aa27170,2024-11-21T05:44:34.820000
+CVE-2021-1541,0,1,57ec1bd85000c03c6e9e9589376bfec1256c31291a6c9045c0c3bcf47197bb09,2024-11-21T05:44:34.950000
+CVE-2021-1542,0,1,1fe9eb738f0b21c9819f76963c1d59f2f04517d0fb55a02bc81fae2e52e01cf3,2024-11-21T05:44:35.087000
+CVE-2021-1543,0,1,88b982d84474a8abfce0b6891d2d2045c7e9f84c1d5691ef7b69e12d649ff4ae,2024-11-21T05:44:35.237000
+CVE-2021-1544,0,1,1ac7f31e65b3ea17bc30caccb74b724c8f50b7f3452ad9ea3119a4aaca4cd624,2024-11-21T05:44:35.397000
+CVE-2021-1546,0,1,0869bb2a72415228707aad75fd08116677ed3e1c2dfef5d84e34750418f61a7b,2024-11-21T05:44:35.523000
+CVE-2021-1547,0,1,48ca9fd1917f773297fb4f30b642b3b38d9d8c5de6f7671558d382b55e9244e5,2024-11-21T05:44:35.670000
+CVE-2021-1548,0,1,23391b18039b9f516858a2cef53dd241eac53aa03ce6667efc1cadf36127836d,2024-11-21T05:44:35.817000
+CVE-2021-1549,0,1,9d3f9ee5cd404c90366fad5e9ee45863173632ec5332311ce80ca502550882b6,2024-11-21T05:44:35.967000
+CVE-2021-1550,0,1,6b3397791a716ffbd276d7ff575d470cd32486384f8ca4c38ba42db65a6155fc,2024-11-21T05:44:36.127000
+CVE-2021-1551,0,1,1793b97992ea107391dfd38f3ac5c851b0d3ed8314fbc681dc866210e0a4870a,2024-11-21T05:44:36.267000
+CVE-2021-1552,0,1,8e854ec08625fd791c4a352b13d4273f6d5ed50f1ea380f8fcb289ff4db6f2fd,2024-11-21T05:44:36.410000
+CVE-2021-1553,0,1,bb2ad71834615bdff808fb10d6f4858c11392e9d53843636145d8eaac357988a,2024-11-21T05:44:36.563000
+CVE-2021-1554,0,1,8f9d0b932dbbd285f4e8b58cd5283b4a9560115c770fad4f6902d4d230392e59,2024-11-21T05:44:36.707000
+CVE-2021-1555,0,1,d19e31b773c2a92b41327b95f39994ef88069587d7601ad4026000d6c32e704e,2024-11-21T05:44:36.857000
+CVE-2021-1557,0,1,34663fdeb4d4afde97d46d05bc493c9df7804ffa4b639e6b500c718365ebeede,2024-11-21T05:44:37.003000
+CVE-2021-1558,0,1,a4ebd3d0b352b8718aa04421af88e5c1276c050e4c0dfbf569eb57b5dc716bf0,2024-11-21T05:44:37.147000
+CVE-2021-1559,0,1,2024e52042220150e4810430bc98d9fd6070da5f379c4ff076bcc9b5884189c0,2024-11-21T05:44:37.280000
+CVE-2021-1560,0,1,47e58c26f16aa27f52a8682ed8f9f5c3b1d4b24a9097eb35141b89e413e36f8e,2024-11-21T05:44:37.410000
+CVE-2021-1561,0,1,a4e8f72debd80f0b699d771af550d00a3718d0955bad81a25bf4b694c704331d,2024-11-21T05:44:37.543000
+CVE-2021-1562,0,1,f764672bd48374c63774b945199657640ae4cc614c0e4ed55d8cc9bdadafd6af,2024-11-21T05:44:37.687000
+CVE-2021-1563,0,1,15bdb1fdbfa007b6531481bbf56c6dee63fafdd3d9f1ce657a30818669704a26,2024-11-21T05:44:37.820000
+CVE-2021-1564,0,1,8cce3aae9bfe7764ca2526e80a5a5260563e3abf599f5ab5c95e260a031be1ad,2024-11-21T05:44:37.953000
+CVE-2021-1565,0,1,a53f0df85f6cf5198ccb3fe182cacb8a333e5795b6fa4ac880d2fcf7a104e3d7,2024-11-21T05:44:38.083000
+CVE-2021-1566,0,1,792bba2f5db53c9fffa282867a897c809b9147e49bba9dff23b1237faea3d707,2024-11-21T05:44:38.237000
+CVE-2021-1567,0,1,bcbeadb4e797211da28ad9724d067b6d57b38d981e7a1ee7ff732e4e5e7fc9d7,2024-11-21T05:44:38.390000
+CVE-2021-1568,0,1,e2ff13be6e02e2061817a2ae1b4ad9198cca8a698fd9dd77cebd16278d699f08,2024-11-21T05:44:38.517000
+CVE-2021-1569,0,1,da7fd2710a278d0d7de080266274e6c81436f16aee9c90b703a2f06225f42be2,2024-11-21T05:44:38.637000
+CVE-2021-1570,0,1,ff3cdb52983217675121e88dc3529bb042ab492e40d6dce6dacec27cba53b0e7,2024-11-21T05:44:38.757000
+CVE-2021-1571,0,1,c85e78b99149839b4b243049fe9fcb30fd44320e877ded75bbd18746e18b5c05,2024-11-21T05:44:38.893000
+CVE-2021-1572,0,1,49cc94ff545e5eeda2e349849c6f69416e6eca8a51b753254cc47b273361d400,2024-11-21T05:44:39.023000
+CVE-2021-1573,0,1,7a312abdba6b1e8bd01f82a98428a26c090adaecee3cb9571afd9442c860b86f,2024-11-21T05:44:39.157000
+CVE-2021-1574,0,1,4cef8bc44289908b627351c02a7761e843a5257ac5d4f2e720eb53e542a81684,2024-11-21T05:44:39.297000
+CVE-2021-1575,0,1,27e55864b3d5d4f60f59ef487b4d73280c47cfd91b68e657997934943d6860bf,2024-11-21T05:44:39.423000
+CVE-2021-1576,0,1,9148ae00c7beba70fc6897065ce24ce13309d122b5361b75b0f1bf6fc7704c96,2024-11-21T05:44:39.557000
+CVE-2021-1577,0,1,36baf0978db56c6c7a84007997035ccd10519a3c4dce3adfde3285f1996746b6,2024-11-21T05:44:39.720000
+CVE-2021-1578,0,1,7f71a80ebd736bb45c27f867b77ce7eab9585ce435effef909963d26d2972e5c,2024-11-21T05:44:39.860000
+CVE-2021-1579,0,1,8d14abbe4953bd8103bbaacc64ce83b9def7e7779ad36e7173a313991af48fc7,2024-11-21T05:44:39.990000
+CVE-2021-1580,0,1,e2d505f0d46055c19df10651fc7c86f5a39d3a28c14af3037e788e5f3721e325,2024-11-21T05:44:40.123000
+CVE-2021-1581,0,1,7f9108c40e21432d9e484d9fc44aad3cde4c318bd017bf30f4076ec8056e57a7,2024-11-21T05:44:40.260000
+CVE-2021-1582,0,1,40238093613f09d85a2abe4fed70cec747e34f7167f389edbf9df19cc24f6f8d,2024-11-21T05:44:40.390000
+CVE-2021-1583,0,1,7528701ac7079ab4553d84f1991030f66836a0a23c37666e65ea759af33d9e5a,2024-11-21T05:44:40.523000
+CVE-2021-1584,0,1,c2146aaece98398eade7f257bc9cf6394e8327e86c8a1dc93019349e8e6bbba5,2024-11-21T05:44:40.663000
+CVE-2021-1585,0,1,dea7dd2f5c57cb0991e9e8c24db14b710a12b25c33e2649040110043abe2d11e,2024-11-21T05:44:40.813000
+CVE-2021-1586,0,1,f5392d193148cb4d2c6914609c68b458ccd4a9280c625a28fc1215a98cbec8c8,2024-11-21T05:44:40.963000
+CVE-2021-1587,0,1,dbf631e513842bc2b700edbfed70062a8c27afbbbc4624689e732a4901bb5d7e,2024-11-21T05:44:41.113000
+CVE-2021-1588,0,1,a37d87c5c6039a29947f1d095ffc38e35b1230e39bd31fe11870e3bd89faaf72,2024-11-21T05:44:41.290000
+CVE-2021-1589,0,1,e3d748511b4b24ae03ad7d8c9bd12a944a72b97f69d7fd620c53bd1facf34700,2024-11-21T05:44:41.450000
+CVE-2021-1590,0,1,9bf435fc3bfde845251d859628c244ae5a1cee0f357cf1cbc4aff9dce44d9438,2024-11-21T05:44:41.597000
+CVE-2021-1591,0,1,05447166c7d8eb64e1518b77e44567ecf621dfb9dabe1761f778a8b5e3729902,2024-11-21T05:44:41.757000
+CVE-2021-1592,0,1,053db7201628e0e82485ccde4ae8f7f3aca8ffac103ced6f1ddfb97dbbb2e240,2024-11-21T05:44:41.907000
+CVE-2021-1593,0,1,1dacc43f97c526eb9d8095314818d256af8467b40d9f445a031065ff734d5172,2024-11-21T05:44:42.037000
+CVE-2021-1594,0,1,c72c2813d4579d181cbeae22d0d3017eaa1a6f272c00f97e29b87586d12ea426,2024-11-21T05:44:42.170000
+CVE-2021-1595,0,1,c416d87a9ef14c3794ec56b4f7ba2239dc879e91e6aba207da039010fd2a5041,2024-11-21T05:44:42.323000
+CVE-2021-1596,0,1,2b0424af6f5b5a7118570e254a338f107c5bde2e0a06ad6c39d6d51aef4026f3,2024-11-21T05:44:42.463000
+CVE-2021-1597,0,1,1e91273d5ab94392be4c32606105a018f7745dbdf293da2e43230b3f7b902eef,2024-11-21T05:44:42.600000
+CVE-2021-1598,0,1,7d6a8ec86fd0cdf6af6951b40844a4570d911010fe56c0165938b28bb7f4398d,2024-11-21T05:44:42.737000
+CVE-2021-1599,0,1,ee652d59d4b231fbdbec2d43ce3ab86bfd8474aff65c628e54fc3d4f62835c88,2024-11-21T05:44:42.873000
+CVE-2021-1600,0,1,dbb4b987d39a89e05ba309df26055b6fe53d8b2bc475956dd9cad81b1d742aae,2024-11-21T05:44:42.990000
+CVE-2021-1601,0,1,bcf031647f6a5e048c9d11633edd5a0226488c36cbf7ad225b83f204d9a82c88,2024-11-21T05:44:43.103000
+CVE-2021-1602,0,1,c639154a531ae5c922f354315cc5666e682c86cd7c85de58b58eb804ae81ffd4,2024-11-21T05:44:43.223000
+CVE-2021-1603,0,1,9cf6b918eb653ef544b709bf655541977a82bfcfcdc9e36a6522fae57f3e38ba,2024-11-21T05:44:43.360000
+CVE-2021-1604,0,1,11a3f49c8e0273903d1bf2e95743a6ce8222f4b5fa7e9c8854ce95ff8603ae60,2024-11-21T05:44:43.490000
+CVE-2021-1605,0,1,225dbcfa052ad9bea4607f0bc245c68c59c6818a1e8cd89fee7d1d48f7ede43a,2024-11-21T05:44:43.623000
+CVE-2021-1606,0,1,8c008a2fc0fb50e97163e61d3de84f21cb08689e7e6e82d9d950d186483d9390,2024-11-21T05:44:43.753000
+CVE-2021-1607,0,1,bb9556d4c12683e9117e9b4e80caaecc101429272af89a32fb4b31017f003b57,2024-11-21T05:44:43.883000
+CVE-2021-1609,0,1,161fdccfc34147c481b8adf7e535c0a57b90f7d850816e5a82ece7bbaf689b1d,2024-11-21T05:44:44.017000
+CVE-2021-1610,0,1,1439485b3c0a8609946788251a9b4ad579dea2cc2ca53c257478cd10a9ef69ae,2024-11-21T05:44:44.150000
+CVE-2021-1611,0,1,e2d11c7023701cfb4db469001b044ccedb07d282de6b4f4dfbf6e95e7375c234,2024-11-21T05:44:44.283000
+CVE-2021-1612,0,1,19e7856057de6f57effb37453ba9e1ba1462d7fc88aa479b6264b93d7ed1c10e,2024-11-21T05:44:44.417000
+CVE-2021-1614,0,1,c4bf35ecd3259ae0f152717a372d685e3e95e5c2fab22260ad3ff8799a5aa2cf,2024-11-21T05:44:44.550000
+CVE-2021-1615,0,1,73eb7ac5c1e3620c5f378f395a242820b6fbd8986be3d6376e48645d775a9030,2024-11-21T05:44:44.683000
+CVE-2021-1616,0,1,77584830a2b7ca1fcbd6267ceb007a47577471ee2f66c272184a2e091477a9f3,2024-11-21T05:44:44.827000
+CVE-2021-1617,0,1,4c28b3e390f171ef17a8fdf64cbe6b7bf062b3257e7ecfa317c87ebf65a4eae5,2024-11-21T05:44:44.957000
+CVE-2021-1618,0,1,94f800cf78ba90c860cb58545687b5c9e4f9d9710a2b342189d3f5577c671e8b,2024-11-21T05:44:45.087000
+CVE-2021-1619,0,1,592c4383a79bb90ba6493fb1eeec1e8095274be2ff55ea6d6138e5bc03d7f8eb,2024-11-21T05:44:45.213000
+CVE-2021-1620,0,1,43e2b6bb3effe0309b3ced8faf6ac5d2ae8e7652f13f42a4c8cef21cfad13a2d,2024-11-21T05:44:45.400000
+CVE-2021-1621,0,1,7e505d90e2d687eabc299ba0c239880c22a9d133ce67eb51b642a44e049e17f8,2024-11-21T05:44:45.667000
+CVE-2021-1622,0,1,cf6a0bd64e78b42428eb2b1725ec8d44c86dacb4a88cb85904b1c7cb546ee26e,2024-11-21T05:44:45.800000
+CVE-2021-1623,0,1,9d4533dc6834a7e73045562d35ac2eeaf91b61293852290ae44dbf7ca545b913,2024-11-21T05:44:45.930000
+CVE-2021-1624,0,1,e19c33e1229b1aa9e63a95412978ebb6f0caad0b3bfe8756239ef243dc4ee9ee,2024-11-21T05:44:46.050000
+CVE-2021-1625,0,1,ecbe0750398f89b60f4c8349efc282d5f7a1d8027fed392a53a3c7c898bfd979,2024-11-21T05:44:46.170000
CVE-2021-1626,0,0,facdb1532b09e3a38425a53716b10ad9cd7f1548816d51b01dc0ac3abe76c4ff,2024-11-21T05:44:46.300000
CVE-2021-1627,0,0,576c7d8fc97a52989dc19f19078b4b4ff504a683b3464e720a6e163e6dbc9487,2024-11-21T05:44:46.427000
CVE-2021-1628,0,0,c34aba2dbc242463ff7f7254ad102a30895adf3bfc337753ea6906a50ef2226d,2024-11-21T05:44:46.547000
@@ -178187,114 +178187,114 @@ CVE-2021-34690,0,0,aa04fdaf2642e5980261fd26633cf80628915ead3c91c9b4ccc602da2343f
CVE-2021-34691,0,0,78ffe232acd5f880d530d411a1bb73769fe5e64d28ec66dbcfb9266cfbe5fdf6,2024-11-21T06:10:57.643000
CVE-2021-34692,0,0,f6255597cecfca76104f3479bb07f57ddc57c80a1d2d80ecd59da0151b133215,2024-11-21T06:10:57.793000
CVE-2021-34693,0,0,a2d2a2a3305cc34cbf5a73c2b03b59dd3e13c4ce42a997f3c85a692ae43fb745,2024-11-21T06:10:57.947000
-CVE-2021-34696,0,0,f0d4271ece31265f9fae407865501d21a2733121a3f85989573d329039758f3a,2024-11-21T06:10:58.117000
-CVE-2021-34697,0,0,891ce1cabfd482216cc5cb68923cfc20da72ad3f6ac86d59f11e6d98af749cde,2024-11-21T06:10:58.283000
-CVE-2021-34698,0,0,4728da88edc85e4d2286c72dddd6910c4859a308b275f14bf70d998f62699ba2,2024-11-21T06:10:58.427000
-CVE-2021-34699,0,0,e069aef2ada5a109cd4e217fe8846ab2522e54cfa7195b9877e0d7d40f79b056,2024-11-21T06:10:58.563000
+CVE-2021-34696,0,1,cdde42aff63b30281f021d4b3220fe4f0cc584246f11a4fae4e15f33c5c15006,2024-11-21T06:10:58.117000
+CVE-2021-34697,0,1,d5f34b8e63461a33cfca00246dced1dfbf5b93210a269125f4831ded721dede3,2024-11-21T06:10:58.283000
+CVE-2021-34698,0,1,0e437a6c74463a840bd0527922a1c8f970ba85d0cd2f0745a7924d55a5a3d2c9,2024-11-21T06:10:58.427000
+CVE-2021-34699,0,1,21c7ae7a1b645d6396bd0c53d7cd51803a3ce74beb3cbfeaad378552e716bb2a,2024-11-21T06:10:58.563000
CVE-2021-3470,0,0,c65f7a9b4fd0c7a3244238f03c7c1c48df77ac0a2edf500aecd755ae40da26b3,2024-11-21T06:21:37.290000
-CVE-2021-34700,0,0,25f682c1ef7b75f7649435477bb79e4780b9bace2e4534f186351435cb2d3ae1,2024-11-21T06:10:59.067000
-CVE-2021-34701,0,0,40a6c5882e98e6814814d3aed29bb400331f315bc8b21ad1ea2d019e81f7f28f,2024-11-21T06:10:59.190000
-CVE-2021-34702,0,0,0bf71d530d300a42b770fefe42cef969e6ab5ba79bfcac2683625f92e8463ceb,2024-11-21T06:10:59.317000
-CVE-2021-34703,0,0,454e8d456bdb041391af76ef4849a49ff1d951856ba75be2edd46e8cae5fb869,2024-11-21T06:10:59.470000
-CVE-2021-34704,0,0,678006525fdb71ac1a11d15cc283410a3cabcc39198d95818296b67648b1e8cf,2024-11-21T06:10:59.650000
-CVE-2021-34705,0,0,f979a57ce830853076f2b8968d19f498fc8e88e0994c443534da59377f67898d,2024-11-21T06:10:59.810000
-CVE-2021-34706,0,0,4577c8a3833dfe989e5bbbdbfe1e132321fdc0e8bce6b09dffad1e7b1e2310a7,2024-11-21T06:11:00.600000
-CVE-2021-34707,0,0,b11bc807421d45bccfb36989129da461e1a857f452cb9a327005c42f267a5bc7,2024-11-21T06:11:00.730000
-CVE-2021-34708,0,0,c1ce6814a40abe4378e5b374746d5ff895813726c5d2f39a35e1decd49f9304b,2024-11-21T06:11:00.860000
-CVE-2021-34709,0,0,81ba0b2c2e4ccb9f43bfd3025dca88d699da52a75a79c80db3e3965f2f279bdf,2024-11-21T06:11:01.007000
+CVE-2021-34700,0,1,316a322bd51db009a2c8d59ff1d75dbde4cba9be010569d501081374950882f6,2024-11-21T06:10:59.067000
+CVE-2021-34701,0,1,4140a64713e537e265b1879238dbc338c855fef739480b57f6e2202902f0f618,2024-11-21T06:10:59.190000
+CVE-2021-34702,0,1,ffc6a741f96ace87a3f9295213e621da38c9fdb72c9e679385a87d021cd39aa9,2024-11-21T06:10:59.317000
+CVE-2021-34703,0,1,117d28deeed571117a32f4a6d93ed6ac24aa4fd0e3f7388a5a8a436f7a47a947,2024-11-21T06:10:59.470000
+CVE-2021-34704,0,1,206b7890085309896b2616a2bfd6a8073a8de1a6a84dd8bd3ead21daf2edd260,2024-11-21T06:10:59.650000
+CVE-2021-34705,0,1,2bde5f91b48c76a485eafe5fa76115ababd5a180187e6d7bf54b539f5d72627d,2024-11-21T06:10:59.810000
+CVE-2021-34706,0,1,8c0043731127114ee48479b21413ad3a06c9dc6ea7857df53ddbf9b38710cb5e,2024-11-21T06:11:00.600000
+CVE-2021-34707,0,1,101cf66931153ef1398c9e5deee3eb6ae9f59e17428365109ea5240695ac6b6a,2024-11-21T06:11:00.730000
+CVE-2021-34708,0,1,2ae110af39f8cedd8c6fe6e2bc25394e0667a31a4820437c27e5340fc9448c0e,2024-11-21T06:11:00.860000
+CVE-2021-34709,0,1,30263df84fd7ad16bf28d60912146324926cc2c15d1250e619527c8b939229cf,2024-11-21T06:11:01.007000
CVE-2021-3471,0,0,157ef40d28b1b6c00089fc285336b86f96b6b0c19c085c1e9ab6d88146da3dd7,2023-11-07T03:38:01.603000
-CVE-2021-34710,0,0,dba1810e816dbe77ad2e4e9c29c5738047bbdc43d6f5237c6a741f8a2fbb1af1,2024-11-21T06:11:01.147000
-CVE-2021-34711,0,0,962c7a3e321e41028f305e1c4087ed22c0dc36c59bb05d35239a973ff54ecd17,2024-11-21T06:11:01.283000
-CVE-2021-34712,0,0,0ab7caeba5ae76253b6f917ee9d023ccdcc6d0cda65dd9c6868565bda694efce,2024-11-21T06:11:01.440000
-CVE-2021-34713,0,0,456a0960d599964521de8c0d534f573658ef8c4337185a9e0a9df60ce6931399,2024-11-21T06:11:01.577000
-CVE-2021-34714,0,0,8b93628267eb946883d00482d06eb9e1918818629de0c0c8d3f326c5e6f3f0a3,2024-11-21T06:11:01.790000
-CVE-2021-34715,0,0,9996016fe62d75c6c6faa261966e420fb04fe0af95058a4c2a640e8dbe46155e,2024-11-21T06:11:02.033000
-CVE-2021-34716,0,0,530e458bb471165951fa3969a65e6fce5984e7d752fa2a099b38f9b5ace49b71,2024-11-21T06:11:02.183000
-CVE-2021-34718,0,0,796310eed28c64b725eb3ee4f4c696314ad315061a55b383ee6495dd773824a1,2024-11-21T06:11:02.320000
-CVE-2021-34719,0,0,fe800129397a7180a38c6ffaa9efe3e5dbd5cbea71f1f0a9378f397268f09696,2024-11-21T06:11:02.477000
+CVE-2021-34710,0,1,a6b36360b2d81e39b4475977dd1fa82efa18e9db3883b50191f6d4e44119232b,2024-11-21T06:11:01.147000
+CVE-2021-34711,0,1,406251e79aea82ed985edf8034a444b3cd3f63dc0455bb447d9d09c2ed0b6e46,2024-11-21T06:11:01.283000
+CVE-2021-34712,0,1,e8da140f818e0acca7604cd9c325a84711cf3398b76bacd4fa96b634812edb59,2024-11-21T06:11:01.440000
+CVE-2021-34713,0,1,591c993c0f3f883627bbbe1e3716c773b259367f01594cf428693ea5682aa4d7,2024-11-21T06:11:01.577000
+CVE-2021-34714,0,1,db116d5966a74f8283ad7be5cf063287a379aeea320d8ad5bf6a4bf0138f3615,2024-11-21T06:11:01.790000
+CVE-2021-34715,0,1,a87f9a953592517e3133c960ef20a2c9491515005e840f5385c59ac001a579dc,2024-11-21T06:11:02.033000
+CVE-2021-34716,0,1,133873410f1502033db244b58f025beaaaccb1160aeb8db5441a7db7d16958dc,2024-11-21T06:11:02.183000
+CVE-2021-34718,0,1,1b0607d7b7961757075c7f2bd50abf39b21b615f66042489cf1ab3be5a349cc7,2024-11-21T06:11:02.320000
+CVE-2021-34719,0,1,bc8e39884b730d356300974f37b745fa8d6a0e821604fa1d9b0dd97df747ad0b,2024-11-21T06:11:02.477000
CVE-2021-3472,0,0,7ccc3bf57cc225d71b18dfa32b2acaddf84b71b17ef729e94c55bda105668131,2024-11-21T06:21:37.447000
-CVE-2021-34720,0,0,a6366743f9750792988cd85bf6e14e171e2b77e062de90717b0f342025978a5f,2024-11-21T06:11:02.663000
-CVE-2021-34721,0,0,ecdf604935e6c0af2dd68157fee70b0deb5514cd26c52fd56763522ad57cd062,2024-11-21T06:11:02.840000
-CVE-2021-34722,0,0,312a9a3c3b87aead13cefcba87fe97e625ef470ca58ceba72f895e14618a7858,2024-11-21T06:11:02.993000
-CVE-2021-34723,0,0,c331607e27f2048f6306e269d0d666190a63b51a66510b4e6326169ecbd37175,2024-11-21T06:11:03.147000
-CVE-2021-34724,0,0,4edfa7259c0c16d132eab785737e3fcf1f219f8542f2223721e7b9f9b1368ad8,2024-11-21T06:11:03.303000
-CVE-2021-34725,0,0,8232e355920ddbd69f4f2d564962396bf0aa7fec21b808c8643e41164f672570,2024-11-21T06:11:03.450000
-CVE-2021-34726,0,0,9f4f3f7fae630c20b6353f9b93efe26dff03e923a546ab361aa58b0570070fcd,2024-11-21T06:11:03.590000
-CVE-2021-34727,0,0,4772aec4ddb661f085245171cbb4cecd32a908130b8100bfecc16e0061753fb5,2024-11-21T06:11:03.730000
-CVE-2021-34728,0,0,5f40f573ef051c11bce8879e51f52729f0a583183f4fa355b41c0f8f88368ada,2024-11-21T06:11:03.867000
-CVE-2021-34729,0,0,aa591f8d9f02942a49d5af611a5cf1585ebf91f36d50800656ea5d37ff5b6b9d,2024-11-21T06:11:04.023000
+CVE-2021-34720,0,1,09fbaa28ff693427037ee5320f7f91bca961962c3ce7d7d1ec211d373e8557be,2024-11-21T06:11:02.663000
+CVE-2021-34721,0,1,0befda14f11bf02ae33be8d97b9e48531249442d1105a5dcc5219aa099584b1c,2024-11-21T06:11:02.840000
+CVE-2021-34722,0,1,bd91d6e995432065ef101a7b54cdcbc26c84046af8e9e2251a633d6aaa630658,2024-11-21T06:11:02.993000
+CVE-2021-34723,0,1,907cb3e5fb35335f87f616a9910e318b37e4440214a9aaf8bea099f9e4a30875,2024-11-21T06:11:03.147000
+CVE-2021-34724,0,1,2325e1a91cf13ce15cf62d201f7ba4361ec462ba474d772c73f848e5ff5233dc,2024-11-21T06:11:03.303000
+CVE-2021-34725,0,1,dbb433bd7e0e6153cfc29db5c40ed2cae18f3d6a1b7f6caea1a7b43dfe06970c,2024-11-21T06:11:03.450000
+CVE-2021-34726,0,1,780a93916042465ce0dca15b5ab2f0aa7da2c72563912e5949f4e6935b3c3943,2024-11-21T06:11:03.590000
+CVE-2021-34727,0,1,b7222b54765f7de293ec2eea2ab66b2cbb61e91ec90e5888012050ebc6b6b513,2024-11-21T06:11:03.730000
+CVE-2021-34728,0,1,a5c086c2cfbd0d80ed437fbbb6075557b21048ac490e812989301a5020a4a8bc,2024-11-21T06:11:03.867000
+CVE-2021-34729,0,1,6d8cb6ca187b1346fdefdc81c250ee2ea56b0d6133937f6b69078ae2ba4b42e8,2024-11-21T06:11:04.023000
CVE-2021-3473,0,0,2cafa93367278dbddfbf14971e579753616776744d4be86375457b00b3034391,2024-11-21T06:21:37.620000
-CVE-2021-34730,0,0,f1ae01d2ee2887f3405e03013585f39ebb41785254d0552d2fc91c3e60f0dda7,2024-11-21T06:11:04.170000
-CVE-2021-34731,0,0,e35a45f596901a20e1f0d55b3b7699e73ce32b9ba0139fe46ef9dcce09b2ef5c,2024-11-21T06:11:04.317000
-CVE-2021-34732,0,0,b1c72bbca62d24499911db6295cbeb96410691753489702667d2a4864fe1ad3b,2024-11-21T06:11:04.443000
-CVE-2021-34733,0,0,f1704461006412faad19b3bbf9566fb4c071a86b55558325a6bb259f092653a3,2024-11-21T06:11:04.580000
-CVE-2021-34734,0,0,13d1035b09d1fc325f32cb53de8d5e8d12c6d2722154655aa736ec4ca99122cd,2024-11-21T06:11:04.717000
-CVE-2021-34735,0,0,8544f39e4dae70d1c44ce36c8277d46ea14347d8dba3ed85d12dd8706eebb420,2024-11-21T06:11:04.843000
-CVE-2021-34736,0,0,d59e442a103eb5fa0a56c7efa8a2b23b1181b721290fb622ebdaa46d80708950,2024-11-21T06:11:04.973000
-CVE-2021-34737,0,0,69d2b20d2cd2c702fbc7c3f34affbc6d734c361d94c8c3084c0f96f9d760e256,2024-11-21T06:11:05.107000
-CVE-2021-34738,0,0,df0bfe2ce1adfee81c60448bbf065d9b75b361bcd10d7b30bbf87da91182d51a,2024-11-21T06:11:05.257000
-CVE-2021-34739,0,0,56f812a86fec4b3e5233f90c2181ac1ab6a653303778ee701c391f5a09b140d8,2024-11-21T06:11:05.400000
+CVE-2021-34730,0,1,9612837883b6dcbbe1dfea7a28fa704e488862a3cdd8042785945f934e06c170,2024-11-21T06:11:04.170000
+CVE-2021-34731,0,1,c3d6940c4784a8624273b0ff44bfd79f38aa4d328455e0b0e4dcfa9010f9b050,2024-11-21T06:11:04.317000
+CVE-2021-34732,0,1,c7cde97e203fff4b033ed798700563b7350da0db50f9c87cadca45e06898fa21,2024-11-21T06:11:04.443000
+CVE-2021-34733,0,1,c29c759f84dfaa44b841ec4155ddf2afae91cc80975408235a08fa11469579e4,2024-11-21T06:11:04.580000
+CVE-2021-34734,0,1,f79039650f12b7af1d90941e5dc20f604c67d0ca4766a64b0d20f5310898204e,2024-11-21T06:11:04.717000
+CVE-2021-34735,0,1,c9ee82b7e7b958290ef3f01e5905c54d7f0185efede21415d4511528686d1e89,2024-11-21T06:11:04.843000
+CVE-2021-34736,0,1,198f4e57c095bfa9f3991fbd42aae5425242ceb298a9ab5d2f84d94aa0598288,2024-11-21T06:11:04.973000
+CVE-2021-34737,0,1,09c235aa671acdc8882b5a59c6fe21f94e5d98ede9814e6a1b4ca54c0342e00f,2024-11-21T06:11:05.107000
+CVE-2021-34738,0,1,5f9d670b9176aecad8719fe8f45effd3c5cd0ba9c286f92f7a38236a4c19bf56,2024-11-21T06:11:05.257000
+CVE-2021-34739,0,1,40e6c0ce497e9193c0d0ebabbc1f279d0912ee74a7d996813aa87ed52e35bdd3,2024-11-21T06:11:05.400000
CVE-2021-3474,0,0,d4f6181f7a192119ca33fa440ebc361a482e777fa757d590ed8ca6a3052dce04,2024-11-21T06:21:37.787000
-CVE-2021-34740,0,0,f9cc2ace959c60dd4381c83c26e2f0278f1269d567dc424731f69ddda5c904db,2024-11-21T06:11:05.760000
-CVE-2021-34741,0,0,ddd62f42ce65b7960883f8117708d17f0e6ed06f4a12c0dc016158854d6fb173,2024-11-21T06:11:05.927000
-CVE-2021-34742,0,0,5f5473a95320afd5500a526de7546480b12802e4d576de4f8334b372d15e50af,2024-11-21T06:11:06.070000
-CVE-2021-34743,0,0,96779a03f7d3ac97e95b9d03d315353f92d92b0e56861272ad1ca653195188c3,2024-11-21T06:11:06.200000
-CVE-2021-34744,0,0,a6428757981395b25cd0cd1d15ff7a86c42c74f18227078ad51757c9d78ac1ba,2024-11-21T06:11:06.340000
-CVE-2021-34745,0,0,20145efce28d1980b5c218667d2b3dbefe7a300e146f3b09464b6b82ae96faac,2024-11-21T06:11:06.493000
-CVE-2021-34746,0,0,7f726b058c754ec0a8b3ac508e4d501e1f2d39839e06d2303e373fc2c0f3577d,2024-11-21T06:11:06.627000
-CVE-2021-34748,0,0,50f69444fc29fdc799b451a986f0c7eaf48be0bd9355b02109fa766cc48cdafd,2024-11-21T06:11:06.760000
-CVE-2021-34749,0,0,590872f762f9eafca0be1bf616e18359be052eff622e4074efc8183b27122f6b,2024-11-26T16:09:02.407000
+CVE-2021-34740,0,1,f5c2b5c3f1038997ab68bcadec4b1f71111dd48c7e8befdb83dff8ac001af82f,2024-11-21T06:11:05.760000
+CVE-2021-34741,0,1,fc185aad77fa7eb436b528cc1a32a9a2677b200d826d26b572ae2cf9799a6f5e,2024-11-21T06:11:05.927000
+CVE-2021-34742,0,1,e24a0882d2c8d2c9649355b74a2cda1b791cbb12a6ed84099600624a5a7dec6f,2024-11-21T06:11:06.070000
+CVE-2021-34743,0,1,20844bc4920897f5dcbee4f7e987a994739193db0928328832c96fdce020dcc4,2024-11-21T06:11:06.200000
+CVE-2021-34744,0,1,6df49b17a10fb54f32187d6a0ef5929628bc0b4313d8e7bd82c1952dd5ab1f45,2024-11-21T06:11:06.340000
+CVE-2021-34745,0,1,ccf56aa05b3f88cc13384b52aefdd824b537f63495e9bc375ab23780519db100,2024-11-21T06:11:06.493000
+CVE-2021-34746,0,1,97474424d7c015c90315f44547deb19b511a94c636d93ec424be8fc968b57d20,2024-11-21T06:11:06.627000
+CVE-2021-34748,0,1,b016c9af88693b1040ff57d87f770cc6b16426d4642e28b694b7f3f8e23d28a4,2024-11-21T06:11:06.760000
+CVE-2021-34749,0,1,476b9a3e2276d8cc62dab11b569cba53178867ad4b20ad2ff106134c80349f7b,2024-11-26T16:09:02.407000
CVE-2021-3475,0,0,19599b7c5e85426516ac8aa6da67ad2cdf84f55eec352cd2571bc0fe364b9ecd,2024-11-21T06:21:37.953000
-CVE-2021-34750,0,0,7b322c442fa165663c15ea529c0abe35ba43f91f5b0f84d4859974451c6f04de,2024-11-18T17:11:56.587000
-CVE-2021-34751,0,0,335510031dd40242327e9c661e971cacfa2b4bc76adef474ebe4f34daafcda78,2024-11-18T17:11:56.587000
-CVE-2021-34752,0,0,a170847e2139787d2ac8f3d339182d3d99096d6d00ccab3c5ce9a33b604d8dfe,2024-11-18T17:11:56.587000
-CVE-2021-34753,0,0,78d9edbcef75ef8789db2b341631e57e3602130434da1351db8cd54548f4c17a,2024-11-18T17:11:56.587000
-CVE-2021-34754,0,0,ba6f0f5c576025a33700f93c05ed4a60ec5cdae6bd0cef2deb9f4e8ebb64f7a5,2024-11-26T16:09:02.407000
-CVE-2021-34755,0,0,21e44ca55beea7c16d96bb05fe8f07c925ddf5fea8f9b75698a20197bbc78ab9,2024-11-21T06:11:07.580000
-CVE-2021-34756,0,0,e3c9a7b6ef690243f403be46a54787a7ed4cb99bd20e47549992db2e1bf9dcdc,2024-11-21T06:11:07.717000
-CVE-2021-34757,0,0,093e41cff3d0f7c15c4d890067c30dc1d64bed34ea0d6d8c4630b1663ac1dfd4,2024-11-21T06:11:07.857000
-CVE-2021-34758,0,0,a2074309e9ac5b4c705ac85e8265e7486c7b7d34124d22cdcbc3502e21fe4d38,2024-11-21T06:11:08.020000
-CVE-2021-34759,0,0,35695ff2c884e4e421a0ad04bf9dd33b0316cd7f14e6989cc4bfbfd7dd0e7cac,2024-11-21T06:11:08.153000
+CVE-2021-34750,0,1,b06f6b404dd745ee1b5e5be971d32163efee2e25b0cc8032fe2ec9a8db3acdf0,2024-11-18T17:11:56.587000
+CVE-2021-34751,0,1,f9f5e92a8e2c62c1ed419b54bba643b2d49f1ca45eca63b7e01aa7797e6d24ae,2024-11-18T17:11:56.587000
+CVE-2021-34752,0,1,9d1689ce075bb6f0702f300aa96be12b191a17aff3f0180a5557b8034f35d092,2024-11-18T17:11:56.587000
+CVE-2021-34753,0,1,caece5d323c5f06bbda67c68bf4e4a7c2f223e197b5351e35ac69194941b2127,2024-11-18T17:11:56.587000
+CVE-2021-34754,0,1,e39575bf15ef88a04b8bb8851821d990cbe22d7eaf02e736638014ad1399faa8,2024-11-26T16:09:02.407000
+CVE-2021-34755,0,1,ad86a6f1c4f12b148c6048a16fae399a033e16026e95115b0dccdfdbfb7d0341,2024-11-21T06:11:07.580000
+CVE-2021-34756,0,1,f9cb8501ea290d90f7bcf72318306f4bb36e612001ac286da51d8ab0284e4c92,2024-11-21T06:11:07.717000
+CVE-2021-34757,0,1,775b82d7f972bb42cb97b3321011745a480e5c73ef0c8be700ec4ad86a57369b,2024-11-21T06:11:07.857000
+CVE-2021-34758,0,1,f1a2c5dc36f639915ba56d78018382735bec9b0f8926afede7a30d70390e6a52,2024-11-21T06:11:08.020000
+CVE-2021-34759,0,1,f86a2a0cc3b411493bc3743cd7a650d19fa52627ea3736fb161ee58d724562b6,2024-11-21T06:11:08.153000
CVE-2021-3476,0,0,061920b549fcc72f211e20f1eed066bd1d8a344962b5dda5da5617bc6cc12477,2024-11-21T06:21:38.110000
-CVE-2021-34760,0,0,061cf3a97cf1d3ac88ba7463e73191b84dacd011419d930d9a05aa95f053aac3,2024-11-21T06:11:08.317000
-CVE-2021-34761,0,0,b889c27b2b21cf90fe402204dc09f48df660fd3de80d9dbad0fc0d1c01e62e41,2024-11-21T06:11:08.453000
-CVE-2021-34762,0,0,643a4b59c6f5fb61ab340740750b24d19da63243a43d2699234bd74090fffe12,2024-11-21T06:11:08.593000
-CVE-2021-34763,0,0,50339dccab2ab30306edec9e2abadaa596c0d848cd11ac5a2447215a1cc23aa1,2024-11-21T06:11:08.737000
-CVE-2021-34764,0,0,eef1e819fdc7526923214c542c717e5e3ad7efc5c43f496a6c42791ab29f2963,2024-11-21T06:11:08.880000
-CVE-2021-34765,0,0,a485ea061fe810812aa4992f4c41fb30e91f6b90e15e686c7f7fe000395afa92,2024-11-21T06:11:09.010000
-CVE-2021-34766,0,0,d5f0a1de3ce26079e676f7f1adad4d552aa8fb5d8cdde413fdfbbd7e67d6f17c,2024-11-21T06:11:09.140000
-CVE-2021-34767,0,0,96a7c50a5022d3c2d7be463b22375aabf9059bedfb167620cd9d012660fbabc5,2024-11-21T06:11:09.273000
-CVE-2021-34768,0,0,aa24e857ed1bd128f529d7af71e3a9bfda18d7632975ed5a9e9b7d8d5ad49b85,2024-11-21T06:11:09.420000
-CVE-2021-34769,0,0,8babf854262e4f5d0c7baba792072f465e871a1feb0931b62875e408b606b556,2024-11-21T06:11:09.563000
+CVE-2021-34760,0,1,4286882e0c46c471825bf505a3eb01214d8a2ae96f3e3713b4836dcd13eed5e8,2024-11-21T06:11:08.317000
+CVE-2021-34761,0,1,265b5aca9ac1fbc6b8a2ec94fc2a772fb914dcf2f54e795e6ce021011afb8e3a,2024-11-21T06:11:08.453000
+CVE-2021-34762,0,1,22f3ca7af7d03d5f80a5fa349c967e3f21647669834a7aa891111f3e96d84588,2024-11-21T06:11:08.593000
+CVE-2021-34763,0,1,618c382ce60b9c42b00a6032d67612777d1217a222f3bc66ec2760ba0de8f05e,2024-11-21T06:11:08.737000
+CVE-2021-34764,0,1,8692f584cbf4ee6f01958ddb54b256432b96ec3e10b042e1fce3ce7995fde5dd,2024-11-21T06:11:08.880000
+CVE-2021-34765,0,1,71d263faa4ad0bdf5795a421919fc190c1d822e15c1799ed758f079f216ef694,2024-11-21T06:11:09.010000
+CVE-2021-34766,0,1,6dca4e2d5dcd9c930e6619b1aab436f24e5e20fe65364b039eb2a68fcebe2438,2024-11-21T06:11:09.140000
+CVE-2021-34767,0,1,a383fb2f11dbcf02da6c64f1e72977c3c18073d379cf14881ce296ededdca2a5,2024-11-21T06:11:09.273000
+CVE-2021-34768,0,1,4849d2588dbf4680af40c21b5598266a6f66dc65cc97e714e12529c9a96a71d1,2024-11-21T06:11:09.420000
+CVE-2021-34769,0,1,5b68e295f21e102d0b63544642f6adebfdb233f1ccfb026e07b8898fc95919c8,2024-11-21T06:11:09.563000
CVE-2021-3477,0,0,9c433fc6cc6ccc074d7fa7e996183bda6e7a8253bf057acdd4e3b0a4700d1390,2024-11-21T06:21:38.260000
-CVE-2021-34770,0,0,151e01ace6069ce442958a691c985707d15baa4db46d6d72d97a7261df7e33ff,2024-11-21T06:11:09.703000
-CVE-2021-34771,0,0,ef99545ffc93d7901666a4d0dc88797f464869f283c386ecb15bc1aa2c2d8597,2024-11-21T06:11:09.843000
-CVE-2021-34772,0,0,61189a7a59cb032c47ff79fc816e5a2d59384ec2d3ca37e705d616e966dae634,2024-11-21T06:11:09.973000
-CVE-2021-34773,0,0,ec8184b24962e6d93dcb8dc029a7add41f3e3616105f1d8a3ea5958c1a5c5013,2024-11-21T06:11:10.097000
-CVE-2021-34774,0,0,1ecfc9b527f18f2734a304afb9da6337cd83314d77bf747c488fdca908195cce,2024-11-21T06:11:10.223000
-CVE-2021-34775,0,0,a03f9ac07d5b67c800e0c8dd2e8e3b01c6ed85e9d86e4f9cc5e1bd2c76098803,2024-11-21T06:11:10.350000
-CVE-2021-34776,0,0,68d84d0c3e64547f3b78d2c22c95b14b987bdb18478d92e323a67e941e25a0f4,2024-11-21T06:11:10.490000
-CVE-2021-34777,0,0,d6853f34501831a4f4581adf48e987e7d189caad3380368817531a6a5dbe0d9a,2024-11-21T06:11:10.650000
-CVE-2021-34778,0,0,5233d7966e14967544c698142df256d3135f51ffc1bd4b5ff672b8f5ddc213e0,2024-11-21T06:11:10.847000
-CVE-2021-34779,0,0,3ab001830c8f0acbaf33ad677fa3267ce0bd75e64a6de55859fb0e6fef12ab61,2024-11-21T06:11:10.997000
+CVE-2021-34770,0,1,ead97b3639f9df97d072d342f22673b8698606a367bbf6bea5b41982f4e3e44b,2024-11-21T06:11:09.703000
+CVE-2021-34771,0,1,8859147e84b249334c7de46268af1fcf8c9c09bde4b93bd41cc8f09f1b39b362,2024-11-21T06:11:09.843000
+CVE-2021-34772,0,1,63dd4b79f64a09937d07fbfcfa725340be1aef6e5ef8d8cf12e362d403ff4638,2024-11-21T06:11:09.973000
+CVE-2021-34773,0,1,86f7930d4aaa3436a5012d6350e790cfb56ddc668cc8dd5899b2cab2a97b80c4,2024-11-21T06:11:10.097000
+CVE-2021-34774,0,1,5e5be1bc5cb88ef742541e556436eaff8cc079a1f6ab76103190f19899273ec5,2024-11-21T06:11:10.223000
+CVE-2021-34775,0,1,9bf323a7a5cb71bf830acb86d245de77dc14cb80e69a079d0851ff9f22f32a18,2024-11-21T06:11:10.350000
+CVE-2021-34776,0,1,5cc86951f92ed292f9a2284fd9c76166e9d8ba24a389e9a5d18d4d2b9923a2c1,2024-11-21T06:11:10.490000
+CVE-2021-34777,0,1,785aabd6292bbce0a390a95a44ac53ce3fd761c468a33cb929c2f5bd69c2671a,2024-11-21T06:11:10.650000
+CVE-2021-34778,0,1,9cad6e451c6a16d398f441ec1d084d64c7f8c9131e27b92a7462e47fe4e2acc3,2024-11-21T06:11:10.847000
+CVE-2021-34779,0,1,c746a18a6ddd353983e01947e4ac330625ecac8273ca58ecd087e576b8d600ee,2024-11-21T06:11:10.997000
CVE-2021-3478,0,0,60423a769ca8243c7c67f9eec1f5de0590008b4fb5039a61420db3f0eb85c1a7,2024-11-21T06:21:38.417000
-CVE-2021-34780,0,0,8dda19a367b801439826f3a0ff98f813def7583ae50536d43731d67f78907327,2024-11-21T06:11:11.140000
-CVE-2021-34781,0,0,fa19b5c569e54e3720544f99b88f72bb855d0a24c00a68eb02294bc97a5e582a,2024-11-21T06:11:11.290000
-CVE-2021-34782,0,0,cf88eb94639b24b811f0df880a089a46114fc199ca7c621f74499568aae34626,2024-11-21T06:11:11.420000
-CVE-2021-34783,0,0,e1fdd950f642e385af5ad77802e8cc1710a872ecc38af7dc069d5be23f9ceaa5,2024-11-21T06:11:11.547000
-CVE-2021-34784,0,0,af3d1b90867ac1152c5aa7bfc4602e5438de994e1500ea77b794dee9f6e1811c,2024-11-21T06:11:11.693000
-CVE-2021-34785,0,0,1343850476ecf3df2a14c66300a12e01af51a87882796bd2de0c64d47731588e,2024-11-21T06:11:11.833000
-CVE-2021-34786,0,0,28f650cb781c165167db74b3cf744dd158b66b13ec5440e4c93899ed0a3e928f,2024-11-21T06:11:11.963000
-CVE-2021-34787,0,0,3859d6cf01a8de3f836e9620f3e6543143e7eb7f50bfef477c7d5bda4707542e,2024-11-21T06:11:12.123000
-CVE-2021-34788,0,0,bf1c38afe6c09e6bb8debbd3d159fc2d9ce885f01a6ad5073ff35046f9ebdb1d,2024-11-21T06:11:12.287000
-CVE-2021-34789,0,0,7dc570a9bf157750559a4648230e669349d8365934682d5878c5c1f6adf51759,2024-11-21T06:11:12.430000
+CVE-2021-34780,0,1,033c62c4242f4e2225ea4e5cb51033082b07dcff1ffc0a8d13cae057d1114083,2024-11-21T06:11:11.140000
+CVE-2021-34781,0,1,30e3ef947876089217bfa864e20cc161cd78194c0d2719e43154302cae7b5790,2024-11-21T06:11:11.290000
+CVE-2021-34782,0,1,38ab8264f6059fffeaad310a6c25281700129fab101b52b3e103cc3d8b6e2ed6,2024-11-21T06:11:11.420000
+CVE-2021-34783,0,1,8a7b2ea2b94df22abcf4b9f3ba94c83d3db6c9286cd88fe9e67e2a75c054d92d,2024-11-21T06:11:11.547000
+CVE-2021-34784,0,1,d2eb6cd251343248af94eda7036deb95decec6db3e335b5f16c2c5ac9ed9934e,2024-11-21T06:11:11.693000
+CVE-2021-34785,0,1,93237965c4d3d9f89b62ddb0be7865f2c64c56d94bc798896eac27b0d60d5eef,2024-11-21T06:11:11.833000
+CVE-2021-34786,0,1,2f3892bfebe72350fec8f511efb9178c374fc3cb025ab733c0b2e11862032147,2024-11-21T06:11:11.963000
+CVE-2021-34787,0,1,eb5bbc788f473bf4c5bbff71c758155c65ca7b01c705c58f04cbe2fc421eb8fa,2024-11-21T06:11:12.123000
+CVE-2021-34788,0,1,1f5ee2b9c374903cb11430e701493789b53bc841ae1182b21d9f86847f424889,2024-11-21T06:11:12.287000
+CVE-2021-34789,0,1,a98417b8a79aa6cc8f3d3b0c0aa18543ea28c015cdb6d25d407ba7c33f9ac0a1,2024-11-21T06:11:12.430000
CVE-2021-3479,0,0,cbd165c7fb5b24b1304ea458deb9aa1b181400c58978fce4df5878331ca9e3dc,2024-11-21T06:21:38.567000
-CVE-2021-34790,0,0,808296d09d8da8e65183ae2b9219190379c0d66fcef8e277a77e2fb07becac85,2024-11-21T06:11:12.577000
-CVE-2021-34791,0,0,5bf4baf3834d82ffd5838d8c935c9b70e159b3e1a55b4e2a2c2cedf3ec56d633,2024-11-21T06:11:12.753000
-CVE-2021-34792,0,0,8ff1a7303879a8698bea1adba71ec635e52b0db6a36e2140136041ecdc54045a,2024-11-21T06:11:12.907000
-CVE-2021-34793,0,0,5319accae13f82f6032fa4ccab6dcf514c3794e82296a421b01bfe02e5ba881e,2024-11-21T06:11:13.063000
-CVE-2021-34794,0,0,ade09ff7c5894614c7792a39582c7a31bdd19832eb705b44149a084b24b3c998,2024-11-21T06:11:13.217000
-CVE-2021-34795,0,0,26e89c6f2b0e52e3fdb912642b072f3443e6b3236b14499cc6457e8a516a26f4,2024-11-21T06:11:13.380000
+CVE-2021-34790,0,1,e0b242c8676bdfc77cd62772d4647f8002aac73d9b29a865f257997e52effe8a,2024-11-21T06:11:12.577000
+CVE-2021-34791,0,1,80a844fa98df97605fbdf2f94bcf8f94d20c3c0baae4ff5c3ae68ecc488cdd9f,2024-11-21T06:11:12.753000
+CVE-2021-34792,0,1,9cc334e6aecf5508906ac66b5a5fd4ab2401c79aa02190fb95afca0fb821e717,2024-11-21T06:11:12.907000
+CVE-2021-34793,0,1,6e61e2684964933d20abc76a2a49c569e51bd7d1e3fb6676be76da2a8d22f0a4,2024-11-21T06:11:13.063000
+CVE-2021-34794,0,1,55042e1778ea538148a097415cc17a9f234b2f984bbfddc82cd921aaa7df5520,2024-11-21T06:11:13.217000
+CVE-2021-34795,0,1,52a8d9fcb35eb404c3d1188738aa483172601c38d46b95386edd6e6cd34a3bc7,2024-11-21T06:11:13.380000
CVE-2021-34797,0,0,c72aadabe0e880591dcfaff27311ee2037a4e1c8231f5d39b805a2da252a4892,2024-11-21T06:11:13.520000
CVE-2021-34798,0,0,d369e7ee6b74716e6320d5085ae266770859c9b4c069f08e8b725758e81ceb94,2024-11-21T06:11:13.650000
CVE-2021-3480,0,0,898c0dec0dcbe904c9268149716b1e4e2886fbd1b7452b6098b5a5b234722a87,2024-11-21T06:21:38.703000
@@ -182348,26 +182348,26 @@ CVE-2021-40109,0,0,ffe95729390e2fad36a641dbf481b8583998d582cd3c9e1fea90c8e151f4e
CVE-2021-4011,0,0,f22a6fe196fe23ff438b932da5570775d4fc0f078fa9cc6d281a4c7c1d6e3200,2024-11-21T06:36:43.303000
CVE-2021-40110,0,0,684a272959f1c9ba3bab8528052c99ea4953b2cb61ebfdcde8b3c87d4c5ffe16,2024-11-21T06:23:35.337000
CVE-2021-40111,0,0,e08e44685215a8cc4e7929fd7fd5b755226fc181db3cb73861ff5037e26ced12,2024-11-21T06:23:35.487000
-CVE-2021-40112,0,0,0257ebf08c4975d2036913b9173cf237485dbfe7478cbae285b030d00fc043f1,2024-11-21T06:23:35.620000
-CVE-2021-40113,0,0,a9b18a7955426c35ef2750b49d8ba6e3eac4fb15a4a50ed53199b4336816c312,2024-11-21T06:23:35.777000
-CVE-2021-40114,0,0,e81be57fa9ab36d5503f2d86a33ad5b39cab9ea829a894271336989e2086b665,2024-11-26T16:09:02.407000
-CVE-2021-40115,0,0,285a3fdc2bd8d8c8fac18ac1786ea8bd9e2dd9e2f82395d806903f936f03cd2b,2024-11-21T06:23:36.070000
-CVE-2021-40116,0,0,f1aafc94d396d76e078c11fa944288f5b0619a54630541275ddd9cdb9f7017f1,2024-11-26T16:09:02.407000
-CVE-2021-40117,0,0,6c3e997fbe6717d3ed4a514b48e3f7989491dde54b6d5899e1900cbe5495dea9,2024-11-21T06:23:36.370000
-CVE-2021-40118,0,0,60ec68fc31aac2554d0d4325f5da260ffba9c64bb41e1ecded106b8f461993da,2024-11-21T06:23:36.533000
-CVE-2021-40119,0,0,03e416b6797a88eea52cf5117b91a52502dfe51bc109ffe4d7b8ba45795ca7bc,2024-11-21T06:23:36.720000
-CVE-2021-40120,0,0,253f761281930c296fc426f9e4541f84e2224e7465b830ce36569d751df2e88e,2024-11-21T06:23:36.870000
-CVE-2021-40121,0,0,0eb1bd81b9676e66a420f07e8d3b8cbc9e1ffcfe785cb1cf63fcf57c46ce4d0e,2024-11-21T06:23:37.020000
-CVE-2021-40122,0,0,a510d53859242a850ce3aae6d99bd8d0e3bbec62e4217e14794a29a160126599,2024-11-21T06:23:37.180000
-CVE-2021-40123,0,0,79e61fc1204da336a48ea8cb26b59e981481415bd6dcf2dda17136e451706d1d,2024-11-21T06:23:37.337000
-CVE-2021-40124,0,0,5cff09b927c5d9417593045a518a5e78dfef41f89182276787686f6cd31aaaaa,2024-11-21T06:23:37.490000
-CVE-2021-40125,0,0,edf4db17f31d1e39c5665c78f800feccb67f09dae75f4ec35c4b4d841ae0f033,2024-11-21T06:23:37.697000
-CVE-2021-40126,0,0,4e2c1ec4fe8548bc63c435804b52be02d09f992c1ad81e93732eacba69f8046a,2024-11-21T06:23:37.870000
-CVE-2021-40127,0,0,0cbb67105dd40c95a69d43b113be6e712f0cdbf7d199e5dd1faf1893cf0989c4,2024-11-21T06:23:38.027000
-CVE-2021-40128,0,0,caf1d2ae68cb32eea1bda11d581a3a6c57040c852d5378220707a153f36c97f4,2024-11-21T06:23:38.237000
-CVE-2021-40129,0,0,a80ca202a85dc5bf6325c436aac7025a03c55aeef20e8e905b759e447253badd,2024-11-21T06:23:38.390000
-CVE-2021-40130,0,0,0573cc90707ec7f8758109461c280475b10be8891675c25992ba951b0822dd86,2024-11-21T06:23:38.547000
-CVE-2021-40131,0,0,97f578326f0bcad6ad50bf5c1ab9ffe560ac0f32b037bd69151ac10f825e79fc,2024-11-21T06:23:38.703000
+CVE-2021-40112,0,1,5616bdcdbd4b9d7b85975c1f660112db3d27f2f1fc3867de8df67391db29c9ff,2024-11-21T06:23:35.620000
+CVE-2021-40113,0,1,bff78e51b2c4f86f3a6d131fb16fef328d3cc7653599b4571b22ddcd914329cb,2024-11-21T06:23:35.777000
+CVE-2021-40114,0,1,62989bd07400ced559b87d313c68b1a9bdac9c87c06f63bb8994b7d28fda2f53,2024-11-26T16:09:02.407000
+CVE-2021-40115,0,1,c7775925d248f9142c29ff4c5db06720f21f9b5984f11a39b41fb447ab918712,2024-11-21T06:23:36.070000
+CVE-2021-40116,0,1,5f4d22e76e4734fa1dafbe822a2a937bd4079e632f1cd7fc737369c88259478d,2024-11-26T16:09:02.407000
+CVE-2021-40117,0,1,7f198a9e293f27301f8241652dd8a13f7f84b702283add27d2da71e8a589124b,2024-11-21T06:23:36.370000
+CVE-2021-40118,0,1,76e0dc79e5a56532a2b7dcdc9c08ef149a2f3f9d1985309ddd93ed4dab28ccab,2024-11-21T06:23:36.533000
+CVE-2021-40119,0,1,be29ce005df395024519012594976eb44059977db38640a53e54180b4fd79818,2024-11-21T06:23:36.720000
+CVE-2021-40120,0,1,14841aac5fc004591d9658b693b0d8829508bdaa777e409b219dda35387c75db,2024-11-21T06:23:36.870000
+CVE-2021-40121,0,1,4f803ba667dbfb6e5ab8e0a2fbf9f453da96149244cc0dad8c0bb07b45b379a5,2024-11-21T06:23:37.020000
+CVE-2021-40122,0,1,8d19002e2e58d87fc671627c7c1c720e69aad83410ed3c9ddb701c2f88400bba,2024-11-21T06:23:37.180000
+CVE-2021-40123,0,1,acf2eca5d73a4075f097801043f1e7227e69b649dd863272b67a4ee529bceef8,2024-11-21T06:23:37.337000
+CVE-2021-40124,0,1,af05e8cc5019d5aea6b1f964e495034145d0d86cf5a0433597e11cf5788d2933,2024-11-21T06:23:37.490000
+CVE-2021-40125,0,1,6362e48b32995c4d6f752bf5ebca78829e9d185f0f071047f4048772cfe5d35d,2024-11-21T06:23:37.697000
+CVE-2021-40126,0,1,0c4224483484690ea9357a86dcf205f6a8dd513e0e6a9a8690942f8b35bac0f2,2024-11-21T06:23:37.870000
+CVE-2021-40127,0,1,dd9f2f2c87b603737feccdcb004567583eb559098cbec2f9fc32461f2e389142,2024-11-21T06:23:38.027000
+CVE-2021-40128,0,1,7a502f8a1c17a57d01f09d35c0769c906986a61d7ef41f86f398df8e7141a79e,2024-11-21T06:23:38.237000
+CVE-2021-40129,0,1,fea5281c9399acc8bd2f771e9bc9b880c2b97144fb1bcacb1cfc935cec8f9385,2024-11-21T06:23:38.390000
+CVE-2021-40130,0,1,8ac5c6a340802985cc07375f078f755fb418f7ec34aef76c18ff96ef0382d629,2024-11-21T06:23:38.547000
+CVE-2021-40131,0,1,1c09f85d701fcf8f1e4cbfc01c2d1f15237f692aa092eb46a5089fa0de4f1e4a,2024-11-21T06:23:38.703000
CVE-2021-4014,0,0,b1f93cc88545cc69c9ce25fb9d0ffaff5af63a41fa605d82017aa4ccabf60d3d,2023-11-07T03:40:06.160000
CVE-2021-40142,0,0,aba71cc907cb9a58b045abfe265b45d6932cf73e737081c542a891b7e6665adc,2024-11-21T06:23:38.860000
CVE-2021-40143,0,0,081d7d8c18f8efc925a3a9b1cecd7af085c1be05784b497649f34a10eaa0a6fa,2024-11-21T06:23:39.053000
@@ -187404,7 +187404,7 @@ CVE-2021-47179,0,0,a8b6b384d1d3dd4500e62419e8055586dec0b9099243b3a6cfff7cfb16fe0
CVE-2021-47180,0,0,04d7ef49a6dbe27745e9ac88054127415a124aa60051eed7e0cd4e5e824fa8ec,2025-01-07T17:17:24.333000
CVE-2021-47181,0,0,c987c8c832cf3c59bca5d287fe34238d65206d3d339884f075eab0b776cf4e0a,2024-12-20T14:31:22.240000
CVE-2021-47182,0,0,639ad06be2a6517cd3152f844460c6d89d5631a9bb3a9b0d16574f25f9340342,2024-11-21T06:35:34.437000
-CVE-2021-47183,0,0,0e63e98ae71d7513627535219339cdc1c7ccd75d9d5a94c4dc3b6c8b7e3d0c50,2024-11-21T06:35:34.553000
+CVE-2021-47183,0,1,a9bb398532188a17f9d9e7e29a9240ceb3bcc107d2c5780a8514f84cafb3d1b7,2024-11-21T06:35:34.553000
CVE-2021-47184,0,0,d3f6da044f20b443e32a18293da1d6a01b702e6354de9a5b57ed13aafdd07dd1,2025-01-14T16:41:58.690000
CVE-2021-47185,0,0,45623a7520c43f2a5e6e681d610545dca832cc64c1f9e193f4443e9b4459ee0b,2024-11-21T06:35:34.797000
CVE-2021-47186,0,0,a394c86f0d639d2ea19b5f4049d6893cfec880c1b84d050667fdab1792f266c2,2024-11-21T06:35:35.017000
@@ -190384,385 +190384,385 @@ CVE-2022-20619,0,0,1b2a0551e37eb8c00d54769be69e72c28d9709d19ad38356ea9ed8bd3fc2c
CVE-2022-2062,0,0,e2962c75ee6f89e86b00fc7544c965465f2994a14370121612200eb6a2f4023e,2024-11-21T07:00:15.363000
CVE-2022-20620,0,0,bc2c56136171ec63801fa817c2060b92673c3e788ae63d1a4a2f0ed9c9a519a7,2024-11-21T06:43:10.520000
CVE-2022-20621,0,0,e571a0cfcaf6dbb19e256fb0ae74d765e3bce0585614c88e77062193c005c812,2024-11-21T06:43:10.647000
-CVE-2022-20622,0,0,cbfbac7473da3c9b4af40fb70d27e37ba56f4074bc8d5a6e4342a1be04c23fca,2024-11-21T06:43:10.777000
-CVE-2022-20623,0,0,0e0055bda7768ea09fdd174e2fe21984dc819e4f2e26e41e7506f522815b7d5c,2024-11-21T06:43:10.913000
-CVE-2022-20624,0,0,b51416493364e52c1f51c8523a3773b0f041cef50b003123bbc69ff81774a262,2024-11-21T06:43:11.060000
-CVE-2022-20625,0,0,86bb313d9253cd177cace775fa551a26e34cf4f31806303823b7fe9ef4cde5a4,2024-11-21T06:43:11.237000
-CVE-2022-20626,0,0,46cd9b29e375edcf8bcd433f1759e54a285d24995a3ffea6d9b5a1af082793be,2024-11-18T17:11:56.587000
-CVE-2022-20627,0,0,4f611871335b734dff4706cfcdbfb67c389db6c51ed2b9048ae450ce791fe7ff,2024-11-26T16:09:02.407000
-CVE-2022-20628,0,0,96a61be8adf6ec78c7c97ad1ae01c2bdb71477304c3e85f7783f3dd1065cec81,2024-11-26T16:09:02.407000
-CVE-2022-20629,0,0,0809fa5ac437434bd41a80fde6914141fc9f41a6a0235ce810cbdbecfde31b69,2024-11-26T16:09:02.407000
+CVE-2022-20622,0,1,6f89f4370a3eeb61f16dc7632a05c5a2721b75844df1bba233b9fe99ab11fe06,2024-11-21T06:43:10.777000
+CVE-2022-20623,0,1,c888a7241b86a91ba512c8637846e9ea6c3d69ee7b9a2797747005ac0e515d11,2024-11-21T06:43:10.913000
+CVE-2022-20624,0,1,9b98ec83ef7e57342e9f033c7d131714737b4c244e0c34ec25365cd0fba42f66,2024-11-21T06:43:11.060000
+CVE-2022-20625,0,1,c0d00e0dd5698ac5b0befd5eea351526cac6417c77c5459e41c03fb71be900b3,2024-11-21T06:43:11.237000
+CVE-2022-20626,0,1,f27f045e748bdd58f51f6c768e53bd093525efd7be97c17f36c8528c8f691e5a,2024-11-18T17:11:56.587000
+CVE-2022-20627,0,1,01bd972d554418795c2cbceea0d703fbfa280d715b73c0f4433447837fabfc8f,2024-11-26T16:09:02.407000
+CVE-2022-20628,0,1,fc7ce5607aa84759b2d96217987d5514661e549973f62910a0a13ee1b34dedfb,2024-11-26T16:09:02.407000
+CVE-2022-20629,0,1,47a93a0ca43a7ea490b6e364835f20e15d54b7716d3ce60228b6b923cac45abc,2024-11-26T16:09:02.407000
CVE-2022-2063,0,0,b76259f1d9a1b3b1e39cec4ce8db00ea41befcc4ab98f6c1c4badb495293bb48,2024-11-21T07:00:15.470000
-CVE-2022-20630,0,0,733655076af5895cc8de812b604ce4a4ad83fae2799d44f7164c04e386bf2462,2024-11-21T06:43:11.887000
-CVE-2022-20631,0,0,e3c4a1fb579c970f9799a293229a72b1b78b9b222ebbed7769b732f4bae20bdf,2024-11-18T17:11:56.587000
-CVE-2022-20632,0,0,e1e6083cc7546e39d60172530dd15ad28be9d96574129f393984c55924b85b1b,2024-11-18T17:11:56.587000
-CVE-2022-20633,0,0,b86890c5d016a0c7a5d941eca077ba584f9d45c59b78b78d94fc1417e08c4ae1,2024-11-18T17:11:56.587000
-CVE-2022-20634,0,0,d8cec71126c358cbcb5f033929e4e3722125ae77e43b55a6e98351cb12fb3456,2024-11-18T17:11:56.587000
-CVE-2022-20635,0,0,7577f23cfef6db3cb65a6ce49986e45db42582982622b624a46a2e36b7ce58b8,2024-11-21T06:43:12.353000
-CVE-2022-20636,0,0,fcaefbae9bde4bea6c64700528c514363fdaaf9eac3f145eb4964746219289a5,2024-11-21T06:43:12.483000
-CVE-2022-20637,0,0,ef74b7b87fea8e1f7da903ae330404c5d3549d70cc84242305ff3bd87f6e3b6d,2024-11-21T06:43:12.610000
-CVE-2022-20638,0,0,e8bb05e04b2f1603ff14ebc847120e4bf8661596fa5f622dcce18d1eec933df4,2024-11-21T06:43:12.737000
-CVE-2022-20639,0,0,359a46500d76904f258c270fc1dbe2917b0fa5f414c717590dc0573088fd1efd,2024-11-21T06:43:12.867000
+CVE-2022-20630,0,1,5725b31326fac3ee36837956e3a06e5e777654a78ecff25242d9b78dd06c3e05,2024-11-21T06:43:11.887000
+CVE-2022-20631,0,1,d5e6cba3d52776201ad34e64370c5bc856a7f61dd8e640109361a62279f217d0,2024-11-18T17:11:56.587000
+CVE-2022-20632,0,1,59c15d8ce387a47ce6bc4e571a8e0e0687d9159ebd6f062458cfb1bbd1f4949c,2024-11-18T17:11:56.587000
+CVE-2022-20633,0,1,952ff325d93c0967d8ea8fc0982c204a7de93e3c39da9b218d6545f995c5c504,2024-11-18T17:11:56.587000
+CVE-2022-20634,0,1,fb6b1d7244222e03e7fd29e1bcf3eb9fb74601491687a8dd3df7d708ddd5c206,2024-11-18T17:11:56.587000
+CVE-2022-20635,0,1,96ca041ebb65c96387e3dee23e6f20cea203dc08cbb88a90ecee8d645affca52,2024-11-21T06:43:12.353000
+CVE-2022-20636,0,1,40f4dc1e8fda962a164c5f6bf713e30fc3e50d74f4fb1f8639d3234e84280bf5,2024-11-21T06:43:12.483000
+CVE-2022-20637,0,1,839563d2e2aa5de65a9650e7360d21e718acddeaabd16736a0c8b81448e78477,2024-11-21T06:43:12.610000
+CVE-2022-20638,0,1,75478161469c1747625a4801dd35b541b38b2d56c3d617e1e21333d8ad559f02,2024-11-21T06:43:12.737000
+CVE-2022-20639,0,1,24e9850eefe9e2bcefb070b6251ac620152c9373ed23d9f1c47d5609a278b3c2,2024-11-21T06:43:12.867000
CVE-2022-2064,0,0,8f644467a649066e151a955177c1a877df2a0cc8d5885b0107060baafcedca57,2024-11-21T07:00:15.583000
-CVE-2022-20640,0,0,e14f5f1117bf35fe01c753876f35901b551dcbe78c8678924f05419ab07b016d,2024-11-21T06:43:13
-CVE-2022-20641,0,0,932a37f45df223ff7cae907d786b6c98190ee07975e6586152ae55b80221845d,2024-11-21T06:43:13.130000
-CVE-2022-20642,0,0,66dfea2af1c42877c4ec5776f169c9ee5950c85fc58afe61696b215537d3a788,2024-11-21T06:43:13.267000
-CVE-2022-20643,0,0,09b7cfed10658e1636bfa447a7459e42ba29b9743aea8a825c91004b6b273b59,2024-11-21T06:43:13.390000
-CVE-2022-20644,0,0,1a7715327b66c1e09ba0689747033ca315c73be4b724f1b4d158e406674e00dd,2024-11-21T06:43:13.517000
-CVE-2022-20645,0,0,1d3359b7fd899f33c19bc476403389bff713ca3400c4a06a16854f65b9b41188,2024-11-21T06:43:13.650000
-CVE-2022-20646,0,0,41d58ab932fda9a8bcef2bca13bab7941a45eb1d21a58431e55384ead2e52947,2024-11-21T06:43:13.790000
-CVE-2022-20647,0,0,716134c562bf470927addea795402735b69b3e553beb1577c8f72eeb45f7e087,2024-11-21T06:43:13.933000
-CVE-2022-20648,0,0,6ac4a0e3aaa05f144cdd378898c962ab11a7a2e939da81cb682441bf11755f38,2024-11-18T17:11:56.587000
-CVE-2022-20649,0,0,fafab8b5d43108b77ea67ce3da192839f6bbba0cf8643281950167db5469ba76,2024-11-18T17:11:56.587000
+CVE-2022-20640,0,1,4695648583fb50f758e2307d0405a0f40df463a6c359cd755b31e75458511c75,2024-11-21T06:43:13
+CVE-2022-20641,0,1,0981f2b73314f7dd80aeafa702efbbf58842ed86141c242e302b2e3a7474aabc,2024-11-21T06:43:13.130000
+CVE-2022-20642,0,1,c58fe8081d8ed2a865e20f661bb9c15a433d45ab38c8d240ccf95fd0185d687e,2024-11-21T06:43:13.267000
+CVE-2022-20643,0,1,8f519773f4f08e91578830a9e7be4f7ed142eeafd44cbb37dfb7948270546fa6,2024-11-21T06:43:13.390000
+CVE-2022-20644,0,1,067ce95439269a95ef39cbfb33469d3e06b9fff0b9f10c2ce268bd924bebd779,2024-11-21T06:43:13.517000
+CVE-2022-20645,0,1,8c998d9749156c0ac7cf7b568684b089e45efa1236915bfb625535f2e1640277,2024-11-21T06:43:13.650000
+CVE-2022-20646,0,1,4cb51fa2cf6af482b6f4a403a71d23447fd61a40804edddec0292392544dc8f0,2024-11-21T06:43:13.790000
+CVE-2022-20647,0,1,40fe526332b6a5b04fe13744999692e435c6e29fc8b5e93c2bcd1d3bd6b9d30a,2024-11-21T06:43:13.933000
+CVE-2022-20648,0,1,11ef69455dde5c3da6a519d7e9162f69a374d18e5886ade4269a5f0732f84f4a,2024-11-18T17:11:56.587000
+CVE-2022-20649,0,1,75d745ecadda438b85363558e4847e22acc72bdc700bb3d0ed24d90e0f476bc5,2024-11-18T17:11:56.587000
CVE-2022-2065,0,0,6a570f2606efc25878cfb60fa481c4abbeb3c01564ec43a17b231453c52597c2,2024-11-21T07:00:15.680000
-CVE-2022-20650,0,0,c6ed78cfca31c1fcd1c2e932f8070a38af7bdc3a3c64bfcb8ace134ece070095,2024-11-21T06:43:14.530000
-CVE-2022-20651,0,0,6fa7e0d0d8df6eec6db6d0cd20cd22b0d6ea98bb8dc31a35365b25d586d2ca9f,2024-11-21T06:43:14.690000
-CVE-2022-20652,0,0,59ceeb02f5f317bd28e88ac19d4f943f3085b46f229086493e7628685c0a7d84,2024-11-18T17:11:56.587000
-CVE-2022-20653,0,0,492c406c23a853053e6d84c70c3a9f47c91640509d1fa940e49d68f740c5f653,2024-11-21T06:43:14.950000
-CVE-2022-20654,0,0,0dce06e91663eca5574cc0cd9260a0974377526858fe6e0940fdfa347bf885a5,2024-11-18T17:11:56.587000
-CVE-2022-20655,0,0,d40c71afe624d834f3da51642e911d966c494590df5e217325c489e009847a42,2024-11-18T17:11:56.587000
-CVE-2022-20656,0,0,ad9a76d05c1f95eefa7b6aa1dbeb1a5d61905848ceaf6f8e9c0db583a4d741a5,2024-11-18T17:11:56.587000
-CVE-2022-20657,0,0,5dc6a1b537a3e558017148183d577f16d34d3bb3b731f01ad08c8c2faec9f1fb,2024-11-18T17:11:56.587000
-CVE-2022-20658,0,0,9b7c8a5209a8f5a01dd2732bb040dbcde13a26c52fe87e7211d90e5b6b059c80,2024-11-21T06:43:15.440000
-CVE-2022-20659,0,0,55705012b62f97817453d6d9ad4f21246e24abb0e4b4403b10e2ec091a428593,2024-11-21T06:43:15.567000
+CVE-2022-20650,0,1,a222921eb5f8f540fa2d31e7a1d8c84cb53a9e203332cafd026724bb390a3287,2024-11-21T06:43:14.530000
+CVE-2022-20651,0,1,7148dc88589398e7e89bfc694985c7f9faa9aa3fb2f8e328f511530ec7650612,2024-11-21T06:43:14.690000
+CVE-2022-20652,0,1,1394ebbca27eae85911d9fa7e7a710addce106772c669cce85ee62e4bee9ec8d,2024-11-18T17:11:56.587000
+CVE-2022-20653,0,1,40cc1f84158991e0a8a1898cc86d00d3b3cda32fa1337d07902b18d9a56f3f67,2024-11-21T06:43:14.950000
+CVE-2022-20654,0,1,6245b23fd6ac12dda6d1fc982feebe9bdf3c6d1965f82dcb570b69c4efda12a4,2024-11-18T17:11:56.587000
+CVE-2022-20655,0,1,06db2aefc9a68c649a49de2ef61832cb1d64cae500c14d41f8996c774ecb1665,2024-11-18T17:11:56.587000
+CVE-2022-20656,0,1,fd871ab5f1170063bdf60cc17704ff14e51485e891f3d9946f98ad83ba70fa43,2024-11-18T17:11:56.587000
+CVE-2022-20657,0,1,4e25492b897a643b187fcf81fff3ca2899b445807ed34e487b95cb23647c7a93,2024-11-18T17:11:56.587000
+CVE-2022-20658,0,1,61b8fd372c1b16371606b3c84fe5470cd4a971faba120f2a7252dcafee3ad736,2024-11-21T06:43:15.440000
+CVE-2022-20659,0,1,664a83ac872bcef508c3eb59e970ddc67072bf2300c9d3c0eac18bdee14e52bf,2024-11-21T06:43:15.567000
CVE-2022-2066,0,0,ee7cd3baf947c368d27942a2795b205d423bd9e7343b9f8ae259ed05c209462f,2024-11-21T07:00:15.790000
-CVE-2022-20660,0,0,2377c41efb9d6163d3bf5f3e99adbd15bb86522a0bfac99dd2e295bd00114538,2024-11-21T06:43:15.693000
-CVE-2022-20661,0,0,c26bdb2a3559d1ce285a615a810b305da52494b33f15166224d7b0ff1f7f6cbe,2024-11-21T06:43:15.880000
-CVE-2022-20662,0,0,f73068aef53b7e05b375a3708900a9e57e12c657f563041c98fc93f7d7bf1e0a,2024-11-21T06:43:16.010000
-CVE-2022-20663,0,0,27730b3658f124ebfd4e5ba9a5a76a013f134f894d7f78c9bead3305b6f41745,2024-11-18T17:11:56.587000
-CVE-2022-20664,0,0,912f831c89968bd17c7df4dc0a728fe0eaa32d8ed7dbe42862345e15db471b0b,2024-11-21T06:43:16.190000
-CVE-2022-20665,0,0,2cac32ed812172a68123dae8f9ebda73435d3ce86066e4f58d89fccb33961974,2024-11-21T06:43:16.323000
-CVE-2022-20666,0,0,a3c1df84d86c75eec29cc054dd8c2d91492b2d187dbc26ca199804a9d69c9f12,2024-11-21T06:43:16.457000
-CVE-2022-20667,0,0,0614243f2044f3e1a9673600c233abb81b080c41248415d4a94724a3f3677333,2024-11-21T06:43:16.583000
-CVE-2022-20668,0,0,037e1ba702151005fff06e9d7c1fae0705726a41f6dee07b68595feac1c4a7c7,2024-11-21T06:43:16.710000
-CVE-2022-20669,0,0,6cf5da87a52bfa4f480f2bd097406d5eea832137bc9e65f273afd8a3ecc7e38f,2024-11-21T06:43:16.840000
+CVE-2022-20660,0,1,1f2adc3e16da2298d15ae92fbe008413a0d4f59a0f4783a565952e1decbf6cbe,2024-11-21T06:43:15.693000
+CVE-2022-20661,0,1,82d3c84f39f76f8b5cae96b14b9046089cfe1807762921a61e635a4aa56e9e82,2024-11-21T06:43:15.880000
+CVE-2022-20662,0,1,42757c9b266ce5dd9f9ab3efce613880d7c7ceeb754bb973dd287adfa90cd043,2024-11-21T06:43:16.010000
+CVE-2022-20663,0,1,b0b4b080012ddf31176077440948752275f0f0e3def7f04b8b891a3570848a3c,2024-11-18T17:11:56.587000
+CVE-2022-20664,0,1,60c3c5c45c12802ab831910c2291a2697ddf7ce6002fcf367a2ca9c9862ead8c,2024-11-21T06:43:16.190000
+CVE-2022-20665,0,1,1b119d90760ccb7d5e647164e8f0f1a57164abdcfdf54639c300c4a28e6e2e8a,2024-11-21T06:43:16.323000
+CVE-2022-20666,0,1,b6b960e45c1de9aeb5edbad0b198bd4fe3c0c18df44f075b8afd08e3c0dacf4b,2024-11-21T06:43:16.457000
+CVE-2022-20667,0,1,8de4fb13ec31b32dad93e32fec34a6bd6cfab729bc3175d080a2abde2291dd75,2024-11-21T06:43:16.583000
+CVE-2022-20668,0,1,852e16022cd88eeef76c4ffac5d61575241d892fe84c41e060837824e6acf318,2024-11-21T06:43:16.710000
+CVE-2022-20669,0,1,be05a2f40e2e3ecfa9246c6c5f948d0bb73ea495918c8b913c6c182c533c4ebc,2024-11-21T06:43:16.840000
CVE-2022-2067,0,0,e937fdc017bceeb056ccac64628533c3323ddf0d76b07e51b7d72a38e92d47b0,2024-11-21T07:00:15.893000
-CVE-2022-20670,0,0,1cf8ded04fbb9ff41a79359d64066491cbcdf4333acdad7e84e2d6cc909de0c6,2024-11-21T06:43:16.970000
-CVE-2022-20671,0,0,85388aab7aba3d2cd8de552846417a6e6cba0c38d09000d221884647f4df0938,2024-11-21T06:43:17.100000
-CVE-2022-20672,0,0,396df8a2eec85b9d558b674ddda566f5694b0e032746591e3b3ca9f8fe7fc185,2024-11-21T06:43:17.227000
-CVE-2022-20673,0,0,ffd71c8c21c17a14609f181f88ab0a37948ce2ca1d655e06f810983c3f128fca,2024-11-21T06:43:17.370000
-CVE-2022-20674,0,0,a5167adff78682c9bed7d1ffc5b58477623b88745e4335cc51cd3779fff025b5,2024-11-21T06:43:17.503000
-CVE-2022-20675,0,0,af74f7aaa7f54b0d52f3fc4b8167342b16a2fb9cf9a50d1d53b5acdee456dd6d,2024-11-21T06:43:17.637000
-CVE-2022-20676,0,0,28d76a3f50c9e056aa8ccce89cbdb8a6a06ce4ec575eb5291d7f6fb7c102098b,2024-11-21T06:43:17.770000
-CVE-2022-20677,0,0,52681c9562f76b337d53dd47c46de5ea5a8cccf5447dfe3116ac9d10a0a8c49d,2024-11-21T06:43:17.923000
-CVE-2022-20678,0,0,8a785b5cfbeec792249a0c96f6799f4861ad961ae6df6b14aea27fb289ccf115,2024-11-21T06:43:18.097000
-CVE-2022-20679,0,0,d468fe5d311b2bde40d0836f6524994e768e505291b9a254d488da890cb30345,2024-11-21T06:43:18.257000
+CVE-2022-20670,0,1,35442b9495f11ee4cdfca2b76447db2ed2080942ca07dbf512f3e5e843a1ef26,2024-11-21T06:43:16.970000
+CVE-2022-20671,0,1,ded1659e3fbb203f28a947c58036fc5fc686f1e58a7798c8b26618316b1a4952,2024-11-21T06:43:17.100000
+CVE-2022-20672,0,1,5ded30011104cf23ad85b6e6612847524f59f8d239152bb68eb1e4e294c775e6,2024-11-21T06:43:17.227000
+CVE-2022-20673,0,1,4d9972ae07f057909b341d9db36b844a6253aa3e43a2b1d7fb49d34ee35c3fad,2024-11-21T06:43:17.370000
+CVE-2022-20674,0,1,948935260ddff64f35291d96c533725757da58ca45bdf60cb78542f4b7971242,2024-11-21T06:43:17.503000
+CVE-2022-20675,0,1,8d5d68e044cbf5dd865cff61c7e7a0081e1b1b87c54580537a3a7eb177dd3486,2024-11-21T06:43:17.637000
+CVE-2022-20676,0,1,f2a0ab244fdf494e351de8e3e8e03142eb9e7d3a0d1e87dc66995397fb1b7ed9,2024-11-21T06:43:17.770000
+CVE-2022-20677,0,1,93655b18ebf8a4fbd4589e3484bcd8c74af4dc2407cf420732f1c27de869bd1b,2024-11-21T06:43:17.923000
+CVE-2022-20678,0,1,be022d0a137ea367ad27e6e986ad3c6be2898d72aecba79ddcf2ffa8a833bb0d,2024-11-21T06:43:18.097000
+CVE-2022-20679,0,1,17b130e5479e7e2adf072527895e04080123a663cc07284d51ef57447e8095ed,2024-11-21T06:43:18.257000
CVE-2022-2068,0,0,e5920103f76ec3ce8166f617e7709bc0dc3e6bee36a09853ef8962ab4ce020f6,2024-11-21T07:00:16.017000
-CVE-2022-20680,0,0,e03ee9e367483acac8041edb031a57e998312888105b5b51f8cee47fa75b5e83,2024-11-21T06:43:18.450000
-CVE-2022-20681,0,0,a1966c7f22e6ff26dfca281fd227bdc2bc268895e3e60158300de43798deac71,2024-11-21T06:43:18.603000
-CVE-2022-20682,0,0,0e259782664f3a028c54254fdf5795936c3f34fad0eaee5f571a34b6bba1259a,2024-11-21T06:43:18.730000
-CVE-2022-20683,0,0,a4e74ac14c45e90b3dbb765c1523cc34efe0e216d635b070e87fcd7ea1d9771f,2024-11-21T06:43:18.867000
-CVE-2022-20684,0,0,2495d2bb0a8b2068a866f5148fa46c8b63ddd6a97ad802d5283a3248d3ee0fc7,2024-11-21T06:43:19.027000
-CVE-2022-20685,0,0,fdf64ef0de59ab2cde7048adfd792bcdde723d744198b3cbebb4b192741e63c5,2024-11-18T17:11:56.587000
-CVE-2022-20686,0,0,c493479173724f074279848f95f7a0f471442705df89b59cae3f2bbf93e1e1d9,2024-11-21T06:43:19.270000
-CVE-2022-20687,0,0,210b6d584a731d201d1f423c48583ac52070a48f390e254f2ed647d9f55213e4,2024-11-21T06:43:19.417000
-CVE-2022-20688,0,0,e6c122404e02d45f1ce943b42df38eb12fafcbe3e6fa6055ad09fb5211dfd908,2024-11-21T06:43:19.557000
-CVE-2022-20689,0,0,409bfa63c462a58a80f106a6df6fec11bc2f3fe65b7c8d6d5c4306a08a005962,2024-11-21T06:43:19.697000
+CVE-2022-20680,0,1,0b7bd47f419710d3f61e6ade58607c95da6d70af94dbb71be03273af3181b93d,2024-11-21T06:43:18.450000
+CVE-2022-20681,0,1,280bf92419fd301fbd908288efb43ca833598900fb53a9b6250a1ec7dddf6bfa,2024-11-21T06:43:18.603000
+CVE-2022-20682,0,1,1fa71ee857c33f00b556e052007e94caeb65b734be0c94eb81a75c820f03cb63,2024-11-21T06:43:18.730000
+CVE-2022-20683,0,1,8bc8a3d3cd8a40fc693531753717605296f704be039710d68f204e467f0b5ea0,2024-11-21T06:43:18.867000
+CVE-2022-20684,0,1,ab63b4c838f302c6526c81b8e341f0cfda8c2f5e8bb923caf295f3412a9c5f06,2024-11-21T06:43:19.027000
+CVE-2022-20685,0,1,88da035b80ca6e913d467d33fd80356656017857a0c91f6cf420a6ac13e42a94,2024-11-18T17:11:56.587000
+CVE-2022-20686,0,1,600b7ff1394c351d716cddf546c26028d7ecb7ef8b18801ac32a7123861efb3c,2024-11-21T06:43:19.270000
+CVE-2022-20687,0,1,5d18dbdb3617cc3203763429f5c75eebd258fe4458168c096533f5288bbfb8f0,2024-11-21T06:43:19.417000
+CVE-2022-20688,0,1,6528ed176b6b729cf5d0d6c83ec1e5efbd5de1b84c9c813ad67aa56478111cbb,2024-11-21T06:43:19.557000
+CVE-2022-20689,0,1,0f6203650e5336072714a3be8b138f4477f6d40d3194af547b946b249ef44894,2024-11-21T06:43:19.697000
CVE-2022-2069,0,0,e07ed44e95963118c58cd66a8731c3552e6dd422167a2112b2a427e7eef0cc1c,2024-11-21T07:00:16.177000
-CVE-2022-20690,0,0,3340879c38175d2c01fcc87a4ed64d6e730dc4c15471f242f92db62fe7c0fd69,2024-11-21T06:43:19.847000
-CVE-2022-20691,0,0,f866b3771cfa245c3be038931bde4516620f717d4e6fbc7739b23e3d8095d735,2024-11-21T06:43:20.013000
-CVE-2022-20692,0,0,e1b0037d1c0841f81965b6caac266b0696038c0f56653075c82906cf442728fc,2024-11-21T06:43:20.157000
-CVE-2022-20693,0,0,8467b587d59a1d6b47090e987df75766aa596b43919d3534b5baadeee662133a,2024-11-21T06:43:20.317000
-CVE-2022-20694,0,0,09d92d685d040b83965c9c5166840eafd45f8fba8904f7c202ed07e2d4f5ca0a,2024-11-21T06:43:20.463000
-CVE-2022-20695,0,0,18709a8d2727fc35a063951ce3ecac272a4482ffb7e8832f418a988b591d1c42,2024-11-21T06:43:20.707000
-CVE-2022-20696,0,0,3533d0e2ef92341d7cd4a6d5ead6466d62a0c8c04caaa9daff092108a655270a,2024-11-21T06:43:20.890000
-CVE-2022-20697,0,0,78cb0c74f79a38217fd836a4261f94cef50b5da1f0ee593df0d9f3ee9ba83f24,2024-11-21T06:43:21.053000
-CVE-2022-20698,0,0,ec773032b6daa5088f90ed778537214d8c1ea8f88e5feef4655881132d1a24e9,2024-11-21T06:43:21.197000
-CVE-2022-20699,0,0,5662a563a6056d26215bee05a335cd4d1bdd980bfd4c7ddc3432e83b5642ac91,2024-11-21T06:43:21.340000
+CVE-2022-20690,0,1,e4477d079bbda77b3190043ccb13b578c2bfb46caa37ed5d7de0dcb7355be90e,2024-11-21T06:43:19.847000
+CVE-2022-20691,0,1,6bd9ea7829d94372fc61aaae2c636841c3292689f45f64c4af5fb91920fbec3a,2024-11-21T06:43:20.013000
+CVE-2022-20692,0,1,496f6c720976c3c2a93b07acc67dbe62a2109a722c408cf833d68c455b68b4a7,2024-11-21T06:43:20.157000
+CVE-2022-20693,0,1,32c81f82b6e200f1cc3865c96fdd5c304eae0c90c4537bc32d648a163bb727a3,2024-11-21T06:43:20.317000
+CVE-2022-20694,0,1,b65977ed9fb7a93f4a63ec9c44ebe2904e2c3cab051ce164071dad7b66e00864,2024-11-21T06:43:20.463000
+CVE-2022-20695,0,1,c79049ea57bc49214de24714b0c07a6ba85369b7605d91ec8e569e565985785e,2024-11-21T06:43:20.707000
+CVE-2022-20696,0,1,c3f5638a06236c8b27a7d97b38353d2fa241351dd18db42a89c548678b610463,2024-11-21T06:43:20.890000
+CVE-2022-20697,0,1,a907168642a840f6e9133bd6abc9287914b93d3a1277f085aa75e002e5dd5c80,2024-11-21T06:43:21.053000
+CVE-2022-20698,0,1,8c4e6874f62cd7f7526e1a8c85321cb01e8476ad2c7812f6f1217565c6e0e988,2024-11-21T06:43:21.197000
+CVE-2022-20699,0,1,1b3a529c0dab497dd4cc7efc4c559d4db09d35912f16475fbb628ef55222a651,2024-11-21T06:43:21.340000
CVE-2022-2070,0,0,6d3bfc116014826b9681cd8a69f12bb0725ac3caf80c58fedb4b9ef101064308,2024-11-21T07:00:16.297000
-CVE-2022-20700,0,0,eadab72a335a3463fdb697d921e3a42586c5e7462f75f81d8a8f4d4a3a505069,2024-11-21T06:43:21.503000
-CVE-2022-20701,0,0,3a70a8369f0ed599967303f1fa9fc44438f380c00ab88fd38af3f36fed0e15b2,2024-11-21T06:43:21.653000
-CVE-2022-20702,0,0,4c31ec0223040afdcfede9ca86e5278f802c614d62b401d85e9807c02883177d,2024-11-21T06:43:21.797000
-CVE-2022-20703,0,0,0b2eee398c56325efb1e54d3244e3905de892da9dcfbfbdf66fe7b562a523dbf,2024-11-21T06:43:21.950000
-CVE-2022-20704,0,0,143dd381ef51624c286db588acbd38e5e8b409fea5e374ee240cc7b263b6577c,2024-11-21T06:43:22.110000
-CVE-2022-20705,0,0,9e83cc3bb5681b6afba91d00e875b2a7ef0d7fec7498ddee48d2e5f85bc35041,2024-11-21T06:43:22.260000
-CVE-2022-20706,0,0,a1493852a71ca95645a61d39cbcd9f89c84a4e51a5a6b66fd5a1b0c6269974f9,2024-11-21T06:43:22.427000
-CVE-2022-20707,0,0,19ab223bbd6f3d1081e0548b25d3bfb675b5dd97d0f564de360d6a8131388c7d,2024-11-21T06:43:22.573000
-CVE-2022-20708,0,0,3594461964756cb34432a6f7487ea94d5dd3afaab44edb84c636f858be4a9c70,2024-11-21T06:43:22.717000
-CVE-2022-20709,0,0,8da13779f0e51938daae16019f2d6738603ffa52a9263be27607f260a7569233,2024-11-21T06:43:22.863000
+CVE-2022-20700,0,1,75647e934b416e5618d2bc6e398cbb3c442fb8c834fdc00ae04ce8c4e4ee5e17,2024-11-21T06:43:21.503000
+CVE-2022-20701,0,1,e602e54f4b8733954b8f954f98c3bc25fb8710b9e93cce350ccc74cdf872ef27,2024-11-21T06:43:21.653000
+CVE-2022-20702,0,1,c78e0ea2415026591ccac4ac17ecf407c71501f14b28655e64bfc4e41c7064f2,2024-11-21T06:43:21.797000
+CVE-2022-20703,0,1,beb625de1f7f66dd0e6bdd15a3e565edfec508a57a1e7b6b78e9ff8f28fd72df,2024-11-21T06:43:21.950000
+CVE-2022-20704,0,1,a8f6f3904cc6591b913d7fb3736798eaf88ff646f6610387c894a92084354835,2024-11-21T06:43:22.110000
+CVE-2022-20705,0,1,6fe860c8583b89be243d87c68401933f47aa931bfc41f14cfc2391355be0f591,2024-11-21T06:43:22.260000
+CVE-2022-20706,0,1,3c69b2541e22e35800683102eaec459c42218dc96d6cbfde773105b235f3347c,2024-11-21T06:43:22.427000
+CVE-2022-20707,0,1,e2db982c22490c641b3cde31600250c52b92f812381bbc3f6e39e95edf752f6d,2024-11-21T06:43:22.573000
+CVE-2022-20708,0,1,2c7acad3a528e6842139ea47b02ede65c34d0635fc171e9f2cc4485fcc9fff8e,2024-11-21T06:43:22.717000
+CVE-2022-20709,0,1,31af99a1b710e7fc6a91a04c0982fed4b39785c32c3fc69e2b45593c17d56e69,2024-11-21T06:43:22.863000
CVE-2022-2071,0,0,9b59a943d1039cc1345f4262ee3cbfc54da13d034eeec96c49111559c9fdf2e5,2024-11-21T07:00:16.400000
-CVE-2022-20710,0,0,254d6df4eef359d3076c79378f1718c7254678d082f71a87aa3868d3d7caf5b5,2024-11-21T06:43:23
-CVE-2022-20711,0,0,61cbadd06e7fba51246a1f1c82b00db2f19c44ba8a4b8bd988056da6e9f9aad0,2024-11-21T06:43:23.127000
-CVE-2022-20712,0,0,31ac2a09e5b71b7cfb9fb5a21d066e291db4db3e69d61c2f6f005362420bcd0b,2024-11-21T06:43:23.267000
-CVE-2022-20713,0,0,02fb06da5e3d6e69e304fc54197bdadb73eb7a854f1c6baf16bafc86367d4873,2024-11-21T06:43:23.407000
-CVE-2022-20714,0,0,f34ec1c0b4f883227b4149bfef8a43d38baccbc11d81becc9f462a7bd5d992d0,2024-11-21T06:43:23.640000
-CVE-2022-20715,0,0,e33adc3d59e89706b91551379bdba0dcedecb09dc4f786c4ab98f23dd9dae637,2024-11-21T06:43:23.783000
-CVE-2022-20716,0,0,d7fbc7a675ca7c6141bde04aca11fa7d69db9718d61712489fbc2c4c5008ba7c,2024-11-21T06:43:23.910000
-CVE-2022-20717,0,0,3fc2efc91db16bc3c4860c9afff0ad03ba4f8922a901a621bc916eaa4aa46935,2024-11-21T06:43:24.040000
-CVE-2022-20718,0,0,a5d2833b1e46f126f26fd11fb132b9384102d3eeda7cc4a3a754e2056e50cbfa,2024-11-21T06:43:24.177000
-CVE-2022-20719,0,0,4678e19e476a87d3d9da42a08fc05a4a081a652cea19d540df1fe915081bf25b,2024-11-21T06:43:24.317000
+CVE-2022-20710,0,1,604a5121aad950bfc3e1090436e61a7082572470bdd215e63fa57b727462adaa,2024-11-21T06:43:23
+CVE-2022-20711,0,1,05170086d5d98c8e6306fbbcf254c2284e127868a84872f8cefa762bd7f32af4,2024-11-21T06:43:23.127000
+CVE-2022-20712,0,1,a8d54d0b08aae734a4c89003a243314e7f905c0085d2c9ee465e42176a90f9e6,2024-11-21T06:43:23.267000
+CVE-2022-20713,0,1,de7aade861f3f0d4d71116a9b628753be410d2ba1285191396f39b769fb70566,2024-11-21T06:43:23.407000
+CVE-2022-20714,0,1,98ac4396e995c4f6e0baabb0ef31975615eb7a759b2c942235f6bf7fe96cf2d4,2024-11-21T06:43:23.640000
+CVE-2022-20715,0,1,4a6824177a19296e52897a2df02d6de5775ec21e6d0da9398c154ed1bcfd69b7,2024-11-21T06:43:23.783000
+CVE-2022-20716,0,1,c055a84f5cbfef4cd8ca25269cc27a62feefb75f07a9f0c792fa3014c7995aee,2024-11-21T06:43:23.910000
+CVE-2022-20717,0,1,2ed016cc47c4fb6800f6ace5c98beee825e2510035c51379e7ab5add2fa82ce4,2024-11-21T06:43:24.040000
+CVE-2022-20718,0,1,dc50d96e3080116802dce5a66ac172b4bd3f6d2b5af658c84606d388b51645ac,2024-11-21T06:43:24.177000
+CVE-2022-20719,0,1,f6bcccbd447f01df7d858981304a6c7dabb17a565aa20a25c31ad1917d0f3ebd,2024-11-21T06:43:24.317000
CVE-2022-2072,0,0,38ccb5494d29f6f1c94544e7354fb62db298858a8326c69afa211825c2c0815f,2024-11-21T07:00:16.500000
-CVE-2022-20720,0,0,0b0298275913fd13804bff4f8a48dabffca2acfc6bc76a0f4804ff3cc65ff33f,2024-11-21T06:43:24.490000
-CVE-2022-20721,0,0,d0a2ab67930e5b7689e6b5c3d00e7ca9620f2c0ec17bb1f0316fc1ed8f9b7e0e,2024-11-21T06:43:24.647000
-CVE-2022-20722,0,0,e35c00613a7c948fbc2dc86c43b5180bb48cbe92be6c966de905e302c131226a,2024-11-21T06:43:24.790000
-CVE-2022-20723,0,0,38f728d810b0faa6c55f2bd9045c13e565ad8ae04c0a461de5fd5a2b55650fe6,2024-11-21T06:43:24.940000
-CVE-2022-20724,0,0,adba52da2745c2af921a22fe9f41f4cd3c100fcf05dcc2f4cb3962f47816f877,2024-11-21T06:43:25.090000
-CVE-2022-20725,0,0,a4c202993987378ba450b66c731285588e59f73c6a2b6224c0387f6b2b34bb5e,2024-11-21T06:43:25.270000
-CVE-2022-20726,0,0,7993cc2b4f99cccc162277ea9c23d3bf7676421b16774cad14742af6b8d640b0,2024-11-21T06:43:25.447000
-CVE-2022-20727,0,0,54d03c587f9402bbe322e5f47f405cf5975a6aaf6cc0b02c66e3ae008c0614aa,2024-11-21T06:43:25.583000
-CVE-2022-20728,0,0,6ac0634b1d52969a40d06e86acff80851dd8048f32014effb4edbcf3e274d46e,2024-11-21T06:43:25.730000
-CVE-2022-20729,0,0,1cfa5aa8ab6d315e131eeb8e05379f7456b76ee28684fe53d6214225d9531a3b,2024-11-21T06:43:25.883000
+CVE-2022-20720,0,1,d558a525efe1b079dd0231a5d1e7ad3679c91bd952241795b437ee406afdaede,2024-11-21T06:43:24.490000
+CVE-2022-20721,0,1,c08340adc8d4ed7f9c67ea994dc43e707fbd3827f7a5f6a4517967420810c8cf,2024-11-21T06:43:24.647000
+CVE-2022-20722,0,1,19fcb532329259053b365d9d26129cba581505a412ebd4461c27318cf2164029,2024-11-21T06:43:24.790000
+CVE-2022-20723,0,1,033f923fa881c891379d3ce7d04927845544d08806b3b5bbf150b85a3288f415,2024-11-21T06:43:24.940000
+CVE-2022-20724,0,1,f35feb6ec6c89760376f1dbf4acb9e3d9570a12f10e38fb5331a80fe4673e0a9,2024-11-21T06:43:25.090000
+CVE-2022-20725,0,1,0169f0468d5c44c85946e962693402c2c4735163136bc211ae6ebbe3e1c4c025,2024-11-21T06:43:25.270000
+CVE-2022-20726,0,1,b9d7d73a5250b6b7891f08fb3a6c7c1ef4e0269c4d7ce9b6f002ce8c407af9b9,2024-11-21T06:43:25.447000
+CVE-2022-20727,0,1,413fe0f50cf7fb07a6f7f181d521170f7e94a94d4eb181d4c48740c3cc9d4796,2024-11-21T06:43:25.583000
+CVE-2022-20728,0,1,f536c76346d725a8017c492c986bfb5724b612344d879b0fc69270568ef29957,2024-11-21T06:43:25.730000
+CVE-2022-20729,0,1,9d18f12dc69e2b6b9095005fe492ce4b1d206220a3662d912b6ab50932c16b8b,2024-11-21T06:43:25.883000
CVE-2022-2073,0,0,7855ea1b80e804ea4dba9149438b1f3078ecea2c741ba0879e846d942f34e498,2024-11-21T07:00:16.603000
-CVE-2022-20730,0,0,18e1227f99bf3da409a6dec114a1931aeb772f7f125c31cf08300db17a209b8c,2024-11-21T06:43:26.033000
-CVE-2022-20731,0,0,b1cdca93a9d1d01701db99b20a167b14602eea199cb446a84ad20afc78ed8536,2024-11-21T06:43:26.173000
-CVE-2022-20732,0,0,f139db7eecfe28531c0b10ac4d32a99218d04d681b9889aa39971cb493a290e6,2024-11-21T06:43:26.300000
-CVE-2022-20733,0,0,906f70d08d4a6acddb4430351c1cf76d5b94f6a55bb2ed3e423607b1a7ebc4a5,2024-11-21T06:43:26.423000
-CVE-2022-20734,0,0,a4134275429c0f3955135196b40811bd76ee8fd3cd559a11c2add6f99bb3aa41,2024-11-21T06:43:26.540000
-CVE-2022-20735,0,0,44fa5f9c657c109986064089c4e4e92636021dbd44037e0e1ad438cc6f82b185,2024-11-21T06:43:26.663000
-CVE-2022-20736,0,0,ac21bb3ed9bee561c880ab7c6637b97d7cace54e6d6da25050beb8a2f915fa7d,2024-11-21T06:43:26.780000
-CVE-2022-20737,0,0,8e82cfc1a887789ccd170aa072c8636ff9c3fa0c087e1d768f7216b1bbd78bd2,2024-11-21T06:43:26.900000
-CVE-2022-20738,0,0,e7aedaaa9587281fcb2995c7ae294a2256a121a69a5918fa58726ed7ae1df505,2024-11-21T06:43:27.023000
-CVE-2022-20739,0,0,698de18a654d31affdedb33af8788de4e237fcff152d1b7ba1c2f3f9ea3f3202,2024-11-21T06:43:27.147000
+CVE-2022-20730,0,1,1560ceba85945ad7ad9e8bf505463fe353400cd27f245df5e06746ab83fc8ba2,2024-11-21T06:43:26.033000
+CVE-2022-20731,0,1,13f98285202e2db82b830302ee48ffde19d6fb3c28c074359b21036a4af21795,2024-11-21T06:43:26.173000
+CVE-2022-20732,0,1,6b96fc9b11586107b04962e6cb6dd4900505e24c3a466a35608b368e6c2b7d24,2024-11-21T06:43:26.300000
+CVE-2022-20733,0,1,429d2911995cf74171c5c986b3548cfe9634b604b4354c7742ac0aa2be1940c6,2024-11-21T06:43:26.423000
+CVE-2022-20734,0,1,994800d26b6496e4683bfed4485390ec600f39f073d3d634834c32623bf34d90,2024-11-21T06:43:26.540000
+CVE-2022-20735,0,1,478a3ebb44880bf107bd50d6aa1ded1716740072ed777942d64c1a641b814b43,2024-11-21T06:43:26.663000
+CVE-2022-20736,0,1,37c585b81949ab3d9ca27d69b4fc248d390488ec29ebba3e885a272adb9adf16,2024-11-21T06:43:26.780000
+CVE-2022-20737,0,1,77b0100f8e30bfb7f91fcadfe6ff43e73940ff2a067c459f5610ece3d1ce7ecf,2024-11-21T06:43:26.900000
+CVE-2022-20738,0,1,fde68ce094e3938972189860c281304007c80fc40f1665ed1001a0c4e2566c45,2024-11-21T06:43:27.023000
+CVE-2022-20739,0,1,2a7b430979e10c4235cf90f6716a9b9acb4da47563c45e4ed23a060439ca13b4,2024-11-21T06:43:27.147000
CVE-2022-2074,0,0,ae29552bfc7fe1341c7d900d6e9dd8c20c5ed85c902831d1fff8cdcd4869a847,2024-11-21T07:00:16.713000
-CVE-2022-20740,0,0,a1389166895581fd8fda9523c7b5df10d88c4b1808865cb60651f19e9d1ea216,2024-11-26T16:09:02.407000
-CVE-2022-20741,0,0,466353b1356bc7a58c2af3ed73a158d975b4f088c84e998330b7c08859e4a36c,2024-11-21T06:43:27.400000
-CVE-2022-20742,0,0,4fad7ac26da929290358e984847660e48de08c6d99eb243c49c72af2e621828f,2024-11-21T06:43:27.517000
-CVE-2022-20743,0,0,d4496cbef3bf56150e45765d1671393a8e1796490c75ff8f3cfce0a814ae9721,2024-11-26T16:09:02.407000
-CVE-2022-20744,0,0,9dcd2c3b90d559798bc37ad5501d32a1025a4f8022278d945016750ec5dffdd6,2024-11-26T16:09:02.407000
-CVE-2022-20745,0,0,92469d1e9c71b7ec5e784565f99ff7c4de03c8cb7819c309a84a92c073e427fb,2024-11-21T06:43:27.910000
-CVE-2022-20746,0,0,016eff8edad512b17960877dba87d95b419babbf9e159ec51356b929efbe4d8b,2024-11-21T06:43:28.040000
-CVE-2022-20747,0,0,0219edfac3f8ee7ffa7efa947c7c2196ee3d63f741b9679af522c3ae4a42dcf5,2024-11-21T06:43:28.160000
-CVE-2022-20748,0,0,3f7338ff74fb56eeecd827f596134454be825c7fc294891483231b187b9bb7b5,2024-11-21T06:43:28.290000
-CVE-2022-20749,0,0,e5fa936682d4baa0748bcca59048b123b7bc2e2bc74ae69b844a4d2195069299,2024-11-21T06:43:28.417000
+CVE-2022-20740,0,1,460781832a47fbb38aa3c93d0c5bf30a21b3174131cc5dd8b9ea5fb4cb978b0a,2024-11-26T16:09:02.407000
+CVE-2022-20741,0,1,71ce639c3004615c81ed77f0df4fc387a81ce4f26b5f2e08661eacd4eabc6d2a,2024-11-21T06:43:27.400000
+CVE-2022-20742,0,1,4a316e9fe3aaa478073b7f91e2c05eea069e84bfd7fd5ac2b2ed5864117fd17d,2024-11-21T06:43:27.517000
+CVE-2022-20743,0,1,8c1cf524b5c70ea64473d5fd0ecc7122d9e131c5157eeb03d5fbd8e2fdd3e3fc,2024-11-26T16:09:02.407000
+CVE-2022-20744,0,1,f9f90ee72ddf17bdb0a60e13a21d0629301abf8498547348e7d0d9c2f9d986fe,2024-11-26T16:09:02.407000
+CVE-2022-20745,0,1,0d1669f098399720fbeb3a88aef76351b8849c07b8d072c0ad45119cc05fda95,2024-11-21T06:43:27.910000
+CVE-2022-20746,0,1,cbce9f59e0d96968f7ba18b69e30e80fba16216bc3dd9a8ba230515e9020001f,2024-11-21T06:43:28.040000
+CVE-2022-20747,0,1,4d583a281391b23c737b9ad1baa63f11a44ee3a7c0900feef7d542965fca792b,2024-11-21T06:43:28.160000
+CVE-2022-20748,0,1,e85cec81eb3504f8e242d9787da6dfa825141df59b523372313587fb86540f68,2024-11-21T06:43:28.290000
+CVE-2022-20749,0,1,8623cc9a50b644e31e84adb1e45b1fe3be1ff7ee4ff261198577c93b9d7e808d,2024-11-21T06:43:28.417000
CVE-2022-2075,0,0,91fc900b7d4f421470ef7ba36f3554f75730841cdbee4d46185d0ae7437c97be,2024-11-21T07:00:16.817000
-CVE-2022-20750,0,0,0636c6d1b49f89abfdaef3841197afc1b2a0683bb5b3eab15485a3cf272bc624,2024-11-21T06:43:28.550000
-CVE-2022-20751,0,0,4e5960cbbf850d3887c416892be3919722821932d108fe0477e2abdfc681adec,2024-11-21T06:43:28.677000
-CVE-2022-20752,0,0,b26f1eeec50e645bf9a098d586f27d3c34a0cd435471901530aa3894009f9290,2024-11-21T06:43:28.820000
-CVE-2022-20753,0,0,cd24eac17e48b9082b2959f0e8fa313b6396538ed33cc1bcef1d9977c41d4625,2024-11-21T06:43:28.957000
-CVE-2022-20754,0,0,ef10ceaca7e15de7749fec24b8afbf63a38d97b51dba9d0263b356478983a43a,2024-11-21T06:43:29.093000
-CVE-2022-20755,0,0,4fbc8afbbe464bbdbf8b6a6e8cdebfb02f99c8887acd79443eef5c5b46196e1f,2024-11-21T06:43:29.223000
-CVE-2022-20756,0,0,d9124c1c645ed2c795ce7f922c70dd420b34f999f291febb10031ec105641bfd,2024-11-21T06:43:29.350000
-CVE-2022-20757,0,0,51ec1659d9aa8157bdd1eb5163f2d80709d13e1f3d52a8c9bd22fc792f2224c9,2024-11-21T06:43:29.483000
-CVE-2022-20758,0,0,eacc20793f73dfbfd2423d054e738feec88be987eb371ce2302e3b88d347e1d8,2024-11-21T06:43:29.620000
-CVE-2022-20759,0,0,96b8909fe3d123b4dc3ddca5af39710849551f3c393cd8c5446672ec9e4fadc0,2024-11-21T06:43:29.757000
+CVE-2022-20750,0,1,b0f70c5e134688168e497301eb98e7a470a1a6969b64daf0c0779dbecd2b9ec3,2024-11-21T06:43:28.550000
+CVE-2022-20751,0,1,b19b0b02261fff72ce082ce043efd3f5e7677f84d4c470a080017751af683b9a,2024-11-21T06:43:28.677000
+CVE-2022-20752,0,1,a0a8183dd315e56f102161528e5f4a93f845bc75dec35e88d7031ec914515c29,2024-11-21T06:43:28.820000
+CVE-2022-20753,0,1,6b33f14aef31f0bfe8cecfc87138dbe36aaafc3314eddefacc45289e77844057,2024-11-21T06:43:28.957000
+CVE-2022-20754,0,1,5fd112e1aab8e14ffabe6b4884a978e86b77ab50929a8e7198380dd661e2ae97,2024-11-21T06:43:29.093000
+CVE-2022-20755,0,1,628c4fbd066dc6217823df9b60974d2e59aa5d64d25992364edc93b600fb35a5,2024-11-21T06:43:29.223000
+CVE-2022-20756,0,1,62826af98f2b0a3ee1933b7e4706e13349e83c231df0e33dfc35e03d1dfe6d3a,2024-11-21T06:43:29.350000
+CVE-2022-20757,0,1,0538557e4de77360e48e69b9cba266e28c661e87367b64651ac186bc7952b222,2024-11-21T06:43:29.483000
+CVE-2022-20758,0,1,6c9cb50286621e35e61cae9c1d4bf4c8449709596e188284360dd4b8bc322358,2024-11-21T06:43:29.620000
+CVE-2022-20759,0,1,486530d2af60585049797fbf3a148985ad145764d22a5ba3bc12742f054760ad,2024-11-21T06:43:29.757000
CVE-2022-2076,0,0,c259916779f2fd642fd62e035321e03cd0917311395066b935f1853177d63a07,2023-11-07T03:46:11.537000
-CVE-2022-20760,0,0,25e707e851d38190b7cd54ce97fc02327e80ca033caa97c3d8855fa286b82ad7,2024-11-21T06:43:29.897000
-CVE-2022-20761,0,0,58a8647a50b3d4c125ab01451c1cc34f8596d7d282eaf2447650dbd97ac9c9d5,2024-11-21T06:43:30.027000
-CVE-2022-20762,0,0,35699926b358d1dca80545d987f9025b9ec86969d63cf3120a1c269e4495e11f,2024-11-21T06:43:30.183000
-CVE-2022-20763,0,0,f1356754c8e77528c630c8bcdcc34f965ffacfa84994deba1fbbd1b0313ac93e,2024-11-21T06:43:30.317000
-CVE-2022-20764,0,0,c616aa3b5ba3a87817342d10732d19ed02c83a9986688b001336f3eb009176ac,2024-11-21T06:43:30.457000
-CVE-2022-20765,0,0,f7044e7793f4e5d72208a92afb10e0c78b35d4980f418b472017750d86d8c5fd,2024-11-21T06:43:30.600000
-CVE-2022-20766,0,0,2bc7e92561f6ec9acd3d2ba518cf61be992943c7d85c3cec343f6ddd79d6fa52,2024-11-18T17:11:56.587000
-CVE-2022-20767,0,0,b22edefa3bed1a65ae6adb86dc29da87763f12c58646f884a068708dd918ce7b,2024-11-21T06:43:30.843000
-CVE-2022-20768,0,0,267924e51fc8c755ce124fe6603b5514780358565ecf10d9238b87d39627a3dd,2024-11-21T06:43:30.967000
-CVE-2022-20769,0,0,82472ad9276b33bb587e4081e4d3d829221f0061352264f0f7e64cc1ff1c791a,2024-11-21T06:43:31.107000
+CVE-2022-20760,0,1,0a385881a534432beb2f46b78163f7e2fc2870cfdec8471e18296da0f40a7a87,2024-11-21T06:43:29.897000
+CVE-2022-20761,0,1,d594a53fb59ee612fa82473d68083c805e560329c06bda9e4529f9d413a99b38,2024-11-21T06:43:30.027000
+CVE-2022-20762,0,1,835f834afff0aca3044f57d28594802a217c12e893776d198bf31ca02b26e750,2024-11-21T06:43:30.183000
+CVE-2022-20763,0,1,4a82a06d93432461ee1884dc9f05636c01056ca11815613b1a068da86779efdf,2024-11-21T06:43:30.317000
+CVE-2022-20764,0,1,0f240ac4eba62ecda929417b0170db6f2b203c0dad43a003105562e068d95c51,2024-11-21T06:43:30.457000
+CVE-2022-20765,0,1,131928e1aabf8beb24b2b4a05517aeafe2adaaea75d3789638dbd9b2174f7df6,2024-11-21T06:43:30.600000
+CVE-2022-20766,0,1,13a4d57f4d35ddce31446b88e673cf38aae75239b11b58c7b4e1e7938580757f,2024-11-18T17:11:56.587000
+CVE-2022-20767,0,1,6604b28c4a0212c9ecfc7351f1a8b5d0038dd44fe4ed95ab8d9d97c98b69f310,2024-11-21T06:43:30.843000
+CVE-2022-20768,0,1,9be748460bc2a9580dca308c2513e092b8a6c190def7f1c8d39ff85e8e37b3b7,2024-11-21T06:43:30.967000
+CVE-2022-20769,0,1,4e973a1541c6d3c9edba7774f95dc3d9b86edbe71a0867b8655ce032b46ce936,2024-11-21T06:43:31.107000
CVE-2022-2077,0,0,e255e39666cabe4108f515620e156a17b1f942d4bda1a192bbcf12588b93da95,2023-11-07T03:46:11.917000
-CVE-2022-20770,0,0,044d198507bb31d3f05f4eab29eb46e0d69501f1fbabde5816be2384d4a9fe85,2024-11-21T06:43:31.263000
-CVE-2022-20771,0,0,ed28bc6e91369dc2506a69321f8bd8d6fb0c246b814662de3d0c41ad076367cc,2024-11-21T06:43:31.423000
-CVE-2022-20772,0,0,1ae4c9bfa5aae50da25a6e87e6e4bb62349245ba622f91efbc5f9d61bdadbeeb,2024-11-21T06:43:31.557000
-CVE-2022-20773,0,0,8103c72483c8202b18ac1361f677915434104ae2cb011aed2a3d62f0c861c069,2024-11-21T06:43:31.690000
-CVE-2022-20774,0,0,bfb88a808106f6775ceaa524e3f515991e9e06899fe81ffcea67f3d7ca8e681f,2024-11-21T06:43:31.800000
-CVE-2022-20775,0,0,23d507cf3840da7e7c352172690948c793dc73be2fa09fca187161bf4f94ec28,2024-11-21T06:43:31.933000
-CVE-2022-20776,0,0,2ffcc68cb7e921c3e1ae02e18fe503e9255d6f9a463da1ed8b36cd3458aabc40,2024-11-21T06:43:32.110000
-CVE-2022-20777,0,0,f9341123ab469fe45a8a44d441bb655caa6c51d2a280b4c286e403e24cd2e2c4,2024-11-21T06:43:32.237000
-CVE-2022-20778,0,0,55a8260dfedd7a9ad4343273adc97b5618697611bdbf78df30bf6cc73019c729,2024-11-21T06:43:32.347000
-CVE-2022-20779,0,0,9dd2a3a06041a9c989ca0d1f489fc231f9a651d22a1938636f874652a7ac6a3f,2024-11-21T06:43:32.460000
+CVE-2022-20770,0,1,e3f4ba0acbfdfd360a67e1b4564c6475e85d17b79eaf265ea43d2cc027bd3f38,2024-11-21T06:43:31.263000
+CVE-2022-20771,0,1,7be2a02728763dd2cbf31e8ab8daca53f32473c9cb91e55b41ff4953fbe17517,2024-11-21T06:43:31.423000
+CVE-2022-20772,0,1,42e555d10d6e2fb2612afd63b58d7a08bec7dbc6cf160fb8221a1551d272a8e9,2024-11-21T06:43:31.557000
+CVE-2022-20773,0,1,56736160cdd4df1f78c97394fecf882420b6f2bbb3055e6df4357a19ac1bc508,2024-11-21T06:43:31.690000
+CVE-2022-20774,0,1,d9b5cde8aca13b7e2e80534aca1803e46e8f8475ab4e8d33782274b2c226e508,2024-11-21T06:43:31.800000
+CVE-2022-20775,0,1,64b3a7426e93e7f44b8a403662fd0460be3aa2ebc378b6d3556f0c47c766d9ae,2024-11-21T06:43:31.933000
+CVE-2022-20776,0,1,f65ac4db95df7d4c3858a041d350dbd406ef0456499b7f4f4791f24a195d2fc6,2024-11-21T06:43:32.110000
+CVE-2022-20777,0,1,ce21c6abb9abc81c408211ebaf0c66e0a17e01010b5b2508bfcd7eb3e5316d4f,2024-11-21T06:43:32.237000
+CVE-2022-20778,0,1,f6501ee3148350e912058c0a0e81c1f713cc84fb9adad8fc956b74ff8d214e8e,2024-11-21T06:43:32.347000
+CVE-2022-20779,0,1,d49c00725cb8fae585fce6bc9e6a830ef389fd7777bd74d00fafacee5f64c093,2024-11-21T06:43:32.460000
CVE-2022-2078,0,0,d6b0bb6a8dc037edc5845ecf3f38f87eb28bde3c56eb4b1c4ea2a8386a82fbbc,2024-11-21T07:00:16.933000
-CVE-2022-20780,0,0,08a7fb8075cd265adb2737502fb950be00be38b203016f54a79075bea0c9a7e7,2024-11-21T06:43:32.570000
-CVE-2022-20781,0,0,54dfc9cb92f90a98c02d031ec9b193679092e72615ec78003b7233fb6d5ff8c6,2024-11-21T06:43:32.677000
-CVE-2022-20782,0,0,5ef8f606e6811c21c55a32f96f3baee58affd4440d8b18c21e69f219dfb51cd2,2024-11-21T06:43:32.787000
-CVE-2022-20783,0,0,d0d83a51c4671ec213d48265da5f0d6db50750af9e03811e54665bcf9b1d32c3,2024-11-21T06:43:32.900000
-CVE-2022-20784,0,0,dec89013408a3d4f0a24cc8533a5d64f7b135373645fadef46d7673cffb07088,2024-11-21T06:43:33.007000
-CVE-2022-20785,0,0,2f3d02def18b4d9a8af4bd3542b4ae18bb103af9e91b1fef7d62301fdd889c37,2024-11-21T06:43:33.120000
-CVE-2022-20786,0,0,33cb87fe883e81b089d3fec6716d441fc4f1e334d5ffa560be84a88b27325350,2024-11-21T06:43:33.240000
-CVE-2022-20787,0,0,653338ac5fc1dd5f27c9e522f09ef6900f99197d9cc2b6959428d1c480c60156,2024-11-21T06:43:33.353000
-CVE-2022-20788,0,0,68633e666358390961cc55af682a3b5ad65be9fb07bdd3e905d3f9fd045b2fea,2024-11-21T06:43:33.470000
-CVE-2022-20789,0,0,31827494929c00d726ae7d3679f704a07fdd063060a25aa096c8aa81b3ce8daa,2024-11-21T06:43:33.593000
+CVE-2022-20780,0,1,1d3c5ab9939b427a5a7cfbe67c39443fb0340b80f749107bda63a35e1f2106e3,2024-11-21T06:43:32.570000
+CVE-2022-20781,0,1,50986e2fcfcc6b76f721bc77359a3b5719f9f16dc87450b3eaa936f705888b8d,2024-11-21T06:43:32.677000
+CVE-2022-20782,0,1,b129f5d8572cf310dd3f3a8f612bba2fb0d630bef592429d7c1883659ae2bebe,2024-11-21T06:43:32.787000
+CVE-2022-20783,0,1,0aaeaeb2c131cf584d70cdae4b35c2686d8158d85589c6dcd205b40f6ca838d8,2024-11-21T06:43:32.900000
+CVE-2022-20784,0,1,4f8690e53f5336ade36266a259b0734c098477d58c6d18095dfb1a39c0c00675,2024-11-21T06:43:33.007000
+CVE-2022-20785,0,1,bb8cbcdf0611d3bd52024df562ef6525ad3076becd2cee2c388a0e97d34b3973,2024-11-21T06:43:33.120000
+CVE-2022-20786,0,1,cc5d835c56715e7c093c302d399a5e326e3848735ccdda77ed3af45a94d7cc30,2024-11-21T06:43:33.240000
+CVE-2022-20787,0,1,4bbcd57ea0994495472814bc52e9836461db27f712e9aac4a30f2c5acc4d41a6,2024-11-21T06:43:33.353000
+CVE-2022-20788,0,1,2bbaea8cee346648d716b83aecc34eebf10aa13a89db121411efc7101d8731c5,2024-11-21T06:43:33.470000
+CVE-2022-20789,0,1,8883b72e5c6fbad7c6fdd918d588dae3550c27cb6abdac85f9c4c1c09d14535a,2024-11-21T06:43:33.593000
CVE-2022-2079,0,0,d5f125e93fd822011eaff9e0c83f32016c3325b9093c927b7a46ff36fa987719,2024-11-21T07:00:17.043000
-CVE-2022-20790,0,0,77cd4e8543c6f46e365cc339efbe8769e2b2ff66b6b59a43112b381716593112,2024-11-21T06:43:33.717000
-CVE-2022-20791,0,0,e0603cbc64580cdcd53193a907b6bb5935130432717e2b33375410c16bed0e79,2024-11-21T06:43:33.833000
-CVE-2022-20792,0,0,676236cce5ce2893a80ff36db937084a2d8a4af873240ede1a2d4139aa3cf48f,2024-11-21T06:43:33.957000
-CVE-2022-20793,0,0,92ad2c29d858aa6826d5d6262aab3bb5c3243fbc99201825ed31ec04229ac139,2024-11-18T17:11:56.587000
-CVE-2022-20794,0,0,a8e88f91e0578ced89f663a5f32f7da73094aaf366f3eb4e483d9fd69d8708f9,2024-11-21T06:43:34.173000
-CVE-2022-20795,0,0,35647820337cc1a99a3509adf4056123c21a02cca2f55da34953507f24aded1d,2024-11-21T06:43:34.283000
-CVE-2022-20796,0,0,69713b0b679e60207fc9f729cb3c4688de2dd06a9cc2e651e59a320cbb7f0c52,2024-11-21T06:43:34.413000
-CVE-2022-20797,0,0,f3b3e1b8ff4249f2f5566490128c8af699da4550484cd9c18da1cf0434ea79b6,2024-11-21T06:43:34.530000
-CVE-2022-20798,0,0,96b333b6eb739389757821f45a7246ba699ce32d1b1a2a4b2995407d554a8bd7,2024-11-21T06:43:34.657000
-CVE-2022-20799,0,0,a67ba5d2c46ca4a98b5cf1c6b5340577abff04737150224f8cbca1da4ed28ed1,2024-11-21T06:43:34.800000
+CVE-2022-20790,0,1,30025fa762eebde494124523082c07ef2501fad02d2c3a3db149de23be4224d6,2024-11-21T06:43:33.717000
+CVE-2022-20791,0,1,43787e857b4cba5aba5ec12b91b8834b0e65171745d70d221b8fe40a16737410,2024-11-21T06:43:33.833000
+CVE-2022-20792,0,1,99b0ce92eba6d891e77c8e51cb80a4fa8bbbcd72cf5379a41c456bc66c0948b9,2024-11-21T06:43:33.957000
+CVE-2022-20793,0,1,00bba64d51c5dd9c9ad31af3bd508750bced3405846bc27e61d2779e874fbd54,2024-11-18T17:11:56.587000
+CVE-2022-20794,0,1,4461e306f83938a9ea495780ecf7ce4c1135a9303ff1a3fe6aef4889c1d33675,2024-11-21T06:43:34.173000
+CVE-2022-20795,0,1,f093b17312735869a72d73411e93e980b862dedc17bf995179a96b7ce2141014,2024-11-21T06:43:34.283000
+CVE-2022-20796,0,1,687e9004d548cd16c2370cec3916ab83dc3df9945547e2a8cbc70b9ae4bdd175,2024-11-21T06:43:34.413000
+CVE-2022-20797,0,1,0a0d76188a0ae9f834af05003ff87c8262f2267d594452342f10525aa8ff23dc,2024-11-21T06:43:34.530000
+CVE-2022-20798,0,1,45b5c53b4e1a53d4e4078c3c71547ace92280a6d5bba7ff095610f307d0b9b7a,2024-11-21T06:43:34.657000
+CVE-2022-20799,0,1,f291e8da6671efae3c2e84742998656eaf749db4e6f04b325e2c18b4904e2ab3,2024-11-21T06:43:34.800000
CVE-2022-2080,0,0,4b72cdef2f75c502e580ff30a01bcada789fcbba3620cafc648f61233f02a494,2024-11-21T07:00:17.150000
-CVE-2022-20800,0,0,835466dba9acc8f7978ad385d08b073ce4dcf943670fc7fc9a20b5c7bda28e89,2024-11-21T06:43:34.917000
-CVE-2022-20801,0,0,a9c75e727a0a5112c3a9686cc25fb33db82aa195350fd4f2c15982a16c4525e4,2024-11-21T06:43:35.020000
-CVE-2022-20802,0,0,1a7bede1406607519aa5744f1149fdd8a3e42eef1b338bf49a7146dec783505d,2024-11-21T06:43:35.137000
-CVE-2022-20803,0,0,57cab77f091b34f5e504f249df111a6203482ef7b6f05f65f6205e7c438f2cad,2024-11-21T06:43:35.247000
-CVE-2022-20804,0,0,01b3d8ac8f42b18cb425c896d7bbbe1ff9856c13e67b347bc85068500122864f,2024-11-21T06:43:35.360000
-CVE-2022-20805,0,0,440c1a7ac24020b293808eef86bdefa8d0d298fde3e4d3fbb23fe87533c70eac,2024-11-21T06:43:35.473000
-CVE-2022-20806,0,0,748037df1e4f48c57ee37f88df4e3a49412dbfab0e95796fbb0084ee3feb963a,2024-11-21T06:43:35.573000
-CVE-2022-20807,0,0,d2b2cf63e85efd1623a2da29309e2efd52d83491d55ab839c505a538dafe2aa3,2024-11-21T06:43:35.680000
-CVE-2022-20808,0,0,a7d7591014d4810d34734f88db5678f10ee578cc3db7379258169d88c222a60a,2024-11-21T06:43:35.780000
-CVE-2022-20809,0,0,328c2273b30f6491fffde12585dc32fcd3d7acc6bcad2bd32c6289169ac4bbac,2024-11-21T06:43:35.887000
+CVE-2022-20800,0,1,65db42f7f1b22b15e35d6fba9a66f8f5c9a1515aa2352b09a4f23459c786a29e,2024-11-21T06:43:34.917000
+CVE-2022-20801,0,1,dd12744fdfd216a3aa1693f868e0461f11b40481ffdd15ec80dbe4d6e20b8f48,2024-11-21T06:43:35.020000
+CVE-2022-20802,0,1,cb7598df98ae8bcc95c7beec04790560c4551379737cec4c0787fa1dc825d2cd,2024-11-21T06:43:35.137000
+CVE-2022-20803,0,1,e4608cacfc4017e9682e9e83d7f1cd48b893bbdf75e1c6b6948d87ab01fb679f,2024-11-21T06:43:35.247000
+CVE-2022-20804,0,1,541dc4e866640ce9cfc87160eea5b188c2969280be5fa61b6fa65fd23a99f0d8,2024-11-21T06:43:35.360000
+CVE-2022-20805,0,1,35509e06e5b6e82810d4e78bdea8066a2a1b9aa374c8fc40f3b42789562b48a6,2024-11-21T06:43:35.473000
+CVE-2022-20806,0,1,8eae8ede6308837cd3c61b4e951fb299c84576f6eeb744a93f682e0210130f81,2024-11-21T06:43:35.573000
+CVE-2022-20807,0,1,36d999752bd951d419761cdbede770b85173b9406451abfa6a33d1b59c2bb21e,2024-11-21T06:43:35.680000
+CVE-2022-20808,0,1,138653bacba3af77a74c1f87c4c119b6487c77a37d1599bae482fd6a2c2c28dc,2024-11-21T06:43:35.780000
+CVE-2022-20809,0,1,8a6a9dd8f304c4ac7636d5cbfa8f2cb5de0e0fee00d0fe37774c91e90b9abee0,2024-11-21T06:43:35.887000
CVE-2022-2081,0,0,89b76e3a43812fa60365410ff92ed3bb1014b2c836fe84eebb72a4beabe3a4fa,2024-11-21T07:00:17.247000
-CVE-2022-20810,0,0,ff65ce0564ecd7579b6bb0d3d0df14391f4d31218b928fea569a60e716e3ebc8,2024-11-21T06:43:36.007000
-CVE-2022-20811,0,0,03c7d941348fd94b6aacbca2092b77e476a7d76f0d61b90e77ff2c268b999b84,2024-11-21T06:43:36.110000
-CVE-2022-20812,0,0,ac3dd9072b25acfd895fed3d8be6c602449634b6ca2f8840233fe669a35f2a3e,2024-11-21T06:43:36.213000
-CVE-2022-20813,0,0,bd2c3cc656a9bd7d3ef2e372efcbd6b678c37c8f0bce0f9ae175ad7fefa6a64e,2024-11-21T06:43:36.340000
-CVE-2022-20814,0,0,ab7e811601403b2f5c7c1f1a0924e08f380795ef515a925a1f88ed949b58911d,2024-11-21T06:43:36.460000
-CVE-2022-20815,0,0,5089f5de04a8d96c09247bf4cd3568ab1472bdba7af70bc145f0d1855d7b7032,2024-11-21T06:43:36.570000
-CVE-2022-20816,0,0,2449eb78da3b2426c6f9adfd5ba3e4c8693f9a58860d6dc13f015d73229c650e,2024-11-21T06:43:36.677000
-CVE-2022-20817,0,0,a55aab58e9c268043d41a66943a46745d84d0472de25254ad0e582c710abe7f9,2024-11-21T06:43:36.787000
-CVE-2022-20818,0,0,e16a25919e6bf5faef7022f829a66ff9a0816b47ac56dcd684e9692795486b7c,2024-11-21T06:43:36.913000
-CVE-2022-20819,0,0,cf5dbc2367eec4e5360685154b9670f87f2ac6b93bc160d43f54084782fc7556,2024-11-21T06:43:37.030000
-CVE-2022-20820,0,0,502c3d8a518309659a34e3f9828c206f55cd6dbf666936309b166e25f7ea3f1d,2024-11-21T06:43:37.143000
-CVE-2022-20821,0,0,4f3298de257e36382f752d5a39424531256e6938157a7f2b8280eb0d232c1b09,2024-11-21T06:43:37.250000
-CVE-2022-20822,0,0,b23b4605f3494a6df3af9ba77ed93a1017de26dac0df4aa221ade663f53b02aa,2024-11-21T06:43:37.377000
-CVE-2022-20823,0,0,807c7f503e87f3c476d4499f3f9c7764bb7ca10b5e6b5099008fc353265f712d,2024-11-21T06:43:37.493000
-CVE-2022-20824,0,0,7001b31246d3682630cb9529932a6b17ba917418b05fad9e05be3a204f5ca641,2024-11-21T06:43:37.750000
-CVE-2022-20825,0,0,a74804ce8b279ba5bbd9be05c81e5ea58d40af1414a2e8bc98e812b5a86fddc3,2024-11-21T06:43:37.997000
-CVE-2022-20826,0,0,c21ef64e094cbfe4a4ef54e065787353c540da780cae9ea1a5b50e6d7adb5ef5,2024-11-21T06:43:38.120000
-CVE-2022-20827,0,0,e3063fbf94e49f5ed17e4c1dc955993d44c2690e4d07913cb6dad17537e3a590,2024-11-21T06:43:38.243000
-CVE-2022-20828,0,0,ef6578a1894d42e1ba0ac33a907ef29c191982dac7921cc20a72832b8115e93f,2024-11-21T06:43:38.367000
-CVE-2022-20829,0,0,187435f2a12ad9f488e3767961fec2dbd1b68f4fd867b9dfcc90bba63259d6f0,2024-11-21T06:43:38.500000
+CVE-2022-20810,0,1,378a2a3269f6a60b38e028f60934199aa245dac9a9dc035412576b9e9387425b,2024-11-21T06:43:36.007000
+CVE-2022-20811,0,1,07171912581920f05dcd83b7b747ef8c26f7eb9c1a3a603ee2fff0ab79c32a36,2024-11-21T06:43:36.110000
+CVE-2022-20812,0,1,1f84f640cbc25dfc01b0245d283d450738a134ab063bd08fc52496b0117f7442,2024-11-21T06:43:36.213000
+CVE-2022-20813,0,1,bbbed812c6c76e9e01f2ec30a347ab953bfb298affb01b1b2e67fd14a72e4183,2024-11-21T06:43:36.340000
+CVE-2022-20814,0,1,ff21f48f0e24a50df972de8c587d502ddec5e513d7d5508ac43b13b451597ca3,2024-11-21T06:43:36.460000
+CVE-2022-20815,0,1,b516bed10c0e25a1c6df48a3b9f815290b536d9f348f1469eaa6d27f09e659b8,2024-11-21T06:43:36.570000
+CVE-2022-20816,0,1,1fbfb3abedd96e3f9d876ed03d76503230e94c70001ace04a768ad4d69947fcf,2024-11-21T06:43:36.677000
+CVE-2022-20817,0,1,ebb3f22ee663baaf5b6cfc7bc89436aaafaece79f6b4a8db3fd0c3984a913843,2024-11-21T06:43:36.787000
+CVE-2022-20818,0,1,5e69605fce0d2ad49d589ef45f22549141c8883107cbeaa1c45f335f2533923c,2024-11-21T06:43:36.913000
+CVE-2022-20819,0,1,535e5c17b2a71dc935efed00e10b9c1230c66616fba38a624427d509e56bba75,2024-11-21T06:43:37.030000
+CVE-2022-20820,0,1,9dd6b303d26fa1f2b5195f8d4d6b12425ce02c1daf23d45f98c9ed359be71e1c,2024-11-21T06:43:37.143000
+CVE-2022-20821,0,1,0233b2ab9d36ef0916672729cc863506922143112af73e7df8c6ea939e3dbd65,2024-11-21T06:43:37.250000
+CVE-2022-20822,0,1,baeea663e97c1737007aeb76f70345960275c929b3814cafd6914d04acc2d442,2024-11-21T06:43:37.377000
+CVE-2022-20823,0,1,0612c16a77b8ad35a967b17723bd01c542fdcad496bd816e773f497f79b1e45c,2024-11-21T06:43:37.493000
+CVE-2022-20824,0,1,11e5b1695de6789f3ee3df795b96c12d4dfb5a6e6ef523bb0e7f0de0136fa6ea,2024-11-21T06:43:37.750000
+CVE-2022-20825,0,1,22fcfe4003e6b17f9f3f68d5a0da243b03c803f126256841c4240e49fd4644e5,2024-11-21T06:43:37.997000
+CVE-2022-20826,0,1,dd129ba5588a8f8c9e6756275c546ae1af20c93b51b63b849a5d0012081ed7d0,2024-11-21T06:43:38.120000
+CVE-2022-20827,0,1,3a9d31b1f36114de8e17a01353b2ab7fd1aedb3e9bacf9accba6179a0321a87b,2024-11-21T06:43:38.243000
+CVE-2022-20828,0,1,57d2de2be49552963a071c4c2985723b3d654c1c1feaedcc853bd673edfdb00a,2024-11-21T06:43:38.367000
+CVE-2022-20829,0,1,02bf85d17ff4c5165c1dbf5456aa084806a468864a6031674b4de5c825694cc6,2024-11-21T06:43:38.500000
CVE-2022-2083,0,0,a842ff87a031cea51f75af83ed7b73355c403234817ca498e0071ed1815f6d4a,2024-11-21T07:00:17.387000
-CVE-2022-20830,0,0,452c9357d2c4c56da9b0fcc8864778e07b222af8015f90b9a43fe93068efbc3e,2024-11-21T06:43:38.623000
-CVE-2022-20831,0,0,da563d2d88c7064b509467a7e4a06e491bf65ed088c634f52bef3b79d66bef6a,2024-11-26T16:09:02.407000
-CVE-2022-20832,0,0,587ff38e688765d94d56fbda54ee6609e4e38e83aee38e9612e6acd5aff8a351,2024-11-26T16:09:02.407000
-CVE-2022-20833,0,0,8716053eadb4aabb9f9a3e1a59697e4adfdd77269ee1d1fde9d5dd6ec070b51b,2024-11-26T16:09:02.407000
-CVE-2022-20834,0,0,d468e45da2b93b7160c2fe9ae668bcf6d4d36aca3d96e5c770778e77ff664539,2024-11-26T16:09:02.407000
-CVE-2022-20835,0,0,7832d4949fbc21c5c2598c3e9124b73e46762eca767f93350559006f8654836a,2024-11-26T16:09:02.407000
-CVE-2022-20836,0,0,92298264e190f4a6223661584a608f1c8e8153628adb8ce38fc41be6a8a59b01,2024-11-26T16:09:02.407000
-CVE-2022-20837,0,0,256b2610174b8be76fa1fc45c2742791ffaf4d2c1f97b1fab99cc123f4c1a825,2024-11-21T06:43:39.510000
-CVE-2022-20838,0,0,bfc91de5cb7c69c0a0408af2804b57ad5957e086e2451438eb11639ac410297b,2024-11-26T16:09:02.407000
-CVE-2022-20839,0,0,b15254c96631636bfbb50e3bf4becbd4f06a5c5bf2272a4d4d422a5d5b5ff675,2024-11-26T16:09:02.407000
+CVE-2022-20830,0,1,753ef7db687f37d1fc9a8460cce7e42b97874bc6bdd59a346d3d7355303d0055,2024-11-21T06:43:38.623000
+CVE-2022-20831,0,1,5a875edcdec48bb42683bcd9486bf842433cdf5194e2e8cddc249e4ce6d5c98b,2024-11-26T16:09:02.407000
+CVE-2022-20832,0,1,c6fc0bfd5f3e08f59e42b959557383a5b43daac342aac3a927730caa64b3664f,2024-11-26T16:09:02.407000
+CVE-2022-20833,0,1,816a318e70bd14a4838c076f3d4608d9d954fff2c27f829060b22e4e2026ab90,2024-11-26T16:09:02.407000
+CVE-2022-20834,0,1,6edda5d070f2f4c2aa3557e656ddd00c9d8912cbb087bedfc131d30f2f8dca2c,2024-11-26T16:09:02.407000
+CVE-2022-20835,0,1,aaf9d508d97d28c9804bb0c2c66522e10d832a1f093675dbd4c25588a2b61384,2024-11-26T16:09:02.407000
+CVE-2022-20836,0,1,adbd9b97dae73fc9e2b8566d8c9fd05a36cf52c2519165e4d1343a016d0ac3e8,2024-11-26T16:09:02.407000
+CVE-2022-20837,0,1,f4b2c9dfb7270a641538d2b9d4a185b6890bacb0577c731623e4a6746a125fd4,2024-11-21T06:43:39.510000
+CVE-2022-20838,0,1,890756cf2c941b5615293c8dc97a4d82a5e6422e035a0dfaca924881cba7c133,2024-11-26T16:09:02.407000
+CVE-2022-20839,0,1,15286b2f1bd0eb29431ede447fe902f04b156038fe9651dda77f98d56599a13a,2024-11-26T16:09:02.407000
CVE-2022-2084,0,0,24a86f324b144ca7879a5938c6ef797799ec468eb1d1d9785f04aa46b15ce11a,2024-11-21T07:00:17.490000
-CVE-2022-20840,0,0,8ebc33a4be3e1650533abfc1d8e066efbaece0473d55de08fe39f4030fb6b06d,2024-11-26T16:09:02.407000
-CVE-2022-20841,0,0,05d5c4cd23f31ba8a1b7550bc14895bc88d47d71fd9954efc2e12f4b058b386b,2024-11-21T06:43:39.987000
-CVE-2022-20842,0,0,8c0026e966e61b12440780d0c887b7fcb1104687309a1fabc99fbec547ae987b,2024-11-21T06:43:40.107000
-CVE-2022-20843,0,0,817910856c8263bf1dd5af580a30a0cf02f7ad8ffbe05c5371d1a8fefc788a3c,2024-11-26T16:09:02.407000
-CVE-2022-20844,0,0,d9293dd3a6815a57a008cf326b31edaa68d3e547c9b05a7ff78e24c688101840,2024-11-21T06:43:40.347000
-CVE-2022-20845,0,0,6c6a204c0a352fa65c20d441eb0439bc65bfad95686d80ecc47aff8a0b2697c3,2024-11-21T06:43:40.460000
-CVE-2022-20846,0,0,2d4e094d0578788bbd5197e0eecb27cef472d42b7e79a4983fc6ab00b5746655,2024-11-21T06:43:40.553000
-CVE-2022-20847,0,0,bcdbcc566d1a407219f0fda7a0b82350d4f826151d5d34f7ba31e0cc22218ecb,2024-11-21T06:43:40.660000
-CVE-2022-20848,0,0,9ca5e36c93cdba14e71e290efb4f574da54542775458add0f1d0faab519d3458,2024-11-21T06:43:40.767000
-CVE-2022-20849,0,0,b31794c4aed53e4698dfc5ea0bd793cf37e67f4d1dbcf87dbb47016e963df22e,2024-11-18T17:11:56.587000
+CVE-2022-20840,0,1,3b682d7c8037b4217dd35c01bd552562400c1ca4512d8543478a063432640a5a,2024-11-26T16:09:02.407000
+CVE-2022-20841,0,1,d6df8ac2c84f71ca2271d75e5e90f20e7c063b7e3a29e67af67be516c70a8f0a,2024-11-21T06:43:39.987000
+CVE-2022-20842,0,1,a7044125e80147765c1a1a7dc84df5a4059ac528e7056e589007a277d30fb342,2024-11-21T06:43:40.107000
+CVE-2022-20843,0,1,9be246dce3bb457c25aa7ad4af9c66aacf9cd2139261bee571dfe38c4bbab4d8,2024-11-26T16:09:02.407000
+CVE-2022-20844,0,1,aca69d682770bbe8a0d3625d4b0b03342bc8e106ac6e309fdfa79635b16b6bcd,2024-11-21T06:43:40.347000
+CVE-2022-20845,0,1,c291231437728ad0886d6199e9baf1b1cf3b95313e5dbe853982c22d85276544,2024-11-21T06:43:40.460000
+CVE-2022-20846,0,1,9ab83ab21bd833b0769d58093c944ff382b2eb8749e8832bd261ae8baeab988b,2024-11-21T06:43:40.553000
+CVE-2022-20847,0,1,190b9b8db3503935d69e71ae754ed70c3c1cf9cc29c31617b5e397aac60abe81,2024-11-21T06:43:40.660000
+CVE-2022-20848,0,1,90b12a5241861c07adbb11fabf6ab7afafa638746da5bfd61cf6e3c39cf314aa,2024-11-21T06:43:40.767000
+CVE-2022-20849,0,1,9ecff1d1393f27fb2462727108aba9c7c4912545423631d3e6f814c29382ae6b,2024-11-18T17:11:56.587000
CVE-2022-2085,0,0,ffd883b8ed9315e8c1d870421355f54f701bb81589642fe48ef20fb2d49d16ac,2024-11-21T07:00:17.593000
-CVE-2022-20850,0,0,b84cc71cc9b42895b3d33c03b83966fa9baff1502bbe277544384eb668b4d5d2,2024-11-21T06:43:41
-CVE-2022-20851,0,0,901214108401794a5f783860a6b00772ada5462e148cabe5ae3850d462ef5d31,2024-11-21T06:43:41.110000
-CVE-2022-20852,0,0,96d18ebaef30323dad3ba80d661b8ffa8b0a6225e4dabafb21d9eac8c6081575,2024-11-21T06:43:41.247000
-CVE-2022-20853,0,0,d46d78892a73d5c8136afa886f38aceb13b17656f46cc2183c8be1f7581d55a3,2024-11-18T17:11:56.587000
-CVE-2022-20854,0,0,b109a6e29b7e98e0fbc479f724a29953f033435cca83faad17b197f8453832b4,2024-11-26T16:09:02.407000
-CVE-2022-20855,0,0,0e6b0f52264db94157b8bb4fc03a41f123d1c474d4309c1bb7b0ebe05c012701,2024-11-21T06:43:41.627000
-CVE-2022-20856,0,0,3adea6772d2795ecc4487e869de744434bea57870a9f8a5999d9ed56e883faf9,2024-11-21T06:43:41.747000
-CVE-2022-20857,0,0,d9083828e4d442da400c2928f540a090ca457b109b6434e4da6e4dce9500c895,2024-11-21T06:43:41.860000
-CVE-2022-20858,0,0,f12dfb4cefd5ad8b8e8d0ebc47d789a68d53a96318de3229672eb193819a7f96,2024-11-21T06:43:41.967000
-CVE-2022-20859,0,0,4944d6ccbd731cff43a5ba4bea5f8d7cba270ce66a2c7856b369c15590b43dc5,2024-11-21T06:43:42.080000
+CVE-2022-20850,0,1,1cda1965f292720bf2a20f78b43d7a3529aed4b1b8fbc1d5b882c609f89801dd,2024-11-21T06:43:41
+CVE-2022-20851,0,1,f9f8339e791a44238bdd610e2822fd68be13d90f5dcd7a8294603aae94f04a86,2024-11-21T06:43:41.110000
+CVE-2022-20852,0,1,c6cb96e6931cd1c4177b0593f8e98d7974ff1a277fc062bc3136e9c2912b4d3f,2024-11-21T06:43:41.247000
+CVE-2022-20853,0,1,984e9612f99016a5bd73854eb6cbb241eb7ef08eedc4ff71710a6f23aa5e579c,2024-11-18T17:11:56.587000
+CVE-2022-20854,0,1,a037ce35a7e3f7049a61506925ddd4469bb6a1f635b71fbeb7c0738c3e038994,2024-11-26T16:09:02.407000
+CVE-2022-20855,0,1,3c6bd453c443e40dd32cef5ad51a303ed2d16874408ab4e8b0efb602c615b923,2024-11-21T06:43:41.627000
+CVE-2022-20856,0,1,7d9e0530fbd2704e49a7913d0ee93387e4d8ba95c0f8e942463ec41ddf9be3a9,2024-11-21T06:43:41.747000
+CVE-2022-20857,0,1,95e3ca62e8cf1b5ae25316e7f4a6d359f07c07a6428469c545eecbbc50c74155,2024-11-21T06:43:41.860000
+CVE-2022-20858,0,1,b121a97b8082a266b17191a038f461ef92ae579a69f704e4522898ac7837d846,2024-11-21T06:43:41.967000
+CVE-2022-20859,0,1,af53a0290713651d985581ca9a79fdcee4bbae56f0c0fccd447b54f923e7b5d9,2024-11-21T06:43:42.080000
CVE-2022-2086,0,0,923bcdf44de52f071985636ccf7b058a1ece5c79890dff7924a2947e36040b82,2024-11-21T07:00:17.707000
-CVE-2022-20860,0,0,029247554cbfe298017db8e35a2041d00e5694f5eb243fbf6e6b12fc41193c46,2024-11-21T06:43:42.190000
-CVE-2022-20861,0,0,e0e60e9efe913c984f5c79cbbe1d77b06848bff8a58cec47211cb01a5e6554a1,2024-11-21T06:43:42.300000
-CVE-2022-20862,0,0,b446fa95c784c4d597f5121d2b851eccd800d51dba5e9512c1fb54534ce61e1d,2024-11-21T06:43:42.403000
-CVE-2022-20863,0,0,9408a59cd97c671326f5bf373ce68759409ccba6a6ef1e3200e62344db4dbb7f,2024-11-21T06:43:42.510000
-CVE-2022-20864,0,0,58a56be295aaff0ca135445a3acc7e2afb23c2137002326100603e193213da12,2024-11-21T06:43:42.610000
-CVE-2022-20865,0,0,21c1655392bc5dc3edc3a89d1670ffea7fdf36dd423057ab534914d630be11dc,2024-11-21T06:43:42.747000
-CVE-2022-20866,0,0,30d3a0b73ed3942a02bcf0137c5a24eb2828d8845e31b7b518f3d001b868ddd9,2024-11-21T06:43:42.867000
-CVE-2022-20867,0,0,ddfd02c84554c0d31e3e253537d34f48fb1002abf46ba19824f7cd4872b0c279,2024-11-21T06:43:43
-CVE-2022-20868,0,0,fa3ead2244c4c7ba2e6176db5cdfb9e99089190729a2f43f65bcbecc53c99c2e,2024-11-21T06:43:43.140000
-CVE-2022-20869,0,0,4205173951a547def9dfb635131e42f95f5173dbdb26a78f063ed37954632ff9,2024-11-21T06:43:43.247000
+CVE-2022-20860,0,1,0f36fbcc01bf48228b4680212fbe5acd5b79a0fa54acd25a644c8a593ab5640e,2024-11-21T06:43:42.190000
+CVE-2022-20861,0,1,7c12c24ad7b9f2af6f807af1ed6383ff8cd9947c2963d85645d2d4a582f0a757,2024-11-21T06:43:42.300000
+CVE-2022-20862,0,1,169dbe779a992de93f8840fd32be04c55d94e9100cc93326f6a300ae484296f1,2024-11-21T06:43:42.403000
+CVE-2022-20863,0,1,6db9f35b468bdf7e60c68ec9959a11cc9dab41d5243d3647a94fd6238b61aec0,2024-11-21T06:43:42.510000
+CVE-2022-20864,0,1,d609abbf643666da87fedd0f48a83ecf85c69de211eeda5978ef37465bef8bb7,2024-11-21T06:43:42.610000
+CVE-2022-20865,0,1,9e858ef232e0b9395e7c152bc38d2ceaa21b4350ecd47b50627cb2b9c1454c96,2024-11-21T06:43:42.747000
+CVE-2022-20866,0,1,08b83417ed27d5828342003649dab7e4eccddc33005b57a1367ffc2dc8be5376,2024-11-21T06:43:42.867000
+CVE-2022-20867,0,1,9b98e64c693658cbdbb1c2b21d72ba2442626027a67d56729c0aed7649aa0300,2024-11-21T06:43:43
+CVE-2022-20868,0,1,cad6978d0272c09702410960b498a4f245f7d6d52544fca178a8cce9d9e1636b,2024-11-21T06:43:43.140000
+CVE-2022-20869,0,1,31652d40bff73b8c16ac4d3510625fa374434c95d493bac9d18e2ab53f5c29ad,2024-11-21T06:43:43.247000
CVE-2022-2087,0,0,c8dea08527000b2d7561af19579da90d03c71bafe171fdae4cf2f988442afb8b,2024-11-21T07:00:17.817000
-CVE-2022-20870,0,0,4c334601d362afa32a0ad39397b116080f3cbd26fa55c1dc2bfa4bd785f903b6,2024-11-21T06:43:43.347000
-CVE-2022-20871,0,0,c6e99528cebe6b5670b6cb8b1401022c269c14047581b4c8eb2f2855b908683c,2024-11-18T17:11:56.587000
-CVE-2022-20872,0,0,aaceca13491c8474306bd57948723f0e818314e4d1685935077a5ed5082574f5,2024-11-26T16:09:02.407000
-CVE-2022-20873,0,0,5b0dc7256f9366b7b6e9ae5dec35cffdd06999343c576acaeaf9bb2d682565d2,2024-11-21T06:43:43.653000
-CVE-2022-20874,0,0,5a463c00b01c88c25a2c91ca05e1eb557ede51941dab618f4cb8e65a64c116c7,2024-11-21T06:43:43.773000
-CVE-2022-20875,0,0,66e6ac37a8ecb1ef1f2960a96d9c09cc616a5f23f30e21f26b11819eea377ed7,2024-11-21T06:43:43.880000
-CVE-2022-20876,0,0,36bccb4c24df0491069f9da87c2735f37af12ba366b68fcd1be79bfa240fa283,2024-11-21T06:43:43.973000
-CVE-2022-20877,0,0,61a0179e6c5d11c89cd605f5c62936838568ab8583938738a1ae403105af1b98,2024-11-21T06:43:44.080000
-CVE-2022-20878,0,0,75f7fd9fc455cf148b1a0958ad90c5d667283dd6e3eaa2aabc0958d8c1dd50d7,2024-11-21T06:43:44.197000
-CVE-2022-20879,0,0,bdfd0d17647397142a1d75851a7625a626174a2586b46cb4658d0c3cb173d034,2024-11-21T06:43:44.310000
+CVE-2022-20870,0,1,fdd99c572838e38fd1eb8b955d251aa88e022e27b4fc159f3f654e115531f470,2024-11-21T06:43:43.347000
+CVE-2022-20871,0,1,75711bd05ab43fb51c0ae48960c345e0eba96953eee2bca578a82dce320687e5,2024-11-18T17:11:56.587000
+CVE-2022-20872,0,1,4cd18fdff3c7dcde79190e83333c9f0b73f13959bd08cba83e6a78f547e20c89,2024-11-26T16:09:02.407000
+CVE-2022-20873,0,1,29aba8295cace9a8a5438fe6f915777db5b09781c0c21f04953edc383ce357d9,2024-11-21T06:43:43.653000
+CVE-2022-20874,0,1,d40a7d7297fbeac7e0b106753ceb4bbcdbb7c4c98744d41130dfd403cfeec03b,2024-11-21T06:43:43.773000
+CVE-2022-20875,0,1,cccd09487abdef07538e1074a267ddd59f5a8e3efb50f7b08ae166bba7bbf83a,2024-11-21T06:43:43.880000
+CVE-2022-20876,0,1,7d7905e2eb21c26b31ae22b418c6c225f73025b4dca23fcd82e936edb865b370,2024-11-21T06:43:43.973000
+CVE-2022-20877,0,1,dc907d7846f61c8db77135bbf8c3250f8c97b1408efc67d29ab5e8e1395aca50,2024-11-21T06:43:44.080000
+CVE-2022-20878,0,1,1d6ebc77ee2c01bcb9c300212bd0e4b8955a51880b359f2ef1e5ab932af7cd40,2024-11-21T06:43:44.197000
+CVE-2022-20879,0,1,dbeb37f0378e664d5359f0f98bb4efe08f1b15b2d4c6244701195dba26838aba,2024-11-21T06:43:44.310000
CVE-2022-2088,0,0,388edca449480554232f306ad6df0f1b17aa58539117a5a1f02a47a9db376612,2024-11-21T07:00:17.933000
-CVE-2022-20880,0,0,2bf7574e5c7343cd126c870a4b37790ff61f13a22a6618a9aae3aaa08b48dc14,2024-11-21T06:43:44.427000
-CVE-2022-20881,0,0,d6c181505e67a6050401c6f53e3779ab31f9c3f886243393c41695a0db3b06d6,2024-11-21T06:43:44.543000
-CVE-2022-20882,0,0,a62f1327aec7afd6321ec61b5e091d199a45967af094f2365e545824c1c873fb,2024-11-21T06:43:44.653000
-CVE-2022-20883,0,0,50feb4d65b65340de99ed5cbd7fdf83da23ef516ed03505330df8b8ec119b974,2024-11-21T06:43:44.780000
-CVE-2022-20884,0,0,7f88413be1dd906a265492187f55e2463af61e20589ccadfbf91d93e48d62905,2024-11-21T06:43:44.917000
-CVE-2022-20885,0,0,316730bef5f8019de7e04b1faa83ca01d995ae6a00aef4fd583d868aa37fa42f,2024-11-21T06:43:45.037000
-CVE-2022-20886,0,0,5c1f4ba4f1b0060484768949ecae838bc395cd7ec32cfd8a839ed4fda345ce35,2024-11-21T06:43:45.147000
-CVE-2022-20887,0,0,3336b76d62ca27b770f98f0efe82ae94766f68d99b9ce6cd4fd9e8fdf2f015d1,2024-11-21T06:43:45.257000
-CVE-2022-20888,0,0,0670d975e1ba62991731195147ed217c81b0d1c0c3d3f821944fb40bf620ad51,2024-11-21T06:43:45.370000
-CVE-2022-20889,0,0,46e0a86f6eda3946c8e85c041a029d79ac41e7376942c768729802754f7a0b8b,2024-11-21T06:43:45.480000
+CVE-2022-20880,0,1,f034530e57a860a4009722456e9a07338f2e134d4b69222a615911da023e0d7c,2024-11-21T06:43:44.427000
+CVE-2022-20881,0,1,7f3b4e5f4205fef866f6f72824d864b7ed6e613df84446134c49ad97f3c45b3b,2024-11-21T06:43:44.543000
+CVE-2022-20882,0,1,e03e2d0dddf18535c1455bcd7abc5a21bd6dac74cee12de5e6f69c25f9d97f35,2024-11-21T06:43:44.653000
+CVE-2022-20883,0,1,623909e42681252ca178a040118dd3437eb9335eb9eaba8e3f1c4f365ec3bddc,2024-11-21T06:43:44.780000
+CVE-2022-20884,0,1,0ce87555b086545b2597440cb1bcd137f824583551b132d25f99070d1f1f720c,2024-11-21T06:43:44.917000
+CVE-2022-20885,0,1,2be789517390898fd5799d0458602dc1b6b5e048462bf343994a986ad5bc5f2b,2024-11-21T06:43:45.037000
+CVE-2022-20886,0,1,dabcbf0b433cbabe5c062c0298c6deb71735fd105b970c5ab84c76b7612f115b,2024-11-21T06:43:45.147000
+CVE-2022-20887,0,1,4088c64259594a8d870924edb8a79f65749bb3db4c501627012ee678c9d19253,2024-11-21T06:43:45.257000
+CVE-2022-20888,0,1,272a606aa38754c65e235d5d8bcfe147e96c93b7d93581f862dea039f026d86a,2024-11-21T06:43:45.370000
+CVE-2022-20889,0,1,3c65f2507cfc10c7ea2470fb87dfc23b87b4a7f70eb9fc85236d8c3a57323643,2024-11-21T06:43:45.480000
CVE-2022-2089,0,0,5ed79de16bce8fca49bcea92b52aa339672f8699ba3afed89381592f3a4ebfa5,2024-11-21T07:00:18.043000
-CVE-2022-20890,0,0,60e1d9666bcd4f5bf02783fd5154cc6fb8671ffd8920a5f35f8003f53f48d3fe,2024-11-21T06:43:45.603000
-CVE-2022-20891,0,0,72b72b2f97ac04be7375231059555bd9de5ee8ae3b6bbe859d5869059ca21eee,2024-11-21T06:43:45.713000
-CVE-2022-20892,0,0,7d229fad4334fb4e60fd159196bd41fe4f8bafb613b86dd09802854ad69b28b0,2024-11-21T06:43:45.827000
-CVE-2022-20893,0,0,3a2fc90a1f53f9a69b2aa91557f50a14bb0362e7ceba9da15204d3ee426bf7aa,2024-11-21T06:43:45.937000
-CVE-2022-20894,0,0,0118017b697bed327a2dd8e1a1193758f55a87b3a8bddc5c5f97bd38f3774e6d,2024-11-21T06:43:46.043000
-CVE-2022-20895,0,0,454bf105f7ce384d86216820362ffef316693c3f83c01566d4faaec712970c24,2024-11-21T06:43:46.160000
-CVE-2022-20896,0,0,3c795c38b882b426144792a06e4b8e610a5a7bded190a6112b0eef9c0901dae6,2024-11-21T06:43:46.277000
-CVE-2022-20897,0,0,9d75fe403d882358fd23c5ea0de4ab456cffe5d8f4bcb4d71d5560bb244554d1,2024-11-21T06:43:46.390000
-CVE-2022-20898,0,0,100739db8763978f6499c8b6bed9c07b9096982234afb129ff8709a32f7f6e9a,2024-11-21T06:43:46.507000
-CVE-2022-20899,0,0,f7c18896aa208c1e4d1eb345eb9c8ecbffa4d074d9466bfae007ddb0db9fa57e,2024-11-21T06:43:46.613000
+CVE-2022-20890,0,1,f8be2f49eb5716594201b97aab3df32a54e7acf45a1fe9bdf3a5973dddef8140,2024-11-21T06:43:45.603000
+CVE-2022-20891,0,1,7a3883d5b64df194eb53ba8c15ad62eb3644a739b767f3ade4024b10f45b6490,2024-11-21T06:43:45.713000
+CVE-2022-20892,0,1,959529f2b8b120600d509be00e0fcc83b9bd8ebe221b22561886cc1025c9a26b,2024-11-21T06:43:45.827000
+CVE-2022-20893,0,1,8959cad891cc48eba35892ee8a2a330fa85aa337b9b8a4431d04cdb087cd90d3,2024-11-21T06:43:45.937000
+CVE-2022-20894,0,1,7cb46cec4a3357cd26fc87b21817b4dfe7009901778c70b01b7de9c562411212,2024-11-21T06:43:46.043000
+CVE-2022-20895,0,1,9f15617264e58f43e307731a0691fb90d20fe12378b18746acf0c548b7c69106,2024-11-21T06:43:46.160000
+CVE-2022-20896,0,1,155f1a9f53d11adf632f36d3942dc49724d9eb342203b185d9b1d99d000951aa,2024-11-21T06:43:46.277000
+CVE-2022-20897,0,1,b9cfb68407a5213ebae2a594806cc9fc67e1f37cbd669cd786933a811354a937,2024-11-21T06:43:46.390000
+CVE-2022-20898,0,1,880e3dac920c342020d45cf057211712919e541e94ef9fa9062d8aa9c5d1fbc7,2024-11-21T06:43:46.507000
+CVE-2022-20899,0,1,8307f1bbb2d68f7ad0f77f779ad73ec8ff83c2a8c5b1459d67cb8812a97c62d1,2024-11-21T06:43:46.613000
CVE-2022-2090,0,0,3a451b3929dd4471ba105eeea6aee964a991a749f7eda28ce49925ba248cf7c3,2024-11-21T07:00:18.147000
-CVE-2022-20900,0,0,8c6b3054ba09ac37d49e950627f051d35d591050d48d9ab76f329b461139c4aa,2024-11-21T06:43:46.747000
-CVE-2022-20901,0,0,6649e5e9c8d7d0b4b99dc87f2d6f7e75c467884346659c215ef207e3bc5af427,2024-11-21T06:43:46.870000
-CVE-2022-20902,0,0,97e0ba4e1736983bedf54396237b5a2346177324e24d1730c75058af31fbb0d1,2024-11-21T06:43:46.980000
-CVE-2022-20903,0,0,a89071dc28a86e55b45e14db02312e7d540f308c4e4a157a63c32ecd86854c2d,2024-11-21T06:43:47.093000
-CVE-2022-20904,0,0,7d71756bac7c72c7386c79f03cd838381b02e4633330df20f5307c4ca68f6003,2024-11-21T06:43:47.210000
-CVE-2022-20905,0,0,77a21e887ea8f154a41aa0bd8e8880ccc0fde20c54155432dab3f259bf98e432,2024-11-26T16:09:02.407000
-CVE-2022-20906,0,0,0bccf8fd44a426e27f26fea9fcdc3b1a140e8fed989f0a34773e377e91218ba0,2024-11-21T06:43:47.450000
-CVE-2022-20907,0,0,4fd9425e3e0a854264cedd55195a4f38379b5060bdf348c482ca262339170df7,2024-11-21T06:43:47.557000
-CVE-2022-20908,0,0,7e3466c7b9859af720691ea312fd449a9e67653b2e2ba06e4d648c65dee96d46,2024-11-21T06:43:47.670000
-CVE-2022-20909,0,0,945a181473592ca66dd3cc77b863159b05b64080507c5f1ad8a04cb7936626ae,2024-11-21T06:43:47.777000
+CVE-2022-20900,0,1,9c87635e08052b094249579f1b59864fc3d4be4bd90ff6891b9f1932a4ac3196,2024-11-21T06:43:46.747000
+CVE-2022-20901,0,1,0c20295775c8404a8aa9c3985481b22f3efe7501d0678ade9c5701a2fdd9f064,2024-11-21T06:43:46.870000
+CVE-2022-20902,0,1,b324af8b8741fb6ef441234cb7d809893c0185d5fec98b0d01a19764e389c574,2024-11-21T06:43:46.980000
+CVE-2022-20903,0,1,75b258525234405ccf4b174cad5144273a455e7ba7d7687addbea1574e1f1697,2024-11-21T06:43:47.093000
+CVE-2022-20904,0,1,13d9852c104f39a6300e596977d08954aec3ec3ad115af0ccb245c5bdfb48baf,2024-11-21T06:43:47.210000
+CVE-2022-20905,0,1,010709949d203c416143f8fbe9f1a7f301024fdbf6c27620a9554da7b36b809d,2024-11-26T16:09:02.407000
+CVE-2022-20906,0,1,3729eff55e64e0220b102c161884f8e18f31198c6d0e129e3a8e3269ece45ded,2024-11-21T06:43:47.450000
+CVE-2022-20907,0,1,3ae76d8e5a5efaf83936b26556806d9a70264bed3f4878ba36800180f063fd5e,2024-11-21T06:43:47.557000
+CVE-2022-20908,0,1,744dcc52e2dccc1dddf5c278b070c542e2787bb00e6020a9acc7ba0fd14859ef,2024-11-21T06:43:47.670000
+CVE-2022-20909,0,1,e90f5b750640a81477eb57aeccc729198de71d4ae22c77c86f2aed17d58a987e,2024-11-21T06:43:47.777000
CVE-2022-2091,0,0,187c17b15ddd84db26cca6ff060f855f6dbf4fe538768343ce6557b545783074,2024-11-21T07:00:18.250000
-CVE-2022-20910,0,0,8a4af591ac056f8c41404ba25d49d1fdf19ee06d9a9194c16465a245ac0813cc,2024-11-21T06:43:47.890000
-CVE-2022-20911,0,0,adae26e19d39a324cf36ff85c26f49674f94183d59b918d9c080daa36ab0a31b,2024-11-21T06:43:48.003000
-CVE-2022-20912,0,0,d6bed42f39d568becdf133557abc23943ebc38acd53bba2719a505544fccc3a0,2024-11-21T06:43:48.120000
-CVE-2022-20913,0,0,5426d60c1bc052a1b80254fdd41896b67b85ccbe443dbbd77c82fd497d86008f,2024-11-21T06:43:48.237000
-CVE-2022-20914,0,0,c6c040352f6911b05f3a54939db46c4ae146c8c459d32a01a4c474433247d222,2024-11-21T06:43:48.350000
-CVE-2022-20915,0,0,1fbec088f4b8e8bc26279f4aa23ed521942731632909b8e9e6eb63c4ac58cd36,2024-11-21T06:43:48.470000
-CVE-2022-20916,0,0,f1832a2e4a7a26de1cf0e025c621a8829ca36916b171aa942c243d9767bc1959,2024-11-21T06:43:48.587000
-CVE-2022-20917,0,0,29b929b5a3f9b7b7aeb39e02240d139ea6b673241da5fa2f2d56583b7183fb1a,2024-11-21T06:43:48.703000
-CVE-2022-20918,0,0,22cc36ccaf38d48135440e67030dab30e608ddadc1710cd9e911530a0fd0b62a,2024-11-26T16:09:02.407000
-CVE-2022-20919,0,0,4505d2d0112775c47b97f839005059872ab6f9647919edf6a79bb6f0d99cbed2,2024-11-21T06:43:48.977000
+CVE-2022-20910,0,1,c950a31e27341e6c9937c6ce191f99de2bc24139a071b2ec268b6a59737fcc63,2024-11-21T06:43:47.890000
+CVE-2022-20911,0,1,476657d6e8039ef0a26310bd422fa604e46fe0a52b62885dcd1fe7b321286a98,2024-11-21T06:43:48.003000
+CVE-2022-20912,0,1,a990d3e61c225330701e838065282bffeeb3602092f78aa5bdcf73d8a9f5d47c,2024-11-21T06:43:48.120000
+CVE-2022-20913,0,1,5d666e185ba0a155df3371309fb3fed848423bd22a28a94e78682c0b4491fece,2024-11-21T06:43:48.237000
+CVE-2022-20914,0,1,0aeb4880a5983bfd1b3e53050dd4fa9e26b9c335cd70a16ab210893bc8a66ee9,2024-11-21T06:43:48.350000
+CVE-2022-20915,0,1,6b16887368aef930eb7126eba83cd5a28ef283373a06523752620ce57e56114b,2024-11-21T06:43:48.470000
+CVE-2022-20916,0,1,bc930fd02ee3f8e463d8225748ed2201a19a7102915504e297586aa17c029dfe,2024-11-21T06:43:48.587000
+CVE-2022-20917,0,1,c607042c7a8b3a241667ed33c3ffbcd029def684458894bc0bebfe6e18444f7f,2024-11-21T06:43:48.703000
+CVE-2022-20918,0,1,2f26f8f2b948e7a93616396bb7e63783bece97513507ce638c1565b79866dfd9,2024-11-26T16:09:02.407000
+CVE-2022-20919,0,1,196c3bf3637fb758d0131a3b5f2ea206f0a5148d9f5270be9878de36e5369e89,2024-11-21T06:43:48.977000
CVE-2022-2092,0,0,b8c6cedbb5d0d8873e4a8249103febdd8b5b362d2cb7a754eba9752e973a1a28,2024-11-21T07:00:18.350000
-CVE-2022-20920,0,0,82cedcf48759dd33e1a87cf87b20192c308d4b206d1d8f0ed91fd6e40c06583e,2024-11-21T06:43:49.133000
-CVE-2022-20921,0,0,c0ff5d2e7a1577e6cbcb222ddd463c2e9cec744f31ea97a845a55486f2c04c08,2024-11-21T06:43:49.690000
-CVE-2022-20922,0,0,336145003986df80ed1774313806f4f7fb3df144c01ddf230081621f511d3074,2024-11-21T06:43:49.797000
-CVE-2022-20923,0,0,01de72ce408bccbf87e1067535c4cb620508d22148e3660d3a1833ebaba1943c,2024-11-21T06:43:49.923000
-CVE-2022-20924,0,0,21a674afc4bf73e0db9879da26e9928e5b85c95e9b63dcfacb3031ea019cc257,2024-11-21T06:43:50.043000
-CVE-2022-20925,0,0,cd2e8b1011d3a5c402f49aefaa5a444fa3a215025658fa7207dd6f36fddde155,2024-11-26T16:09:02.407000
-CVE-2022-20926,0,0,9f1be2227e980c103ed11a0166f5816f3c4bef7e81c11015b5711b7a5f848014,2024-11-26T16:09:02.407000
-CVE-2022-20927,0,0,26c2d647fe22d834f49bee0a8adf312cbbd380745b1aae090ff0d25ad0b31efe,2024-11-21T06:43:50.390000
-CVE-2022-20928,0,0,0d7c83cfc15cd4bbac71395c8e502fcdb3984aedbc3b7e9988c651d36d5ddf41,2024-11-21T06:43:50.513000
-CVE-2022-20929,0,0,2416f144b3ba8e74ea3ad80856a74745449d60be2027b923538363c2b870c8a7,2024-11-21T06:43:50.707000
+CVE-2022-20920,0,1,c7d345765dd6b6f2f19ae33a6cadf55be57f505a1ea6b5acac9649683f639462,2024-11-21T06:43:49.133000
+CVE-2022-20921,0,1,8e3ee750269341107f03b013686de889f76c4836dc6e7a049ad6d0b005015056,2024-11-21T06:43:49.690000
+CVE-2022-20922,0,1,aef4be4d4aef17963b443422990883ed5a6539bda4284ae9495699eaecc5a7db,2024-11-21T06:43:49.797000
+CVE-2022-20923,0,1,b70ada59bbe50f4861202901b8e022f23796080b56dd002b101c642100552e25,2024-11-21T06:43:49.923000
+CVE-2022-20924,0,1,f8ca1bfad43b50ccaf38d92e44b9ade89abcffbbd110b1e1bb1d06d43b068dc1,2024-11-21T06:43:50.043000
+CVE-2022-20925,0,1,3f7b08d250626acb809614a52c1cebc7e1b9ac69e90b85030816336d6f9c8049,2024-11-26T16:09:02.407000
+CVE-2022-20926,0,1,436a84f136433e0f7fe56fa992c9bad0718aa434950c4c09f3c78599d069e9b7,2024-11-26T16:09:02.407000
+CVE-2022-20927,0,1,8110f476d0b15a5756ea1b5bbd605196ed9e0d3d06551c2f15b9643898bc8255,2024-11-21T06:43:50.390000
+CVE-2022-20928,0,1,21f9bef6d63ad29fee847aa7569647c921be3d90518209476302743e88fd587c,2024-11-21T06:43:50.513000
+CVE-2022-20929,0,1,d3291330cbbde0bfb5091bb1c7b7609bcb93c891f0d05397df346ad45b1962c7,2024-11-21T06:43:50.707000
CVE-2022-2093,0,0,12ab234d706fb229b6e6182d36e90ac30628cd3c9453e0defa924110b92a4188,2024-11-21T07:00:18.450000
-CVE-2022-20930,0,0,6d74988b313bbd85bb3231da907d054f28b325ea0ebd8edb9a4b3e3e5c650d86,2024-11-21T06:43:50.820000
-CVE-2022-20931,0,0,2d97345f16bba4c4c7a2574bb77b3ae7be5f9643cf72d3b9551d3fe88261b5d4,2024-11-18T17:11:56.587000
-CVE-2022-20932,0,0,910997b6bd8e5163d702a77339170c641a00617b5d46f1bdcddd15c380ebbc5d,2024-11-26T16:09:02.407000
-CVE-2022-20933,0,0,26727c70535d35009ee44dbe61cc28382ccb41a645a1a2724f8b5acd4d79988e,2024-11-21T06:43:51.123000
-CVE-2022-20934,0,0,49cebbf5f1d6482799eda0bb08de356f2414d310c21a70907005989d5a0ac1b8,2024-11-21T06:43:51.273000
-CVE-2022-20935,0,0,f4e42594b10f2a5b300b3f2563066556e57479c297591d37779aee8bb57f90a1,2024-11-26T16:09:02.407000
-CVE-2022-20936,0,0,564a408a5fabac06f957b2fcc958e52fab31f7230b1ee9257d9d6a317313d3c1,2024-11-26T16:09:02.407000
-CVE-2022-20937,0,0,60e9d1a1ca045de50534286f0f2757c2f6c81663dff6ff29a8bf2821dfc225cb,2024-11-21T06:43:51.660000
-CVE-2022-20938,0,0,5c499117689addfef2cf4062a651cce64bff08b3820b2ea280916e259ed88ce4,2024-11-26T16:09:02.407000
-CVE-2022-20939,0,0,2439e98b882581de00cd7bc05e366d560d08bdaf19016b1566c286f708d1a87b,2024-11-18T17:11:56.587000
+CVE-2022-20930,0,1,19e2d34aedfb672d3c5a127c52dc99c9a090f7054073c69f5b0f14bd41385f86,2024-11-21T06:43:50.820000
+CVE-2022-20931,0,1,035c9c38393567679d47f095e5f3aca2bf6a0883425c04c3d5203946de15c68b,2024-11-18T17:11:56.587000
+CVE-2022-20932,0,1,89e10e560b71d807d9e6aba28bcb2e4787742a5241bcb86e5df94fe360e8cc25,2024-11-26T16:09:02.407000
+CVE-2022-20933,0,1,9377a3e3070b8e0f81a8a094039aaf3b7526c4da0df114ddb04dd00ee8e90e9f,2024-11-21T06:43:51.123000
+CVE-2022-20934,0,1,3b73da609688288086851f71a31f657edaa03cc5b81a7e4af36eb9d9a30145a5,2024-11-21T06:43:51.273000
+CVE-2022-20935,0,1,be3a3ee397038730a175cebe27940356f08f794bde94a484f608321bda88cca5,2024-11-26T16:09:02.407000
+CVE-2022-20936,0,1,f7a487922f30fd471c388a216801b568f14e46b0f16dbc74577fecf68d312800,2024-11-26T16:09:02.407000
+CVE-2022-20937,0,1,8f8a8aebeb57fea9346b79e1644cd568e76cfd5c410918c18fa2cba84ea746ab,2024-11-21T06:43:51.660000
+CVE-2022-20938,0,1,ef03a9bbf803eb3d9fd2755c8b8926b5a165b2ebd7b8f9386d36b6f192f90bcb,2024-11-26T16:09:02.407000
+CVE-2022-20939,0,1,de9648579f4ab9767cda42fb6e7734df88a1407c8fde8fcaa346ce8ae41cfdc7,2024-11-18T17:11:56.587000
CVE-2022-2094,0,0,832ca67ca47cee3738be094f3e54677eebf824e1f4bc0473a083b03b9b076d89,2024-11-21T07:00:18.543000
-CVE-2022-20940,0,0,14724010b8e398f24a88fc1db44c2c3c580cd481414edd964f2fac3b1764740f,2024-11-21T06:43:51.993000
-CVE-2022-20941,0,0,43fa89baf55b1b2911ce5c0bcde8a06c2c757bec483241e7a5b9df76ea918c46,2024-11-26T16:09:02.407000
-CVE-2022-20942,0,0,4a5e739fa25db62d2a3432a612a076a34ea65a5c1a8533f3737ae23005e51961,2024-11-21T06:43:52.233000
-CVE-2022-20943,0,0,a4be8a875b6bed4f5b1d5e289dea844fd12e632212a55326feece2310f20bacd,2024-11-21T06:43:52.350000
-CVE-2022-20944,0,0,90808c7f639d94a21e5f6d56c65e35a8165af91816cd2e55ab1f67f22ab33b50,2024-11-21T06:43:52.467000
-CVE-2022-20945,0,0,c1c4285f91e7d71715ccda9c052d115245f605bbb725b55ca0ba7c9e2ff644a6,2024-11-21T06:43:52.580000
-CVE-2022-20946,0,0,c87de3c0d5536cae6d96ca244e7e8ca87b732c1a20bb0271cba39ada27a2e712,2024-11-21T06:43:52.687000
-CVE-2022-20947,0,0,f380ebfbc1e9de40905831923b335e2904410900af2416c1979a9df2e941b1b5,2024-11-21T06:43:52.793000
-CVE-2022-20948,0,0,80cf9dd4ac01c9574024ea094d608ab4b64c2885eabe4349e8f7ebaf67b0832f,2024-11-18T17:11:56.587000
-CVE-2022-20949,0,0,43bbdda21194ec9f1a2612a4a416e3c4ae4fbebb30ae01f70ac86a7d3f0607aa,2024-11-21T06:43:53.010000
+CVE-2022-20940,0,1,bb19c78964be8c87dd56168526adb3dd2b6645202eea073ebfa0c415c187b2f4,2024-11-21T06:43:51.993000
+CVE-2022-20941,0,1,df3a9dfefba3a52f14be43d466defe6a6739dbe15715de4aa411e64993160383,2024-11-26T16:09:02.407000
+CVE-2022-20942,0,1,f99bbb6cb84d60fc57efb1037310b701e15a7b6fa8418ca8379d26a967298729,2024-11-21T06:43:52.233000
+CVE-2022-20943,0,1,0cfcb0ccd17a1acde7f0b9b65f14bab4cd34abf48b481ca5e292f7e665e15b0a,2024-11-21T06:43:52.350000
+CVE-2022-20944,0,1,7bff831e187301f0bc6ee5b5d86f95ddc068ae5401b9c8bc9816928eb278b4af,2024-11-21T06:43:52.467000
+CVE-2022-20945,0,1,f47cfe7dbb23753edf34c6d6d75d5744d82449abc9051a8ae01a83122886137c,2024-11-21T06:43:52.580000
+CVE-2022-20946,0,1,b5c76274d0cddd80f95bf22cbb6a12a6a4c16cac21466dc4b98c551aefdcd401,2024-11-21T06:43:52.687000
+CVE-2022-20947,0,1,e8eff5a35b3e1d9aaf42af6604ff4cf6e69e3e559c8eb99843bc8407e8ae7a45,2024-11-21T06:43:52.793000
+CVE-2022-20948,0,1,cec81a1dadee12f197f37c769253c94001fc501ef283f1f299513eb6c5636833,2024-11-18T17:11:56.587000
+CVE-2022-20949,0,1,41b7abf6baef89d13884a793e1462bb072a75ccca0bc9d70de255e5673c03b51,2024-11-21T06:43:53.010000
CVE-2022-2095,0,0,d278e5a20ff60e4a4e48b18c30e02a8a8aa776a13145d42cc11b8c64e32d3524,2024-11-21T07:00:18.647000
-CVE-2022-20950,0,0,6dd938ea2a8afa3889d873b91e742d3ddb3394e72247a9aaadd68da7a062b8ff,2024-11-21T06:43:53.120000
-CVE-2022-20951,0,0,124f172b0562113a3210e701c4a249fa132f9b2d2d99528a47ce52b2d6555e94,2024-11-21T06:43:53.263000
-CVE-2022-20952,0,0,8769a49ca78507f3d583433e9167d5212e9f7f348ae84c62868ce38343c34172,2024-11-21T06:43:54.277000
-CVE-2022-20953,0,0,68342e6f9235fe132083313383b6b930773a593f53cce89a95c09a42daa8c914,2024-11-21T06:43:54.390000
-CVE-2022-20954,0,0,be88d445f1bc11a9b02efb2a88a272c7603eda79ac2146c1211a393ec9acae9d,2024-11-21T06:43:54.497000
-CVE-2022-20955,0,0,ed0e04354e006174f507f59eef3b7cec033aa89dcd78c27db43482ad9c7ad715,2024-11-21T06:43:54.603000
-CVE-2022-20956,0,0,cf988db97d86a1a0638a036bb9a969973ff55baa080699900fc0a66141ee5369,2024-11-21T06:43:54.703000
-CVE-2022-20958,0,0,610dadc822f047ff993def7c3d156bf9058bfee33e42c7854dff30d6e04f7abe,2024-11-21T06:43:54.827000
-CVE-2022-20959,0,0,4d47a524c0ad669ef2666c8e2084b51a166061f603d1e197b28f0058e632eb02,2024-11-21T06:43:55.237000
-CVE-2022-20960,0,0,5bff2bf620221f13a18b16b0b9f07a2fb580923ebda522de44331ae71973143b,2024-11-21T06:43:55.350000
-CVE-2022-20961,0,0,e066588be358e729226b099a50cb682ccba3c6f224704ac8469c88ca55d53951,2024-11-21T06:43:55.460000
-CVE-2022-20962,0,0,52ed64e7500513634a4c0c6ecb0bf8e439e1918f2fb8facfdb41b5a95d82146c,2024-11-21T06:43:55.573000
-CVE-2022-20963,0,0,7647dfee107a80867b1b3e17163643caf8142cb76a25998c1589597fa2841db7,2024-11-21T06:43:55.683000
-CVE-2022-20964,0,0,b8bc01858ad9700d46102d6834d4512519a02a410c1bf767e1b1a640e51b6221,2024-11-21T06:43:55.800000
-CVE-2022-20965,0,0,d114c2d5bb157420a57c43ec95f09390c2c8f4ff8e24d98de6a02fb7f75dc65b,2024-11-21T06:43:55.927000
-CVE-2022-20966,0,0,f842ded41c2043a4e51396255d0c2534ac79d56dfe0aafa8cf972d37578d8441,2024-11-21T06:43:56.043000
-CVE-2022-20967,0,0,ac7580b18d6edfa1a32fa73dd43b0adfa4ef90fce330632bfa78427cc2720511,2024-11-21T06:43:56.157000
-CVE-2022-20968,0,0,050c4a9656cb7e1386f49480670f24308b425c739415f5d2996e4ca0da82bf2c,2024-11-21T06:43:56.270000
-CVE-2022-20969,0,0,f6dda04022ae2ec35efe7f5b9b5ce7fe3149b6743b1c74c181df46ba5329a85b,2024-11-21T06:43:56.470000
+CVE-2022-20950,0,1,229fc56762187b763f5e49653d09b67d2d491fb95fe43c014db392f9829cf038,2024-11-21T06:43:53.120000
+CVE-2022-20951,0,1,e854df5d956f425cd56e7e5ce4b90e0c87ca782b1cb108f5272a9db3e41a7bf1,2024-11-21T06:43:53.263000
+CVE-2022-20952,0,1,0bbd6dc4da7d29740aacf4d82eab27aad8e4d8743f4f5527c78ad6437c80d79b,2024-11-21T06:43:54.277000
+CVE-2022-20953,0,1,bad9940b35fed2bb7243b5ad4e2a104eb6870a0dcb4fb163bb1a57d00232b5b1,2024-11-21T06:43:54.390000
+CVE-2022-20954,0,1,20ca8a7306ed102f12613fdd5711b0d43d982b6319e4beb034055d45c2752fcf,2024-11-21T06:43:54.497000
+CVE-2022-20955,0,1,0711c5f351b9e3c175c69c035b47ca85e823843ac2553a1c2289a0021c4f0ce5,2024-11-21T06:43:54.603000
+CVE-2022-20956,0,1,6159780b069eb69ca689dbe3070e4879f75a3f86e30fa0265a6ea4d8dabf76d5,2024-11-21T06:43:54.703000
+CVE-2022-20958,0,1,cbcf5b53f166f80c6783c339d6cf9ca7cb8dd4e28c122f45aea0c7fdd24d830a,2024-11-21T06:43:54.827000
+CVE-2022-20959,0,1,1f69d24d70fa0b5b4775b47b8fdebb09dc79758469059a7cd29abcda6a49b77a,2024-11-21T06:43:55.237000
+CVE-2022-20960,0,1,af55f79f80cab317176539d673a1f11c4a3f14d838a8588fc35d0b4285eccfe4,2024-11-21T06:43:55.350000
+CVE-2022-20961,0,1,2bf34eaa4714131fc7592455a6dccae1c7b43b2bca9137aae16a152f83db884d,2024-11-21T06:43:55.460000
+CVE-2022-20962,0,1,1579f0a62d239b42bbe9538e7470b3b969640faba32c4d4c8a2fed1a1210dacf,2024-11-21T06:43:55.573000
+CVE-2022-20963,0,1,539db5acb191246989fc0afa497e40cf4a61a1bc3f23ca795611e7abf6414613,2024-11-21T06:43:55.683000
+CVE-2022-20964,0,1,6d20683f69e4d5db0374528110be600f32482e9eb6e105129f2a0d71bdbe0c88,2024-11-21T06:43:55.800000
+CVE-2022-20965,0,1,43fe5c1f5bd914ad263c39582acf19dfa16c7797ae9c89a03b456cc17965ea27,2024-11-21T06:43:55.927000
+CVE-2022-20966,0,1,f97e17c6021f6abeeb1574026742a0362779ab53e849796f726dc510d4a52ce3,2024-11-21T06:43:56.043000
+CVE-2022-20967,0,1,1496ea068d8ef8d38fa56429eb99b89afb34a69d9865468bac57ce4c777630e2,2024-11-21T06:43:56.157000
+CVE-2022-20968,0,1,d7b0eeeab943e1de82b06aed64c0621e0f56a60ed360e68c9f57271df0112c70,2024-11-21T06:43:56.270000
+CVE-2022-20969,0,1,a404a0aa022752e11b629265c21aca62015184f1c180f53a5dfe38d631a4fae2,2024-11-21T06:43:56.470000
CVE-2022-2097,0,0,093b4cf072506befb0d2f0f941feb60d57f8cb946fde89375511445d3ac84357,2024-11-21T07:00:18.757000
CVE-2022-2098,0,0,f3585ae9cce02b1a95f97eacb77709aa6a1b067df55001018f5b6b27fbeaecbd,2024-11-21T07:00:18.923000
CVE-2022-2099,0,0,c8f44f42e99e9fd12e7660e6c2cd43ec2c22ec847b59374e95eadb4dd2430759,2024-11-21T07:00:19.033000
@@ -192980,7 +192980,7 @@ CVE-2022-23434,0,0,3dc3dcfab060966d4ee5730ecc3968c62af77fd3914b7b88f24d05aeb1c52
CVE-2022-23435,0,0,bbc2fa491afdf27dcea833104c1712ef1a9af57671ef24fe139f90482bfe982f,2024-11-21T06:48:33.113000
CVE-2022-23437,0,0,46a7eb8a60ec3c48463c4980ec56bd032a751d98dc658c7d9a2007c5b118554e,2024-11-21T06:48:33.283000
CVE-2022-23438,0,0,27feabfcd8a11bb61133f497f37b040b226fa91f757689bbcefe4c666d27dfd0,2024-11-21T06:48:33.510000
-CVE-2022-23439,0,0,043e5b50152a9f70ba3a6338c0f154ccf015389be185bf33b8674d711c5220be,2025-01-22T10:15:07.737000
+CVE-2022-23439,0,1,79aacc6a07b1ee04c4c01091703306b6699121f46f4361a5f91d8a94fbe74754,2025-01-22T10:15:07.737000
CVE-2022-2344,0,0,6c243d20bbc7d779a6affd8aab92c8686492301e0bdb51c94b7832d826811099,2024-11-21T07:00:48.653000
CVE-2022-23440,0,0,c3f782ea02c313f0bbf86b9e35066960c1ca64ab9241240514e4d62cafdaa1c6,2024-11-21T06:48:33.670000
CVE-2022-23441,0,0,80ac54c9035b8a7c3e8a34006708493401d3cfc3100af1e79056564ef5f7095d,2024-11-21T06:48:33.810000
@@ -215063,299 +215063,299 @@ CVE-2023-1997,0,0,32ed6bbff58ca58c30a452158d07c133c14fcc4a6743e19c7094ee9d4f2b8b
CVE-2023-1998,0,0,df8060f25be9acb504ac013e77ce963e0fe601ae1ff6bef93dad276cb8105d0c,2024-11-21T07:40:18.753000
CVE-2023-1999,0,0,3cb52b88a9631ce2388f8296cf0809477dc5b8d21ce773d57585b909b2829570,2024-11-21T07:40:18.897000
CVE-2023-2000,0,0,10151fc0a76d6fa75cd636eda753cb010cadfb67451ff288f7f888ed532f5eda,2024-11-21T07:57:44.440000
-CVE-2023-20002,0,0,20033cc222bbb2dbc41045489ea3a0952b2f76d3e08f0b07c8f9841f63ef09a9,2024-11-21T07:40:19.027000
-CVE-2023-20003,0,0,72b4292f31b60a9bb52a42e59fc9c7b4eaa400b05bcdb347e20a2b607007cdef,2024-11-21T07:40:19.190000
-CVE-2023-20004,0,0,03c7e521b0c8328780767b9649b3fafe51d38875ca4658d12cc837c1db49ed8e,2024-11-18T17:11:56.587000
-CVE-2023-20005,0,0,bbcf86b8730aee8feaea42a17eb781a8c900bb7987f2caac8d7673b446bf7fec,2024-11-26T16:09:02.407000
-CVE-2023-20006,0,0,78fb991face6a7b60142118f09197c5ea317af7981f1b44722583cd9915d278b,2024-11-21T07:40:19.593000
-CVE-2023-20007,0,0,e66472f16742cc8b69cd10f96c5911bf6dfbc42a8e70876f1a740b167758dc68,2024-11-21T07:40:19.730000
-CVE-2023-20008,0,0,ad694520f54134b346a506f52a7b526a4fc427bfb49beded59b0bfd44fff1888,2024-11-21T07:40:19.863000
-CVE-2023-20009,0,0,6a5e9cd5f745a8d28bb5ea4fea6e0d2f315c4d95eeadf4702997646f302790c7,2024-11-21T07:40:20.017000
+CVE-2023-20002,0,1,db5ddc0f3b48f401433e756ae3a669304abde3c1fa83161461572f290fadde95,2024-11-21T07:40:19.027000
+CVE-2023-20003,0,1,a796589e596c5d3d0ee5456d4285f483094d983c59131fbcd9a67c2940d5a4ca,2024-11-21T07:40:19.190000
+CVE-2023-20004,0,1,19f0e6da688156a74143c6bd7a9dd932a7afcc8c0b45f3f7f9b3e9836d535965,2024-11-18T17:11:56.587000
+CVE-2023-20005,0,1,16c4c9ec4750355fac82d4f87874778d0d834f48bcafdde0035076ec845129f4,2024-11-26T16:09:02.407000
+CVE-2023-20006,0,1,de0bef74dbabc31db0958a013d7dae1b8799ea2535e9855fdd73e4b495a017c6,2024-11-21T07:40:19.593000
+CVE-2023-20007,0,1,87698622fa2a3a8dca73fb8099a7b8762d60c77e88ad049b67b5efdb14bcaff7,2024-11-21T07:40:19.730000
+CVE-2023-20008,0,1,7b49772f14c03c28fc00f2cb9a2de2a3998444b85df3e29bf21173fe3eb58584,2024-11-21T07:40:19.863000
+CVE-2023-20009,0,1,e286044711abefa24e016b45a4c458ee06de09d9cb2a6f12225be56121b5fa26,2024-11-21T07:40:20.017000
CVE-2023-2001,0,0,405c9aaef445555a8673a076bd82197a162f32aaff8ac2919a11668daa941c39,2025-01-07T17:15:13.167000
-CVE-2023-20010,0,0,8117fa1d8535a2a2061a1e64bf99124c9dabfc271c38ae2dcd8cd3fc2ac397b8,2024-11-21T07:40:20.160000
-CVE-2023-20011,0,0,7740dc0bf75312b2df27d426539ada304afc07b65d14883dfb42cab6ee1bf4f9,2024-11-21T07:40:20.303000
-CVE-2023-20012,0,0,07d478ac66348d359fa711833c1d8a17b549f5d18e580258d91aa336869deb54,2024-11-21T07:40:20.440000
-CVE-2023-20013,0,0,c234870826862c82dbc0fa1e846ee208fa3361a3b3fd1e0417d8d77d41ee204e,2024-11-21T07:40:20.583000
-CVE-2023-20014,0,0,51a794aeb2993d49ef724a6e5bcd42aa60b1d2d72b9360bdf64c768dbdf4c119,2024-11-21T07:40:20.720000
-CVE-2023-20015,0,0,f89f39695690f85bbbd29295e9ee637b4fc9f0c203c54cecdb11c59f6fd514fb,2024-11-21T07:40:20.853000
-CVE-2023-20016,0,0,f19f13384f8a93aeefb2230975e320435597a90327fdac5b55c9ac424bdf1d6d,2024-11-21T07:40:20.983000
-CVE-2023-20017,0,0,87d8b5605bb969dabdabd3a6e99a168b800e7fa60420362bf9f1b08a7f8a8e2c,2024-11-21T07:40:21.120000
-CVE-2023-20018,0,0,00ec1e17cedc5ee2617df106a991405dc28f4c298797564d447c2b0b1216f2d8,2024-11-21T07:40:21.247000
-CVE-2023-20019,0,0,091edeb4bf8dcd3509760acba04f0b5a8c92120540c247c9698caec3b2164d5c,2024-11-21T07:40:21.427000
+CVE-2023-20010,0,1,f0c3853390ea002b7bb16dabc489dededd8811da5dc30a39387db97d3854fd35,2024-11-21T07:40:20.160000
+CVE-2023-20011,0,1,054234a519bbc3fe1026d1263f3f979105858b59fd8e8f6132ac2c657e693df8,2024-11-21T07:40:20.303000
+CVE-2023-20012,0,1,a93827f957aa7bc48ebabe587452d5d8a4c0b8c919ff6d2479f74f1ce1f554f3,2024-11-21T07:40:20.440000
+CVE-2023-20013,0,1,080e0584bdadff8635368a7b7e52d99b6189d334f587f41c17b60949d044473a,2024-11-21T07:40:20.583000
+CVE-2023-20014,0,1,ed0b32257daa5995d5d3dbcde777a55900f399a57a85070a34243fb05141d3c0,2024-11-21T07:40:20.720000
+CVE-2023-20015,0,1,bf1bc232692b61e27ee9fef334b866f39ccc8f748e50142860cce087086f987a,2024-11-21T07:40:20.853000
+CVE-2023-20016,0,1,58834b086ed5170ebb48b937a77a3ec8f3521af87fbc2b0f30ade9a509ff9971,2024-11-21T07:40:20.983000
+CVE-2023-20017,0,1,5d1a050dec618d69a4720fc48200258956d1574dc55fe8ed6231f296c187274d,2024-11-21T07:40:21.120000
+CVE-2023-20018,0,1,71c860bd5f0e9a05c7ad0b0b2cf85e2bff20a07b86a14f9d36929f6e477ad4b1,2024-11-21T07:40:21.247000
+CVE-2023-20019,0,1,11471b79f8cecb75342da24b3126cfd89d89c53df2bdb6102f8e3cea771510c7,2024-11-21T07:40:21.427000
CVE-2023-2002,0,0,914c206a70b02af545f70a7971fb365e4d9fba608f954aabc20d8345c67a4f97,2024-11-21T07:57:44.720000
-CVE-2023-20020,0,0,c0e228a5c62e6ce76ccb00fae089a6c80dc63b4018ab686181c695e29fc1b583,2024-11-21T07:40:21.823000
-CVE-2023-20021,0,0,3ca0518854f8951445afa52bc92add64d187fb1d3752e23a929b5ac54183f038,2024-11-21T07:40:22.173000
-CVE-2023-20022,0,0,45ba07accebcd4d9e24d64b8c83964d1791ac265180c4c761565413ab8946871,2024-11-21T07:40:22.303000
-CVE-2023-20023,0,0,64ee97f0890f0bd62b1dcce0e6ab1f90c98bbffcf71c584355e40f9f12adff5b,2024-11-21T07:40:22.423000
-CVE-2023-20024,0,0,8e758d216f5b488ae37989ed81d178625ec26085c27b6c0d5d83cab7aabae284,2024-11-21T07:40:22.540000
-CVE-2023-20025,0,0,5ae7d05f0c39805de2ce272d6766353cda49ae50a54d8d2ec7604be2715361e6,2024-11-21T07:40:22.940000
-CVE-2023-20026,0,0,b6c7e18d3581cd4e3ed26d5c627537d154b2aa0b1ffd8efb8d8b6ea0c21e76f4,2024-11-21T07:40:23.080000
-CVE-2023-20027,0,0,3bd4a0d6ca6b051d35c2c4495a3754ab343804caf8b7cf762ccb23cf39a07245,2024-11-21T07:40:23.213000
-CVE-2023-20028,0,0,8d61678f15daf6331710fd12e02b4ed88af20114692bcab81c9f697ffee22114,2024-11-21T07:40:23.390000
-CVE-2023-20029,0,0,23f9432a75a84f44c11a05b0e2713b98944dea5ad4840bbd7d3c4dae7ed9047e,2024-11-21T07:40:23.523000
+CVE-2023-20020,0,1,09c3c0c7534e619b7e9af95c4a9051ec4e6e5dea21490b9155f5f447d35bb22b,2024-11-21T07:40:21.823000
+CVE-2023-20021,0,1,6a2ead76fe3b5fece57fab974d3dca57ab9246b1314eab0aca14a39bca71f3f3,2024-11-21T07:40:22.173000
+CVE-2023-20022,0,1,d267e0083fa8403d8442c1bf3ac09340316446610d4d9e217c496ffce4b54016,2024-11-21T07:40:22.303000
+CVE-2023-20023,0,1,95a83439fbba19b6c21fbdc0ee9b15f3bc03f36ffb8301951be300882be1433a,2024-11-21T07:40:22.423000
+CVE-2023-20024,0,1,aa588e3440809485fc0865169fec554102a73a44873c6d779aa0ba291a537e5a,2024-11-21T07:40:22.540000
+CVE-2023-20025,0,1,afcba38c38651c002d3545458a5675c2eb3d1fb0d0d4fc0a104cb4c00798c8ff,2024-11-21T07:40:22.940000
+CVE-2023-20026,0,1,87170f7e708d04c72d09a4682f931aaae1e7cfb930f016f405d49197a2963aac,2024-11-21T07:40:23.080000
+CVE-2023-20027,0,1,643e4bd75b063b0079399886a3cd15f103694e59618950e3fd9d839bb6b1e293,2024-11-21T07:40:23.213000
+CVE-2023-20028,0,1,8e75e4e2dea98ed8067b7183e305b57df6b136b6188b420e71399619665060df,2024-11-21T07:40:23.390000
+CVE-2023-20029,0,1,f4b694faa649fb00502349b38a4aec65942caffb125088d4579b6d6369fc7c00,2024-11-21T07:40:23.523000
CVE-2023-2003,0,0,e4fc5cc208ec8ca88fcc27da9cf480a18ce328700661e3929d967dddac7c2741,2024-11-21T07:57:44.887000
-CVE-2023-20030,0,0,d63067dd1a52ce3c5e3a57b69d7036d7d3fbea953a08385974ad1bb4ee0134a5,2024-11-21T07:40:23.663000
-CVE-2023-20031,0,0,fa5cd8fd7a37a97c083ded13b6ac851fd0ab35f572d43319577f8e9123344576,2024-11-21T07:40:23.797000
-CVE-2023-20032,0,0,f2f715fa496387ac0e3ea03ad431ae8f75ec0ed10db5899609793f02fb946ba1,2024-11-21T07:40:23.950000
-CVE-2023-20033,0,0,569675f7160917ed93682698fcc8ef722d4495d1fcf0553ae9c8b324605f56f9,2024-11-21T07:40:24.093000
-CVE-2023-20034,0,0,31f9b7615e8a99fddf9b91d5a2ef2c6961b0b2137b9654c264449449f03cf464,2024-11-21T07:40:24.270000
-CVE-2023-20035,0,0,b1aa57274a62092ff84b4cfb7b2f849d9e4a5afaa92b1cd990b865233c00c961,2024-11-21T07:40:24.403000
-CVE-2023-20036,0,0,23ff7dc6c12498357afa09c64c9bfab7a72402f8a43df51dafede3fc36fbb005,2024-11-18T17:11:56.587000
-CVE-2023-20037,0,0,90d376430c2e1a0b28b7658bb2c4e9b98dc413686f3e142c4e8b5113bed8d3df,2024-11-21T07:40:24.653000
-CVE-2023-20038,0,0,b98efb29f6d969f0193567b9a8872c69638027e9a72c548f3aff842966cc45da,2024-11-21T07:40:24.770000
-CVE-2023-20039,0,0,8a872dcd648d7be1a13088f0e26072eb9b6da9e4743a1668fd9647d645e074ff,2024-11-18T17:11:56.587000
+CVE-2023-20030,0,1,6112c64dc2ccf878d92067d41cb8b32ceb38b8568a14a446000e7691722db363,2024-11-21T07:40:23.663000
+CVE-2023-20031,0,1,a545104c03b34d687ea9774a7f773a892ab13d11178c573f49a24ccfe94fa01e,2024-11-21T07:40:23.797000
+CVE-2023-20032,0,1,88d6bb0124121356688530a7b0c0f28a867a96ada2c5c9f7a48a0d94fb7880b4,2024-11-21T07:40:23.950000
+CVE-2023-20033,0,1,243073f5d8c14a3425cc8e1a109ac132a62980d6329334b94762dbed03334f0d,2024-11-21T07:40:24.093000
+CVE-2023-20034,0,1,d9da54f1f4958262bd1f45985b241b5446c8464612a935f50207fc683445de7c,2024-11-21T07:40:24.270000
+CVE-2023-20035,0,1,4951e4b70772fe34f829ddef3a118354578c9c6e46fe48ee0e35d932da7ec23a,2024-11-21T07:40:24.403000
+CVE-2023-20036,0,1,cb0da8029ff1622d794926b3898525cf2931208cb2360d6847c5e7532fd0bb3b,2024-11-18T17:11:56.587000
+CVE-2023-20037,0,1,9bb996eedff1064e1faf530b148cc95b82b9453436affb124a0f4823ae88af29,2024-11-21T07:40:24.653000
+CVE-2023-20038,0,1,79811f8e035055b523292111defcfef7fb08640a542339a099094c29f421b1b0,2024-11-21T07:40:24.770000
+CVE-2023-20039,0,1,67df0712b48cc10b41803ec91eaf3030634b9c9767ed3d486bc4332e545ec419,2024-11-18T17:11:56.587000
CVE-2023-2004,0,0,43f7bc74ef9fcd317532bd3537b64c658f91f5edb3bbc6123888b6bcd27ec49a,2023-11-07T04:11:40.947000
-CVE-2023-20040,0,0,a0440511e44ee001bb7cfc7d18c87111c95fdcb2720747219d82309749fc6d31,2024-11-21T07:40:24.957000
-CVE-2023-20041,0,0,b6667d089ee2381c1a05392bdb587519397c7cc36b2804b8c0ce6c9d629ba515,2024-11-26T16:09:02.407000
-CVE-2023-20042,0,0,13ebe1e0cc4d1b4749bc0d691b3c25fcc072fb5b0db9271fd5cf2214abfe277a,2024-11-21T07:40:25.200000
-CVE-2023-20043,0,0,d88cfc656168f0d60ec713c5976fae395fe320eb56d43388a9a41f7c7f95ba1f,2024-11-21T07:40:25.367000
-CVE-2023-20044,0,0,e2de8622d3de0c1e2bedbff0d76edfd44694399660d0013a5265bb0efc6b73f3,2024-11-21T07:40:25.490000
-CVE-2023-20045,0,0,f99c06c591589ac54cfbd3d1e0cc61932955867e38131b58a7f2a620d6f6a3a2,2024-11-21T07:40:25.607000
-CVE-2023-20046,0,0,890a49e220e375d40d5fe385bd6bd7316280f2d23772bc0ea9406958f111f50e,2024-11-21T07:40:25.733000
-CVE-2023-20047,0,0,3fb78fa37d895ceda4d23ea79cb23668104ce575929b426eee8dbde895c180de,2024-11-21T07:40:25.943000
-CVE-2023-20048,0,0,cff96d6fa0f01e5e16a3eb7d4876b2e05bcfd0de74bb3d7404076481f61859a9,2024-11-26T16:09:02.407000
-CVE-2023-20049,0,0,4768fa97ff02eb3a092a94d4dee3d102832932c83951f33a0e9e7a5f401c79bb,2024-11-21T07:40:26.213000
+CVE-2023-20040,0,1,f1d41b335c6a6c05457b4812253ce58d53eb69b7e95351527be2cbb890bbe8e1,2024-11-21T07:40:24.957000
+CVE-2023-20041,0,1,3e94f64fb8b4b1a3fba63581ace55af3f18defce54059100dfb9f2cf93062d9f,2024-11-26T16:09:02.407000
+CVE-2023-20042,0,1,37bbc51b76983056d7b0fa900c7e72b10a733d7eca2c77b4cde90aa032ff9293,2024-11-21T07:40:25.200000
+CVE-2023-20043,0,1,ed80d53ed42978855e0816a0915a69d549abbab87fd9f432c2b81aa48166b172,2024-11-21T07:40:25.367000
+CVE-2023-20044,0,1,c2e04afdc7b7589bdd56434cb3f7ae5ae6ded80dba0a6607e1ca97720e634d58,2024-11-21T07:40:25.490000
+CVE-2023-20045,0,1,f2e5e3f2ec253c53539c13c5ff75e70f01201659d300ca889b0e9a93a23cf8b5,2024-11-21T07:40:25.607000
+CVE-2023-20046,0,1,3c1a3fd6016d8d3c9c82d880a2cceb9aacfd55ec08ecae52e6a052d5a93414ed,2024-11-21T07:40:25.733000
+CVE-2023-20047,0,1,74d83edf96f78e31788f3f37cb0b2b56b63cfc0f044b6acf3d99e1e70bc82626,2024-11-21T07:40:25.943000
+CVE-2023-20048,0,1,7c814035649ef40bb1b2bf0b196b258ddc0536524badb695d160e6dc899a8f2f,2024-11-26T16:09:02.407000
+CVE-2023-20049,0,1,901b37402db161c61afa02499f59ac9e035e5cb680f61b996b01ec7f513cd2a4,2024-11-21T07:40:26.213000
CVE-2023-2005,0,0,cb3e38dadaa7788fcae6290a7560e65f637afe1ff6b85d9bff4432d298cf2f50,2024-12-03T19:15:06.390000
-CVE-2023-20050,0,0,ff07cb5ad6b016569c8e5ff4643e9d9aac86425b8c2e281c6c86bd016759e89c,2024-11-21T07:40:26.350000
-CVE-2023-20051,0,0,a6603326a7efd42e07c718c863ef70362d0b6c1203d49292a6fc14991d8b58e6,2024-11-21T07:40:26.517000
-CVE-2023-20052,0,0,c436704c434fa1b225743ba8cf2025d4e4ab60622815f9fe79d228e78b929481,2024-11-21T07:40:26.643000
-CVE-2023-20053,0,0,d51a5e423c562349c2e5a2f82eac77e00b4f780986d884e03cf251bdc9de8c1f,2024-11-21T07:40:26.780000
-CVE-2023-20055,0,0,954d63b05572e3966f707dc8c180dbcb7d0448a8cb47559816e14a3d061bbd03,2024-11-21T07:40:26.907000
-CVE-2023-20056,0,0,bdb9cd6ce546e708a53ce700f72e0eaf0b6bec245ad431cab67f0027675dd358,2024-11-21T07:40:27.043000
-CVE-2023-20057,0,0,4ae4c0f061f288d751434661c8853ff2d3579fa84f46eb5d7de173d0d5b5d0da,2024-11-21T07:40:27.190000
-CVE-2023-20058,0,0,7677c38c6975791a98eb7de25746a4814f31d888e7b3596a1064e1fb3bf36ed0,2024-11-21T07:40:27.327000
-CVE-2023-20059,0,0,11dd557173cb7b30034c6630112ef7b52c1f4399c4ef83647fc294b79d78e1aa,2024-11-21T07:40:27.463000
+CVE-2023-20050,0,1,557cd2d9ea8b7585d208862cd34260e25019d4142c9eb7b761c3d4a62ed64427,2024-11-21T07:40:26.350000
+CVE-2023-20051,0,1,cd740bd6b00f1af851d910a85c37b198a2df9086bfa4d35ec8c910db308ad6ca,2024-11-21T07:40:26.517000
+CVE-2023-20052,0,1,a931b33a626346f0f38b6687b3d171f4d3de959d3d42dfe61924b859bb5fc55c,2024-11-21T07:40:26.643000
+CVE-2023-20053,0,1,1fa83e829ac7d20c8d4f09fe196fa2aebc16b5092c410511ceb1bafc02c8b61b,2024-11-21T07:40:26.780000
+CVE-2023-20055,0,1,f52cb2ac81b9d3e72e74066cf7aedffa32cd16b3e55312806cec9c3a63b6b5f5,2024-11-21T07:40:26.907000
+CVE-2023-20056,0,1,e5f2206e3e6eb19e7a34e861a532a7a629bac3a919dd569f5ebfecc89d883878,2024-11-21T07:40:27.043000
+CVE-2023-20057,0,1,6d35cc4f176cd68b18588af5732f3c585eddaf30fc7a9a24c8806fbf78a60d1a,2024-11-21T07:40:27.190000
+CVE-2023-20058,0,1,00631ac37fdfd111ce0a785c8715359c9fc3d0aa9bf0e3ca3bec5194ebce8078,2024-11-21T07:40:27.327000
+CVE-2023-20059,0,1,1232c30a015e573177f9a8e1cbfdf5efc4a9e280e7cb64084d423714c6ac9035,2024-11-21T07:40:27.463000
CVE-2023-2006,0,0,71acc90f0d08aebb7b2e4b23220e11423c0e8fd08614e5e2647f205e7dca22d3,2024-11-21T07:57:45.160000
-CVE-2023-20060,0,0,8ee56062450cb13d54231c46e76a93a674c47e34a413d2027fb320eacfef1b96,2024-11-18T17:11:56.587000
-CVE-2023-20061,0,0,80a74b28dd60be658b922ad7bd579ca30b54238947d418d8dcc5cc3a391102c6,2024-11-21T07:40:27.663000
-CVE-2023-20062,0,0,0b18adde8adb3c39a56ed34154f5092613eb57c2a303b5f6446c06c7f46f510b,2024-11-21T07:40:27.790000
-CVE-2023-20063,0,0,8c1d08d1250d3b110462dddbb8c30553ab31a2dc2ea6cd6451bf508c8588bc1a,2024-11-26T16:09:02.407000
-CVE-2023-20064,0,0,f40228be9fe0f5c1645c83e414e59c316c109e81e8b2cc9556e62285ee662fa3,2024-11-21T07:40:28.087000
-CVE-2023-20065,0,0,c93b54f0e9542250f9112dbf204d342a0bc5665b458c8c214ec1900bc50f6981,2024-11-21T07:40:28.227000
-CVE-2023-20066,0,0,00b9f92d34fe1f6501058df1abc33a66c2207398feba0d7673f7cc622995b877,2024-11-21T07:40:28.413000
-CVE-2023-20067,0,0,bfff5a8f5d335ed7e238f520fdbbc7abb5255a2c603b8b2a14b0542b2bd8785f,2024-11-21T07:40:28.577000
-CVE-2023-20068,0,0,803abecf06f2e265986e9ae2ad06fde7eb37e128c172f6ab17affb0efe6792df,2024-11-21T07:40:28.720000
-CVE-2023-20069,0,0,2475abc17d3f01d26378839adaf2f5e44db0e92a4de30fcfd715552d8934874f,2024-11-21T07:40:28.840000
+CVE-2023-20060,0,1,b3ec1cd7d20e83c92337a5524a28240b5f682730e7d4ff4e5bd9b1aadff5ee02,2024-11-18T17:11:56.587000
+CVE-2023-20061,0,1,ba18a84f5e638c92fbe1219739cca042ac87b87532616249d714ffe453f80999,2024-11-21T07:40:27.663000
+CVE-2023-20062,0,1,af89cfb88f6b6ee9526f7d0ecda572d3efab434115ab4dfd1e1288e4f0617298,2024-11-21T07:40:27.790000
+CVE-2023-20063,0,1,5d5ba055db519f3b0801eeb6451a96e880c295f0ef637491e88ab6c2ccc81b79,2024-11-26T16:09:02.407000
+CVE-2023-20064,0,1,3ee1d4c4eba5b0487d811f7b9961bdc63716c8cb0d0282ad4c566f83a9545946,2024-11-21T07:40:28.087000
+CVE-2023-20065,0,1,d1bba75909e71ab1ff3485a56ea5977987b630d23f50c1ab538e02af7b5e0275,2024-11-21T07:40:28.227000
+CVE-2023-20066,0,1,1b8466c204d7f0b4b99e4395649f2cb6413f05d9938321fec47c32bd3174e13c,2024-11-21T07:40:28.413000
+CVE-2023-20067,0,1,50910fb13d53d61145046f334c20e93bdef121e65231b7df7461be0c43f7469e,2024-11-21T07:40:28.577000
+CVE-2023-20068,0,1,22ddad7c270230cd496d365a4b01671a41615484f958a1b561b43f89527f44bf,2024-11-21T07:40:28.720000
+CVE-2023-20069,0,1,716ead03a90edd991061931f77d85c18d61f26ca24588f8a558fff174ac419c1,2024-11-21T07:40:28.840000
CVE-2023-2007,0,0,7ef843d2e232c058e02cd519205ebe9d04616628dfb4780ac39de8940bb880ac,2024-11-21T07:57:45.283000
-CVE-2023-20070,0,0,e2e8a1723adbf445ac711cc14150559f8c6ca2fd8fbf4e886d8b9fd43360ff9c,2024-11-21T07:40:28.977000
-CVE-2023-20071,0,0,830be08d50d2d8a02248657fb3f8879aeae7c9718650b20e622f0de2dde1c797,2024-11-21T07:40:29.093000
-CVE-2023-20072,0,0,42cb9f9177d5af3ead7f1e038744d49fa7635f9513c817df37731f6e2ef47df3,2024-11-21T07:40:29.253000
-CVE-2023-20073,0,0,329909c4de3ddac568bcbcfc5df081b3bb1253b4fa24d37dd8a435de5d15c428,2024-11-21T07:40:29.387000
-CVE-2023-20074,0,0,52a8bd0485a446d92809bb0fe3a3db43a9537c775afa984405b1dfea1e02838a,2024-11-26T16:09:02.407000
-CVE-2023-20075,0,0,d4b0a704b836d84b2a47e03bd40b0842f2d9f46ff4d2b72f60ddba19a71dea32,2024-11-21T07:40:29.687000
-CVE-2023-20076,0,0,c29f20c9c77dca23c3ac584a1cfab28500ac3b27f776b3d79642992c29a6c66b,2024-11-21T07:40:29.813000
-CVE-2023-20077,0,0,3f20add0bed9e1cd6b15e7f424c820fc33d729d70fb86bde12a3f1c26cb3d981,2024-11-21T07:40:29.950000
-CVE-2023-20078,0,0,a0bcb15d9cdd2f3fb764e866a5752fcffd3dcb69c17386c2b1acd8e2965eb60e,2024-11-21T07:40:30.083000
-CVE-2023-20079,0,0,43f8d4ffc28de08b4232da85d662bbd6a03942788aa4fe104ce5fea76ca6bf89,2024-11-21T07:40:30.230000
+CVE-2023-20070,0,1,a1b0ee946ab0e02e143bcd74cfa853707a5ee81e227c4c8a0662eb061e8a1fb0,2024-11-21T07:40:28.977000
+CVE-2023-20071,0,1,baeeee91cd1e82ffa8a636ed5273f93dab08eac1b22cc14b7da3766c46807329,2024-11-21T07:40:29.093000
+CVE-2023-20072,0,1,6a95ef2514fe865c59eb2c4a96a0f5838ead522d4a59d5402c0931c1b6a5d69d,2024-11-21T07:40:29.253000
+CVE-2023-20073,0,1,f6f156436ad9afb0001273498cd2d60b4da4edf9c47a31cef962c242d66d0122,2024-11-21T07:40:29.387000
+CVE-2023-20074,0,1,e38f9794210b4bc5215411669686d843e9f5f572a2bc9002be9969cabf4bf118,2024-11-26T16:09:02.407000
+CVE-2023-20075,0,1,2c87351951cf5f25fc177ed238ba20093c345ea17058e7572274563af17095c0,2024-11-21T07:40:29.687000
+CVE-2023-20076,0,1,49724aef0b9ceceecd5bade964f7b4328dbb44c17324ef0682d757e08a6ed55a,2024-11-21T07:40:29.813000
+CVE-2023-20077,0,1,76637ebee2c599c066dffed93cae1f14ba696be519c1a652a6aa1bde250e3e4a,2024-11-21T07:40:29.950000
+CVE-2023-20078,0,1,367b440356e0a1823f456524434ce7c814d7ab04b989aacac7844f1554590343,2024-11-21T07:40:30.083000
+CVE-2023-20079,0,1,02fde55a1e04344d15762c5482b387fea4142bede806e4041daf929e20186534,2024-11-21T07:40:30.230000
CVE-2023-2008,0,0,1aa2162b6625a343285250f8ad1f997215f5ef638e2a14628b6fdba93122b2fd,2024-11-21T07:57:45.423000
-CVE-2023-20080,0,0,f22e74c6301e892b89b436d3e3519c40e26b1b0f70ec8f13ad669fa041174687,2024-11-21T07:40:30.387000
-CVE-2023-20081,0,0,2e6eeb63f46a43444ba21e1a8cbb2d50b22ab3793dcd41952185ed88817f60d1,2024-11-21T07:40:30.673000
-CVE-2023-20082,0,0,0361fed6498cabb10100b2a091b5045f8a940582de94e58d3097887bfaca62de,2024-11-21T07:40:30.893000
-CVE-2023-20083,0,0,6c3195d47b4ef946b157caa8da9a4d0279e29e44e000e57e03693a38ff1a544b,2024-11-21T07:40:31.057000
-CVE-2023-20084,0,0,fd6bccdb4282014cfa3615232718f3aa5ac6e52a4145d38c17787f2d634a9f28,2024-11-21T07:40:31.210000
-CVE-2023-20085,0,0,e895aeba29f60f9dd20a21711a1ce0ed5bdfb752ee39158353a5c748b81f7b87,2024-11-21T07:40:31.370000
-CVE-2023-20086,0,0,b91c7b5e5d7401cc9183327bd0c2621abab016764a62f0bbdb7a3ceafbeedda7,2024-11-21T07:40:31.500000
-CVE-2023-20087,0,0,a7f8fb842b41f7443a95673c11050a6cfbc866a2fe7aefa84e76a3210fda7c13,2024-11-21T07:40:31.707000
-CVE-2023-20088,0,0,c5bbc19425cc7623a565008b176d53549919950f3ba875f03d01e97d05ba184a,2024-11-21T07:40:31.847000
-CVE-2023-20089,0,0,eaa47090155f2ea3d72a75dc76245a19267aecbb036714a44dfe92ae97d60950,2024-11-21T07:40:31.967000
+CVE-2023-20080,0,1,e917d4caf06f4782d74f47e2415fe54b14d30e9d3d79cbd4269066d68ff5761a,2024-11-21T07:40:30.387000
+CVE-2023-20081,0,1,3273288c26454dab0c9a9092ae63d93efc7ffe2a091c9844e3faba16b7211889,2024-11-21T07:40:30.673000
+CVE-2023-20082,0,1,6fd265c275f15d82888645c4379386b5b833cd23c98e00f7174235e3f39fecc4,2024-11-21T07:40:30.893000
+CVE-2023-20083,0,1,6105e582488f96708111062f0c8c732d6c46bccbd877c0d5cb81bfb4fd649d09,2024-11-21T07:40:31.057000
+CVE-2023-20084,0,1,5bf61d5da0cd10ba8b31bd906b31b6a04fe8ad8a122cc9427b1cba900c9223aa,2024-11-21T07:40:31.210000
+CVE-2023-20085,0,1,419a4f6ab159d0fb6aa036579e8257ed17b48a4ec8ca93a74855fd4be702195a,2024-11-21T07:40:31.370000
+CVE-2023-20086,0,1,eb89c866e10692db06198f5c8028ebcd92bb34fb0f9c36d2a2f6b4943bb4c34d,2024-11-21T07:40:31.500000
+CVE-2023-20087,0,1,77a8ec154895f6d0fab598d0852ce103da11b4f52f21c9a101d200630fbab2fc,2024-11-21T07:40:31.707000
+CVE-2023-20088,0,1,57d5fcd45110949adf08f6386fb5e617b0132672ed396238134da5397eb64659,2024-11-21T07:40:31.847000
+CVE-2023-20089,0,1,3f260b3d82f158ac169ab86a895ef2aaf56b283b5c894ac428d13d3ef7e3c8f6,2024-11-21T07:40:31.967000
CVE-2023-2009,0,0,8e083f8603aa79710ae1789531787dcd3a18a48c469e7fbb551efa279d044800,2025-01-14T19:15:28.980000
-CVE-2023-20090,0,0,403d1d9a595527f7fa42eb3f2d59baad3dd7b53bacab5eb93f5b26977b54772f,2024-11-18T17:11:56.587000
-CVE-2023-20091,0,0,800672e2eab630bd6c58b5112ccd64968d5737f989b75d86af789b3bc7374c79,2024-11-18T17:11:56.587000
-CVE-2023-20092,0,0,fdfc4b55ab01991d9508d228700ec26e12291c62eef7265ff168d0a922b5460c,2024-11-18T17:11:56.587000
-CVE-2023-20093,0,0,fff0f4f8f7c0636a6cd1f21c8578021ef05fc97db52dd66d7df86fba57eb1122,2024-11-18T17:11:56.587000
-CVE-2023-20094,0,0,68aaf4d632b5a3eb27e739acdb890039714f18017d9d9ea72f05aefa15c84a5d,2024-11-18T17:11:56.587000
-CVE-2023-20095,0,0,987b31078dcd2ec2ea8528a87de171af1eccdf0cbf3bd9daf9bbacab73c153ff,2024-11-21T07:40:32.480000
-CVE-2023-20096,0,0,7f5983820b9bbecf4d76ecb01905865e45c004bbdda1b36a6878487ea3d2e46d,2024-11-21T07:40:32.660000
-CVE-2023-20097,0,0,d4ce98c549c2b783027056a8d57bd08abeeb0cfe34692929a780234280150e49,2024-11-21T07:40:32.780000
-CVE-2023-20098,0,0,cdf76832bf8eba473581fcc2f56e3a167decec8d2afb6e689f7b39da261efdd4,2024-11-21T07:40:32.920000
+CVE-2023-20090,0,1,40274a5ccae5412493c3e771e3cb5dd61bb9f9225607fb11a79c2bdfa2e30895,2024-11-18T17:11:56.587000
+CVE-2023-20091,0,1,b287eb0911f0a6aad13b635e9ddd1d3d5cde812674e2095cf6599913c3356c7b,2024-11-18T17:11:56.587000
+CVE-2023-20092,0,1,a0ba3dfe21896aeac544d4c0e05c1efc42cb7e3fd40ef90697248154981eb195,2024-11-18T17:11:56.587000
+CVE-2023-20093,0,1,fd1d27e00cae38011baecfad19e1db4f7ee6843ac41584336a8ec6913676c58c,2024-11-18T17:11:56.587000
+CVE-2023-20094,0,1,24274fc7896a623874b49c494c6f338132e438ee4ada23f891e9505347d2a108,2024-11-18T17:11:56.587000
+CVE-2023-20095,0,1,55e75f3c0c0f67a4d3f6b4369641ffff647b904808bc4e034d6d502f554fc23e,2024-11-21T07:40:32.480000
+CVE-2023-20096,0,1,32f9ae6d2f4e83d94eba0c401c67e80e2e32c141e5bb61ec424ef2cf6d4c51ac,2024-11-21T07:40:32.660000
+CVE-2023-20097,0,1,d95437523f69c67ce87b3a7140e97185100e90c4959e190320e80d5cf03ed66f,2024-11-21T07:40:32.780000
+CVE-2023-20098,0,1,84b2b4b483838e322dc0c021b3c9a4f533fe87de15eeb913571153b47e92adcc,2024-11-21T07:40:32.920000
CVE-2023-2010,0,0,87b7439ff0128be19ed6d0ff06bb27f5eab62d905a475ea686db334087508fed,2024-11-21T07:57:45.660000
-CVE-2023-20100,0,0,1b56fa917b3ebd001dd8753736a27ac2f4c67e75a46dbbe5ac1eaaf5dfec0a55,2024-11-21T07:40:33.040000
-CVE-2023-20101,0,0,978a18dfa8ec85d92dcef6943e86cf6f01c3c69debb0d677ef810c8fc64254d0,2024-11-21T07:40:33.160000
-CVE-2023-20102,0,0,66bc31622fb44f747a7e47f450dd6bba5f921dde98738d70e82b28d7efcdbd2a,2024-11-21T07:40:33.280000
-CVE-2023-20103,0,0,97f1fd57692d673f793b39e59b49784eb153a4a8078eb29a3e7557afb28c10e3,2024-11-21T07:40:33.403000
-CVE-2023-20104,0,0,dc1b6c88445f10755353443a44ca0b73abed778ace92fe94653e209d79680fad,2024-11-21T07:40:33.527000
-CVE-2023-20105,0,0,92ca9dde11d41f27ba5a89312a3113c4883a48ee7d1366d93dfa8db45218df50,2024-11-21T07:40:33.647000
-CVE-2023-20106,0,0,2b83cfdaaa9a0b83a2dfe3b944a838f223cc8147fd34f1c77bb003dc973e79fb,2024-11-21T07:40:33.787000
-CVE-2023-20107,0,0,8932fd6ec5da667a0f40786b03876a87e11e0975587626c1b17c20ac8965bc77,2024-11-21T07:40:33.907000
-CVE-2023-20108,0,0,566694a4b0f099edf367d68dcf19cfaa49aca12ea1774861b45e97ce4bdef4b9,2024-11-21T07:40:34.027000
-CVE-2023-20109,0,0,62230d5bbea1314fb29b66fc49c0542714ea011594bbfa69291fd026d1aad80c,2024-11-21T07:40:34.167000
-CVE-2023-20110,0,0,ff2eccd57360ae5e861190481f85bdeba222c2a8f9192a13e01bc7835c7718fe,2024-11-21T07:40:34.660000
-CVE-2023-20111,0,0,eeb2b2a71bc0cf2fd0de6e397f20791d61c926b64f18392071d75d768d3fc544,2024-11-21T07:40:34.787000
-CVE-2023-20112,0,0,e2f6ef94381d73f11ab60a4c3f370575304be3866f74f3fb54b010633e4b52ec,2024-11-21T07:40:34.933000
-CVE-2023-20113,0,0,392540c444d4bfdc923a5ca5bf33b832cb46e9daeca99484ed211f8092ccc3bb,2024-11-21T07:40:35.150000
-CVE-2023-20114,0,0,4bc02c2f1b12cf2a7bc6e42a447293872a4f23ab5ad203e9d9988d6ca51a7209,2024-11-26T16:09:02.407000
-CVE-2023-20115,0,0,3e88768497bb7e5ed842b5b9f2fed7b14bd3e27fcd0d921fd9669d30979c8e9d,2024-11-21T07:40:35.413000
-CVE-2023-20116,0,0,fc84583bcf7004b99bf1843515b766ddfe4e17815d7c0524b1b50ab927c55f34,2024-11-21T07:40:35.597000
-CVE-2023-20117,0,0,88940a7596ccb31567f44261d42da75d893cf91dd5c52c06073865af9cc81a0d,2024-11-21T07:40:35.757000
-CVE-2023-20118,0,0,305f2a77daa55f99395edd77ae10d0af0ecd21cfd7f94a9413935dfa165882cd,2024-11-21T07:40:35.883000
-CVE-2023-20119,0,0,056cf20ffcb80324f75b6cd43fd564212cc2f88911a84cec2ebfe9b6181aa6cc,2024-11-21T07:40:36.027000
-CVE-2023-20120,0,0,32115671f4aed4e03845bc1e129294226146eed970d1553e5fc6df289245f31a,2024-11-21T07:40:36.147000
-CVE-2023-20121,0,0,8ad1fedb192a17a9e6ef03580d224e7218d68b8ab1cf1152a68c3e87d7392cfe,2024-11-21T07:40:36.270000
-CVE-2023-20122,0,0,e084d13b8cd084766ae28f1787934171cf1f1174d4663b878f2d4526bb48a1ff,2024-11-21T07:40:36.387000
-CVE-2023-20123,0,0,1ecfafdfb2d7162cd86c526f7a3edf51a1ec2b4da5b2a304cd960efb875d5bf6,2024-11-21T07:40:36.507000
-CVE-2023-20124,0,0,d8e58cbf98214132724768ffcc971fe940c2f777b46bcb8baf5fff13d0c66826,2024-11-21T07:40:36.627000
-CVE-2023-20125,0,0,293d5706ecf83097824b38b71605f9f895326392ab270e196728b202a3e7599e,2024-11-18T17:11:56.587000
-CVE-2023-20126,0,0,70dce8eb4f11c428b6926304e6ae9086ac5938f0dc6e112500f266b10a3836c3,2024-11-21T07:40:37.103000
-CVE-2023-20127,0,0,f7e57e15ae78bf92feb1eee01e4585903d78bdd9a4a7f9ea362bfc55841e5005,2024-11-21T07:40:37.230000
-CVE-2023-20128,0,0,a1ddde03e7dd575863968c62441ca9f432105d2a1f8abc404ebc0b709355a7d7,2024-11-21T07:40:37.353000
-CVE-2023-20129,0,0,32d6d667e84e5bdc6e93defd4557109cadbe47dfb524ea89ccf00757f6aad7ea,2024-11-21T07:40:37.480000
+CVE-2023-20100,0,1,4c549df57d00487d2a72d32c7b4b76c2bbac754b04fd5a5fe11b764f70eb3984,2024-11-21T07:40:33.040000
+CVE-2023-20101,0,1,0242b1f2825960655b95bc1536b3e453d2965d01972ca1a1eece8640866a6bc2,2024-11-21T07:40:33.160000
+CVE-2023-20102,0,1,3dd6c91c400def484c797fcc753691f1ab28db73f554140fe53970865e2aeb9e,2024-11-21T07:40:33.280000
+CVE-2023-20103,0,1,6a254260545727282bed42a415d69aa500cfd9052453eec9ce446cafe9924c5e,2024-11-21T07:40:33.403000
+CVE-2023-20104,0,1,9d20f85960672d603b005b98d0d66924adf61838e4b8489380fd5dff1efcff5b,2024-11-21T07:40:33.527000
+CVE-2023-20105,0,1,55fb4595912c34a16766c1e0160ed5d195e64cb52c61711664dde3b6454d8d07,2024-11-21T07:40:33.647000
+CVE-2023-20106,0,1,4427bc04b5ca0368a42e5586ee947e9cdd2b824d04b84fa4f1c2d9efb0ddb843,2024-11-21T07:40:33.787000
+CVE-2023-20107,0,1,e62871cfd01f1ce231a5fc7e8a39ecc4be3bee1aa8ccae54ad1054c8fd611b15,2024-11-21T07:40:33.907000
+CVE-2023-20108,0,1,8f43645508802f1d375878becc2acfed94a4f3ef81272dfeb4931880fdf574c8,2024-11-21T07:40:34.027000
+CVE-2023-20109,0,1,8f3fcda4eb5a1eefe1958b9e97c280056f7992b40257db280e648b20d8075a8d,2024-11-21T07:40:34.167000
+CVE-2023-20110,0,1,757144361d7b4d39db3faa08446890644173140e5976eb638754b213f8b359a8,2024-11-21T07:40:34.660000
+CVE-2023-20111,0,1,061c9dd1b2564168df994929ed70c8c80ba29e0c678d39e48f30c6cfabb9a246,2024-11-21T07:40:34.787000
+CVE-2023-20112,0,1,eaebecb8bdb153b472a9fe62a204f87b94f168f5db1079433871a38d94d8c9ac,2024-11-21T07:40:34.933000
+CVE-2023-20113,0,1,b7a8166252dd557415708e3d3d843169cf95a7824fd3907961f870d3c4d43f95,2024-11-21T07:40:35.150000
+CVE-2023-20114,0,1,bfadccad28ff3c994d170023d730c5f4974dcb3bd248cdd0ed7612008492f5db,2024-11-26T16:09:02.407000
+CVE-2023-20115,0,1,76ba26cd5daf30b65efc96a9db0f3f3fa0e47acd235379e371aa9779532a6a95,2024-11-21T07:40:35.413000
+CVE-2023-20116,0,1,62369bd5aac71a1c97a767cfb7dc90038016a4d6148d2f98a45b040bc1dd10bc,2024-11-21T07:40:35.597000
+CVE-2023-20117,0,1,2057ff7074237e28368821254321a8a66043e83f0a25d3872f4e9f4e8c4bc1a8,2024-11-21T07:40:35.757000
+CVE-2023-20118,0,1,c374b922e856db910a10198390f261a5b145e378666f0463e92a0b4b8903fab8,2024-11-21T07:40:35.883000
+CVE-2023-20119,0,1,749595a8d4cdbb1698c1927ed2f7b98989f810dd96277e35e514a7c3b6012d6c,2024-11-21T07:40:36.027000
+CVE-2023-20120,0,1,283544e70243dae890e54e82d95c6c3e70f1e3e7b01b66e1129b41dcde2d957e,2024-11-21T07:40:36.147000
+CVE-2023-20121,0,1,73fa4fdba279d195369b2bb6850b3d8ec58132e3272a5f1fc484c28ab69daf1b,2024-11-21T07:40:36.270000
+CVE-2023-20122,0,1,1aa5f12897dbd522cf5efef2f74a1216caa198208484dc340aa0b440b33561f7,2024-11-21T07:40:36.387000
+CVE-2023-20123,0,1,e139fbb6dba0e52cd5f751e243af974b16e3a610c7c8851a7ff31a8028c26a24,2024-11-21T07:40:36.507000
+CVE-2023-20124,0,1,cf1a2f2c741da6133314b135a99871bef0348736f3e6165ce1acbcbc7500aeab,2024-11-21T07:40:36.627000
+CVE-2023-20125,0,1,010eb9a0ed3ac4acbe4a3911c1134a0665893a818d7de93f172d11e78df66449,2024-11-18T17:11:56.587000
+CVE-2023-20126,0,1,da9996d7eeb7dfc4b8ac51997e2cb3434ce8c2ad04953da025a5cafdef8e0564,2024-11-21T07:40:37.103000
+CVE-2023-20127,0,1,15887f4ea63c8dbaade19e58e5b7b03f6f369f41aff1b48d04f693bff1277fa7,2024-11-21T07:40:37.230000
+CVE-2023-20128,0,1,7b7950657784a18f783dc5329f30be4c13c2f38039b51b3c2f645c8e48e5285e,2024-11-21T07:40:37.353000
+CVE-2023-20129,0,1,6d32036cd0819ebcb0949e9b64e4af7ae3b79b9cb06d8d6521a65cc6b2372344,2024-11-21T07:40:37.480000
CVE-2023-2013,0,0,72fcf84cdf5b88e5a2c098330323ac4b932376f84231b4a35940456bd8fa2c8f,2025-01-07T17:15:13.710000
-CVE-2023-20130,0,0,9a6974641534475440b91d8f64a253039239adde95026e66c262c0832b92313c,2024-11-21T07:40:37.600000
-CVE-2023-20131,0,0,d9646ac191340d6c6eeba8dbb277722db753a87563746cf0c07d916cc6600573,2024-11-21T07:40:37.737000
-CVE-2023-20132,0,0,c0218f1473666958c31cde6d66291201625981115c28527d76d537e9e5f87f8c,2024-11-21T07:40:37.860000
-CVE-2023-20133,0,0,4dbd3d24776b8c1ae2a77dec045c1979a0c666326303ad1e7735c12c6d534f67,2024-11-21T07:40:37.990000
-CVE-2023-20134,0,0,d065d798df073f636b9b56c833b184de0d220d418884954471e93b8cfea73f40,2024-11-21T07:40:38.120000
-CVE-2023-20135,0,0,38c5e0531c9dc41cb88622405ff037bb177da135bcc42447e3865ef7fb41eaba,2024-11-21T07:40:38.240000
-CVE-2023-20136,0,0,3adfc46ad4c4d9efcb09ee1fd3a83f71a95a13d6882a72c6cffc984f5b12d27d,2024-11-21T07:40:38.363000
-CVE-2023-20137,0,0,d7b6dfea43b76fe25337181eae2c00562d987968d6651fe7850d6d9e14ce3cae,2024-11-21T07:40:38.490000
-CVE-2023-20138,0,0,4506d992ca4fc1bc565b9c40ee46aec6ced378ba3ecbbc1ac78d7cb3f362863f,2024-11-21T07:40:38.623000
-CVE-2023-20139,0,0,99f71d3eaab4dab9f98303ffd7c55aa6abd6cd66aa94029cb96f9199beb74a93,2024-11-21T07:40:38.747000
+CVE-2023-20130,0,1,b8ae7306ad719c80d715b580fa107b5e32e75c52a07fe4c0728686c21bec2c99,2024-11-21T07:40:37.600000
+CVE-2023-20131,0,1,c6164cf147aec93ef12749f5ed1f0a3ee35849aa53d68963829f9775697b1fae,2024-11-21T07:40:37.737000
+CVE-2023-20132,0,1,5a08b55aacd0aabbcf16c2fdff4913f99751f2bc3d1c1fb87528b7cde4683c87,2024-11-21T07:40:37.860000
+CVE-2023-20133,0,1,0d771c76fcd41b9dc4cea5aac20050a2c0335f1190592f4ad36099b7f46abbda,2024-11-21T07:40:37.990000
+CVE-2023-20134,0,1,b0fb57d6a29411eeb2690c70f4cd222846dec8b832ae1a3b3c4bf5b18cc04312,2024-11-21T07:40:38.120000
+CVE-2023-20135,0,1,506c2dccb39e0e851099fe375043ad29a02b4107d6a4904577aa14342068d5f1,2024-11-21T07:40:38.240000
+CVE-2023-20136,0,1,81c93d36e9269d1b70018e6de72c831b641b36b8bd3e8b44963c03a94319b189,2024-11-21T07:40:38.363000
+CVE-2023-20137,0,1,a6aa27953d18f93347509ea0100fbfcfe4a8596afdcd310efe25f96252ec3e1d,2024-11-21T07:40:38.490000
+CVE-2023-20138,0,1,8f86e8993e976f00c9c48b4437c75675f0a8923175cfa23b8e30d6d92e6a0632,2024-11-21T07:40:38.623000
+CVE-2023-20139,0,1,5d4780aa3912ff7b49328538b53907c10615629a58e4ed0628d6e050d75fa6c7,2024-11-21T07:40:38.747000
CVE-2023-2014,0,0,3543b1541dc7e3396fcc1151e073ca1f35e84f4dbc64fafc5a60bcd8d71eceff,2024-11-21T07:57:45.880000
-CVE-2023-20140,0,0,22a308eb97600689489adfc818b5ad56f9b4446aa952eda70b2182f9dfa52e30,2024-11-21T07:40:38.873000
-CVE-2023-20141,0,0,735b4a39c9564f0db99d8ac9df04e71b76dfc1dfe2c3593943897d424e5ff5b1,2024-11-21T07:40:38.993000
-CVE-2023-20142,0,0,830317ee3c21ae122d539f1e5f0669ba8de8e698c2e30a196b550d71155ba0aa,2024-11-21T07:40:39.123000
-CVE-2023-20143,0,0,630174ce2fe2696b314b2ee0131b9beaccdb8bbc4be749a12d908ee9ac62d333,2024-11-21T07:40:39.253000
-CVE-2023-20144,0,0,f94586c4e4a62210439ce03461b400ea50802fbb1812b82fa37fc30ae8149bf0,2024-11-21T07:40:39.377000
-CVE-2023-20145,0,0,04bc1c30f8a210ea1938e4527bf490d166be3c7392f106e9b9cd7a45d2b0ffc4,2024-11-21T07:40:39.503000
-CVE-2023-20146,0,0,f69b1831b56cb21e7bba328dc21bb5232c973d9820e3b592ae73e140c944673a,2024-11-21T07:40:39.647000
-CVE-2023-20147,0,0,5cb957c773b5319e4793215a4fe6c1722896bc23d8334634f7a3f8d7236c0463,2024-11-21T07:40:39.787000
-CVE-2023-20148,0,0,0c10101f42a9bc0df79468fe1a5fa0dc07156f55e39972f3828caace1f27993a,2024-11-21T07:40:39.913000
-CVE-2023-20149,0,0,7ebebb22a0f8cadbf7bd084a45d8cde40be04333d5e92009cb2f66ea8d8588e8,2024-11-21T07:40:40.040000
+CVE-2023-20140,0,1,efa20bd7e5ea3dabd324aff1d78b6488037a3149e4169d78c8c6adcf53b11725,2024-11-21T07:40:38.873000
+CVE-2023-20141,0,1,e1fe556a0ada47fb334b7a9fac6ff8f4c1ff47e690bd0d1c01f070ada2d1283d,2024-11-21T07:40:38.993000
+CVE-2023-20142,0,1,aefcff80e04347c4e4f1206c83bde9df1c2c6399ac0f383d3c2d97030a1eedd5,2024-11-21T07:40:39.123000
+CVE-2023-20143,0,1,19b95675c82b5d0e87eb4e62099c3d47222a9cf3500968184fb992c5f5b31659,2024-11-21T07:40:39.253000
+CVE-2023-20144,0,1,777e1988b238975794c81abcdd5d70275fa66ef30724ac4983c1c0f3ddbc469d,2024-11-21T07:40:39.377000
+CVE-2023-20145,0,1,99c89f8ed620241a8903e6b4001a2294864b26c237ab21eda3ccb7b2c5aefe09,2024-11-21T07:40:39.503000
+CVE-2023-20146,0,1,825e39968ab0dd8b626a777714c87bc21f751280edcc649ffd4f3f75fc09dcd1,2024-11-21T07:40:39.647000
+CVE-2023-20147,0,1,f08846abd53c2945693584ef56cd7d2f1c2c3c2d4cbe2a2c3b3a10ce0e5767f1,2024-11-21T07:40:39.787000
+CVE-2023-20148,0,1,005a8da14fcc78e7ecee3699831b526c70acecc1b5a805e8b78732ec64c280ea,2024-11-21T07:40:39.913000
+CVE-2023-20149,0,1,9f6edc823e30a7f65431e6d813d3b95e5e0db4371e0dfd39540e85a9f01359da,2024-11-21T07:40:40.040000
CVE-2023-2015,0,0,058b2f708fce569b8441f5a067e1c525bc45ef85b2a3a6c9b1f3ee6970b83d69,2025-01-07T17:15:13.950000
-CVE-2023-20150,0,0,38b578f6a4b032dce3d1ac459b9320c9111ff8106b98db0b692c38044628d3c4,2024-11-21T07:40:40.163000
-CVE-2023-20151,0,0,218bc983aef0b6d9dd9a8c532f8818b60644c61f483b5ce2c98350ad62e24385,2024-11-21T07:40:40.290000
-CVE-2023-20152,0,0,dfa9a42fe53f646a215828c624c7129c2826540352734cb4a33303f6bcac72f6,2024-11-21T07:40:40.420000
-CVE-2023-20153,0,0,887b26cec5826b7c6a0354e2b0021be2bb6b09ebc85f8560ffd138c30d6d765b,2024-11-21T07:40:40.533000
-CVE-2023-20154,0,0,eb3f33c0cf029c8608fe838427fd51e5caa9f4fbb156a67bef9166c8058f903d,2024-11-18T17:11:56.587000
-CVE-2023-20155,0,0,474aeaf9f9fc5ae1426764e70aad9d7a808fe853f2583c943e30df3070f2b7cc,2024-11-26T16:09:02.407000
-CVE-2023-20156,0,0,557ce7826f4c76fd6581dd27267611315746fbfc6405b5b3210e0058cdcbeb77,2024-11-21T07:40:40.923000
-CVE-2023-20157,0,0,f87e8621dc75908b79634c8d07d5c1375ca47001de1af9914ec994883e3900c9,2024-11-21T07:40:41.260000
-CVE-2023-20158,0,0,b61fd092d61fcfa69979780451d0823b8ab24f0f3238ad415dd5e37ee9be8233,2024-11-21T07:40:41.613000
-CVE-2023-20159,0,0,8eca7f6d0bf729a693259241781a60d8484e3778e3dcede9690a915c104782d6,2024-11-21T07:40:41.970000
-CVE-2023-20160,0,0,fba8d376f3169a7f357bfc427c95373c9937874081b6764618a9e83cf62ea3bd,2024-11-21T07:40:42.323000
-CVE-2023-20161,0,0,da7168320d565d349124fc9380db881f16fd9ffdec492a527b2909f9bc70bd8e,2024-11-21T07:40:42.697000
-CVE-2023-20162,0,0,ab119a0721d7c19353cef3e9056c22c49d15f037bf5770311c7939eb7727b70c,2024-11-21T07:40:43.030000
-CVE-2023-20163,0,0,1499be7309d2b9f45c5fce135bdd1f0daacd56aa189b85794ece05f6b3b4c5b4,2024-11-21T07:40:43.370000
-CVE-2023-20164,0,0,f72797a45c896f5eef34e683030447d2f6fb6ea5ddbddedeb67fe9b576f2d91e,2024-11-21T07:40:43.500000
-CVE-2023-20166,0,0,60fd70cdd4af1e82cfaaccce1b56dd243413724ea4c0eafda8fcd9d9659b670a,2024-11-21T07:40:43.620000
-CVE-2023-20167,0,0,3de9e01b97f3b183b4482d9b474c4ca3e66a07e50cc2bfc67ecc90d9a2f870d0,2024-11-21T07:40:43.740000
-CVE-2023-20168,0,0,bdc8fc003943fc3605f2f76a86d640159a48c8cc7bc5a2f32d8d26680fd4be0c,2024-11-21T07:40:43.873000
-CVE-2023-20169,0,0,e9096b6269c4f27472c87b44c67ed9f881a340083b31104eb224d99b1affe44f,2024-11-21T07:40:44.107000
+CVE-2023-20150,0,1,a5a5dca2418164430c22765324fcf74a0851124bd642d3ac1fe78cd339c2ad22,2024-11-21T07:40:40.163000
+CVE-2023-20151,0,1,525413d50c8e9b7f516ee36f98b023fb8ca10b498c8f0970b581e6a0484e7193,2024-11-21T07:40:40.290000
+CVE-2023-20152,0,1,b26a564809b8ee6e536e78812d2606f3266826230dc55c14b518364f19e811a4,2024-11-21T07:40:40.420000
+CVE-2023-20153,0,1,0807f1517509ad689e710e3ef8407286c70ce086e74675353e4281e6cd68c756,2024-11-21T07:40:40.533000
+CVE-2023-20154,0,1,e6877b48352e28058002ec1aaf4afd9a7890ff316c8351d4a45d7116c2501aa1,2024-11-18T17:11:56.587000
+CVE-2023-20155,0,1,77552cdaf7d905b450c3bcf854c310e71889a4833e844b69c812b321165eadc3,2024-11-26T16:09:02.407000
+CVE-2023-20156,0,1,2eeb871315b042730ebdecab4b3078da855308da7b6fb03761fe0df99fdfe833,2024-11-21T07:40:40.923000
+CVE-2023-20157,0,1,7a0f53d41a5e378276622f9fb2bed222710c2afbe78ca907f4c33a15f1f55173,2024-11-21T07:40:41.260000
+CVE-2023-20158,0,1,b51a76740295cd4af423319e5356161bb7ee469a4ab676698a482caaa49d7a7c,2024-11-21T07:40:41.613000
+CVE-2023-20159,0,1,00e6b71190732d16b730057663842a61991d17a9314a73270a0e79feabf33bbc,2024-11-21T07:40:41.970000
+CVE-2023-20160,0,1,a8c5e29db5d100e0c968d2e5f381ca5188f97cfd25f13991bf16f541fd1e2d92,2024-11-21T07:40:42.323000
+CVE-2023-20161,0,1,11ece3aa5d8ef3d7ed23c3e6af104b9b602ed4bdad7c135bf949592e9ed43123,2024-11-21T07:40:42.697000
+CVE-2023-20162,0,1,63855b14d39cb07b79e871d910e203d872b547e29d5eb720d5c4901573fd2b19,2024-11-21T07:40:43.030000
+CVE-2023-20163,0,1,4a76f304db273afb4d8464efbd0ff922217d05da6b41dc82d761069414d86fa4,2024-11-21T07:40:43.370000
+CVE-2023-20164,0,1,6fead110f8a4e189e9a60614523cea05f18af40da3b46f1c038e55c5953b4374,2024-11-21T07:40:43.500000
+CVE-2023-20166,0,1,49d2415740e484ffac3e63cafa98889811a9f03451ca3407c89e80c7b4888e1e,2024-11-21T07:40:43.620000
+CVE-2023-20167,0,1,f3b300d16cd952b6266c588663f2c80dea9a65fe8479464f9395e9ff9ac5bc97,2024-11-21T07:40:43.740000
+CVE-2023-20168,0,1,8d36f642acfb31003ccdec34edec3870a432d19c3a1dfe677e08d0cbf5484a85,2024-11-21T07:40:43.873000
+CVE-2023-20169,0,1,339e83fc011c32409900d81953265c424a8a2ed666085ed0770d0225ba60ec9d,2024-11-21T07:40:44.107000
CVE-2023-2017,0,0,2293f32989b9a3cbb72d7bb8c01861efcf3836b9249a25cdb8fa088155d55677,2024-11-21T07:57:46.130000
-CVE-2023-20170,0,0,9ddda20a765423a2defc51884321f277f14acab303797fdcaa04fc70eefcee60,2024-11-21T07:40:44.240000
-CVE-2023-20171,0,0,90e94051d9178be01a65d9377d93f1e117fbbf3fbbad0597a6dbe7a3cd96758e,2024-11-21T07:40:44.377000
-CVE-2023-20172,0,0,683358e96019f0e6447c260b0306c0618523d123ab5d3d7a37dd1b95d3a41006,2024-11-21T07:40:44.500000
-CVE-2023-20173,0,0,514fb408385ff7a50fbe6e2cda274df95dd51619ea0037a07b1912ae13bcb429,2024-11-21T07:40:44.627000
-CVE-2023-20174,0,0,853c394ac4786a39181c24c730007ff37282904890ebd5b5e8b998c277bc6742,2024-11-21T07:40:44.753000
-CVE-2023-20175,0,0,6d967d23dc5eb8ace1624cecdfe122f52cc792c7217afa9f18bd5e62a252fb59,2024-11-21T07:40:44.887000
-CVE-2023-20176,0,0,1b272b485d067d6b2a12bf4dd96c1b679539d1b21a833a66866c5c1ba4530488,2024-11-21T07:40:45.027000
-CVE-2023-20177,0,0,515f63b9d2a49527677c7c33378fdef7f044fce9e0c7a8f64e38070a0351482d,2024-11-21T07:40:45.160000
-CVE-2023-20178,0,0,3885e2d7dddace2b6f16a7b641f6c165432804d7417246e5a94d626db60ce303,2024-11-21T07:40:45.287000
-CVE-2023-20179,0,0,246f883c6c7fad276485f0fbb24a538384ba609925c70d46960d015a43bf783c,2024-11-21T07:40:45.417000
-CVE-2023-20180,0,0,600f6c25278250e77d4310af04c2eff6abe2624dedb7f2790e48e724401c9b5c,2024-11-21T07:40:45.563000
-CVE-2023-20181,0,0,5c515a2d8a9d034193c88484cf4121df2470495429c2d60608cde5582b3e0fb0,2024-11-21T07:40:45.690000
-CVE-2023-20182,0,0,cb23302cb88c922743f3a39701073c77fd459bc6b3f4aedef20eaf823413a9f3,2024-11-21T07:40:45.847000
-CVE-2023-20183,0,0,f490868d63c92f8469da99cfe89059ebf3d7dddd6cd84a417315a1b0c1ae00cb,2024-11-21T07:40:45.987000
-CVE-2023-20184,0,0,95d7c53738a361a5b71a9910f47b48f80bba74474c21f0107b8f7a3bc2f93cef,2024-11-21T07:40:46.130000
-CVE-2023-20185,0,0,b2a5cd83da2883af76ee886a7970125d6a90b4cba8e8f490ca86e238ae889adb,2024-11-21T07:40:46.280000
-CVE-2023-20186,0,0,a958b0ac565c1323dc1bb61c9031f77928ca3b7c6892311c6e500a62524160a4,2024-11-21T07:40:46.460000
-CVE-2023-20187,0,0,bc199f9f0c18ea1b3dc3e60a75b2aeef7e772b2464639bb9b753f85bdb766f42,2024-11-21T07:40:46.903000
-CVE-2023-20188,0,0,08af51fb64240d757644521968c307552c9936f8111205cf44087277244cbd17,2024-11-21T07:40:47.090000
-CVE-2023-20189,0,0,2183095a16eebfb17dd4168c8329584a6ce0ef52fac8717b2010dddce769a506,2024-11-21T07:40:47.317000
+CVE-2023-20170,0,1,e66f1b3e46422fa98c9bd6df148c0b5763d8c24b7fff4341f06cd5e033d8d1db,2024-11-21T07:40:44.240000
+CVE-2023-20171,0,1,73945369ba6b5f4cfe589dfba038eab7053a06f96e7b1c6c523bbab1d28d6ee1,2024-11-21T07:40:44.377000
+CVE-2023-20172,0,1,da9fde994f59506f367b0a0084cc9b5a1013ea13b9d6ce3b09886099ed40752d,2024-11-21T07:40:44.500000
+CVE-2023-20173,0,1,41d30902f56d0077b4c89260378e549911a1a7390eececa8c8676d38e1d29260,2024-11-21T07:40:44.627000
+CVE-2023-20174,0,1,a5f6b727a6aadf215d87e01a7d1451c21be49f21cdeb13cfb3402c0768f909b9,2024-11-21T07:40:44.753000
+CVE-2023-20175,0,1,0294bee9045ded856b3d9602d53b3d67eaf4d5c0fe8b0392dd485d1b02baec2a,2024-11-21T07:40:44.887000
+CVE-2023-20176,0,1,5940374f7f21f68f5fb886e01051be7effc40ea17403b5d5cbe62a4a2b8647e7,2024-11-21T07:40:45.027000
+CVE-2023-20177,0,1,a7ea0886414a419c64d4f8fecd52d147c2a087bc9a79c28a57d03078f8aadad5,2024-11-21T07:40:45.160000
+CVE-2023-20178,0,1,8d2b15de57c67f8df081d88f86886b02e37c35d377349c492b0a1473e5567422,2024-11-21T07:40:45.287000
+CVE-2023-20179,0,1,d1499a1fcdee96c4d7142e358936c8fe23c61daa51def2fee058898122d3249e,2024-11-21T07:40:45.417000
+CVE-2023-20180,0,1,618c67d623ef1861c78056048a3faf645c9d807fc083037eda01845d0370bb9f,2024-11-21T07:40:45.563000
+CVE-2023-20181,0,1,2e780463bb42bbaa113f2e4fe7a99c4d5c8a614c666bd0a25583f1a9b9505191,2024-11-21T07:40:45.690000
+CVE-2023-20182,0,1,a92842435aa5e287274a6764b8a47a778be285a2744f3cfa890c12d6813aeeeb,2024-11-21T07:40:45.847000
+CVE-2023-20183,0,1,66d8941613d491a0934c0d88aa636f0e35574b8671496490851b453c7d875810,2024-11-21T07:40:45.987000
+CVE-2023-20184,0,1,dfc5af96dfd325c19c7ebcc39e0f088feb76f0a6201838ea334f7bbb6d399f24,2024-11-21T07:40:46.130000
+CVE-2023-20185,0,1,b9fc9045145eef7be80d597232820998aa81efc562b1fcfdc24bdd0fe0375b3e,2024-11-21T07:40:46.280000
+CVE-2023-20186,0,1,45c2304de2650eda7503e7a5b6b812a97b558834c3d018ac11886acddaa1b8a8,2024-11-21T07:40:46.460000
+CVE-2023-20187,0,1,06b2c4e61b7276271878d38db6ba08df36b3b38576a4d8e473bde6e45ac0cc16,2024-11-21T07:40:46.903000
+CVE-2023-20188,0,1,545b68b23be4c353efe520203f69c8b83261dc6b6e151a294dacf3fc7c4b753d,2024-11-21T07:40:47.090000
+CVE-2023-20189,0,1,50acee98d8717370bb8e583c4209e09a8a04e9cee95ec3b7c765936d4e37a024,2024-11-21T07:40:47.317000
CVE-2023-2019,0,0,9492433170f0b8020b1e60be0dc8024181769d8bda2f7350ede2746abce20bfb,2024-11-21T07:57:46.253000
-CVE-2023-20190,0,0,a946aa6fb7d7a253b865d3900882a3ee9c3b8f8bc03b080acde4d51edecad905,2024-11-21T07:40:47.653000
-CVE-2023-20191,0,0,94fc594a842590d61c7c956a52423901804d04e4743ff1dcaf8a082dbf7cbb8a,2024-11-21T07:40:47.793000
-CVE-2023-20192,0,0,e1e7302b55cd84f220726039edd812508edcf5761eddcac822280b73da3090c1,2024-11-21T07:40:47.917000
-CVE-2023-20193,0,0,ca734360e8636ce16e980b903004f7c609e7b7cfd0c28b57c4bc33310b4279cf,2024-11-21T07:40:48.033000
-CVE-2023-20194,0,0,872a59a3ced700488bd44ac29578e162d2f86ad1cd931f1a2dd029475e8ff866,2024-11-21T07:40:48.173000
-CVE-2023-20195,0,0,dbe97cca3f2a4459bd3da260f2690aeb3bd6b1946417b5172d1d79160540d7df,2024-11-21T07:40:48.303000
-CVE-2023-20196,0,0,cb15b8950b75f1fa606b839f1a7de8e67734628571d515ce4980e7cca85a8dab,2024-11-21T07:40:48.440000
-CVE-2023-20197,0,0,e23da24f73f6aa082ac8f8ad239e3fc70512b687a985001d3f527825c064b2b4,2024-11-21T07:40:48.563000
-CVE-2023-20198,0,0,394bd5a4215f68c30fc245b8e6c3c6ec4fde710e72ea4a48b5fb1fd3a6adc709,2024-11-21T07:40:48.700000
-CVE-2023-20199,0,0,927814131acef3b4a8955326b5e26a525cbaac66b80a5b1d0f7f36d5a86a7f7c,2024-11-21T07:40:48.870000
+CVE-2023-20190,0,1,3be939bb463580cda9689f89da8faf4e1cdbf4189dd7f02827578d16945d46d1,2024-11-21T07:40:47.653000
+CVE-2023-20191,0,1,9b40334d6789988a56a6a35e5f94692d0188765cd5eb7386b2b178920ec17316,2024-11-21T07:40:47.793000
+CVE-2023-20192,0,1,a9d4ad7aa88497e22b4fe994c3cf9ded0bb87f6cd69181588c91746a800e6e65,2024-11-21T07:40:47.917000
+CVE-2023-20193,0,1,098890c4c5e4fed5b3150609ca66115e4e36f3a40e21fbb0f121d81c7a504165,2024-11-21T07:40:48.033000
+CVE-2023-20194,0,1,ce0e3cf3a213503b31e23f063dac4ae7ddc2d9e4163fb5c0afef9a1d06d831ae,2024-11-21T07:40:48.173000
+CVE-2023-20195,0,1,674d89b31381c2f9b6739ffd9a17ae20ee12939bda74cb5c4e81a0c729bb5d46,2024-11-21T07:40:48.303000
+CVE-2023-20196,0,1,c3eee1491a24a45904955c78bec4d37efc6a9f681af033bc7197ebf2168e9e2f,2024-11-21T07:40:48.440000
+CVE-2023-20197,0,1,eaf062939cde1c0e1062bbd10e51c9f0b7e9d0555efaa2468c46f82b2164ff04,2024-11-21T07:40:48.563000
+CVE-2023-20198,0,1,d916c068144b91d476a5473725c256e79fc08a24494a0dc2fbd783e19b30914f,2024-11-21T07:40:48.700000
+CVE-2023-20199,0,1,e5ba49ec87e7a6f11a2e9c0fa40a99e3c9cffc5736b7c6709c735f877a70a67d,2024-11-21T07:40:48.870000
CVE-2023-2020,0,0,cf4e41646661b1bcfb6e1c8788fdece95e27bc073a4aed2f025409e018fcaaa5,2024-11-21T07:57:46.397000
-CVE-2023-20200,0,0,fece02d6c39141cf5d06ec8e860a80e54e2f5d4af898e71df892548fb39b09d9,2024-11-21T07:40:48.977000
-CVE-2023-20201,0,0,6c0ba10cafe7b0933ceaf24f7cffc017b71c6794a61e21d986724f09588aa8eb,2024-11-21T07:40:49.140000
-CVE-2023-20202,0,0,28a82d58a9e1ab2f448c050245aaf1ab952aa435f9502f0a69f6c0daea6b8f8c,2024-11-21T07:40:49.307000
-CVE-2023-20203,0,0,904a866f3d059736b51cf0d0178fe80082a50912a0ed43d6ae987de97b956819,2024-11-21T07:40:49.437000
-CVE-2023-20204,0,0,64c8e9e6709995bc15f2435142247f9e638ef87ab79ae97da67f66e3ed29a852,2024-11-21T07:40:49.627000
-CVE-2023-20205,0,0,2ba6fc49d48a7dc48951909b89d36a635faed71017e0d7f336540e5717f1d20c,2024-11-21T07:40:50.267000
-CVE-2023-20206,0,0,3644c2f77af64ba8b5f0e41a70fb7caa02647eba8c3d1c5dfdcb80f3a687f977,2024-11-26T16:09:02.407000
-CVE-2023-20207,0,0,7cc73291e46b4abd292cd55f6967c3761e499c1bd6c3df19172e1e48e7363016,2024-11-21T07:40:50.560000
-CVE-2023-20208,0,0,5eaf590975155c5e30aca2952414e657cf76dd22b686b5b888aecd312af965a3,2024-11-21T07:40:50.683000
-CVE-2023-20209,0,0,9873a24ff3619040a08cf02be719b9b271942d76473e2b81117347f475fefcac,2024-11-21T07:40:50.800000
+CVE-2023-20200,0,1,131193441a24744b06a2afa9a8ece585ca7c0680192a044d9e29981f94fa204b,2024-11-21T07:40:48.977000
+CVE-2023-20201,0,1,831a7c1476de4536ae50555cfa4c5cd5e53eefa4f7267b811708f7298d7a535c,2024-11-21T07:40:49.140000
+CVE-2023-20202,0,1,da803d9f22e7ca55a4a93729e7dd2169ef0119a64f9a7ca866a6d73096784d66,2024-11-21T07:40:49.307000
+CVE-2023-20203,0,1,a6edc3613103b8b70c4ffbe8db85f192867f0f59e03a2f206e51cd791788bab2,2024-11-21T07:40:49.437000
+CVE-2023-20204,0,1,cb0928c7b404be9a21ccee18c64a8f4a5ed8eb7484b0955cfead3ebffa177f66,2024-11-21T07:40:49.627000
+CVE-2023-20205,0,1,ddce0835e4ae66bddd2223070d8a49fa9093c9d87de9aed85601966e2c80cf58,2024-11-21T07:40:50.267000
+CVE-2023-20206,0,1,410af01ae4d0863794a5238763443352573b2e558baf34750d1b0fef1090c1f5,2024-11-26T16:09:02.407000
+CVE-2023-20207,0,1,d0ac16526f1c91950482043b02e3aeec6920b3fe7b03cc9c29e99d904c5470ac,2024-11-21T07:40:50.560000
+CVE-2023-20208,0,1,93bc6440b07e3f7fa13764d0694851f9d81f07908b945407c7a176ebca005c45,2024-11-21T07:40:50.683000
+CVE-2023-20209,0,1,4456e9e24b3a46b070faa49bf2282d421aa8897a62ece6119c1f17dcc57e5ca6,2024-11-21T07:40:50.800000
CVE-2023-2021,0,0,2ea04bc2743f81133b184d0c44b00edac1bcec109af1f70dab3dd8a35f575464,2024-11-21T07:57:46.530000
-CVE-2023-20210,0,0,3b56dc8248e0d8a859ebf7ef4b32dc66d1946bc1b6d89082840e5e988c44faeb,2024-11-21T07:40:51.007000
-CVE-2023-20211,0,0,c48d512055d86a725302e36a9f7ca2719e0b0a106d537241e11d19b4c4b9f089,2024-11-21T07:40:53.727000
-CVE-2023-20212,0,0,84d29c38619da3bfaea65347ccf6ca639307fc153e4e1024e8689a4533df8ab9,2024-11-21T07:40:53.953000
-CVE-2023-20213,0,0,76c077915025ab274c6d6efef0e731837dfb75aa6eb7cebb26cc72536aec61a0,2024-11-21T07:40:54.080000
-CVE-2023-20214,0,0,8390adca0c5294ac1ea87d885367557d22c71d846a5aeff4aa95d67db15bbf14,2024-11-21T07:40:54.210000
-CVE-2023-20215,0,0,43cdfa1d17a85ebb2b34c41de7ffc48c40f7099e26f47e65a85cacf9e71ab85e,2024-11-21T07:40:54.337000
-CVE-2023-20216,0,0,018cb0a9f308ccfc3d7d84399edf866e217704b6f76e98156c28e6e28a95e317,2024-11-21T07:40:54.493000
-CVE-2023-20217,0,0,c72a890f77c57cf08dc0767ef9d5a0269831bc5bbcebc108d7282e54b117d8b9,2024-11-21T07:40:55.260000
-CVE-2023-20218,0,0,c8ae2b558340a58726864640f5a9b688284c27e80e7acba05fd81b1621c8222b,2024-11-21T07:40:55.383000
-CVE-2023-20219,0,0,37c68456436fea19d4f5f4f1b431ee8228c26296fae80f4a206de06b738d0525,2024-11-26T16:09:02.407000
+CVE-2023-20210,0,1,2fd09c59e45a42bc9639d0940a7c07e75e5a90f6c9e7d58892cda90a67405291,2024-11-21T07:40:51.007000
+CVE-2023-20211,0,1,a88d27262ad394fd82b2b3e113d9fc52dc977cf3252d4d69a55393889fb5d250,2024-11-21T07:40:53.727000
+CVE-2023-20212,0,1,e01e0417e45ed5dd1ca39138f5a2f841ab9ba0f4caa816dbf2c3461a68ec986c,2024-11-21T07:40:53.953000
+CVE-2023-20213,0,1,73ffceb6d0055cb37cd037d931fe1a7cad82863173f05a071b8925679c847a6e,2024-11-21T07:40:54.080000
+CVE-2023-20214,0,1,c55927dc07a39e903c3380df02a2f2905125487a1d3fd2a6faba112de1184dca,2024-11-21T07:40:54.210000
+CVE-2023-20215,0,1,8746b1d4ada58fe6e1cfc333c7ac9befdcb8f83ae8ecaef6805c236e5cf39be9,2024-11-21T07:40:54.337000
+CVE-2023-20216,0,1,19cfdd30a4e0b3743c49921abf7715be6db3e59eb930554802c2b7a14b277ffa,2024-11-21T07:40:54.493000
+CVE-2023-20217,0,1,27213cb54ca8112f40f5f57594c099eee92cb0486a1bfe44412054513aaedc34,2024-11-21T07:40:55.260000
+CVE-2023-20218,0,1,573c8935e9465664fc65d35a94916e7125aa501a029b1d7b82bdfb627d17408e,2024-11-21T07:40:55.383000
+CVE-2023-20219,0,1,8e7f489bc9f0da0d7def14b71876cdf684e7f0901cb7259973c1ddadbce3e97e,2024-11-26T16:09:02.407000
CVE-2023-2022,0,0,c4d896300fb2f8d073beb96ca22a272af2657d13d2668700ed793ab23b012972,2024-11-21T07:57:46.647000
-CVE-2023-20220,0,0,66eda1fa7768c1c4a28ebb1de9677d6acb780d626c3ce81ac75fada26971dc00,2024-11-26T16:09:02.407000
-CVE-2023-20221,0,0,d9ccc6b97e7a5770f89aafa6476e49a25e429c27ca4d8c5f063b86e66e334448,2024-11-21T07:40:55.780000
-CVE-2023-20222,0,0,66674fb2ff5aae4bbd4e42bc628185cff39447da3c90fe8a50e41c7a3fd3fa3f,2024-11-21T07:40:56.013000
-CVE-2023-20223,0,0,d67144a356035602d123256c7fac6275211b82291dc03f14c6c1adafef16ca44,2024-11-21T07:40:56.160000
-CVE-2023-20224,0,0,cf9cdf74a33ee6fb5c1bcc7104d1fca42c21976f029a27c0ec6221394d49ee37,2024-11-21T07:40:56.263000
-CVE-2023-20226,0,0,1474b979cdd6f6717fc912eee3213884c6124c6466b1b7d90a8b5bcc222ddf35,2024-11-21T07:40:56.363000
-CVE-2023-20227,0,0,5dadc18e7504c0c1989e98a45007cf2ea4b0bdb5c1b39f9c17ac5278ea86d6b2,2024-11-21T07:40:56.480000
-CVE-2023-20228,0,0,bff676f4394aba9a75ec36de299ef3925097307a898dbbdab0ccd1fb30714b36,2024-11-21T07:40:56.623000
-CVE-2023-20229,0,0,5720ebfa0ddf39c053aab01d47c2e6a4e439c0e76841155dea1bf372f924164e,2024-11-21T07:40:56.783000
+CVE-2023-20220,0,1,aada094414b701a522195b89b43427126f88b468db6695cb76b83dfd4efac391,2024-11-26T16:09:02.407000
+CVE-2023-20221,0,1,d04b3d3adf9815cd5d8cba3efbb582a1200e5301ccb0b38d631519b1f453b583,2024-11-21T07:40:55.780000
+CVE-2023-20222,0,1,4a2338d397a9b075bcfcf9e00fb24d44bb5ef4f5ab2eb4607f346157412c1b40,2024-11-21T07:40:56.013000
+CVE-2023-20223,0,1,0a8cf59bf941045fba2f3f86424a75847e967e417680951ec5b30b589bd468b8,2024-11-21T07:40:56.160000
+CVE-2023-20224,0,1,f85bad5cb4c6bf2cd0561484e2024eda733c31ff0c3e13cbeaa37dedf6dfc363,2024-11-21T07:40:56.263000
+CVE-2023-20226,0,1,4e34ee544b6d7db5e567fb456cb4db3b5990b0a535a6f405445d70877d283842,2024-11-21T07:40:56.363000
+CVE-2023-20227,0,1,54d68f97442504f6a274432f62ff075ddb9ebd2ade0caaef63a5926d9f1a86b9,2024-11-21T07:40:56.480000
+CVE-2023-20228,0,1,1cf891e68ab78adc81be932a25b11eb88db62709657b1d1090b2f139117833d9,2024-11-21T07:40:56.623000
+CVE-2023-20229,0,1,3228e8bbdb62b9faed71d9f02020774108eb14eb8024803888d1faa67c166c86,2024-11-21T07:40:56.783000
CVE-2023-2023,0,0,a25f83a78233ed308d8771d38e08b18141a73a4b68ee53366ee9c34e55ae903c,2025-01-09T19:15:16.547000
-CVE-2023-20230,0,0,ccd2838b3fed7be14b4c61fa6223f90c300787326a6adb02936af0206bcaccb3,2024-11-21T07:40:56.890000
-CVE-2023-20231,0,0,b031a7ac9b47c3a97add8e35b4365c1f212d679c63458d656da258f5d9ce7741,2024-11-21T07:40:57
-CVE-2023-20232,0,0,f589b067bff36036bda706e83e7f9a76b04e16be8f1e2f2f03d2c0951ab7316b,2024-11-21T07:40:57.140000
-CVE-2023-20233,0,0,c8f0775ade0dc5df509252f7515058447637de859c1ff4e6e201d72ebf0e8039,2024-11-21T07:40:57.257000
-CVE-2023-20234,0,0,b855d1c5011e3f65e0be98bb1c8369191d9aa66ff69cc1a427c8f3ac014b4a34,2024-11-21T07:40:57.383000
-CVE-2023-20235,0,0,6614c6d187f101b303dd7bcb2b8ac38dcd099de3b9a47f39b89a2262ec7966fc,2024-11-21T07:40:57.567000
-CVE-2023-20236,0,0,eff5c7ea1fdec32538847e916ecceecdb654ae2bb266b69af9c7f41fadf73929,2024-11-21T07:40:57.700000
-CVE-2023-20237,0,0,1f1249a8306d0ff7cb01f4404852e8940d93a7eceb3d6aed3b52165585e2a7c3,2024-11-21T07:40:57.847000
-CVE-2023-20238,0,0,10e13ace24c532f6acd2e337a24438f04783e8662e7725d2bae59536dda1fb32,2024-11-21T07:40:57.973000
-CVE-2023-20239,0,0,59d23965d256804f159ffa625f114549c6ad026320084961a88b6f645b86c1cd,2024-05-23T22:15:11.543000
+CVE-2023-20230,0,1,bcd6b1843890b7e91e1e46054194976d10fdf01d2c8cadb5facf686c867ea508,2024-11-21T07:40:56.890000
+CVE-2023-20231,0,1,b2aac767d5d28879a6a32e0806aa8e900d3857713975e62cdf336fcc9fbd71f5,2024-11-21T07:40:57
+CVE-2023-20232,0,1,d5c049019b58e615eb866c7c92c4eda5b893c72821de880d306cb2995262796b,2024-11-21T07:40:57.140000
+CVE-2023-20233,0,1,262e223ec9c4518cb9027275c611365333f912dbabb947903d057458b9e30b42,2024-11-21T07:40:57.257000
+CVE-2023-20234,0,1,5cdba22f1ca4ef61c90a1aae10338a1b0d15925c2a16cfe8fcef59222b80f850,2024-11-21T07:40:57.383000
+CVE-2023-20235,0,1,6d56f6ad70786a223b715bd23a1f3ea07acb4eaad4e8e51badf23c20b12ca91a,2024-11-21T07:40:57.567000
+CVE-2023-20236,0,1,cc62fb859d3756bbce52a3de7b47fe5500d35c9aecfa9d5156efe3ce7d0d4c58,2024-11-21T07:40:57.700000
+CVE-2023-20237,0,1,183fde39f8560186373711b3dc271c8006a029f765ce2120fe7adf6255c0e144,2024-11-21T07:40:57.847000
+CVE-2023-20238,0,1,20073226864dbc92543f8757730514c4d5c4972ca49b27adfa02d5c45f27ae28,2024-11-21T07:40:57.973000
+CVE-2023-20239,0,1,cfc153d56b181ad6c762ba4d68687ef3cc9a7b8e39e6fcb5bdc56ba8f9f62d64,2024-05-23T22:15:11.543000
CVE-2023-2024,0,0,a3c96d03e81e39ad2cb4cd79affc0ea22eccbf349c22824955334d52680f83cd,2024-11-21T07:57:46.900000
-CVE-2023-20240,0,0,0d0b5351ee847a217a56dd7196ad4a9a7bfc1a62c86971c9959a7cce4a5d4a84,2024-11-21T07:40:58.247000
-CVE-2023-20241,0,0,f57f579e12d4a8900d50d73b42cb14d748a5e6b81e0b90bd9dd9aaf1c03e128e,2024-11-21T07:40:58.370000
-CVE-2023-20242,0,0,b8b5a9673c7a061079615542df58924facdfa9ce34f5c6b03701cf20705eead8,2024-11-21T07:40:58.500000
-CVE-2023-20243,0,0,5c7c58ac9e1816232d1371c38d42b39620d335bfb188f02cda1cef3a8fb99fb6,2024-11-21T07:40:58.630000
-CVE-2023-20244,0,0,659ca4324853006641bd1bf2056d55f8f26824877ed16597baec234bb2ec0f7a,2024-11-21T07:40:58.750000
-CVE-2023-20245,0,0,22ea57fb5b7dc3fb8f17f2583bf099f6395687ee96be16fc6ef0550c8bb65d9f,2024-11-21T07:40:58.890000
-CVE-2023-20246,0,0,c8ccf4cd8a0ff9aa9b0c02da1abc631d987853a15669139ec482c494cbbca8be,2024-11-21T07:40:59.063000
-CVE-2023-20247,0,0,1799c5937450c9478ca0e17da3e523db7c41f4cbe17e7c2926d7d5ff8e78784b,2024-11-21T07:40:59.200000
-CVE-2023-20248,0,0,26207d68b709db2133edc7172f15692c99d63fa931c406c12623cfc1640c0e63,2024-11-21T07:40:59.390000
-CVE-2023-20249,0,0,8a916c233bea4d931360c71ed2d709e0a65f440e04b5f5c0d27cd2a31495b736,2024-11-21T07:40:59.573000
+CVE-2023-20240,0,1,b09fc5672c8592a9b9fb138821a4ed3d290cc49e14817d80a307dd7954abb34a,2024-11-21T07:40:58.247000
+CVE-2023-20241,0,1,56ac884fd22ddc3e940ca53fdbc98d054b450abcd7c12b30cb41220b9d057778,2024-11-21T07:40:58.370000
+CVE-2023-20242,0,1,4ff59ee3f2c6034aab4c2affb2d15548ef946773143baec254fbb7f36bc6d1d9,2024-11-21T07:40:58.500000
+CVE-2023-20243,0,1,153a85dc7a607e603807a243ac5e9e97d5a76afa4a401bcdeca23d1941806f8a,2024-11-21T07:40:58.630000
+CVE-2023-20244,0,1,04d06cc910e8622ed4582c8bd365231315a3a7773630ed77fe4b6e8996960de5,2024-11-21T07:40:58.750000
+CVE-2023-20245,0,1,9f7d0684fcd3dc88fd4b6a3fa68ecf02841f70db54f8fbf5c3bfa4f335ba39e2,2024-11-21T07:40:58.890000
+CVE-2023-20246,0,1,6d2b37f5c6ac086ceda5bb29e8646cadf5c50f638a870e23c0dbdcde6ad30bed,2024-11-21T07:40:59.063000
+CVE-2023-20247,0,1,14bf4b27e0fd5450e104dae5e7cf40f4887a3f17c84342c9769adaf9047c3e20,2024-11-21T07:40:59.200000
+CVE-2023-20248,0,1,320798725193eaa16b27f6c0004a1e4901ec9eae83822347d6545a1a136ce38a,2024-11-21T07:40:59.390000
+CVE-2023-20249,0,1,037654eddc6da0231e9f6eeb9e75ba64d2dfa10f887ea17bb7ec08af74637a3a,2024-11-21T07:40:59.573000
CVE-2023-2025,0,0,f2ee56fa364f118987b4743945088cc9b4233edd69248c0556648598d17b0711,2024-11-21T07:57:47.043000
-CVE-2023-20250,0,0,b6405f42b87f960b6fb8e0e30455e8dc6530d6847cdf4c6afd80cb43f69ce732,2024-11-21T07:40:59.683000
-CVE-2023-20251,0,0,fa0ec3959a4aa2bf7e66fc6dfee278a4673191585c14c2d5a2aa5115728ea67d,2024-11-21T07:40:59.847000
-CVE-2023-20252,0,0,ddfb2ba8453e6858f6896aeed30466d328e0dad833e50c90076bd9e7289dd1c4,2024-11-21T07:40:59.973000
-CVE-2023-20253,0,0,880ad3f0ce340b8a6c59847318158025156938236bfef55a2334653edb5f48e5,2024-11-21T07:41:00.117000
-CVE-2023-20254,0,0,775b432b4527bb15bc30af84cf223db9cb032e7c43aeea39113bb5d4e4e07ec0,2024-11-21T07:41:00.253000
-CVE-2023-20255,0,0,8c3fe1d65e227b000a782ad9bf113b264eea84cf4b795dc5087300d88f40daba,2024-11-21T07:41:00.387000
-CVE-2023-20256,0,0,403abaf692b4ddebc9c7e4ab6fd7bc05cc3bee4dd0aba6710df8cdfeaa014c3c,2024-11-21T07:41:00.497000
-CVE-2023-20257,0,0,e53222d54b0d627338c11d39d89deaeaabca8a58de09b6856560a9ae9a190b2f,2024-11-21T07:41:00.660000
-CVE-2023-20258,0,0,96ad91389cf89e1fa831fb5921a2941ac70fb6ca9a17371cbbf1cac492c86bee,2024-11-21T07:41:00.830000
-CVE-2023-20259,0,0,cca57a2a0aabc6d7ceea1d0e6fe5c1fbfbd010eced587c02d8cdb3cf89863e5c,2024-11-21T07:41:00.970000
+CVE-2023-20250,0,1,f1bfbe430c90a1e77a0e3bab5e445960f08b5671ac0822c192f18f5e8778d7fe,2024-11-21T07:40:59.683000
+CVE-2023-20251,0,1,8fdc41f02b0402ab9fb71c874d53d5f06430a5169e321c9bfc65118fb7755ea2,2024-11-21T07:40:59.847000
+CVE-2023-20252,0,1,3916ed9b59ff1b425e1ea6a035380dade3ac3f8d6aad9b4d5dbfecf31b568373,2024-11-21T07:40:59.973000
+CVE-2023-20253,0,1,7d3078b9b216541e2c4e9cc4476d90b1f8e318e3a258dda919db3ba7e221cc80,2024-11-21T07:41:00.117000
+CVE-2023-20254,0,1,06e4585dd10d98eac0c391b805c4f642dd3002e341abb0e6d859c3d3b6bcd351,2024-11-21T07:41:00.253000
+CVE-2023-20255,0,1,5085b7e78042149f1475b08f9b5ee9880bf303e3979889f599181189a3548bd6,2024-11-21T07:41:00.387000
+CVE-2023-20256,0,1,4bd734bf32f123f93d3fd6277308586dff9aa4c2e9651181a213d21d0160afff,2024-11-21T07:41:00.497000
+CVE-2023-20257,0,1,c6ac481003b1724fb92e63aaf9d9cbcfa2271864b81a927ba1220a0b930b45d0,2024-11-21T07:41:00.660000
+CVE-2023-20258,0,1,7dfaf60daa7ef18b78750f3bdcd5a62de3d4d4c06b356b0b191e6bfe5a22a7ac,2024-11-21T07:41:00.830000
+CVE-2023-20259,0,1,ef6ee8c7b5b0be4778c04452959b0a2fb2503edca165e1789e90db994db2987f,2024-11-21T07:41:00.970000
CVE-2023-2026,0,0,9eef1aba9c977372472fdd39d545e6bfb00f211147806ac8a26374db9ec6505b,2024-11-21T07:57:47.163000
-CVE-2023-20260,0,0,dcc1f7d745e9e4b553a791986f0f6064bd798f389c87ec5900ac6916785c2591,2024-11-21T07:41:01.097000
-CVE-2023-20261,0,0,90db0a285ef2cacbd84eca30aab34531187c2f32571f1f307562c716e3bdb80c,2024-11-21T07:41:01.273000
-CVE-2023-20262,0,0,084d83662a7739dee56d5af2ab039e2fa446bfd712a6bef0e4060324b98c4bcd,2024-11-21T07:41:01.443000
-CVE-2023-20263,0,0,4d0f947ace27a26406d0b22dbc31a79a2aad97a8eb9f3715b56a7e097cb78a2d,2024-11-21T07:41:01.603000
-CVE-2023-20264,0,0,f61a918b7ddac009f34c3362bd6b54a4687cb33e027803d90bd6656407279251,2024-11-21T07:41:01.730000
-CVE-2023-20265,0,0,dda2e3670c3ae3bb45e1dbe460bd6031f90c5cba0001ca17ddfb9c5c99764b60,2024-11-21T07:41:01.880000
-CVE-2023-20266,0,0,6fb95c445d1f7c3133d63a81c83d468181f5d917ca7e3f0a6490eb3e910e69d8,2024-11-21T07:41:02.020000
-CVE-2023-20267,0,0,3e7af8cf2d683cf624731939209ce0c04f611bdc414d34ce66a2c6517715f77c,2024-11-21T07:41:02.150000
-CVE-2023-20268,0,0,1144d4913b47b8f351b24f784f2608305d8d4e878689300990e6b88b93d47cfc,2024-12-12T18:15:21.377000
-CVE-2023-20269,0,0,1e7e1dd6dba3102c029d0252b579aceefaa26eae1f98d7541543b24657b78062,2024-11-21T07:41:02.433000
+CVE-2023-20260,0,1,472c4e92c4331edcea7a1b3ec773935fdb6acb50f20174294b361e47d706dc6a,2024-11-21T07:41:01.097000
+CVE-2023-20261,0,1,5cb5be411db3a6df5bf4c0dd0ad74d1d1ec16c8df8017cdc93d40ac6424d991c,2024-11-21T07:41:01.273000
+CVE-2023-20262,0,1,8a575ee436aa7c904092f61c6a2eac29d006868ebb4d69950f59ba6446473b4b,2024-11-21T07:41:01.443000
+CVE-2023-20263,0,1,83c203a7c77ccc8dae9a9e8341e8f74ee6f6d6c6ec2a8e68527db545df2b46ef,2024-11-21T07:41:01.603000
+CVE-2023-20264,0,1,979936d7266d500df736d4c2781c5c110ab815b2f0a25f22d275f3cbf70a69b3,2024-11-21T07:41:01.730000
+CVE-2023-20265,0,1,99e45a1903dbf4a5042bc49e962ebaaaa0757e98d679648cf78564bcebd5a834,2024-11-21T07:41:01.880000
+CVE-2023-20266,0,1,8e92452be45d5801b85de9aea28824f2decf2a0cfcb3bc1fda54e6f1f63de744,2024-11-21T07:41:02.020000
+CVE-2023-20267,0,1,9e0f3b04112bfa1ff7b1a3770419c89436c021beb02416b4ff8b2afd1c2154df,2024-11-21T07:41:02.150000
+CVE-2023-20268,0,1,e1514fa4a51f79bf6efcdcbe635cfe3bf3423b7089550c43c8e2adc87c2251d1,2024-12-12T18:15:21.377000
+CVE-2023-20269,0,1,efd16e3e27debfdcb9ea761b3fbe6c0e2e4e61ffd386ab38b60c61fce625548d,2024-11-21T07:41:02.433000
CVE-2023-2027,0,0,9e8d61ec9744421e4fb115f667516dc7b0114432a5d4e9c6762fbf9ed100733f,2024-11-21T07:57:47.270000
-CVE-2023-20270,0,0,75e585e1cc32e1cae4dda6081545b799db2d0fb3cb473248b3788e2ed925b2e4,2024-11-21T07:41:02.670000
-CVE-2023-20271,0,0,97dda7226a2ab3b5cd40b671eadf8af09f5352cc8834b91deb32831821f17b2a,2024-11-21T07:41:02.800000
-CVE-2023-20272,0,0,4e7e7bda4b745addfb8e5edddcb28e7c616d6a3bbc1760f151e1c49a2f86cbf3,2024-11-21T07:41:02.977000
-CVE-2023-20273,0,0,4da2753c02b57c9c2e97839b7e340175908093a11b232d1dcbe15d64e3d380a4,2024-11-21T07:41:03.110000
-CVE-2023-20274,0,0,702681b467a8249c9ea11f120af3d2dff1a31edcba8ceed65ccb6d7a3b02cf0a,2024-11-21T07:41:03.290000
-CVE-2023-20275,0,0,a905a8fbd58bd3340af6719719cd0da0db15b9dc5c833fe286469928e6c341c3,2024-11-21T07:41:03.457000
+CVE-2023-20270,0,1,ed557079befd3422cfb0c1934dcaba9ce56dddfdafe8e32f7e1e843b533120e0,2024-11-21T07:41:02.670000
+CVE-2023-20271,0,1,80117310a910ddc84d34d9321b8692e2e5930dd8aae052b4b0d41df1fd3fe7f2,2024-11-21T07:41:02.800000
+CVE-2023-20272,0,1,80caed5c7e246668a0e8f7738337736ace30a43551ac7232877b11c8541cd4e5,2024-11-21T07:41:02.977000
+CVE-2023-20273,0,1,c3ddfd980f435e6e342c135d043e3f77236850782bc3de296b52171f519eb307,2024-11-21T07:41:03.110000
+CVE-2023-20274,0,1,75edd0ceb612ccd9577294f4cf61beb18460ef9c4bcf3ff217e08a8b5e60f666,2024-11-21T07:41:03.290000
+CVE-2023-20275,0,1,ddf062ac6104930af03aec540250c90629eb40fe8fe574e062da78e3a29120e4,2024-11-21T07:41:03.457000
CVE-2023-2028,0,0,00f00ec076519f60ec3a14fda25fc78efbb9be545e3b50e543dbb3888c72ffeb,2024-11-21T07:57:47.387000
CVE-2023-2029,0,0,ba151be9f7ae969a9a0157d785c56b6d4e8ae0a9b47c84689d2c70b4386089ad,2024-11-21T07:57:47.487000
CVE-2023-2030,0,0,4a4f70c8d39484ef1d071a6ed8a04127994a4513b0213c0996e2b3291edde9d1,2024-11-21T07:57:47.593000
@@ -220358,7 +220358,7 @@ CVE-2023-26279,0,0,0dae59632a7aa7602a3a1c44d959c2ed446293f68410630857f0af167d03a
CVE-2023-2628,0,0,a127feda23f94ec166b82162c441ecee8e9b763e62e681ffeec191d420959835,2024-11-21T07:58:57.757000
CVE-2023-26280,0,0,9eb49e9e884e82caa81c4c1e4227f0c0967bc8fcc5b65ee0a7f282788b861fbc,2025-01-16T16:13:59.293000
CVE-2023-26281,0,0,f3f4eb9633b31505daba5bcb31c9d75424b7d803a48d93cf2f87c6db01f4ce03,2024-11-21T07:51:03.130000
-CVE-2023-26282,0,0,9464f1793118ca865e8f94983ce3bf61757ee8b06758311da832b161a884052f,2024-11-21T07:51:03.267000
+CVE-2023-26282,0,1,80be72db319d10debb9a18b7014444e4efec675c4054bbbf351f5a025a411e03,2024-11-21T07:51:03.267000
CVE-2023-26283,0,0,978993372bc04c5a66aee6f7d9ec549d78f89453bba1d98e88caa4435826488c,2024-11-21T07:51:03.373000
CVE-2023-26284,0,0,59709fb6f770e0d499af6d6df6228394b6a04e76524cf8a1fe2581bfbff35aa6,2024-11-21T07:51:03.490000
CVE-2023-26285,0,0,dd27a9a331fc5522e467a7c254a2cf2950ffff517a5988e3bb65c65a3b0252b6,2024-11-21T07:51:03.600000
@@ -222188,7 +222188,7 @@ CVE-2023-28507,0,0,22a104259aca37459be6603394f9e2524454870e2f2422af5c456268ab7d0
CVE-2023-28508,0,0,c2e45e9f637d398bbf5369775f4ddab8686b240d35b965a8540d3402da80356d,2024-11-21T07:55:15.517000
CVE-2023-28509,0,0,d23369db7fab213305e6bcfd0b61e4ffebc8e0434cf6bcc1004e350f64272b38,2024-11-21T07:55:15.647000
CVE-2023-2851,0,0,7ba8f792fc3fa0e1fc66d41c7883c06fdc98e4bafbc9a4acc1539e5335343ae7,2024-11-21T07:59:25.183000
-CVE-2023-28512,0,0,905bced05b9d94f9fb010dd76a64efd044b1e18c0d17f0fe01c0e785c0fcf691,2024-11-21T07:55:15.773000
+CVE-2023-28512,0,1,db5c92b0725850ad8777d3ce8e0953afda273f3e638b4f62c56b72c5a983b196,2024-11-21T07:55:15.773000
CVE-2023-28513,0,0,e9946240011947f68ba84203cd8006bb612def46b47525afd835dea122138d0a,2024-11-21T07:55:15.897000
CVE-2023-28514,0,0,cd4136cacd314150419772de032429e96c9c80cb63cb7edbb8650a7546b78f76,2024-11-21T07:55:16.053000
CVE-2023-28517,0,0,1f707c4ca4e076ea1927682820bdb187d539b7fcb6432bd306345959db1a9734,2025-01-22T18:40:49.833000
@@ -225096,7 +225096,7 @@ CVE-2023-32337,0,0,a01aa4bebe213f4039138b0eb96d92b230dde3cc35fc23554071c5e999080
CVE-2023-32338,0,0,8dea335f01070595c6ec59a7d3c53171b9fb9fbff328f6bd4351efdab3957994,2024-11-21T08:03:08.703000
CVE-2023-32339,0,0,56e5e5057225790255da00ffb858773794e855ce0038d02d9bcb9ad217984b74,2024-11-21T08:03:08.850000
CVE-2023-3234,0,0,0fa1466c040a99f283157c1612582306e508dc74f92b2c2292dbaa2cbe7e5460,2024-11-21T08:16:45.660000
-CVE-2023-32340,0,0,386536a5a85d8841fd61525185d65435624bdec8b8c0bd82793594960def6d63,2025-01-23T03:15:08.290000
+CVE-2023-32340,0,1,9bb7ed20be8de76dcb2a3cc94e1090a56d563825747161a96953fb797bfa68c4,2025-01-23T03:15:08.290000
CVE-2023-32341,0,0,d38b9ebaa1a9c25da70da76b9a1cefb48113ed83bfcd9e5e955b91cec0095134,2024-11-21T08:03:08.987000
CVE-2023-32342,0,0,cb80571e1573bb95c1a667148885dc625dc45a1310587dac64fa32bf27bd1e3f,2024-11-21T08:03:09.113000
CVE-2023-32344,0,0,7bc8b77d90defd48ee4bb5a1611c065560350060add6413ed28dc594c84c459d,2024-12-17T18:55:38.543000
@@ -226885,7 +226885,7 @@ CVE-2023-34409,0,0,51b8f8415923aa1a2d243bed75d521d233228a55cbd4b9792f4bc8dabc1d5
CVE-2023-3441,0,0,96b660e59290fe52a56318b9a285eab78ceae8ef9c8a005c225e8ea7c212c771,2024-12-12T20:00:32.067000
CVE-2023-34410,0,0,1d7d5688d71675c11284e2a1b91e0cd8515bec350db0e80fc1004491d1abeaf8,2025-01-08T17:15:13.230000
CVE-2023-34411,0,0,34c8d062997ae3b47c58838bbcf9aac00b306a4cc3d40982334f497f864649eb,2025-01-08T17:15:13.440000
-CVE-2023-34412,0,0,dc3066873f81c3b290881008a495f6e8ee73f7e1678d180ffb4595c75c40b9e8,2024-11-21T08:07:11.220000
+CVE-2023-34412,0,1,dd481a2e21ad726c98407324956ecb01f848eafff69cfc7da1bfd24f7c5550a7,2024-11-21T08:07:11.220000
CVE-2023-34414,0,0,2e47aa793fd3bb698529d060d811524b96a751b86f2db2ca5b70349f2d005a30,2024-11-21T08:07:11.377000
CVE-2023-34415,0,0,6753e9e0a9ab4a67f20e6c568ec249e22c913693eb05aa8cac8891831c42d394,2024-11-21T08:07:11.510000
CVE-2023-34416,0,0,89ef935e56bc4b232d393dbc3a2a6764aa457e55edc3cf3e9e6022add156f7e1,2024-11-21T08:07:11.630000
@@ -226964,7 +226964,7 @@ CVE-2023-3451,0,0,32f58b09567a7d88bb63f1df853d18f9b629c04c12fd741d157d0d24756305
CVE-2023-3452,0,0,28f0545ccc04eef3fa7c913815f02bee168c95cb39295128eafd1af11d1108a2,2024-11-21T08:17:17.887000
CVE-2023-3453,0,0,4e7b4620c80804e47e84fa5c408ea299c159847661af0bb3988fb617d1d34f28,2024-11-21T08:17:18.023000
CVE-2023-34537,0,0,b070ccf52e6a5ffea666040a13a395fcb374f7bf3fb9c9ba3d347eca0b6d953b,2024-11-21T08:07:21.400000
-CVE-2023-3454,0,0,cbc48a4cf716332d060712fa2eddc2a46080a53be433e96f323682f73050212a,2024-11-21T08:17:18.173000
+CVE-2023-3454,0,1,c3fb08bc8bb4dfaa374003d97b8946449a88d896652e362d9f1383e5350fd697,2024-11-21T08:17:18.173000
CVE-2023-34540,0,0,8473fbca114ddbb501b0e011d548d8ccbadc39107b282883f4a6dcc5f6d9da91,2024-11-21T08:07:21.550000
CVE-2023-34541,0,0,b8f6ab4a3569aa026e87d3cc4c56488fc44c7864c4d77df50b05512dd6282168,2024-12-09T22:15:21.740000
CVE-2023-34545,0,0,d149765cd47581e0c018a5fef10b99dc070520c9f77eca7e784a8ee9b0bf2e00,2024-11-21T08:07:21.850000
@@ -227581,7 +227581,7 @@ CVE-2023-35716,0,0,0af535933dfa79ef98e20c93f2cfaba38c7ea5b7dc40349fbbc8c210bd1b3
CVE-2023-35717,0,0,eed5e041d86e7cf14ce88b8dfbb23be46ce919150930b9fb41c03629d45099d0,2024-11-21T08:08:33.980000
CVE-2023-35718,0,0,3b6ad6d240fffd2f0663ba9dd4dc43010412ddf8bb965c9381c1b8946cd75e90,2024-11-21T08:08:34.093000
CVE-2023-35719,0,0,a9cda21c99b0e6f756fcb8836e3016894ae2f67b8598cc1c520b7c0c7425ea15,2024-11-21T08:08:34.217000
-CVE-2023-3572,0,0,980040bbce763fe884b6be17e19bd63f311bfc64b19ed84ca86bfbaff056e41a,2024-11-21T08:17:34.587000
+CVE-2023-3572,0,1,b857e57dfd6e1e3459debfccc0bcccf3419711f739796225c18de423b3223ed8,2024-11-21T08:17:34.587000
CVE-2023-35720,0,0,e48a245311cab40e1cfe9ae3f2dfdb3dd22bbc0b3968554f2310b6c9e95d26e8,2024-11-21T08:08:34.357000
CVE-2023-35721,0,0,16d6f0ef8a5339f677b5ecc107201310c86768c4113147d53f1594f233c63b2a,2024-11-21T08:08:34.530000
CVE-2023-35722,0,0,0a74388fdf0b93cb9d55cb4f84a46c1f53e80eafb448fcad1739db4267d7edfc,2025-01-03T17:04:45.290000
@@ -228628,31 +228628,31 @@ CVE-2023-36992,0,0,bae724c6dfb236c635b6c832140deece61ed44b28909df77601ad61a13545
CVE-2023-36993,0,0,4c68873d179dc3a675980898a346ad69636c26c4f9df0ac27f53753d08294f3a,2024-11-21T08:11:00.330000
CVE-2023-36994,0,0,fff5298c4b24c0e5b92702a6a1f0446ede67f47123caeb5ebf984e5560e8128b,2024-11-21T08:11:00.477000
CVE-2023-36995,0,0,4e2506dc3314d1c8d3c5decfa5d038b5e536042093e975b150aa20e381792196,2024-11-21T08:11:00.623000
-CVE-2023-36998,0,0,050b9f23b70793da5e6e28022f4c8d3392ca43208afa94d6ffb9fbdeae85b81e,2025-01-22T15:15:09.647000
+CVE-2023-36998,0,1,12c332839a42b454726347abcd48046d6ed5c2035bbc23b68e1288628dbcb622,2025-01-22T15:15:09.647000
CVE-2023-3700,0,0,453d92acb238b2558e7054067437e7c096de953ccf1cbfc4152eb94511be7528,2024-11-21T08:17:52.480000
-CVE-2023-37002,0,0,25a391d4521fb6bdd9d80d99be497c908addf8c4b798245a4c9e587f83a6be23,2025-01-22T15:15:09.757000
-CVE-2023-37003,0,0,4301da6b77cb5320623c97a28fe26ef828f1db5df4973cb167fa2e225860c979,2025-01-22T15:15:09.867000
-CVE-2023-37004,0,0,30e8fe7c552e6758164f070c8b643b24b902af67a8b9e8cd849e8a4f72955726,2025-01-22T15:15:09.970000
-CVE-2023-37005,0,0,478ae349c18f582d14de24715ebb5f027fb6be6eeddda8339b13e9c8d04ce8bb,2025-01-22T15:15:10.067000
-CVE-2023-37006,0,0,063a55b6b1bf43281e94c46ed0d82b423221a672228b49bdf1d3d3bed52647bb,2025-01-22T15:15:10.170000
-CVE-2023-37007,0,0,5ce5ba5e9dac8d99801c83070ac97392594170709b9934ff29d77e9f73d1d630,2025-01-22T15:15:10.270000
-CVE-2023-37008,0,0,b5b34e6c507cc9f89e55577f268c80e136445bde2f6fcb7e8d59d27a9d56362b,2025-01-22T15:15:10.373000
-CVE-2023-37009,0,0,f8e9160fbb8cada09b213f677944db678dd2061f88cbd70ecd20c63690336331,2025-01-22T15:15:10.473000
+CVE-2023-37002,0,1,eab4e88066629c0a8e5c1ab311b13942fcecd4616c08827686ca784a44050506,2025-01-22T15:15:09.757000
+CVE-2023-37003,0,1,cacf3e78e3dee0350ac93bfc6a1395adc99ab168ae46336d2952e4b0bbcf6d7f,2025-01-22T15:15:09.867000
+CVE-2023-37004,0,1,1df2b48be4d756ee7507e3fd3d9e25c5efdc6dc4f3bbec16805bc7c872a882ba,2025-01-22T15:15:09.970000
+CVE-2023-37005,0,1,c0ff9ba23fffadec58ff0f25731e8c471a2bd159f41d4edc5b724eb64cba4343,2025-01-22T15:15:10.067000
+CVE-2023-37006,0,1,053a9a073b7bf6fba39169fe89766057e067a1af40f3e39ac50d11ce0265d6c3,2025-01-22T15:15:10.170000
+CVE-2023-37007,0,1,d0ca3e9bbe320bc80ad5bd87cbbad4eda4d4b53ffef2c09847c584abc6d3b5d2,2025-01-22T15:15:10.270000
+CVE-2023-37008,0,1,4dca7cab7dac0c40e8327e37f4e041a3a0b8931669d521ca804153a13cb584b3,2025-01-22T15:15:10.373000
+CVE-2023-37009,0,1,18d24884d9132039abfaa223ee03462fa1937ea3a31362f84b6df04ad6cd62ce,2025-01-22T15:15:10.473000
CVE-2023-3701,0,0,50c60623ffa7110070b51e3894d8b141f7b048bb1af146331e25664835932475,2024-11-21T08:17:52.610000
-CVE-2023-37010,0,0,db91e1583a7f4cae891cc62de0b0abd853c64237b0f7f7ed598bfa2ae11ffa41,2025-01-22T15:15:10.580000
-CVE-2023-37011,0,0,10e4db718a9fd96024e307839707ef8a5501fb4943d8cfe86e523e9692779a34,2025-01-22T15:15:10.683000
-CVE-2023-37012,0,0,c9df3caf42232b255846ddb0fc112463b3fa15dade422f6bb3673ba7652ee282,2025-01-22T15:15:10.783000
+CVE-2023-37010,0,1,5fa9e5eec855d0c9d60db4b551cc5c8b945859a72ba91f164bbcf756e5b6709e,2025-01-22T15:15:10.580000
+CVE-2023-37011,0,1,1ffc20299139e890c69678834f0ddb07e6753b755f745032c0f8766f6027d6ec,2025-01-22T15:15:10.683000
+CVE-2023-37012,0,1,f990d23d0c499906ffea5f3f92707328ce5d15074d14291721426f97632696fd,2025-01-22T15:15:10.783000
CVE-2023-37013,0,0,77cc3e1f4fbca40dbe484004bc6dcfcfe35adb5942ae9200d894529eefa1540e,2025-01-23T22:15:12.007000
CVE-2023-37014,0,0,9ba68854eeaa55275918210ab87201f24858744a2381ff8d22c919791e7bacbe,2025-01-23T15:15:09.280000
-CVE-2023-37015,0,0,66eb73469b3ba78b3bab79aeac6ed24ca4d3de4a641b6c180ec19e903039dadd,2025-01-22T15:15:11.100000
-CVE-2023-37016,0,0,8868c5ec313c58fd9423256b4570250ee9f085e38d76a3597757ad99b53b6e56,2025-01-22T15:15:11.207000
-CVE-2023-37017,0,0,09eaf3964fab7bf3f6f67e22c338e5bc8cc4a602f57d2893183367b5e452ca70,2025-01-22T15:15:11.310000
-CVE-2023-37018,0,0,16b59946c2b55bcdd78347ea3af7a79bb463313e51f4116dfefc754730e013f0,2025-01-22T15:15:11.410000
-CVE-2023-37019,0,0,edf7b6a2ad715042569c565919367bd3db4e10905fae667123c59f9a1a2cc26f,2025-01-22T15:15:11.510000
-CVE-2023-37020,0,0,0f1e5e8c95316ef7094cc0c60501980062de896244304caffad32e9e769abbb4,2025-01-22T15:15:11.613000
-CVE-2023-37021,0,0,1a830f672e29163e83b8a89e2600a4e2a6422ba8cde7f2035d8b0ba2ff721a0f,2025-01-22T15:15:11.710000
+CVE-2023-37015,0,1,a0a2bf020f37afa1548272e3ef41577eee25dfc5d4537336d4a815249b707531,2025-01-22T15:15:11.100000
+CVE-2023-37016,0,1,1df26ca9849c5dcc591d486b8116d2b856ee0b96ab48fe11b86fed906bf79c9c,2025-01-22T15:15:11.207000
+CVE-2023-37017,0,1,e545209fc1e5519ef97aed7b3ebb227fad7583857d8667b7796d908f6f206049,2025-01-22T15:15:11.310000
+CVE-2023-37018,0,1,0a3f9197143d87a8210745ec6e4a5702dea2b634247b1259389464238b0bdf7b,2025-01-22T15:15:11.410000
+CVE-2023-37019,0,1,0de8002cbf0636d1fc6348bbafbeb989d923f82785f6c13619d1cc2c6aa8e984,2025-01-22T15:15:11.510000
+CVE-2023-37020,0,1,f1840f89e938e0afe20f2947e4d602c341850a5ddd8db2069a0e4d05df4a6854,2025-01-22T15:15:11.613000
+CVE-2023-37021,0,1,4d35cca94723829717ba593d610cc57c5cccc2cb356c977e2b1d3b70ccc4999d,2025-01-22T15:15:11.710000
CVE-2023-37022,0,0,aedcce2e3948d9e6b223e349b30f7261b3b7eaa1e064e6b74fdd21c05bf44159,2025-01-23T15:15:09.430000
-CVE-2023-37023,0,0,bd9dc31664e38e12575d80c55c419ca71263921e4ea4349c3dd7d6e3d5ec000b,2025-01-22T15:15:11.913000
+CVE-2023-37023,0,1,6552713c656cfeaebbaf6d906c0f1cee872e121c8b5c978455931419637e58d0,2025-01-22T15:15:11.913000
CVE-2023-37024,0,0,5eeed4d71df26f0ae2a2d8d0f35a6c04bcb7ae42f8650935a0d2e0cfae236ab6,2025-01-23T19:15:09.950000
CVE-2023-37025,0,0,33bc7b812664e9275c3bfb23b6d53cbfefd4368ab864d63e6acddf0e1a53b97d,2025-01-23T18:15:28.283000
CVE-2023-37026,0,0,61e46660d78cf955ae84e8e6591d596e7e87156504936378555fdb48a5003b9e,2025-01-23T18:15:28.537000
@@ -228665,7 +228665,7 @@ CVE-2023-37031,0,0,f0d7880be47a0bdc007926f700ea044205aa9928cd41294ef7001b483319f
CVE-2023-37032,0,0,8b8922dcd71ecb8b425e1dfc4bf8bbb7a1dbe316cd27ad3ad50498f3f8bf37dd,2025-01-23T16:15:33.330000
CVE-2023-37033,0,0,4db8ad3f8e6728c3d15836be10f6360497aa1df772993e1c5d4dfd11f3aab46b,2025-01-23T15:15:09.563000
CVE-2023-37034,0,0,38d182e9f94879cb8c5f7da72a38ac329e0d75c2005fa615a24482ec99de6c38,2025-01-23T15:15:09.733000
-CVE-2023-37035,0,0,4b68b44e876ecbdfd20bbceeb836e386c8998e840e614841a322bd28cdb9d09d,2025-01-22T15:15:12.017000
+CVE-2023-37035,0,1,6fd1f0fcf8e0fd7b5fff245ed675e79d0e28b5c9d56b589ad47f9b27426f565f,2025-01-22T15:15:12.017000
CVE-2023-37036,0,0,7b044d6b00bb8c83972eb84000e52bee4a603f4babcdded881506f5f011d4c2d,2025-01-23T15:15:09.900000
CVE-2023-37037,0,0,9b78ba5003cb4600383ef5e7cfc493eaefd64562755e3bf28cbf306a4cb8255e,2025-01-23T15:15:10.080000
CVE-2023-37038,0,0,9d0a6382f383319197691e25a01c33a6820c5d57040a89dab40b512e7eb14fd8,2025-01-23T15:15:10.270000
@@ -229221,7 +229221,7 @@ CVE-2023-3777,0,0,0a5c2b434a475c2596be8b4702119daa0a7ff2510c52387329cf5dfe36d76f
CVE-2023-37770,0,0,7948ebb82ba3c4d501e76d04f7c9ea141d2f29ba331509dc38f3c4014869bfca,2024-11-21T08:12:14.713000
CVE-2023-37771,0,0,571558f975810ad1a18c92729d1baa9a885ba229675f8f8b36f1f00c20f4c1f3,2024-11-21T08:12:14.883000
CVE-2023-37772,0,0,2c9825453789b3704f1bb92537d3ff9be391ef8f2d0a8addbff93cf7755fdb75,2024-11-21T08:12:15.037000
-CVE-2023-37777,0,0,ecc5bfc8cd2f15d8ff3fd934a591faf29440078db0df1fcd53aedf6e48abd8d2,2025-01-22T16:15:28.187000
+CVE-2023-37777,0,1,6d86032fc11ad84e3a0b8bec0976f9f529866494d872e0432175a57a11013c48,2025-01-22T16:15:28.187000
CVE-2023-37781,0,0,ae5c172e9edc2c48161a9b4a9bf7d2a65636bca3c57570aa1aea9bb200fe229a,2024-11-21T08:12:15.200000
CVE-2023-37785,0,0,345093fae305f6a074a713d36337118217321babdb63a765da58ba8c38347cd5,2024-11-21T08:12:15.373000
CVE-2023-37786,0,0,d10df939f6a5298afb57ae4aecf763187ccb1b069623eba9c34ce09272783198,2024-11-21T08:12:15.553000
@@ -229269,7 +229269,7 @@ CVE-2023-3785,0,0,236def26baee8f6f57feb30dcde265cb92f72eb462462b38eeea94bad6fc72
CVE-2023-37850,0,0,286f1040431ced574b387f41a41491559bf26e9d7489f67627c6f4fa01e1d843,2023-11-07T04:17:07.920000
CVE-2023-37855,0,0,91366fd76ea1c105279d57da67c36719cc08ab92cbf99b5e60051e93e0493ae1,2024-11-21T08:12:19.570000
CVE-2023-37856,0,0,dff49b41f8f0beaaad83b9a577044bae2bfe4734f3bf6c954c6f3a88d7297f31,2024-11-21T08:12:19.720000
-CVE-2023-37857,0,0,b5178991fff702f2a974b7169009d068309632bbff517caeeb86f33c27b59ea3,2024-11-21T08:12:19.860000
+CVE-2023-37857,0,1,b7599702e65473a69e78cc134e0ac74bb4511adae65a4e4c5d5bb391133bd96c,2024-11-21T08:12:19.860000
CVE-2023-37858,0,0,901bbbc0380d43542b531486c2208e368f1dfc73dde11f12ac9ad7fa573f9338,2024-11-21T08:12:20.017000
CVE-2023-37859,0,0,33a186fde0470e0f92a860c71661601781af8b685672fe3c7822de94f043faa2,2024-11-21T08:12:20.167000
CVE-2023-3786,0,0,0b2f6d3f51bed9e1744f03c33b33b2a76543c0b9b21410e7f5b08e7b03e33ffe,2024-11-21T08:18:03.587000
@@ -229416,7 +229416,7 @@ CVE-2023-37995,0,0,722a547e161bd39f568817cb79f3ffcc6d88a438ddfe771a76aa7107660fd
CVE-2023-37996,0,0,5d427fade6100ed5f6a51560c6d0f0a052d625a1a3e14f4aa06234e98584669f,2024-11-21T08:12:39.803000
CVE-2023-37997,0,0,74a1c9653492570c008a0fcaa7a7efddde5e5fb9e2ea76c505a1ec1452eeb25e,2024-11-21T08:12:39.937000
CVE-2023-37998,0,0,6bc762272f462b610f86f4c8a2ca49b82ac8f8ae49dd3de9fa4cd088d91d8355,2024-11-21T08:12:40.090000
-CVE-2023-37999,0,0,452c281671f807c100d47cfcbf6948f38e28868e87acdf3f9e9b1ce06e676f66,2024-11-21T08:12:40.240000
+CVE-2023-37999,0,1,93d623346899a06d75f99f3e4e93236fa3cffbcca17d3cb1591ac1cae76879c8,2024-11-21T08:12:40.240000
CVE-2023-3800,0,0,73ed089a2278cdca2efbee55304f008fe72506b35e03a3215a741266c253e1df,2024-11-21T08:18:05.670000
CVE-2023-38000,0,0,f302fe2aa8512cea31c20b4a7c58e253de1ffdc3d1be669ab1e2dc42df677e67,2024-11-21T08:12:40.353000
CVE-2023-38001,0,0,59813676e2bd0245d088be67c0815fc9c634dbc57499cf0f051205236327d85f,2024-11-21T08:12:40.490000
@@ -231157,7 +231157,7 @@ CVE-2023-40104,0,0,b3b514fe5c5c90b3fd96bac202151426665bbebe93179878299d731c6e6b4
CVE-2023-40105,0,0,99fd48612470195f9c737f8096f56e0b77060289b39968dc0daaaa2383cd197e,2024-12-13T21:27:40.283000
CVE-2023-40106,0,0,dd94462a1cc0ecff68b893d4c352cb3561e324fb5a1af15f4a62c1d3f1ffd1ae,2024-12-13T21:20:34.837000
CVE-2023-40107,0,0,cbfd670fe9974a0bf3a935ebb0bae79e008c2a28e1b9f32ec59b9835bda81f23,2024-12-13T21:02:17.693000
-CVE-2023-40108,0,0,b3d5696bcd70abefbcbdd8ddd700527a7c8bb13e3841ab7fbf03dc56df9cb92b,2025-01-22T18:15:18.543000
+CVE-2023-40108,0,1,f706ba774811a0ec084bb9c21bb47a892d73e60378cd6a2ac8fbffe073ae723a,2025-01-22T18:15:18.543000
CVE-2023-40109,0,0,e4c3773b4535f894e1bed277d66aa40ca3b1bf83f795fb073a350f209e5bc2e6,2024-12-16T19:34:04.793000
CVE-2023-4011,0,0,77e08656072a7907646eb543cf48d306dfce66e36e2f14dc48363fc6a8adc3bd,2024-11-21T08:34:13.530000
CVE-2023-40110,0,0,1796eb5c3e87a14dd825f784ac43182d16eca1e76a01978818fdb769a3e34ac4,2024-12-13T20:56:22.790000
@@ -231181,7 +231181,7 @@ CVE-2023-40129,0,0,4dd2dc96251ed33b386eb4bf36dbfc8133a1074a121884b0e6efce82c7a5e
CVE-2023-4013,0,0,81a1814e2860a38e869ad893f24750f16a5c3c351a223a2f4d9b78f2288f9401,2024-11-21T08:34:13.823000
CVE-2023-40130,0,0,73b56fd8bff33c5840eb190bfaff74aa5558771cf7c7277c3137c479f8e1a15c,2024-11-21T08:18:50.080000
CVE-2023-40131,0,0,d299c70704211e34f2f3042a44222799ffd6635ecde64b088a69c82024d8983d,2024-11-21T08:18:50.290000
-CVE-2023-40132,0,0,630d3930bddb4a4dfbb670dce807881ff3c8178d51b34e6a7aff2da256f3e8ae,2025-01-22T18:15:18.680000
+CVE-2023-40132,0,1,acbe00ad536d2df495a21ded09b6cb4bb08cc16f2f8e89159dd4d01f8b48df4e,2025-01-22T18:15:18.680000
CVE-2023-40133,0,0,6fefa73958d1b96e5e74a310e07325347682bbd679ff777a3ac2fea0d81edadd,2024-11-21T08:18:50.427000
CVE-2023-40134,0,0,1263dafd545707095a277b1240280c9a53625615d402a194a4fa0dfe676e5495,2024-11-21T08:18:50.570000
CVE-2023-40135,0,0,963325a31ec9de455dea7fe77240c283d9fc28ae4b896f1eb180d999fadb14b7,2024-11-21T08:18:50.693000
@@ -235348,7 +235348,7 @@ CVE-2023-45904,0,0,612e817769b4a38ca02708161a3315fbeb0d49ae393adb31a64ec32219f55
CVE-2023-45905,0,0,bbf5944d13d1487d0206bc85365f8b896682ddcfe823d56306b3a7640c7db799,2024-11-21T08:27:36.160000
CVE-2023-45906,0,0,ba094bac8f04accf636c7578f3673b96068dbf1bb023b6132e2deb0116d3c7fa,2024-11-21T08:27:36.310000
CVE-2023-45907,0,0,a4502038835ae6ef87ed23d836aab387da6b122768f937336ced232f1f36aef9,2024-11-21T08:27:36.457000
-CVE-2023-45908,0,0,37736c6771a9c05e977fac8f0905da752b4d2f6aaaa08bb8f6fe9087be1b6061,2025-01-21T20:15:30.607000
+CVE-2023-45908,0,1,cb20f33fd2c89a34b7e68bd5875a52f91203faeb6314cace267102365c8763a2,2025-01-21T20:15:30.607000
CVE-2023-45909,0,0,7a6f6c7ffcc444e3dd0f2d61b446410f185da28b1966be5cf2b89bf9c5b416d3,2024-11-21T08:27:36.603000
CVE-2023-4591,0,0,3d0884727bd3f602eced12e2167bdcf876daa1650bb6cfae9f8cf781bedd9897,2024-11-21T08:35:30.037000
CVE-2023-45911,0,0,75d404fefb91546f034b28af5969b087179953c6381cc4805542b308c9e9c3ec,2025-01-09T20:15:34.043000
@@ -235729,7 +235729,7 @@ CVE-2023-46394,0,0,15a2be266882ce5c7996f06599828c0429faf292e647b8839449e98272146
CVE-2023-46396,0,0,bb4fd6eafc5e30939b253d28c3e2b3924dc41a01338566a01d248def0231db21,2024-11-21T08:28:26.537000
CVE-2023-4640,0,0,ed87e5f4e497c402b3df3f1a5218899f4400a69977f8db760ed9d0e7a2c9a13b,2024-11-21T08:35:35.697000
CVE-2023-46400,0,0,16632e3aaa7622a4553afaf2c4a313997dabfa16c487987445350e26eecc26ff,2025-01-24T20:15:31.663000
-CVE-2023-46401,0,0,5986305e338b5b9accdc9359b0cf901126f4bcad7f721d1a3678ea3f0c7415ff,2025-01-23T22:15:12.307000
+CVE-2023-46401,0,1,0cfc3a8154b17e8d3276bbe11e64ed15250e11c114ed46f9e2c4965acb27c9a8,2025-01-23T22:15:12.307000
CVE-2023-46402,0,0,aaa3ff7a897d6cf9e33dcc787240acf7209bc0069ec2781169e797f5937f8833,2024-11-21T08:28:26.690000
CVE-2023-46404,0,0,244272f7668dd1e0a9457a738847246c64d5c278ad9643e94570e35173b604fc,2024-11-21T08:28:26.833000
CVE-2023-46407,0,0,d6e8ac167c972268f692c22c875fda8a199da0dab23b54b173e8a98d59734b57,2024-11-21T08:28:27.067000
@@ -238638,7 +238638,7 @@ CVE-2023-50305,0,0,dabf8219efdb3dd68521f2a5ca58bceb1db63561a1224bc65ebbdd00bf414
CVE-2023-50306,0,0,b237375bcefaa2a9e278f6692dc4b5969b17da8653a3531dfc9515e32d74e626,2024-11-21T08:36:49.733000
CVE-2023-50307,0,0,54dcb069378ef7ce7cf1e378a429a1153c8dcdc770f8f93df646b7251911e08b,2024-11-21T08:36:49.880000
CVE-2023-50308,0,0,f0daddfcaa94c1b3e4528be72f010ad2604cb01fd116e7d24805892a037010cf,2024-11-21T08:36:50.020000
-CVE-2023-50309,0,0,581ed8858edefcd68a85c476456a592e6a57d02dbe286de5b4e45bd8aa80959c,2025-01-23T03:15:08.573000
+CVE-2023-50309,0,1,d4d9bdf4d5406c752b31017905c24ade26a8b71555e6d024baeb841f574e438a,2025-01-23T03:15:08.573000
CVE-2023-5031,0,0,c15eb3bf24311ad5ba1ff97f455276e30339f2370acbcbb30160cc9662735c68,2024-11-21T08:40:55.833000
CVE-2023-50310,0,0,ee63583edc72c7bb2dd2fbd446b3bacc51b87b3209164901da3eca6b0c813dde,2024-11-05T16:40:57.533000
CVE-2023-50311,0,0,bfcc9d072f5a2d893dd33392360fe36f36ce6d9885fb951e98233624c4f9ba2b,2024-11-21T08:36:50.263000
@@ -238835,13 +238835,13 @@ CVE-2023-5073,0,0,7d71ac792beffad129b6350807e38c7d8f8ddacaba696435302e5bae1be66e
CVE-2023-50730,0,0,0b81dabbaea2030a10546a068f88fa7a8c85de100e619ebcf8c54546de8fce16,2024-11-21T08:37:13.820000
CVE-2023-50731,0,0,e8ce37d2f1c63019ac2045c127eb8ef5aa07e55e6ab2e05a04d430d7aa718ad1,2024-11-21T08:37:13.950000
CVE-2023-50732,0,0,3479d6bb13f7a8e95ed74954d98b80483f32ab59a42f2ddab4322c8ace5aac52,2024-11-21T08:37:14.083000
-CVE-2023-50733,0,0,f1c9441c3be3abd8e446703a8d2de7ee18961ad15fb25f7d0efd6dad865b9d23,2025-01-21T22:15:10.743000
+CVE-2023-50733,0,1,f24fb41df9f871038ea42b40ff3dce40337089622e1bc015eb24f3021d75630a,2025-01-21T22:15:10.743000
CVE-2023-50734,0,0,2aab95fd5c588a3dc97b1bd0a6b2f20bfd2911d8fb04a876cbd8fcebb2dd7e91,2024-11-21T08:37:14.233000
CVE-2023-50735,0,0,4f96b135e945b5004f8ce6581b61e59142e00708b1dc6f868a054e729d12e204,2024-11-21T08:37:14.423000
CVE-2023-50736,0,0,5bcd601c09b61694b00e59d37ca8d9fc78245869949bc1916a3889b4eccad37c,2024-11-21T08:37:14.603000
CVE-2023-50737,0,0,2bae2fb365dc9f4ed02a348f748b5179e20f499009864d44daab198cff17a8d2,2024-11-21T08:37:14.780000
-CVE-2023-50738,0,0,71aa9283b563ec923ff9cc7ef837204e01cd197d5ac11b19caa3497cc58614eb,2025-01-17T22:15:28.167000
-CVE-2023-50739,0,0,2ce2c0614d8245bab425ef149b20374d5ab25caeb33b58546c8efb262e007d5b,2025-01-18T00:15:25.600000
+CVE-2023-50738,0,1,e87957b686fe04cf7a10685a4df4e13385a5739ef3fda25d46f4aac29009d97b,2025-01-17T22:15:28.167000
+CVE-2023-50739,0,1,f7f1d1f1879f73d1fd32b944ab83db4e6c0327fa572875972a159370ee6c0c47,2025-01-18T00:15:25.600000
CVE-2023-5074,0,0,a5fd6d88eec362223e3b4064e6992870a2bdcd5526e9e7c259a1985148840ea2,2024-11-21T08:41:00.840000
CVE-2023-50740,0,0,3525405993410ebfa59c0e2c13f4f85218736bc8538411d8d86d3e99bcb5ebdc,2024-11-21T08:37:14.957000
CVE-2023-50743,0,0,25f6602c5a61a6d7f3ce7f009407eeeb62215a68ef3b38bc4c354b94bd825007,2024-11-21T08:37:15.150000
@@ -240291,7 +240291,7 @@ CVE-2023-52642,0,0,05d60fedf578d1ba56385f5513e46bbdf0600669e68de5121a528e674c343
CVE-2023-52643,0,0,d50d31e5bb6a9cdf07b3e088fc3b5fda79f9ea816bd8b6d8c44559eebb408f0c,2025-01-14T14:58:40.580000
CVE-2023-52644,0,0,c34c6ce67f7bd1744e5ffb2bc7e1ab174b24b6c795ada11f0160dd6a25188de3,2024-11-21T08:40:16.333000
CVE-2023-52645,0,0,b7243e0650448847f32080e14db91cf203d54c57d7b28acbe818fbd2b13c53f4,2024-11-21T08:40:16.490000
-CVE-2023-52646,0,0,139aee8a121c8d7a2a15bab8da8b6e42f6d1800d9c6146dd3e1fb095deeb5cfc,2024-11-21T08:40:16.687000
+CVE-2023-52646,0,1,eaf388e3abe85a3c7ccf557c92f94f7e76ed266a116245f38a3cdb551dfcdb03,2024-11-21T08:40:16.687000
CVE-2023-52647,0,0,e2976bef8bc92e0adeadd89937440a86e758817f278db22054eaa69f951695d6,2024-11-21T08:40:16.850000
CVE-2023-52648,0,0,bf327e16fd314087311880b9907320568dc951df7031e7a2a98e2b4c960ed3dc,2024-11-21T08:40:16.977000
CVE-2023-52649,0,0,a99e2d150671082fa4d3c37d35f0947b0eb528b79f37ab81343c41664ce0ad3a,2024-12-23T19:14:57.980000
@@ -240595,7 +240595,7 @@ CVE-2023-5292,0,0,053cd6bdc838ec8e58310af23c6d4e5e608dfbec5f41437eefe04e4d3a1ca9
CVE-2023-52920,0,0,d3f31fdc95b4a67b67ed332bc8577a6c103a6cc3b65bec1715fea71c281674f5,2025-01-09T16:15:35.587000
CVE-2023-52921,0,0,db860eb263bc8c980e12e17429a087c45572e4c4d54038923230b290b9052477,2024-12-11T15:15:07.307000
CVE-2023-52922,0,0,0257647582c181cfc3c3426a0282aca59fe8801f0370a44aec6ca0f680b7f26b,2024-12-11T15:15:07.500000
-CVE-2023-52923,0,0,d6676aab56cdab922319c7ca254c484f6213bbcaf2adfcccdb688c34a513a679,2025-01-20T11:15:07.670000
+CVE-2023-52923,0,1,d09409de037f5df89cd9d952de36693819046c41079eff92af40562f1bb761b3,2025-01-20T11:15:07.670000
CVE-2023-5293,0,0,9b2cea486d7a7f42acc94669701d574bcf5844db44201d8d4650d958cfdded9f,2024-11-21T08:41:28.027000
CVE-2023-5294,0,0,3f7d530e6cf9dcdc204d5438393ed0130f08c33ee485c7c9370aa028c9815d14,2024-11-21T08:41:28.180000
CVE-2023-52943,0,0,f6ed6bafa02a627fd8483d5444c81747a611e4e8a768a1c76804639f41008cc5,2024-12-04T07:15:04.033000
@@ -241246,7 +241246,7 @@ CVE-2023-5969,0,0,773fdd47607b4a01a767b928797ecf3d0a5187901f659ebff3170d23818565
CVE-2023-5970,0,0,7683508ce13fe6f967201c3a789b457ca40205592f9c376139c6b1f69a3326fc,2024-11-21T08:42:53.403000
CVE-2023-5971,0,0,b88e617ac1955e3d48bd1cb01bc606e278b5d91c64984b1f8bc0bff1e4507045,2024-11-21T08:42:53.540000
CVE-2023-5972,0,0,106505593d4de6b570cc5eafbeeda3a7aa756b3a3cf0a559a021c5850e3ee835,2024-11-21T08:42:53.720000
-CVE-2023-5973,0,0,8acd013a5e9657af52068d32d9a91c361a7f64b851e5aa8a6a0735fddc375156,2024-11-21T08:42:53.873000
+CVE-2023-5973,0,1,048c886c128acbdefd9a6d2332af73cc33ef39b903c99fcc661f7e2d81380eaf,2024-11-21T08:42:53.873000
CVE-2023-5974,0,0,835821d292015e2ca60f54b34d38d29ed89b59f1c11e39713433a141b7d12855,2024-11-21T08:42:54.007000
CVE-2023-5975,0,0,b56a246c98fac375cab8751ff48a315972c3342da763344fdac97fed7ee72374,2024-11-21T08:42:54.140000
CVE-2023-5976,0,0,e6e6a27dc26b16d5de07fada633526b7a51ebe0ea6e6c1ef95a77c7ea1f507d1,2024-11-21T08:42:54.267000
@@ -241465,7 +241465,7 @@ CVE-2023-6210,0,0,02c9290708fde95949b1ca151f139c7c9b43a2860ff7716fb8f4c4c67f645c
CVE-2023-6211,0,0,d92c46b01202ad02f1d65f49f37de45debc7ccbd90a49f886a3603bf953d5a13,2024-11-21T08:43:22.777000
CVE-2023-6212,0,0,e9cd8209e77de729765985589d614d64d3b20aad5238302e5d7e04d402eddb50,2024-11-21T08:43:22.893000
CVE-2023-6213,0,0,69c26f6e0d3c3ec1f9e8e383df5c98725fada25a86e2146248059d9eac690155,2024-11-21T08:43:23.027000
-CVE-2023-6214,0,0,53ad36a7df2899f2a0eef5ead0dfc933fcca65b576a0529da78dc37c579afa7a,2024-11-21T08:43:23.150000
+CVE-2023-6214,0,1,5f6bcb33c9de70af0acb1d90a2ef6271d5e6b5583c9dbad33ee4a121cbafe090,2024-11-21T08:43:23.150000
CVE-2023-6217,0,0,9810ecf6c59d7329e827cb6762f25b7a286bf752aa3fb224aef47a9922d524e1,2024-11-21T08:43:23.267000
CVE-2023-6218,0,0,6b136ed227e6d9a106a997506bd0ab6d1193880266b28ad779eecdafbfc0d320,2024-11-21T08:43:23.390000
CVE-2023-6219,0,0,234e803ae44ea198b1c5cbc3f7d287ef9f28d26cb17bcbe2e74596b21799789c,2024-11-21T08:43:23.520000
@@ -241921,10 +241921,10 @@ CVE-2023-6741,0,0,7ac19f7e84a70e9596789a467d841f0553e4532ecc2ea584df7260767b7656
CVE-2023-6742,0,0,7843dc0b39cfb9e6165b9d63f0f6748701d6b72cede7b59e9b198274889b13ee,2024-11-21T08:44:27.837000
CVE-2023-6743,0,0,a06d6f675e29830cd8389ab90168304cad706dcbff6721ffcdf46ca0d0ad5622,2024-11-21T08:44:27.970000
CVE-2023-6744,0,0,a643f5007d899070921b19df2522416ac8401e0e05f88aab48ebc6ee58ed04b3,2024-11-21T08:44:28.100000
-CVE-2023-6745,0,0,c2df4cdafbf74897e9eea24dcbefbab3bccb43b78e892bae5f48a918042a6fdc,2024-11-21T08:44:28.240000
+CVE-2023-6745,0,1,aaa7161a14d3e4ff6585fdf3be15a91e68e8adc54f9ec87da31897f22b63aa11,2024-11-21T08:44:28.240000
CVE-2023-6746,0,0,d7ff11dddecae5300361052ebb0e500954674a7d62babed59f4ffc80fac1fb33,2024-12-16T19:07:48.603000
CVE-2023-6747,0,0,f1b669eb92efe8ef444d542bea6bd00978e396921b41145289be2c45bbd151e0,2024-11-21T08:44:28.527000
-CVE-2023-6748,0,0,cf38ea04efb873027a42aa1c020e6885f6acfab0c6fff5502b7b09f2d51be788,2024-11-21T08:44:28.660000
+CVE-2023-6748,0,1,40606f31bb69cae9456db83bc0bc3576f8e3df16af9055e3496a4d7ef9b82189,2024-11-21T08:44:28.660000
CVE-2023-6749,0,0,9da0575760139ef01fcf0bf904b0253c34ea0a5aa6121b2c61d0bb63077d6036,2025-01-22T17:12:49.580000
CVE-2023-6750,0,0,0731099e46b55b099a2949fcf23ba656a8917e5327c54b7717c585f2be95763d,2024-11-21T08:44:28.897000
CVE-2023-6751,0,0,e93947d6b47731dde44d9809da9debbbc8b65086c446b53936e2f3f76b8718ba,2024-11-21T08:44:29.090000
@@ -242948,7 +242948,7 @@ CVE-2024-0588,0,0,6f8550ff909ae4c7da15a920587063371148ea1a9a4ef35a0da365c3198c11
CVE-2024-0589,0,0,226846ac6698efb5192efce79755aeadfa69697e910a3ae32d7b46e4b008d86b,2024-11-21T08:46:57.360000
CVE-2024-0590,0,0,de2ecff39d8bb7ecc0e43dccf38abeb5bc3d8547e89ecead319caf442de4085d,2024-11-21T08:46:57.473000
CVE-2024-0591,0,0,52dda023b7b05c739dd2046d19609a0e4d1a73487ce454f27c5b6908af32935e,2024-11-21T08:46:57.577000
-CVE-2024-0592,0,0,1a17724febf8153342670e1a2ae0c506c1f9d961e5fb4933bcc637f6677b5b7a,2024-11-21T08:46:57.690000
+CVE-2024-0592,0,1,26fa4db326cba8f700c0d7b4ae70996dd20d72f88488f65aafcff009c85af9b9,2024-11-21T08:46:57.690000
CVE-2024-0593,0,0,1a5e11ac44ddf4f96546959fc91f930a25c2c52f87916f443b1c3a00a49e6f61,2024-11-21T08:46:57.807000
CVE-2024-0594,0,0,3780c91feb02e94bec74828d45d759c566a8f297ea89f091b3830ef305b2485d,2024-11-21T08:46:57.910000
CVE-2024-0595,0,0,7f902afc77c6d28ea6274f98e27811635fbf921773d4cf114e15624387c5266d,2024-11-21T08:46:58.040000
@@ -242982,7 +242982,7 @@ CVE-2024-0623,0,0,dd5f29435e15338dc985fb5551595a6e34d69131f116d209222d2e5d483144
CVE-2024-0624,0,0,09352035dee59fe02f2fbab48ef8ce9be3c361adfb9ff0690caac0c5912794a6,2024-11-21T08:47:01.550000
CVE-2024-0625,0,0,0f09f7c276d34454abd591658f545becb0e46f1af09747d32b03759c48232183,2024-11-21T08:47:01.680000
CVE-2024-0626,0,0,01df7b1b2a002997b9e19ef51bd514d6c01339d31a943ec963717f479444ba14,2024-11-21T08:47:01.817000
-CVE-2024-0627,0,0,976432e2cabdd1fe19b0d4cdec8436f682029983b59261a458bbe08bbda39658,2024-11-21T08:47:01.937000
+CVE-2024-0627,0,1,3ddd1ab7f937685af2ef5be8b92af17dafb724143bd626c04f624210d7608ceb,2024-11-21T08:47:01.937000
CVE-2024-0628,0,0,8ddf1de100d6820ae2b3b806ae7a32820e6fcef24642699cc6c2ccbcdd5c0c69,2024-11-21T08:47:02.070000
CVE-2024-0629,0,0,890f8077502aee99e57ca27cce7459ccc1c21d7cbaffb14a7e1e11687e700ed0,2024-11-21T08:47:02.213000
CVE-2024-0630,0,0,2663b350751ce9ebf5c0f17a1cc23e1c10552e7d8a74b760a95d01e80d1e3621,2024-11-21T08:47:02.340000
@@ -243002,7 +243002,7 @@ CVE-2024-0649,0,0,b8359e40734f463c4abf5c664ce297862b1c993880f5d4dbf60eed5afa0a81
CVE-2024-0650,0,0,5c8eba3e3d35439a98d0236d7421381f1be9f49d5777756ff70f0b70f7784617,2024-11-21T08:47:04.347000
CVE-2024-0651,0,0,d95725e7e66aa319711700b03dac0074a49d1925d8a757db014fbe4403b50b23,2024-11-21T08:47:04.500000
CVE-2024-0652,0,0,195ef012775115613d9039d9144603ecee045545d38386a198ff35872771f25c,2024-11-21T08:47:04.660000
-CVE-2024-0653,0,0,073a64e57afc76f54a8e0fa7ac1708e03d27044b080d61a5e8efcf009d4df0cb,2024-11-21T08:47:04.787000
+CVE-2024-0653,0,1,51845d977401db0a3d03b464375ca482a4cd9bc2564fb92ef482448cbe700ff8,2024-11-21T08:47:04.787000
CVE-2024-0654,0,0,f5c9c0cc6adb45c4ee4ccb32c94a93e5b4b752ebb5ff8e90536da2b68b43d7c6,2024-11-21T08:47:04.907000
CVE-2024-0655,0,0,b45ce71828f08de5e906828c46c08f690573b8e416f2e010774f774288516f19,2024-11-21T08:47:05.057000
CVE-2024-0656,0,0,1d7ce5c43cd9bcc89c56bed945f1189546264eb91e03c04ac0c18e510b9c3c36,2024-11-21T08:47:05.200000
@@ -243538,7 +243538,7 @@ CVE-2024-10254,0,0,eaf01fd830974bcaeaf405ec25eb4671f609e67342ab924a6a313bdba73cf
CVE-2024-10256,0,0,29011b036240961b8ae4367653e58f0c2ddb629014386486c8df2e427bfd8d66,2024-12-10T19:15:19.280000
CVE-2024-1026,0,0,0f9b1aa5e37c54243b836a0d53fe73affd52a3dfc7b9905f3b939894e2718221,2024-11-21T08:49:37.720000
CVE-2024-10260,0,0,e6c334e16a39fd3c100b04ab1842263fced68926fe345b87138c06e988e1ffb5,2024-11-19T21:20:51.707000
-CVE-2024-10261,0,0,c8ada3ff1a57362b6be9d96267e04fe7b15ba4d3c5c61c4cc5194a505b362908,2024-11-12T13:56:24.513000
+CVE-2024-10261,0,1,c51f6309ce61ef2c4da98bfa928a84e998b15266e15c5b84e96ad28592f7b580,2024-11-12T13:56:24.513000
CVE-2024-10262,0,0,add19e2fcba0a76b4f55d50a9b33f08613e1e5f1357baaf037df077d6af3f079,2024-11-18T17:11:17.393000
CVE-2024-10263,0,0,abb589a024b0b89accc3172395633ef61ac017b2b3496ca69d055e1d2f622685,2024-11-08T15:59:41.633000
CVE-2024-10265,0,0,a1409991e3c1a34c8be494233016f11fca3e0685babfe23ddc7087c470ce46d1,2024-11-14T15:17:47.947000
@@ -243655,7 +243655,7 @@ CVE-2024-1040,0,0,0cf971725042aa5f584fe060b54c880b9831934b517dc5a41c0a4db005bb07
CVE-2024-10400,0,0,d10eac0c14c2aab70360c507793101d484e08be5c30dd80a0293df79fcc3c93a,2025-01-23T17:01:14.073000
CVE-2024-10401,0,0,98699d6fa898cdfb3f15470619245cee1d067345348d71b83edf212f320fd87d,2025-01-16T02:15:26.770000
CVE-2024-10402,0,0,3bec3b03f6b37743b2963c176dfcef56ddbbfd70980eeed7f59bf60f8417973e,2024-10-28T13:58:09.230000
-CVE-2024-10403,0,0,959dc138610d6ad2c1d126ef9cb21459a598e94cf8d488cf1201a4cf13ecfaa2,2024-11-21T13:57:24.187000
+CVE-2024-10403,0,1,b1d5f4b2163a64675363bd6bd4278ec16e48d3fc23395a5c72d67b0e9b0925db,2024-11-21T13:57:24.187000
CVE-2024-10406,0,0,3ea80fa9309bbe01bfc18fc28a58ebc2cd4384a2976470d5a0c7d74740e10fea,2024-10-29T20:48:36.967000
CVE-2024-10407,0,0,c0767597cc1c9f2445774d0945d82cd1deb05bfba27e932afc95a08efb60df7c,2024-10-29T20:47:53.667000
CVE-2024-10408,0,0,bdf278858219e19c5b454fd4cbba3d2031672da6a8bc18e5cf1bab48edd4d3ed,2024-10-29T20:44:07.630000
@@ -243786,7 +243786,7 @@ CVE-2024-10535,0,0,496e3e4073abe2adad8b54d5ee745431f58893a256de2e44bb2f056357efc
CVE-2024-10536,0,0,a823233131559d6dd2b341d836be9135c9879264a324c21b5db4b4eee461a226,2025-01-07T06:15:13.920000
CVE-2024-10537,0,0,245f407c71543e9ed1f1e8091a091327bb8b8bb7a6ad44fab60dad856af50407,2024-11-23T04:15:07.663000
CVE-2024-10538,0,0,61014a490bb67ac6333227cbe080cbc3323afad1485db0781083c911c48fb77e,2024-11-14T13:27:00.400000
-CVE-2024-10539,0,0,9a4f67ef017614f89188e01bf3ed02ae77558734c83485471ada19d4c77299b6,2025-01-23T14:15:25.097000
+CVE-2024-10539,0,1,0089a09b07d871a4db2a934565dffebf3d935a2f4638c664a18fa5c91d8a5744,2025-01-23T14:15:25.097000
CVE-2024-1054,0,0,94b651608db3d30d3daebf6e295a99b6cb748f5b340c93c3e226c28c09fa8fa8,2024-11-21T08:49:41.570000
CVE-2024-10540,0,0,45dc62d2a6882ed78eb940dad2c8292ca30098100a55bb2bb2d5e31ef03fa351,2024-11-04T13:18:27.017000
CVE-2024-10541,0,0,17e645860588c5290ea1de09ebbe30e3ee704356357c444bb1176f1b7d6de69a,2025-01-07T21:15:11.490000
@@ -244025,7 +244025,7 @@ CVE-2024-10806,0,0,162e15a67fa141ed2db44782527e6c16f19298bb03856f5d65229979965f0
CVE-2024-10807,0,0,a6f2e4fdec339a864eb204696fdf3f397ad1e6becec15c9bf4a48ebe0b1cff3e,2024-11-06T15:07:09.930000
CVE-2024-10808,0,0,b834da74949831a7f897c4183bba04078cfb4d8a1c3e61f6ae2ad410f56b2040,2024-11-06T15:14:13.607000
CVE-2024-10809,0,0,51f78f7a787236cbad7aac7472721fb340d976c70790233c6cce2c1b1b05b8b6,2024-11-06T15:14:48.213000
-CVE-2024-1081,0,0,4e0bb84bfbb515e8e6662d2f875a9bb7899411cc135025881bd47d9f276345cc,2024-11-21T08:49:45.313000
+CVE-2024-1081,0,1,6f825b50075130da6615f33f9f6db42b5cd23196e9ad12fb3eb239c1db737213,2024-11-21T08:49:45.313000
CVE-2024-10810,0,0,462940493f0b1c5b280616ee9b6e4ca0acc2fe73d901d9b38b41895de26ba591,2024-11-06T15:16:12.497000
CVE-2024-10811,0,0,9cec89f437a4b723f090709af71ee0e26adae8172b2b35922482b026f5b73ed6,2025-01-14T17:15:14.007000
CVE-2024-10813,0,0,8f0d87c8561d66a428b124b04ac3dd7eb7202f93dd365239b75e2107b61a0c57,2024-11-23T04:15:07.800000
@@ -244050,7 +244050,7 @@ CVE-2024-10841,0,0,8edc5f4a34195255877236191bce2bc34566b30a238e2312976868449be76
CVE-2024-10842,0,0,6a1bf2d708af31633adcaf31229d3f756d0a973aee6bc08d09ef2355ecb0b242,2024-11-06T22:43:19.327000
CVE-2024-10844,0,0,f5f4e0d5b5f81450d4b277cd5f34ac79ece27a20b2ef20dabc17527d2440f7d7,2024-11-06T22:38:13.800000
CVE-2024-10845,0,0,931b9473d8b3acaeed75a4b2f9ecbf4fef9f369e659ecb3385eb6146d49362ab,2024-11-06T22:38:03.347000
-CVE-2024-10846,0,0,50f0d1e1c10c36e5ba86ad33d7053f6a353b8e049a40315f22cdde598cf088e3,2025-01-23T16:15:33.533000
+CVE-2024-10846,0,1,adbdfdb091c30393b6913f81c331a44c1331a4a41abb35d44b12909f384f27bb,2025-01-23T16:15:33.533000
CVE-2024-10848,0,0,7f61f0b085abc016c8998a0cf5b48d8ec8995f00d20acc55868e83ab5fdbbc8f,2024-12-05T10:31:39.120000
CVE-2024-10849,0,0,4d7b3a7dc2e3927a966dcad144508a97f5cd8dc242ff6022b96218bb7cdf6329,2024-12-06T09:15:05.350000
CVE-2024-1085,0,0,7c8525867b2d9a7f82bb7c58a74cd9cc5d38a56649870114c80343a2ce238539,2024-11-21T08:49:45.880000
@@ -244121,12 +244121,12 @@ CVE-2024-10924,0,0,f1198492ea5d0448c480cfb52c449c77b28f46a760324baad7abe4da889f1
CVE-2024-10926,0,0,ad47f219103ae4ebd92db7592078769652c8133d266b35358f61dcfb9dc4e1ed,2024-11-08T19:01:25.633000
CVE-2024-10927,0,0,f09c2725d755f5937d35809a87d5ada4fd8d3d09c9d48fcc66b16a3fa883071d,2024-11-22T19:14:48.190000
CVE-2024-10928,0,0,862f1a88452be3b22edef7e2642809ba572832547c6da90647052695aaf77de0,2024-11-22T19:10:19.290000
-CVE-2024-10929,0,0,c339a09b7418a4b1af0ff6406ebd0b49b561f995c2406671fd12a529fe0453f7,2025-01-22T16:15:28.790000
+CVE-2024-10929,0,1,8f27a00763dcda42451193fe125e6c2a037f4476d93d8cf8f5d94d4a2590a312,2025-01-22T16:15:28.790000
CVE-2024-1093,0,0,ac60ea90a5bdbcab92bbb148d0d6ccb636fae604fade2bd9337658c1f747481a,2024-12-23T17:03:58.370000
CVE-2024-10932,0,0,28109702b795f9356a11af2c3727eebea623b98c280555fa2778753a6b0d3d2f,2025-01-04T08:15:05.713000
CVE-2024-10933,0,0,04454997e745a68880991c602cc8325b99e3c53905740538bda66aba85b8cef1,2024-12-05T20:15:21.417000
CVE-2024-10934,0,0,6dae70f2d9b047711f71d589675cbcb98ce87c40154b32c6e0f536ad5d783b6a,2024-11-18T17:11:56.587000
-CVE-2024-10936,0,0,de8af6a775c50d72f8c199dd8eb29b8f02cebf1221dd577bf12872aaafb8fa80,2025-01-21T09:15:06.850000
+CVE-2024-10936,0,1,5de9014562750929bcf1bff80900666b665f40260cb77934203c78872f04157b,2025-01-21T09:15:06.850000
CVE-2024-10937,0,0,f3549007a000819e9c2b92d84627c6a8f0950225e9fa8a067012e5b6f0eb9781,2024-12-05T09:15:04.377000
CVE-2024-10939,0,0,51b8ed7e89cb6cce38a6a9e5f66ac395ad176f1b332ff5472d247565035a8f52,2024-12-16T19:15:06.400000
CVE-2024-1094,0,0,4f6b2c2580413352eb02acf345a730d51f35d7640cec3afbef03e4f7e048ad8b,2024-11-21T08:49:46.967000
@@ -244304,7 +244304,7 @@ CVE-2024-11143,0,0,686e238b18cb6e6b1a398192b44515340df593fe49d6838dfcc7892698b7f
CVE-2024-11144,0,0,af8503925b3320c38a284c525e2190ceb29e6df01cd47b8de568143dcfdf0384,2024-12-16T17:15:07.327000
CVE-2024-11145,0,0,49d8db8e9affdc9bd928055d93b635f15e5703854689b5be5f582242400a9150,2024-11-26T20:15:25.270000
CVE-2024-11146,0,0,03df03d658627474a36249425d41efadae55984076e597c786ac86aa7f191e03,2025-01-17T07:15:25.503000
-CVE-2024-11147,0,0,d338e28e0ab4e92e21c062f5e1309d6099a9fb1404212c983b8d88ba637d103c,2025-01-23T17:15:12.860000
+CVE-2024-11147,0,1,4186baa8d041b470c5a06f8c77a235cfca9d9107699e3be6b083315ee35859a5,2025-01-23T17:15:12.860000
CVE-2024-11148,0,0,98721a67b15a1bf200a0df48032e3c1b10f0381f700111d548ae742962375902,2024-12-05T20:15:21.577000
CVE-2024-11149,0,0,bed9c80af9d2c073bb9f97513f448d6c4275a45d3277b166d6da853b66ab77cf,2024-12-06T02:15:18.127000
CVE-2024-1115,0,0,dd875c679e12a582e34ee954cd3620e780335d232c345f8362745b6ecc6a1bb8,2024-11-21T08:49:49.887000
@@ -244318,7 +244318,7 @@ CVE-2024-11159,0,0,8afad29dc7b40793fcd69369c055be5c54db43acf2a2aa9e2c3ac35746277
CVE-2024-1116,0,0,7d8d96f7c323e069e605409b474b2bd18744f4c3487afdd2599b3edaac1467cd,2024-11-21T08:49:50.050000
CVE-2024-11160,0,0,c2a00c83ebfc94083c99410ffbf76862f5cddeb9d6f2530e0ed9a430c75b3087,2024-11-27T18:15:08.620000
CVE-2024-11165,0,0,e750ee00d78406bda0cb37b4e8b38fcef6ccccfb2c8db0152ac7acfbe3dd03cb,2024-11-21T17:15:10.473000
-CVE-2024-11166,0,0,458663d3732bf51af63bd60b42b83200c4080aeb59d0b60726c498e198a15f0b,2025-01-22T19:15:09.890000
+CVE-2024-11166,0,1,d5a4ac0b55d02fb6350e15b01a9cde091049ddb1bba974efcbdafccedc02f461,2025-01-22T19:15:09.890000
CVE-2024-11168,0,0,8169fd215bcbd6260178c6a13b38e8eb1d50895ab7f745f9981de2f6f5fa7e20,2025-01-06T18:15:17.900000
CVE-2024-1117,0,0,19261231554ceecd0ba30965370c2c4af2e300ee2811f4fe1892361a4588b729,2024-11-21T08:49:50.233000
CVE-2024-11175,0,0,8236837ce7f29fdf946d96e1c922fbdf823c1f335a15dfb3cce120bf0d1fb628,2024-11-15T22:50:48.817000
@@ -244360,14 +244360,14 @@ CVE-2024-11213,0,0,733d387bcd2a89a3baf6e6af87e9925096408112067fd16bf967badff3e2e
CVE-2024-11214,0,0,8f15fb853ae573991dd8377f3fdb07743acb2a14953115059875124aefd71a4f,2024-11-19T15:38:59.060000
CVE-2024-11215,0,0,649934bde3315408f935571e43aced9541face2e1cac41750a3378db1c35aaf3,2024-11-15T13:58:08.913000
CVE-2024-11217,0,0,cb24a1bdb987ee2ebd888113abdd2cecfb9cb2fe9a3dca74044179030beb620c,2024-11-18T17:11:56.587000
-CVE-2024-11218,0,0,661bb1bb499a94a43782169452a6410d4d7bdeb3a8a79402f9cf8376eefb47c8,2025-01-22T05:15:08.903000
+CVE-2024-11218,0,1,989c7a35bcc1f9c84f1e50869ac2b8329ff02c0698b99794e740172308fcc9eb,2025-01-22T05:15:08.903000
CVE-2024-11219,0,0,e0425cf1f1ca40cc6d95ef04e03e17b5776d09d72a88fcf5abbcb2ac00f59570,2024-11-27T06:15:18.110000
CVE-2024-1122,0,0,4a647161edb6d6dbac08921722ee9f0f3f3f764af2a44d6cd56ac17a7d3d92e5,2024-11-21T08:49:50.943000
CVE-2024-11220,0,0,2bacf5e02725323b27ba9cab9bc5f331ae5ef28bd238022ab9e1ae19b09e4fbc,2025-01-23T16:54:24.970000
CVE-2024-11223,0,0,d75d95a61775726397d8c97460b74fd5ed2ab0335df998c9281fea9bc6ff2b7b,2024-12-30T18:15:08.090000
CVE-2024-11224,0,0,2cdc35f700571377d770dfe6d7a5c097f3055ab07c10acabf750a1174f4e07dd,2024-11-19T21:57:32.967000
CVE-2024-11225,0,0,49e01dccad3ee4a4adc9a23405324c84c815ee3ae2fa63f77a3607812451f386,2024-11-22T06:15:19.283000
-CVE-2024-11226,0,0,afa1db73b8c2b090bf173ef7f76fb5cfcf845d8150d5606085134788e0c8b187,2025-01-21T11:15:08.063000
+CVE-2024-11226,0,1,a17acc4c63ef7eae97bc907b842359e052127e1d37c67bf10403e65fc943ca31,2025-01-21T11:15:08.063000
CVE-2024-11227,0,0,4429f46befcca636641488313efda0ce9e85d610d1a8222594e7b609e2557ec7,2024-11-23T10:15:04.083000
CVE-2024-11228,0,0,ea3ea506f494760971365e8cc08e4c50cc9e1b3e56f38ea31b32e4e82646f717,2024-11-23T12:15:18.577000
CVE-2024-11229,0,0,f216e4e055884628872bc9827bd59bcb71e0c27eff667134ca7f40729f0e7955,2024-11-23T12:15:18.983000
@@ -244422,7 +244422,7 @@ CVE-2024-11287,0,0,2b855907be08ce91eab121bf5a3c8cc1d79ede49cf458848842325e314d36
CVE-2024-11289,0,0,1d2443a1a9242c04e29818ad13875ac1c58e80e7866f1501dec4b2d1a8559f61,2024-12-06T10:15:05.450000
CVE-2024-1129,0,0,6172b693dff43dce89b309e8fb2fb924d24a685a24573723261b8e6649270d9f,2025-01-15T17:27:54.877000
CVE-2024-11290,0,0,ab57176650cc50c586193b71c3243e9600beb71b8fde58a74d5423838f5c5c16,2025-01-07T05:15:11.117000
-CVE-2024-11291,0,0,537e55bae46f427a177aa5b81903c72ee380b93be35511ba50b6e055b27fd914,2024-12-18T12:15:08.710000
+CVE-2024-11291,0,1,4ee53e96a9c91047a49f81e80d0a8085b44f7d785d6e7494b6a1322c661efbb5,2024-12-18T12:15:08.710000
CVE-2024-11292,0,0,44d76ae9b7e309446be6c076fee918f16faf12f6eba1bd4aed88a2108eee73db,2024-12-06T09:15:05.993000
CVE-2024-11293,0,0,963e5cd86fd8964150efb764dabf7f60f1898cb3eb1113839b414494aefc5068,2024-12-04T08:15:06.343000
CVE-2024-11294,0,0,db8f0d0eb379d5b4c1577b3532340b8b4a9bea79795bc10cc5d37031c79603b0,2024-12-17T09:15:05.193000
@@ -245016,14 +245016,14 @@ CVE-2024-11916,0,0,17cc1576783bac64a1ea783d61b5743105d0ea45a1a64d569e9cb4896ade8
CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc06b,2024-11-28T06:15:08.347000
CVE-2024-1192,0,0,4521fc6ae268791ebd6da2ad80ce9552b7ae38c5833cb5098776b1906357f9a0,2025-01-08T14:35:22.633000
CVE-2024-11921,0,0,8d14fd5ac89466ae906ad741ca0367246b772d6837be889940ee25bf6694b61d,2024-12-27T19:15:07.850000
-CVE-2024-11923,0,0,222112550412a40b2a359fd603fe290ad602e0df85801eef79cca6110881330b,2025-01-18T00:15:25.823000
+CVE-2024-11923,0,1,4d6a80e3f288fbe3ed1bd4a1feabd18394fd01e27066d6fff1deb3858322387f,2025-01-18T00:15:25.823000
CVE-2024-11925,0,0,77043a2dc07077ec38aa584033543217cc9fb39ce00751159aa83ba0aa54cc6b,2024-11-28T07:15:05.267000
CVE-2024-11926,0,0,12ad1d9fc49995c8eb92feee3b52ec9fafd14557b209a764d700401682560722,2024-12-18T12:15:09.107000
CVE-2024-11928,0,0,4eb81c3b991253e17b093831750d2f60d8030675796e16e7e29cc29429037a0b,2024-12-10T11:15:07.220000
CVE-2024-11929,0,0,66064f3187dd0089c2014740486de1ebf4355d01734d9e211585842b939a7710,2025-01-09T11:15:11.447000
CVE-2024-1193,0,0,dfff57fc9ce7a1dbebe4335de503e2f3e62619c8f53eebdea960e5ff40a71456,2024-11-21T08:50:00.427000
CVE-2024-11930,0,0,b88c23e4935b7f2e83397c155514381d560f1027e29cea30bba30e9bb3837da0,2025-01-04T09:15:05.880000
-CVE-2024-11931,0,0,d5dece3c18d15e15aa4a217db191f3bc9d5668e12f3e305df11068f8cafec908,2025-01-24T03:15:06.590000
+CVE-2024-11931,0,1,f7a6a876558f96b3470ccc024544f5c77310fc07000a85f04a366895996c7543,2025-01-24T03:15:06.590000
CVE-2024-11933,0,0,ff719b80c8b04b1955877df42e564ce90eac2c09e4f59c20e785f18a1e8804d6,2024-12-03T16:04:10.350000
CVE-2024-11934,0,0,744a72b875229eda9af00bf8cde59d77110b18803c7442665bf58299c9e4d643,2025-01-07T04:15:07.520000
CVE-2024-11935,0,0,f2a8d43d6f9999d38415d9b41f66ab77f7c4f7c94de5d0bc77beeed93d88f487,2024-12-04T13:15:05.910000
@@ -245089,7 +245089,7 @@ CVE-2024-12001,0,0,75bbf94d31b41f422ac1216beeda365d0b924dd232e408edb33262f11bb39
CVE-2024-12002,0,0,642bad4c124467ff4f581f355ddf310f5dadc994966ff22ccdf8e42852d0744f,2024-12-10T23:21:19.827000
CVE-2024-12003,0,0,14ef5c0679ec50bb5e5014c8e7b631b4905f5419df127668fd74fc6d22bcfff5,2024-12-06T09:15:07.630000
CVE-2024-12004,0,0,3dce40ab1e8f9f1b73bc9bad8477202dd665f9594517ea95d989e909aeed6010,2024-12-11T09:15:05.500000
-CVE-2024-12005,0,0,1766850016e926f572ec8194fc1a296e6bb93dfc6d5c258fb8f7de59daf4d89e,2025-01-21T10:15:07.423000
+CVE-2024-12005,0,1,967dd1780806ac9899656ec57151987c24edaf943b02424a511b4dd0f974b373,2025-01-21T10:15:07.423000
CVE-2024-12006,0,0,36f18b21148a0ee67abb3880ad49f0f8c4ad811090df2db1dbbfc11fa749b0af,2025-01-16T21:30:14.640000
CVE-2024-12007,0,0,8e607a1eddf324cb0db7978994624ff72f4892cd536259d2d33593eb53a4d98b,2024-12-11T03:16:24.473000
CVE-2024-12008,0,0,c6233d44f9ccc9833da766f9738aceabd906dd7310efd71abd35e6e9b4e35a50,2025-01-16T21:30:41.017000
@@ -245113,7 +245113,7 @@ CVE-2024-12034,0,0,9c507f78158cc030dfd314ae6dde1db490ceaf3d6dfd0f8120e54566524e4
CVE-2024-1204,0,0,52c83c0f4289636bc1afd18cb37875b782729e90167239cc1a53f532e5633e12,2024-11-21T08:50:02.033000
CVE-2024-12040,0,0,82ff661fdb988bbdc555297e0b0d4a5a42a6c3fde3cb51373bdf40b4e4dd0633,2024-12-12T06:15:22.947000
CVE-2024-12042,0,0,b4111492e93c9126d488ebee36a5b9ed9603a0917a66407440ec106154a8d6d8,2024-12-13T09:15:07.370000
-CVE-2024-12043,0,0,b4eaed6f95c8ae44c09933aeea9dad9ec753fa496f57caaaa1d13205d3f335a9,2025-01-23T11:15:09.147000
+CVE-2024-12043,0,1,b5054b9bd075d8c3ead66ca32a1ca052db466c35c1d720d53985644b65f0bbf4,2025-01-23T11:15:09.147000
CVE-2024-12045,0,0,129733e1a8172f1173193ada9167ebfa92abcbaf9c1c22ab7b433d2b7a56ea29,2025-01-08T08:15:24.683000
CVE-2024-12047,0,0,8440f971596bd55cff74a4ca413c1e3de197b2701820ea36a0544bdffdfe4e47,2025-01-04T08:15:06.157000
CVE-2024-12049,0,0,42e54420720f33c4562344743dcb6a33224d938ded42006d07df2fa0d0a23306,2025-01-07T05:15:14.147000
@@ -245130,17 +245130,17 @@ CVE-2024-12064,0,0,5bbffd5016c2c66c65f1cad07469a2c9304ddde32e6765225186e453c653a
CVE-2024-12066,0,0,b8b74ff74daf8006195a72a7866cbbcaf66d537ba02c482e9dfaf1c6e82963a9,2024-12-21T07:15:08.907000
CVE-2024-12067,0,0,1e92db34fdb6070fa741c6f0fc31b2e9eacb1c54540470e816605dc679b61bb9,2025-01-09T11:15:11.647000
CVE-2024-1207,0,0,7ca2a33c54192dfcfa7fe7f99bed16fbfa1215b4ac8ba5de485b890ce26af06c,2024-11-21T08:50:02.457000
-CVE-2024-12071,0,0,4892a0257a8e38f22462c3c3c3105d7a454d8d7732fd022887412193b58ae3a5,2025-01-18T04:15:06.690000
+CVE-2024-12071,0,1,7773df08bf117af1ddaaee700084b2910f6a68d7f25642ff336de1e992525428,2025-01-18T04:15:06.690000
CVE-2024-12072,0,0,a174c14ab62255e805373ea4d76cdd13bc3d9cbde3ba4a3927979f9e7d419d41,2024-12-12T06:15:23.383000
CVE-2024-12073,0,0,d6db2f0c4889187ac33654deef83fc5d0350b2e32b900f5fdab17885bff03ab5,2025-01-07T06:15:15.367000
CVE-2024-12076,0,0,09cc9c71a44db3ecb04699f23f6f75f22247a34f91ecdd6573179d59116b1771,2025-01-25T08:15:07.470000
CVE-2024-12077,0,0,fc51d2e5a9f19fe3fbf82780f8b1560f161bbef921778ce0625a7b0a0068014e,2025-01-07T08:15:24.927000
-CVE-2024-12078,0,0,4088dd1c2c05d60a24f1a819a01c0cfa96a5dfe52b030b67a32f35d955ab328d,2025-01-23T17:15:13.020000
-CVE-2024-12079,0,0,090e0137195ed25d8f3ba550604f0f5a6c991519a47d173d4220d34b145688d5,2025-01-23T17:15:13.187000
+CVE-2024-12078,0,1,ed5c286a2fd5f7a83094c6d940834245f6c8c565c30b87d20e0bf08247cb0385,2025-01-23T17:15:13.020000
+CVE-2024-12079,0,1,301562924271689dbbf595c94dafe06c29eb0c24d9afbe7bae87f18cd9fa7664,2025-01-23T17:15:13.187000
CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669a9,2024-11-21T08:50:02.590000
CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000
CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000
-CVE-2024-12084,0,0,fe5308a36c7239f4fe16284500a49c24cf51de42c57cef941d363a1b33c8f1f6,2025-01-15T15:15:10.537000
+CVE-2024-12084,0,1,85dd725fc2f0b24c79e999378b1f0199fad5fe5d164b31609c57a84bcb434c0d,2025-01-15T15:15:10.537000
CVE-2024-12085,0,0,f90fdedd785deac1ec9433cc23cc333178c884158ba18328a3296b52f5bce1e9,2025-01-23T06:15:26.843000
CVE-2024-12086,0,0,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000
CVE-2024-12087,0,0,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000
@@ -245158,7 +245158,7 @@ CVE-2024-1210,0,0,f5a9389cac94cbfcfa3f0d961d1ea27115bf7afa331ce2988db15dbaf2efdf
CVE-2024-12100,0,0,5d9bee140d619efc5bcb5724e98abb1747cc29824dfdae10a66de74940256d24,2024-12-24T06:15:32.830000
CVE-2024-12101,0,0,cf6330eb409e982923b4b0b78cc8d64ad396889b9513f5530cedf911c9fe2802,2024-12-03T16:15:20.910000
CVE-2024-12103,0,0,2ab2e8f87386f7081d0b465f2935a38be96d397e85c0b3ea2192a2941673c10d,2024-12-24T10:15:05.820000
-CVE-2024-12104,0,0,8d18a3955632d2f60b1f2d2d9e4277f093f000eeb635f2b8bad418cb70416321,2025-01-21T10:15:07.590000
+CVE-2024-12104,0,1,0d36b28173f2490a5f2c2374dcbff849d0f485f022a4491a6010382cd1220d27,2025-01-21T10:15:07.590000
CVE-2024-12105,0,0,652104878b1388acf2a862591967482514a748c9cb01d37e99c6359ca0cc3cb2,2025-01-08T14:15:25.310000
CVE-2024-12106,0,0,9e76ee608aca4c651df51a3d1911c7cd5490856624d29775a06f401fa9fe71c0,2025-01-06T16:54:14.560000
CVE-2024-12107,0,0,7da8659dc821ee4f071df4b42d3ae5a3881cc2b8cc55779739dc797df4a302eb,2024-12-04T11:15:05
@@ -245170,7 +245170,7 @@ CVE-2024-12113,0,0,a2a66f266036b7ea71880d2ff08289422a7a6df6ed51b0e1c2083cd935b5c
CVE-2024-12115,0,0,e6944683813361fa4999b92dbfb5849d2d0c20bc3f6186b671317bdf2839435d,2024-12-07T02:15:18.653000
CVE-2024-12116,0,0,4a2ceff80336184e35d0f53deaa453232f189dd136149b8e8e0cd03d307eb4c7,2025-01-11T08:15:24.867000
CVE-2024-12117,0,0,5c2bbc39fb5b6d6401c07a64822b77288aeec30fc2cbad0cd60835722d462264,2025-01-24T19:05:36.597000
-CVE-2024-12118,0,0,5b864c8aba94946082c0182c7625d7aeb008b9e7cdfe838bdb7fde83b8bd59ea,2025-01-23T12:15:26.890000
+CVE-2024-12118,0,1,ee58a49c25bedce06c1bf31023acaf9667a0932e3ac867ecf009da866e28dd62,2025-01-23T12:15:26.890000
CVE-2024-1212,0,0,c6c0d98b39fe69ac963e13ef16e93aec1a62abd1466de44e7788f638a4921cfa,2024-11-21T08:50:03.010000
CVE-2024-12121,0,0,03702b315699ac0a86731f33a73d0aefd1ecc16bf8d72dc7730c1bb362033b62,2024-12-19T02:15:22.610000
CVE-2024-12122,0,0,2085a2ad9176305a3af7546ac3413558f58015df8bc020f0278e8be2ceaa6a06,2025-01-09T11:15:11.860000
@@ -245381,7 +245381,7 @@ CVE-2024-12381,0,0,68b33f6b694aa45ef73ff06945e737e58ccb7b1c7ea2cfeb4d826136c48b3
CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2e87,2024-12-13T19:24:25.137000
CVE-2024-12383,0,0,19d74999b8b2bcff68543eb20d97d9dc601a395c1ae1c74bde3b1e01160ff201,2025-01-07T06:15:15.790000
CVE-2024-12384,0,0,f1312e19de6c9643af9162852b5499e7f57a4620a6ff1aef3fac1b374cc11e84,2025-01-07T06:15:15.983000
-CVE-2024-12385,0,0,bd27b8de2a8bf347b81c17ba55cbeae7a249079146eefd7019f3832fea0a17d9,2025-01-18T07:15:06.667000
+CVE-2024-12385,0,1,9021d1d140cebb7e5a9313d82a4b746bc2441f3dad59f522fa0786a000238683,2025-01-18T07:15:06.667000
CVE-2024-1239,0,0,e372911200db947b5d23f4c5c4ab976b80519731ada570ba51a10f8cbec0919a,2025-01-17T18:34:30.327000
CVE-2024-12393,0,0,f3d3d4aeb55dacdbdda4d3e84dd9efd2b47893e24f5c1cd3a62a5960b9b718f2,2024-12-11T17:15:14.657000
CVE-2024-12394,0,0,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000
@@ -245454,7 +245454,7 @@ CVE-2024-12473,0,0,206297f672a09c7681b3d1cbb4c368e1c0a3b16d868ed8e1c0293957039b0
CVE-2024-12474,0,0,2858a766a8bcbd6035c2be4131a605cddb7bb17f787cc233f6060efa0069c36f,2024-12-14T06:15:19.627000
CVE-2024-12475,0,0,ef161022c17bfffe57f2c972fe120be00d3d8c013647d5e0ab15260b6747ad0b,2025-01-04T12:15:24.650000
CVE-2024-12476,0,0,d1e3238933bb4ea639cee19cbb8d3bd8d52c9f543c18540cf4efbe3a21fc7ede,2025-01-17T10:15:07.013000
-CVE-2024-12477,0,0,a67845bf1b96fda9c0c7eac8d2e90e846f57dd386433f3ef9f80f2f39de013bd,2025-01-22T22:15:08.683000
+CVE-2024-12477,0,1,77e501c31b475709c4e0330856c425cf0cfbed223f3229c721e8ca37aee61e79,2025-01-22T22:15:08.683000
CVE-2024-12478,0,0,9740cd4243776bc4b985718131b1bfcc5e0a94370bd612144af92e9b380848b7,2024-12-16T11:15:04.890000
CVE-2024-12479,0,0,71e9962db709a4fb365c50c76ea2678c0c0be3cc10bb9fad5f99b55609975bac,2024-12-13T17:10:45.860000
CVE-2024-12480,0,0,278aebffcfd2515ae9c7caddd55ce9bc13fc09babf1329c96da477d94bc16635,2024-12-13T17:11:08.800000
@@ -245472,7 +245472,7 @@ CVE-2024-12490,0,0,1555e4125b1bbd18e44ad154504a390e80c730aff0638a2c04280c85da66d
CVE-2024-12491,0,0,d9590e8254ca45b54a5272db38ba7d701c7bc7244fa53f0252652da7575fb348,2025-01-09T11:15:13.520000
CVE-2024-12492,0,0,d916ae3db37806ef5451c78588e17d1a804f7c9a228c6c5f62bb3eeb89f366ac,2024-12-13T17:12:51.283000
CVE-2024-12493,0,0,6a46a6d759741902a525239333dcb837d21dd46b0a90d6c339d060007873320f,2025-01-09T11:15:13.727000
-CVE-2024-12494,0,0,160b327d54479c59bd0c50a5b1c92e659d8ad91ef599f9ebc5588cc94af877ba,2025-01-24T10:15:07.457000
+CVE-2024-12494,0,1,c8bc8922ba70a236276f5dc0cdab2b72b7e682500b97412070f07bc0234fbb01,2025-01-24T10:15:07.457000
CVE-2024-12495,0,0,14e632d2f81b312f37c9f019da64618a5fbe236ebe3efc373365c304ad48e27e,2025-01-07T07:15:27.370000
CVE-2024-12496,0,0,de7fd0f09c73ed509f4dfab83295b7a82e4ffb5b6ab1606f0959c5f84e1f552c,2025-01-09T11:15:13.937000
CVE-2024-12497,0,0,2fa5c57c56d5261d14e7efca34ea444e21df46aee84c2eede506aff4e7856847,2024-12-13T17:13:18.457000
@@ -245482,7 +245482,7 @@ CVE-2024-12500,0,0,a1bbc31d033f1807389d74301e364594f87125fc476a6f494352a12352507
CVE-2024-12501,0,0,099422e2bb99df2bd932e80161b3557d59136d70f204462f7c72270d679f0b8b,2024-12-14T06:15:19.770000
CVE-2024-12502,0,0,149382009077c4d5fee4128c2222d378e6f99e3bf1009b70c95ce07a51b9bcc1,2024-12-14T05:15:11.260000
CVE-2024-12503,0,0,e53e761e34d39e4e7df36516ec31d7b0a69f9ff2ae79d7b9e9b3c291572b84d0,2024-12-13T17:13:37.483000
-CVE-2024-12504,0,0,6bcd71145d5a4279a6d27808f9c2e8f22a34943367726a6c394cd9d68479ad10,2025-01-23T12:15:27.610000
+CVE-2024-12504,0,1,12084f5fc0fc13db2259b861f9f0f2ddf2df0dd43a761ba9d56c4c9a446e752d,2025-01-23T12:15:27.610000
CVE-2024-12505,0,0,e5acf98e9c67d608c9fbef2d18ccb211668f74dc94c88031b1d02e03c20366d3,2025-01-11T03:15:21.430000
CVE-2024-12506,0,0,ad7226add7d6241daa2317f2d019a78aac67392c449b8b39c4b609b26c120917,2024-12-20T07:15:11.940000
CVE-2024-12507,0,0,f098eff6e3ef53742e66474a6ac17418c00af6d9e6800445130b20da01af7c21,2024-12-24T05:15:06.627000
@@ -245622,7 +245622,7 @@ CVE-2024-12692,0,0,8b53a26a0cc42a23dac5c38dee635e34fe5ff00e8738afb8bd1ea85dad7db
CVE-2024-12693,0,0,c4f94ffd5f7d3b684a1f1d67fedf841d735528fd88fd85faafce8d3cf44b4de0,2025-01-06T15:15:10.593000
CVE-2024-12694,0,0,9800fbc5ca389434bdda7fa0de83799fcd1088c52cf84f2bdcf95dc149b6c72f,2025-01-03T14:15:23.560000
CVE-2024-12695,0,0,c12cc3a1c005ac4ce33f9efb358fc8de53ca6da21a9008edd22e7d591fcee580,2025-01-06T15:15:10.753000
-CVE-2024-12696,0,0,d1ead7033a6e2be6fb25030368ea579d6f3346dffe0927d781791c3283abc801,2025-01-18T07:15:08.117000
+CVE-2024-12696,0,1,70fc6f2c7a699788e28eaa4b7a2d945b659da6d876bd61c8868d6584ff12dc78,2025-01-18T07:15:08.117000
CVE-2024-12697,0,0,2459466c74ec5bec9acd976593eaf1864bd447490d29e2029863b77f5d045147,2024-12-21T07:15:09.587000
CVE-2024-12698,0,0,3d9cdcbe538ab50d5f6959e4225d81bf3f0e9f88aa4025e53f307853d2e0961c,2024-12-18T05:15:07.840000
CVE-2024-12699,0,0,f1f15e132ae79e83fce4e52614f661803aa78c84f19a0d2adbe2c9bee934bb41,2025-01-07T10:15:07.143000
@@ -245652,13 +245652,13 @@ CVE-2024-12741,0,0,c9f183fb88063863d511dd9a34a59e6fd50d2f3a53a8fd3b665d83eeabe6e
CVE-2024-12744,0,0,db2cef6174f0f203336fd1a602951ac160bef125d0730a8230a23f49ec8a87b4,2024-12-26T15:15:06.290000
CVE-2024-12745,0,0,d39132eefd07723f30fb227ef12fb8aaf3a83b250d0f3b28d89ab1e076f94541,2024-12-26T15:15:06.527000
CVE-2024-12746,0,0,df5c191123ddac7611e41b52ec167446638f37d1f7bfb5919f7163608ca92308,2024-12-26T15:15:06.650000
-CVE-2024-12747,0,0,228eec4044804b80ba1659144cc2ab4708bae3c1cb52274907fd158447626068,2025-01-14T22:15:26.700000
+CVE-2024-12747,0,1,ebc91191d07badeb79dc6f2f702ff942b05784a8436470a9a76f1e6a5f2c2932,2025-01-14T22:15:26.700000
CVE-2024-1275,0,0,55e303d499b7cd70146b064f11442ebd0ad45cafbb26b305d69871c04faa255a,2024-11-21T08:50:12.913000
CVE-2024-12751,0,0,c8d36ab052c0d3e9ec35af9571e74ed832930012381575b9dc1af30fc71ca134,2024-12-30T21:15:06.130000
CVE-2024-12752,0,0,23a1df67098cb18d5a208109678c48c3e7913067d5db32571522e50bc90bc4a8,2024-12-30T21:15:06.260000
CVE-2024-12753,0,0,4271c9d86ac6ffc21783ff22aa4d21dfabf207717e4c237171a1fe2075c45756,2024-12-30T21:15:06.400000
CVE-2024-12754,0,0,df24fa8ce9df112eb8cb8438eca3154b7b11a8ee42e16751c31ec0de51ba4cbc,2024-12-30T17:15:07.127000
-CVE-2024-12757,0,0,01072d625822b49e01384e601159c9c64ccc9d51e280e2ccbf25f2d79b8491d5,2025-01-17T18:15:24.690000
+CVE-2024-12757,0,1,001b6506f2f8c2c25161ff7428c9761e0eb53687dc4724791aa2f4c1d089377a,2025-01-17T18:15:24.690000
CVE-2024-1276,0,0,7fd672f8ab2d0313a55eef11978a3cbaaea942b78d4dfb1702b583b731b53a9a,2025-01-08T18:37:36.067000
CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000
CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000
@@ -245789,7 +245789,7 @@ CVE-2024-12953,0,0,118fe151e3354896266cd831d5a6eaac47e26b22f8d6d8b8b79915109dc9d
CVE-2024-12954,0,0,3d8ce9b59335959b92acb35793c66a2da6423bee4ff031623546e1feec0d28aa,2024-12-26T16:15:17.510000
CVE-2024-12955,0,0,01c00ead83fa8f9f7c160a68275906de7eedbd365dc21072a2dc6b944ca9d9cb,2024-12-26T16:15:20.320000
CVE-2024-12956,0,0,4dec445723280c9365c37949b943566ca38fb5a06bc3ebb0c2c7dccc97d497ce,2024-12-26T16:15:22.847000
-CVE-2024-12957,0,0,aa289bb51b5f5b241c51a860b0d26efa04d2da34b7e66f5650b0b75f3f7a3421,2025-01-23T10:15:06.867000
+CVE-2024-12957,0,1,1101ebc0fdf7b1a1314299fedc945873b150224579b17c8bef4dad27ced1ea8f,2025-01-23T10:15:06.867000
CVE-2024-12958,0,0,2f2d1e34a44aceb03695717140ff583c6dfb2178e3abf88d23cee2fb77b7a1a6,2024-12-27T15:15:11.510000
CVE-2024-12959,0,0,5225592e400663837fc5548274da6cb321b7f3df19f7584dc1065af38a815bb7,2024-12-26T16:15:27.643000
CVE-2024-1296,0,0,bc7ff5b77e78e698d15576309eb7ce4c3d0e54ba3e687f3aa36d053363066caf,2025-01-16T15:27:56.237000
@@ -245856,7 +245856,7 @@ CVE-2024-13022,0,0,90bb63d1bc90626e0499ce8896752c6e5ed50822b829721b8cf1b7b0080af
CVE-2024-13023,0,0,d029eb35c9bdf0045e63a954d82e8162ce974ac9ca1940b6ad8d92005bea27e7,2024-12-29T21:15:06.020000
CVE-2024-13024,0,0,2d443fd15bbce33c05ab26d4fb4c87b3a41715b85dfb24d19e706acdb51ba0ef,2024-12-29T21:15:06.220000
CVE-2024-13025,0,0,49213aeccb84de269a6cda473f64c9cd212034f3fe128e40066ff20ce3282b78,2024-12-30T18:15:09.273000
-CVE-2024-13026,0,0,82a449cf89ff406cec5c1a223488a6ac04dd2d898424ead123b337ba8c82ad89,2025-01-17T20:15:27.600000
+CVE-2024-13026,0,1,2e2c8a5008d558f334a359f30ce14af2f0370049977086114b1edf6d11e61f8f,2025-01-17T20:15:27.600000
CVE-2024-13028,0,0,fa93211a2bdb9a3d16a1438985d05a65ae11871db310d3e60efe2083e10fb468,2024-12-29T23:15:06.030000
CVE-2024-13029,0,0,3645cd09171242525298fe881249dfcae0b5fc3148bc05a911d0c24263b4be86,2024-12-30T00:15:04.837000
CVE-2024-1303,0,0,922ad92b627c1129d744b1f80cb5c88d28598a22649a8dddf52c9956281bb86f,2024-11-21T08:50:16.593000
@@ -245969,7 +245969,7 @@ CVE-2024-1318,0,0,8468ceebf6c6c9f41014d2f5941b790bd61167061813191d7b8edcc4ba43bb
CVE-2024-13180,0,0,d8eed302f18bf4ce52a1f3c3aecacb18daed8ee47876692255a4c4adf22e5203,2025-01-16T21:01:52.650000
CVE-2024-13181,0,0,619fe755e63fe3e9187685691ca64b6896c0b1403e0d4ede0609b0d7248d7a86,2025-01-16T21:02:04.910000
CVE-2024-13183,0,0,2ce47bc0097832a6bd22ec2d12492d2b5c4ebe6c470cd8cfcebfa2e924cfdeb4,2025-01-16T21:28:47.330000
-CVE-2024-13184,0,0,415b811f2e7440f854a022b268e0963679365dea6b955215c905359bb9d80876,2025-01-18T09:15:06.937000
+CVE-2024-13184,0,1,8b81821152591ad1436a78438bc699d56dfdd30ea4e4d2ad15a148f2202c8566,2025-01-18T09:15:06.937000
CVE-2024-13185,0,0,f40f11cf6008f79d177ff077a9dcbe69bd3026b99163ebcfc01129828e4cdf96,2025-01-08T15:15:17.163000
CVE-2024-13186,0,0,5a307dfc747150abb54643d1b030b7f8a8c1cd824f720d341c7d1515ac2b46a9,2025-01-08T14:15:26.227000
CVE-2024-13187,0,0,9325323ccfca6993238c07c9d3c36024cc87ae07ec0882520853d84e8818c20b,2025-01-08T21:15:11.973000
@@ -246003,9 +246003,9 @@ CVE-2024-13213,0,0,3077bf102e80b6ad26d9de82b06cecbfeedc1b0a01c454e5ec2b3b19555a5
CVE-2024-13215,0,0,17507f2f85733790cb9f937f15c22b6e61ece58878b7af9bb53a95a8347aa1ca,2025-01-23T17:35:41.723000
CVE-2024-1322,0,0,a87df03aa9d8a817a942ae8ebad8afc3111ac175155d7ee73a384181ec986bff,2024-11-21T08:50:19.883000
CVE-2024-1323,0,0,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000
-CVE-2024-13230,0,0,7558577363ef1493b174eeaccdeb94d8f8f1a05be6ba8cbadd5f15aa826f5566,2025-01-21T11:15:09.267000
-CVE-2024-13234,0,0,e35f08a8fef4255849528058f0d2572154349b6aa4cf5a00a5a35fdcf0a947c6,2025-01-23T11:15:10.373000
-CVE-2024-13236,0,0,e56581ba7021cebf2b08d5813ae0eca243b2dda1efaea33e077610769f593ee1,2025-01-23T12:15:27.747000
+CVE-2024-13230,0,1,77b1ecbf192b34e98ac8a66dc9d4d1a94979c767aa5e8f2b9158ee6752bafedc,2025-01-21T11:15:09.267000
+CVE-2024-13234,0,1,4b6e5502689689de17e4347d4d632259e748bbbf3b9e6488223819ef00a2b882,2025-01-23T11:15:10.373000
+CVE-2024-13236,0,1,c157461112e5ead48274d52c3975920c97a3f335f4ff223fcc33b8be78bef820,2025-01-23T12:15:27.747000
CVE-2024-13237,0,0,757f6068109954aeb708ce365b1ff5e5adf5204baad7d55d37a565a85d7816ad,2025-01-09T21:15:24.977000
CVE-2024-13238,0,0,e97946c1ed27832515b261c210f4ad897caef0bf1252b79ed355ec42751c24a5,2025-01-09T21:15:25.130000
CVE-2024-13239,0,0,91e163b85b63de6da134a1efa6398bca19ed0ada57bcebfc51e085d959e0fa81,2025-01-10T18:15:19.477000
@@ -246088,7 +246088,7 @@ CVE-2024-1331,0,0,b8018aa4d406613d3ec27aefa47c4e3b21af15db4ddfb753850f1de6f3ba1f
CVE-2024-13310,0,0,34b833dc43272c485330d8f4a3479ba2fe514cfb2fea7226b333743fa866e9aa,2025-01-09T21:15:28.867000
CVE-2024-13311,0,0,043082a8dd739b5eb445323387334add04ddcec723a1cf1ae43347104de3b9ea,2025-01-09T21:15:28.970000
CVE-2024-13312,0,0,1596f306a61a66773ca721f46a9f359accd6e8bc761ac287ef2d071eacd93640,2025-01-09T21:15:29.077000
-CVE-2024-13317,0,0,eb3492561747721a0d7f4fa0b869fb0f375e7101ac215917441dbc77811ea0df,2025-01-18T07:15:08.290000
+CVE-2024-13317,0,1,bf6e98353834aadd569c32731a32e07929f7d2ec68ca0c813c445806410cf741,2025-01-18T07:15:08.290000
CVE-2024-13318,0,0,e578de8b4719417613441e3d599820c7f899466a7f87935725f122dcda9b3d95,2025-01-10T12:15:24.257000
CVE-2024-13319,0,0,7991c2dfb6aefea7f96696a61d541e78c477eeff53b34652065a2f9dce798e51,2025-01-24T21:06:34.310000
CVE-2024-1332,0,0,43a2cb0465d1ed7fa77b51d32b9ef650ccc5cd8e8f972f53915014a8e37bc428,2024-11-21T08:50:21.220000
@@ -246099,7 +246099,7 @@ CVE-2024-13333,0,0,413ea7e4b64b8aef5dd8714980de1abedc1d4af046b4d782740c89a880443
CVE-2024-13334,0,0,892c3ce546b2f6a66e9e4dfd761dd08aaefb851a17185548e40c2e88d5655747,2025-01-15T04:15:19.720000
CVE-2024-13335,0,0,2fcef25251bb68a715e890eb0cf4e30f6ed93385a9d1ce3a44dbe1289f4c0426,2025-01-24T11:15:07.973000
CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000
-CVE-2024-13340,0,0,e520b67997636de3a9611f4ef263320cf79ee7924cca10113690457bef216f1f,2025-01-23T12:15:27.890000
+CVE-2024-13340,0,1,22b196622d46a895cf0cf3983511bd49f73945f1fe7c52be27f9e67ce848d4e2,2025-01-23T12:15:27.890000
CVE-2024-13348,0,0,e26381eb03e5e67f555cf928c3e9a2305c99dcf3e03e09bd50c1f054f780346b,2025-01-14T04:15:09.200000
CVE-2024-1335,0,0,82fb69da532892baa7a81804ae338bd46e69a8bbbad77be8c22b678b91bcc8f9,2024-12-31T16:50:11.167000
CVE-2024-13351,0,0,7985eca9113b0e4ff9b5606ce71f06a97acfce6eac97b8c91847c6875b508284,2025-01-15T10:15:07.993000
@@ -246113,42 +246113,42 @@ CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef
CVE-2024-13368,0,0,0cebd01114688a38654235872525dd94dee4e6b9d8c0c778f5ec6dd70bab5851,2025-01-25T08:15:08.830000
CVE-2024-1337,0,0,ecd9569d803b0ad7e93765437336dbe54b6bca900bd0d8d6a4265ae95a2bd0fa,2024-11-21T08:50:21.857000
CVE-2024-13370,0,0,4534ec8ffe42544d561bfc608813f027b638b469843d2bcdc0a7c27144b929ed,2025-01-25T08:15:08.990000
-CVE-2024-13375,0,0,c87e38b9c0de54c689e8a67a37a12ee2fddbf06e66e4541022feb46d13a56b8a,2025-01-18T09:15:07.120000
+CVE-2024-13375,0,1,509bfd3a7c3f76e008f9bf54ba53750a8708a5d8eaf24ea17a33be3c80dc44d0,2025-01-18T09:15:07.120000
CVE-2024-13377,0,0,a25050bd2bbff023d447f5d602b24decf0d9fe3f99412e4f96b0e55aac73332f,2025-01-17T10:15:07.240000
CVE-2024-13378,0,0,7ea1d4cbb0f87859cae348c2da93d49f3902e773337fd492c684caf29392972d,2025-01-17T10:15:07.457000
CVE-2024-1338,0,0,dc2761903a1c29795472be9ec50c80e554c7222ddc44792707b7eb37ea2462f8,2024-12-31T16:51:41.113000
-CVE-2024-13385,0,0,6f29c8cca86431254e1ca86d9c73dbeef35ebe61a664c2905fda6bccefc454b8,2025-01-18T07:15:08.463000
+CVE-2024-13385,0,1,341bf9c15400cae53ddc0851921970fc70795f9f5473739da6d466eaaa0f96aa,2025-01-18T07:15:08.463000
CVE-2024-13386,0,0,6ff136adf169af3d89231135a7ce4b15faa5760d31440cb4c68dca430369b948,2025-01-17T07:15:27.300000
CVE-2024-13387,0,0,4fa5b6a4b1e6e7fbc2f3075a5d8980b29e2968b35b02e0f8e5098804434c72ad,2025-01-16T10:15:09.103000
-CVE-2024-13389,0,0,cec74e2df20d0c8ca20c8e36f5b7cb44bf325b5c9dc4e0924d14cf9de43d0799,2025-01-23T12:15:28.040000
+CVE-2024-13389,0,1,b44d46e213d3fa373545a96ab302e91f7de672a3d07213da1e83c4e708cbdcea,2025-01-23T12:15:28.040000
CVE-2024-1339,0,0,a64c4c68c8a9a926adb37b05ad26ad3fdfdc4a14ba534fc12b29b0c3bcb239b6,2024-12-31T16:52:24.407000
-CVE-2024-13391,0,0,e7acab54105bf4f38620685dee0bbab545cf1b4e9861fb1671386ed9297e5404,2025-01-18T07:15:08.637000
-CVE-2024-13392,0,0,1560437f9cf945c5be390892a52113808014e082874bd0da969623c97d9eff53,2025-01-18T08:15:24.327000
-CVE-2024-13393,0,0,a93037e85f094eb3a9df95f7bbdb2b755a92afcfb1bc7976d270f6c0ef2b780d,2025-01-18T07:15:08.810000
+CVE-2024-13391,0,1,4ddc50634aa74744390d79b0906c8f88dd9a00cc29aaa55a9724acf7a1d0640c,2025-01-18T07:15:08.637000
+CVE-2024-13392,0,1,a78e961d1cefdda1764b180676e0657379c1e1a7ef9b8f0223e522e6fb2917ca,2025-01-18T08:15:24.327000
+CVE-2024-13393,0,1,6c538726beb67e787d4cc0c97ae28498348fafb8453c26bd442a25ec75fb47c0,2025-01-18T07:15:08.810000
CVE-2024-13394,0,0,2f438b906efb781207eeefa07105a693bc0286f21e9f9257684cfec9ce3d8d32,2025-01-15T06:15:16.150000
CVE-2024-13398,0,0,1cf1394b81ba2d9f5d04722bdb6d4c350d6d6a7eb8c0a059d873a1872c1d84e5,2025-01-17T05:15:08.613000
CVE-2024-1340,0,0,779cbb4786989b99b13d0df5bfadd47a6bb17fb76227d8a826f245b565dc9020,2024-11-21T08:50:22.180000
CVE-2024-13401,0,0,5efe32d869945c8cf2c8e98762f61d5eb40d85526a7f385be1d59dce88509538,2025-01-17T05:15:09.077000
-CVE-2024-13404,0,0,b58f4e5da266e40a7294b1c5385e421341df230f5fb30104fb5c9ea0c1e7114b,2025-01-21T10:15:07.823000
+CVE-2024-13404,0,1,5bb170ff9b5817ff303f75d023f712e8f9e23d487df8a7d634e98e82d104b8cd,2025-01-21T10:15:07.823000
CVE-2024-13406,0,0,3a9e7471bf5857762896fdd475ef755ed514b70430254f571b98831752a93703,2025-01-24T21:20:06.183000
CVE-2024-13408,0,0,b897a089b5a6edca0f964aeef9bec0c400d26812061d65e34515c7ccadccb7b9,2025-01-24T11:15:09.043000
CVE-2024-13409,0,0,9a9934c96e1b3b594722c2aa6970db5452530e9596d366c39c81c530d063b0cd,2025-01-24T11:15:09.213000
CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000
CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000
-CVE-2024-13422,0,0,e3ad66da42c2798d7caf436789cf96956e806fa00807b0554cd9b7f915a2326a,2025-01-23T12:15:28.163000
+CVE-2024-13422,0,1,3d45f2466e53dfac69ec8dd343775dbe7473e4817099b26926d3d7b297be7b01,2025-01-23T12:15:28.163000
CVE-2024-13426,0,0,86fab2a47173ecbfa78b3dbc75ac72da294fc64d34b2b04366fafee0f3e9a13d,2025-01-24T18:37:38.503000
CVE-2024-1343,0,0,7c2447499342d3573955d9e9545316db90429adf3b266826e2ed2754189f075e,2024-11-21T08:50:22.433000
-CVE-2024-13432,0,0,7d75f67ac18cf32d5dc44570eb7cf156c877d943529d3637d5b0bb399b86a599,2025-01-18T07:15:08.983000
-CVE-2024-13433,0,0,b744d44080e2e33c41984f231e71d8cc1252181c511f568444c5c86671c3eb05,2025-01-18T07:15:09.160000
+CVE-2024-13432,0,1,2420e31f27384cf3a3b972e6593316283200b18cb659242a854ce1e6ee4aeb4a,2025-01-18T07:15:08.983000
+CVE-2024-13433,0,1,2a9d89514e9ca62330f67417cbd4f0a14554f70d781af736185219d7398dc564,2025-01-18T07:15:09.160000
CVE-2024-13434,0,0,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083320,2025-01-17T05:15:09.290000
CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000
CVE-2024-13441,0,0,fcbc25f5751a8050f060dcd2c18cd1291e5127285eb7a2657f8c91cc0f5ac5c4,2025-01-25T08:15:09.160000
-CVE-2024-13444,0,0,2a82e7dc36beac803abf8c10509e1ae610559c76a3585d9c1850f27a1808797c,2025-01-21T11:15:09.450000
+CVE-2024-13444,0,1,f559be4a09d3b0d4718253e232ed1d6b01b700beffd4896c1d6f62eac4116d3c,2025-01-21T11:15:09.450000
CVE-2024-13447,0,0,4e4ee51c076699c7672245e5729c9870c182faecf6e2bd018441c71df98cbb9d,2025-01-24T20:53:40.380000
CVE-2024-13449,0,0,b603466190e6e620bd51a093bef2226b1aa9a640893cd2b54c10f03577e6ca0b,2025-01-25T09:15:07.557000
CVE-2024-1345,0,0,7c212e7b361746cfecf33f6e4ed924489ff6a3a938083dd73fe4da2b7b4649da,2024-11-21T08:50:22.667000
CVE-2024-13450,0,0,6d0c6e9ad465925bb0f00b48f72e6f84db20d9e217507e863ef423d4f9e1193a,2025-01-25T09:15:07.733000
-CVE-2024-13454,0,0,64bcb798150e96f58a909578ab30d46cff0e023968dc2b1dcc5267d8fae6c946,2025-01-21T20:15:30.793000
+CVE-2024-13454,0,1,14313d18c59abf0795f9e65c924b2232675b3f5fcf8c69fe1d32af5f5cac5a65,2025-01-21T20:15:30.793000
CVE-2024-13458,0,0,a0d55037d220aaf8fdb1343c6a981e032ff9c796368506b8230ae875396a583f,2025-01-25T08:15:09.337000
CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000
CVE-2024-13467,0,0,bcd6474463b1a69c9a46d9b4d6f6f02b302b85f9777a4b31585c7467fbf3f38a,2025-01-25T08:15:09.520000
@@ -246159,21 +246159,21 @@ CVE-2024-13495,0,0,7a8bc062291cac2ab3dfb8a0fb7feeecd31abf131df44b7d6a18b1140227b
CVE-2024-13496,0,0,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4f79,2025-01-24T20:45:57.463000
CVE-2024-13499,0,0,6d635dc5b8c51f2804fa43df8b3beb018f4524a3b4ba54f25865b62cf92ed7dc,2025-01-24T20:37:12.533000
CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000
-CVE-2024-13502,0,0,ac2a41b6cd26a4157041ef83a41fb1ca5fe4741530d1e5a7cb1a80b922fa6ce0,2025-01-17T14:15:31.147000
-CVE-2024-13503,0,0,9a18f887782bddd42cf8f60b9b9da1ba6181ce424bb49fdf69f585a65e64cdd7,2025-01-17T14:15:31.317000
+CVE-2024-13502,0,1,b6bd5e7a8ccd125fd10c3c602ef666035a1824dda1c710321e34fb9d3259b3fe,2025-01-17T14:15:31.147000
+CVE-2024-13503,0,1,ffb0135326ea2a3ea18800ce3bd83bc523a9e303f03b2acc60a1815003b2400e,2025-01-17T14:15:31.317000
CVE-2024-1351,0,0,0ee767ddd9bd942759d1902d3186de90141de07710cd1c9cc0aaf86395d89b28,2024-11-21T08:50:23.450000
-CVE-2024-13511,0,0,ee31c4a9c7d71550d6c946af9bcb9a76ebd98775b07d5a10fcb060c47d8f693d,2025-01-23T10:15:07.253000
-CVE-2024-13515,0,0,9c375e4239ee12fbc562375c345cfda5a849d6fb2775b7f77148bc29db2bffc1,2025-01-18T06:15:26.410000
-CVE-2024-13516,0,0,eba414603b972f65f10f7cf853b9c9e3b40669e2a413f223b52ac5eaf1fb3274,2025-01-18T06:15:27.627000
-CVE-2024-13517,0,0,648053532f79f5283d5e5013413aa51010bd614d2fa8ab99c641ab7d5b15d86b,2025-01-18T07:15:09.350000
-CVE-2024-13519,0,0,91071072a08ea24827f5d5bc615943726188f0b2d2b9d39683465c01c81a2c7d,2025-01-18T07:15:09.510000
+CVE-2024-13511,0,1,3071f1ee4394ed25c0ba5a4414759a0ec6bbc3d07f1733cb6f65493d29a37d83,2025-01-23T10:15:07.253000
+CVE-2024-13515,0,1,aca8f7e0638fd7d821357389659621eb450217319a62bd2c5a959e9c0aea1b39,2025-01-18T06:15:26.410000
+CVE-2024-13516,0,1,5ffb65a61f80c9c94522737749ad7061abe4071a127f73ee8fe2d406cf9b6f3f,2025-01-18T06:15:27.627000
+CVE-2024-13517,0,1,9d057e77f790f2402e4e040e2e1a67384dda92aec0304812a84e741a1082d2fc,2025-01-18T07:15:09.350000
+CVE-2024-13519,0,1,dc09c545fe78d4520b3958b8cc7f812509309ee95d98546daffd0145d2c455d7,2025-01-18T07:15:09.510000
CVE-2024-1352,0,0,80e73adafdfe15b995501384770910e119d96dba6ac79b22584e1c2a8e29f667,2025-01-17T17:23:55.973000
-CVE-2024-13524,0,0,8904fc9b47632ebbae09c103a68ff131aa17785fda270c0fbbff20bc7cde5ada,2025-01-20T03:15:08.033000
+CVE-2024-13524,0,1,d6f31820e091340f802e51a50f0c20aa637866da429d40add1f3ba31e9a88956,2025-01-20T03:15:08.033000
CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba752,2024-11-21T08:50:23.700000
-CVE-2024-13536,0,0,2c346b2df91a5dc057c237d35edbe756ff5236144feccf10098be940a9698d61,2025-01-21T05:15:07.490000
+CVE-2024-13536,0,1,fa522d36319a484a2e2b9f8b9829d55d017393f4354bdc4c1030d71e4db73c91,2025-01-21T05:15:07.490000
CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000
CVE-2024-13542,0,0,c45a986aa867dcb8c5f485f5d0834964d3d14a785680faca172769f60f73e69e,2025-01-24T11:15:09.377000
-CVE-2024-13545,0,0,f5bd0b2863cf0d152606cfd8d60f42594047593ffc3fcb8972c1bca106c2bb9c,2025-01-24T09:15:22.797000
+CVE-2024-13545,0,1,eb269cacc159c45695715c4d7fd9f7f0b3c57dc71f3e2654436421591db65c2f,2025-01-24T09:15:22.797000
CVE-2024-13548,0,0,773be214153e433c157dbff720cc5880d3eb87828ad3760ba7d8d4da982d58c8,2025-01-25T08:15:09.687000
CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a61202985b,2024-11-21T08:50:23.993000
CVE-2024-13550,0,0,f9981f1deb805f2a60af3da03768fa1b757685b2867a3f144ba6c75ef5863a95,2025-01-25T08:15:09.847000
@@ -246188,7 +246188,7 @@ CVE-2024-13584,0,0,ee87f1c36c9c93255b87e8f2b16900d4e175847a31f3c291ef2046e604a7f
CVE-2024-13586,0,0,2faa231a7c9836b7e566ce2e030f73d76076f41a486cba4a9ae8da27b2987da5,2025-01-25T08:15:10.173000
CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000
CVE-2024-13590,0,0,aa6f52a963149ee514cd80b7b2a6b7948bff891700d00f428940ffd85b0107d7,2025-01-24T18:09:26.147000
-CVE-2024-13593,0,0,9e6eeaf6317d0d53a5777da60336a0df45a0567c61ee5316375bb6592e2f9ab4,2025-01-23T10:15:07.737000
+CVE-2024-13593,0,1,b2b99499e28187649419ba62667826b9acba964eaeb31ca5bfaaa794d884f32d,2025-01-23T10:15:07.737000
CVE-2024-13594,0,0,b89d92c59d6589291d5b3e44e449a8d8620a2bd20dcfac4fc41ec59549c64cba,2025-01-24T11:15:09.667000
CVE-2024-13599,0,0,8416ac4ba24e0470447a5d54bcb4a58d565d7b0165c1a9d0f1a855bfbf0c1c7d,2025-01-25T08:15:10.357000
CVE-2024-1360,0,0,a87675d91847a9b72ed5368695c7c67c099276d1667e5e94dc544f268946892c,2024-11-21T08:50:24.707000
@@ -246197,12 +246197,12 @@ CVE-2024-1362,0,0,ebe61894e3dd1fecb8d4711188e9d8f7e6a2ff043508a2ee93131b033a0336
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
CVE-2024-1365,0,0,0f6156fbf2b7d3a217bf5d4ee39b3ca345099663b38e102dcb249b872d4e92ab,2024-11-21T08:50:25.350000
-CVE-2024-13659,0,0,3bad85b2b4f19e010a7bf4a45d7356a00001ab23b97f9cf072e6e1686c91a9b1,2025-01-24T06:15:26.557000
+CVE-2024-13659,0,1,2ab949cac371b153f030d675a94a51cc0bb444218e14414679e2bc62713fba54,2025-01-24T06:15:26.557000
CVE-2024-1366,0,0,41f2af73acb5e76ac7c2022807fff2e016bc9ca7fb30dc8ea18cd52e10cae6bb,2025-01-07T18:21:27.007000
CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000
CVE-2024-1368,0,0,e78cd290aff3eda879ea71814281e9fb9dbaef60630fac7d18ff14dae3d223f0,2024-11-21T08:50:25.737000
-CVE-2024-13680,0,0,62173e4be535780cad87d71db6bb29f755aeab9483d96845d17c346a119fa175,2025-01-24T07:15:06.930000
-CVE-2024-13683,0,0,fb57f44e8b2d58d524faa1dd2ea3874f278594c1d56e7f409ae90b680d7e79aa,2025-01-24T07:15:08.523000
+CVE-2024-13680,0,1,f3164c1a021ffb39e27590d49b20eab131951c6817a6dc8655e0dfc9f53950e4,2025-01-24T07:15:06.930000
+CVE-2024-13683,0,1,afca8ca5733f1981ab92ff6f92163a36f62ba84bc4cae91c9eb4b4db6612f745,2025-01-24T07:15:08.523000
CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000
CVE-2024-13698,0,0,dc17e4312525981bb14f68ea913383417af07334780551d0e9684f2f5489da45,2025-01-24T16:15:34.597000
CVE-2024-1370,0,0,9f0498253935aff35f1be521427ae96ebc633e827d9cc62afad8ecd6626aa44f,2024-11-21T08:50:26.027000
@@ -246226,7 +246226,7 @@ CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed0050
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
CVE-2024-1387,0,0,2c2f906637a61e38d38a9b0ca47ff4dc68c131d6fabb5f801315dfb2710ce089,2025-01-07T18:19:26.400000
CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000
-CVE-2024-1389,0,0,5873690e0845507df8953cc4f63b4ccd0c40998cbb5a2b9d552ef1fc675e0a5e,2024-11-21T08:50:28.477000
+CVE-2024-1389,0,1,b25b6abc60548dc828f768ac6223a8aa030bc79b26b12ac2a18f098c1e39d1c9,2024-11-21T08:50:28.477000
CVE-2024-1390,0,0,4f3d9af8e4f645cacc042445b3c6c1015224ae23e87226c88c372fa7ef3e2644,2025-01-22T16:49:11.553000
CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
@@ -246318,7 +246318,7 @@ CVE-2024-1479,0,0,752314f90a5f4960cc68dd04058d672b74cbe0911f4cbcaf920c0becda3216
CVE-2024-1480,0,0,03d3f4ccf7da39137b14bb7df631d0ca8dfa9b9937250b5474f8035d12beb0fd,2024-11-21T08:50:40.430000
CVE-2024-1481,0,0,7fd58e745dc38e4d7e47d117d56c6f445eed7fa5191f3735a2692d3de2dee70a,2024-11-21T08:50:40.563000
CVE-2024-1482,0,0,60272768c52b423065e24b6229c88409ec8bdcb6bc81af7dfbe638244c7c7d48,2025-01-23T19:53:54.957000
-CVE-2024-1483,0,0,0a968cb39ba08391aa07146937b7004c093c43ef8daa0b9facc869599d241f4d,2024-11-21T08:50:40.847000
+CVE-2024-1483,0,1,e7bd6d3982825885cd71eaaf1c4d20008a1db83ab289ce47f68c144f38e135ea,2024-11-21T08:50:40.847000
CVE-2024-1484,0,0,9a32df126759987e5250b83dcafa91beffdf56c507b193272d399891f107651f,2024-11-21T08:50:40.970000
CVE-2024-1485,0,0,a1102d636093aae5526e62d4563fc2a331d4ec97c0bcd4b7a9835d6f29d54493,2024-11-21T08:50:41.090000
CVE-2024-1486,0,0,94a421c2203bd3bbfc3e3f87675332dfca46e0ee2e1454f84651bf7b647d4382,2024-11-21T08:50:41.247000
@@ -246384,9 +246384,9 @@ CVE-2024-1554,0,0,92740764d0b165b43dc1e93df2a20e8cb503081ce22daa73ea014663148889
CVE-2024-1555,0,0,986df4ac39abfabad3447d158a21265dfb176f5818ffaea2cdf898cd8c79a865,2024-11-21T08:50:49.350000
CVE-2024-1556,0,0,cac3820a27ba3d3f659d43b87b40e988c3c3ec064d201d4816073cb562f7563a,2024-11-21T08:50:49.550000
CVE-2024-1557,0,0,a65617e7c23e3011423f7a7948944a6645a4308b0fc8e2bca8a4587b0a39c9c1,2024-11-21T08:50:49.737000
-CVE-2024-1558,0,0,2ae11df18fa49f71fc31cb812caffd2e64fd8da91b3699e02f68503719cb6691,2024-11-21T08:50:49.943000
+CVE-2024-1558,0,1,879f9a643ce7fd124ee799b91b291211d5c98a6b90ba1161f65905593a28c494,2024-11-21T08:50:49.943000
CVE-2024-1559,0,0,c17b64cfd0e83b2d4fb7ab79c711db870f119c0c741a43bc21718babeeef9039,2024-11-21T08:50:50.073000
-CVE-2024-1560,0,0,222e22f5fe0ce5161738537424f3127ce93639e2b47fe34db079ab8dbd51f848,2024-11-21T08:50:50.183000
+CVE-2024-1560,0,1,8dd9abc0c577440971d225dbc6a8e81069010ffa8a7a8e97c3dc513e9885573f,2024-11-21T08:50:50.183000
CVE-2024-1561,0,0,9457196c919808e64e590d1e9a9ff260bf5140b029d38454414502236a9f1f29,2024-11-21T08:50:50.303000
CVE-2024-1562,0,0,7bced421d9d1c5ec08794008917f5dc4be04ce09fa4c889fd9ceda829269300c,2024-11-21T08:50:50.427000
CVE-2024-1563,0,0,7d0bf239d127ed2704e916b4bb8cfd434f8136623a3e40c8f2ec9ef9bcf8d087,2024-11-21T08:50:50.547000
@@ -246417,8 +246417,8 @@ CVE-2024-1589,0,0,1931589006a4c51bc1b5b6052d50e4e25fdb31d7b1487761957f59c98cc0a5
CVE-2024-1590,0,0,4dc30fb7211c32b8bd0f209116be4eeecd77c4a250e9e6e10c6ce684d7b60c87,2024-11-21T08:50:53.977000
CVE-2024-1591,0,0,fdacf83330a01a977bb97372c215a2802e538c5ea7c288c69493936a1bb317d5,2024-11-21T08:50:54.090000
CVE-2024-1592,0,0,22e091e91f9551746ee97464de3b99184eb3e5de07904bb056b791931902b874,2025-01-16T18:44:36.740000
-CVE-2024-1593,0,0,391512bb7d3f57cbae758070034062909cc1d39f455b58143eea3832736cd4d4,2024-11-21T08:50:54.320000
-CVE-2024-1594,0,0,dccb92d3d1c0bb225dc01e2735f71c68449444381efde8c83572d5c3ad8b65da,2024-11-21T08:50:54.443000
+CVE-2024-1593,0,1,7feac5f0a5cadbbf58b4c0b31b75dde3c63971b255bbc39c231bcdd5c3a47e80,2024-11-21T08:50:54.320000
+CVE-2024-1594,0,1,3d29c923c86b19bdff3972e2fd048e4f1e048638b48281b62a4901d694c68406,2024-11-21T08:50:54.443000
CVE-2024-1595,0,0,526b516f9c10c33e50425b60b231b2ea8a5ba90250edae49ae4c689cc755ce36,2024-11-21T08:50:54.570000
CVE-2024-1596,0,0,d3ac46e8542021623a10cb9a7fcd7c0ff096d3382d6c4002ee880e3d788b395f,2024-09-26T16:23:08.650000
CVE-2024-1597,0,0,314f465a4b86dcf509c0638dd3f53180dd9fe672bb83b647acbc02f1aa37f96e,2024-11-21T08:50:54.813000
@@ -246819,9 +246819,9 @@ CVE-2024-20017,0,0,143cf72499435b0ccdd90f084ca0e975d712eb29509f49566d73ef818212c
CVE-2024-20018,0,0,84e97c4c5a222e8dbb38a24ffbf139bbf2484e04613f1e5919be9604639b141f,2024-11-21T08:51:48.693000
CVE-2024-20019,0,0,0a2ae787333b53137fceb2b1132f066a8a6d0264380966acb5f440a0dead19c2,2024-11-21T08:51:48.877000
CVE-2024-2002,0,0,628e0d3d5e70f788a018f71928e7e72a124582165cb8f9452c98e96fa8eaefc4,2024-11-21T09:08:47.130000
-CVE-2024-20020,0,0,b2ae0c837d59309c5fa2aaf0f49324c7edecd07d6a95d18681e9dc971ce1e7ff,2024-11-21T08:51:49.063000
+CVE-2024-20020,0,1,be1599fa7152f8e599ed66e965359aa77f217afcfede8d47469a816dc8aa4e30,2024-11-21T08:51:49.063000
CVE-2024-20021,0,0,63afd4220ffeff0a0d12b5d0e054876129d39d10656a9ff99dbe643098f3cedb,2024-11-21T08:51:49.180000
-CVE-2024-20022,0,0,d3225b2b4659a3ff8b173bdd17342c08d6df9aa20264538377f1f703027334e4,2024-11-21T08:51:49.393000
+CVE-2024-20022,0,1,bef0a2c37e58ec53b3dfeaebc449697d35e62f52b201b239e66e7834e66724b7,2024-11-21T08:51:49.393000
CVE-2024-20023,0,0,09d6edcbccc95f5d43f4f0911970b5de3733ac0546fe0434f5cc8aa81a35f194,2024-11-21T08:51:49.530000
CVE-2024-20024,0,0,a558ad6b23645a453221eaf9a9b06c62acf918a03b53e68d526e257656acd7ff,2024-11-21T08:51:49.733000
CVE-2024-20025,0,0,3f7a148dd5eb41a7b7c21ede316da08d271973cdda3bca18ea657a87c1e5c1bd,2024-11-21T08:51:49.927000
@@ -246969,310 +246969,310 @@ CVE-2024-2022,0,0,0dc2752b097d5cd1dd4883d63d3316b17f7c227f69335690399aeec0de63b4
CVE-2024-2023,0,0,af1bf29d0113799e098d2cfbf157a0bda24c0e5910a3b834edb94dde9be5adc1,2024-11-21T09:08:50.197000
CVE-2024-2024,0,0,a1997ce935dd2b9a070dcf5fc5501bcdbb4db0c1a6915c1fae085c47b5c17ba9,2024-11-21T09:08:51.093000
CVE-2024-2025,0,0,4527d6fe9f7317c9197027fa43877931eca8ed461c4640f9a80ab02c51e6dbbc,2024-11-21T09:08:51.250000
-CVE-2024-20251,0,0,6b29e871fec157d18fc04a5219ad31fed9da9e4973ae7541ece94e9433b6ef14,2024-11-21T08:52:06.593000
-CVE-2024-20252,0,0,f4a77e9729cfae925534f61966ab4c21a7a75c143aa2230eb9c9d8407a788473,2024-11-21T08:52:06.800000
-CVE-2024-20253,0,0,fe982ebc6b4ce57e5ee4adf2a4af099711d8c795196dddda28495421e4b3db92,2024-11-21T08:52:06.980000
-CVE-2024-20254,0,0,52e54838048e41ed0c4030cbbba15120a4860867427b3f7b44c6dc404e72323f,2024-11-21T08:52:07.193000
-CVE-2024-20255,0,0,931d423564a409c82498599483cf581b96b971be89e51e229d20c6c7011d75c8,2024-11-21T08:52:07.353000
-CVE-2024-20256,0,0,68b0071d6c0429998b2d30173801aa9a5d056e57e90d617c6a9c5a6bd9967620,2024-11-21T08:52:07.503000
-CVE-2024-20257,0,0,14018241e72e0c191c6c9556fa900ae0a6088b160c12c45fcfc72cc1e7303ba2,2024-11-21T08:52:07.650000
-CVE-2024-20258,0,0,4ba3e53e17bf27b829483a83717b6ca074f0d56addbff15b48d115e54ae256d9,2024-11-21T08:52:07.790000
-CVE-2024-20259,0,0,79dd3eea34ba1d9ae1e517d0e6db86cdac899b567200169e912d9141521b7514,2024-11-21T08:52:07.937000
+CVE-2024-20251,0,1,3531e62b39fdc8c3653ea080bb0e4127764d8f8a9ab8e30c6e8fdf2cb10d81f6,2024-11-21T08:52:06.593000
+CVE-2024-20252,0,1,69e6cb09cbe2ea4295625bb46e8fba5f1d3f6b9c9bbe7f08c9d653e7d91d1775,2024-11-21T08:52:06.800000
+CVE-2024-20253,0,1,20e01c8a396f8c03aaf9ed1ee39e56c9a6cddc53e9e3b819841691f742eed614,2024-11-21T08:52:06.980000
+CVE-2024-20254,0,1,15d258b8e734ffdc6e347513c8de5b1bd021a1ba4c61f24ec93b1f26c4dde6a3,2024-11-21T08:52:07.193000
+CVE-2024-20255,0,1,e3893ccf83602ff30abb45ccea127011a5ad84f562261a62f48d79a8f76d5cae,2024-11-21T08:52:07.353000
+CVE-2024-20256,0,1,6e580ac63179c214f79133f9a48010102f34cfd65db764de14a2f9830976ed12,2024-11-21T08:52:07.503000
+CVE-2024-20257,0,1,0296dfa4c15085dd97997fb62b70023a7b7e5509962b5093125b435ed3825923,2024-11-21T08:52:07.650000
+CVE-2024-20258,0,1,7a16291e32c5eb8359e34c7f1f4a84cd294d806210858b4ddbc89ddde444b70d,2024-11-21T08:52:07.790000
+CVE-2024-20259,0,1,b60cd10eb78028600144229d7ab9bbb47c32c24be1bdfa9ec30c426346f5359a,2024-11-21T08:52:07.937000
CVE-2024-2026,0,0,dede1d92cd93017365b387602839e9d76944a6d83a5aa48a597c0c4043de04a5,2024-11-21T09:08:52.090000
-CVE-2024-20260,0,0,601cb7e7f879858df2f3f4058ad83c33636dd34ae3b4f2958beb40c77f34cdc0,2024-10-25T12:56:36.827000
-CVE-2024-20261,0,0,a48882074afafece8cf357757d4f89f4fde1b3d08b5b473cc3e85bbfc57f4c83,2024-11-21T08:52:08.300000
-CVE-2024-20262,0,0,1a7a1a6809052391533c11a5378c3253fc4bc8ca842eb1263ddd4715ed049db0,2024-11-21T08:52:08.460000
-CVE-2024-20263,0,0,230c5f23c0d403f5883278312f041571905d6cb3dff6c4b039308f7cf20216d6,2024-11-21T08:52:08.607000
-CVE-2024-20264,0,0,0820750ca7c3e8baf9b61c43d7e435994bdcacd9e1945fdfa98291de60cdb0de,2024-10-31T19:04:42.863000
-CVE-2024-20265,0,0,3046ac6d24e1175bcdb52ad5cff21a9a0ce5527ad815999086ddf93182a27a18,2024-11-21T08:52:09.003000
-CVE-2024-20266,0,0,717b597e3815ab37b1f89ad69b976063991d2598f2c2267dd4b46647526782ab,2024-11-21T08:52:09.177000
-CVE-2024-20267,0,0,036746fb2db231b083b62117b7c210074b74f11e68cac7d3cbe626733e78f762,2024-11-21T08:52:09.347000
-CVE-2024-20268,0,0,4f77c4addf312beef41d53212e05687207adcaae7940451b3ae4e19e4e0a1bdb,2024-10-25T12:56:36.827000
-CVE-2024-20269,0,0,c053953710ec2a3ba6ceddd0245613cea918a777e065c1c31d8ae1173e9392cd,2024-10-31T19:35:03.420000
+CVE-2024-20260,0,1,6c723ab8833ea7a01f46fffd704be928a7d802c1c187406a0ffeed6e65e3caf6,2024-10-25T12:56:36.827000
+CVE-2024-20261,0,1,b49af53e0d46b7dbe081123492f99281d6a77ef6ef1b33af41c98c1fa32a1c7f,2024-11-21T08:52:08.300000
+CVE-2024-20262,0,1,e76d2572f806266c4c11a3c9c1bc90818708d5efd4635a7bd887f314ae321a42,2024-11-21T08:52:08.460000
+CVE-2024-20263,0,1,e5e6818f15729c048fa81b7e6b5efbafa1e300e83448b96cf337aed8a6633b01,2024-11-21T08:52:08.607000
+CVE-2024-20264,0,1,789e8123f90c12768b6fb6b1bb52f626eeacc98ba1f9378e6b9ac88c2bc756b8,2024-10-31T19:04:42.863000
+CVE-2024-20265,0,1,5a630838cbf635c4c68c95efb2f0aa59b2ea427c7a1cc1f121b91f1bbc64b4be,2024-11-21T08:52:09.003000
+CVE-2024-20266,0,1,30e72169e6edfb8123693179ab6078e8a8941e0b597c940d4b306a02616b69cd,2024-11-21T08:52:09.177000
+CVE-2024-20267,0,1,60db6698bc2b5bfed7fe8f868752c4d1f1bfa5497f21476bc1bb83c3f9744418,2024-11-21T08:52:09.347000
+CVE-2024-20268,0,1,f54dcbc1b570decd00936c9c3273238bf5358fc22c126ebd5868e76084b92c48,2024-10-25T12:56:36.827000
+CVE-2024-20269,0,1,7dccc9897dae85a9605fda4a9bca48b4a5608dd2bbba71c7a1ad8048c935ff52,2024-10-31T19:35:03.420000
CVE-2024-2027,0,0,bd9a4af07afb09a19038329648909fa4801346132b8df7c2d032c64420983a20,2024-11-21T09:08:52.273000
-CVE-2024-20270,0,0,fd38203e0206fb78302f3889c29203afeb9b252341d062c6ab24b676dd000875,2024-11-21T08:52:09.830000
-CVE-2024-20271,0,0,4ea31d4a442c1e34c83603768fc6949157e3d26d050596fbab058a6879a0b441,2024-11-21T08:52:11.843000
-CVE-2024-20272,0,0,66c6ef1b8c6c1db7ddef8d2dd123bea0a406134d66d6883b0d8482208a48cba6,2024-11-21T08:52:12.043000
-CVE-2024-20273,0,0,84fe989b4a8024fd5567bbe17beca42525cf0214425db9a8c342775c9736606b,2024-10-31T19:09:24.687000
-CVE-2024-20274,0,0,f20fe34342b39a82d941bd402fdc525b3fd9d9c58f1abfb33b89167007348461,2024-10-25T12:56:36.827000
-CVE-2024-20275,0,0,da0ac7bbdf4eb37bcf5fc389a7ec68b24dac242cc4b29a6d5a64543e2d1e3a6d,2024-10-25T12:56:36.827000
-CVE-2024-20276,0,0,fd520ee9c607ad4cab0efc8eb5709ff0356aada291f7b58900eca5384680900b,2024-11-21T08:52:12.480000
-CVE-2024-20277,0,0,46a78e522653cd955649b794111af340774f82756fc0d03b6ff63566f0189dcf,2024-11-21T08:52:12.613000
-CVE-2024-20278,0,0,8b660944e3e7f763f6895dd5b056209ccd186fe1aaf66302ef18a3d0abf6d456,2024-11-21T08:52:12.753000
-CVE-2024-20279,0,0,9257799187612238db15ad4f35a72f2477edac10c2e655a5c35bef4920b1f9c5,2024-08-29T13:25:27.537000
+CVE-2024-20270,0,1,527c85da6972409fbd3feabaf4ac289d41795328353490218d3bc94d305c8921,2024-11-21T08:52:09.830000
+CVE-2024-20271,0,1,918ee322d0c61875603f2ae034a6d542ec17e2f7008e26811deaaed0d2b1bdc4,2024-11-21T08:52:11.843000
+CVE-2024-20272,0,1,4354b761f3bfe3f6ae519103315efd5af19c06e4c8af3b6ddd30e3de64825837,2024-11-21T08:52:12.043000
+CVE-2024-20273,0,1,8d679697c15bc2e97b5a81ffc7e40e8c047d103fb882cac5915eb3a6895e7557,2024-10-31T19:09:24.687000
+CVE-2024-20274,0,1,c5f8f757ac6f47f6af16641b1eb8057c6a0d4e407a0ee99ef0a042f0acd647c1,2024-10-25T12:56:36.827000
+CVE-2024-20275,0,1,da3976bbd51710bb6dfdefc4d127f7e55f475507ba3be3fdde8e80041befcce1,2024-10-25T12:56:36.827000
+CVE-2024-20276,0,1,7c01df949c9fb465342858a17aece04cdb64b1320c394c89f9ee9310aaf89fcc,2024-11-21T08:52:12.480000
+CVE-2024-20277,0,1,5a89043308fb547de34acb4c61ba15398a985bfb0673a2cb185caef2a3af9a22,2024-11-21T08:52:12.613000
+CVE-2024-20278,0,1,c46e7f175849643fab595e0dcdb59287eea735bae8675975194b93990a769003,2024-11-21T08:52:12.753000
+CVE-2024-20279,0,1,3cbe8709c45a9aaab75f72a13e580efcdb2aecff6e634b9b191f6385b1ee69e2,2024-08-29T13:25:27.537000
CVE-2024-2028,0,0,07d8c2da486af5c0b84327c94aaee4d922175e9b0dad605b8d56c334effe891b,2025-01-22T19:51:56.843000
-CVE-2024-20280,0,0,5176303c1878a01a7736c5cb8a031d0d69aaaad5e3d1e30256d21a72b6ae0dee,2024-10-31T15:35:23.060000
-CVE-2024-20281,0,0,029d647f4939fa998f57e310fdb53f84a7700ff5432144daf5c0c1ff962b3b5d,2024-11-21T08:52:13.080000
-CVE-2024-20282,0,0,945d0e46d7d55b449187635d4c31d8281b9f41451bf98ce8094836f568888a45,2024-11-21T08:52:13.210000
-CVE-2024-20283,0,0,aeb8d5ee3c38604578c9d2ecbbfc87017fe67359bdd5904636e6f7a54f981c1e,2024-11-21T08:52:13.337000
-CVE-2024-20284,0,0,5fed46a337be62f3349836e2d22d572be397c9940a2efffc7d303658f3b7579a,2024-10-17T15:03:07.253000
-CVE-2024-20285,0,0,d36fb14345749cb74a875c83b7e86dd8f9cf5d98ff610dbe60764544fa65b5a9,2024-10-22T14:37:01.363000
-CVE-2024-20286,0,0,e50f1391f4880e9953294a2306fc01d398d91359e27e66db826ebe145a6e7500,2024-10-22T14:44:16.063000
-CVE-2024-20287,0,0,8c0ac086339e49e5b56a18b782477e91a690f3a7c47264f8ae12fa792c1a78e4,2024-11-21T08:52:13.810000
-CVE-2024-20289,0,0,28c5eda9e4a1e1b1c2c5152abab4f53f8299cba51223697c5937899c97b89187,2024-08-29T13:25:27.537000
+CVE-2024-20280,0,1,adfc8ae1eeb37a2a0e8a35da9ac735e96ea8ce4435c8d0ec66d70f828de119d4,2024-10-31T15:35:23.060000
+CVE-2024-20281,0,1,5edfab59f75c378149d29c63dfaf5ab59d065a49bba9eb47d374776680ad4c7a,2024-11-21T08:52:13.080000
+CVE-2024-20282,0,1,4310500dc34b97ebad806f86bedf465422f648449fb01a408c1de1508e085e7b,2024-11-21T08:52:13.210000
+CVE-2024-20283,0,1,5b0ad17a1c8cc858c3fb0e45350a9c00f86d4c51fdc2becd2bce23d000139caf,2024-11-21T08:52:13.337000
+CVE-2024-20284,0,1,d5982ce3492e779a26e4cd0874315bacd89a9f40ac1ac254415ffe3458a91847,2024-10-17T15:03:07.253000
+CVE-2024-20285,0,1,e447442ea94decd1922f5ebff8beb02fbb9a139f6c25d436b75289296cbe7167,2024-10-22T14:37:01.363000
+CVE-2024-20286,0,1,85e23f2950ae4810a600e93514030caa8699d3aad395e782f498eb820818c91d,2024-10-22T14:44:16.063000
+CVE-2024-20287,0,1,f59e167771c566ea49a772716721cd0bee31092f0381b7acc8ce94fb9f699c84,2024-11-21T08:52:13.810000
+CVE-2024-20289,0,1,5a41bc3598f1aaec7151598e1fa9b8bdf8e15887462c2c995bc9a053cd9eb195,2024-08-29T13:25:27.537000
CVE-2024-2029,0,0,b4ec0fb87b25dbda385a151f4a9390a5913fdb85d70aeda457cf530e66ab8d7c,2024-11-21T09:08:52.600000
-CVE-2024-20290,0,0,c585c8b52061fa69914d0d558ec527055ed710dbb67866ec1ce868589ee54a19,2024-11-21T08:52:14.023000
-CVE-2024-20291,0,0,2cd4aa49555998bdb720a2c9a33a58d3e6b7a6f00aa20d17172a4fa5a983484b,2024-11-21T08:52:14.173000
-CVE-2024-20292,0,0,eeb5a92cb440ae51e312e734039c66b27253f016bf73b72d6d6232a256b9bee7,2024-11-21T08:52:14.293000
-CVE-2024-20293,0,0,678d797b4e681e192844b49b36e81b86c60608a916838542a1fdd8a968b6512a,2024-11-21T08:52:14.410000
-CVE-2024-20294,0,0,609001bf9c8192874cb65ef93c22d1dd6119cff4381af90ff7869f99c43c244e,2024-11-21T08:52:14.550000
-CVE-2024-20295,0,0,f6967cbf3e7b7116024704d47467073c34e339ac1b254fc5794e090ca06e92ad,2024-11-21T08:52:14.813000
-CVE-2024-20296,0,0,54048a507ceabb8071ca94e1fbb83e9f15e0a72f3ac578e6f097c5abe96e8df0,2024-11-21T08:52:14.977000
-CVE-2024-20297,0,0,ac4f2e7ad509335561109cb14626e81962483c9b90e54e2381c2e6718eb2f133,2024-10-25T12:56:36.827000
-CVE-2024-20298,0,0,c8cd0d4351735ce1f2c78b9d121db7b1be359f2f4089ad943b15f6e0c9940461,2024-10-31T19:25:31.523000
-CVE-2024-20299,0,0,5b71e6f7baf1a956508fa406e181dd31a6f03fe9618106a261e4c781ca5fc20a,2024-10-25T12:56:36.827000
+CVE-2024-20290,0,1,0babbf7a7f9d2f4798677a463b58b8e44a6aa9038067184cbb9fb6075566f6d6,2024-11-21T08:52:14.023000
+CVE-2024-20291,0,1,029c47a97724a22184840a9712db5c752c0968d20047e707848301e3d1a84644,2024-11-21T08:52:14.173000
+CVE-2024-20292,0,1,29a635fa04d8913692d0aadc0a9fcf66ba38aa82c290ce6e54a07328b7a6b761,2024-11-21T08:52:14.293000
+CVE-2024-20293,0,1,699e1ee34bc0f92d31d8dc082f608b5ec46fd158fcf8f4fea9b6469de92ce39e,2024-11-21T08:52:14.410000
+CVE-2024-20294,0,1,a7e79899a9eca655f52ace711fb53511da6db54120966d800bd4b619294f60f0,2024-11-21T08:52:14.550000
+CVE-2024-20295,0,1,1ff967f4ad8e670fbf5ce51dec8d2be2b1d861a90b7d824c96aaf5baa6a1dcfc,2024-11-21T08:52:14.813000
+CVE-2024-20296,0,1,a2c5e5c3b746e61363a51217243d2cd3777100cd29f766aa7b8f5946937d41ba,2024-11-21T08:52:14.977000
+CVE-2024-20297,0,1,17dee82d9c5784b00bbba426e187e0128058b27be720cbeca5c552cb54351680,2024-10-25T12:56:36.827000
+CVE-2024-20298,0,1,c176dc00948a2b0adc44e9434e8502044991acb45e290de075daed84f956492d,2024-10-31T19:25:31.523000
+CVE-2024-20299,0,1,65fa35648e4579cfebc5c23e99a9d7fcef4a936e9d99477694daf09563b8545d,2024-10-25T12:56:36.827000
CVE-2024-2030,0,0,7b76af7278d28b7f41a4d8c9693da8b31419db2993731d8e01ed07cf48059f09,2024-11-21T09:08:52.810000
-CVE-2024-20300,0,0,dd7c7dd107210b82ed9a76579e802e6ad71234e76bb5bdc3caba5533ccea0107,2024-11-01T20:14:59.393000
-CVE-2024-20301,0,0,7eaa0850411d07fd90373b471169b58d3bcc52e64200e05da7b6d3932265ac94,2024-11-21T08:52:17.907000
-CVE-2024-20302,0,0,d261ea21a81655821db8bd61526d2c60686d86f529c723a2de49e30a0ecba83c,2024-11-21T08:52:18.023000
-CVE-2024-20303,0,0,b83ed6b8ce03c096618d2bad968c72a63052375c6cbc1202d15fc3a96a241009,2024-11-21T08:52:18.157000
-CVE-2024-20304,0,0,834a00c74af52ec024a24d13159ac992712725df4f24e904f0406df90d6a4fa5,2024-10-03T14:20:07.680000
-CVE-2024-20305,0,0,da23aeb44f004592be0f5e210c753932c890c3b4f207b098041b3cb28589e781,2024-11-21T08:52:18.450000
-CVE-2024-20306,0,0,d1e0ec0e1c4b0ce5e70cf660bf3548bc6671cb8a9b9e1da9b5fbc9f0c667ec0a,2024-11-21T08:52:18.600000
-CVE-2024-20307,0,0,a6c3abc4e339eb65a0994c2aea29ddd2d198e7d01f963d4665c13e99d5d0dcf7,2024-11-21T08:52:18.737000
-CVE-2024-20308,0,0,253f78986ffa10eae939a25dc77a1ceb8ca5932fc30d68281609fe4a2ab4a666,2024-11-26T16:15:12.960000
-CVE-2024-20309,0,0,6b4b57e0c1dd48053522eb930d24f8311c76578a4512d977042f15a93ebc3430,2024-11-21T08:52:19.290000
+CVE-2024-20300,0,1,c2151cff897f92f1e62149d5bfff33ae8d2867de5d5923269d3cbccedd3848fe,2024-11-01T20:14:59.393000
+CVE-2024-20301,0,1,7aa32f3576c21d445123586fa7c40166e56d1854f6bcbf547fa2986c0b5d5e3e,2024-11-21T08:52:17.907000
+CVE-2024-20302,0,1,3658068802225617fe77b940ba4499e1c98647437d232370b13f001114af92ec,2024-11-21T08:52:18.023000
+CVE-2024-20303,0,1,39722f677aa5fcc08370fbf0670fda818a9bce0c2f9be09ce2e1c2c2ce497791,2024-11-21T08:52:18.157000
+CVE-2024-20304,0,1,f59929d4ee2b44d7536f77812cb12006cdc47f7a16a595b1606514d6161e064f,2024-10-03T14:20:07.680000
+CVE-2024-20305,0,1,bf4e229eeb86abd621b631185424994199aa8e5f1ce1ee169d81b389eb9114cb,2024-11-21T08:52:18.450000
+CVE-2024-20306,0,1,da88e22d1c02be9fdc6cbfe89db5d7e8af86893f16e7fe87e6872b4543960bd7,2024-11-21T08:52:18.600000
+CVE-2024-20307,0,1,601b50e63106903bdc8774c59e9ce5d6e44c1e420e6e2a0916a5899f36f7a7cb,2024-11-21T08:52:18.737000
+CVE-2024-20308,0,1,a198d9a5830ad55d4515f19c5dacac017f121cba3c44155e75db528d1c98a805,2024-11-26T16:15:12.960000
+CVE-2024-20309,0,1,4db169b8df55ce9ef7728bc6ce44c7b86a5a4e680a0cde09a602bf1399efb941,2024-11-21T08:52:19.290000
CVE-2024-2031,0,0,c0f76b49e0dbc287ab56220cd5b54643c16349c0841e4a9afcd72cb1c44572ad,2024-11-21T09:08:53
-CVE-2024-20310,0,0,f71601bbc6ee33b7a3449b44c9f79b589893fd2627666fd3dee8197dc59f07f4,2024-11-21T08:52:19.497000
-CVE-2024-20311,0,0,317e1041fd03ea3ad31f72be0aa6321447057dd01f0188a5d518ee9e0bd395b8,2024-11-21T08:52:19.683000
-CVE-2024-20312,0,0,dca300300641a0f1a79e1957bbd70b928350105f0645c982c9d40edfe3e0040d,2024-11-21T08:52:20.100000
-CVE-2024-20313,0,0,1072cc331976d132de124dd2e633a2c657e18ede46584665717919803679a1a8,2024-11-21T08:52:20.890000
-CVE-2024-20314,0,0,b16c7414244821ef26f84aaf082f997f3f5f6379c1f93d65383f26ecde79429f,2024-11-21T08:52:21.060000
-CVE-2024-20315,0,0,87d8d773e20c2612cac541cd57ecd68f2c5227dc3a0a3842272cba27f07a1b18,2024-11-21T08:52:21.273000
-CVE-2024-20316,0,0,cd503b680f729d38a27713399c6b3a1c331da7706db72226c8dc98350ecd5ceb,2024-11-21T08:52:21.410000
-CVE-2024-20317,0,0,fbb8fe4daa75fc580bbd7bb14dee8817e4166d248b4e7317e8a591395bd70686,2024-10-03T17:58:40.703000
-CVE-2024-20318,0,0,156154fda21be00705cb454fd0d7ec9d9a75ae3deaf0bdce0ece73ef29276996,2024-11-21T08:52:21.667000
-CVE-2024-20319,0,0,95f4348779ac03e47722aebeff7ec3e9c07f241a070a266af28b89b68198ef03,2024-11-21T08:52:21.800000
+CVE-2024-20310,0,1,b5320a73716791169e180b2e1614f680f6f9923c6656228c3dc9ca187d070893,2024-11-21T08:52:19.497000
+CVE-2024-20311,0,1,53b383d7383e9e3e537e817f6aac5140fa98d7170f0e570bca350aef715ae1d5,2024-11-21T08:52:19.683000
+CVE-2024-20312,0,1,f5fcf951f7e90ad8a1dec51aecd1f26e20d95e89d5208b503227941cfee15de6,2024-11-21T08:52:20.100000
+CVE-2024-20313,0,1,e0e15a530c0689a3762c376983b46e938a357d447cb246349107cc0b204d199d,2024-11-21T08:52:20.890000
+CVE-2024-20314,0,1,0d8e380300e50c4866522f51126c3f734eaebdd9d9fc59ebeee7a03e63e06ebb,2024-11-21T08:52:21.060000
+CVE-2024-20315,0,1,7d966db225cabf76c83361d4e7be47d53fbea678ec97467156623f2f786cebc5,2024-11-21T08:52:21.273000
+CVE-2024-20316,0,1,7252bea5b58c84da533634e80890ccb65b60a69c9abde262eec9778f8a0284b0,2024-11-21T08:52:21.410000
+CVE-2024-20317,0,1,eaf23e759a474ec31e5746f40765d2208848b4ce62f012f188cd21e63e77368d,2024-10-03T17:58:40.703000
+CVE-2024-20318,0,1,c4ba85965053ee7159e4722d567ee76802d2f3667e7ad75436ba0b81e59e65b2,2024-11-21T08:52:21.667000
+CVE-2024-20319,0,1,c511c55fc6ef9f83d73146dd0e6acfd8002e19b47547bbeceaf628341e47d39c,2024-11-21T08:52:21.800000
CVE-2024-2032,0,0,13bd6b29bff7da5d4af0383a2f79e7f7c7633030fe333ad4bafae2604534bbc4,2024-11-21T09:08:53.180000
-CVE-2024-20320,0,0,806d997d56b6e09d4bb38c560087d930bb974fb5c2b7701f8eca2fd875be353b,2024-11-21T08:52:21.960000
-CVE-2024-20321,0,0,20bc39e38bc5a299fb76cf9a5f3f52ef0525c44bca4ff63ab6386e2cc6a0fc82,2024-11-21T08:52:22.093000
-CVE-2024-20322,0,0,752a39f86ef95b21b00cdb58647a99e8ea40ce2a2d125728fab460cc1c3fd7f8,2024-11-21T08:52:22.250000
-CVE-2024-20323,0,0,c87b748ee866ad546ec2b34654fffb74f9ee73eb8868e5a043232241db1655f2,2024-11-21T08:52:22.403000
-CVE-2024-20324,0,0,9d817a141aae3e1edd022694e4e510db95dbe0121afb9e40e7ba348ef5b16761,2024-11-21T08:52:22.527000
-CVE-2024-20325,0,0,21a6de71abaea7a76208a54dad4f7e7688ddb0348489f2edd3c898d53cebae9d,2024-11-21T08:52:22.667000
-CVE-2024-20326,0,0,cfc91001ace5af18a47e5fe5dc2997c2e9c4bfdb51cdc1a1059d3c242f801109,2024-11-21T08:52:22.797000
-CVE-2024-20327,0,0,714f57762b1717a3981aad34025b82338888f4b9154603a864dc463c2d69b787,2024-11-21T08:52:22.960000
-CVE-2024-20328,0,0,8ab852e54b86bb772c3d4ed9c0f5302f5a3ad7dd1c592c719f611555607b6c47,2024-11-21T08:52:23.097000
-CVE-2024-20329,0,0,1c1595143f58a04fac2ac8342db4e47713579a6cea31adc507fa2f3956add9f2,2024-10-25T12:56:36.827000
+CVE-2024-20320,0,1,2f46b06370719cc80deb7a63ab7f9e68472355f61c5a52c6ab7045103549e170,2024-11-21T08:52:21.960000
+CVE-2024-20321,0,1,f153f4ff6e1241721cd7fec8ab4f8520dca1379d972fd091d662401131f3003c,2024-11-21T08:52:22.093000
+CVE-2024-20322,0,1,bf13e9696b0837945e00b681ad785f69917a81b9fe89355bd292ea2bde497686,2024-11-21T08:52:22.250000
+CVE-2024-20323,0,1,e5db4624bad845a694363c180fe8148885ad9de4b3d07ec25b52a87202ca66a6,2024-11-21T08:52:22.403000
+CVE-2024-20324,0,1,7a51f8f50e105ff17ffb80c19a2f418dcc611aa90071eaf23c16480803590fd8,2024-11-21T08:52:22.527000
+CVE-2024-20325,0,1,f8331ff22efdee0a28be92992655c988daadc5ffbf9cb27710bd653edd824c17,2024-11-21T08:52:22.667000
+CVE-2024-20326,0,1,e89b5b9a93761d4c10c9dabb769a04585a4c6dfd5ac72d424acdaadeea5aa608,2024-11-21T08:52:22.797000
+CVE-2024-20327,0,1,70cf48781b23c6b5ba7983c77746f00b650378fa4234950a9ab901718265e6db,2024-11-21T08:52:22.960000
+CVE-2024-20328,0,1,a3ff84291d20bf96d6fc851b16141247b591cbd5b63d9b2665b578057f6f87f5,2024-11-21T08:52:23.097000
+CVE-2024-20329,0,1,59bc89e172c3db01e2da16247216791562db76304a4e6467b9f47a122f82d155,2024-10-25T12:56:36.827000
CVE-2024-2033,0,0,8a9325accbb5e95011f069183eb95b4369668f581b52d1c64931eabfc42d1fe9,2024-11-21T09:08:53.393000
-CVE-2024-20330,0,0,19a6613130376259d011b549af2b2a6bb4c732bc05997405d720a50d47f483ca,2024-10-25T12:56:36.827000
-CVE-2024-20331,0,0,bb8c723a10d5bc13fd36587bc41da3c53139018116d936b90d887de8334f5d90,2024-11-01T17:32:56.807000
-CVE-2024-20332,0,0,6da285178a6ae0e9f2d872a18b818a09ae61c45fbafc07cd3feccc4a44eb29df,2024-11-21T08:52:23.593000
-CVE-2024-20333,0,0,277b1e8fa1b2bf7d8c869c54673507d54f5dd15c530cbbec452b8231ca738988,2024-11-21T08:52:23.783000
-CVE-2024-20334,0,0,6e7b278c3e2f46a008b421d149648ac1a9e23aeb1aba6d34d8030b0ec41d0254,2024-11-21T08:52:23.913000
-CVE-2024-20335,0,0,fa2114f2be229a799fd4384dff28a55924e5d9991846d4394dbafd1ff1d6c07a,2024-11-21T08:52:24.043000
-CVE-2024-20336,0,0,d4a28e7ca684fd4276671ca531c123650b801e475d28a93acbfb2d525413de0d,2024-11-21T08:52:24.187000
-CVE-2024-20337,0,0,8f9b73cc3dc825763bedfb5f1721547a66b80fa40eb33645412f9016247f5582,2024-11-21T08:52:24.313000
-CVE-2024-20338,0,0,ca4843067c4da30bbb3f01525a545fb9de11e060dcc215ecc535aad62ff8f56b,2024-11-21T08:52:24.457000
-CVE-2024-20339,0,0,94ac06b012520dee95a6ca36fdab6f6b7d2db7e2b8d6560499db3979f111ac8f,2024-10-25T12:56:36.827000
-CVE-2024-20340,0,0,b2dbe38c45a22964e4a8be4a5c662f6c83eef54f6dd511860a120842bbafcd85,2024-11-01T17:40:30.980000
-CVE-2024-20341,0,0,1cbedc76667b6941a6fb9da7635e5f7b766cf4de7b6265c72e00ce648d8cca2e,2024-11-01T17:22:26.577000
-CVE-2024-20342,0,0,db1d0c21b72dd8c64ae0e3a4a8cf6d0e199d8f767aface3296a1c63ea389af1c,2025-01-13T18:15:17.057000
-CVE-2024-20343,0,0,9009169a3fc35272ca85d4387127dc13ddbde156dae8091d383bb29318a93684,2024-10-07T17:42:40.777000
-CVE-2024-20344,0,0,afdf0b6fd6474a87390aca4a2c4b23109b5f07756453a6d0aa3a40e4b8058114,2024-11-21T08:52:25.117000
-CVE-2024-20345,0,0,c290f9e3041f6c749f5dac4109f1eede5e1b312ce5a83808ae887ee951a69f81,2024-11-21T08:52:25.243000
-CVE-2024-20346,0,0,a5af586efdeb1ad39e874f56c378865dadd8c42801084ade755b9d2ecd6b1bbd,2024-11-21T08:52:25.453000
-CVE-2024-20347,0,0,5317dbc4d5aafb4487effb85494c31a2ee223793bcd17db760f52965ffba24aa,2024-11-21T08:52:25.580000
-CVE-2024-20348,0,0,2055efdd4bbb72ab7c88eae1b593f9a991c6d8e3eaba1173c9b23653b2375fc0,2024-11-21T08:52:25.713000
+CVE-2024-20330,0,1,8ba79e64256db4e20d7f893356c700012d7764696ed4a35022c6cfb9fef2a9fa,2024-10-25T12:56:36.827000
+CVE-2024-20331,0,1,7ac19cd54d374beecf09f7a9d9f0b2bee3bd547342030b289664e259437b39b2,2024-11-01T17:32:56.807000
+CVE-2024-20332,0,1,46b2c8c2411c895c99fa2d0fa26fd7e984202568bc481d7b550cc3d68cd89d2f,2024-11-21T08:52:23.593000
+CVE-2024-20333,0,1,8e2fd6f0b062d71bcf9fa926927097bc7a56d2fdf082ea72f06b540b126cfeb7,2024-11-21T08:52:23.783000
+CVE-2024-20334,0,1,e531e2ec613863e9bf8febab590c1772abc2dd32d3c58b3badbcc44327cbe429,2024-11-21T08:52:23.913000
+CVE-2024-20335,0,1,38da38af3b0a791913c57da5fdee6d056dbcc4c51a9bcdc9c7606a00e5b5c636,2024-11-21T08:52:24.043000
+CVE-2024-20336,0,1,ce2f17937ab632a6dd5ae0dfb4b584ea61fa32a5289ff3d135f5359888926e79,2024-11-21T08:52:24.187000
+CVE-2024-20337,0,1,9e85641f7c77db635a02043d08d0522963b3975b9006a98a3520c713ab0fc772,2024-11-21T08:52:24.313000
+CVE-2024-20338,0,1,f5814cea0ef3f59b22c99167cfc54255d8a53b81fd388ba8cb5e070b1e5d2c66,2024-11-21T08:52:24.457000
+CVE-2024-20339,0,1,4de56819789bb33a1ac82035c88be48db3a65635cfe382559ba012cc82bc9b14,2024-10-25T12:56:36.827000
+CVE-2024-20340,0,1,fe4482dcdc77c0ebd8faae5a95f538ca1c1cd64b003318fdb2f508c7ad378587,2024-11-01T17:40:30.980000
+CVE-2024-20341,0,1,9651f6f38501301c3bd30b4b19b07df359bcab6057dd117ec8a01cdc718cfdbb,2024-11-01T17:22:26.577000
+CVE-2024-20342,0,1,eb1806cb116ea10d26bc07727e16c89c1044a495927bbc73bf967ad54f284ddc,2025-01-13T18:15:17.057000
+CVE-2024-20343,0,1,e801b24910791de89ac056a612768d12f67c1a71b10adf39fbb30483542cf9c3,2024-10-07T17:42:40.777000
+CVE-2024-20344,0,1,ba0790bcab4abd6157c437f510281a8bc5f968273a90f35e5753f323a29b65ca,2024-11-21T08:52:25.117000
+CVE-2024-20345,0,1,49def1fa4dbd6745bec814206debec0a0ae40b7466d8dcc24adba4e8c49a675d,2024-11-21T08:52:25.243000
+CVE-2024-20346,0,1,80a231653731820eb812f047efc0bb1fd76ea9c02656ba45ca12552003770e1c,2024-11-21T08:52:25.453000
+CVE-2024-20347,0,1,15a836b9396306feebd782ab83b096b034741620824e10f6935ccbef13b342da,2024-11-21T08:52:25.580000
+CVE-2024-20348,0,1,44babd83706f062781cfcfd8b26dce28aa5a43e9cc54e2639eaeacb64f61d227,2024-11-21T08:52:25.713000
CVE-2024-2035,0,0,62f67efe3bff80d7eeb666947202c8eb3b1462042806276c31fd899b7244c65a,2024-11-21T09:08:53.557000
-CVE-2024-20350,0,0,84ec57280e015f3f4750579ae8884f75f236b2b2b2f8247363c35c182b7426b2,2024-09-26T13:32:02.803000
-CVE-2024-20351,0,0,88c4e6de1790c5078086765f314dc714da6cf1349397167343d94d9f705255ce,2024-10-25T12:56:36.827000
-CVE-2024-20352,0,0,3c7bb34b14263d039811e9fa86af4580489654ff01d924f74abfc055ed86fb8c,2024-11-21T08:52:26.143000
-CVE-2024-20353,0,0,62e3064d50e14d69249c0e3d3c1781f4ebb1602e68ed8d6ddbf34d91ad4ef700,2024-11-21T08:52:26.293000
-CVE-2024-20354,0,0,a1d21779fb7f57309545272b152c35c43de625e2c50f041c30a7ce86f4736c4e,2024-11-21T08:52:26.567000
-CVE-2024-20355,0,0,44e88637b68dcc6e418b3c922f5ce5e336da95dc837a947d0ed1aed1aa93fdec,2024-11-21T08:52:26.693000
-CVE-2024-20356,0,0,e2e297f3a6d7182b9f74f3674ebe12b9c737e8c9bb02675fb9bb71877fecb1ee,2024-11-21T08:52:26.907000
-CVE-2024-20357,0,0,5135e40f30b5459fe01b6f1fb1c4cbefba7614860de58d4b0453b407225709ea,2024-11-21T08:52:27.070000
-CVE-2024-20358,0,0,558be6036b42456b4e4c43397446cf61b9f92a4374566379f79750fc53caaf70,2024-11-21T08:52:27.227000
-CVE-2024-20359,0,0,a754ef6c3f676554b552ca6510030bdbd21042655068d7dccd8571f99473645a,2024-11-21T08:52:27.520000
+CVE-2024-20350,0,1,722c34b38db3d24c9df5aa7e4608d92421cb6d77d11257327514c99d146757b3,2024-09-26T13:32:02.803000
+CVE-2024-20351,0,1,1fbae8efd22d51d5a49adf6ef1f73727465a1156a9d0a6fed3972bc290a977b9,2024-10-25T12:56:36.827000
+CVE-2024-20352,0,1,6db7ecc361b42b365eb47e0632a9ca4f01d5ac8c788709f957e9fb7efb268190,2024-11-21T08:52:26.143000
+CVE-2024-20353,0,1,96b4c8258edd1c36d86fdae6a846a254d7dddb4eadb1c0c4953bc2bebde335c6,2024-11-21T08:52:26.293000
+CVE-2024-20354,0,1,86958fcb35d1d5e4184932239b1fbaf8ede8ec4dd0c93ef81b2764f1ebfd85a2,2024-11-21T08:52:26.567000
+CVE-2024-20355,0,1,d8bf94417bf9a508c0abc16d98f7596493be5d633c7c5a31c4f1a71b43a34209,2024-11-21T08:52:26.693000
+CVE-2024-20356,0,1,71834e73863730f09ca066514676e74b9356c8487e0b1bae8a72859c2a232946,2024-11-21T08:52:26.907000
+CVE-2024-20357,0,1,d920ce6d535e37f833ef0d2f9c9ebbc5be7a1cb91f3ebb2cec23a50901503c8b,2024-11-21T08:52:27.070000
+CVE-2024-20358,0,1,f7a6de631c6351582c731e2be6aad77084995daf762db4ac931fbdcc1703a24a,2024-11-21T08:52:27.227000
+CVE-2024-20359,0,1,9ac57dddf9f95b4512a6cd7360dc711abff939330471994a971e26bd460d04fc,2024-11-21T08:52:27.520000
CVE-2024-2036,0,0,cce5dc1cdbaac5f6eff2f1180a36f4b6cbaa96401b6764188556d1bc2f216085,2024-11-21T09:08:53.750000
-CVE-2024-20360,0,0,e3e3030790b661d9a3813196c09308b3f241e635e772d442e9ebd45accfc5242,2024-11-26T16:09:02.407000
-CVE-2024-20361,0,0,2d32438c601abe5d36f9c8e7170d2a154a455bccb4a8d7fc7ca6df2a0a4d842c,2024-11-21T08:52:27.917000
-CVE-2024-20362,0,0,80026b1a5860532d9fb3570b216a0e76248c049c1b426c059b4eb297da02e66d,2024-11-21T08:52:28.043000
-CVE-2024-20363,0,0,5ee0ca52dc6f8b4a150d31c16a3f7e1e40b2e423efbc1727e920d2906556b537,2024-11-21T08:52:28.177000
-CVE-2024-20364,0,0,123625a2727b98e6426e5911b4dec9c4ff2e8b60f41b3bd737df8b98bfa8cbc1,2024-10-31T19:36:32.277000
-CVE-2024-20365,0,0,ebb7f590a311feb2e7bd567e32a39b27eacb6afe4044aeb76c47c9dcc3dee70c,2024-10-08T14:28:42.727000
-CVE-2024-20366,0,0,506ebe49bfeca2834d45e956dc007255a0e558d33a75334391b02a0e34a5ccde,2024-11-21T08:52:28.580000
-CVE-2024-20367,0,0,03e844bbf806d7d90b38864a68a3fd78cccc6f983be815c22894edba45125105,2024-11-21T08:52:28.747000
-CVE-2024-20368,0,0,c39c2fe519f77ba47b97c76acf7969dcbc429cbd07d4650eee6022c3f5c8926b,2024-11-21T08:52:28.880000
-CVE-2024-20369,0,0,77f54c5fe03ea725e38c9c1b77cb1be1ab926cbe398941ab4dbb6c06c27277d6,2024-11-21T08:52:29
-CVE-2024-20370,0,0,619948722299cc55e263e4bbfd893b27c2889887c5728a41b5b9f4d84d853f45,2024-10-25T12:56:36.827000
-CVE-2024-20371,0,0,c9f296d117db550cbc917da20410ce6e1bb46d454b399a90643882a82949b9f8,2024-11-06T18:17:17.287000
-CVE-2024-20372,0,0,6bb91171433bb6134cea3f0f415bf4a5a94eeb02d285dadd20eaf0ab8f523752,2024-11-26T16:09:02.407000
-CVE-2024-20373,0,0,5d8f07a279dcb9ae2e95138902bd65907a1f64dc3b19c7489e9e294d5c752aaa,2024-11-18T17:11:56.587000
-CVE-2024-20374,0,0,4c1e2da1046fae3ae2e61944d00509b2a4647b5cfd314729022de8b3624662b0,2024-10-25T12:56:36.827000
-CVE-2024-20375,0,0,50c956173fe2cb7b40e1f96326dc64fc85eb246ab4db76c56e671bf7a7e55246,2024-08-21T17:24:59.627000
-CVE-2024-20376,0,0,ae8e5f5f6e117ab3739e6879ba29df59e26ba0c5da123dffc37d4aa4099c6ed2,2024-11-21T08:52:29.887000
-CVE-2024-20377,0,0,3c6125ddb7eacd37b53824bb1ad80f04b4ad2ef64d5ef1bc62ccd481ba58bba4,2024-11-01T17:30:14.350000
-CVE-2024-20378,0,0,c33a0908d93d74a8e9fa28f0954d90bd0b39a999d4c803c44d8a0dca0a858bc3,2024-11-21T08:52:30.107000
-CVE-2024-20379,0,0,63d95b58425657a2a9055ad8c823df7658107125ef9d731e75db9dc0d90c7082,2024-11-26T16:09:02.407000
+CVE-2024-20360,0,1,1cc6cb730bd37f0c290f98d17250280a800acbad17e369ef22e9e1de646a0421,2024-11-26T16:09:02.407000
+CVE-2024-20361,0,1,9e93cdb9263e9a217a71aed7440962e851abd8d5c957e8d5e2d6a28bc2963f7e,2024-11-21T08:52:27.917000
+CVE-2024-20362,0,1,b2eecea1d57e10a097b06d5bf6573b97956829142401d9b159d6a1f48a59a754,2024-11-21T08:52:28.043000
+CVE-2024-20363,0,1,06a385ab1b37faff5c0e60175d9e842d8bd19edab9dd3cb05e77f815bcc09852,2024-11-21T08:52:28.177000
+CVE-2024-20364,0,1,c5405000928525c64fadecc07a7fa1d517a3b2e6594a34d0cec6f4ddca10f3d6,2024-10-31T19:36:32.277000
+CVE-2024-20365,0,1,f5776eeb755aa3513fa03e080cdea4b58f9f5b0833ee2e847af680ba6e6c96bd,2024-10-08T14:28:42.727000
+CVE-2024-20366,0,1,878acf3af28e1d07c1a2dce5f253d326f3d79bbd2ad9992d47d307313a395b9a,2024-11-21T08:52:28.580000
+CVE-2024-20367,0,1,2abcb11ee10463b7d253ebbc45115fe5fa69d9053bf37e4a47712f8752d70f92,2024-11-21T08:52:28.747000
+CVE-2024-20368,0,1,0dea68491e336726bb7beaeabac7ad5a6d92774280889fc2bd287b538b2a9416,2024-11-21T08:52:28.880000
+CVE-2024-20369,0,1,e688929ef200ef7078ef890b338a8bc0eed5f555e4cae8415fa3d567b984d10e,2024-11-21T08:52:29
+CVE-2024-20370,0,1,12ca33b57906c89e9f04aab6c8dd3b6057b12d4f2e523599e9a3d04b119c32e7,2024-10-25T12:56:36.827000
+CVE-2024-20371,0,1,864b4688dc510e6e88eaca5637bc36efd587712a23b9216e6371539f84e30743,2024-11-06T18:17:17.287000
+CVE-2024-20372,0,1,93a6e397043c3e3829ddb184e4e2c4ba0788f1ded31800181384ad2b04918225,2024-11-26T16:09:02.407000
+CVE-2024-20373,0,1,3f369e79041d3a277fcd8f756f2a7ca2dd4ef74fa516883daab97c34e6b7c1db,2024-11-18T17:11:56.587000
+CVE-2024-20374,0,1,5825f5ef58e6a1c60a98b83779b0bf926825033b318b55d1828ea6cc76fa135a,2024-10-25T12:56:36.827000
+CVE-2024-20375,0,1,76452cbc643dd64ff99fa4a08a367f7941c1a52367260d5846ec4084cc664322,2024-08-21T17:24:59.627000
+CVE-2024-20376,0,1,4d9ef321dca2c56af9f11193ff6f6d8605c6a22823024e74564ceebb7c9450b8,2024-11-21T08:52:29.887000
+CVE-2024-20377,0,1,738d1f26080969998de2b0d240ec661cdf346903ba67909b455df35ae7b33be8,2024-11-01T17:30:14.350000
+CVE-2024-20378,0,1,cfdb67e4484c7d8352327e09adf5dee399eedf525c90419f788b5041a7cfa93c,2024-11-21T08:52:30.107000
+CVE-2024-20379,0,1,f6b182aba1f5bea74c992ea3496378e31429790ebaa564f57ec1bdcd738a12f1,2024-11-26T16:09:02.407000
CVE-2024-2038,0,0,a3a7a3e24ecae0b84a6a9e24c5c693be1d1fdd37db796b330eac6b7e8cd72018,2024-11-21T09:08:54.393000
-CVE-2024-20380,0,0,3f9b1f2bf5b2a9d6fa2d6a33647034b7a71bbb12771f5a6f0588d16d5edc7f73,2024-11-21T08:52:30.310000
-CVE-2024-20381,0,0,15bcbfca397c180c0f30d3197386d9fb055afc36e272e630b741ff7b6f53697d,2024-10-08T21:43:28.757000
-CVE-2024-20382,0,0,8c18c3c3fd08108622878a23f3381a851baf1ea513ee05e0b5500a898d00e051,2024-10-25T12:56:36.827000
-CVE-2024-20383,0,0,ecefaed83b3d2e9d0f2dacf2b312878ad674a1971f6fefcfa966497876bf8b3f,2024-11-21T08:52:30.840000
-CVE-2024-20384,0,0,bbc1c9757e460dfe66761aadedb6d4120344ebb7f7b3087864f7d379cdb3205e,2024-10-25T12:56:36.827000
-CVE-2024-20385,0,0,5840365b65c6ed838be95bdd10482c5931ee0a928c0465e43c1bdce09f9ba497,2024-10-08T14:22:34.120000
-CVE-2024-20386,0,0,b96046a97670a151ce12189f06e411eb40fad0de410d486e478357c43393e004,2024-11-26T16:09:02.407000
-CVE-2024-20387,0,0,e20c2aa13ce82fed24a6a7910284bf5bc555b8b424e9759f113199fcbf0018fa,2024-11-26T16:09:02.407000
-CVE-2024-20388,0,0,615a8820b87cb393b5ec95040472732927354e59a1f384bcfc7ee910cde88f5f,2024-11-26T16:09:02.407000
-CVE-2024-20389,0,0,2fca213fa866e05f23c37fa9b9f513de66d2ab89a2b34eea400e03bbf0247813,2024-11-21T08:52:31.623000
+CVE-2024-20380,0,1,52ff045cdd3863bab68c233643aecbc307a3fb67fe28e04320763830e99a3824,2024-11-21T08:52:30.310000
+CVE-2024-20381,0,1,c0c1e72d09de162858c50f3eb24b8e3b2eaddf6db3013286ef5d0324b4df5094,2024-10-08T21:43:28.757000
+CVE-2024-20382,0,1,98706a146970261034fff0d9fdea599678182726a9406ba91b6bcfbb0d9466e9,2024-10-25T12:56:36.827000
+CVE-2024-20383,0,1,617126a1a30b56caa324787ca2c439bbb2e8383571de91ef560adba715caef73,2024-11-21T08:52:30.840000
+CVE-2024-20384,0,1,0a746f9fe8687840f9d3d1db9400d7af0ab805422e416850a25ec8a34da8c34a,2024-10-25T12:56:36.827000
+CVE-2024-20385,0,1,7736e77dbc744ce9555e0ea6627eea3f34e81d95a75ed68714b7ae9537ea24d9,2024-10-08T14:22:34.120000
+CVE-2024-20386,0,1,cd23038885826b0a3dd2517356b7509be5fd6a56ca82538bcf8f3e784174bab7,2024-11-26T16:09:02.407000
+CVE-2024-20387,0,1,ce3f3eacf2f59db18b66578c88625ea668d9017f62e73b8ea5b90e0dfcab294e,2024-11-26T16:09:02.407000
+CVE-2024-20388,0,1,ae9862d0783cd7e9de3654b37a6a8e06cd192adae2fbb4216446d4d859633764,2024-11-26T16:09:02.407000
+CVE-2024-20389,0,1,0a0a12ba66492de13a9e2424cc5f50ba5b96d62ce3c2428194bc42e2ceb15424,2024-11-21T08:52:31.623000
CVE-2024-2039,0,0,e18643695a5376bfcbddecb8e1b0aaf75f0a0ee6b1ff7f67c51f0fd57181fed1,2024-11-21T09:08:54.520000
-CVE-2024-20390,0,0,f01dc67dd7eed08a3d624fd6491dbe75e39a544959f6f9fb367692d36a483ee8,2024-10-07T17:51:37.197000
-CVE-2024-20391,0,0,cbb0b4c6bb6a967c1257063d14577a675b2978f44861dc52773cb5be271df37a,2024-11-21T08:52:31.933000
-CVE-2024-20392,0,0,df01806afae9c89be9eae9fb309cb08c222999d7360162730bac0ae125fa1854,2024-11-21T08:52:32.110000
-CVE-2024-20393,0,0,9dfd60bfda69601d849cafe1adcacbad6487d2db7e8ce603a44aa7f4f733c334,2024-10-08T14:37:39.713000
-CVE-2024-20394,0,0,e360755066de35879cf415bbf95ab052ac7715b2d39a99c40bd527132fe035a6,2024-11-21T08:52:32.420000
-CVE-2024-20395,0,0,c1a65901e397a66108ac66488dbf4519f76e4c8728d42e9adcdf1d9a0df2a559,2024-11-21T08:52:32.550000
-CVE-2024-20396,0,0,d8e2095c7659f9e1acfd2305376731068b8258d839477091b0f23eb27e6b435f,2024-11-21T08:52:32.730000
-CVE-2024-20397,0,0,b0bdba04f3f2600887828c9f10702731f78d46b3fbd2ccb026ad8d7cd109e64b,2024-12-04T17:15:11.913000
-CVE-2024-20398,0,0,594b3a1f473de8cc49ecff6e4d487ce2079fbf700a7f237ef2c942d17f455b6e,2024-10-03T01:47:52.180000
-CVE-2024-20399,0,0,8a3ac1380990a51d1d233b79b984aac0ff856080e3c999ab66ae4e6c9a4ea9f6,2024-11-21T08:52:33.020000
+CVE-2024-20390,0,1,b74e2cfc7630cb84af507ea8c0cec49f21920c27a6f6e843e095f70ce8d681a9,2024-10-07T17:51:37.197000
+CVE-2024-20391,0,1,a4ccc5940f63444616342b0b99c4d84185497641bf7f2ca03e6188783b861d8b,2024-11-21T08:52:31.933000
+CVE-2024-20392,0,1,3cdb0c7adc0291de7838a440a96f7c9a913a3f249c60d6594acf472b9f25cc97,2024-11-21T08:52:32.110000
+CVE-2024-20393,0,1,2db3c130cff6cc162c1a823926fa04e603b7e4863eec6227e311c81194e40d0d,2024-10-08T14:37:39.713000
+CVE-2024-20394,0,1,4645b2259557993c10b6f578b443c1751262365b93ba95a469fc7513c303a2af,2024-11-21T08:52:32.420000
+CVE-2024-20395,0,1,05c9b3bbe9b1c76536006da61a830671343ebdd5500b0dbb7197429cb514d73c,2024-11-21T08:52:32.550000
+CVE-2024-20396,0,1,2fa46557b15efcb086664f649b28cd615ce050d3699b2dd562d33c582e15f606,2024-11-21T08:52:32.730000
+CVE-2024-20397,0,1,aa4896e89ee908718eecc98e40b69e64acb07e6a64db55a63dfd8f439e37d14c,2024-12-04T17:15:11.913000
+CVE-2024-20398,0,1,ad94ddbee337fdbedef878aafe901697326ecfd5c44018c2989edc63738be41d,2024-10-03T01:47:52.180000
+CVE-2024-20399,0,1,73a39d8cf1d3d49b37fdb23fcf8559f38f781e6538c474b9e0edfbcdd484a622,2024-11-21T08:52:33.020000
CVE-2024-2040,0,0,fe2c4a8cd2b76f197f22c1f39fe3e9aeb3f40523d47d262db413af0b6d066a4b,2024-11-21T09:08:54.640000
-CVE-2024-20400,0,0,04001f243da3806c28e3b6fd904bbae04af18f99d7aea5bedf9ef6fb2c23c761,2024-11-21T08:52:33.397000
-CVE-2024-20401,0,0,4ddb2eb1ae9764d98715ccad966cba45fc3a5d371a787ada2c9c22bfb916251c,2024-11-21T08:52:33.533000
-CVE-2024-20402,0,0,e6581fcd98ba7bf54455a3a2b228da339e1d1b52e8f2738f30aa33b3a0dd0afe,2024-10-25T12:56:36.827000
-CVE-2024-20403,0,0,1e592e0b42edeaa186f51584ebf8a28a1604182b03cc353b670a5d2810b5e3bd,2024-11-26T16:09:02.407000
-CVE-2024-20404,0,0,3034664b739ca50c61a7d2a6c062d4c4eb1a65248ed841b5b66a8f9b2fe8dd8d,2024-11-21T08:52:33.903000
-CVE-2024-20405,0,0,206f419b09662279135eb9ec115ba3480ae006e9265da06ed66064b5d1a4f587,2024-11-21T08:52:34.050000
-CVE-2024-20406,0,0,431cce9d05b92f1395c6f9f9bf3a350c77e6f95a69cec09d1765856194bffb27,2024-10-07T17:56:43.103000
-CVE-2024-20407,0,0,42f178dadde1255b04073a2fcd7f2a4193e3690f70b12b08aa8b0980df944b92,2024-10-25T12:56:36.827000
-CVE-2024-20408,0,0,b474d050877284592dfe26eb6a100f84ad8443a9b84484eeed3e43fb2cd5bf4b,2024-10-25T12:56:36.827000
-CVE-2024-20409,0,0,f372944e64846dfccdeb00f1e34784b212803ee2f1ce1c38c917b7b1685a0dda,2024-11-26T16:09:02.407000
+CVE-2024-20400,0,1,7b1dc2e034227256f41c23cdf5d45d55baa77437912361b0c9fa21d0ec1b122e,2024-11-21T08:52:33.397000
+CVE-2024-20401,0,1,9f30a31d3cf086d83fe7e825007ce5be32058e573c8fc6bbb6a9596974e3ef30,2024-11-21T08:52:33.533000
+CVE-2024-20402,0,1,db19643676732fd9856176607cdd469a3818fe750250c1e6187c0e90824cee5c,2024-10-25T12:56:36.827000
+CVE-2024-20403,0,1,0d8a3717bc4e337654f2c37ddba1dee3b027dacec4aa8a64edd941278adec513,2024-11-26T16:09:02.407000
+CVE-2024-20404,0,1,10cf7536f9477d3ef5e64ff3f6aa523a1d788bed1c7f22748878f317fccb1d66,2024-11-21T08:52:33.903000
+CVE-2024-20405,0,1,877b29b3703ccbae7f00647e2740c9712adc9fbadaf09dafb494a9b4270666ca,2024-11-21T08:52:34.050000
+CVE-2024-20406,0,1,e73c6b44530967bff0bfd03e9910b0a319ee3aa14bd98c47397024a524d5449e,2024-10-07T17:56:43.103000
+CVE-2024-20407,0,1,7cac1a6dd606ce07a180499ad9469d18618bd2774e6877a4903c97b9ffff8482,2024-10-25T12:56:36.827000
+CVE-2024-20408,0,1,c4398c6108f9cc49469e1901dc62531e4d071b3a3ba698ec6def2bea98bce120,2024-10-25T12:56:36.827000
+CVE-2024-20409,0,1,d5605d8540e5eedb8f09d172928ef92a5efdcc7148b9b210a16397bb2941b4be,2024-11-26T16:09:02.407000
CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000
-CVE-2024-20410,0,0,ee778b7de8931ea902974e86dfc11f7cb4652262e3cf006830a387bb1e84a7ad,2024-11-26T16:09:02.407000
-CVE-2024-20411,0,0,ff16753e33698c3c77f668888cb14613a11fa957d78ff502f3e66bcd3e9dda09,2024-08-29T13:25:27.537000
-CVE-2024-20412,0,0,50508a346e636b2796e8c685515a4062bb006e1a07f1bcf7e2f3458dc0965391,2024-11-05T15:03:34.777000
-CVE-2024-20413,0,0,38e65d996b1ec1f0a7a7b0687e8767c6db2a622903f50c0bd516cddaeeeb5975,2024-08-29T13:25:27.537000
-CVE-2024-20414,0,0,6755c252f5c0af1ee414f2df029cad9fa37f0173f682f70523412c37038927db,2024-10-02T20:02:22.740000
-CVE-2024-20415,0,0,b9490545fa9dea4ef9694eddd2d963fd2673675265a49572022f86b97792c597,2024-11-26T16:09:02.407000
-CVE-2024-20416,0,0,273ee00425f01d60b03c693c8cbc646195093da5a971d2cedee90941275bcc12,2024-11-21T08:52:35.527000
-CVE-2024-20417,0,0,8d6689b774b826299be686eb353fb8c6a46665a0574bf3b92cad6c4181365066,2024-08-22T12:48:02.790000
-CVE-2024-20418,0,0,78e92fa90165573b2bf91db19398fd27b2d59cbe1df9f9973b1fe6c910c833d8,2024-11-06T18:17:17.287000
-CVE-2024-20419,0,0,b7a07e52e55ec37dcedd038a63d58760cf8d25f8aeb5d5655fd15240f80b5276,2024-11-21T08:52:35.887000
+CVE-2024-20410,0,1,8fea5ccd1acef6dfb8bc48978b0307c40316bb2b1c2cd0d5af46892a39c96afd,2024-11-26T16:09:02.407000
+CVE-2024-20411,0,1,94f4826b992e1bbfdde8843d11d1d470934a46310c9a4fa11c62123a849aa942,2024-08-29T13:25:27.537000
+CVE-2024-20412,0,1,dc3361ed506b3ee917c34eddc67801216dd3af012afdd442489897a88f60cf42,2024-11-05T15:03:34.777000
+CVE-2024-20413,0,1,c74574601545b52b08a203f184fb98aef132a438c49280c58ccaf64e34bb34be,2024-08-29T13:25:27.537000
+CVE-2024-20414,0,1,3d6652417ed72d4d7a2ef686becd0993dde1cad8ff463c417f1b9a86d5cd24bf,2024-10-02T20:02:22.740000
+CVE-2024-20415,0,1,9aadfd72e111380413a24f63d6892e9f0ccca43f5c8d9ca110fb3bf7dff7bbe2,2024-11-26T16:09:02.407000
+CVE-2024-20416,0,1,b25da691aa6481833628529acbf04a5fe1c1f01fc22e0fd9040eebf9e9a6b91e,2024-11-21T08:52:35.527000
+CVE-2024-20417,0,1,9d3cfbeadfdd9791a2fce4fd45151d9421b60c00f95913cbf1c9eced92812488,2024-08-22T12:48:02.790000
+CVE-2024-20418,0,1,ffa23cfeb0d8518c73a4b617f45b9de926f199e4eb74d67df3f552f46fd4035e,2024-11-06T18:17:17.287000
+CVE-2024-20419,0,1,02e69f0e77deb076ed79d84af213228ca892e559170badf299218b58c0153dd3,2024-11-21T08:52:35.887000
CVE-2024-2042,0,0,08e54f8cbf88478a6dc057bcb8ac9f29d00de3bbfb904223d2b0e22660927020,2025-01-17T19:57:25.747000
-CVE-2024-20420,0,0,83b9e03d7a71760da83231fa0a3cc89531489fdb524ac42b99087108afa4413f,2024-10-31T14:35:05.980000
-CVE-2024-20421,0,0,41945c40188e5bea99a955c2e7ed6ffca996a7aa12b6b996aa91405a9cae04fe,2024-10-31T14:35:06.853000
-CVE-2024-20424,0,0,aa090d93f13e6508c14839062b8468dcc526f2531d5d6053b9aca3b7c672acf5,2024-11-01T18:07:44.057000
-CVE-2024-20426,0,0,b88f189dc1cb855450c19ded8f98f2a27c49144dea9105b1469515f9ef80cd81,2024-11-05T19:43:16.633000
-CVE-2024-20429,0,0,f116a0f5b3a4d79e21e15af5273d13102693ffb98c7a09908422f5b392ad08d5,2024-11-21T08:52:36.500000
+CVE-2024-20420,0,1,6ad4c47563d4a010365025f483d6c38a343213172331778c030025e2ba693690,2024-10-31T14:35:05.980000
+CVE-2024-20421,0,1,06db2aea2ea63bae36ef8291085446496c3ee896f32cbfd268720529a48425dc,2024-10-31T14:35:06.853000
+CVE-2024-20424,0,1,eec4a1ad59da3a4e53c49070c67548a38c676f218400c746b92ed1695e409aff,2024-11-01T18:07:44.057000
+CVE-2024-20426,0,1,77000bc3cee877bf0898ae9dbcb6dafbb515f45887c5771184ca5096498a7e93,2024-11-05T19:43:16.633000
+CVE-2024-20429,0,1,7ac3a5fbabe02d1cc72a931fb4a9dfb5a529d1d1e9ab7386e67c00a327373b76,2024-11-21T08:52:36.500000
CVE-2024-2043,0,0,ca216c0d85398bb605a2b4c612e83919fcdec93159b586c7eee2c1227141321d,2024-11-21T09:08:54.980000
-CVE-2024-20430,0,0,f75d3c01cf75d454aedf395d358ca816f0bcdabd5f512efe62b8ce1ffc8dd019,2024-09-18T18:56:05.510000
-CVE-2024-20431,0,0,8654baa6e339d73a38c89478e70624ef538a9c4e27346c3dc35377bf244d2fa7,2024-11-05T14:47:55.070000
-CVE-2024-20432,0,0,85bb0384df2306c094cb54db7125a5ba5b18a3e2ec4d4ee9dcb98129857e23dd,2024-10-08T14:10:35.317000
-CVE-2024-20433,0,0,90a1190be1f908910c26670287d765c8505694780f78c9ed9f5f3b71aa736ef6,2024-10-03T13:34:37.547000
-CVE-2024-20434,0,0,c15e4a2af840c34d10112ae47d9d560b71aee0cfbe39835bc9b1043bcdda2930,2024-10-08T16:20:30.933000
-CVE-2024-20435,0,0,1ba25d94380e53ec11e0989517b56a7b3f4414d7f3310d0f6bbf3093fba33537,2024-11-21T08:52:38.787000
-CVE-2024-20436,0,0,c5b6ca69be74030942172742ac3382618002d4dd169cd0c1e01c4e17edf159d4,2024-10-08T21:00:00.670000
-CVE-2024-20437,0,0,1c9157c04c931b5dfb1e9b9aad53108a2bf492062373a9f0a3f0eff2ac9134e0,2024-10-24T19:45:01.540000
-CVE-2024-20438,0,0,0b2dcfecaa42bd1aeb0b4455b8752c417bb095ba95d115a555e9c8ca984be4ef,2024-10-08T13:54:46.450000
-CVE-2024-20439,0,0,1bb4a9037c44c14f94718b77af77287a4f4cdffd5672aecfd16ddafc471ed1a1,2024-09-13T19:35:32.477000
+CVE-2024-20430,0,1,d8b9a0dc8a3a99a81e3fafbc44c8d25a01abb0ce4dc5ef044c2e4f65fba30f07,2024-09-18T18:56:05.510000
+CVE-2024-20431,0,1,b89476f0219fb978e7730a0d95bda7bad9829798bb29da013ce893e6e4309739,2024-11-05T14:47:55.070000
+CVE-2024-20432,0,1,ba6a80a2ee87157bdcb4c8938c54215068e9bd60269a15d2ce520fc13c4b42be,2024-10-08T14:10:35.317000
+CVE-2024-20433,0,1,922f463d26858f9765745fa35af006b11e15b7f9cc60951a1bb7d7b436069a00,2024-10-03T13:34:37.547000
+CVE-2024-20434,0,1,4c239de03f8eb20085ac193d1c78c593927bae896f52d9362c72f48c752e8512,2024-10-08T16:20:30.933000
+CVE-2024-20435,0,1,8b646979c41ec7de58575637102a01e3e1888da1726e49b926d55997d46bb701,2024-11-21T08:52:38.787000
+CVE-2024-20436,0,1,43b99a83735a1deef14d37878c34b3245659a80bba53d63455a76bb0d3703908,2024-10-08T21:00:00.670000
+CVE-2024-20437,0,1,59d31400139cd4b295151b81e477c1e2539a52b4a6692c93f661bf74a9c22902,2024-10-24T19:45:01.540000
+CVE-2024-20438,0,1,801db4a130c9994307cf5f0ae95dd4b599dd796092b52e8fa69dcf687e3ec077,2024-10-08T13:54:46.450000
+CVE-2024-20439,0,1,ec6c20a0d3c183a911b3105a894952054874e136eaff5bc1ae80610af07152cf,2024-09-13T19:35:32.477000
CVE-2024-2044,0,0,8e868ce9486fa3013daa81d5958e85f170d2d3a0e48c54d0567190b720b96f58,2024-11-21T09:08:55.103000
-CVE-2024-20440,0,0,40b74f37daca63f33f11b63c68657694d8bc7c08f4b9e6d9f2aa3f677e8bbcc4,2024-09-19T13:42:41.017000
-CVE-2024-20441,0,0,bb189697a0079bd541c2d7021391ca60232b3f2696ee008f45708ec9b552a4b2,2024-10-08T13:45:07.300000
-CVE-2024-20442,0,0,4bbc1cb8998e2337260977509a11e4bfbf60b9557a320684816f6e267009716b,2024-10-07T20:11:48.687000
-CVE-2024-20443,0,0,fbbe5d4e4d91213caf1420f96e3d26da0859899530bc072be7ecd8a6718b3a7a,2024-08-23T15:18:06.347000
-CVE-2024-20444,0,0,8d920314c1e064babea57ca8163146d18be630e3f347f1e397c682e1ebd70121,2024-10-08T15:26:38.527000
-CVE-2024-20445,0,0,b38fb3806d9575b8ace8d538837a99e20ef2d455260934da7346b1ad01302b99,2024-11-06T18:17:17.287000
-CVE-2024-20446,0,0,939dce840c20622b6f9c2425c89a9bde6dd4375df9072696dec6b14f94ed90c1,2024-08-29T13:25:27.537000
-CVE-2024-20448,0,0,d55cf34e8cc20236ecd14e7922a06c3972c49d387983ee26fdfe10618c231635,2024-10-08T15:25:47.053000
-CVE-2024-20449,0,0,b47e360877c84256a48b948e46455de5a5919f8e10d8ed500b57cef92fc838d3,2024-10-08T15:33:29.210000
+CVE-2024-20440,0,1,d1af3249c51bd7f941a39610d3a4681288a908bc2312c18dc00dbcffe30b3365,2024-09-19T13:42:41.017000
+CVE-2024-20441,0,1,cfa61712a3c29cf86bd6533f2ff41455184f1538f6f64c55699096835398fd6d,2024-10-08T13:45:07.300000
+CVE-2024-20442,0,1,22d8f97972239128f18e48c44228eee1ca90db272a281aea8f4519ca3c556a08,2024-10-07T20:11:48.687000
+CVE-2024-20443,0,1,79512a62219922676f1da86a80719caa7b96fde0d62fbd1cd93e2430e515ca84,2024-08-23T15:18:06.347000
+CVE-2024-20444,0,1,d85d967c264e28dd00aa78598b162ee6c0690bf8946211aee9db942aca0cc170,2024-10-08T15:26:38.527000
+CVE-2024-20445,0,1,c6eb0b829468988fa6f856419882c9c5bd48cbffe5a93d47ef0012dc8e916f46,2024-11-06T18:17:17.287000
+CVE-2024-20446,0,1,b87def15940c0034b11c28859944a034009b9f468d66a6376d1f25c15eb252bd,2024-08-29T13:25:27.537000
+CVE-2024-20448,0,1,72086d98af2f207056466de4854f3fb7aca901a71a3a39bb9df031bde250144c,2024-10-08T15:25:47.053000
+CVE-2024-20449,0,1,ccccd9342485246b0f8c60e864ee57d0f0ded3dee976dcf1c08d302fec2e2ac4,2024-10-08T15:33:29.210000
CVE-2024-2045,0,0,7a04d26e92bcce8cecd1d7ea4dc6f53b69d11282c0556b47f58779b4eb16d89b,2024-11-21T09:08:55.243000
-CVE-2024-20450,0,0,9ae517138ca19aad57d2efa67810da98339bb188b2185bd358e4038e21242b2c,2024-08-23T18:14:43.787000
-CVE-2024-20451,0,0,22e7388b838c873353f4c381d3d53d4534ddaf348ae1678f28365377a3fa8840,2024-08-23T18:14:11.137000
-CVE-2024-20454,0,0,2634bd2b17369e580421f2afb02907c49a00bd3ebac83e6c8489c3dc2bde062a,2024-08-23T18:13:47.510000
-CVE-2024-20455,0,0,36c74270696dbfb60ca36e2eee91598d740a588e0f49f5c161d25b9d1b01b477,2024-10-24T19:47:49.750000
-CVE-2024-20456,0,0,3c3e31a31528a412e8cd5e55985316fe3fdac1a6fc4e3f4dc7b8ab3406302c02,2024-11-21T08:52:40.973000
-CVE-2024-20457,0,0,1508f821a5ccc950a4a2ec863592a91deb57fe4e2421375ea4bc08e3309650e9,2024-11-06T18:17:17.287000
-CVE-2024-20458,0,0,b1a92c204ef10efc48b4a4a0d96dd4b291ac60dc41f17742e3f0e9303ca91b5f,2024-10-22T18:03:09.777000
-CVE-2024-20459,0,0,b15a6e335ad8563c87779398a8381277caa748c697636ed1183ac945202ad358,2024-10-22T18:06:48.333000
-CVE-2024-20460,0,0,7e3b955cd833fb64dffde9d73aaa41a1fa59b52e9d0460b62e7257ff33289493,2024-10-31T14:35:07.573000
-CVE-2024-20461,0,0,c4edea80ca1e7b9882e1c3889648ccb1fabe39436ded14e9de0152f582edc3f5,2024-10-22T18:26:01.890000
-CVE-2024-20462,0,0,eed69892b06ab80824847e8bc299d77abf7e740faf2c863b702d59bb4bcdb6b3,2024-10-31T14:35:08.380000
-CVE-2024-20463,0,0,9433d402f4a531bb21abb2f27b223901d8f9a25d6e28cfd1833b7e48322eafe8,2024-10-31T13:35:02.373000
-CVE-2024-20464,0,0,ceaaecb64c530cf21272a71fb4b71017a421198082034fc00cc4ed186131bdb0,2024-10-24T19:47:29.740000
-CVE-2024-20465,0,0,f513ce1fa01fcef6c04e4819e7309f373d337b344a65b640a74f3891a2f508f0,2024-10-24T19:46:15.007000
-CVE-2024-20466,0,0,df7ce880d05555c51de965024b47ad433107f5086f7c24a4c771ebde7ed8df88,2024-10-31T14:35:09.360000
-CVE-2024-20467,0,0,05144aa8cbe99d47956464a46f8d6c545c0d1997f13844837ca4b82370c8f5a4,2024-10-03T20:09:50.970000
-CVE-2024-20469,0,0,131e8ad0c818b225c87bd1a0528a0f07037f1c0dcd9ea69329b1bd0e35e99efe,2024-09-20T16:58:14.327000
+CVE-2024-20450,0,1,62324ea0fc407a8fe2abdc234d236c58d4598c41d414185fa4e24580df1e8c9a,2024-08-23T18:14:43.787000
+CVE-2024-20451,0,1,f6afa08aa231a4dad23de6fc95398bc459b6f241c263c5be82e2e79b56a5423c,2024-08-23T18:14:11.137000
+CVE-2024-20454,0,1,e522f2128e49eb8432a0c11aebd0bf12d286a82e0cc0e92e36891307d8681061,2024-08-23T18:13:47.510000
+CVE-2024-20455,0,1,79711c2beadc0133b00ae5fe669f29df95d6b10c8b75b3d9f79fb432a5de1e6f,2024-10-24T19:47:49.750000
+CVE-2024-20456,0,1,87482a93df12f813b98ea955d91002e53c62de22c0d9ba4252057d8d4d3e50ea,2024-11-21T08:52:40.973000
+CVE-2024-20457,0,1,e3a5fe2f096c62133dafc5b1487e4cc5444feb7abf5e322ec1666f9184acb398,2024-11-06T18:17:17.287000
+CVE-2024-20458,0,1,9c35b4a19930162db82aa24b445f5b9906be103930f119397fd58d79f871c51f,2024-10-22T18:03:09.777000
+CVE-2024-20459,0,1,ae930cc064ac01341e746382c1193e26c02f48f5aa10e7705846586df48c7034,2024-10-22T18:06:48.333000
+CVE-2024-20460,0,1,775710a142534daa22a36fc2aaab466b5982c68ee16037be73a4190d86c2a8b6,2024-10-31T14:35:07.573000
+CVE-2024-20461,0,1,4b45b9e798ea5a5be8b20f8f714a14b06f9a5593c935580ad6b11acd4916546e,2024-10-22T18:26:01.890000
+CVE-2024-20462,0,1,b69be385fc9daf361f88d881fb81ed0b0d5ac6142dbc2757a7c3003a1050af05,2024-10-31T14:35:08.380000
+CVE-2024-20463,0,1,18d91a9e40f653096e163edfc2163d27c40b35ca400e10ae843d20d8aa779b34,2024-10-31T13:35:02.373000
+CVE-2024-20464,0,1,e1017198da789b399ff6f8570cdb19b26260d72f6e778ea5e6a3a37aef759efc,2024-10-24T19:47:29.740000
+CVE-2024-20465,0,1,fad777c8165a4542883ebb499a2025c4068326f4cc18f2474636cc74ba489772,2024-10-24T19:46:15.007000
+CVE-2024-20466,0,1,c1691d38c848dc90e1fd1b14482b3882a952bf159dcb29626e4777e3e65e28dc,2024-10-31T14:35:09.360000
+CVE-2024-20467,0,1,39dff6e67e354321fae0cf1154474ed8bea688195705b5c40aa705c275debbe8,2024-10-03T20:09:50.970000
+CVE-2024-20469,0,1,4d69309f12076e84259b8aba9658e6483677191a4c412ccc029080a7058386f3,2024-09-20T16:58:14.327000
CVE-2024-2047,0,0,ea0d7aa22fc763e5ef2df65b113cc84cff1c2c0f5561cbea1e4df2ead7b78f58,2025-01-16T21:48:30.403000
-CVE-2024-20470,0,0,e114358396af458429392c55970f4bb5ef9c942d6f154e2fab3b844b1c6d1a82,2024-10-09T16:55:23.887000
-CVE-2024-20471,0,0,d8075ef9ef7384c45983e45b71da8cf0bd2a4de2217155db7ce2eab62c7ed320,2024-11-01T18:16:35.227000
-CVE-2024-20472,0,0,aa975e0a75021eed242e5dd8b5531783ec88b9d62f6c236eba2e256b829ec655,2024-11-01T18:22:41.030000
-CVE-2024-20473,0,0,d3cd6fe037f1b3631e6525918fd1135818968d97adb0eb2830ff8e759254528c,2024-11-01T18:09:35.813000
-CVE-2024-20474,0,0,0779f33e79033db0b5a6e05750fc8972e27c9cf7feb54d2ff88edf717da31b4a,2024-11-01T18:14:56.790000
-CVE-2024-20475,0,0,4dc0e28333e768e7fcc027b32ab2b00f333dbfd47a07a779a4ffb0ac6397cb34,2024-10-03T17:49:17.797000
-CVE-2024-20476,0,0,1031dbdecfdad07073fe2a7f8e45ce98e68116f35996e62128e14d40e20c4d72,2024-11-06T18:17:17.287000
-CVE-2024-20477,0,0,5dd832f0624e92686cbd3892028ccfd7cbfd7853943992d64b4baedd7081da91,2024-10-08T16:00:30.167000
-CVE-2024-20478,0,0,ed29b57285a67c06e9db62b9709dd333b4eaf8b4ac96b155913269f89aecdf23,2024-08-29T13:25:27.537000
-CVE-2024-20479,0,0,9e24ac339498217bca7bed5ff0479b08a8228e4ca601b264106c3c491fb36721,2024-08-23T15:14:45.913000
+CVE-2024-20470,0,1,a261f3a666202847d0d2cf9a4e6c344df40299923d3425adde4b9ed2ce836322,2024-10-09T16:55:23.887000
+CVE-2024-20471,0,1,ea97bbbb7869b066f3eda5acf84989c2bef9e039db96940125c6f169cb585595,2024-11-01T18:16:35.227000
+CVE-2024-20472,0,1,563a7032cb9745269362e7783d2bafcc885fad11cea1ddfaff8607daf21d3fd2,2024-11-01T18:22:41.030000
+CVE-2024-20473,0,1,564e06fccff44b15f0b5b085034a3f6ae150b5303843abf15ca1fab5bf61daed,2024-11-01T18:09:35.813000
+CVE-2024-20474,0,1,3ed2b2d9b42a15521f090ddaae07f09bb402d4af6fc73de4ea9b0d3ce966d202,2024-11-01T18:14:56.790000
+CVE-2024-20475,0,1,8fcde44e2c1f776207075b6fe0bac803033d12f7cd3a4638550fbb63b58c8645,2024-10-03T17:49:17.797000
+CVE-2024-20476,0,1,c51374baee14e0e23bd36e683cef3bc2350202996d37f7d2079ba2fae5dee479,2024-11-06T18:17:17.287000
+CVE-2024-20477,0,1,d70e7dd6ace9a7d0b7731d8aaafb30869546729ac7402131e58bea13b4957924,2024-10-08T16:00:30.167000
+CVE-2024-20478,0,1,09b622dc44d569947b3e4fa228b7a40ba4cb58b0fda618c6d4396251cfa1ee3e,2024-08-29T13:25:27.537000
+CVE-2024-20479,0,1,c42cf74f3e66a1a3756abd4c284b8f801fadfa0622f41bdc4219ce8609cfe51b,2024-08-23T15:14:45.913000
CVE-2024-2048,0,0,0e1310f5ee51ab518c8ea23aa9dc6620dce3ce13ca59664e4604f39b5b5b6d7e,2024-11-21T09:08:55.500000
-CVE-2024-20480,0,0,624cd5223ddf44ff8279ea4ec6d6506f5ac5f5c90d9793c9d99eb191c3dbbc92,2024-10-03T20:07:33.900000
-CVE-2024-20481,0,0,0fb6f2ad201a7c580e2274b0f1ad65b542f75ab8ee59c0ab44253e5300c8c19c,2024-10-29T17:47:44.083000
-CVE-2024-20482,0,0,1bb92c8d3346e7bdc4dc5dacc4e521ee0bb68950869aa254acbef85cf6dc449a,2024-11-01T19:49:21.493000
-CVE-2024-20483,0,0,ceae2d0bd12a7dfbfaeaa03b56285b8fa44fbba102820c40ebc10dedf75ee54e,2024-10-03T01:44:17.827000
-CVE-2024-20484,0,0,212b4a809eb132c5d20f3cea9be43e62284468be63a566513beaabd342d03b58,2024-11-06T18:17:17.287000
-CVE-2024-20485,0,0,a45b95bbadf05500e5c90ab4209bb9586fe6d1a76b2734318a51b3bee45cfb39,2024-11-01T19:50:11.107000
-CVE-2024-20486,0,0,7a605128f874e93d2d3b7d9df9cdfeba06df6ce4a3ad1ddb3b91fede2f554166,2024-08-22T12:48:02.790000
-CVE-2024-20487,0,0,3fb0066f645def61868f060cb18625957537225df3d2637f8990dac499bc0b70,2024-11-06T18:17:17.287000
-CVE-2024-20488,0,0,639f62bac4d6fc0fdc5e81c734a66ff332d11cf21ea2b96e3d4a453134f4e37f,2024-09-06T17:18:11.813000
-CVE-2024-20489,0,0,b656dabb012d987ae37cf17bc81bf1eb4c99ebea7347d7408d4a9a518819b6f8,2024-10-03T01:40:11.637000
+CVE-2024-20480,0,1,3c25a79e3da341334decc2e042e92c1e3e90b95c69a15c6bdd4405eea7125b4c,2024-10-03T20:07:33.900000
+CVE-2024-20481,0,1,0ea4556e8f3ca55f15a6b93e371efc8f93f8d20a6de75c06874d9ad18d96e2be,2024-10-29T17:47:44.083000
+CVE-2024-20482,0,1,91c065c5ae8268289342d832aa225585cff358d487a277492c0f30ad7fadda37,2024-11-01T19:49:21.493000
+CVE-2024-20483,0,1,dd75006a4b8378f9a9fb04ae844db2b682dee979eaed8461ca1ae896a3344cd6,2024-10-03T01:44:17.827000
+CVE-2024-20484,0,1,da6b9a521ce1dc086cb8561ee85d82cde4ae5327dc4da462f0e441021ae7c20a,2024-11-06T18:17:17.287000
+CVE-2024-20485,0,1,4bad42c478a01f00d273ab8662a0d6beb1a29cef37718efc29530f0725b7110b,2024-11-01T19:50:11.107000
+CVE-2024-20486,0,1,6f014a92324e0d29b9a280dc43ed675224be014cf9f77778b5f35f0335e0c431,2024-08-22T12:48:02.790000
+CVE-2024-20487,0,1,649e793afdaea6056df4d6b3a8675d8fc1034658905b1c785edfc4f2e569a272,2024-11-06T18:17:17.287000
+CVE-2024-20488,0,1,3eba64ac5c64e3a05ab3229d3a319f5d11c1176e28d49e535d0362c8cf9be279,2024-09-06T17:18:11.813000
+CVE-2024-20489,0,1,c515a7131b885c709ec34ee863eb206793a1025f593d2aba1eec899a42a269a8,2024-10-03T01:40:11.637000
CVE-2024-2049,0,0,8de89788bab62ebc4dffd6f344cdcebec568f905fda324bfef8674efa43b5d40,2024-11-21T09:08:55.663000
-CVE-2024-20490,0,0,19483366fabb2963f6749efe01e258018fad8ac50bffb3853310476e72cc793c,2024-10-08T15:15:39.160000
-CVE-2024-20491,0,0,2217e892cf9dd3b0aa129555d279eb63eb461de0723e6b67f4f9a52ae1a2f7f3,2024-10-08T15:55:08.933000
-CVE-2024-20492,0,0,8fcb2b2fb46daecedf910b32394febb03dc4a8088b0c28aee462a2b52fa72002,2024-10-08T16:07:26.280000
-CVE-2024-20493,0,0,8171635aa3de68a2be75b148508bf560c018c96935f8715cb4cd902b0638456c,2024-11-01T12:54:23.637000
-CVE-2024-20494,0,0,f2d17e49e014331ca3e6c0e1dac46d5f23e6e3ad4341e2b7c8fccffcd8245cd5,2024-10-25T12:56:07.750000
-CVE-2024-20495,0,0,8d8159a778560bf54833c658ffa5c07a58ef05e918ca81420bdaecf678e7ae86,2024-10-25T12:56:07.750000
-CVE-2024-20496,0,0,73b163136dd491709bec11f0ecafb8da52535af2386c996a8a25a91b422c8041,2024-09-26T13:32:02.803000
-CVE-2024-20497,0,0,8b8315cf0e357e75c009f66d9e859d64240e8b4d1c43d6fc825795088b16e2af,2024-09-05T12:53:21.110000
-CVE-2024-20498,0,0,48029523634551b4b67ee80ae1adca92861b1fa79ca914a095bc4190cf659b0d,2024-10-08T18:32:54.457000
-CVE-2024-20499,0,0,3b1cabe8884bacb5a5bf25a4f3976fabfcd344680e29ec7d70b05062f23cd2f8,2024-10-08T18:27:16.110000
+CVE-2024-20490,0,1,63ced66be2b65553eef573ae7a4cd1fdfac74593181f4406026409f91c524446,2024-10-08T15:15:39.160000
+CVE-2024-20491,0,1,f0ecc6763e8dc7b5887fbbc148783303f1fd31a925e09e745585d29d18b0c153,2024-10-08T15:55:08.933000
+CVE-2024-20492,0,1,0b2783defcb7f22a61ed0202f8ff7f8463def8096f585bbfdc40664dfa2b34e8,2024-10-08T16:07:26.280000
+CVE-2024-20493,0,1,6f114444abfc74eb1fed4a4c7ed4e6e2843d8232286e684f51a00496dcba5489,2024-11-01T12:54:23.637000
+CVE-2024-20494,0,1,0653809f07e0381cfe0e03f168db08c11256be7fe08f78d70bdcad541988ca87,2024-10-25T12:56:07.750000
+CVE-2024-20495,0,1,bfb5ec0dab0f9fe4f7548471ed6d56c902a70d64c866f715c4395eb6146b69ab,2024-10-25T12:56:07.750000
+CVE-2024-20496,0,1,959108add35f4a821dc55fa1d0f52467c6faf002660a59d273f6be2b7ef70b65,2024-09-26T13:32:02.803000
+CVE-2024-20497,0,1,e55347595c6b99cb9c8909c4c8afd5892415a4fcab3a2c714ce0862a8ae2730d,2024-09-05T12:53:21.110000
+CVE-2024-20498,0,1,3c9f5cf47baff6bb8f72f87a1703a0e38d5fd5fc1bc510655cdb1bf245566245,2024-10-08T18:32:54.457000
+CVE-2024-20499,0,1,79d26c5899e2942fde0aebefe03dbd7a4bea97ab3367d32d6159ec3c8d70afe5,2024-10-08T18:27:16.110000
CVE-2024-2050,0,0,ff97001dfefee915a9619a8565a1725b1b7b8f4e0f304a671819706afba0c84b,2024-11-21T09:08:55.793000
-CVE-2024-20500,0,0,19fe171071547264606f8bbe346dda847923f98766dadecbc857da78b323ff02,2024-10-08T18:27:19.347000
-CVE-2024-20501,0,0,a0c618e1d75ad72e867dcbdfe304c25595a8a4dcfebf20ae692ad1346ee13365,2024-10-08T18:28:51.753000
-CVE-2024-20502,0,0,1402048ec32b7a295dea1a2fdda0a20517c95692acef8a7d0f5102091ecdd8a4,2024-10-08T18:46:38.437000
-CVE-2024-20503,0,0,ae3011d5480e9713afbdd8b2c932b4a6b2606cd13dede269965bf6c24c0ac28d,2024-09-13T19:24:37.420000
-CVE-2024-20504,0,0,ea2b9de45d84d8a9a135ededcfa1ea126f2125610ea5003008f15cd0db30d79f,2024-11-06T18:17:17.287000
-CVE-2024-20505,0,0,197d35643cf8abcae8a76fde0d9e66480994c6a98c99953e9cef5038adab7c48,2024-09-12T17:28:47.010000
-CVE-2024-20506,0,0,da39d0cefbca03fcc0d27763736f5e241e789d336087a33af756f7c2695bcf2d,2024-09-12T17:26:37.643000
-CVE-2024-20507,0,0,a38afd6c9a777bf4e5a41aca929f5ad4d8c4c3a1c69c5e821e54fa6fec885232,2024-11-06T18:17:17.287000
-CVE-2024-20508,0,0,eed5bdfc88be23855cf150ab8899bd6781c717115d232e9f79970693013357e1,2024-10-03T14:43:23.810000
-CVE-2024-20509,0,0,3bb0d43ad2d0db5022777f145286c43375276f18fa64491f94433aedd2999a7f,2024-10-08T18:45:52.513000
+CVE-2024-20500,0,1,975fa1d12d2184cbe3e1b11504e26a1283d840706962e23ce4a347b45febeed6,2024-10-08T18:27:19.347000
+CVE-2024-20501,0,1,684d934a0cfe66c17a0aef23866c389f16e119b9184a8f46af9347f582256d29,2024-10-08T18:28:51.753000
+CVE-2024-20502,0,1,7acb480e8e526c87bf44f21f15b57e576408d0ac621fbea57a55216798bd2b2c,2024-10-08T18:46:38.437000
+CVE-2024-20503,0,1,b612922289b155f23847df3347d364f98e8d41b1b1be152ee8cf44ef5e123115,2024-09-13T19:24:37.420000
+CVE-2024-20504,0,1,c8cda198c4aeb11c1251ccfdbdc1c30e7cf5db68aaaa703cc20eeab58959a47d,2024-11-06T18:17:17.287000
+CVE-2024-20505,0,1,cde48f809be0f08a5634dc38b6430c1ad08a55f02bef617e889445d54496e79d,2024-09-12T17:28:47.010000
+CVE-2024-20506,0,1,7d3de002ea92ed539cb9a0d6a30fc901a2e111008dc3d0b7fef0b3d050612d87,2024-09-12T17:26:37.643000
+CVE-2024-20507,0,1,ad3c3d70e719b64e35428f0224f3cb5a92aad815d928ab309a851c0219476f30,2024-11-06T18:17:17.287000
+CVE-2024-20508,0,1,736e0172acb76c338f12f2ff516597a0f98c248ac5fe6687777d82a86f39b256,2024-10-03T14:43:23.810000
+CVE-2024-20509,0,1,9c7185e6f04b49335cd96f343438a6b1006cd7c97c25381494d3a11c79eacc42,2024-10-08T18:45:52.513000
CVE-2024-2051,0,0,5c688e48241bbb5f92d5d4858f33d5ee7cda7c412aae30dc1b76af9654330fc9,2024-11-21T09:08:55.927000
-CVE-2024-20510,0,0,6efd0cade080ee9b7d9f5050971a4c715255d6223100dd3bbd82228a6ec58ea2,2024-10-03T14:52:22.627000
-CVE-2024-20511,0,0,c39cdbaaf1040e0d9fdf722e306e2795febd286688009ae6af64422d09182fb4,2024-11-06T18:17:17.287000
-CVE-2024-20512,0,0,6c0c4fd2674c812ebbc23d70119a0f46418543f8659684434046a70c23969e4b,2024-10-18T12:53:04.627000
-CVE-2024-20513,0,0,c2039cdcb187a516520713899d78ca87fa6d365dc7c767e42e62285ddb24ffd2,2024-10-08T21:16:54.820000
-CVE-2024-20514,0,0,87a285f3037e904c558c753aaf0911df0d010b9680eb376086038e4f4ce78e3d,2024-11-06T18:17:17.287000
-CVE-2024-20515,0,0,26d9140bfff4ac7f3e9170323c6c4a68ddec282ff467ea0e71352c1d9ea070b0,2024-10-08T16:11:23.440000
-CVE-2024-20516,0,0,c8e163995c59f73c433737e9402eaa869668c0269d639e6b20da5aab846e1d73,2024-10-08T13:44:10.840000
-CVE-2024-20517,0,0,44392cfb580c6c4bb0990e7b2c7ecc5cb3a207cf741efd6305300dfa59ba786c,2024-10-08T13:47:52.483000
-CVE-2024-20518,0,0,a233b999519cea347e2a2e0a7a3549e32c24ab3f18a5caad10211407a54e999a,2024-10-08T13:50:14.730000
-CVE-2024-20519,0,0,de74b57b5d7ff0fda7e9ae34b1c412e6d50126e1fcb1c59be3dc42ed03f91469,2024-10-08T13:50:35.507000
+CVE-2024-20510,0,1,a75d0310ab23429f45e83d8b8d8b830aada14bc69fbd3232d2ba80c30d043747,2024-10-03T14:52:22.627000
+CVE-2024-20511,0,1,575d9f90b2119214b1ba2b4d38486aea99e7bf1112799bbe7f5113060c606b61,2024-11-06T18:17:17.287000
+CVE-2024-20512,0,1,baf1c046ddf55846ae36a20dbcca1378726720ab2f4d8b4425b1249ba51e418b,2024-10-18T12:53:04.627000
+CVE-2024-20513,0,1,9683b5bfc31c5b9c6117b5cb1346466dba56051d14fcb09bc74c15edb1980f3a,2024-10-08T21:16:54.820000
+CVE-2024-20514,0,1,6fdf6fe59324caa7be9471877336247fa358f69f9eb227b3f833fa2a894b2757,2024-11-06T18:17:17.287000
+CVE-2024-20515,0,1,738a133fef3e64892819962c955e9d6bfe6d2f0158b0d88bea7f8b65c0f727d4,2024-10-08T16:11:23.440000
+CVE-2024-20516,0,1,fd02d3dbfa354a86f074386b82542f090c21cc241978f1833025afb2dce8934e,2024-10-08T13:44:10.840000
+CVE-2024-20517,0,1,921bef6a56c5ed10b68465df65f15f7b8740403dcdf5a80a6799c80217f27728,2024-10-08T13:47:52.483000
+CVE-2024-20518,0,1,6553bd516e40537539c068c82096e7405e5c992780aafd1c9ebe2843f551c2e8,2024-10-08T13:50:14.730000
+CVE-2024-20519,0,1,276c54873475f691c81a9f75d7e3b6b7db001fc752d0444df3d26fa9f6ed32d8,2024-10-08T13:50:35.507000
CVE-2024-2052,0,0,09a2e934178c981e5906ec6ffcf8a8bdb9ed6b725c4a713defb918f1218f3e29,2024-11-21T09:08:56.060000
-CVE-2024-20520,0,0,09999980433b9b29e0993a703e2a9b1499ea35c565587cc3691b4873a816146d,2024-10-08T13:50:48.337000
-CVE-2024-20521,0,0,9779b54ca2e27601eaf5b30620350059c5e874494e5b22f0501881b03595858d,2024-10-08T13:50:57.163000
-CVE-2024-20522,0,0,40bec25796580cb2995c9070e6996e44d40794689a3a7cb6194f6ced17739d28,2024-10-08T13:48:19.060000
-CVE-2024-20523,0,0,37a14bad5122dfd3eb03e2c3040ca578c86d46d4da8f0e9968f1975400c4f7d4,2024-10-08T13:48:29.500000
-CVE-2024-20524,0,0,90fa0689d1e29b6e34c1b14019ee18cef2de5b2d0fd0d3db04d51f78f246e89b,2024-10-08T13:48:58.273000
-CVE-2024-20525,0,0,abfd70d1439b292ef5e161c3dceafc85b0bff98861be1e7e12cb0c9d7b2f6539,2024-11-20T16:54:28.817000
-CVE-2024-20526,0,0,3c0f9d843ecf23c191baed993d0f4e9794979e6eaff8c65e45b51c9f698e213b,2024-10-31T01:08:26.047000
-CVE-2024-20527,0,0,5b15fa57e117b4dfa64da5a6dfe715159a8eef53c0f1161f29a98a10ed0d1200,2024-11-06T18:17:17.287000
-CVE-2024-20528,0,0,5c875f72febe29ddcd52ce3865909ad8f9b15bfaa164113820e1edb76d6bfdbd,2024-11-06T18:17:17.287000
-CVE-2024-20529,0,0,6246f3c95468a93d45f3b2a27d4f4c44a1ae797d60620afea434e0a22f226612,2024-11-06T18:17:17.287000
+CVE-2024-20520,0,1,57f065fbff1aeef0ab2002b528153316f49f7ef7d1a825517637f73faa29c92e,2024-10-08T13:50:48.337000
+CVE-2024-20521,0,1,5a460f19450f92ed2e09dddd8fd8af11ae3f7dd01578a427548614e0c63bc15e,2024-10-08T13:50:57.163000
+CVE-2024-20522,0,1,9f8685afe01c4cc2b056b5fe0c71a842a86a538d62a9edf2c2f719c40a1ea29a,2024-10-08T13:48:19.060000
+CVE-2024-20523,0,1,ead8420f4f0a6acff53701aef05b74a802c5ceadd60c9b911bf1d0172e10fd3d,2024-10-08T13:48:29.500000
+CVE-2024-20524,0,1,027de93b7fbca22de0066fc80c107f805b01bcc349886a5288ee8b14f5cc8685,2024-10-08T13:48:58.273000
+CVE-2024-20525,0,1,a952dd2f5be8f180233858b9c806fdcf542e183229081f53a72aecbc6e041c46,2024-11-20T16:54:28.817000
+CVE-2024-20526,0,1,7517c9ae25f2ed0403d64d3a7e54d668b651e2debacfb8240f871264993f155e,2024-10-31T01:08:26.047000
+CVE-2024-20527,0,1,338e591855a474507e6d6564e35702dbb7ab796284997206f75c891342dd1498,2024-11-06T18:17:17.287000
+CVE-2024-20528,0,1,b2c1f5808329f1cab29a6aa55f7ee46143c48f93c349b36abad945fb462ea1bc,2024-11-06T18:17:17.287000
+CVE-2024-20529,0,1,8da95b4c0578a1ef376874a3abc71f3d956e9e16c4bdd1cff6e122fa9756fc81,2024-11-06T18:17:17.287000
CVE-2024-2053,0,0,4a6f97d58d2ce4a06da3e4cc2f6b1db22ef7e34c22153961719fdc6f1e8236a2,2024-11-21T09:08:56.177000
-CVE-2024-20530,0,0,2f59c8aaab36e3e833de6e879d0bbe7129e1f281e4275ceeecc0c7c4f611e8d7,2024-11-20T16:50:11.577000
-CVE-2024-20531,0,0,f2a06c6b0a5d068e0e4cf2a5d653dc8f5642aec3ba2e596f4c9d2c19bb36db16,2024-11-20T16:45:31.467000
-CVE-2024-20532,0,0,700a4a846a9af71417f0c190b62416a19025093a20bae95b044d6e7d94302475,2024-11-06T18:17:17.287000
-CVE-2024-20533,0,0,8d162c3151555ab737ea5f4d76a83d75cdf43aee7670d88c35935b2dba9894fb,2024-11-06T18:17:17.287000
-CVE-2024-20534,0,0,341a93164674a6a6b134ae2477399ca68a6654e3a09e4c34f5aac857c57d17d3,2024-11-06T18:17:17.287000
-CVE-2024-20536,0,0,2cf09dc4c398b5d76403e88a9d1d7dff3ca21a0f8248331f0cee23a35be9c0d7,2024-11-06T18:17:17.287000
-CVE-2024-20537,0,0,9eb86c9377f81ead65e04d2e4e4cbe1e800da57ee536cdfc179910e71669b246,2024-11-22T19:53:29.893000
-CVE-2024-20538,0,0,df5923bd2058dd1af4aec77dabb19ca5249c3c3a35ed3ea5c2ef013e34c8f2a2,2024-11-20T14:36:01.810000
-CVE-2024-20539,0,0,3715454ecb6afc62a009a075cddf2e3b1842544d571c068adbd883071cacd893,2024-11-22T19:42:09.633000
+CVE-2024-20530,0,1,4b6fbf3cff3c88ea323fddebc6c0cb7ae788b03316d792f4072bca3f4bb0811a,2024-11-20T16:50:11.577000
+CVE-2024-20531,0,1,146b432bce918b7fed6c81c3e05a5e8691f6946a09048d0bdbaeec668bebfdbd,2024-11-20T16:45:31.467000
+CVE-2024-20532,0,1,fffdfb5d0a5d43d15034cecdefc1bc0b07499139a49ee1ac6c74f504b2d9b11d,2024-11-06T18:17:17.287000
+CVE-2024-20533,0,1,ec44233533491472b9a544d68177c854a8f53ebbf4334bb41a7a3a883884d48f,2024-11-06T18:17:17.287000
+CVE-2024-20534,0,1,1635c2cbe65aa70b7757a9f78ce3ad8f688ab095623444369639c987cfe8687b,2024-11-06T18:17:17.287000
+CVE-2024-20536,0,1,0cf8e906b7364c76c10f292b3b2b51c7ae8671839fdcde7e5640903f053fbc6e,2024-11-06T18:17:17.287000
+CVE-2024-20537,0,1,0bfe7d20eb908fe59c92f0ddc5b2954d997f12f86e91ea166b79219997cc0a48,2024-11-22T19:53:29.893000
+CVE-2024-20538,0,1,637fb37b3ad9056411de85e8bb83ad084f423ca94786a8c8b68482035d3eaf97,2024-11-20T14:36:01.810000
+CVE-2024-20539,0,1,5f38f2d2f952ea770144dc8472aa7e1a56064e025be3a5b1c9943883cc7029ed,2024-11-22T19:42:09.633000
CVE-2024-2054,0,0,22b249de25f24c9d5e4dba60e1bbfb2ed15b9c99ba0b7f3c989eacb4a07e713d,2024-11-21T09:08:56.363000
-CVE-2024-20540,0,0,5046d412fb4d977a66a069ad7e69b4507f6a0eef37dbd61ef109cc61fdb350b5,2024-11-06T18:17:17.287000
+CVE-2024-20540,0,1,b101248a8efda36e915c412442fe685653fc473fd659fbc78c35cc262111a7d1,2024-11-06T18:17:17.287000
CVE-2024-2055,0,0,9c9b4203c5a8691f7ee3b1c0f37424285bdb22c4e9691349b0a7161f418f3aa7,2024-11-21T09:08:56.533000
CVE-2024-2056,0,0,68371bbfe3e7de0ab75bbaafdb9ba13342e9ac1572c260d9b23595be0a55c605,2024-11-21T09:08:56.727000
CVE-2024-2057,0,0,e5c93f7381e9c562590637af109bc48ab64f0cda8b9656e06708802a9eaa17f2,2024-11-21T09:08:56.920000
@@ -247472,7 +247472,7 @@ CVE-2024-20836,0,0,1cfb139c5fb15644ed863a471c42220304cb4d42cf03f8dad6e2f163b2928
CVE-2024-20837,0,0,1ea011c20c86433e1c029228a453e044085a95c2512bef655a258579d60b71a3,2024-12-23T16:29:57.827000
CVE-2024-20838,0,0,193a829a6abad700065cea67ae6d6da4eeca804ff07b3f78a7faeb13b32a7f01,2024-12-23T16:32:27.623000
CVE-2024-20839,0,0,0dad1e579794cb822858fc7ebd1b2881483c934995edeb7d585b194dfae8079d,2024-12-23T16:33:22.507000
-CVE-2024-2084,0,0,f0802261573a6dd2f498392d40e65801759ab12b938d64d146b2e0815ff97a3e,2024-11-21T09:09:00.623000
+CVE-2024-2084,0,1,2e40ba3b9cc7edf04b201d0c0262dc909bc5491ebe21e1ebb4a3d7029d2395e4,2024-11-21T09:09:00.623000
CVE-2024-20840,0,0,207567d3518e4e0e6d1c96900c417915f9a3790743557a4f0f1dce6cd2f27677,2024-11-21T08:53:15.390000
CVE-2024-20841,0,0,4053c739c188c4b176a35a8fa2e16319a04cc752f349d61c40ff8d8ac8883c65,2024-11-21T08:53:15.503000
CVE-2024-20842,0,0,6fb79e2268b97e65756cbd5ade232276cfe51b41a89d06fad53a11a9ab8651ac,2024-11-21T08:53:15.610000
@@ -247483,7 +247483,7 @@ CVE-2024-20846,0,0,bc4e3fe1d50b31f61b6ac1da5770d0c4dff063a4417ff487ea47947485a28
CVE-2024-20847,0,0,57318bd88c923081f6d381fb4f5c100e7e50c82e6140bd69ed80aa961c5b4273,2024-11-21T08:53:16.147000
CVE-2024-20848,0,0,76b8aebe2905b056865c6c0fa1c2e6bcdf4e740ce81db55fdd3aab14598caabf,2024-11-21T08:53:16.253000
CVE-2024-20849,0,0,a73545b74afff54f13d51b7a5641ad3675049c12eac4aea829ffa7cf418fbbee,2024-11-21T08:53:16.370000
-CVE-2024-2085,0,0,7771a522e0e572da68e621d2f5189b3db3a0b5f7aad420d50d8f2edf100ad68b,2024-11-21T09:09:00.743000
+CVE-2024-2085,0,1,8fa6cad8404917da0aa417af19e0e7bf0d6dbfe20e23634b6c499527033f04c8,2024-11-21T09:09:00.743000
CVE-2024-20850,0,0,97a54f55ccc9fbf195322d9227a778c55548e1d783b11b773c4adcc2f8897573,2024-11-21T08:53:16.483000
CVE-2024-20851,0,0,35a513acde1e6621ca1425ee6ddec43d9098535ab1322b3aa397b5c2494dea2b,2024-11-21T08:53:16.597000
CVE-2024-20852,0,0,8673afaa1d4ca323d012a77e1a19bb7fa65ca513d00b5410776b96de94a41877,2024-11-21T08:53:16.710000
@@ -248819,7 +248819,7 @@ CVE-2024-22256,0,0,993de2145831c7f61700fd0ab2fd95ca6c5116ee67bd38000c382e5007dbf
CVE-2024-22257,0,0,0fada1e669b9a17b3b43a52e9806a718eecb3983eb74b613ee54514e72e21baf,2024-11-21T08:55:54.403000
CVE-2024-22258,0,0,eaf12a7c8ad5854401b0c00d5a13b7faba9eb9c686cffc7642b0b9f286c4d6d9,2024-12-05T21:15:07.530000
CVE-2024-22259,0,0,dbb569e509ea5651323d4048a88ab3ba6885052f60fe4cb85fc4c34cef61e1fc,2024-11-21T08:55:54.683000
-CVE-2024-2226,0,0,cf32885666761f74bd58faf817239acde559e4f98210eaa944f2cd8cd193c155,2024-11-21T09:09:17.873000
+CVE-2024-2226,0,1,58148007a4d4ff50a71a1cc3bfe097f1a81059dfdb13ac32d0fd5b9aa0d8c69c,2024-11-21T09:09:17.873000
CVE-2024-22260,0,0,7a7ec824f5ee06e50803ba498f9aef05f0816e9454ff00b22048fb01f9eeb0f0,2024-11-21T08:55:54.833000
CVE-2024-22261,0,0,2f3f327d5f00b5b399eeb14b1642972cb9f1a03fa2d26a05c05601b888eaa6cf,2024-11-21T08:55:54.960000
CVE-2024-22262,0,0,d1dae9c8bed10fc237c952b05c6b18a50635ff407c8788f5b94072234e0e55e1,2024-11-21T08:55:55.080000
@@ -248901,9 +248901,9 @@ CVE-2024-22343,0,0,a3ffc2e94274da5793eb1457be21bec9aa8bc9334ca3ffb82f0713c176cb9
CVE-2024-22344,0,0,175ecdaf0188d9abe716b262cfd96bf9fb3ed5588248fdac15f91aea57c0f76b,2025-01-14T21:11:47.730000
CVE-2024-22345,0,0,38a8ed093a2d89ebacfbdf5199dd9676ac3e38e552270797158ff7cc8e59254b,2025-01-14T21:19:31.517000
CVE-2024-22346,0,0,31bf7fa21eb8cd2eec5ff611cd30d45f186f1bb1e3a4c932daa6cb347f61227b,2024-11-21T08:56:05.850000
-CVE-2024-22347,0,0,1a4a4ae76af371e63f75009c80407f332f370a4377fb559288ba25ea6f88ec9b,2025-01-20T18:15:13.540000
-CVE-2024-22348,0,0,2268c884ca87120838e8659f3962276fc5e3d660ef8ce6c5a5779a51d962b318,2025-01-20T18:15:13.737000
-CVE-2024-22349,0,0,5d0267514522e24f50f732455ff8cbcff347de16b4d78fc1172c33b45421a244,2025-01-20T18:15:13.930000
+CVE-2024-22347,0,1,98925c5c5b12b845c533d999ff707c6a1758048410a0cb02f7ddf0f35b213c97,2025-01-20T18:15:13.540000
+CVE-2024-22348,0,1,73e78bba131c49c7c0de01f5dbc9e904c8c4c7d0e3c30dba954f7148f72cae68,2025-01-20T18:15:13.737000
+CVE-2024-22349,0,1,83d2f1bc5c4fa6fb8ad422ce8a57cf789473001c88cc2a943bb1acc8aa902911,2025-01-20T18:15:13.930000
CVE-2024-2235,0,0,a0829bcbdbed86a72a56dd6769abd8e7854afa08a7fcab0364845431cf5bccbb,2024-11-21T09:09:19.200000
CVE-2024-22352,0,0,903d5c6f0448bdc0bf08006216f6899a3c5646dd96e9c8f6bb1e8c750ccd821c,2024-11-21T08:56:06.007000
CVE-2024-22353,0,0,0ea4428102047b2faffc31e2ac25c47aff142899beade323ab31892621a6fc1f,2024-11-21T08:56:06.147000
@@ -249052,7 +249052,7 @@ CVE-2024-22546,0,0,997003eeabd55afd13ddbeebe6550d7262d8869e557416789e584a9094c3b
CVE-2024-22547,0,0,0133090a54f8606cef07626b9e620f96367b93c79f99ca3bc075b2ce0712def3,2024-11-21T08:56:26.220000
CVE-2024-22548,0,0,3bddf409ca88fc0749d327d45cb0d00ca337c1ce8636699dfaa665651c15c3fd,2024-11-21T08:56:26.440000
CVE-2024-22549,0,0,675ffdd8f168a9762f5a79b4cbe36a992bd2d143f3ddef6a0f310cd9c0117265,2024-11-21T08:56:26.580000
-CVE-2024-2255,0,0,c78337bfe91f10c79f504e7a6b28d344294568cc92f821d9dfc4baaad2d3b8b1,2024-11-21T09:09:21.510000
+CVE-2024-2255,0,1,7820304244a223107853443023ed595b897a7355c9c95b4533f87af6dc37cb6e,2024-11-21T09:09:21.510000
CVE-2024-22550,0,0,ed96f0a80d539bcb01e0ab9294d11d1f803860b0b0bab7c55b1fed5ab75147a5,2024-11-21T08:56:26.723000
CVE-2024-22551,0,0,1e93c60dd52f09f6cd2dcd56d4a711553385c5433699e8ae1f44fe69a35bc9ed,2024-11-21T08:56:26.960000
CVE-2024-22559,0,0,36d8d40d85cf4ef45bc2b02dbe49188c093e02a56b7d30ed2946edd5a0d6608f,2024-11-21T08:56:27.107000
@@ -250298,15 +250298,15 @@ CVE-2024-24425,0,0,f020647313a266e9b26d920d7b3ff0c5a70298ceb4b38f72086ac27d496b3
CVE-2024-24426,0,0,1ba202c66d22ec01d9165c4229044ba2d8de45fa575e097063ba053bd7d0b3a7,2024-12-03T17:15:09.400000
CVE-2024-24427,0,0,9f4db1e25b8a6f9f095e87c0819d91e392c3303a0ffc4e643040fa19913b74d5,2025-01-24T18:47:28.570000
CVE-2024-24428,0,0,ef5d1f3e1c76dfbbcd121548afdf85c644e4be29902773b535f47eb5dabf7d2f,2025-01-24T18:44:26.897000
-CVE-2024-24429,0,0,4ab29af21421fe9731a30a80f100729ff3757ff97b28d5817033562018b538d4,2025-01-22T16:15:28.907000
+CVE-2024-24429,0,1,8dcc40757aa33771cd1714224b3f91f802137d08526f666faa2d3d508a18124c,2025-01-22T16:15:28.907000
CVE-2024-2443,0,0,1bdda57280ff24c7755bfc385c8c5e030e460e899c6d0c2078c3b0acbbc8fb06,2024-11-21T09:09:45.827000
CVE-2024-24430,0,0,bbeb452d0a78e4023881f525a04de9114ebaa1d6a1e4c74130e66ee8c8539e7c,2025-01-23T18:15:29.850000
CVE-2024-24431,0,0,df56f81b7c3a1e35add47673987ba3302b83c2d47d8419bd59e79e036d2e2abd,2024-12-03T16:15:21.187000
-CVE-2024-24432,0,0,8f5779f5919d73329002c1b84a29f1fc16c658faaf52302aadd0e87a855a1c40,2025-01-22T15:15:12.793000
+CVE-2024-24432,0,1,bd3b03b4b11e8be659927a0dc766a8e3c2a3840e41e34cda6332f58e1da39678,2025-01-22T15:15:12.793000
CVE-2024-2444,0,0,d9ff5dc2f1cec3e82221567fd131c75cf5704e6ca903fd99eda244483e9cdd6e,2024-11-21T09:09:45.953000
CVE-2024-24442,0,0,ee978616649e5f964d58831d9a89396afadb2cfa402f3f4d3cd199735f6dbfb6,2025-01-24T19:15:12.470000
CVE-2024-24443,0,0,61ee9c48ca4b7520a2cef22b1d83f9f14d157d857aab2d1ed38a31b2dd4c3b0e,2025-01-23T19:15:10.540000
-CVE-2024-24444,0,0,ac03478eee756bd3acfd373638c49cadedc682520b5d9852b736440ee5f0ff5e,2025-01-21T22:15:11.737000
+CVE-2024-24444,0,1,4b5bb9c07f6b272ac4eefb582fcfae455f1c8b191e74ffabec16559b4553ac83,2025-01-21T22:15:11.737000
CVE-2024-24445,0,0,8951525a630ef7002c4c50c2bc834a25267be75618ad4d3813836a8ae7898249,2025-01-23T16:15:35.617000
CVE-2024-24446,0,0,4939781971312082259f029ca7c62ff4e0dd8fa78cf29355bcf38d66a90a2aab,2024-11-19T17:35:10.263000
CVE-2024-24447,0,0,16b4c82adca912903405ea4de695a47b9422228cb2a3f727c34125b114515ba2,2024-11-18T17:11:56.587000
@@ -251020,7 +251020,7 @@ CVE-2024-25452,0,0,ca5bee31974256da7e8e4d63f15ae6123aa17a8b01bebea28e4fe8e2fbc3d
CVE-2024-25453,0,0,70fb504352781ce397aa4364fe3b34ab3e4604c900948fb24593de6edb56ed28,2024-11-21T09:00:50.560000
CVE-2024-25454,0,0,eb0f60de174dc4a9651449d926569e95570750cdd71cce33c01236df21d8f22c,2024-11-21T09:00:50.730000
CVE-2024-25458,0,0,9ec13dc1734eb500e887f66744313cf44032a2e1f460e1aa11c6be649259eb7e,2024-11-21T09:00:50.897000
-CVE-2024-2546,0,0,d8dbc24cbd7978c86546ddde71cebd01d25565528f565e6fd58763686c3d1a3e,2024-11-21T09:09:59.040000
+CVE-2024-2546,0,1,0a441513e0701507b6f3b7497ce9f5e5e6beb55afbc31c1d037aca1adecb0705,2024-11-21T09:09:59.040000
CVE-2024-25461,0,0,beec46596f13e96701a918f7afd544b33f42667338f9bf1eea5911daccd8d140,2024-11-21T09:00:51.113000
CVE-2024-25466,0,0,2a08590dfd2bd6ae60347acbb99520233bbf6aaba3312cc669867e73fbe0b290,2024-11-21T09:00:51.330000
CVE-2024-25468,0,0,cb5aee55e71ce49f56a046712ac1820d937431364648488dc2293cc0e2ab59f0,2024-12-16T23:04:51.047000
@@ -251410,7 +251410,7 @@ CVE-2024-25995,0,0,7552299c1dfc3c97b1182cc66dfde5945aeb024331a017e1db18f4d194757
CVE-2024-25996,0,0,16b8380c30ed5f6b81a7f5a46529e1e7dec5cde09e2781957b3a8fde65e443ca,2025-01-23T18:44:35.577000
CVE-2024-25997,0,0,2054c6e45ee06908cc541c3f2efce9f95fc1b24a08ed054ed285d56b0320eb76,2025-01-23T18:45:15.403000
CVE-2024-25998,0,0,b28e09d11459c221a914b27ba58b9d7219c4ee3c0b56121118df5d2645bf87b6,2025-01-24T07:15:09.093000
-CVE-2024-25999,0,0,50a5ab0dd3cd4d63f169d2adbb36dbcc9302abecf001fa258294feb6e0e8d9c6,2025-01-23T18:46:09.307000
+CVE-2024-25999,0,1,36e980cefc6fcc27c0bce4e411ad00bd79c7a7ee03b87420d1275e3391f85143,2025-01-23T18:46:09.307000
CVE-2024-26000,0,0,ef6350fadaf481876ad799e8605906c6862e20d4a48fd1e6118c6d86947f19b4,2025-01-24T07:15:09.440000
CVE-2024-26001,0,0,80b53353cb90e4e7cc8d3eed8bc902065b2ac1044471301dc6339b75c31896ed,2025-01-24T07:15:09.653000
CVE-2024-26002,0,0,29b56c9e147fa83eb24489b42c54b01114ea8aff6637ccda166324fe23af696f,2025-01-23T18:48:12.083000
@@ -251565,11 +251565,11 @@ CVE-2024-2615,0,0,52dd24226966af2d36ba382439ed9857bee488a41878b8821cda0b5db9bfb8
CVE-2024-26150,0,0,760c01f2b0f4e8d4df72d58246936122b365d4d76ec3a16d18feb7c7ba59ab64,2024-11-21T09:02:02.207000
CVE-2024-26151,0,0,d276b8c1a24abc1e1732baa2c78d7170250cc1d720b3056de0124851234c0d6a,2024-11-21T09:02:02.330000
CVE-2024-26152,0,0,1dc6dc3291bda60bcd1869d37f2cb2c8de669324c74d8c14c98db460ad6f3160,2024-11-21T09:02:02.457000
-CVE-2024-26153,0,0,8c3ae9d2191858fd283b4e2f045e9afabdf52853492d2134f5e3c0013293cdc1,2025-01-17T17:15:10.927000
-CVE-2024-26154,0,0,7a55563f56bdbef2620b8c6a609d390524041b120bd24f125f40f1983869dda1,2025-01-17T17:15:11.147000
-CVE-2024-26155,0,0,9d6b88e7dbfad19e0aa14afa460da6171af4b161cec0634841d95815c20f7672,2025-01-17T17:15:11.327000
-CVE-2024-26156,0,0,5ab58b3651faaafae4e5f4c0ea29eb006a0c55d0423cdf2a04d4a07b8a66b5c1,2025-01-17T17:15:11.533000
-CVE-2024-26157,0,0,29cbdb0747048f6bf38c1a2fd7f90815e3a23c4798446d9d3ff85458ea1e4770,2025-01-17T17:15:11.697000
+CVE-2024-26153,0,1,20a0ef691b8345667a625409684f2a2395a0703269e6a77c70e1f10bc8978f19,2025-01-17T17:15:10.927000
+CVE-2024-26154,0,1,3c30ab395f097a638ed9230e5d9a7379264a3848f6f1f7afe48b9f986ee0a3d8,2025-01-17T17:15:11.147000
+CVE-2024-26155,0,1,5eee3a955d7716c5df8e64b1ec6afeaacdcbb55c6f0f095bd6e8b4fa29fdf01d,2025-01-17T17:15:11.327000
+CVE-2024-26156,0,1,b2e73e5c20158f8ebc99b3fc7c4b09aada1ebdf8b60718d310eea20b6097e3c0,2025-01-17T17:15:11.533000
+CVE-2024-26157,0,1,da225d923eea7b248284dcb657d52956891e8dea02ea3c4a1edebcba809133a7,2025-01-17T17:15:11.697000
CVE-2024-26158,0,0,09fc1d75121ad09ea3a275f9cccd32b38ff46d4cb1778bb89e6ac29161fd0e25,2024-12-06T15:40:50.143000
CVE-2024-26159,0,0,1b48fef43c59f3ec54fb486cca3f3676b117339286d3339609cb0579c3d1ce4c,2024-12-05T03:06:07.380000
CVE-2024-2616,0,0,3c1888c11eeab37d5acfcf6bb075f78798d2b23b1d25b092860d7147320c3bea,2024-11-21T09:10:08.330000
@@ -251894,7 +251894,7 @@ CVE-2024-26645,0,0,bdee23b950a8dff0fe3120bc636185265634a180ed90c1f8f21f6b1361aee
CVE-2024-26646,0,0,5c3b675eed417f04e79fbe9a962446c0936c3d49eec6b3e012c1e53cad995753,2024-11-21T09:02:45.490000
CVE-2024-26647,0,0,0087defa8b2daf5e29c0c380220574740551b7537aefbd17ea5876ff9a0ca272,2025-01-07T20:15:48.587000
CVE-2024-26648,0,0,57660c3f5372b373298dbe0cd29fd4332764e7181a5b50e285b698a5ae516b44,2024-11-21T09:02:45.723000
-CVE-2024-26649,0,0,e755538fa424fa67581263d7164952806f11ff46847ca4f67e57e88a22ecb657,2024-11-21T09:02:45.903000
+CVE-2024-26649,0,1,299705c3cff087894d6b29bf5893a95489602d66f9111f390ec19a8b266d46ca,2024-11-21T09:02:45.903000
CVE-2024-2665,0,0,7d353e3768885e4e4ccec25142dfea412a0d57b9ef35aaee4fe4d95b6836feb0,2025-01-08T20:05:50.257000
CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000
CVE-2024-26651,0,0,898711d0c00a026cf190f460e3b24d2751f2699fd4b1b6a25eb50a9711c0c7b9,2024-11-21T09:02:46.027000
@@ -252028,8 +252028,8 @@ CVE-2024-26767,0,0,e4a372ff53fbe10d1d76dcedc9f9b1e20359a57170473ffbbac7226ab5aeb
CVE-2024-26768,0,0,6fafd2ec3e7cdf9346d5cf413e5e98785829ef156a7452d7bcbd56c557bb4b27,2024-11-21T09:03:01.570000
CVE-2024-26769,0,0,9ba21540aec936514403e64bdad200b6edb1d7f751bc14c530bdb954115ae255,2024-11-21T09:03:01.763000
CVE-2024-2677,0,0,26dcb9af2819d0d0588d926fb3dd41c7ea730a94b3629b44404ab4750d5cc55c,2024-11-21T09:10:16.287000
-CVE-2024-26770,0,0,772368fc083f601d8c9f1775858b6f5adebf1436875ec211bc52c3a4a07a99d4,2024-11-21T09:03:01.960000
-CVE-2024-26771,0,0,a2a6303023c74cb42fbdef5b966efd015fb528b251c1def136298d57747b6355,2024-11-21T09:03:02.077000
+CVE-2024-26770,0,1,3674829eb513d9fd608fbb43fc3ab399b40ebd828e0dc1fa5085fa722ad22916,2024-11-21T09:03:01.960000
+CVE-2024-26771,0,1,1e7d5bca00e7f6884fece32036c0dae17e24c142da5d3b19cc3a676436258a67,2024-11-21T09:03:02.077000
CVE-2024-26772,0,0,fe8524e99fc68d449508f3ebfd8f6afb4c482f632501c09f5f84e454baa54b83,2024-11-21T09:03:02.190000
CVE-2024-26773,0,0,7ef5aed49abdb8b41013d862bea1395e73f0e319d07ad740410642ca0777300e,2024-11-21T09:03:02.380000
CVE-2024-26774,0,0,e1b47f609864ec2bf2c985b00a1f42e9a22977ef025fa7997c7afa306e1199e8,2024-11-21T09:03:02.507000
@@ -252130,10 +252130,10 @@ CVE-2024-2686,0,0,fec0f14b6d657e98130580c8bcb63b2672efadf690146c9437f8751fa56e7f
CVE-2024-26860,0,0,00d381323672664bc41f4e4cd89b44b51ee6c36af10590042488ae21013d2872,2025-01-07T17:13:52.260000
CVE-2024-26861,0,0,f06c56909e76d83d3acf8485d5478c6ae2d0d83b82e0b9091c4412ec634a0ec7,2024-11-21T09:03:14.277000
CVE-2024-26862,0,0,94216787489441c2b38672b60a8ef4910c5138aedfb248664baddac7173ed4ec,2024-11-21T09:03:14.403000
-CVE-2024-26863,0,0,dcfe4cba306f89e0c765144f98bb541f3dc86b1c5194ee5524af0ddd3b3386b6,2024-11-21T09:03:14.533000
+CVE-2024-26863,0,1,a1c14b17ce135228a17199be1615c6fc84242883495a3d51c54f59d25f8a4c3a,2024-11-21T09:03:14.533000
CVE-2024-26864,0,0,eb2f6d1cc842168692d58368c5385a125dd9b538c58507cdba23f5736373b299,2024-11-21T09:03:14.663000
CVE-2024-26865,0,0,425ec1e666ffd707bf5be9f39ce33453ce0f57a20ff8f1bd74eaf4b15ccb3949,2025-01-07T17:14:10.927000
-CVE-2024-26866,0,0,5a4c4e85054f22132b72e870bf4ca5192ad00542c720bff41708d831fa0c657a,2024-11-21T09:03:15
+CVE-2024-26866,0,1,44df02b3ff709e7d797fe24d95c0f49c8eecceb31154798d532826eb61c68d7c,2024-11-21T09:03:15
CVE-2024-26867,0,0,f4c3e98cf18f5362ba9d8cbace769954683f72425fbef623fdb1cff3c29bca91,2024-11-21T09:03:15.117000
CVE-2024-26868,0,0,470780f3eedbe54e0715c09aacacd15d602e690928f9f1f3cc056aa7f149c140,2025-01-14T14:45:52.020000
CVE-2024-26869,0,0,02922038ad2af42246888c4202e00a6e69990dd39e8a7ee4b0bde6c82bbc6099,2024-11-21T09:03:15.370000
@@ -252147,7 +252147,7 @@ CVE-2024-26875,0,0,94239f41f42b905c954bc6edc97b0cf15f6dec0d8fdfb2fd1b19e8e24e9c8
CVE-2024-26876,0,0,cae97524862d4115e788a327d03cf0da2acf0edba8249dc998aedc8a21a3f2d4,2024-11-21T09:03:16.380000
CVE-2024-26877,0,0,54721b8ba6c7b4d0a18ed9c595e6136296498a569bd20bfeb4ea6cc3920631ea,2024-11-21T09:03:16.520000
CVE-2024-26878,0,0,2c398350514fb54f2342aa6342ce493830beeb75951d27f14bae83050dc81b26,2025-01-14T14:49:44.283000
-CVE-2024-26879,0,0,9704d8839b75b0e854eec4c51359697b6a4476f2d785619c7296d3dff7e0f239,2024-11-21T09:03:16.793000
+CVE-2024-26879,0,1,dc370a9579629bfc3c9d316d1724c887ec484f6ade9c1976583f08dbcecc8983,2024-11-21T09:03:16.793000
CVE-2024-2688,0,0,93325ede5335c7cfe6caa2a8077a03a339fd6598ac72c158a197fc34644bc992,2025-01-07T17:17:38.673000
CVE-2024-26880,0,0,b775bc30b873c71ce0741bd89eb501a0811ff9c595ceddd964535015994b3d7e,2024-11-21T09:03:16.923000
CVE-2024-26881,0,0,c9147da975715d7d9e15d8a477237dbe48b93c3e840440ef85c748b4931c6aee,2024-11-21T09:03:17.140000
@@ -252163,7 +252163,7 @@ CVE-2024-2689,0,0,efd9c698169d4dc6b507d633d5c5bca5635fd88f4fbab04c5f54592266ffc9
CVE-2024-26890,0,0,d28148780134fe9d4fd26b89472d475a8cd9fd94507e1d0beb5192c2d01a8c30,2024-11-21T09:03:18.677000
CVE-2024-26891,0,0,18ef1231e3dab94fd46bd51769a57b4742af39b60702f0ac393cf1e3791be7b3,2024-11-21T09:03:18.877000
CVE-2024-26892,0,0,dff3724f39f4f7d27824ec776eef6bd6154cf578f200db90d4aaf7ae8dcb96a7,2025-01-14T14:34:50.407000
-CVE-2024-26893,0,0,d7693c4e9fe752b465cf2d288069a1e2bf4fb0527edf72a830b5a88405414f0a,2024-11-21T09:03:19.143000
+CVE-2024-26893,0,1,a32b93693aea02e2d2b15b97f491f25df71cab99d38e3b872b8f185bf53bc45a,2024-11-21T09:03:19.143000
CVE-2024-26894,0,0,a0a3505846084c5b38d2ae3c10f78c77094fefe62fef76a336ba2b60789b1f16,2024-11-21T09:03:19.273000
CVE-2024-26895,0,0,c7dae02178f516d4283340a4f7cce896c92a3602b8fb81a9ffba367ad09ef0ce,2025-01-14T14:33:40.417000
CVE-2024-26896,0,0,c6e43fd686585240ffa18e62a933c3ad899a2ecd05bffcaba7c10cff96b5c484,2024-11-21T09:03:19.633000
@@ -252419,7 +252419,7 @@ CVE-2024-2713,0,0,7c28d27f25ddda1c231ac9fe3977258c4de4e99af0cc5bcd61fd742e549709
CVE-2024-27130,0,0,c9d6b28e2a18273de881a42f0dd25c4fe8494c26ad6475c525d0437de22d4449,2024-11-21T09:03:54.880000
CVE-2024-27132,0,0,97112c2430a1efdd24acd2d9a19461523930f5b80f33a45ebf983e3f77055e65,2025-01-22T14:15:26.130000
CVE-2024-27133,0,0,0bc1efdc0e9ed092d39790d962760e4b53b0fb29de201e5b7a8c363318010504,2025-01-22T13:46:56.667000
-CVE-2024-27134,0,0,10536f2c6cec2d014c78c98ff1034c300c2e1bbf125cdac8c205d1c9fa4af632,2024-11-25T14:15:06.867000
+CVE-2024-27134,0,1,a81c14fa3165ff29b0f9d1cad83c901f147c212245a13d28998cc9433c67df44,2024-11-25T14:15:06.867000
CVE-2024-27135,0,0,80b8ba32d4f0a656beacca0ee117fdd873e18aeb3bfa0ccfdd421e2596348736,2025-01-22T21:07:10.113000
CVE-2024-27136,0,0,bb37721f8ed99b1ce670c8cc12d36d4a8ef9b3720f3c4a42663714f551f679da,2024-11-21T09:03:55.410000
CVE-2024-27138,0,0,6de0692168ffb8321db4d7a75bc11e70c526c15c151f740bb19b59afdf3d020e,2024-11-21T09:03:55.543000
@@ -253010,7 +253010,7 @@ CVE-2024-27896,0,0,cefb57e4fd2360f9ca76121f5d55c0879f2b9778073436f6d450ff9f01865
CVE-2024-27897,0,0,e0fd628e199d1ad9f7d1973d04b30e3b226e987f2d07bcbb58339313ac383abd,2024-11-21T09:05:22.297000
CVE-2024-27898,0,0,af89e17a8df4c3a779fd434e3e11879bb6cd54de374fc7845601631da86da367,2024-11-21T09:05:22.490000
CVE-2024-27899,0,0,a604999ac254f893bf484b56f8c916b1c621d5e943e54c837b0fa2e56a53a410,2024-11-21T09:05:22.627000
-CVE-2024-2790,0,0,28acd450273acb76581e029fe600fdeec5264d4a8f42762ddf5d95aca5ea9e91,2024-11-21T09:10:31.453000
+CVE-2024-2790,0,1,f35a3cdce10227f574bb5bead9302c19b42eeb1b5078e42d79625047e3d807db,2024-11-21T09:10:31.453000
CVE-2024-27900,0,0,0959b2054b27454fdc1ef4ac218f2c38f403415af9de5e09c07c2e491cac493b,2024-11-21T09:05:22.767000
CVE-2024-27901,0,0,446889df5d6f342bce9db6ffc9b1986b1759b684a2d1d50d324de40c727810fd,2024-11-21T09:05:22.907000
CVE-2024-27902,0,0,3ed35f57e19fea9dc67cc2f0d80160581d1f940b7dddb56881544543ee19baa8,2024-11-21T09:05:23.040000
@@ -253516,7 +253516,7 @@ CVE-2024-28666,0,0,624b6b2b388bce85a975ce3a777bfae7ed3108996cd956dca2a209f1f4b66
CVE-2024-28667,0,0,7954c82a1b134d6d11512799a170b0f0e3d568e6c2821e6dbe8090b84dd30387,2024-11-21T09:06:43.600000
CVE-2024-28668,0,0,0751eefb865e6994a02e5078d0717f744911cdbf16e6c214b69929aebe673670,2024-11-21T09:06:43.810000
CVE-2024-28669,0,0,fee252bc5a362683de5d6620bf53622d90aae197f4d777ecf6aa8875c3ca93be,2024-11-21T09:06:44.043000
-CVE-2024-2867,0,0,fd4f70c670a174697b10113a12a0a1c4069f70aeb31c0ebfeacb63c896f2fc9f,2024-11-21T09:10:42.893000
+CVE-2024-2867,0,1,e9fe63186091344fa885fc1a43105c337d44be37fe1e54dd9c51912453abc2c3,2024-11-21T09:10:42.893000
CVE-2024-28670,0,0,ab1611ec1ccd2f7d119446b2099a2f6fb91c67e9ea96502c09668ca7e90eeafe,2024-11-21T09:06:44.270000
CVE-2024-28671,0,0,e25733fa67de3d649f7259e16738d845a6db94b940dd14d343831edd5a38fae4,2024-11-21T09:06:44.500000
CVE-2024-28672,0,0,182cb4e0c7a8ffda160916a5cb3c7781dca562943a914d3c5dacdeb9e9903ade,2024-11-21T09:06:44.720000
@@ -253886,7 +253886,7 @@ CVE-2024-29103,0,0,d41735cb9da95e849a5b45306d53d28ce564494ecee17e60023a3cbe91f78
CVE-2024-29104,0,0,f1f189a63b7a01d1d49f3a6b0cae20a47961d88101d8514d2c423c4ec2f149ef,2024-11-21T09:07:33.760000
CVE-2024-29105,0,0,c66a7fda0a5c9f8df47a07bbce9c424c595eafc32fe89bcf2c583a37e4654e1f,2024-11-21T09:07:33.893000
CVE-2024-29106,0,0,5358d902cefa6be44c0ee6c2d2f511319af57f2f7012640f44e3f1013fa1cdc1,2024-11-21T09:07:34.030000
-CVE-2024-29107,0,0,7d19dc574278cf1683013d8ff659c1411a9735a9ace582b1cdb650f880b70eef,2024-11-21T09:07:34.160000
+CVE-2024-29107,0,1,575a378e14d23427f30e92b1c894a1fb54c90fb958b2d4efde6fff0a505f35f7,2024-11-21T09:07:34.160000
CVE-2024-29108,0,0,0ae5c87de818ee6d85336d44fecde11bf0ad3f784ce5bb54a4b6c764bf7af8c3,2025-01-08T16:30:17.263000
CVE-2024-29109,0,0,4d51f8f3341e8657e6c8c880f4f2d73bd95482441c6ac3a26d0a8cd436b3b41c,2024-11-21T09:07:34.440000
CVE-2024-2911,0,0,947f33674e3a84a4df184fca1e8444d630bfce299331118affd153d9859966df,2024-11-21T09:10:49.123000
@@ -254408,7 +254408,7 @@ CVE-2024-2995,0,0,9f2ab836af0be20171b7f46f52263d7cc005cbea664b19860daea070d373f2
CVE-2024-29950,0,0,4242418187d61061def3edf2fc7dbc425759f01bedfaef8262e7860b3c59e9ef,2024-11-21T09:08:41.023000
CVE-2024-29951,0,0,515f29a6f1d05fbb2d864b504a4d27c9a46a8269c981fe5a152ead6d404176dd,2024-11-21T09:08:41.157000
CVE-2024-29952,0,0,7931c762136d92d8257cb23bfb1988a445a95d696aa4c652dffa3d94e85484da,2024-11-21T09:08:41.290000
-CVE-2024-29953,0,0,fe88368a62bdd835ab54078e6b9e8a197c8cc58daedf528ab593dd112c3f9ef9,2024-11-21T09:08:41.407000
+CVE-2024-29953,0,1,7f080772ca10aad795a2dcd58207b2d8ca76103839c0cf1df5daa3bbdad18fa6,2024-11-21T09:08:41.407000
CVE-2024-29954,0,0,9356a83352238148d36e4581851f1ac74b888a98d6b8c44b5bc6513e0b3930d6,2024-11-21T09:08:41.527000
CVE-2024-29955,0,0,74426bf296de318a8900e46769d24a0613f37709a3b482f11a5b056ff78ff76d,2024-11-21T09:08:41.670000
CVE-2024-29956,0,0,188cc2a9f5bcc2a2f4204aab1c8e111809dec173ae459950aa21e92bc298c4dc,2024-11-21T09:08:41.803000
@@ -254628,7 +254628,7 @@ CVE-2024-30179,0,0,f8038176185d07e7f724f868e44725dee5d89f9e567d5a1272779cd6cb9c4
CVE-2024-3018,0,0,f65a264962ae2b96d7ccf9718d594d89d33b43e0d817bc446c0cdf042d66d063,2025-01-08T19:35:58.073000
CVE-2024-30180,0,0,9ad3efa7e683e4471ea88f07410b3c0c613e57d65ed8126b5bf9db13a8b4971b,2024-11-21T09:11:22.647000
CVE-2024-30181,0,0,4b63a15f923a825c1f6a8173bcb6b942101ded5f17f3fc266f511573c31cc6ed,2024-11-21T09:11:22.757000
-CVE-2024-30182,0,0,0f6979edc5340254c61dbc0cbd7d4390e6b740ecdf6e9fd97a9d73ad11716bc6,2024-11-21T09:11:22.890000
+CVE-2024-30182,0,1,86c034dadc49962b0db49175fd17d91f3835dd1ae09cb6d8f9ae27a948b24b8c,2024-11-21T09:11:22.890000
CVE-2024-30183,0,0,3c466350958593d90ca423ea65b4cb5e481df5dfd1cc5ae5c5525bde0c6264fe,2024-11-21T09:11:23.023000
CVE-2024-30184,0,0,687d938a7f6ece9acd3b8185e8886757183e17afb63a5ca83ac7911758ed5b39,2024-11-21T09:11:23.150000
CVE-2024-30185,0,0,d9a11fa1493c3d39202258e7784ebd32e5e9ef6143e723e534df965b9d61d3e5,2024-11-21T09:11:23.273000
@@ -254870,7 +254870,7 @@ CVE-2024-30419,0,0,4ce0d791ec8405789a5547d96555f558222fea0d6abb07ca21579b1a05f2e
CVE-2024-3042,0,0,1035f79872360bc59d8efaa2fba122980688369c23f92dd365edadbcbff99c50,2024-11-21T09:28:44.810000
CVE-2024-30420,0,0,403a0bdc356df9601fc5ecf185347c2ed0664384c1bbee678bcce76af9aa6137,2024-11-21T09:11:53.143000
CVE-2024-30421,0,0,7afd28cf0a598ceb77ce8100ff766dd125654c211246f23a4b533003549add26,2024-11-21T09:11:53.343000
-CVE-2024-30422,0,0,f1a09033f30af3dbc4ed0f266b90c8b945e8f4aa6ff8432074336bd4d6240f46,2024-11-21T09:11:53.470000
+CVE-2024-30422,0,1,2c3c161749acbf2bde63a94cdbb3b5869d516cdba1d41245ed043efee4bc2ae5,2024-11-21T09:11:53.470000
CVE-2024-30423,0,0,5b1517d395b5f8158dfe3dfb9c31f1c8a0fee969a59141fbef55b4ecb5784516,2024-11-21T09:11:53.597000
CVE-2024-30424,0,0,48524e69984a1ed7696a166e148f60ba365f7f7962129b44ff4524ebe85c89bb,2024-11-25T15:07:22.740000
CVE-2024-30425,0,0,96b8a2a4b919b8cf614ee2ac07ccd87ba7291b38f6783afe2064b94ec09ae5e1,2024-11-21T09:11:53.790000
@@ -254983,7 +254983,7 @@ CVE-2024-30526,0,0,bba5919837a659eedd66bd6f4182695063f2993b9c8f45e09d0ad3c195272
CVE-2024-30527,0,0,2c1feef7f01e006c11f931b2e2d894a8e287f3163f534985806ab8cbda416898,2024-11-21T09:12:06.427000
CVE-2024-30528,0,0,ac1e81a5dceda71b86a3b3bdc4b07e2c23fb4e83ab19a55e510f918b6007674a,2024-11-21T09:12:06.553000
CVE-2024-30529,0,0,7e54f5e683a6e2f7cc403098b91509b499ced2237f14e8a2c08662321fc733c2,2024-11-21T09:12:06.710000
-CVE-2024-3053,0,0,43bf02f20e58d457399258664f79ef54b1de1137161aaf1991195d09a193a383,2024-11-21T09:28:46.530000
+CVE-2024-3053,0,1,e2c9a93dcaf82daece45335d320cf11b62f821a1fb112bd6c143396afad4d756,2024-11-21T09:28:46.530000
CVE-2024-30530,0,0,76d328fea4649400b2118d2ec23f2b4d376f8e356e1be656cfbc66ff11873eae,2024-11-21T09:12:06.883000
CVE-2024-30531,0,0,9158f96d0f3926ed04db19b15cfb844be0c2582067dc1f1e6833f19bbceda472,2024-11-21T09:12:07.020000
CVE-2024-30532,0,0,e9c45ee18a559bf1fc8a96ff54502486454bf4e6677826aa73c3d205879f18f2,2024-11-21T09:12:07.153000
@@ -255402,7 +255402,7 @@ CVE-2024-31186,0,0,35ead0cb7e8fd0397a0e71fd7bfbeda178ed0aa6748ab64dd83d979761a7a
CVE-2024-31187,0,0,cde8847fb17fcbc28f33ad646990a0a00330b18459cde2d9e4b9ededb684ba08,2024-09-20T18:43:54.320000
CVE-2024-31188,0,0,85b93a6dcd40d6984adaa178ad2b9c5279f03a137c52d77a3d8d82b334b36c23,2024-09-20T18:44:13.943000
CVE-2024-31189,0,0,0e47fd427bde2b6e524a430fdb9c55c4a75a743e1a8cde68a8080c96db9a9a0a,2024-09-20T18:44:33.780000
-CVE-2024-3119,0,0,01533378ed8660d7517efdf071a589cdf3b3a63f5ed3ab644373e33efbdb02ec,2024-11-21T09:28:56.580000
+CVE-2024-3119,0,1,a22dc6236222c17a6744fe6678a839a73b14f3d9aa234ec27ce4d623c4de5160,2024-11-21T09:28:56.580000
CVE-2024-31190,0,0,e69c517f7375f3a1c352799a44522c6159f0ea79bb88cc80d68decb5b24f7487,2024-09-20T18:44:53.940000
CVE-2024-31191,0,0,7834e855b5249fe9ae6cf68a0921cbfffab2c637b78b8020a57189a8ebcc66c4,2024-09-20T18:45:07.533000
CVE-2024-31192,0,0,31a64ad340a0dd37c1b692e1c372d0115abc54555827b10594c1d294c7a1bc39,2024-09-20T18:45:28.780000
@@ -255413,7 +255413,7 @@ CVE-2024-31196,0,0,a0f160b2579ae6c42a835e6ea8f3f35f05697c842a20121e0256e5e3fdc2c
CVE-2024-31197,0,0,2b9a47209344a077c9adf7c738e64f5337b3ee3bce9551569bf50655e1e59e1c,2024-09-20T18:47:09.157000
CVE-2024-31198,0,0,2c6874d5b93209ae389243b1bbc2d090097e1b00fae8f630464a431e4d389c71,2024-09-20T18:47:30.917000
CVE-2024-31199,0,0,cf68007908f399fc4fa3a9e6dc697fc476404ed7b1905a6d85c932b5c1019303,2024-09-30T14:15:03.093000
-CVE-2024-3120,0,0,db4fb1518fc66939ab67efb87b752b49031736976813c2acb458bbd89f37cc27,2024-11-21T09:28:56.713000
+CVE-2024-3120,0,1,3fa943092496b07459bfbf351c13c897b491747246c2adfc8736944c3dea0add,2024-11-21T09:28:56.713000
CVE-2024-31200,0,0,59c7d6b88e67236e6b8e913dc2cf578e5dc722a5cb5188d29c5a49876225c61e,2024-08-12T18:25:44.547000
CVE-2024-31201,0,0,40c0d49c7ad3dd3ea5188e1b47c93a92c0c7e6b3953ddfc6bb0c163ce4aa5c23,2024-08-12T18:46:10.823000
CVE-2024-31202,0,0,cb95d685f867b5064530818f19d4080b7e0b3e4262b10b10fc6750ebd37c91db,2024-09-30T15:15:05.190000
@@ -255923,7 +255923,7 @@ CVE-2024-31898,0,0,2bdf434c4d06bca201e71e4a7c99060368586d3dea800b988968adc32062e
CVE-2024-31899,0,0,e3477cb6ba6850b36435640b21267340780a9020b61b2670506bdd2d9d1ba253,2025-01-07T20:02:40.877000
CVE-2024-3190,0,0,bad297e304fb4b0d6eafd0a234cf1fc72af8a9c2c234dc9ef80f9a08d6ffcbca,2024-11-21T09:29:06.810000
CVE-2024-31902,0,0,003a18851ece455ee1e6ea2a4455c0284b8742534b1304a5388aa31d40a16816,2024-11-21T09:14:06.483000
-CVE-2024-31903,0,0,a9ee045a5ba7b879b4c31f26753e26edef5ce97c6e396a00e63c54ed05546807,2025-01-22T16:15:29.030000
+CVE-2024-31903,0,1,f1559924e9af14a36520fa16f97e50e9463ab7aedc8dee1206ec2eaf945f2191,2025-01-22T16:15:29.030000
CVE-2024-31904,0,0,d2a04e1afb3ab14e7bd62c982b1ec9fbcf0becba36a47360842f1553f25b269c,2025-01-07T21:05:40.810000
CVE-2024-31905,0,0,4f1bdfcd5321f7b992df963e233e7a11fb0781b24167b44218cf69a784597a28,2024-08-28T22:08:30.560000
CVE-2024-31907,0,0,56360f441ba18f82366ed4eb471a5c96a8260a64fefc6012f99306629a9a97be,2025-01-08T17:06:40.250000
@@ -256396,7 +256396,7 @@ CVE-2024-32551,0,0,9eb6adff658e0ed3ba8b9cca3b2ad72de54c01f3762eceb3bf237d764edf9
CVE-2024-32552,0,0,f03a9324b01272ea2f2bc41ba043bfcb0473c21185ed38949036a53bc161cd00,2024-11-21T09:15:09.870000
CVE-2024-32553,0,0,75731ebafc6623d1310a34a2800e9f80a87ac1b537ecad73da9626a152179623,2024-11-21T09:15:09.990000
CVE-2024-32554,0,0,d93f4dc49dd5e1eecd69949134cc6162762a6c2eb4110f961a584b3b2139291d,2024-11-21T09:15:10.120000
-CVE-2024-32555,0,0,ddbb22701322fea84a8bcae84be90c7861354d61a012c3cb6ed85f1a8836565b,2025-01-21T14:15:07.027000
+CVE-2024-32555,0,1,f73833eed7fc01ee0c4ae149905923f02957299bcc93ef594f1b09529337209f,2025-01-21T14:15:07.027000
CVE-2024-32556,0,0,833c498991a81001e8dedc535c7af786b23214181fc8b84190b72772b7e45498,2024-11-21T09:15:10.260000
CVE-2024-32557,0,0,5b0ec57f637488f201cfe87382c0a1fa7b19c9f62d1e0f85ef3c809e5fc5ea28,2024-11-21T09:15:10.397000
CVE-2024-32558,0,0,164493ea9547d065ff20d36c66bda23d26ede0bfb266fb54b0d2b6423e912600,2024-11-21T09:15:10.530000
@@ -256918,12 +256918,12 @@ CVE-2024-33066,0,0,323275c133034cf4224fb00037d116cf25466127dfeb2577a4ca56f8f20e5
CVE-2024-33067,0,0,638bc9109794811420c30f35ea11d5d4e8d641b82ad31ae2a8a04e02b6bda35c,2025-01-10T15:39:01.290000
CVE-2024-33068,0,0,1d4eb491ffd27751b128ddbcdd27665d885fb6c0654a60e64c8908848b5f2e57,2024-11-07T20:07:29.220000
CVE-2024-33069,0,0,4a5a5f18faff9786c7e7eff1069eadfad4725803a4dd186adcecf1b88d434afa,2024-10-16T19:48:32.207000
-CVE-2024-3307,0,0,5392e910a9f18aa74f00667d7fa40ed94d60062bc5e8b43b55756ba9f0da5e3e,2024-11-21T09:29:21.743000
+CVE-2024-3307,0,1,65433a4e506351266e1eb2e8d4ff2e11f50355e4a212316c678fd3a554b4d3e8,2024-11-21T09:29:21.743000
CVE-2024-33070,0,0,ab6221ecd33104a17e11c9938ba8ceaaa061b181be94c7202aa830fb34495274,2024-10-16T19:47:04.547000
CVE-2024-33071,0,0,e53a736ac9461278da91e39c670c56974ca6fab70efa5d500f79ba198c2fad5e,2024-10-16T19:41:46.737000
CVE-2024-33073,0,0,b5d4e58d81439b774e84f6a69dd2172492c1aa589c80a5b1d8e24f1117a3650e,2024-10-16T18:25:05.420000
CVE-2024-33078,0,0,123868d87f2c6966578811c80dde93d57aaf0a1755ff1ef0a3801a7fd096c3f8,2024-11-21T09:16:30.573000
-CVE-2024-3308,0,0,68e1898133c19f959b8054160f1b0822311f1ba4dc900a0f3ca611dcfabce654,2024-11-21T09:29:21.867000
+CVE-2024-3308,0,1,d8ceef29f97f6ff6e2a9bdc13e16c2d4ea72b48d12d74a8bcfae0e2f807e85ed,2024-11-21T09:29:21.867000
CVE-2024-3309,0,0,2c84c7c9dab970b4398fd9c8317b4103338d80007aa6cfc05ae442f3fe447961,2024-11-21T09:29:22.003000
CVE-2024-33101,0,0,060d2f20cd090be3be4b153edf45165363fd6d1d8c8d6968335cdbba1b546382,2024-11-21T09:16:30.790000
CVE-2024-33102,0,0,4953918f2cf07b479b9dc9d307ae24825f1d3a4cdfd759416b7c167da4c7fd50,2024-11-21T09:16:31.010000
@@ -257554,9 +257554,9 @@ CVE-2024-34028,0,0,934507f74a9980c1b522d6c06e1c5c313c6c6350eb055bcfd2ba2fe531c55
CVE-2024-34029,0,0,28955cadb2652f3ed8715b1105f4f2b127c3a074a158620f14abf34f2332bab0,2024-11-21T09:17:56.890000
CVE-2024-3403,0,0,35c375acdcdc96d67dcf90a24b47f970416839cdfccc78da387631d90f23c467,2024-11-21T09:29:31.520000
CVE-2024-34030,0,0,0f42953a89d194a36318ed8d4be50bf3efbe42245c9b26de406722e8c8b045aa,2024-11-21T09:17:57.040000
-CVE-2024-34031,0,0,07d2827a487365924f8234d5e03bc3346d7047651645eb5a2c6e74a7db8df1de,2024-11-21T09:17:57.240000
-CVE-2024-34032,0,0,853b4eeea3319c694f37d143b750d4c773204e2d7964962411e39e2b9319920b,2024-11-21T09:17:57.383000
-CVE-2024-34033,0,0,d0661d522c0467c86d5b55274299f3c70741ed406cec19a58736e824906667fe,2024-11-21T09:17:57.500000
+CVE-2024-34031,0,1,b49c046b976d6894a95bd6c95383e6673021e2f0d3e8b5b858953073e7596182,2024-11-21T09:17:57.240000
+CVE-2024-34032,0,1,796ccac9a1236ed709011d93ce15dc57eca3d19bd7d44a7f7f674ee62912916b,2024-11-21T09:17:57.383000
+CVE-2024-34033,0,1,5f75a9dea22f9461b9900b932f9a87831b6a84af435dd8b8ef1ebf0bd2e18c13,2024-11-21T09:17:57.500000
CVE-2024-3404,0,0,6fea713d49223c11c4a6ed8171c383bae0a065dce7cd39ac6527df87319a6bb9,2024-11-21T09:29:31.663000
CVE-2024-34043,0,0,53d43ce8307f8de15478a2599f8c8bc215f7ec8b04c173f3e969cef0b4ee49c1,2024-11-21T09:17:57.623000
CVE-2024-34044,0,0,f53b421c4d735b77bf8a81755242f7d2e02484d8eb0a14198eaff9e938f44722,2024-11-21T09:17:57.840000
@@ -257719,7 +257719,7 @@ CVE-2024-34226,0,0,1d377f61cf795fbe00be67ffd9f00a82954a881e118fc5adc61c7c13a7e4c
CVE-2024-3423,0,0,04c44e8c396e88e33e76b227756ab6e4a3cdb303568294582004d57706273469,2024-11-21T09:29:34.370000
CVE-2024-34230,0,0,ee5efe3516751b032076977625757928f003fe090164432914314acde3d27151,2024-11-21T09:18:20.700000
CVE-2024-34231,0,0,29220a31577fead32a56d0eaaed07b40b7e0f50ecbc13725dd1aa6abfb3d2ca2,2024-11-21T09:18:20.947000
-CVE-2024-34235,0,0,af0ad3586f59718b30b4386fbbf1fda4d3ffade8250cb8d07a7bc44099145fab,2025-01-22T15:15:12.900000
+CVE-2024-34235,0,1,dab26bff88668dca45ccc233b8bf548c9cad07c0297c9b8098d31cd0ae0063e1,2025-01-22T15:15:12.900000
CVE-2024-3424,0,0,e0718adbebcf95028a75e1d01668f5e86810db0c5f9d10c5b9f35accf22b943e,2025-01-17T16:39:48.853000
CVE-2024-34240,0,0,a6cc74a4b7e6ac1ff4630f4dda1cfe0067255faac0d07ac084685fd926fc750d,2024-11-21T09:18:21.180000
CVE-2024-34241,0,0,e6b9fe6b441390d6d7cebe002b321929ea0e881ede166ad6eb49a567d3b43c57,2024-11-21T09:18:21.420000
@@ -258134,7 +258134,7 @@ CVE-2024-34726,0,0,bdf1c10bad500e5f1e09d27cd2da23e006e09b1ecb18278113f96b8780dfa
CVE-2024-34727,0,0,4a9f253e72de9fd61a800297452a281a67b416608269846034f2964d86b9f842,2024-09-11T12:43:45.260000
CVE-2024-34729,0,0,a9c60c9154b250ad0ad8fb09f024d8d1b9a123940a86c93e901bc505dc2f9470,2024-12-17T19:39:04.070000
CVE-2024-3473,0,0,635984728ea9670d6b9cfdf6ab19079fff83892dfbc983db637b3e272784b4e4,2024-11-21T09:29:40.730000
-CVE-2024-34730,0,0,9de90587a2d7fe20d7b8a0bb27224d362df13e896e75f411e43d214819eb540f,2025-01-22T18:15:18.827000
+CVE-2024-34730,0,1,45d08741aee6202ff7c55a96f7bd28befafc59a755472c03986c43b146b721b7,2025-01-22T18:15:18.827000
CVE-2024-34731,0,0,dabcba1d59e1f025a63b5ba7e0e668c40ba804a6e53f3f2f1868cf15359d53cd,2024-12-17T18:12:43.217000
CVE-2024-34734,0,0,d30ceeebe447a9d3b85ba81bb31ffe8db8e1bfaa20f969b2a1722a59d0c81073,2024-12-17T18:49:54.800000
CVE-2024-34736,0,0,796d4e22dedbbf6a45bf78b4b61b6b991a6074c75d5a0d88ca4d35b7a87b1fd1,2024-12-17T18:49:00.327000
@@ -258360,9 +258360,9 @@ CVE-2024-35136,0,0,7f9b2bcfec1e00e4c5448e8eb34d153823c83bc999a69fb0df8058180c228
CVE-2024-35137,0,0,8a304cdbaf59bb986c8c3f32bdf1739c04b00c7f60b0a646c085f118d8cde7a8,2024-11-21T09:19:49.143000
CVE-2024-35139,0,0,be4c987cfcddfe8d90c735ee236dc1ac4502531a983ac5f6945739f9557c9cc3,2024-11-21T09:19:49.280000
CVE-2024-3514,0,0,3ed2667128afb9e047ea43d977eb1ed71e90bed358f504ad5e2322f1a22b1903,2024-04-24T17:15:47.423000
-CVE-2024-35140,0,0,37f4140de7aa8dd39d8111f031d5c587c1416ebdb1bb9df593f833a210253108,2024-11-21T09:19:49.420000
-CVE-2024-35141,0,0,3d2ec3f244dac1a61d82845f09dd060aa8f5140fee1c7509e0fc99213fe22450,2024-12-19T02:15:22.810000
-CVE-2024-35142,0,0,e09c5238f96d6b53b763e5c8961455b72303122361b03a3c2392fee37019e072,2024-11-21T09:19:49.550000
+CVE-2024-35140,0,1,c5d6d04af53e3deeb2da70ea174f74d835dcb220fcddef3beb04945151e21df9,2024-11-21T09:19:49.420000
+CVE-2024-35141,0,1,06b8aa52c2298990aa93ebe433e9abdadb53fa0de866da999a18dc6b50cfe5f1,2024-12-19T02:15:22.810000
+CVE-2024-35142,0,1,d486cd9f363f267b0860fa62ede57782964ce47c8eafbc464fad9d9baac7603d,2024-11-21T09:19:49.550000
CVE-2024-35143,0,0,5cb5e3449a374a30898ff7b59de5af975c3a54dcd7a31450775ca701ccf638fe,2024-09-11T14:34:13.590000
CVE-2024-35144,0,0,65bfff25065dc06e7ed3ffa2c7e9ed55e23f7e474c71c541e867327945cd230e,2025-01-25T15:15:07.633000
CVE-2024-35145,0,0,8d8b40b9515a5e67e9a273cb2dbf15ac7a0e7e8f6cb7f4063639fb909d26b9da,2025-01-25T15:15:08.440000
@@ -258788,7 +258788,7 @@ CVE-2024-35726,0,0,f5a8e9511a2d53417e10bdb8c6ec3b0245c4f719651b40bc002547ea74f9f
CVE-2024-35727,0,0,ad2bf1c82b0d71bbd89218666031d654eb0a7ff5336223a137f7c24d46b23f54,2024-11-21T09:20:45.377000
CVE-2024-35728,0,0,73f8c29aa5e1c1efcd63e02ba9e788aad265be15f3096ebf0541f5f954037bb6,2024-11-21T09:20:45.503000
CVE-2024-35729,0,0,75040266dbb68e2a22ae8a4d628b5ad04817154132f5ea4a5cb9c9c19e15e133,2024-11-21T09:20:45.623000
-CVE-2024-3573,0,0,15114c0bcb3820ed82c008afa07278aba2340d0af0c051b6e8546347fc570e9d,2024-11-21T09:29:54.380000
+CVE-2024-3573,0,1,46639275629975ca980f5d35bce3595cd669e75a1ada2a085ef7c02e341a6a43,2024-11-21T09:29:54.380000
CVE-2024-35730,0,0,035de85e2b5c3025bdf4878bc85e49b7b37ef56c27dd63f0b66f0b82e4d3736e,2024-11-21T09:20:45.747000
CVE-2024-35731,0,0,aecc8ec9533773a836892255fbaa6a7111e0e379ca6a4062a08ec9c3327eddc0,2024-11-21T09:20:45.877000
CVE-2024-35732,0,0,24675c84a2667b2d33b3f1873246d31d9e4f930abab520249d4e55e3a2f7ceac,2024-11-21T09:20:46.040000
@@ -259382,13 +259382,13 @@ CVE-2024-36369,0,0,86335f126149b45fcfe791d3a51b05f9b5c2ef6682670204bff02f19d0fd3
CVE-2024-3637,0,0,21120798a280816ab7cf3ed70bbd1f108404954e011a1d26b78f2314da517882,2024-11-21T09:30:03.153000
CVE-2024-36370,0,0,7197b09dbd5b84f4171470c9be6f834edd16667f764d0dab4aed81738c95555d,2024-12-16T15:42:30.397000
CVE-2024-36371,0,0,beae7d114ca51288bcc971c126cbd91dfe3a175d32b595469dfc3189b7a03bfa,2024-11-21T09:22:02.753000
-CVE-2024-36372,0,0,f904fafce93cdb574512bc8038996ce8f1b1abc255493f4b077cf5906c5d7cda,2024-11-21T09:22:02.920000
-CVE-2024-36373,0,0,14e86239fe2f2a099c98ef8abdeb611c7d0c29cd7d8e7616ee91094ab38c7a74,2024-11-21T09:22:03.053000
-CVE-2024-36374,0,0,61ad2b914ca79bc5f1186c901360c0957ea4c027de0880ac663ba524a91e43fe,2024-11-21T09:22:03.193000
-CVE-2024-36375,0,0,857befe242675cbf21e8f468f8a3d85d2f4daedf1ce7c386fc270c490aa7ce0b,2024-11-21T09:22:03.320000
-CVE-2024-36376,0,0,caba93f58f8d78baf31e49d2eeaa115248b3da66b54462a352e67310dc78d93d,2024-11-21T09:22:03.450000
-CVE-2024-36377,0,0,1a0563d72e31b526deae534db8117dc01fc72d90e4ff0576bc2deea8ac0a7d07,2024-11-21T09:22:03.580000
-CVE-2024-36378,0,0,e67d4afa28ab3683cfab89f83f9e9db5b7bb32bc7eb31b3bbad90387ca58e409,2024-11-21T09:22:03.713000
+CVE-2024-36372,0,1,0309d305f72650b3d9ec9b240ef4b7d6a4ba836542977bb391532c61133a7268,2024-11-21T09:22:02.920000
+CVE-2024-36373,0,1,8c6a834f536c076574ad82064aeb084b5c6999b5fb0af962d622d0856eb327de,2024-11-21T09:22:03.053000
+CVE-2024-36374,0,1,583ce814aff7e9f5e36bb72bb6f3b297ab87cf8a4d5e3279016030861cd6caa5,2024-11-21T09:22:03.193000
+CVE-2024-36375,0,1,afefa21f6e0578f3d1920264f24364919d32532e00ad50f24d28f4a7ce6d9956,2024-11-21T09:22:03.320000
+CVE-2024-36376,0,1,954cd32e13e8a53a15f00e8ff3939bd972260e68f3266e035a081e84214b8cc1,2024-11-21T09:22:03.450000
+CVE-2024-36377,0,1,ce5f52182dd7707279576a52f20f526f280cc048b468223f1452e833531c0810,2024-11-21T09:22:03.580000
+CVE-2024-36378,0,1,bc6a97d89084cc7599fedfcc409f54e4ebfc4c97d35b1d5f22bc1830e5d90b80,2024-11-21T09:22:03.713000
CVE-2024-3638,0,0,a0e603bd5eafd59fbf4eda4332a70f4ff465bab094cf08cc0dfa6cf90aa9b0d0,2024-11-21T09:30:03.273000
CVE-2024-36383,0,0,dfdcebb9c4ed54272ace1d77d7b46f1144dff670c388870465409c92e750dde7,2024-11-21T09:22:03.837000
CVE-2024-36384,0,0,f4773f7602bde7ffb495e2fd0dc61ac13b6a017a351ab9847eb4b0f4191cb10a,2024-11-21T09:22:04.047000
@@ -259661,7 +259661,7 @@ CVE-2024-3679,0,0,17f7accfd05c37a9c39eeaee6c20020b086be594960ed0494648fad57827cd
CVE-2024-36790,0,0,8e267937856e18f51593774b5e211710ee3211388a2914f74e77687973c04a97,2024-11-21T09:22:38.807000
CVE-2024-36792,0,0,6e85dbf151e6660a38bdb4a5da30a0fa2d7e3dcaabb4b011faa5ce9d43c10e16,2024-11-21T09:22:39.037000
CVE-2024-36795,0,0,ce6e2c77b4c62dc71005dd1abe465797033ff80b45e5a8d1a889b0533e8c44f6,2024-11-21T09:22:39.263000
-CVE-2024-3680,0,0,e974716031d1519180a06a3599fe18de89c2034a0f0de5e53d20320c96f6dc9b,2024-11-21T09:30:10.053000
+CVE-2024-3680,0,1,c3ade2ef1008cb1963b748b5db1d1fd37992a472ff27cb05ff0996cb0e7f6c24,2024-11-21T09:30:10.053000
CVE-2024-36800,0,0,7eea18e8dc8c6fa25b1c411b8691d8d491ea0dc7d5e8b833170ee3a4e4031d47,2024-11-21T09:22:39.493000
CVE-2024-36801,0,0,88a1a6f07948f9b728e5a5e67e31c8a7d2ea0682244e945421a9412a77d07724,2024-11-21T09:22:39.710000
CVE-2024-36802,0,0,d90679a1557e63ced02c20ce3a95d6abd566ddbe5bfb37eb5db0c573c610d3f6,2024-06-26T06:15:15.200000
@@ -259866,17 +259866,17 @@ CVE-2024-37049,0,0,3faf1be2f8c30447cb981394fbe958b894b689bd637dd334455e8429dbe17
CVE-2024-3705,0,0,f21da8fc69aa938cfb790a9082e98081d18674f94a94a372588a67b21121d893,2024-11-21T09:30:12.947000
CVE-2024-37050,0,0,31ab888c9f9e34bbe83429d9c1d54e87c1daf97215182590687befdedffb4cbc,2024-11-22T16:15:24.150000
CVE-2024-37051,0,0,3ac6461a784c37c89e0f75dc3f38c5b19ec6cd9f75f2d6791fc8a776aa531611,2024-11-21T09:23:06.323000
-CVE-2024-37052,0,0,8eac30c0578ca64e3c0fb17e0feffcb30283274032f1120e4c749656e76e8b7e,2024-11-21T09:23:06.550000
-CVE-2024-37053,0,0,08ddef2d578f9c09cd69cadc3c3439d5ae825a5e742ad03efd00cb7708593291,2024-11-21T09:23:06.690000
-CVE-2024-37054,0,0,389217c75733cb66065605570f0d7a6b18608eb2fb93e55626b2bd0217215bbe,2024-11-21T09:23:06.817000
-CVE-2024-37055,0,0,95e71bd3393023c01feec46ded4b074be23115486c13d079e040e175449f2da6,2024-11-21T09:23:06.957000
-CVE-2024-37056,0,0,a6f65ffb7b46743e42f3b256d84ea9ff60a9f148c45aa23b5a5b2bfa0903febc,2024-11-21T09:23:07.080000
-CVE-2024-37057,0,0,ae35c1b2b45bd0c9303d0aca31f3e0a90de24778ac03a3593d7f6fc084a6e968,2024-11-21T09:23:07.260000
-CVE-2024-37058,0,0,3a3497b34ad55f2b31cdfbf27db76fddb6752d2d769edbde99938151d5ef6179,2024-11-21T09:23:07.470000
-CVE-2024-37059,0,0,ec86573ba909806835f100f8b53c1dc2f26203c8e2f856352ab80f4bc09851f6,2024-11-21T09:23:07.600000
+CVE-2024-37052,0,1,fb40af954706d7526971788523c19602f19ec6c9c52ea65e81509481644e6b67,2024-11-21T09:23:06.550000
+CVE-2024-37053,0,1,9962b7ec932bbd125baff1a72a5d165f77742d060fac92e436638b22769696c4,2024-11-21T09:23:06.690000
+CVE-2024-37054,0,1,3cfa3cad5db6297cd38ea99aef7dd3a618f8a19b62b99941109826b742464648,2024-11-21T09:23:06.817000
+CVE-2024-37055,0,1,56979aaacbda055ccd160b1cfc4e7e2bcfef0a62b445eeaba7d4f06cae5bd2be,2024-11-21T09:23:06.957000
+CVE-2024-37056,0,1,9ccc350820b34ce1c99c76f63480e7af82c232185dca4c4d1e1faa556277b040,2024-11-21T09:23:07.080000
+CVE-2024-37057,0,1,fff2526a78320bf328852973989afb4f4b4f69487679e499df80b3c254c434ab,2024-11-21T09:23:07.260000
+CVE-2024-37058,0,1,dce65b8946adf1dfb5d8df510682ff1155bf31d2b7855267243dd4471b63d24e,2024-11-21T09:23:07.470000
+CVE-2024-37059,0,1,43aa3214bbe3964262c627306e6c675f1d65afb2548a0884e943bd92c8517260,2024-11-21T09:23:07.600000
CVE-2024-3706,0,0,94287a969919df14f6f8ee55764cc05cd6eef1cdab17f2ab6f382298a7e81c58,2024-11-21T09:30:13.087000
-CVE-2024-37060,0,0,e0f6bff3c7853af9d540a47748e19c42bb8e5ad219f3648538c5ae68b5c23f2a,2024-11-21T09:23:07.720000
-CVE-2024-37061,0,0,21bb4beb96859b016dbca9d37cc37b979eeee4ba7325e24fe2c93c2437ab5754,2024-11-21T09:23:07.847000
+CVE-2024-37060,0,1,c09c3257ef2d15d3b87fe3c7c9f692d1e5389a82e77f613bde5b6c810183477a,2024-11-21T09:23:07.720000
+CVE-2024-37061,0,1,fddab15d3094b68080b39d83c98d6db584da8d2da86cf9ea47766460f1e50633,2024-11-21T09:23:07.847000
CVE-2024-37062,0,0,2bd04abe4dde8ed6b271ce3f8eb2ef0510671250c19b463ea6a013f3d64b567a,2024-11-21T09:23:07.980000
CVE-2024-37063,0,0,37a6db4262065d47e765009bf8ac3ad355d6a0505389321e2acbe1de264b2767,2024-11-21T09:23:08.110000
CVE-2024-37064,0,0,78f6bdc3d8227ddbb7ed505f12626c0035377a32a1898870361365da42c04f85,2024-11-21T09:23:08.240000
@@ -260094,7 +260094,7 @@ CVE-2024-37280,0,0,82506e10255538602ec664d5ef7d85f7e7cc96b02dfe2ddcef5bb9ae709ea
CVE-2024-37281,0,0,4249eefcbdc986d2244e44eaab8c4ce3c8b7e04bc410d0b79fef20d4a2687dce,2024-11-21T09:23:32.010000
CVE-2024-37282,0,0,b5291a34bd6835cc4058846acc023216aad27c69e44906c812e14449c733e7c8,2024-11-21T09:23:32.153000
CVE-2024-37283,0,0,ec4459cd72900aa75b10706008bd74f31d6ea48c0863dc3aa5968ea1e15e2f8e,2024-08-12T13:41:36.517000
-CVE-2024-37284,0,0,ac6ccd088383961d58c5c0ecf3e5338cc6be20b6740c1512763b9c5e4b35a030,2025-01-21T11:15:09.633000
+CVE-2024-37284,0,1,a268936be7063caa440dd74bd5cce65b842830ae9b5ff6d0be7a64c16235cdab,2025-01-21T11:15:09.633000
CVE-2024-37285,0,0,e8cc98ed37c5497fbc9f92b308c74c874cd45490ed814f99ca1ead61244ae5d6,2024-11-15T13:58:08.913000
CVE-2024-37286,0,0,b4282d67550d8be06ee44ec1a1d7f9fab63643d7219a6e606e7fbac14d351953,2024-09-11T20:20:34.503000
CVE-2024-37287,0,0,bcf9844fa80494210d104fcba352f6ab7b4fe100f45f4712e22ea47490257093,2024-08-22T13:33:12.477000
@@ -260618,7 +260618,7 @@ CVE-2024-37972,0,0,4aaf39aaf50a5f990ba9d700691a3eddcfd1971749d71f3ef2856144a1eaf
CVE-2024-37973,0,0,267c0c30dca0b158fe251e5666b5d873557f6fb84cf046e53f5870ba4be74e7c,2024-11-21T09:24:36.820000
CVE-2024-37974,0,0,bddb7fd8c14cb5eeaef8ca35ab157e9a50cd560cd4c6fd61e717ecaf7bbc89bd,2024-11-21T09:24:36.977000
CVE-2024-37975,0,0,5aa7af75941f2e7ffc1d725ec8e05159bb8b07f7de88fa56bc261ddedee1e68b,2024-11-21T09:24:37.140000
-CVE-2024-37976,0,0,005c667fd199480a9b77203fe0bd8743c939d81e5fad82db2eb84d24c8d28043,2024-10-16T17:56:14.330000
+CVE-2024-37976,0,1,e332b8a3cf37554317d6c63fcc532c647dacf2eaf49155e2e818e752b590fe3a,2024-10-16T17:56:14.330000
CVE-2024-37977,0,0,8524736a84ce843cf2fad3349008c89107ed6df0ac7a55ab6ff7bb0e9c4d7445,2024-11-21T09:24:38.337000
CVE-2024-37978,0,0,b1369a967e887a9ef05a16cfdfb4c17130d7b0f802f45830c2ee04e8d63c5756,2024-11-21T09:24:38.520000
CVE-2024-37979,0,0,c6ba0ecb1eb3eefdfedd4ce069487bce354f57d4cdf194b460bb48440d5ec7e1,2024-10-16T17:41:30.850000
@@ -260761,7 +260761,7 @@ CVE-2024-38120,0,0,a71badf1610bf02e9a43e95b26d1fb8cb6bd73265ef39ba61c665d13f7a39
CVE-2024-38121,0,0,2f9295e8da9a74ba3d127917494551903050505c4a2bf0b6fbbc60b24d8a5db4,2024-08-16T17:13:28.350000
CVE-2024-38122,0,0,3af2d64fba8c0d014a7012dae50be5627e4d20bf65272e0595c94367763d7507,2024-08-16T17:16:41.717000
CVE-2024-38123,0,0,050e7c6244aa6f23932673cab74ff02819507b333bb13f3c78549e7e94305ae7,2024-08-16T15:40:45.897000
-CVE-2024-38124,0,0,10c6ae5e1b3f8cef5c52f1295ba3e8c595974efaa4ba61650b7688fecf602778,2024-10-22T13:35:01.663000
+CVE-2024-38124,0,1,27e9112cb22a60e0ef5139e27a811867856490928b9cd6c5bdde2d0ce76ddc25,2024-10-22T13:35:01.663000
CVE-2024-38125,0,0,404e30957fb2041f40aa09d8812c2c129770187a21e3b6beaaaa4f900acd943e,2024-08-16T15:41:26.523000
CVE-2024-38126,0,0,2afcade11537b6125f26cc498f2c97f62942d977fe9bc76cb6dc873b66f9e2a9,2024-08-16T15:42:36.073000
CVE-2024-38127,0,0,5ecb36b4af8292a21622424135046e1e28714ca6e005b65a904efb06b3cea8dd,2024-08-16T15:43:13.980000
@@ -260788,7 +260788,7 @@ CVE-2024-38145,0,0,5556ac265fb0e1611fbd08bc8a7f0dba3aba90a6f5b636b8238f7232e70e8
CVE-2024-38146,0,0,c03a0a2280d07ae15a2638457b2a2ee571e080dddf90ad8e27b382579f268f43,2024-08-16T20:54:59.903000
CVE-2024-38147,0,0,0bbf1857c8cacc8233b9f0970b4a4a960f39fb8b30e3c54145274dbf36d0f542,2024-08-16T20:55:03.907000
CVE-2024-38148,0,0,847b5dc5bf5f4ba984fc32bbc9e10ad55cf807ee838c72dd116ce3d278fcba03,2024-08-16T20:55:08.653000
-CVE-2024-38149,0,0,bdb03b86c76fd7d2e7fbdaf94b7244f85501119e8f6a3a2e75e293abdc73a16a,2024-10-22T12:55:10.590000
+CVE-2024-38149,0,1,5224633719972b6a5a773b5ff174571174893ddd2aa483178e50510fa6d5af39,2024-10-22T12:55:10.590000
CVE-2024-3815,0,0,b9e2102cfe59e15570545d8428274b61db2eda3611818db23cf809cab20504c2,2024-11-21T09:30:27.377000
CVE-2024-38150,0,0,10abcfa63d8a696e4c5f3c3096c1b21ad4f93707a73690323f8123af7733695c,2024-08-14T18:16:13.757000
CVE-2024-38151,0,0,05defe105d5a18e825501b92710d25194e7c22357a84cde0b05d08d6ab543edd,2024-08-14T18:16:59.673000
@@ -260844,7 +260844,7 @@ CVE-2024-38199,0,0,0dd948c0d630ffd11ef973d3897c89b05d0c484012d417092380257ce902c
CVE-2024-3820,0,0,ebb43d41dfb444865db3723891fb2477fb81707e0b52fb92a88385d51705deb7,2024-11-21T09:30:28.087000
CVE-2024-38200,0,0,839a37329b9dc5b6fea2142ae18a060a3d261c6bbc97a2e041619e8b3f1ab4e1,2024-08-13T18:15:29.720000
CVE-2024-38201,0,0,676fe655a4353a209bb0546add80c4c8c162df689ed132825ef07e4dd81037ee,2024-08-15T20:30:00.737000
-CVE-2024-38202,0,0,657fa73ab4af8dd92ea046250ae0e6bbd5f71d2fd15b44858a35176bdd768e2a,2024-12-31T23:15:23.697000
+CVE-2024-38202,0,1,195eb65287559210a264039da59817ffe0c72f680d46dd282a02c3e1dbfbdd08,2024-12-31T23:15:23.697000
CVE-2024-38203,0,0,0eafcc1d547222e148bdef6371b2193d5291aa20762ad6a5cc37713079b5943c,2024-11-18T18:23:07.743000
CVE-2024-38204,0,0,96b18af43450c040d093b118115c7f80a048506b0d9e16a1107f93e550d18d32,2024-11-08T15:34:14.467000
CVE-2024-38206,0,0,426aa1b7abf1f00203c4465aa29dea4cd44aa51806f280b7e455c8f749953a5f,2024-08-14T00:15:08.213000
@@ -260854,7 +260854,7 @@ CVE-2024-38209,0,0,83225eef0479856c4bf685c17c18b1071c099f3f75499a41dc812f5615d3e
CVE-2024-3821,0,0,91e4bee8d872f3596da48c08de7a01abe0854a2a5d5549ea72c9b5783bea0f88,2024-11-21T09:30:28.210000
CVE-2024-38210,0,0,120c63390059b5393cb1716f8c1b3c7d88d070b78f5196297d8a7a05917f375d,2024-09-19T22:15:06.083000
CVE-2024-38211,0,0,fd64a191f4c2cd9f2cbc624905547292ee80e27b0ee298d51ea78b68c6d26490,2024-08-15T20:29:19.557000
-CVE-2024-38212,0,0,17229fdcfb5d2128ce5da6edb5e265ceec2d9c545539c6193f47a909dae2027e,2024-10-22T19:31:41.350000
+CVE-2024-38212,0,1,c200bd1b45f333811a18735cfbe62764620fcbb3efc22f6aefe9dd90163c8403,2024-10-22T19:31:41.350000
CVE-2024-38213,0,0,2dcfe75ba5929ae8ac2ccdb0032dafcc8a142d478b90513a05227545100773f0,2024-08-14T14:55:49.887000
CVE-2024-38214,0,0,30f99573272bb70824618bb71ff5b70aaae21681681724afd1a359a954f6c56c,2024-08-15T20:28:25.893000
CVE-2024-38215,0,0,6c70370c2e603e39444a7fb8ab8591e807ce4f98aeea791ca0b52508e27a2626,2024-08-16T19:02:41.517000
@@ -260906,11 +260906,11 @@ CVE-2024-38258,0,0,35bb97368db45750eb190551c6b51179a071e1f15f0848a955be12325381b
CVE-2024-38259,0,0,511c0af936f1886ebd2dd41a6d76b199cb50c8f1a3e463d964188c0c7f689d46,2024-10-10T14:02:28.917000
CVE-2024-3826,0,0,1b63308b78e96e496a54022a6256c9ec61e586783425c51a7c3d52861e3b3fc3,2024-11-21T09:30:28.790000
CVE-2024-38260,0,0,55155bf2fda456cb7f499910ffe6c2eb3a6f4d46aec21021f19712290d3b8a15,2024-09-13T14:53:26.410000
-CVE-2024-38261,0,0,65fa7ef19d9f815dd4352240562fea68e5634787cc328bd6174a79c833cc09b4,2024-10-22T19:33:29.160000
-CVE-2024-38262,0,0,6bdeaf5f41cf849f004d6bc1800eee3b888d3ea26fafd106399dfd2d695557f1,2024-10-22T12:54:48.080000
+CVE-2024-38261,0,1,2fac65995d579ff3954a3bddd04b4fdf334c9bfb15a51023c6b6f8eb0b63ffcb,2024-10-22T19:33:29.160000
+CVE-2024-38262,0,1,c18c4122a33a376b035b732e73ddbc736ac172f80868aaa874dc1a3acf1abe7e,2024-10-22T12:54:48.080000
CVE-2024-38263,0,0,08c09bca8be0748ee609afbdc86995447afd4fc603f8c53991539f339963ff1d,2024-09-13T14:55:01.400000
CVE-2024-38264,0,0,544aec0258efd2ef444e3b0f22cb1914d31b5f221162a747396cbd15d26901db,2024-11-19T20:52:32.727000
-CVE-2024-38265,0,0,34377c1ecac9e16586946781889111692995cac81b15c1f718c3ebd685f7fc23,2024-10-22T19:33:43.260000
+CVE-2024-38265,0,1,7e6a4c2910209e678239362dc67215098e66e89e7e2b3131e866cb47983920cc,2024-10-22T19:33:43.260000
CVE-2024-38266,0,0,060fde92e194880266c41ef30a7682e84ab7768b766c1e4ba043c4d3895fd0c4,2025-01-22T22:27:33.937000
CVE-2024-38267,0,0,2f2200bdf622493906326d5acab6e766450e36cf9e37a3aef0e32c2106f2c357,2024-09-30T15:52:52.787000
CVE-2024-38268,0,0,eab46e6b7e36a54bfbfac467119830961637a950b96b9b108bfef786c50054b7,2024-09-30T15:52:29.977000
@@ -260950,7 +260950,7 @@ CVE-2024-38305,0,0,b50204d0d2adbfeee4304f94e93a151274edb07a1881b5e4d7cf38bf07c62
CVE-2024-38306,0,0,923ef8f5750ef5dc8b1aa0f80ec3ec7f20d2a05cc416d49512377e1d2196c5c7,2024-11-21T09:25:20.867000
CVE-2024-38308,0,0,aa0e1dcb340f88b60a097b1f78e4419b606f07980132596118f63e0ca049be13,2024-10-07T15:24:34.517000
CVE-2024-38309,0,0,c1db647894461fb62d3b4308d8d05a2e39c8d0f31c7a0d9ba995ad235729362c,2024-11-29T21:15:05.287000
-CVE-2024-3831,0,0,57f303e4918dac237c570b5d9065bdf1cdf8c1b31dd2c8912477d2d4ab6f1674,2024-11-21T09:30:29.240000
+CVE-2024-3831,0,1,defdf00435a317add8d8e6260abcd324b70dd72e47e315592bdf550579785773,2024-11-21T09:30:29.240000
CVE-2024-38312,0,0,71e3649445240de28e850a435dc82d1d3d363c5ab712373016bf34e6f709156c,2024-11-21T09:25:21.193000
CVE-2024-38313,0,0,b4fccf4bc32a428a2ed3da857e5610d03364deeda806c6ba074978d77fa6902f,2024-11-21T09:25:21.687000
CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713461,2024-10-25T12:56:07.750000
@@ -260963,7 +260963,7 @@ CVE-2024-38324,0,0,6983d8cad1fd6c0c78413c4456f22354583612d01ccc038ac7f0199fa2c57
CVE-2024-38329,0,0,9da02cb1c1e6e0ee0df6910cf16cd32ad52cc4fe1d821c256d156fa9c41a4422,2024-11-21T09:25:22.867000
CVE-2024-3833,0,0,70f71fc362a5e7d48ef4a06bca848d6c2e550860bbb53e401c6074b0eadf1358,2024-12-19T14:46:01.697000
CVE-2024-38330,0,0,f29c2fed4aa255682376d1bf1fe6f029c9aeaf29cb91e5ed615ddc69bd26c654,2024-11-21T09:25:23.523000
-CVE-2024-38337,0,0,4d5aab8e5ad9278f0d1a4dc574af0969222cb8e2dcbe51daa29775dfac467b7b,2025-01-19T15:15:19.770000
+CVE-2024-38337,0,1,419fb31ae4d2b0caed4b428a1b986d96cd628992c203de404d42c789b322191a,2025-01-19T15:15:19.770000
CVE-2024-3834,0,0,947eb53652569d79e3c1cf44919e7a8749c280dc3486461656b1c499598740e9,2024-11-21T09:30:29.777000
CVE-2024-38344,0,0,c3f614f414d62cde3a55726244e500e4dd08719f2cd9a8082171daa986ea9b20,2024-12-06T18:15:24.490000
CVE-2024-38345,0,0,3f019248069b28231936aeda6b03b249e4cbd4f2c81b03d0092f6998d7fabe32,2024-11-21T09:25:23.930000
@@ -261320,7 +261320,7 @@ CVE-2024-38702,0,0,3c4ba50317487924492ca168213a6ee8861658b1d8d73d68f67a1a5b824fd
CVE-2024-38703,0,0,9f71f0f66667eee4520111e7a817856cbe4d6451b74cfba72f2fc8a8035bfc74,2024-11-21T09:26:39.793000
CVE-2024-38704,0,0,6d591c3940acd82eb3086f3502463b71238833bc6dbf15a99e173863eacb12f6,2024-11-21T09:26:39.920000
CVE-2024-38705,0,0,2e6fa924bb5a44b6a89df1e9f147b9f7b1bcdfec97187c47f022b257e9fc1d3a,2024-11-21T09:26:40.053000
-CVE-2024-38706,0,0,1af8a05a5237551cfd50c8ffb2c96ba44c3033148d25d24694986d377d91e5f0,2024-11-21T09:26:40.183000
+CVE-2024-38706,0,1,81584ccc79eea3de3ea85ee6bf8901c13208d5492e239118867b063195c8fb00,2024-11-21T09:26:40.183000
CVE-2024-38707,0,0,d25d2c2c7d62aacc0617f006ea134a5267f10e5cde18b065e9091e448d5d2e62,2024-11-01T20:24:53.730000
CVE-2024-38708,0,0,83a10221309c2fcddbeb73d8601ccc5f941fc01f69e9577d48e2e4f826bcf18e,2024-11-21T09:26:40.387000
CVE-2024-38709,0,0,33a6fc98e6947af2b483793bca7b57aaa9450a55cba6fa9fc4d7c20af3741a83,2024-11-21T09:26:40.523000
@@ -261442,7 +261442,7 @@ CVE-2024-38826,0,0,aa0be29968eb435ec090127c9d271f3db29778a1347f10ec378a7a1554409
CVE-2024-38827,0,0,2e81585c986691122bd5b137a7a8366ca83e5bd591adaec79ae968dfb0819731,2025-01-24T20:15:32.553000
CVE-2024-38828,0,0,2b01623940f343417ee92cfdb4f261afb5dfca65f597a90b4769cc03110fea56,2024-11-18T17:11:17.393000
CVE-2024-38829,0,0,6e70b82cf4a08eca299f1ef01398ce598581c72dcb52145f07efeeba754e9484,2024-12-10T15:15:07.593000
-CVE-2024-3883,0,0,c916445e546de0871526642978215546e67de3bd61061903009ac41fc512f75b,2024-11-21T09:30:37.683000
+CVE-2024-3883,0,1,cedff1ac1d0a149694b0a18256310e4a712951d21662cea466360882144ae803,2024-11-21T09:30:37.683000
CVE-2024-38830,0,0,e8b420777d2e30b087a73e69b065c501d17864d02afe330332d83c0cf0b2fca5,2024-11-26T12:15:18.413000
CVE-2024-38831,0,0,4e296297b435627a62910eef33560dffee11758af4014daf7dacfd30a3846679,2024-11-26T15:15:31.957000
CVE-2024-38832,0,0,0493cf9f013d37851e0f742d469726bd8aa192c3712403ff0f7b7890bf101dc5,2024-12-06T20:15:25.977000
@@ -261588,7 +261588,7 @@ CVE-2024-39124,0,0,b89a6ad01be86442200dfda8e2d9f478ea1466944e9cfcad7239db5ce8bf7
CVE-2024-39125,0,0,d369e2cc9d5a90f6ebe45980f2884b9acd269ec9ed2d8c8513e72acecc0e2e5c,2024-11-21T09:27:13.103000
CVE-2024-39126,0,0,e08f3abe2cc1e738b288970bae9e8f3bc74af350f44daa14e3f45bb5bc1b07ca,2024-11-21T09:27:13.267000
CVE-2024-39129,0,0,19eb1dee58afa6c2767224231ffaf92ccdb5b37e3b078ec5f75eeb24861f8743,2024-12-06T21:15:07.637000
-CVE-2024-3913,0,0,15095ea371302e70e31810ff95667260784942ea52d36280199663cd570d0b06,2024-09-13T15:58:13.780000
+CVE-2024-3913,0,1,c5bcb441fb42d3764d3360a03e9a82cb45dbde8e4ed2f5fe6dd8f7ff693d0c52,2024-09-13T15:58:13.780000
CVE-2024-39130,0,0,680e4171889397762b2c1496bb01f8837a0c47429b2e74914705378acf24913d,2024-11-21T09:27:13.560000
CVE-2024-39132,0,0,780fc2d7cf4ecdd788c1657c626f8740dd8fc2e66c418edfb8cd97eda04189a2,2024-11-21T09:27:13.773000
CVE-2024-39133,0,0,1fd24f61073967354c204318abe7b3082fbfa1d2c08fcb3fb3cfe3c5e50db3b7,2024-11-21T09:27:13.993000
@@ -261659,7 +261659,7 @@ CVE-2024-39278,0,0,08afeea0ff66f11774d46076ab58f2f6cb47799fe9878a2833101dc3a7d96
CVE-2024-3928,0,0,80eb80995ed734a4fd6c40cf49e2905ed9643c2a1a0d85ff1158531da5501ded,2024-11-21T09:30:43.180000
CVE-2024-39280,0,0,c9a29d8ab16a066b50b7f63816b23b3ffbca89715f819ee07f0b80811e3858e3,2025-01-14T16:15:30.337000
CVE-2024-39281,0,0,276b9ae8e8a9a0b79ee7952c2bd6307cb0cf6b8e0cfe907b0f872eb5eba37a27,2025-01-10T13:15:09.467000
-CVE-2024-39282,0,0,985be1a02ad62fdca3b1b2f464a1e5073183838b0f6616f35f2bcaf249d496cf,2025-01-15T13:15:09.740000
+CVE-2024-39282,0,1,8d19a62ea2208ee549ce1ae639673f7c6307b394f865aae3ba768260c976d255,2025-01-15T13:15:09.740000
CVE-2024-39283,0,0,4522f3bbc438abcd81e221b08edda070f395b85d336b168a4b5ca1c5829a00dc,2024-09-12T19:15:46.390000
CVE-2024-39285,0,0,f0043fe58d02ea22fa80a21b1fba2440c49cfc1f78daf98e76e53f25d8a76df4,2024-11-15T14:00:09.720000
CVE-2024-39287,0,0,7582a54b2388a70164c9564ee1f85653aced547dff036f41aa22b6e50b81804d,2024-08-29T14:23:31.807000
@@ -261726,7 +261726,7 @@ CVE-2024-39350,0,0,fdb3462066732470a235bff29ba1732fe017e30a0d02a9750d159a0498864
CVE-2024-39351,0,0,327607e1cddd67f4054754427f899db1dcdfcaad597984bb096ea9ebdc5a5b10,2024-11-21T09:27:31.737000
CVE-2024-39352,0,0,aa50c4c28f76901b5df9c043ad69006e02bf1ae5bd879b2160fb058e608db73a,2024-11-21T09:27:31.870000
CVE-2024-39353,0,0,2c8be227a8d14887935bc4ae5bc19a7fe2b7ee08444dca7ad981049635b23810,2024-11-21T09:27:31.997000
-CVE-2024-39354,0,0,3b90d2416ae264749b7a6a31ff3bf2d440269037cc77a3e2fde13244263bd7a4,2024-11-12T13:55:21.227000
+CVE-2024-39354,0,1,0cb6e1d9d5a31caf27b57a21e79b4bd5e719054d4719e50abb4ba447b13431f6,2024-11-12T13:55:21.227000
CVE-2024-39357,0,0,05fad288b05b59e33d648c9eb1d2ff76c0f6af7b551634c79403f1312cc01de6,2025-01-14T16:15:30.793000
CVE-2024-39358,0,0,9eeef3abb2f61d58ed8e2122c0c3bcbb04e69452c7ee95ad547df8b791b1e391,2025-01-14T16:15:30.907000
CVE-2024-39359,0,0,f4e024801aa8b60419c874a361b414fdc2ec7dcbf103c85ee43bf099477a1ea3,2025-01-14T16:15:31.010000
@@ -261969,7 +261969,7 @@ CVE-2024-39601,0,0,92d2b69fbd2e8bc149b176391e3e16765df166d2a97846f11f4915fdfd474
CVE-2024-39602,0,0,27041e41974104fd1b79b4ac803ed5fde80beca6cb3dd96452797a458af7b383,2025-01-14T16:15:31.540000
CVE-2024-39603,0,0,1437983f8883ed245799b0e5c1e1953f598b12b478ace10cadcd2f37e9d67a15,2025-01-14T16:15:31.640000
CVE-2024-39604,0,0,88257eaba5c332ff2d127c02fbeac9934efd2fc6ba8e017d75c36c5cef181610,2025-01-14T16:15:31.747000
-CVE-2024-39605,0,0,5b96d522d766f2e17051ea739eeaacb596e48786c582aaadd7ed88e7099daea9,2024-11-12T13:55:21.227000
+CVE-2024-39605,0,1,0f3aa3d9d654db8303831ad298e0bbe5ce0b17dfc50d21a7d15136ade12c3a08,2024-11-12T13:55:21.227000
CVE-2024-39607,0,0,aadcaab0bf1d7729e38b88e8516ae68565ef10bef4190422593ee5df929d784f,2024-11-26T09:15:06.277000
CVE-2024-39608,0,0,9ffd9e93083b666f0e42c9a03d32cf85ab205f595971f01f7b69deb9e34455e8,2025-01-14T16:15:31.853000
CVE-2024-39609,0,0,2a17afe0616a352707ec6d7a4b1c89eb322f40e85f4e6ff34b51561aff3d09f0,2024-11-19T19:58:29.653000
@@ -262233,7 +262233,7 @@ CVE-2024-39884,0,0,a8c11e345d1fbd775d38d954a44a812dbd632279c09d19cd356a28a8c8486
CVE-2024-39886,0,0,f16474fb9a37fdc5dcbc1b8fd41083484266b56f74034c8aeaaf9928c508ddf7,2024-11-21T09:28:30.193000
CVE-2024-39887,0,0,8ee03603ace192c884ceda52f2aacab6ea4c099a303b374fdd80802d5de2ea5a,2024-11-21T09:28:30.407000
CVE-2024-39888,0,0,81c1a1a3b559fb766c964d813b74871c335741225eeead7406d8629b71ea8739,2024-11-21T09:28:30.540000
-CVE-2024-3989,0,0,282bf7f86f8761318f492d12462b4a7880646f788a5c46f5a9950ff45ab93cd5,2024-11-21T09:30:50.250000
+CVE-2024-3989,0,1,48723129a4b51bc5c048254eec57cfd9d6ea8e1500c9b70f7b66aeee54f6d669,2024-11-21T09:30:50.250000
CVE-2024-39890,0,0,c8343a9ea929857fa8808b228cecd63b1ba5d3a8800dd45f74ea582669324b81,2024-12-03T16:15:22.483000
CVE-2024-39891,0,0,d58f87038cb3ffd0fb4168b343d5f8ee4baff33beca8f6f9422d319e2027df29,2024-12-20T16:15:33.687000
CVE-2024-39894,0,0,4d15c700ed33a6fff9b64954d229a1be2b3454cc61179df7b4861cbf0d66eb8c,2024-11-21T09:28:30.867000
@@ -262241,7 +262241,7 @@ CVE-2024-39895,0,0,6c9f43bf2d5b14f7c195d7f27e8da55d0fdfce3c789ba8e50bd50c39978ed
CVE-2024-39896,0,0,94854292dd96847b416ee3a98f9f2538650654ead9d516ca3f42ab04a45acc43,2025-01-03T16:30:43.367000
CVE-2024-39897,0,0,2556606fbcf0e7ba0936e5da490b4aa4283af8c4bc064dbc26051be7c494f614,2024-11-21T09:28:31.350000
CVE-2024-39899,0,0,5a1391f0b0d9dee2f37bbd1f62e59efe6b2b51d0e7e95d4354ecbbe7b3b6e4e2,2024-11-21T09:28:31.470000
-CVE-2024-3990,0,0,880b625fb9042da3fa8f1d060a369624b509717179c95e3562e8f2ac6af76111,2024-11-21T09:30:51.623000
+CVE-2024-3990,0,1,63955c2c9c9e719bd6225aa2b3a2485a59cf64528022a7c9639ecbdd7b611cb1,2024-11-21T09:30:51.623000
CVE-2024-39900,0,0,a80cba3ff0874444694054f5b966edb196bd914599676a927a76749ba297830b,2024-11-21T09:28:31.610000
CVE-2024-39901,0,0,dfe56b10f6e323b587500698e0833597c95fdbbfc63c2621d91311d6c3045504,2024-11-21T09:28:31.763000
CVE-2024-39902,0,0,8a92fe2eb2d3c1d09c05c44d4dd4b076496180333be346b46d05c5ed84c2a7c1,2024-11-21T09:28:31.950000
@@ -262708,7 +262708,7 @@ CVE-2024-40850,0,0,e801dfe1b5836330a5238e832cf4a665932ae66da89298e09c70965412d21
CVE-2024-40851,0,0,b958c164114af6b23a2bf7ef2bd1c6335c3be241ec455192784b6b386c9ef358,2024-10-30T15:35:14.883000
CVE-2024-40852,0,0,872fb94116f001037c1281aa476b36043a3a7ea2928e48e7702d75cc209d3fce,2024-12-12T15:28:11.783000
CVE-2024-40853,0,0,dfc9fa03d8fda58ef712d436e720ae0f21a7fffb74fe4326b57538d3690d7a89,2024-10-30T17:08:42.157000
-CVE-2024-40854,0,0,d73ce7d4afa629e37e3e3e7680a500ddde44e4df8fe74e74e2c91a3a3dbbf93e,2025-01-16T17:15:12.163000
+CVE-2024-40854,0,1,e102a7946cb0c2b74cd997e9d5f133a278dc3bd2a82b1b0f442f13402c7a7ade,2025-01-16T17:15:12.163000
CVE-2024-40855,0,0,7c6a015a8df0c3902c0c5c429b62fdf8917463144cc33940de5fdcb1a0b9dbc7,2024-10-30T19:35:15.737000
CVE-2024-40856,0,0,3b5bf51664ee45ba68d50745d32de308dce65dbf1c8981b487e32ad3441090dc,2024-09-25T13:43:40.657000
CVE-2024-40857,0,0,102892d8544ef4f8b8056a1e88dba88dbbcaf3abbcaa73be23c6e2ed59b0fb0a,2024-09-25T13:41:41.843000
@@ -262759,7 +262759,7 @@ CVE-2024-40916,0,0,82ebdaf06b20a2269d938b3153cbdb78890cd0db63a1ce97dd0c1bc48550f
CVE-2024-40917,0,0,e5496f490d0c568e9f7e3a5c365e732a46727d19cbef564b8d2a95df2258a823,2025-01-17T14:15:31.457000
CVE-2024-40918,0,0,3738b52e660eff78e57a66cf0344d751dd28f503d25401e493f5e1dfce6c612a,2024-11-21T09:31:51.417000
CVE-2024-40919,0,0,fd3725c85bbe55a0048546ebb32d3f140c19ab418becf9a8e2a913e8dc4a5e85,2024-11-21T09:31:51.540000
-CVE-2024-4092,0,0,b754eaa18dc8b64ccfa9de9c658e96aa94abdffa4bbcdf98d96dcde49c844314,2024-11-21T09:42:10.703000
+CVE-2024-4092,0,1,f0be06e6a86cda8665caa053dbaf219674db6703c0ea4cdbe276e9fb2c78bfdc,2024-11-21T09:42:10.703000
CVE-2024-40920,0,0,3cb128ae9cb7e0d6a550f4c857aae094743aebcb6d77c93c3092dd0a2d9cd8c6,2024-11-21T09:31:51.670000
CVE-2024-40921,0,0,9d5370b986414dcc036d0ed8ccf7bed4a98c4e9a56c12ef5e7a7009772743c95,2024-11-21T09:31:51.807000
CVE-2024-40922,0,0,51adb2c79fa9bf216d4427e9aed62e8ac8a5b9ca3ed410a7841ad1b8fd35e76f,2024-11-21T09:31:52.607000
@@ -263331,8 +263331,8 @@ CVE-2024-41738,0,0,c7561e6ad4785a929b0580514006bb55005a077ac6bb247470d04168551c4
CVE-2024-41739,0,0,0fb511a1c922782bb4958107beda79acdbbea79f966838e8163001f71a6f66e5,2025-01-24T14:15:31.397000
CVE-2024-4174,0,0,351c15947bb701aa0f06097d0b29e94daa2eeb6bcf3253c51405ecf8081dcae4,2024-11-21T09:42:20.030000
CVE-2024-41741,0,0,87808c3a5a97a8a12b0599786276b0bacbc5a8e2f5d1ce88333c8491b2440d52,2024-11-14T20:42:44.150000
-CVE-2024-41742,0,0,14484b0434b26ad2278aaec82da0505e71c565545447852c1b12a67449a9c0fa,2025-01-19T15:15:20.730000
-CVE-2024-41743,0,0,8c0dd16fb58c7cb649aaa2358e17703fda753c14417fd2d26e4c7d310372647b,2025-01-19T15:15:20.877000
+CVE-2024-41742,0,1,c0622225c80e1c9626fb0a6eed840820918a8965a5f0765da6436186e7450927,2025-01-19T15:15:20.730000
+CVE-2024-41743,0,1,65c6e2958a92de9ba1678db6e94fe75708c152fe3ecfb3f73d869de2b283c009,2025-01-19T15:15:20.877000
CVE-2024-41744,0,0,a1ec9b6f722dfb7b5eb719083ed54b520e388eadf02f9306b2b2589df4b2c46b,2024-11-01T20:24:53.730000
CVE-2024-41745,0,0,6dba06d9ea0cc08ac8425e0341c71668811a6cd02139664e48e7481acbda9d69,2024-11-14T20:35:33.390000
CVE-2024-41746,0,0,989806c900ffd11c21b1fa6f91d833c84f6c1680e4b868bdf0c4c4b2010f26cb,2025-01-16T18:15:22.863000
@@ -263356,7 +263356,7 @@ CVE-2024-41777,0,0,cb9df48d95cae8457cf91a5abe10e277d5ade6df23da7cf8a2746d2d5ff22
CVE-2024-41779,0,0,0cc2a488dd76e38c9c90720b0b2edfd5c9f34c5d2e2c40d451ec0bb49b764fc0,2024-11-22T12:15:18.987000
CVE-2024-41780,0,0,f0bdb2eca8ebee85877f13f35a81fb91d5ea99c267cf6b461805356adb0fe55e,2025-01-03T15:15:10.367000
CVE-2024-41781,0,0,be645911c6dec68941643ffd681ea405f77903ad7fd076fcfc9ba888bf410899,2024-11-22T12:15:19.193000
-CVE-2024-41783,0,0,8c4239df20a7b22dc48d4950524f6437b3dacdd021dbd863eb688e25101c46e5,2025-01-19T15:15:21.020000
+CVE-2024-41783,0,1,ae1c0de72e5dfe79735ebfb7f8ec730c4db19a9e6ca5a3f003214d7fa45e7024,2025-01-19T15:15:21.020000
CVE-2024-41784,0,0,834229de69197513aecb1da041f367a5c75a25616f354d789ef1d74c355b94ba,2024-11-20T14:35:10.117000
CVE-2024-41785,0,0,c467b2ed18d6a9ed7b192c7574b2e5d45ad6a298958e3a9159fbc19830c4ae2c,2024-11-18T17:11:56.587000
CVE-2024-41787,0,0,ca11b7c7cbae167fb879d0935e0fce76c280439ac257e0ea74c70f9235cbcc80,2025-01-10T14:15:28.947000
@@ -263555,8 +263555,8 @@ CVE-2024-42009,0,0,9a4960a836fc73ce032e2e0a9284183ff828482153b71c569eb4f6a260620
CVE-2024-4201,0,0,caa8de420bccc88e064fd619fe08f6837c80c46ab6ceb4db233139f54456b674,2024-11-21T09:42:22.800000
CVE-2024-42010,0,0,03e7dee0af7871a1319da5b152346d87a38864f6270cfec745878dfc136b3e64,2024-08-12T14:15:07.370000
CVE-2024-42011,0,0,266d3b924a10f9b724bb81458292feaa2d0436def0bdd21429b955b06ed88aca,2024-10-30T18:35:10.283000
-CVE-2024-42012,0,0,ff0ddccfcde7aae3f33b3ee9a2186803e72deb89bf1da17b62fcece083609a4d,2025-01-22T16:15:29.183000
-CVE-2024-42013,0,0,8c91ff5c027d0d86c7f9698278f51c909392fd40179c79b6bba7da92932fd578,2025-01-22T16:15:29.303000
+CVE-2024-42012,0,1,843f2d20c70de9a74e52946e8323d3f2a50703482a47ff8577ea7f943e9cffc7,2025-01-22T16:15:29.183000
+CVE-2024-42013,0,1,2c636d64926ce896e2a9142fcf8c7dfe090ee432ea82dca6fe5b845c8de4519a,2025-01-22T16:15:29.303000
CVE-2024-42017,0,0,5509e2b803cf969223b73bdcf88f1502d3b190466153a8d92dad3bae23d94eb3,2024-10-29T15:35:30.713000
CVE-2024-42018,0,0,eb9a1a6ae48726fe6d8ca5270a76e202e200b6b8c357ecfcb36c7033e7e13c63,2024-11-06T20:35:23.377000
CVE-2024-42019,0,0,3685530b36a39a63856807b2e771ed1cffbe416901360d0224102921ef6aa582,2024-09-09T17:35:05.247000
@@ -263728,12 +263728,12 @@ CVE-2024-42179,0,0,196106f2d3fd2b8f10b05ef0357a8e01417f21977d9b370fe7a52116b37eb
CVE-2024-4218,0,0,7a0061e75f27495a7259e5a50ce11715685411290c6b771dfa8c54d8a57b046e,2024-11-21T09:42:24.667000
CVE-2024-42180,0,0,e809f9eb7c1490df30221feea0eda948578a27863db7d95ec3363e5547031367,2025-01-12T22:15:06.983000
CVE-2024-42181,0,0,906efc04675e6ba0dfe172b3f945d5b98bb4c6661097a27e747b5cc96fa37cb6,2025-01-12T22:15:07.120000
-CVE-2024-42182,0,0,18224d5ee2ac8fd7b3a22f0639a5bd5f7202412e7b859b5dcd22eb1ddc784400,2025-01-23T01:15:26.580000
-CVE-2024-42183,0,0,2bb39ff2865b68e0a44a69976564b440b6158945315c5c65084cc605c855965a,2025-01-23T02:15:35.933000
-CVE-2024-42184,0,0,2040e34803cc99f77c7747b85cb6684f22f0b43b8dece916041d344b0802fb38,2025-01-23T03:15:08.727000
-CVE-2024-42185,0,0,5f88d2e5dfc16ec3af4da603421864d14434c294bf44775c51803a45f0d2c767,2025-01-23T03:15:08.860000
-CVE-2024-42186,0,0,9ade166cda78c2d23e37c9140868e59447d1931c7db696dae1290b4d21db1d4f,2025-01-23T03:15:08.983000
-CVE-2024-42187,0,0,53e65352f009c253c670dddc686f5213c76b42c4ac0b0ef42a63e4bb79ae2917,2025-01-23T03:15:09.103000
+CVE-2024-42182,0,1,0c0901b2ecdd7a23810254feac415da6d63493f9a2abec0427c2d0081c63a95e,2025-01-23T01:15:26.580000
+CVE-2024-42183,0,1,12312ca11bb3eb3f512dfb7e7e6daa4e23f46c091a52336a581610e963e2bd41,2025-01-23T02:15:35.933000
+CVE-2024-42184,0,1,49292f5df77fde942b496c22f58d01feb9765ea1c1cbbfc32e874c2ef2248920,2025-01-23T03:15:08.727000
+CVE-2024-42185,0,1,2102e5776c39c9f3cdc05d79feb0696a5b655cae3c2fa317371f4900619eeeab,2025-01-23T03:15:08.860000
+CVE-2024-42186,0,1,85a6cced243ef98246058f8b5fed725c52ebbe8e77fa179519426477dd394114,2025-01-23T03:15:08.983000
+CVE-2024-42187,0,1,ac57f1a386a912fff99943b46be4bb8f6af4a204ee2b40379405a340cd7201d3,2025-01-23T03:15:09.103000
CVE-2024-42188,0,0,a8278cfe50e3ca68bde755bed653483d11589c1acd3e94c1e7362476b4ce136e,2024-11-15T13:58:08.913000
CVE-2024-4219,0,0,cd28361343cc861bde40c0bbbee1aabb101ed013946c5589d3ba0dabbead402f,2024-11-21T09:42:24.783000
CVE-2024-42194,0,0,af3a202d05f65dc11d1d1e7b62226f11c65e5914cb08b7ffa3083b3f3386e580,2024-12-17T18:15:23.590000
@@ -264116,7 +264116,7 @@ CVE-2024-42626,0,0,eae0da8ea878af5151c8a45c1306143fa24099c19507f78375b85cfc4a03e
CVE-2024-42627,0,0,c39371251f05d5abc5448ad438b0f6489f4eb76d3a69986e84eda2a5143b1f48,2024-08-13T19:35:11.220000
CVE-2024-42628,0,0,2325d2765f2d81827b8ffe25a141eacd58fc695df55360d9abd94e8ca219d68c,2024-08-15T17:35:08.840000
CVE-2024-42629,0,0,87a963a33b08e5264908a63ea61b8dbccdc01c04a160aaa01a7c4727e6e9f324,2024-08-13T17:02:57.890000
-CVE-2024-4263,0,0,f353a1a21a7647706b25b50a24305d61116a74103117889220d6343f2de2037e,2024-11-21T09:42:30.143000
+CVE-2024-4263,0,1,2feaa8e367ca3cf2f622f497ca2629e82b43dfeeb29233a0491dbd8a351b0314,2024-11-21T09:42:30.143000
CVE-2024-42630,0,0,56255100899a29b9a7c877a5ed7178bb0668d61a505a86a2cc673acfa52244e1,2024-08-13T15:35:22.433000
CVE-2024-42631,0,0,ed9e80e71e882419c98f1936732fdd035ca311ef33bc2ac9cb2a1a67c40affcd,2024-08-13T19:35:12.050000
CVE-2024-42632,0,0,29fbd74151313f5b4a9b1372c595b1fee99cc3a87d35047777c8872345464e5c,2024-08-13T15:35:23.410000
@@ -264349,8 +264349,8 @@ CVE-2024-4309,0,0,cf6d99d40224d9ea0048df61a24b0034afd2baf32b8f2402feb311af37805c
CVE-2024-43090,0,0,bfb455ba3b27b8e5f909736d7638aa4c244eafab69b7641e19b79e78332f1fbf,2024-12-17T20:43:24.893000
CVE-2024-43091,0,0,18a7813067907079929e1aa7a03c2ea14a6eb858fe26b9c9489160580668468c,2024-12-17T20:35:58.717000
CVE-2024-43093,0,0,3f092629a0cce74f6f59bab52d6247e2ce3f3aaa2972aab5920268e0f2acfa91,2024-11-14T21:42:34.923000
-CVE-2024-43095,0,0,dc7aa514ea744f71be052866e554f8b741d5ded0142ff34365a7d8a146ad4f62,2025-01-22T18:15:19.013000
-CVE-2024-43096,0,0,32af869676835e888d7ed1c80867f07e4fec5047515aeac716220147e68f376c,2025-01-22T18:15:19.147000
+CVE-2024-43095,0,1,4f9b3e24c320d2860d2ce22850ffdfb7559aa75a9e29352b4ab30371d10a8710,2025-01-22T18:15:19.013000
+CVE-2024-43096,0,1,64e558ac1e8666e2b26325613d9a6c0f7d2dfb9ad111515a0ac248562c2e0d3d,2025-01-22T18:15:19.147000
CVE-2024-43097,0,0,004c4d6e0d21742822f66f64708df4b2724897f8929303b830f9e30aebcf9183,2025-01-03T22:15:07.503000
CVE-2024-43098,0,0,aaa4bffdf6c6e20ec4753899ba345f210f592f053c3f9fc872d1827eacad7c11,2025-01-11T13:15:21.240000
CVE-2024-43099,0,0,dd4c6171d90425754eb8c361c1c6555117a95d6bcad5f992f28ec42a1deec5f9,2024-09-14T11:47:14.677000
@@ -264405,7 +264405,7 @@ CVE-2024-43149,0,0,9790e35ed9ebc22ce7591793bf69738eec4fa49c273f5891df1dd077ffada
CVE-2024-4315,0,0,e763108c78dad72bebf08ec43afce7d1a9cefe46d407df73d71b5a11ed56b345,2024-11-21T09:42:36.577000
CVE-2024-43150,0,0,ce5e318f42570113094f77afe38504814afe3158c0604237ad810d4363c1e576,2024-08-13T12:58:25.437000
CVE-2024-43151,0,0,e4709912198de31cab516a307442fc8a4171eaeea915ddcde86ddff97c798dfa,2024-08-13T12:58:25.437000
-CVE-2024-43152,0,0,fc53d28191962fbcd8008af8f22a083a1e71c099809e0a2831f8f207cd34f2f8,2024-08-13T12:58:25.437000
+CVE-2024-43152,0,1,fdc1bc28f6de80354df4f758aaee6f89f6f590802543a7465db9f7e67c4f32aa,2024-08-13T12:58:25.437000
CVE-2024-43153,0,0,edb2b54323393ef5505dbf5adb1f3b1e8d839c6a276ae467a33311c1cc3db344,2024-08-13T12:58:25.437000
CVE-2024-43154,0,0,e8b44b7270a93c0e181140b8d68ad010660d44beb9c75acab453a112a051816c,2024-11-01T20:24:53.730000
CVE-2024-43155,0,0,33c4c43fa6a4f4404ea0bbc304e95416a686301209cd813771c66b8106ce8b45,2024-08-13T12:58:25.437000
@@ -264692,7 +264692,7 @@ CVE-2024-4345,0,0,a6702330dfaa23034674ad71761fa3a24c24c5e8135b9de0c2ce234c41a437
CVE-2024-43450,0,0,c48e6409880a75fc94a4b0660ed715379652c47e7205de6b34036e7a92f07ad9,2024-11-19T20:49:26.017000
CVE-2024-43451,0,0,49bff0434187d6b13c5aa0a3e121a7eda96354089b81f9ff6f0d42e6539a2156,2024-11-14T15:24:33.317000
CVE-2024-43452,0,0,55d9e1472de215991b1cb71eaed0a02fe8b294e245c4d750a0f45b763b9121cb,2024-11-19T20:48:28.447000
-CVE-2024-43453,0,0,bafb249685501db93916c96a149e524aba0c579276b8b12870360e5941eb14f0,2024-10-22T19:29:44.997000
+CVE-2024-43453,0,1,005ff02e3ff00a6b5c97fe1711e6cfb7982cd32d25114786f5122652ef937600,2024-10-22T19:29:44.997000
CVE-2024-43454,0,0,b7e179fb5bd880682b86ee4b6670b55a22483a7e4288cd9df38d929b4af2d8e9,2024-09-13T14:52:28.570000
CVE-2024-43455,0,0,54b22065ccd28ae34cb9b067b146f151985fa190f05ca849b4cf529d2aa84b32,2024-09-13T14:50:02.390000
CVE-2024-43456,0,0,8c4c3f15c6af8fb171537946e21d630174fd4968dc843c4006ac87e0a6586c11,2024-10-21T21:28:15.323000
@@ -264738,27 +264738,27 @@ CVE-2024-43498,0,0,6823453d1785ee41df601df301c6e3cbcce61135bd27efcd9a921959505dc
CVE-2024-43499,0,0,617c6fff156980c452bf6c4c76a89367a4c75ee7ac3fdaf302e79bd6407a3cbe,2024-11-19T19:59:24.387000
CVE-2024-4350,0,0,2a936f9de7c8d535efaa1c3655498f0d6d0ce4a92e8ebb4b6b597f0f26aafd89,2025-01-17T22:15:28.360000
CVE-2024-43500,0,0,5e4bf5d707a97d7bfb742090bc769e9ddd0238eb88135f00a956546aaa90a719,2024-10-17T21:01:08.067000
-CVE-2024-43501,0,0,98f378daa7e7080e336d485a2f2ce640128c09b69b8e9cd5a55d4c6b948536cb,2024-10-17T21:06:07.377000
+CVE-2024-43501,0,1,6a06ebc987c11741ce0f3785179189911db3949d529812b24bc4194a3f3dc6ab,2024-10-17T21:06:07.377000
CVE-2024-43502,0,0,a031736eda864dd857ef3d2503e2b864fcbd3df5434b6415a6233eaac1b922e7,2024-10-17T20:58:37.107000
CVE-2024-43503,0,0,fd66b83af0c76f028fa1282b323ba98aad797dd06829d47be0287dba78cdcc12,2024-10-17T20:19:17.793000
CVE-2024-43504,0,0,c83cd45b7e63fbecf8fa3e8a53fdbf2dd6c41e200a75d5e4b70b429db2b57454,2024-10-21T21:26:41.257000
CVE-2024-43505,0,0,fbc495ccd681183727f4b91b42933ffca66b81f95ea6fbca03decf5858a953ac,2024-10-17T18:16:50.360000
-CVE-2024-43506,0,0,45e1aa7a5af247b48caa79f629a2010ec598f373d403a748bed4408ee40110db,2024-10-17T20:19:06.707000
+CVE-2024-43506,0,1,91ef581b5f0d21d120ae01c4e7ccb3d8a80b9915ed2365bfe66ea7b5cf7384b3,2024-10-17T20:19:06.707000
CVE-2024-43508,0,0,a77c25e762e31f58a51af309fe2eb70916818bf667fb797bfc3c41d004f5379c,2024-10-17T20:18:55.517000
-CVE-2024-43509,0,0,703195e160708b0af67d5eb5c68e4b7879b746ecc041a0a43b6cf90a9f374ee3,2024-10-17T20:18:45.110000
+CVE-2024-43509,0,1,10e93c8d7ae6cc8b0648b86045d0d159eaae8d954b07d5e9b3b506ff6c59dbae,2024-10-17T20:18:45.110000
CVE-2024-4351,0,0,8d41a8b4d777b13661752958abd44bc99247a204cc19e7038ddc04d45608de6f,2025-01-22T18:23:35.573000
CVE-2024-43511,0,0,3d02287c565a2090ab3ee7dfcfc8ca8fde9d5b425335519be8be2c2f020e26c2,2024-10-17T20:18:33.103000
CVE-2024-43512,0,0,3da4373663b1df4b93eb953bfd44dceb6bc6c04d436c2e21a62fdd92bdb06269,2024-10-17T20:05:03.257000
-CVE-2024-43513,0,0,85d727739869a2bea118e595d3a2591683d726d4eca3032eb3cdf0e3b9801662,2024-10-17T20:04:08.917000
-CVE-2024-43514,0,0,6d3584ce48046cf1ca69272b554bbf2f2be86927853b324184182ae42b2f42cb,2024-10-17T20:03:44.790000
-CVE-2024-43515,0,0,6a6f3c2bd4a779ca88ca3f8017ae311fa5c644d1f644fe19503fe0194b15a91e,2024-10-17T20:02:28.623000
+CVE-2024-43513,0,1,27fea55052b8996f6838b3406cd27505020bcb1510bac8fb71b81a0254c06d3e,2024-10-17T20:04:08.917000
+CVE-2024-43514,0,1,cfc62cdef02a969c2a1e60d7e9cf59275f18c4b510660bdc1191f9e41fbfb947,2024-10-17T20:03:44.790000
+CVE-2024-43515,0,1,0d2b96239f869c79bb5d3dfdcbb3ae11c9744c1b452a992a7a0982bf624d88db,2024-10-17T20:02:28.623000
CVE-2024-43516,0,0,b62aabdf0fe3608c30853a86f006be8102f5b8fbf2de64f43d98287888478627,2024-10-17T20:03:34.733000
-CVE-2024-43517,0,0,ecc65d1061c4f22d357ff2d5f7a6705cb4146c9e1a752d049f225bc17223774f,2024-10-17T20:02:38.190000
-CVE-2024-43518,0,0,cc1707e95b4d237623dda37ffee1c9e370d180d0495706cfb38c4ca5b144a770,2024-10-17T18:55:19.963000
-CVE-2024-43519,0,0,143112ac05413bbf67cb50fe3ba31003c83c3b52bcbb854339ddab82189ba147,2024-10-17T18:53:48.217000
+CVE-2024-43517,0,1,89edbe3e413d0e4b5779dbb5ffcd10cb4af8920194477f2ac1310eca3c15c7d6,2024-10-17T20:02:38.190000
+CVE-2024-43518,0,1,de1579e08505aa99b2d551da158ddf356dfe08aef166b7989141b203510f07b0,2024-10-17T18:55:19.963000
+CVE-2024-43519,0,1,4ae65e8a35abbcd7ac3fe6dc819889986071996dd94bece3b4a380015264fb3a,2024-10-17T18:53:48.217000
CVE-2024-4352,0,0,5df52b07679d73f7ab8e52eb8324fd43386373bbafb539092e9ba7941cd91a06,2025-01-22T18:24:15.257000
-CVE-2024-43520,0,0,14b3af449d0c342f092cf50dd0fdd884cfb273b720481f68d000f760a7774e89,2024-10-17T18:40:06.807000
-CVE-2024-43521,0,0,564a8df8e16b7da61336c004a84f8fd16312654196c6af9960132b9d00e07eb4,2024-10-17T18:39:36.567000
+CVE-2024-43520,0,1,a899444f650655d6634f79f8813521848bb1479b4acba4d1701acdf3b00f879f,2024-10-17T18:40:06.807000
+CVE-2024-43521,0,1,c54eb17f74f2306e280989068ad908caf46666606fd7a3fb5cc13ae5a3b790f5,2024-10-17T18:39:36.567000
CVE-2024-43522,0,0,683cafc7380bcfabc8111b404163e9cd8b46387f5818df74494622da78f6695b,2024-10-17T18:38:51.557000
CVE-2024-43523,0,0,ce5a1615debe99c58a56ddc6a4e739a2121cd9c3655f3854af61d281b64138a3,2024-10-17T19:56:22.613000
CVE-2024-43524,0,0,1e6e23021cc2a015f36ddae2c04a7fdb2f3f53e085da51c288fddec05e0029b0,2024-10-17T19:55:58.963000
@@ -264766,92 +264766,92 @@ CVE-2024-43525,0,0,a9f3ae5f754b11e574f9d9db1f3554a449327529dd68537817148b730c756
CVE-2024-43526,0,0,d54f8d3df06e63578ea31a5b5f5a0499f3e25359a79ddf071f80ea9020ddf003,2024-10-17T18:36:17.460000
CVE-2024-43527,0,0,cf43baa77e520ba66e08c4469fab788ecc2cd5afada491e82545c4ff70097831,2024-10-17T18:18:08.877000
CVE-2024-43528,0,0,3b7ddee05c3362a1c6c17e49a12b4a951ee30686e6e392e28452d63584be2ccd,2024-10-16T21:47:05.543000
-CVE-2024-43529,0,0,31731c35d1f6f78789cb51bf5d48475173d7e19ca743804ee36963b47e9d807a,2024-10-16T21:48:07.683000
+CVE-2024-43529,0,1,c09e3100aafe5af8120f248585d1072a09c656a9f86c8f7dc9d47c5e91d48aaf,2024-10-16T21:48:07.683000
CVE-2024-4353,0,0,4ffccafc3bf4ca0705afabb86a0c2986583233b5fcf3d09f91b99af57e2570bc,2025-01-17T22:15:28.510000
CVE-2024-43530,0,0,35f67c50080a3f5ab2620813a784f901c8c482b8af17231e86829e6b0457ad79,2024-11-19T03:52:28.357000
-CVE-2024-43532,0,0,140eee66da6b8d85edd0f2673901f2a7c7e0bdac0ab41cbb82dcfca2e573c283,2024-10-16T21:51:34.370000
-CVE-2024-43533,0,0,14fdffec7e07d6529aba3d90037ad8500f7888787d7e8b9da221ae33348dc78d,2024-10-16T21:48:30.067000
-CVE-2024-43534,0,0,bb3249f9838f71e61c40a2596410c765f00d550cedab2d06e62ce6c4d675c604,2024-10-16T21:49:06.767000
-CVE-2024-43535,0,0,f1c53a08eba0aba48860b3c69a9f6d6a4076c3d7ce63cd9dabcd8695f7436d8e,2024-10-16T21:50:04.210000
+CVE-2024-43532,0,1,d45af3a9dfba6266b5090ae2769c80c0058f1404cc0392fecc8aa16d3f5946b9,2024-10-16T21:51:34.370000
+CVE-2024-43533,0,1,aac068d1ea4207e0d22b1a8e8df15b188df416abecc44c9a5a5fff6b7d441226,2024-10-16T21:48:30.067000
+CVE-2024-43534,0,1,7049425c61d206be8eb864da8e915127c5b9926c5cc12d8736d74019dfb795b0,2024-10-16T21:49:06.767000
+CVE-2024-43535,0,1,5cd647e1c63fda818f4c2cbb92055f574d4156435731fbf8e1f63f07bef60b67,2024-10-16T21:50:04.210000
CVE-2024-43536,0,0,fc50c46386d89f5de9db1158749847c44f355e7c2ae6c00a32c92b10d521718b,2024-10-16T21:50:39.247000
CVE-2024-43537,0,0,6df2266703a8505d2e3c55356a3f77acded9111da71acc90b0f3bdd52a255ed4,2024-10-16T21:51:05.800000
CVE-2024-43538,0,0,0580565b912839d8d799038b9302d676553c406efdca7d48ba5324edb7869785,2024-10-17T18:33:52.197000
CVE-2024-4354,0,0,18c5858ffa8c470db895c7345981d954c644d464173ed9c372744afd6a8e35a2,2024-11-21T09:42:41.117000
CVE-2024-43540,0,0,f174fc4a5b6eaea02e1995509bfc4640b8fd202faf04dff249d7a7bc16d0e2de,2024-10-17T18:25:27.963000
-CVE-2024-43541,0,0,790c0a5ee8d30e23bc5baaba078edd230855d5bd7c7004864c4d8169ddb9e199,2024-10-17T17:50:26.427000
+CVE-2024-43541,0,1,15da949aed43415573ce8c04da6201e14d9a067b0e08e5f39652fe3dfbb0cb48,2024-10-17T17:50:26.427000
CVE-2024-43542,0,0,27f1227613ddcd0dce8edc0cb484eb6ae4bbcdb123f4c5a72e0a2424d8175025,2024-10-17T17:40:01.607000
CVE-2024-43543,0,0,89319c54dcfc0bdaac35c550c47db1b127522ae6d628077c40fd2fac6822e407,2024-10-17T17:23:26.507000
-CVE-2024-43544,0,0,4bb811fe630c5a73a346448a9dd37d87be71c3c237b3647e6a093ae2aad8676f,2024-10-17T17:16:51.173000
-CVE-2024-43545,0,0,db14518abe658e28c627909d3dcb8ab5edbc63f143d0900d5c26277b3969eec1,2024-10-17T19:55:41.200000
-CVE-2024-43546,0,0,408fe9104945cac08ba10a95ffa73cffe86a0114097bbd181adba284eea1599a,2024-10-17T19:54:46.583000
+CVE-2024-43544,0,1,98221d4658bc658767ebc8c4210e83326f5b9efcbd8e4354f2759b7e9a28efce,2024-10-17T17:16:51.173000
+CVE-2024-43545,0,1,85f6e69a97474d926fd43c6671018cfe3e68239af52ff8ed848e3859c31cf303,2024-10-17T19:55:41.200000
+CVE-2024-43546,0,1,76fe80d8623c907e971d924fcfffc0c3bd2f17f3c666a8463eae0e98b034527c,2024-10-17T19:54:46.583000
CVE-2024-43547,0,0,f6e5b246056e89a9645f87395e3aefd3d26a245e130d9a0167abd7061cd7a180,2024-10-17T19:53:47.350000
-CVE-2024-43549,0,0,a69ca2b5cad6a6c672d3108b5198dc572ddd3d9599dcd2a71bb774ffa0da9714,2024-10-17T19:51:04.483000
+CVE-2024-43549,0,1,1ad9c856da7fac65dfdbca507628c5efb8c52bcd21ce3ce38b3a091280c19651,2024-10-17T19:51:04.483000
CVE-2024-4355,0,0,53983ba2df68620ce9baad17e85d5fb39db2effe764118757e88fcae456019d5,2024-11-21T09:42:41.240000
-CVE-2024-43550,0,0,c3b9f9888ac8caaf7b9e2fac22f8a190c96b2941c7544641ae94e2aeaaeded60,2024-10-17T19:49:48.423000
-CVE-2024-43551,0,0,905aff19d56bcc23835dc8db93b5be8b799f57e5c5deacf6f574e80d8bcaf115,2024-10-17T19:48:47.157000
+CVE-2024-43550,0,1,57556cf58f97c6dce914af2b8867f4205a346b4be2f5cb72b8dcad2f4a849964,2024-10-17T19:49:48.423000
+CVE-2024-43551,0,1,2bae9709d7d36b1d7d129db90b49ea4527cba6dbacf9a8935e28e24ca00cd389,2024-10-17T19:48:47.157000
CVE-2024-43552,0,0,b2c28ad5c0524d28b02b7fe30db0651bda9e2f65326ef94d0bf41728cdd71664,2024-10-17T19:47:52.227000
CVE-2024-43553,0,0,4a0cb027a3cb0a083c50645c1863384b895493c92f2aad485a480c7a517ed1a6,2024-10-17T19:47:19.113000
-CVE-2024-43554,0,0,185e45e0ff4c07b9424806d05a37f9919801cbe154a1f775394b93eb91c4f4d5,2024-10-17T19:42:24.797000
+CVE-2024-43554,0,1,3b3af87b80107093417882feb5b84c4aea8db6504a99307e03cdd6048ecd789a,2024-10-17T19:42:24.797000
CVE-2024-43555,0,0,1f0853a1b95e042676bb760a83288b52dc52c467ac5eca012944b2b6502e05e4,2024-10-17T19:41:24.990000
-CVE-2024-43556,0,0,e66319c8ebbad9e0568934655ee3b7ae4f24fec74acca7d31d9e9046a0a7ca71,2024-10-17T19:40:11.860000
+CVE-2024-43556,0,1,abb9c792372a048b083cda389901b52c7b55f226ea479e3022c5ac95a5f61e4a,2024-10-17T19:40:11.860000
CVE-2024-43557,0,0,f022e2312608efcee784619126b4c1729ea4e74bc6134b726403dc7220f51a3f,2024-10-17T13:31:54.217000
CVE-2024-43558,0,0,be37a04e3e8d328890abfc8e5230d5fbc87ea71057cbce8516b8f08cf6cebcb7,2024-10-17T13:31:55.977000
CVE-2024-43559,0,0,8b8e312203229fb2333016e135ee6ab3ef894fdd9ee85796fb304104b9d7485d,2024-10-17T13:31:57.833000
CVE-2024-4356,0,0,254002ab23696265c55ddbe3a9599b956df11c66cfc5167717ec80f6efa35c46,2024-11-21T09:42:41.373000
-CVE-2024-43560,0,0,756747c9bbed6be829a50031ef65ecc707fbeef2e2ab35cf5530db3b4b9fd01d,2024-10-17T19:32:35.307000
+CVE-2024-43560,0,1,28dee03e290d85eda2ce67c3212700a98ddb167264945bf2d6223e2666e0e6fc,2024-10-17T19:32:35.307000
CVE-2024-43561,0,0,79e693734918728ccc9a5b7e951ec367f31f9e655df8163b5f97ef09ab510624,2024-10-17T19:04:13.587000
-CVE-2024-43562,0,0,76a9bd26fb6401a534cca517cb9ae58a093debc114f48e70ffbc23632148c0e3,2024-10-17T19:02:40.563000
-CVE-2024-43563,0,0,8aa34496a67725a40a6ef0ee38e3524153e1a88ab3ba481fa9456a55c77e1d20,2024-10-17T19:01:21.967000
-CVE-2024-43564,0,0,ce2169c0cd5849833d3bc1025d1096322c39a549050d4963e08f44d5a10ec619,2024-10-17T19:00:23.577000
-CVE-2024-43565,0,0,5eae782ca04bb81bde4fa6ad9dc0b591312be7ea54333cc8bcc462e09270216a,2024-10-17T18:59:41.177000
+CVE-2024-43562,0,1,d6123b173f9162cd9f72223328a0bda9144e89cd95022edabe4e459e3ab3c17f,2024-10-17T19:02:40.563000
+CVE-2024-43563,0,1,ff9cc4af9fcf0187567335d459c6581c37991bafdbc02656510a5888371b7aa2,2024-10-17T19:01:21.967000
+CVE-2024-43564,0,1,7a1a531f46420888e707a765f46fbd6065d69f1b39581c4728dda422cb70f37d,2024-10-17T19:00:23.577000
+CVE-2024-43565,0,1,d1c1dd6b24c2bbee8bdf82a69bef7fdb865e094a3f6b80ccfa338a56984cd130,2024-10-17T18:59:41.177000
CVE-2024-43566,0,0,706f7bb3755d8c31033f9ee3165e2d501c2a0d69a3cac02877b5829b2d944a41,2024-10-18T16:49:47.340000
-CVE-2024-43567,0,0,0826caf004afbbe883f59cd7499da6d2dce68be1426e7da70d2a82b2ac695f8c,2024-10-17T18:29:15.913000
+CVE-2024-43567,0,1,ee28be1d10237e14edb442c0108dbabc7e288a51cfc4ee8a3d6e00ae5c53563b,2024-10-17T18:29:15.913000
CVE-2024-4357,0,0,d0d2a21bb806d61219901778e7cc09885dd704c2cb404fdd82196f9f0fab2508,2025-01-16T17:06:41.727000
CVE-2024-43570,0,0,26ecef3e5b0cb6981f75600d9e4ee9e551a0992c8c8ae719cb4114f7aef0b066,2024-10-16T21:53:41.207000
CVE-2024-43571,0,0,fbc457e06743c7f03409ab222959c88835b5f5fd03f6b0ecd901a8e593bcec66,2024-10-16T21:53:47.887000
-CVE-2024-43572,0,0,b53b07ee0ed22cb0630559e2fdeca02c92a59252eed4be7581154e05a6a8099d,2024-10-25T18:17:28.223000
+CVE-2024-43572,0,1,55d0f086a7a8c2e690d05d3f69e365ca3205eeb3e6b982660afde6c106cb9541,2024-10-25T18:17:28.223000
CVE-2024-43573,0,0,ee49e709e695f77239a94a3a0e4087b726fb4bad2ae8d351b3c5083ef3073aa2,2024-10-25T18:17:35.217000
-CVE-2024-43574,0,0,6e627ec1d139e6cc6706d9ab5ed97a726260b89e791055045912190d1a5ebf50,2024-10-17T18:58:37.100000
-CVE-2024-43575,0,0,88b9975343bba435c6108a42115e5e1d0b56514426571729e1c10a5ecc97baa6,2024-10-16T21:53:59.407000
+CVE-2024-43574,0,1,b662ed90c3a35ede4ed2374ef29681dd4c1e072b3761f2224f3f3dce9c6e9035,2024-10-17T18:58:37.100000
+CVE-2024-43575,0,1,60c3e9995ec678490b587ee560de28a179546f8d9e870a9ab0dd969c53bba224,2024-10-16T21:53:59.407000
CVE-2024-43576,0,0,226ed8f442f81adac9fde327d8e05ef6b12943509a4e7657f1f66a4231834666,2024-10-16T21:54:24.047000
CVE-2024-43577,0,0,efd0b7f12f1a1e0a2dc8940b892f4cdee42da314932618cf607507c408e2efe1,2025-01-07T17:14:49.983000
CVE-2024-43578,0,0,68de9c2fcd1167d879fdbd4c652aac964c08875cc8742eafc4500af2fb1b4aca,2024-10-18T16:59:29.557000
CVE-2024-43579,0,0,2ce859cd52dc4a97ac81cddf07dd72a9a5c901d7a0d24c1dba0fa40bea4cdd93,2024-10-18T16:54:06.810000
CVE-2024-4358,0,0,d375da0ccda66b536e55f5f5f94ec71dcf0db33fbb63706af62a0cde4ce8d5a2,2024-11-21T09:42:41.593000
CVE-2024-43580,0,0,578dcd1b350b9fd81334110f26d5d064d5661f87134eea1071e0f880d33affe0,2024-10-18T16:49:06
-CVE-2024-43581,0,0,e471bdd15e05b3241201f54b0718a529108553b0288a0e4866f06e32c21e9156,2024-10-16T21:54:44.573000
-CVE-2024-43582,0,0,3f04436d6ed862645c77171eec9a4a02b53fbb787665d30bb278de96210d8406,2024-10-16T21:35:49.927000
+CVE-2024-43581,0,1,53e723cd36ca94380d9a266ffe5c0c585597d8e53099dfe3880019506d280c56,2024-10-16T21:54:44.573000
+CVE-2024-43582,0,1,1fa32536a02dd051541af52f298c1866a0bc95cc534c6669697fd0359b801dc8,2024-10-16T21:35:49.927000
CVE-2024-43583,0,0,16ba737dbf3f07f3d1e9cff3315798a7a207440f5aa788061aef7c3680c9d6e8,2024-10-16T21:36:59.847000
CVE-2024-43584,0,0,48e627cfea6a9647e06f5895df87f7de5808f3364c6c538ecf02965881aa5325,2024-10-16T21:38:33.867000
-CVE-2024-43585,0,0,d5b51daae74e528bee5e49484ec714a235a78329b8dc0a81e0003a06ed04afc6,2024-10-16T21:38:57.467000
+CVE-2024-43585,0,1,abb358e19455f7e715fa07d11f064f5897658545f27c7ebbd3d9c4d861590896,2024-10-16T21:38:57.467000
CVE-2024-43587,0,0,9de9e4aae1c926feb9c254fb5c9841a525dc7e95ddee4987c94a6de807a75369,2024-10-18T16:54:36.267000
-CVE-2024-43589,0,0,7421a03d79a251f1fcb3e670cc2ede90fd5c85114ad0506fb2719206f281e7f0,2024-10-22T19:29:53.660000
+CVE-2024-43589,0,1,cc903ffbf9d43a375770e2d4c51903c8c3fd1fb1fffb8f41fcf7a5ca5018c226,2024-10-22T19:29:53.660000
CVE-2024-4359,0,0,a847c8a4556be0bc64499ff4a494bda5373f3e9fea07d39ae70522d6aa358cf4,2024-08-12T13:41:36.517000
CVE-2024-43590,0,0,56f37bed6fa12b529a536cabd867859c2b7202ec5a699f63f91ae2da59bda0d9,2024-10-16T21:44:50.927000
CVE-2024-43591,0,0,122a3422706c1a52ba2f8f892feb955dcc1b1b00d57e2a43f0bf994287808e37,2024-10-16T21:46:38.153000
-CVE-2024-43592,0,0,aefb3ea2eef4806b0b04bf1216ce25a8b6f83f456c5748fe7fb5b675b193040f,2024-10-22T19:30:02.777000
-CVE-2024-43593,0,0,2bb48f4f0afa52430e295c1e926a52b9335896fd8f7df026028468d0b3163bed,2024-10-22T19:30:19.870000
+CVE-2024-43592,0,1,b9ca8e169ff2961078c91cf3fb1e31e9b422da371a8ddcc4dbd570ca574c2533,2024-10-22T19:30:02.777000
+CVE-2024-43593,0,1,a20f40915672f2b39a9d2274a7dc761f5c23347abce3eb6ca20eb8bd84b36912,2024-10-22T19:30:19.870000
CVE-2024-43594,0,0,5a486aece5f37225094d6faef1943aa61cf6e355499759b65b20904dc2182775,2025-01-08T12:38:56.207000
CVE-2024-43595,0,0,cb5b5951e4919de1a872d590fd0c42132b697a287d76901f8d922654387160cb,2024-10-18T16:55:06.487000
CVE-2024-43596,0,0,378e2538af1a4ff984cad3b4476baafa72ef2d70988fd63f25f16366167c11ae,2024-10-18T16:59:08.667000
CVE-2024-43598,0,0,e3ba2ac69aa626cce11d0f511da9d5528d9a33bfea6bff124e6fc71c816b20a4,2024-11-19T03:52:01.630000
-CVE-2024-43599,0,0,e8ed1fc525a6895d6a19bfee310c1be1add8fbfc1bd1f275dd80d76add28514d,2024-10-17T20:03:28.687000
+CVE-2024-43599,0,1,39101324225bdbc43df2de78182987bbfc7288ac33fcdced82345e1095aeaf54,2024-10-17T20:03:28.687000
CVE-2024-4360,0,0,6252dc41739530b13b80d54c3ba928a6dcd0865b27642a102a8ba40f784b0055,2024-08-12T13:41:36.517000
CVE-2024-43600,0,0,512e86bf1b068e11fed10f17ded98012e43b045697c873b109da2f251d32875c,2025-01-08T12:39:18.487000
CVE-2024-43601,0,0,f4750adec6049954723df6377c0e9969d37c9d4c9bb640431f543dc8ccffc558,2024-11-08T22:15:20.270000
CVE-2024-43602,0,0,8305a93b11e5988c2ad84757fc77cd97d5fa424c6919ea25cb20c9e18393fcb4,2024-11-19T03:40:15.550000
CVE-2024-43603,0,0,06afd6ae30de0f84874ac0f27e9ca0fa20255c6f1ba3c73cbed895f042f11d3a,2024-10-17T19:55:34.360000
CVE-2024-43604,0,0,1effbab36c6fa1acdc7a9e982f82dcccb7e0dc04d9831b75e228387e20d65027,2024-10-17T19:54:24.387000
-CVE-2024-43607,0,0,c9f23b17f1ded786cfc1cf9810a98a9c06f0681a9460c31b2dc8ee2c9e999ca5,2024-10-22T19:03:17.993000
-CVE-2024-43608,0,0,399ddc2b1ac9bebe5d70e52dcc84e7ee76f38d680b84b8bee477db5662f31693,2024-10-22T18:58:04.887000
+CVE-2024-43607,0,1,177b707b3c03bc962c8aac04ddde5ed155a406d7972129b86a3e09a27930d8d1,2024-10-22T19:03:17.993000
+CVE-2024-43608,0,1,75fa80cbbca2584783cc832318883f4ef6d591cdbe417f665655ebd55f28b18c,2024-10-22T18:58:04.887000
CVE-2024-43609,0,0,ba7efbed5be9c886d14b380fdcac5b8a331d529611297a73ede304b8d72e0023,2024-10-17T21:18:58.113000
CVE-2024-4361,0,0,43aff6787a4479f38b03751f8b309978e2b7bd8011ebcb21afe8f9fe0204fc3b,2024-11-21T09:42:41.863000
CVE-2024-43610,0,0,531fee574a493d6d17cbcfcc8b12aee01a4bdae3496f2cb465e3c91e82deed46,2025-01-10T14:59:49.673000
-CVE-2024-43611,0,0,a43082b318173acaf88ab8fedf18a695493c85d011ba81bbd1c7b0e31b837833,2024-10-22T16:01:19.373000
+CVE-2024-43611,0,1,70068d68bda071c9a5571ee7abb6c83fdd9b870395a94ed7f5071cbbc659a60b,2024-10-22T16:01:19.373000
CVE-2024-43612,0,0,812c826e3c16ba289dfbb62de4b281704dbf93c4d4b0a921ae535f6bffcdffc3,2024-10-21T20:48:02.050000
CVE-2024-43613,0,0,cc633dda43ef8b13ce69f0ec4a9b365544125d76676b641d4b82c2346a780a25,2025-01-07T16:20:13.437000
CVE-2024-43614,0,0,c5d2c4e61e699928a9aa80596895800f4eb921603cf99ac879c7ced052428111,2024-10-21T20:50:38.370000
-CVE-2024-43615,0,0,fa3ae0c75332c4f77e78f0d17ed80118371844c95c489872e0a72219eacc2cf0,2024-10-21T21:00:34.967000
+CVE-2024-43615,0,1,a7be6185efd769f927c83d1bcf5f6fbb2f4769f426bd0b8c50fc4d20209f00f6,2024-10-21T21:00:34.967000
CVE-2024-43616,0,0,53854d33ac39e3d7883338ceed28a977b17a47e36ed07fb5aef1617d3c509acc,2024-10-21T20:47:00.313000
CVE-2024-4362,0,0,3b83c9a7b151f785cffad1c0294ad31322ebd0ae3d7f1bdc0ab46d7d0832649c,2024-11-21T09:42:41.970000
CVE-2024-43620,0,0,8e0c2a1210cc0c4b2cb1627c80802cd8cf1eb8d1337fe83c819d52cdc6ca964e,2024-11-15T23:59:51.167000
@@ -264926,11 +264926,11 @@ CVE-2024-43702,0,0,026195b67973267c5f7e1b66b43eadfe3de1f0eaa8dad79a11b9df4d6c345
CVE-2024-43703,0,0,e564d47a3ea8e2e59e7c0c62fe5b37de767d270b87bc716325b902fc07b61a86,2024-12-01T23:15:06.383000
CVE-2024-43704,0,0,82c22af109add6551b6eea89e99a6b50accfdf02d564899eae149615096d5dc8,2024-11-18T17:11:17.393000
CVE-2024-43705,0,0,29f69c0cebaa0d9dd3b94a974b4686ab8ab2fbc5f28104cf63225fbecfd597b0,2024-12-28T17:15:07.190000
-CVE-2024-43707,0,0,ddeb87cfbf6c2f90875a66a1e09b89cb4d1a17486d95025ee3c0d5c040f5ea0d,2025-01-23T06:15:27.380000
-CVE-2024-43708,0,0,c002ac84db04c40fd780c794ec09cea327137dae68eae89578b77a2a0070127f,2025-01-23T11:15:10.553000
-CVE-2024-43709,0,0,09cf25b20d4028796eee5e828fe568cc7b1650ddae8136f4850d31a7a66e0f89,2025-01-21T11:15:09.807000
+CVE-2024-43707,0,1,89f7e8381384bdafe425c45dfbf1f0ec240c17a913d65ef7d20bf72a92271cdc,2025-01-23T06:15:27.380000
+CVE-2024-43708,0,1,72bc61c7844ed0810e794517dc2714581f71b77fd7cfdf5e8163eccc4200d0f3,2025-01-23T11:15:10.553000
+CVE-2024-43709,0,1,03bacad41d9a5efbe2f7a0cbdc57b7ad83b7552d4e5e2c870736e33797a820f3,2025-01-21T11:15:09.807000
CVE-2024-4371,0,0,e83d972dfd798c0045589442b000f085f252e3d21fb48583dd2590000a3618ae,2024-11-21T09:42:43.087000
-CVE-2024-43710,0,0,66507b3ca0fa781f24439dda0a4400e175eb5584cf6d616992df280c4323ef00,2025-01-23T06:15:27.550000
+CVE-2024-43710,0,1,1365e9096e2dacac388f0e71a5025a4a4ddb0684fc3e616c2cc978830327f5fb,2025-01-23T06:15:27.550000
CVE-2024-43712,0,0,9ab3fe760e8f19464e8d37dd73b7335ae43d5382e27e4d6ab5795a2dd3e62314,2024-12-17T15:23:11.173000
CVE-2024-43713,0,0,2351d2ccf5a9bdfa299b6fe1f3d7c7e3a4bbc01a6f8443c4348a36cf5880bc04,2024-12-17T14:55:13.953000
CVE-2024-43714,0,0,73ad98cab774040abdc9b8e9830549831c35b419b45dea5dc85f0b3962eb2d25,2024-12-17T14:55:24.553000
@@ -264983,15 +264983,15 @@ CVE-2024-43759,0,0,4270d1c80d4da61f734b4e2d0cec7cefaa5eece74e1d071a8d6c550e1b894
CVE-2024-4376,0,0,dbe4e9d8f2663e8bb2fcb94d44ccb172ebc9983e208169b15baf349baf189407,2025-01-15T17:55:38.783000
CVE-2024-43760,0,0,0699b036c3a09290ea9d3ac93f3f512789df4a5bccdc81b41420a254e04019cc,2024-09-13T17:00:30.440000
CVE-2024-43762,0,0,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000
-CVE-2024-43763,0,0,82d726eed3fe99e2255d2d21495ea9d8f2484783b03be4f115fa23b489623fc7,2025-01-22T18:15:19.283000
+CVE-2024-43763,0,1,c5a3ed7d000a12e5fdb0b8573d8ba0d9eaa612927b8d364f4bca31d9de970b09,2025-01-22T18:15:19.283000
CVE-2024-43764,0,0,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000
-CVE-2024-43765,0,0,934f1ba85a151f7784160aacfc2497d230b44acd95f87c19b7bcad33831177fc,2025-01-22T18:15:19.413000
+CVE-2024-43765,0,1,f7d68004e924cc34ed839cb071ae6ea89d85be5c9b4de7d7be0913423909ea1f,2025-01-22T18:15:19.413000
CVE-2024-43767,0,0,af155cf93cc328c05c081440c1f007ae01c3d33d1458fc2c3459ea52a0cc31d8,2025-01-03T23:15:06.627000
CVE-2024-43768,0,0,d63d3ffccaf584eee421ee122021fb0ca8d78148254dd26c8ab21528b275e51d,2025-01-03T23:15:06.767000
CVE-2024-43769,0,0,13983ee3cb62290dd1770f68b2a21cae6948e8a4eebfe4f723c6f963b63155be,2025-01-03T23:15:06.903000
CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000
-CVE-2024-43770,0,0,01d8ab020ec7fff7dabc0764629b8312217c0ae5c3311bba5d1ce0fbce193a32,2025-01-22T18:15:19.547000
-CVE-2024-43771,0,0,f37d44f13fe89dd062140cbc93b9715744a107df40101864fbd8c3cc9b246542,2025-01-22T18:15:19.680000
+CVE-2024-43770,0,1,fc4f121f8f7eb78a605491e566505c494f8b528c9c0fff5bde4037114ddc0349,2025-01-22T18:15:19.547000
+CVE-2024-43771,0,1,edfeb47d85f4b3bca456cb169f606c4276d33741dec892b09141d268604a722e,2025-01-22T18:15:19.680000
CVE-2024-43772,0,0,63f7dc411da3ded034b2d2ffb4e0bad8e95b60c318b3d1e644db504bb5e5c6e9,2024-09-04T12:11:13.073000
CVE-2024-43773,0,0,826b7c5200d245cfd0c67f5d1708290c5274b8ea410b663d2bc4e8259de07c4c,2024-09-04T12:26:08.270000
CVE-2024-43774,0,0,267603d5dcdafd9bbb030b267307fb5b633f3e8c3df39d738d42af146bd763d1,2024-09-04T12:26:42.387000
@@ -265883,7 +265883,7 @@ CVE-2024-45086,0,0,2d2c1612ef6e5a8ce239cd3dcdf490449d1514d9bada7d0d52c5fd5141b8d
CVE-2024-45087,0,0,5a1fbae564cbb4ee2c9e115b9e60e394ba12f02ef5cac53d3fcf17b309556986,2024-11-18T16:34:23.010000
CVE-2024-45088,0,0,1beec48fbebe975f8bc73123f865d04a7ed8df665a2d4af27f0cdfaad436655f,2024-11-18T16:33:34.060000
CVE-2024-4509,0,0,3524d641cd000812a310ff38fb9e15060d273c22d6c74437283905e2f7ceb2a8,2024-11-21T09:42:59.127000
-CVE-2024-45091,0,0,6cdef8024d06c1630553091c450d55c9ff1f847365483e1f1a505d53c62c5a65,2025-01-21T01:15:07.890000
+CVE-2024-45091,0,1,b27b3cf941b62403883926554cb75d6b4ec5680b657a2a257e13a41eb5c4d3f4,2025-01-21T01:15:07.890000
CVE-2024-45096,0,0,6e04e4dc0b5cb194770300a49e24b05d1a72a2bb58de4b452fabe27ca897f070,2024-09-06T12:34:17.957000
CVE-2024-45097,0,0,86a5f6f58b36ff4d76801faef73b7a44c24bdd910aa639853fe61c2940eeaa37,2024-09-06T12:51:59.750000
CVE-2024-45098,0,0,beeee876795e27e2a560d9e6400141cf489497a78fea87df6979a5ea96e1eb85,2024-09-06T13:01:44.023000
@@ -266041,9 +266041,9 @@ CVE-2024-45265,0,0,3195f2e6af57a78d507b0c8590c7c5ddf5f5f28cf2596a98b62f52c9745bb
CVE-2024-45269,0,0,4dd4b0c17cf1fd3624c1646b13e11c313d1c8ea66058c80d226eea57d099621e,2024-09-04T11:49:36.950000
CVE-2024-4527,0,0,ce2c43d9ab21d5e78fbc9b00106024f1a3e67ccc73e6241fcc5391af667c3f46,2024-11-21T09:43:02.223000
CVE-2024-45270,0,0,d1a074e0e5fb8ca4093e7b6a548e1d7160c3aba783aeb96df12cd37844ab8bbe,2024-09-04T11:51:30.887000
-CVE-2024-45271,0,0,dfd12c4effea2c94eaaed1c50b45676dd0e11ceb44b607c920718327c439c563,2024-11-21T09:37:35.160000
+CVE-2024-45271,0,1,b86301300c3f2f96a38bbd2752799bd1b3c8bab4289879943bd8e50a323b5e19,2024-11-21T09:37:35.160000
CVE-2024-45272,0,0,3cbe9546f436b7333a625278040b68b5252f1ac350bc29aeb6d230eef9a7851e,2024-11-21T09:37:35.310000
-CVE-2024-45273,0,0,90f538757a022a9d1ff1f339e76e5d7a9b1b64ef86fa06f723a029e6afe997a0,2024-11-21T09:37:35.450000
+CVE-2024-45273,0,1,d246b6feb1753334a784981eb3e17ecd4bcc7d63a6f4aee39633161e822bb2ff,2024-11-21T09:37:35.450000
CVE-2024-45274,0,0,d3b6f41a266d1ce016972123bfb527bbaf56761d4cbbc4f02ed98b8c5327e187,2024-11-21T09:37:35.617000
CVE-2024-45275,0,0,793f1a8f2d315f5b669d9bb70cf26f22c702a8d8386c19f8189afe3d949d2f23,2024-11-21T09:37:35.750000
CVE-2024-45276,0,0,515a1d815682cf455b2ef1d4505819eb5c6ca42642f27c74f7c848fe1a3f839e,2025-01-24T07:15:10.320000
@@ -266211,7 +266211,7 @@ CVE-2024-45475,0,0,68995e1629edebb8d3330a3b1d200226acbfabb2fa93e2ed19b4655f8a034
CVE-2024-45476,0,0,859e02ec2c22061098797b59104d4e97661513720f365aeb3958aee1139eb6f3,2024-12-10T14:30:43.853000
CVE-2024-45477,0,0,e64486945a7233685155bac32e1cee1ee1baed194f1170f1d979f1137af05eea,2024-11-21T09:37:50.293000
CVE-2024-45478,0,0,99c07afb847401c98c810bd2882233327f48f13d0f6118f043fecd9bb200ef99,2025-01-22T19:15:10.113000
-CVE-2024-45479,0,0,a1a05a58a1cf0593e769de621f6648a403d69f4e461b894b7c6af9c915e853a3,2025-01-21T22:15:12.290000
+CVE-2024-45479,0,1,f15fc4d63b3570a6d33249a5f9be6e83af869b13791a4791e0181deb2ca8650d,2025-01-21T22:15:12.290000
CVE-2024-4548,0,0,c7401b17e35ff1b34998f05de06d9924efc8296217fd62d20718b595e94aba23,2024-11-21T09:43:04.937000
CVE-2024-45488,0,0,ddcd8f59134f72a3b8f90701a24a7b63e03f1137fb0934f505028ece59a798e5,2024-08-30T19:35:06.870000
CVE-2024-45489,0,0,a2cf2fd403c4bd00e429c9a5fe6d6c61964af511aacc863239e18e8a252f2626,2024-09-26T13:32:55.343000
@@ -266311,24 +266311,24 @@ CVE-2024-4563,0,0,b89c6e32d64d62a8b24c69598703856273065e960659587d8cad79f58476b2
CVE-2024-4564,0,0,ee8f47044242c05a630f54d8d399a7051500b8cbd4c8fa39ec50216846d2f2cf,2024-11-21T09:43:07.050000
CVE-2024-45640,0,0,923abe7b70ac2297df80331720303a7ee55474d7dd4031afdf0c5f6c2b1c1e0c,2025-01-07T13:15:07.690000
CVE-2024-45642,0,0,cfb188922d2de3d0a2e624109932e190c43782f5c9c1e7fb30a5b975a8a432ea,2024-11-16T00:13:06.017000
-CVE-2024-45647,0,0,5461a7ae104b7e52b6ad15c90d16594db5a67b0dea0a6aa15ae410647a1ee073,2025-01-20T15:15:07.507000
+CVE-2024-45647,0,1,3787d5f5a51c129e387d58b93d1ec6588e8fb75802690efb7ed9407cb8fb0335,2025-01-20T15:15:07.507000
CVE-2024-4565,0,0,7eafc37f7621bbcecc9df42111f1503d84607d3815c6d13bfc741bedf44b3a75,2024-11-21T09:43:07.187000
-CVE-2024-45652,0,0,a98f15ba10f48b9466efc3cc28e1ea6be4d5f5099bd07edd096dedcf90fa67a9,2025-01-19T03:15:06.647000
-CVE-2024-45653,0,0,23b213d8e708f895a3ae7904da1ec3db7ec809653880d7fcc6b0dd567508f27b,2025-01-19T03:15:07.643000
-CVE-2024-45654,0,0,e14d5f51432546412222a0594e7c9107c0a213bcd4e300ea857cb39c15b83600,2025-01-19T03:15:07.787000
+CVE-2024-45652,0,1,6254bd590ce03a9259b82c0dba15561aacbeb1df97e69b146f493975ca4a2427,2025-01-19T03:15:06.647000
+CVE-2024-45653,0,1,d5f910fd8739708cf51cbbec066e6e9e75fa42921b46a68d0a44ce8674d18967,2025-01-19T03:15:07.643000
+CVE-2024-45654,0,1,84e0b6e2caafc48baa1b35c20875028bfa1c53921b9ea64b0881773217e0e97d,2025-01-19T03:15:07.787000
CVE-2024-45656,0,0,bd9c2ffe8b9cbe4ee804430325ca28b90db5a453ccc34b145371cf00c3254208,2024-10-29T14:34:04.427000
CVE-2024-4566,0,0,67793534ad65df3a22647f8471d680f58a33cea10b3409d6ba3f0ab52674e69f,2024-11-21T09:43:07.400000
-CVE-2024-45662,0,0,2a9f7cf44074655374154bd6d7ae34aabeef47c4d3ebcb5e1ff57e4b2ae36ab3,2025-01-18T17:15:07.343000
+CVE-2024-45662,0,1,42e3213cdd9e0313fa4ca25aac2349a283b3056fe3b2b35deed0feef55505b61,2025-01-18T17:15:07.343000
CVE-2024-45663,0,0,f5982f696eb561ee89ceacd8a652ce2095dd2ab2ec4564026ad75a7cdf0b671c,2024-12-20T13:15:21.443000
CVE-2024-4567,0,0,22751845307af6a336c20a91c0c6d397e4abd955b5d1c7b822f192181225c614,2024-11-21T09:43:07.517000
CVE-2024-45670,0,0,884f280837c803b089861d2cd0800b5b952f4567c75753b35001e2a46ace7ee6,2024-11-16T00:24:57.203000
-CVE-2024-45672,0,0,9ff06df28dd8ccd62bf8e7e484df1811cfd74b1a69f49dd7422c5e4e7ea55b76,2025-01-23T18:15:30.057000
+CVE-2024-45672,0,1,1f284c4606417b08ac2cd87243460783df32e665537ee9aa04c2649281078873,2025-01-23T18:15:30.057000
CVE-2024-45676,0,0,eb22d41374a33aad487840972b05f99b6866c07ad3faeb5bebf20d811966d571,2024-12-11T03:21:10.387000
CVE-2024-45678,0,0,e2a0d8da3cf25ebb49239ae7c4c164f5edac3b90ddc52e1952c353b2d0051611,2024-09-12T20:07:09.640000
CVE-2024-45679,0,0,48441f1f5183f0d7a57b97dcb6b4ce06cc54aa383bc180413d74ccec8981a81d,2024-09-20T12:30:51.220000
CVE-2024-4568,0,0,ff209e2496a42e1ca9483240418a0ce7bdc3cb877d55c4b5fcd8142a3e8e8866,2024-11-21T09:43:07.640000
CVE-2024-45682,0,0,29a9b38c1416c69b93fcebe786e804315833f976987dba100541108ea6e9c025,2024-09-27T18:54:51.820000
-CVE-2024-45687,0,0,8daf35547dcfbf3775e64fed73936f9f83f8fb2abbb1662ef849dc80e468e82b,2025-01-21T17:15:14.073000
+CVE-2024-45687,0,1,fb5ef7b89d22677518e0461852b4ab50e70f974a50627f18150439ae409709eb,2025-01-21T17:15:14.073000
CVE-2024-45689,0,0,24ad739d86f57b241e660f9ec4f1e0ba9faa3e7a1346cc907cdf651c0a914431,2024-11-21T13:57:24.187000
CVE-2024-4569,0,0,ba592b80ed6116ecbd4d53735429f8c39d53ea8b4dcbfacd3c9ec216c31b3724,2024-11-21T09:43:07.773000
CVE-2024-45690,0,0,5723764df58775bb65cffc56ee9068e121c35610c7033bd0cf1fbf999d9fcfa1,2024-11-27T15:15:26.050000
@@ -266423,7 +266423,7 @@ CVE-2024-45806,0,0,11953f5c429bb5024448a00bcd91c358cf03fb91f7cd850731ca4327cbbbc
CVE-2024-45807,0,0,48f433d282a0de1deb41f8655f75243055cbf16d183767f967220ee671d26215,2024-09-25T17:12:38.380000
CVE-2024-45808,0,0,f2d514bedbee6592168aaa97796624bbbf27204d160c358fb082ee00ab127e7d,2024-09-25T17:18:38.823000
CVE-2024-45809,0,0,1ed47c926f455940a60da215475c00b1c898669d10c2ffc25dd1537eb98fd885,2024-09-24T20:12:24.597000
-CVE-2024-4581,0,0,b5f98ce15f5994f2b50c35ce50ef1ca944f957cf9f7a0dfff357b31cfbb497c6,2024-11-21T09:43:09.063000
+CVE-2024-4581,0,1,d64829ff3879eb84b49f2b3cfab390a2bf07a0210011abd31ae219943ab550ed,2024-11-21T09:43:09.063000
CVE-2024-45810,0,0,c349eedcf860e10c9363a6ba6fcea9627aa86b33877b6f7be1e36f4038c0782d,2024-09-24T19:48:22.993000
CVE-2024-45811,0,0,1e79f7126b54eaa8fec54f9508c1b481812afbc5e26f24245c6580ec2237a2bc,2024-09-20T12:30:51.220000
CVE-2024-45812,0,0,56a8eda09dbd313ab53b41c9890a71e59f376714797337ccb7daa71061b1b6f0,2024-09-20T12:30:51.220000
@@ -266442,7 +266442,7 @@ CVE-2024-45827,0,0,14b2e3c223bee3e57f3f499ba2a6632d8d5cb7e001c1dd0d7aff42ddb6920
CVE-2024-45828,0,0,6a8b7b9826b5b0a7021978737c67ecf4eab16ea76d1e74bf17ba5c02f900664b,2025-01-11T13:15:21.450000
CVE-2024-45829,0,0,ab7f0021bb7a93beaac116d04129f4163df742a680ddbc4de2302713f584254c,2024-11-05T19:38:57.827000
CVE-2024-4583,0,0,785a5bb3a36957836b7a383b7765b0b67cf9852b800aeb286c820ff0407ffb78,2024-11-21T09:43:09.317000
-CVE-2024-45832,0,0,d75bfc3e389f08270f7efbda4f6a9926c8035de2d7487181b2202066be5a30a1,2025-01-17T17:15:11.870000
+CVE-2024-45832,0,1,faec55fd02a3dbe2da59912d05c33604b7d85f53758e7624f1784a88208b64fd,2025-01-17T17:15:11.870000
CVE-2024-45833,0,0,ae7b140338ecffbe1ee920d82db8b77234d8b98166b6071308a3a15f45eb4089,2024-09-23T13:43:42.073000
CVE-2024-45835,0,0,702ff79a19ec21ea639e2383e91f88244f4dc786df2938ac17e866b8515461ee,2024-11-01T14:20:56.350000
CVE-2024-45836,0,0,5680ea0def6f9713e80f70cc8753dae36b28506dd79a8f561bc910ac3bc36a66,2024-10-03T00:35:53.797000
@@ -266636,7 +266636,7 @@ CVE-2024-4636,0,0,8496ac08c742f16db29c83aed5f523dca16873775dbf14d9aa4b48fa10b23c
CVE-2024-46362,0,0,fb5d79f4b45f1bbb3eb6ebc0aef2b631b253923607b2e455ece7fd1f0a5d6943,2024-09-20T12:30:51.220000
CVE-2024-46366,0,0,d617ffae88cb828c6e7151f2341d1f71470550fda14e8fcb6482b905bda24f44,2024-09-30T12:45:57.823000
CVE-2024-46367,0,0,989a85d08e8653df07e4eae1f4f794bd57485ed7719e4f75ea7a012b27c892b7,2024-09-30T12:45:57.823000
-CVE-2024-4637,0,0,40bb9477350db9a5002566bfb2d934457a7623fccddde4c382a897108b7be7bf,2024-11-21T09:43:15.697000
+CVE-2024-4637,0,1,7cb8c7c37292ad66e233a77db912566be9c3b7549d991645722790b7be81926a,2024-11-21T09:43:15.697000
CVE-2024-46372,0,0,3b10c2d5a51a37def6637bf09a31d646a1c63248f989ead6a755917ff23b6ed5,2024-09-24T15:40:12.980000
CVE-2024-46373,0,0,2ec083edbb93e3014840fd0b2f1254aae14c80c6463239fa1deeaeff204edbb2,2024-09-20T12:30:17.483000
CVE-2024-46374,0,0,49c9abdfd23a3c7b397e5069ae4701ce6b671bb400b51adb0be2528c878db0de,2024-09-20T12:30:17.483000
@@ -267201,10 +267201,10 @@ CVE-2024-4710,0,0,9c507813f9fc80a7b0290c71ebb56c5cafbe3613f57bf93e1120a9c56f5290
CVE-2024-47100,0,0,5512161596a91aa61f59e569c4aaaf770b6ca7b29dcfad1142393a788aaed6d5,2025-01-14T11:15:16.573000
CVE-2024-47102,0,0,0864a20740f0de5ffc38497db2f0d4f8389b304278d9ae91ba201d1cd5b77740,2024-12-25T15:15:06.583000
CVE-2024-47104,0,0,9f2e725614bb591f1dee85b094aedf7e5ce884d4ec064c7905e6916502af1c82,2024-12-18T11:15:05.763000
-CVE-2024-47106,0,0,d85a8e37ac40b85485c50aad7b2f7a67ee7b806a3ea7e8ecdce4814f2c48f4c1,2025-01-18T16:15:37.883000
+CVE-2024-47106,0,1,5ade2f3c5d39fefc0f00abff980ec9cc063f3a12c8a4e05c1472820e919f3997,2025-01-18T16:15:37.883000
CVE-2024-47107,0,0,cbccf574787d61b4f6ca0e02b243f9353763dfcf6f42da1d1ab7d0498a1d160e,2024-12-07T15:15:04.123000
CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000
-CVE-2024-47113,0,0,779d440772277fe5838a7220c7526dc6206bbf1e989fcfb188eb4da0fef04e91,2025-01-18T16:15:38.897000
+CVE-2024-47113,0,1,e4a4b7ababf2602f5329349bd99728f33e6592d940c12e395d7099b940e40531,2025-01-18T16:15:38.897000
CVE-2024-47115,0,0,7a7f36fd4f42315d6d6861efa2fa7bf95141b001bf20215444f270c56375d7b4,2025-01-21T16:15:46.587000
CVE-2024-47117,0,0,a26952e58650ef25d9f11a5aae4455c43930c6e2575395901d2106687495648d,2024-12-10T14:30:44.400000
CVE-2024-47119,0,0,822d29d557ac8a46a432d9833d3741afebbd1611ae551e680e9265032df20c37,2024-12-18T16:15:13.110000
@@ -267220,7 +267220,7 @@ CVE-2024-47128,0,0,65759f80a9ff2e996983784301775be8d3d67c43668184bead5522ffb06db
CVE-2024-47129,0,0,21ab298568b77c231224ddece70855941d2bceaa4599c817bac87f2708ef4742,2024-10-17T18:15:06.930000
CVE-2024-4713,0,0,b4955fe6b5819902c5b4de23942cae46515c7959c7f9cea3df2810ef17b3f66a,2024-11-21T09:43:25.970000
CVE-2024-47130,0,0,aa210527789d3142a26190221a1f00d05f6fb48f13f743e00fe050e6aed804e6,2024-10-17T18:15:07.130000
-CVE-2024-47131,0,0,21b6d051786a0b98e12abd375e0589c092cf8cf58b4e1084860a195e305a97b5,2024-11-12T13:55:21.227000
+CVE-2024-47131,0,1,65b21c226fe790c637b427d6d74cf9a95f29d54b442f028bccc4ae9d72fbc641,2024-11-12T13:55:21.227000
CVE-2024-47133,0,0,732f4b3ccc248a886bb57b758e9499b4fde95dbd65c8663f4fa49932f5353704,2024-12-18T07:15:07.703000
CVE-2024-47134,0,0,731bb1f9c493297a05be84d72e8728d365811c3cf823fc1f39f880a39ec0564a,2024-10-16T13:50:32.607000
CVE-2024-47135,0,0,0f0243de033a38c800d27683079832eaf8a01f0f9426503f7ac2abba9f3ef240,2024-10-15T18:21:04.813000
@@ -267401,7 +267401,7 @@ CVE-2024-47362,0,0,56bc4f07dcdfdb017da34c825963826df9398c632c974d75f574faa2381d2
CVE-2024-47363,0,0,c615105e8ee5adfd6a8485d6e6e139d86ffcb58bc6a37be5e338f997edaafe55,2024-10-07T17:47:48.410000
CVE-2024-47364,0,0,2fe33474edb540126db4c4281ee3227a6e9d0509c934dee31dea30c33ddc6c06,2025-01-22T18:27:35.677000
CVE-2024-47365,0,0,afb0d6a8b18ae6c2493d0789ee81de1a1a73bd252d339cdf1953803b3d5de00b,2024-10-07T17:47:48.410000
-CVE-2024-47366,0,0,4d57dd3357453352263a477fdf262b3e7ef903ab36a0e51fdd022964ed094a2f,2024-10-07T17:47:48.410000
+CVE-2024-47366,0,1,053f42113b59ef83e856091fc89745927ca7b3076a3b5c902417845d0179611a,2024-10-07T17:47:48.410000
CVE-2024-47367,0,0,bad7707269a1522b052638ed4752b9594efc2bb8cd40e160a382a90cb47d38c9,2024-10-07T17:47:48.410000
CVE-2024-47368,0,0,140e803e6950f7326f1e6b15ee6693d347657db9198984fe3e9218e824931693,2024-10-07T17:47:48.410000
CVE-2024-47369,0,0,b4ba30321ff31b6d5404fcc8dcb4022561f79093b37b4abe243703fc7d96ce2a,2024-10-07T17:47:48.410000
@@ -268279,7 +268279,7 @@ CVE-2024-48743,0,0,8a901d521bee4fb37fa6631ae86bffe209ffd6825102f3fe83b6c17d5586b
CVE-2024-48744,0,0,2075f33fe8737914bba0330897293beec62cfc78359643f6fd0ded65a78587d3,2024-10-16T18:35:07.013000
CVE-2024-48746,0,0,70b1bf92976f7b515824754b06ef5e640b752fe34bb7804f1674438f52e03c18,2024-11-06T18:17:17.287000
CVE-2024-48747,0,0,f03e580691c37a981f499cf0b560468ec0253c9c99edec66cb15f26778f95804,2024-11-26T19:15:26.443000
-CVE-2024-4875,0,0,394ece81c68b71b805a6c0937e31042655f5a949977d1cd6a3dfa5931193132c,2024-11-21T09:43:46.460000
+CVE-2024-4875,0,1,585969eac15f8bd11d5bcd2a60f588ebe625d371a1c47289a8ad760c0c537652,2024-11-21T09:43:46.460000
CVE-2024-48758,0,0,6d6595f4f9c5157363905a29de4e8aa05d9c595a5b50795bcb679a26374e8aff,2024-10-18T12:53:04.627000
CVE-2024-4876,0,0,65d8065cbe56070f462c8629050b655fbc478bb065b4ab8ba51acd1e3033dac7,2025-01-24T13:44:58.993000
CVE-2024-48760,0,0,2c515de9d3808545a7fdee77c025d0a4f76a44cfac1a6b1790d2a3a6eabc5e21,2025-01-23T17:15:13.713000
@@ -268361,11 +268361,11 @@ CVE-2024-48872,0,0,9ea5d88bb50af02969b7b4651959f337e12bb8e36a3a9117d9c1214c7bd8e
CVE-2024-48873,0,0,b0b2ee673e2708abf7b330cdf04d419d8f7f0fd80b7deadecd181738bfb97c16,2025-01-11T13:15:22.750000
CVE-2024-48874,0,0,d4dab0701d320c08fdb5c4d13166c7fa76f47b4f8118adcdce9e1ede30e7393e,2024-12-10T19:44:16.093000
CVE-2024-48875,0,0,7f1f8981cd6270df07a780e840c26cad1b0b91482d166c476525c21afb836bac,2025-01-11T13:15:22.933000
-CVE-2024-48876,0,0,b3dc83bcc3b30f54be4c214a67c78cf07745e4e50a2efa873d5012bad81ae667,2025-01-11T13:15:23.263000
+CVE-2024-48876,0,1,22d2844af665c57f4c01ec7fd9c25097e59e54558a31a5014c9af9ca1de57285,2025-01-11T13:15:23.263000
CVE-2024-48878,0,0,61df8c716ea1a9423d8f98d007fe741d86381fb579c3442ef6d827deee3b213c,2024-11-05T19:44:58.650000
CVE-2024-4888,0,0,133d57bae18b01966145fd4e4ce13e18e7959193dbb6b4323cb9d35593035efb,2024-11-21T09:43:47.830000
CVE-2024-48881,0,0,9f5d514ac47729e731291b03eff478501f44a3dd45142fd28510db91af3ffc1b,2025-01-11T13:15:23.437000
-CVE-2024-48883,0,0,3da0b66ba525dc6217acb6b296270b21a74566abc1ad9b7b8cce3e028e258705,2025-01-13T20:15:28.770000
+CVE-2024-48883,0,1,adb8229ac61a0cf6e127a4ecda67bdf63ebce96100cad9493a388f5cd0c90b63,2025-01-13T20:15:28.770000
CVE-2024-48884,0,0,3359ff773d09dec3cb555730b4a6f1a64741d3b148a8a871f573eed309fcf941,2025-01-16T17:15:12.310000
CVE-2024-48885,0,0,da7f0208f0c95fd2f24f647844a7354b8155e6f4c2c3df76ced6f9f588a64496,2025-01-16T09:15:06.737000
CVE-2024-48886,0,0,f1a654d0b24acae0f655db620517eac5f88a03e1413c63f93bf4f53b28192e5a,2025-01-14T14:15:33.027000
@@ -268385,7 +268385,7 @@ CVE-2024-48902,0,0,fac907ba592985cedbc6c7d62d6399de126c11c59cc432f7434b088369952
CVE-2024-48903,0,0,9c89803e6726410301aaff247c42234fa7c4ad2b19e692a9182ae81ee0c051d9,2024-10-23T15:12:34.673000
CVE-2024-48904,0,0,35d8cc445681b5e4ff1fcbbfd5a27253a724d76e1a2a2d6acebb5b7ec5903547,2024-10-23T15:12:34.673000
CVE-2024-48909,0,0,5af217867017b45645b1cd88e9368407196c63b062f42cfaf011c832caa8e595,2024-10-17T17:56:11.130000
-CVE-2024-4891,0,0,7cb3db743f108d5675454fcadd708016c769ea8cf5a8b2853b03b88bb20963e7,2024-11-21T09:43:48.267000
+CVE-2024-4891,0,1,51e6040bc4f90200a2c089840fe47a75168e50b1b672efc53fbd9785b6e7594e,2024-11-21T09:43:48.267000
CVE-2024-48910,0,0,7f12c97e649c7955bf5eb5f3507eac6092487e8d427486ba58a1995cf7bdfe0b,2024-11-01T12:57:03.417000
CVE-2024-48911,0,0,55b7a5a266268268213060e2c0d21ae7b031d3c5984450b459efb48b395401c8,2024-10-17T21:13:37.147000
CVE-2024-48912,0,0,c126261c0e22c041d80daa93d1a490f776182219e98126fc7e02d842adc655a4,2025-01-10T19:37:41.063000
@@ -268704,10 +268704,10 @@ CVE-2024-49297,0,0,f192074d26b33e0d5f10cc1f854aa454ad790ff37de6ee072448709786ed0
CVE-2024-49298,0,0,b839de5acc344460e734e5ecbb691ffdc38dbe70e6763c2648b1b94ac5707f9f,2024-10-18T12:52:33.507000
CVE-2024-49299,0,0,b62a2e670cd623ee2be7894403bf7a5e65eb1aca5f3deeab14b46ed344a3dc12,2024-10-18T12:52:33.507000
CVE-2024-4930,0,0,1a6aeaf5c9b5763262adff790f3991767d0002062551d9cd7b3c73e363fe1d8a,2024-12-09T22:47:12.560000
-CVE-2024-49300,0,0,a48746efe1460a16dd04d544303ba01ce6dd68be509a899784733697c8d36b1f,2025-01-21T14:15:07.817000
+CVE-2024-49300,0,1,a5df6dac28d933868e7cb5573cd4d51b8c38dacb96fb12beba90b6b11da0e2e9,2025-01-21T14:15:07.817000
CVE-2024-49301,0,0,7c40b91efa037d4772cfb4564eb22b1dd347c2c6c5e2f8d1b24166cac85ef59f,2024-10-18T12:52:33.507000
CVE-2024-49302,0,0,4aa3e784c200de535b6f996dac0eb362198e7da053ad5845b20beae954b5fbfc,2024-10-18T12:52:33.507000
-CVE-2024-49303,0,0,2009618b4c7a8432bb90c482c122e321949ad99eea22b0abc2ebb776ade0339d,2025-01-21T14:15:07.987000
+CVE-2024-49303,0,1,7fc4f5e316d4cf83ed8fb0010fe3c11b60e00cb4370d30e68a75421f015426b4,2025-01-21T14:15:07.987000
CVE-2024-49304,0,0,ec4a0499f8abde2f3743acd125114c123a46d3b965ed8f607a422b669fc64b89,2024-10-18T12:52:33.507000
CVE-2024-49305,0,0,d3b27a50296ab5d828fe241dbded8443a48b306a8315184ebad8aab390758be5,2024-10-18T12:52:33.507000
CVE-2024-49306,0,0,e695dc04449cc80376f496bad7b7ec8e4492913b095e35bdd18e5623cb1637f7,2024-10-22T18:35:46.107000
@@ -268740,16 +268740,16 @@ CVE-2024-4933,0,0,f226168d4088139258e85e9ff5b01bc232ea955a93657121868202d379d9b5
CVE-2024-49330,0,0,e20da0c156c001d33624f9462f9fd088512ffe8e54dbe1942fd80d553e5a1477,2024-10-24T16:01:09.733000
CVE-2024-49331,0,0,fc33cda51d0ae00f7fe88fbdfa0860d165096722e67220af6538ac02d3a62215,2024-10-24T15:54:07.190000
CVE-2024-49332,0,0,163fc61e1aa5949d0dc085fe875d10ef86a8206eb7889644482dca315618c25c,2024-10-24T15:49:34.827000
-CVE-2024-49333,0,0,be3dd6e3b0b8c9c8fb88934096860692439354227ff53535d497ba33277a7eab,2025-01-21T14:15:08.143000
+CVE-2024-49333,0,1,e40cf35196ca18dee45163c0748fc145e27ae20ad0111de97528d70fea8810b1,2025-01-21T14:15:08.143000
CVE-2024-49334,0,0,c834d2b3cc4ff6e9dea6658a6f1e0bf3ee35911e84a97a8c123fb548c9607113,2024-10-23T16:08:01.277000
CVE-2024-49335,0,0,3160ec720c602cc52406d525d62eec9c1419d94d6b3a852f9810bce5470fe4e2,2024-10-24T14:50:16.557000
CVE-2024-49336,0,0,74b5d6ca5a527605069a19da7232fb13c834e91072ba01d322d091e1df5fa9ca,2025-01-06T14:29:06.027000
-CVE-2024-49338,0,0,6689f7b59dbbb5c85502ab79cd251cabbaf606bf3586a4f6451d6e209bf90fee,2025-01-18T15:15:07.433000
+CVE-2024-49338,0,1,089f0961a6c5fcf1312af989afac1f42747fad3dccba1132721dce2e32b4ec33,2025-01-18T15:15:07.433000
CVE-2024-4934,0,0,c48302b0b85313af5a6e75f2285d80b1e442db3b1b019c52648c5cb5dff0b2d3,2024-11-21T09:43:54.343000
CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3c12,2024-11-08T15:06:21.730000
CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000
CVE-2024-49353,0,0,9a47fbcd7bb71cb815723fc7b290a5c5cc22a3729566f5b695bfbad427fe41cb,2024-11-26T04:15:05.690000
-CVE-2024-49354,0,0,1327dc37e8608952ab3d84e6eef48f2732389a767b53d41335ea99222bad55d2,2025-01-18T16:15:39.040000
+CVE-2024-49354,0,1,9932955dc8f1f42bc5bd9552d18c452e3eba49c8f646b04262c7f057d2eb1053,2025-01-18T16:15:39.040000
CVE-2024-49357,0,0,60dd20801e0d688d79febf6ddf905b7a0f6bb6d52339368c8c03007d3568ef2f,2024-11-06T15:28:38.160000
CVE-2024-49358,0,0,9b3087a9abf7bda8601a66a382dce9cb35757f55c0440ca46162af784c9d23d1,2024-11-06T15:27:26.637000
CVE-2024-49359,0,0,f7b8bcd2f4e26f53c20b7ffd38bd81c3325d7981bb7902337d9402d860e0b277,2024-11-06T15:27:02.347000
@@ -268957,7 +268957,7 @@ CVE-2024-49651,0,0,eff1cce374eeb20a6db75a05fbc6ce94258af07964e7154f22db427d87620
CVE-2024-49652,0,0,2fef3a58033a3cc5731e0190548832508d5ac10a55c45656177683798b3396ab,2024-10-25T12:56:36.827000
CVE-2024-49653,0,0,7410bc7a50d9584ad117bbedc7e0add7bf77171c0d2d393528fcde9b43a0ce28,2024-10-25T12:56:36.827000
CVE-2024-49654,0,0,e10bce2a446f40b8780c544d0873c3a764c7b21408041109e6d0a76f7ecd074e,2024-11-01T20:24:14.310000
-CVE-2024-49655,0,0,3892bc02b0fc624bbf56da664eeb6a62dc5dc4bcc935f85d55a2eb285c46d769,2025-01-21T14:15:08.310000
+CVE-2024-49655,0,1,80f6150137289f2a0091c9da107fab8de67e69f7d6eb68add57786583c8ded6b,2025-01-21T14:15:08.310000
CVE-2024-49656,0,0,c3ad0142553324aa060ec1c435fd2bf00f79ff51540bd27aaa9fd5faf1d0762f,2024-11-01T20:24:05.450000
CVE-2024-49657,0,0,2f136a33a94d79762e605c9e4d803e6340788b2ff013a60ba5e0d2ed034dd223,2024-10-25T12:56:36.827000
CVE-2024-49658,0,0,e7f1da0786b76e31a857abf556330959f0a32ac227a685f313d374a5c271e9d6,2024-10-25T12:56:36.827000
@@ -268969,7 +268969,7 @@ CVE-2024-49662,0,0,dde9ca392192ae6d8233bf6e40e8e6f0846328594962244d4767eadb16203
CVE-2024-49663,0,0,3a8e439baee3adb77712fe2a8a40d1a3f2d9db21deb11c5af7169fb7213f0a2e,2024-11-01T18:55:51.143000
CVE-2024-49664,0,0,6f119370bd4e250be2090b50e650fcc745daa9be0199ef2ec2c8da7fae217515,2025-01-03T17:42:09.330000
CVE-2024-49665,0,0,481fa6d35194d6fe2f569ea080f77f62c2730b07a289c7d51c66af9df5e96295,2024-11-01T18:55:01.773000
-CVE-2024-49666,0,0,8ffa9051a360cb898ce0f5a17317614eb3097b43886b4d8101ebb90b1c2909a1,2025-01-21T14:15:08.450000
+CVE-2024-49666,0,1,508cd4bc48354fb6895894c2d315f4d3667789d5b3ad1a65de365b70b39e5bc3,2025-01-21T14:15:08.450000
CVE-2024-49667,0,0,9b3b9d25907047dc12cf012cf030c8db73d4d456b33bdaa74b91d8a7ee70a4ed,2024-11-01T18:48:48.797000
CVE-2024-49668,0,0,94eddff54af31179a0c5ecabdbdd71d8d6dcea45c4f840188de246a365bfee2e,2024-10-25T12:56:36.827000
CVE-2024-49669,0,0,f5af1df54e8b7d7f9667dcdd7a6962c4e16f9b133913097ee0daebd53c256fc5,2024-10-25T12:56:36.827000
@@ -268993,7 +268993,7 @@ CVE-2024-49684,0,0,36531d7cf4c7a4e38f6860bda9ec7c0d48195d2fcc27ad0578736763df8cc
CVE-2024-49685,0,0,caea3f86fb77aaa3e3026aa8a74adcd66d73ae057e76042ddf5cfe89f39cb8d6,2024-11-01T12:57:03.417000
CVE-2024-49686,0,0,1648efd420dd9feaa12bda71d4c28e07c0afcf094efff0cfc461507ecbd2e840,2024-12-31T14:15:23.137000
CVE-2024-49687,0,0,f3e38245690627a2452025d02cff1519f25509e656e89abda20c64ecd5ee7193,2024-12-31T14:15:23.430000
-CVE-2024-49688,0,0,8b3b2bcbf621b99845a78871a9b27811618b398d2278fd3e3c7543ea4a737bc5,2025-01-21T14:15:08.613000
+CVE-2024-49688,0,1,dfcb16ecef5405c6ce43406bc4c5c7607f81fcec251e9634ca6093eb7fcdba93,2025-01-21T14:15:08.613000
CVE-2024-49689,0,0,5b95dcb1b308ac9918618c653b8d612d05dba2416c0a5caade9d4ff079c39dcd,2024-11-19T21:57:32.967000
CVE-2024-4969,0,0,590a42a007878875f8821a8461ae21649b587614d8fa87d6d7abc856a4793907,2024-11-21T09:43:58.430000
CVE-2024-49690,0,0,e7d1fbeec3ae6b3b41207427caf7ef895bb3e2f53a7a24c5af615a4c19bee7df,2024-10-25T12:56:36.827000
@@ -269005,31 +269005,31 @@ CVE-2024-49695,0,0,83cd58e8b597dad6e6c36cfc6ae43f6a32a1a4af5eeaeb26b9996a7c57692
CVE-2024-49696,0,0,527dc628015bfd53942eb90e4ad813b4a45b3c729bd97fce7834df7a63766ec9,2024-11-08T15:21:12.533000
CVE-2024-49697,0,0,530eb2f42eba87aaffb73d54c4b9e27dfb5194483cfcc3edf311ece4f08a0142,2024-11-19T21:57:32.967000
CVE-2024-49698,0,0,0da674ff14e9a1aa3e4bc23d228b70f80e183926d4686276e19237b19658e09f,2024-12-31T14:15:23.697000
-CVE-2024-49699,0,0,8fa4156418d67e0d04ddaf1597a93b42245cc1998c7c936f01cefd397c1b0400,2025-01-21T14:15:08.780000
+CVE-2024-49699,0,1,4ee8c413bed1ffd4b90762f39700b8d457afb872cbe86f74864072dd78b97b85,2025-01-21T14:15:08.780000
CVE-2024-4970,0,0,ceae782189e36ea72b2794d871ba0e98c5d8d6d33670b120902bfb4e771c4acb,2024-11-21T09:43:58.627000
-CVE-2024-49700,0,0,f278f5eb1bf15c3a28d9c50f514b294895f059cbcd7c22d76b6df8d21da28abc,2025-01-21T14:15:08.937000
+CVE-2024-49700,0,1,606a86305bfba31869c39264028e7e019fc9f7bae42891cf5aedbc545c1d9faf,2025-01-21T14:15:08.937000
CVE-2024-49701,0,0,faa8cd67d7f87e8b700116e3ea01c26a0bace35a674e83df64e802c479757838,2024-10-25T12:56:36.827000
CVE-2024-49702,0,0,95504b65313eac7b0c032b66b56870b8b510aa5556c8e61dadfd6a9c41944713,2024-11-08T14:32:56.010000
CVE-2024-49703,0,0,773f468dd20b89d6b077ffb05058547737a4c510a41e2a52930200811683b9b8,2024-10-25T12:56:07.750000
CVE-2024-49704,0,0,011946741b0918ef57c6cb1900342b7378aadc477a57c2845fd73363988334a5,2024-12-10T14:30:44.573000
CVE-2024-4971,0,0,17f65e33f654be41e85b2c190603b91b92e7c1a1f8fa7f8e99556cdd76507595,2025-01-08T19:28:26.847000
CVE-2024-4972,0,0,6d57573ddd08bf2299e1f6597809329f00babdc0f3ad1d5869880ad1a42cee17,2024-11-21T09:43:58.863000
-CVE-2024-49724,0,0,4a13f7c7aa30fccf0970b1884e58e7e7a31f01f7e82028a9baa5856257f1b52c,2025-01-22T18:15:19.813000
+CVE-2024-49724,0,1,637db4c25d376d3a19176854d6160eb38bf1f0ef1a09f7ddf8eb8fc3d6832b42,2025-01-22T18:15:19.813000
CVE-2024-4973,0,0,19ccbb7e67bd4c75d6b883a0abe41227afb09f5e151258438b28388488924a3a,2024-11-21T09:43:59.010000
-CVE-2024-49732,0,0,f7a25c052f1079e165e7dce5098e1fa20cea987f9906967c40992e341d0a938f,2025-01-22T18:15:19.960000
-CVE-2024-49733,0,0,b1cd4b8ea380c4ff0bba0d45ce5ab5473affed7ac4a0d8328367b08eb84a5bc5,2025-01-22T18:15:20.100000
-CVE-2024-49734,0,0,fa0a2758d17f29ea8951376a0dce32025e12e4916cb3c34b5a586823e303df27,2025-01-22T17:15:12.253000
-CVE-2024-49735,0,0,6e82e6dd127ffa040fc1a14579443a53bb3ca3cda230b1dd32f241c6aea7cef1,2025-01-22T16:15:29.573000
-CVE-2024-49736,0,0,abb53a60f7b8c4b30ab54ebc044e67a54dc2d8658382f295c6a64d25e7172ecd,2025-01-22T15:15:13.007000
-CVE-2024-49737,0,0,5b8a41296add9b60d2bd23d524691a6a9402bd8f7a3a23c7a85b4ed4febbc7ea,2025-01-22T15:15:13.150000
-CVE-2024-49738,0,0,cd4b279ab947304d716fd3789992ba3820266545e70a14de0202f788aaf229e5,2025-01-22T15:15:13.280000
+CVE-2024-49732,0,1,eaa81fd8137bac828d101bdd530f7768760d875c02577de9f14f1a9fe4855dcd,2025-01-22T18:15:19.960000
+CVE-2024-49733,0,1,f12eeb4f15bc9bf4d1aaa92a71a5f99b7e6aa378d95604f3e55971ea1ab22ea4,2025-01-22T18:15:20.100000
+CVE-2024-49734,0,1,36a9153682a6cb411a63baccea4cf9acdd7c90027f9196887b4109cf5a0d1c34,2025-01-22T17:15:12.253000
+CVE-2024-49735,0,1,d4d6038ee7adfbb8925ca5b3f33aab509d0fa4098005ce7e48d03b419e4e385c,2025-01-22T16:15:29.573000
+CVE-2024-49736,0,1,27824dd9d2ea2e1d6b6c0698e076e4921aa534d7478a119fbd62cd04551fc526,2025-01-22T15:15:13.007000
+CVE-2024-49737,0,1,471846391ec1276ebecf5b9a1f7a6bcd968da433a39a8b7e36647c6217d6187d,2025-01-22T15:15:13.150000
+CVE-2024-49738,0,1,d313b71a89808187a6f044b9b2d8417504970cb0a631e642bef9da559eab0a9a,2025-01-22T15:15:13.280000
CVE-2024-4974,0,0,d16672721f53b136de1b80de87435b925886996f97e506cdb2d6dc9e6ef8a3f1,2024-11-21T09:43:59.157000
-CVE-2024-49742,0,0,7eef665a1fecedb640da0453d3423d2565b0b2a9863841471a0905437587a333,2025-01-22T15:15:13.407000
-CVE-2024-49744,0,0,893c3e4158dfef22e11bfb26c5e77a6967b9bc4fa8c4ba4f91957edccb19b8ed,2025-01-22T15:15:13.557000
-CVE-2024-49745,0,0,ec3fc231238b743039fbaaf5776ba076c7962f598c5d5696f0fb57938019d8eb,2025-01-22T15:15:13.707000
-CVE-2024-49747,0,0,2d8b794bd3749166ed339f9f429c39b24a48fe7fd48c61f20f9e5b51e0b3a34e,2025-01-22T15:15:13.840000
-CVE-2024-49748,0,0,38b0ed020d011a6e22437dc3312798cb1d17299f8e1aaee32090cd2c9c8a600c,2025-01-22T15:15:13.980000
-CVE-2024-49749,0,0,12bb211f652372e794b8cfd82d8b0d77d0ac3ffddc07278e6873cb738eef5427,2025-01-22T15:15:14.110000
+CVE-2024-49742,0,1,c9b60d6f47a74902a5b5e2c8e13ba9437d886782a73702bb57dd0cecf73d6eb8,2025-01-22T15:15:13.407000
+CVE-2024-49744,0,1,d9149b626b0551bdda033e6c3e5fd7e77a236d3e100e0971825e6b3f10894dc0,2025-01-22T15:15:13.557000
+CVE-2024-49745,0,1,3f919f7aa199c54c2341d3074c8c5b46e0ba6fcf2550fbd12aba17e82162ffb2,2025-01-22T15:15:13.707000
+CVE-2024-49747,0,1,acb3452eca834436ea1a62003adaf88e40e233842d86f28389761b776989bc13,2025-01-22T15:15:13.840000
+CVE-2024-49748,0,1,c403f929b3a3b1bc4a6890a72c6e134c8d820307a8bde3466befbd92b6ee20a6,2025-01-22T15:15:13.980000
+CVE-2024-49749,0,1,84864c9edb5d596202ddd37a4339885684fd8bd32ff322d7abfc57ec8adc3f5e,2025-01-22T15:15:14.110000
CVE-2024-4975,0,0,d158c3c26e7b9ed3b1558cbe1dfa904308e63625da2b58fbfd707b0851aa6e0c,2024-11-21T09:43:59.293000
CVE-2024-49750,0,0,b8c0592657dc23f5dade6581318fd4431bb1aa3486d0f4172a6b42fac1aa50c3,2024-11-06T14:58:19.993000
CVE-2024-49751,0,0,b6ddfe86ed223562a30da85143aed986d928de448e01372a87230a49d1f635ac,2024-10-25T12:56:36.827000
@@ -269073,7 +269073,7 @@ CVE-2024-49817,0,0,faf269773338cb40692b44da53cb55c3f9c6f56cc98bbe6ac46416bd80e96
CVE-2024-49818,0,0,148b4e77a026b651bd8bac5c6677434a12ec93c5c55e11ec99c033a2167f5317,2025-01-07T17:20:08.497000
CVE-2024-49819,0,0,18989ee02215782dbaa36dd11585d529ff7cb27112e595064942a9ff9397ee70,2025-01-10T17:52:26.793000
CVE-2024-49820,0,0,fe904aab3b1423196226c288487d3e9f35952361c8f61f2d528fcf7833452731,2025-01-10T17:42:53.707000
-CVE-2024-49824,0,0,c7a01bbfff7b460030cf368b6be98fb9d78e5ac0581c186863d6110e26263cb2,2025-01-18T16:15:39.183000
+CVE-2024-49824,0,1,4072c1a943cc33d63481a74407022b24878ec14cb5f9e9fc6f5cb6ba7f3e8966,2025-01-18T16:15:39.183000
CVE-2024-4983,0,0,87246ad10dd6e18c3cf6b93466a56ea2aad9e91adc9ba860f6bb4af64f316016,2024-11-21T09:44:00.070000
CVE-2024-4984,0,0,40ebe34593a184b2b9329b2374e9578e3a0bebaa278e1231c45c34e446e4dc36,2024-11-21T09:44:00.193000
CVE-2024-49849,0,0,1a31752650e852a5b0633815bea11e2d50d7437494649b720c371e6c4b6f27d1,2024-12-10T14:30:44.780000
@@ -269572,7 +269572,7 @@ CVE-2024-50304,0,0,ab4ac6c83c5fcd0daa3f28b1fef9d12686959148cc70f8acad5f569d84c52
CVE-2024-50305,0,0,50fd3aee61add01e589f37a9c6d29b7fd91b0375b90c41822a3e9396b3202d7a,2024-11-15T13:58:08.913000
CVE-2024-50306,0,0,36f7f15ac3ae08b343967b7d5c928ca662bb204683930d546d92959a7101fb2c,2024-11-15T13:58:08.913000
CVE-2024-50307,0,0,effd6ec5b86bf22e86b034cf0d56aa80ef1054d58eddf4f4569fd5216a21181b,2024-10-28T13:58:09.230000
-CVE-2024-5031,0,0,c308606af56c2c63972fb5c4124ab9d975213c17c216c9acc47e4e56bb8f8d42,2024-11-21T09:46:48.853000
+CVE-2024-5031,0,1,85c2d27a50beb5d77ca4d835b8018ece4707a3bb8e9611fc3c827a96a420e7d7,2024-11-21T09:46:48.853000
CVE-2024-50310,0,0,0aa8bf92cb0c2ce72d2591b8a623d6ab248b2abe4cf7e33609877fe3cb7813d1,2024-11-13T23:15:38.657000
CVE-2024-50311,0,0,b0292ba610dd96aa55991ae2b3d8d9a3245ae7b245c406d2ccd4b978c4c63f18,2024-12-04T08:15:06.993000
CVE-2024-50312,0,0,2be41509e07c89050ede37502a909bec30a9be1d7ef2b7b17d3eaae24f61baa1,2025-01-15T02:15:26.067000
@@ -269898,8 +269898,8 @@ CVE-2024-50658,0,0,dc74515f499285ca9589c261009f1434e39f4df3c1feba74e29bae75532d2
CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85a17,2025-01-08T16:15:34.597000
CVE-2024-5066,0,0,0791653545be3944782f3bdc7c1ab3604d2c7f0fab82f79e00981952033549de,2024-11-21T09:46:53.670000
CVE-2024-50660,0,0,f71f8e7c2fcb36b53cf871d625509d1de985a324b433af36346565606f116252,2025-01-08T16:15:34.817000
-CVE-2024-50664,0,0,e43289bf582e04598f078813b4688521bbde0cb43bce7dc834610ac5f585295f,2025-01-23T22:15:13.667000
-CVE-2024-50665,0,0,2a3eca9baa064a75da766184f616d4926a033fab05a89e4495f18bafd5adc76a,2025-01-23T22:15:13.790000
+CVE-2024-50664,0,1,1fdbd6c57bb31afbb483101d6ed8dc43655bb3434beb0c6c63777e5dea4eb589,2025-01-23T22:15:13.667000
+CVE-2024-50665,0,1,9bff4b7cd271941bca588d7fef13aaa9a06c4a4cba1b66a32d4c74182b27ff2e,2025-01-23T22:15:13.790000
CVE-2024-50667,0,0,2acba17bb6b4eea051169d8d69b68e53449d255d2507f74a89d880a87e24dc78,2024-11-12T17:35:12.270000
CVE-2024-5067,0,0,1b5c70fd6aa8a713385c4f1e29f8c71eeaa98648b5736e6e39376f75e3abb922,2024-11-21T09:46:53.810000
CVE-2024-50671,0,0,99782c17088a8d91d172d01f5a082085329526fd6f7189288ae0f91a8aaa1a9a,2024-12-04T17:15:14.860000
@@ -270001,13 +270001,13 @@ CVE-2024-50947,0,0,b5c008650b1de4762f100f17a965e455e14b58a340b5da1077acb62ce0721
CVE-2024-50948,0,0,a83a95d033c1f852658f7838a2af99f42aaba2f1b7026fbced6a0131c0382cea,2024-12-04T22:15:22.627000
CVE-2024-5095,0,0,435f4b1943c8e810fb8465989f6b408e8982e554cc5e9afb3bd58dc0f211a716,2024-11-21T09:46:57.340000
CVE-2024-50953,0,0,de9fdda6f9d3d0e4a86470672eeaac6c0ad7e07d2fc55c7edaa6aa82b7e02e65,2025-01-16T16:15:31.227000
-CVE-2024-50954,0,0,18bee49920c53fb8283b1524ffbd022141797de9d8bf6bf69cc613e4bb16be47,2025-01-17T18:15:26.310000
+CVE-2024-50954,0,1,1801580f1c2a51bedd5ecdc53707535bba55853d0c5a5d91c61cb9a9fc5a08ea,2025-01-17T18:15:26.310000
CVE-2024-50955,0,0,b7968787a5cfb7ac17e9f82a1b15116d586dfbbc8f589b423fc4833d2d57ec69,2024-11-21T22:15:09.370000
CVE-2024-50956,0,0,cd8ccb18453c11262209c6e4973c32ca207270a933eedc52f0d4a58126b3fbdd,2024-11-25T20:15:09.383000
CVE-2024-5096,0,0,daa79798869c51db70b1632345a0375a73fb203efe69c41a72ad3f88eb45ffa1,2024-11-21T09:46:57.483000
CVE-2024-50965,0,0,bbc6a73cd1df7f436fec355cc047fda3682a22f2410fb27edce07ce2659c6e83,2024-11-22T18:15:17.690000
CVE-2024-50966,0,0,8759d183e73952bff599171ed5ad82ca5c1dd2759a5c3c752a1139d7e8657cee,2024-11-08T19:01:03.880000
-CVE-2024-50967,0,0,a9552707aa02fba956742b8f41ce9f8913f8383bac6966c3580525fb6720779b,2025-01-17T15:15:12.313000
+CVE-2024-50967,0,1,4c07c908a69428d1bb0640cc5c7c220f6b0b98c0e5c25c35cce4767486279216,2025-01-17T15:15:12.313000
CVE-2024-50968,0,0,78b03157ec5aa0254f7c1725ce9821a722c029c0393b3cb5157be12ac87dda1f,2024-11-20T17:35:28.470000
CVE-2024-50969,0,0,942a1110d4bba45b7082f409f1f8ba045dde6ceb8185c473e2c03a45d00fb696,2024-11-21T09:45:02.800000
CVE-2024-5097,0,0,38195c0534e73d2ad413d1039a29854ec06ed3467b0a0463cfee2c9d3a6d6ccf,2024-11-21T09:46:57.623000
@@ -270200,7 +270200,7 @@ CVE-2024-51407,0,0,93182ccc1b00077d8adc2e38926051ab4a291bb0f8537bd782b970d50b4a6
CVE-2024-51408,0,0,7abace5757c3676b38c24efc3b646081438e7b877d38f1cc5dedc735e58c63f0,2024-11-06T22:06:43.100000
CVE-2024-51409,0,0,084b944bc571cbe682a95858718ef89eef5aff4f21cc9a356c9712b68f4a5fa8,2024-11-08T19:01:25.633000
CVE-2024-5141,0,0,ef1fc3a8abb2248dc1075aaa92c468f9b71ed2a6f95f513df5e167bd1a7726ac,2024-11-21T09:47:03.473000
-CVE-2024-51417,0,0,ba16c46cf3ac421099a238cfe2b7dbdc5c2f962a4dcd2706defc2a7b53de097f,2025-01-21T19:15:10.950000
+CVE-2024-51417,0,1,cc4d7445f89d764b826ddb7a9e9a270b1e6add879ef01a32345efb9a2472dde9,2025-01-21T19:15:10.950000
CVE-2024-51419,0,0,98a28979982a6ebbf942e483f64a66dcbb5943a8a4d7c3ddbfd245760ff332d6,2024-11-01T12:57:03.417000
CVE-2024-5142,0,0,f22ae7f46fb9912f1b5aa95d591e960fe9755fe6ab06f8b9867977c897d9332e,2024-11-21T09:47:03.607000
CVE-2024-51424,0,0,1f71d6224f9befbfc3f88ae1ebc8a838b12024ea8e79eff1bdf093cb107029be,2024-11-04T06:15:03.767000
@@ -270215,10 +270215,10 @@ CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a41
CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000
CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000
CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000
-CVE-2024-51448,0,0,b2ae8cc65c8989503d0b014630e6c65571d6434c6efef511344d8e3c826913fc,2025-01-18T15:15:08.183000
+CVE-2024-51448,0,1,c4c37037bf93a1f94e04f7270f02afe30201acf9ed636bd7a8ba3baefef67f6e,2025-01-18T15:15:08.183000
CVE-2024-5145,0,0,1ce6a725d120216d833ed23f25099d9f4810ecb9d4c63ffcf11012cbf68534d1,2024-11-21T09:47:03.920000
CVE-2024-51456,0,0,66b05d860daa73e2ca5150a1c93bd2ff924126d07f9447d85a1bb5c4e9cf4c2f,2025-01-12T14:15:06.550000
-CVE-2024-51457,0,0,c0d17c3f3eb3b9b1b24d65c918aa9e3f3893ec04e5fc224327544bfdc7f7238b,2025-01-22T17:15:12.390000
+CVE-2024-51457,0,1,faa30c09b54c9ba744cfbcd74e863bb8604845d2c9c98525b6f848f004ceede4,2025-01-22T17:15:12.390000
CVE-2024-51460,0,0,df7bada56a61ae8e12a2e4d5be2899c3081302373c6923b3ae2a7f5e2e034bd4,2025-01-14T19:40:36.670000
CVE-2024-51462,0,0,e409bb58b33b455caed173bb21388906f853ca63445a80f0344bbaf4e996dab1,2025-01-17T03:15:07.527000
CVE-2024-51463,0,0,c0364c05afe1e0b2d0890e7f96c1b512b7afe4d3c2862d4a930e0585099ce1e6,2024-12-21T14:15:21.453000
@@ -270487,12 +270487,12 @@ CVE-2024-51723,0,0,405dcadcdbf00249437ac8a26372209fb3d01c194653eab79c47481a1ec06
CVE-2024-51727,0,0,8858c32e9c05ed142d6035368629a58d5f5511d07aca54fdd69ef146c2c5ebd8,2024-12-10T19:51:08.360000
CVE-2024-51728,0,0,3bbad1d60c33e7237d8b468e87256ba82f10b9e78f6e5515e077c2c0433acca1,2025-01-13T10:15:08.360000
CVE-2024-51729,0,0,0f55e9102ab1f809882a11b078feb4a5eddc3c61bea203a3afaf0721d78465a3,2025-01-11T13:15:24.650000
-CVE-2024-5173,0,0,090e48f75343bb69589a840e25ae60a8ac00187572b68cf38125a567b358b84e,2024-11-21T09:47:07.830000
+CVE-2024-5173,0,1,503d05821818db181c2ae43ba4a1f75c47fab7b36f256545e7111cc4e5fe556f,2024-11-21T09:47:07.830000
CVE-2024-51734,0,0,14929ea2cfd8244892589bf2c0ce5543b7359978b4b9a4825d85680dcc28a977,2025-01-22T20:15:30.610000
CVE-2024-51735,0,0,48473e5db4cd5ecc77914f0341bc3fe19cd3b449987f541b0b758a8a1a3f060f,2024-11-06T18:17:17.287000
CVE-2024-51736,0,0,29e0c9e964880fe165f986cd62daad2610accc1f9fe0e31c385a89c289e90f1f,2024-11-08T19:01:25.633000
CVE-2024-51737,0,0,a16cdd75ed8512dd9f47e45db68b3bcc88cb4779dc9f9cf6c8a39bd2ca429f58,2025-01-08T16:15:35.170000
-CVE-2024-51738,0,0,4ff787c4582a38b8f0241b1adee729a8a08800dfc067133ae5360c909a9119e7,2025-01-20T16:15:27.667000
+CVE-2024-51738,0,1,1634b095292e3bcfa8d2e2c96737e684f54ac06e515564eba40c0925db89bf66,2025-01-20T16:15:27.667000
CVE-2024-51739,0,0,4a842171b608b06417875a07ea66bc940b2544517c02b0c89638130ff781c875,2024-11-08T15:56:18.753000
CVE-2024-51740,0,0,aa733ae0827e15b33ac1bc93d1e5306d2cfe3763dcbc15868bfbaab35851c4a6,2024-11-08T21:09:45.387000
CVE-2024-51741,0,0,17fbc7acb9beb290488d36c45d7f5c599398962726841e9375f3f88a162a4a93,2025-01-06T22:15:09.827000
@@ -270570,7 +270570,7 @@ CVE-2024-51814,0,0,c706cbf8cc0b8a3d900a8d005586c9e3206748aac96d3b11ba49d6d7d0ffc
CVE-2024-51815,0,0,13d3283f885af1f3011017ca7c559f58a94f2e15b2e40617a6fa365b018c1ef4,2024-12-06T14:15:21.093000
CVE-2024-51816,0,0,9d58e9843514bbeaaf08418ebe7bcce14308ee33a75a1eb0137dc4f401c6134d,2024-11-19T21:57:32.967000
CVE-2024-51817,0,0,b550c38d0eefeb66f8dfa386757bbf0aaf1a1643de82c6b694af702fb58dbe08,2024-11-19T21:57:32.967000
-CVE-2024-51818,0,0,c59c1d65dda63e9aa32ce1f701b077496378ff6a95ff473c8b65e86d9a9a850c,2025-01-21T14:15:09.087000
+CVE-2024-51818,0,1,9d0378352435b59d562d84cc5fbf4d251c7f76c9390436fe144e05a95ce43099,2025-01-21T14:15:09.087000
CVE-2024-51819,0,0,f78f3c3a5e938d2c472ac4d95f0ac45f857d026f08888f764c11f275bcd62334,2024-11-19T21:57:32.967000
CVE-2024-5182,0,0,31ec8a9bbd7289733685d0f34d543282442d8ac8454e8bd475d4d695580f280d,2024-11-21T09:47:08.590000
CVE-2024-51820,0,0,a1b92eadcad49f7810b03c7a98e9503b3af42a0a7682d2c7e491e487a8449207,2024-11-14T18:03:02.447000
@@ -270646,7 +270646,7 @@ CVE-2024-51884,0,0,c65965361df68b36cc9a57a3d6426452385960160e4ed5c054936e51edcaf
CVE-2024-51885,0,0,9997abbc40070e9236bbd903907fadfcdf795a0645d0e60da25d32309cb4565b,2024-11-19T21:56:45.533000
CVE-2024-51886,0,0,98b67d59a155c38bf7cd1b013a08137e66d368961bfff45a3cea49da1e0ac0bf,2024-11-19T21:56:45.533000
CVE-2024-51887,0,0,cc4fb85ccf3bca1eab693ea1dd8297634c27f84eb36fb478e6908b9d339050b6,2024-11-19T21:56:45.533000
-CVE-2024-51888,0,0,52e491dfedfba2ab1c6671345217704b555be42da5c6a82c3eca25f7d7c4c0c3,2025-01-21T14:15:09.260000
+CVE-2024-51888,0,1,6cec1a74bd58dcccb67ec117eeb5f973055d35d90e05a3a348719620fd4d92f4,2025-01-21T14:15:09.260000
CVE-2024-51889,0,0,cecb0beea7b5658e0f81b9e4fa384738485c6a4057ce6c3363878c3d65a3f538,2024-11-19T21:56:45.533000
CVE-2024-5189,0,0,e9e4f7585a6c523ef99b987c4a7316ab8e7e1a950ab1706ecfafec7275afc15e,2025-01-15T17:16:13.547000
CVE-2024-51890,0,0,5b43f46908771f4bebfbe45167dc65d43eb7812f09210cecbd324d63f8d05067,2024-11-19T21:56:45.533000
@@ -270679,7 +270679,7 @@ CVE-2024-51914,0,0,3507f7eead589602074f32edd240a9a78634e4d5dd45f5158df5b3129b444
CVE-2024-51916,0,0,d2c61c6f5d89e7387d2e703c746dbcd330f0881d87b84f96e7948f7b3a1a223e,2024-11-19T21:56:45.533000
CVE-2024-51917,0,0,831a84a21b4d5665ac0a0e3a84caecc2fa11aae5152c0f8c6669deb3a4699216,2024-11-19T21:56:45.533000
CVE-2024-51918,0,0,ad2e80723b14cd28e32f2efd51876370a1789f50b16bdc0f7c00aae3f15e845e,2024-11-19T21:56:45.533000
-CVE-2024-51919,0,0,d5a6bb37c963dc8ccb6dd0f02cc25fd1cdc85f21cafb8062086341c23ba698c0,2025-01-21T14:15:09.417000
+CVE-2024-51919,0,1,d5fcbf35f77c75ca97d6efc7bc1ee1f4aa6d13499548d11e3acd3ea3c12aa980,2025-01-21T14:15:09.417000
CVE-2024-5192,0,0,6209d0dba68d43f6e6fc9e420823ac2b90c25b518ffcd56c4fd421f6cb74233c,2024-11-21T09:47:09.703000
CVE-2024-51920,0,0,c6bd9bae1e98005a93b5675bdaf2804079221b875a5a107bfce29e0dad40ebf9,2024-11-19T21:56:45.533000
CVE-2024-51921,0,0,e359a0de3fe9845697b9d1aef0b6ebf24177e2dde1781bbf17260d376d469d35,2024-11-19T21:56:45.533000
@@ -270789,7 +270789,7 @@ CVE-2024-5211,0,0,7cd6e2e70261fb739ea7e3e47a4f6fba32a9363515da62c2688f8608cf4764
CVE-2024-5212,0,0,0f9b3d1e48853644476ae3ee9a1d012690d355070fce3d62201caa71c818cbf6,2024-09-03T20:45:20.603000
CVE-2024-5213,0,0,5c8c63d05576e1770ede47d4378a318d4160943c618f7de2f4e944b5684fb8f5,2024-11-21T09:47:11.893000
CVE-2024-5214,0,0,63d7572dfe3fc62d2b94f5bd6d323fcf441de42b521ffae91ecf8348de5e238f,2024-06-03T19:15:09.360000
-CVE-2024-5215,0,0,bc9c517d81405b5072cd619417cc46c1fdf8854cefba7b127865b0ed5e56b604,2024-11-21T09:47:12.033000
+CVE-2024-5215,0,1,d95cf7fce9f56649b4afff78d88a04b593736b4a4effa8c86ad492fbc0bd83de,2024-11-21T09:47:12.033000
CVE-2024-5216,0,0,a6cb0d78c97f1833668004bce4e1a3d8ad03ce71671240c1316442591a36a40c,2024-11-21T09:47:12.147000
CVE-2024-5217,0,0,bcb367f5e8f4934ec54457a6bf1d1b467936c7817252514fef2d7bb7ed19c2bf,2024-11-27T18:56:05.783000
CVE-2024-5218,0,0,4adcb0c34373dcdf3d317dd8a7e6d0439942258855805a791e5be6a5f3796ff5,2024-11-21T09:47:12.460000
@@ -270854,13 +270854,13 @@ CVE-2024-52320,0,0,fbfaa1883239695b0007c9764a43ac2cebac69eb763863afcec1548f7df5c
CVE-2024-52321,0,0,58349402fe5df3092273b7344f7d995ad64537d59a580bb31bc25ef4220d89e0,2024-12-23T01:15:07.700000
CVE-2024-52323,0,0,57617b6f1b94228bad139ee211c36bd4ec7e4706388ebf89e10500861eceb01c,2024-11-27T15:15:26.377000
CVE-2024-52324,0,0,1b82757393c4b121efeb2aca56c501ac2b568f66f0e838324b89dea8626b5590,2024-12-10T19:42:56.737000
-CVE-2024-52325,0,0,b71dab04bbe9cc4f34c787683633492187f6326ad90378cbd136ef84b83e6bd4,2025-01-23T16:15:35.943000
-CVE-2024-52327,0,0,8d40154e2f3f7779ceb3441d110016d50699f86017f9c9bcc51ca685abe7d1ca,2025-01-23T17:15:13.890000
-CVE-2024-52328,0,0,32584240063ec832decd51473e9494d315e29c898930fc712aca20842dcc54fd,2025-01-23T17:15:14.133000
-CVE-2024-52329,0,0,2350d8a19f49fcde905486981aeeea1a225c8668ec2873ee29f7ac80d09a88cb,2025-01-23T17:15:14.287000
+CVE-2024-52325,0,1,6c50086d04da9785018c7249d4c67765d2ceda7f4161a2473d50be68c94de1c6,2025-01-23T16:15:35.943000
+CVE-2024-52327,0,1,29194da10a49654ebe4249e1c33be5fc3027a6cd9e7759468fe0273ce3163b00,2025-01-23T17:15:13.890000
+CVE-2024-52328,0,1,47f6b8ccad92f1d7fc0e78b7f2571ce92f8af68e42f27e278ad6748c3d649fce,2025-01-23T17:15:14.133000
+CVE-2024-52329,0,1,f19531e3288fd15512ff51d7f5b5a63e02e23fbb76d63bb0c322e12c69440c01,2025-01-23T17:15:14.287000
CVE-2024-5233,0,0,f7aceb9f589abd3e3127e7bdc682ef20b7c3a1e0d748898af38a399a8a8c2229,2024-11-21T09:47:14.357000
-CVE-2024-52330,0,0,155ec2122343a544e1d705a7494ca0d68bfabd65a18efb03a9c7967ba9cd0a98,2025-01-23T17:15:14.427000
-CVE-2024-52331,0,0,d4b1cb91bc546993842527288bdca54954f9a1e1eb356ae341ff77d88ae3a3c0,2025-01-23T17:15:14.563000
+CVE-2024-52330,0,1,5a55347037ca069cc0c0d3829df40c87ca0a4cac24e1c348a13ee1b80a128707,2025-01-23T17:15:14.427000
+CVE-2024-52331,0,1,5cf69bb827959d336a5028afd5f469c4b331d80891193094491be908c529d749,2025-01-23T17:15:14.563000
CVE-2024-52332,0,0,58837c5feb4aa8da96238f281eca729502def4e6f29469edf4244234ba0fc606,2025-01-11T13:15:25.070000
CVE-2024-52333,0,0,e1bc57a7d739bdd387fb07cc28b3547c00461f3445b0a694a0bfc9660ebe8df6,2025-01-13T16:15:17.990000
CVE-2024-52335,0,0,e1e5dff8245ade7d0df486779ba826bca2b65cb6a4f443a05cb574ac0185e48c,2024-12-06T14:15:21.230000
@@ -271264,7 +271264,7 @@ CVE-2024-52865,0,0,5d09c59cf2b4fe7df00e6e85adc4b0f685431645dbcb69f48b719d3b7eecb
CVE-2024-52867,0,0,b14a9f7c8b0d212f056e38d3758777be722d9d6a10918da14d6ef6ffa3fcbd7e,2024-11-21T09:46:35.283000
CVE-2024-52869,0,0,e0274197b53af25ceec7228d280f45262bb697201ad58fd74dcd6e7042363fe7,2025-01-08T21:15:12.523000
CVE-2024-5287,0,0,ede9629ba14e7833d0e00ab367a4e2205145f22a5dce3f4d9b720c5001bdf2cc,2024-11-21T09:47:21.753000
-CVE-2024-52870,0,0,285cbf7f66ae06ab6cf0ba5cd4a799e03813969b3816af7fe51a71da5b5b8a42,2025-01-17T22:15:28.663000
+CVE-2024-52870,0,1,1a3a6d971d4bd90b76dc72d1f20af849443ecb143b46e583f633f2d3b372f550,2025-01-17T22:15:28.663000
CVE-2024-52871,0,0,bc912334ad7760e2905477f1da15c92d58ec818da9de2502b7206c7a0336bc4d,2024-11-18T18:35:09.027000
CVE-2024-52872,0,0,d5c137691ac8affde2eb9f0d98f11a2242b42b7ed558ce4003950a43927045f3,2024-11-18T18:35:09.270000
CVE-2024-52876,0,0,6fd21241a1a4f5f736d93e368fdcf08c204bdebd19eb249ace2fceb507212592,2024-11-18T17:35:08.900000
@@ -271317,9 +271317,9 @@ CVE-2024-52963,0,0,ff01669b1598f0bce0b4b90af8cc55f96a203c8a430eccd639efb9c221ab9
CVE-2024-52967,0,0,ee495ed0ae82b5386a5a5e29b20d009f38e7fec0fdb15824df2e77e4920e6e29,2025-01-14T14:15:33.967000
CVE-2024-52969,0,0,d48edc4c533d9acd9a260c0e4d555526245a1be1476ba79e29b9502b8c79f01c,2025-01-14T14:15:34.123000
CVE-2024-5297,0,0,4e7f74d9629bbb9b864fb76b28bd5d406dd3be0c174577372182a6d0a600d934,2024-11-21T09:47:22.990000
-CVE-2024-52972,0,0,7c321733bc0eb6dbde9e2cbb52d276f2124cc37045e46c00de470cd13b384da3,2025-01-23T07:15:08.700000
-CVE-2024-52973,0,0,80557c3abfe62ff99c7924275640db641adc976d538445e17950b607d9ba9ac5,2025-01-21T11:15:10.200000
-CVE-2024-52975,0,0,d860756695811f7a9e54fae9d7efd286035e360bea37bbeca473a1af11dfcd09,2025-01-23T08:15:16.990000
+CVE-2024-52972,0,1,f907c93e1e991e214cb92b7d3e00df47508d921bbe0e047b02eb6fc96665b17a,2025-01-23T07:15:08.700000
+CVE-2024-52973,0,1,4b0162dbe0cc84ae90dcd59a5862af8efd2e82fdabf32f87ed28473f7456d193,2025-01-21T11:15:10.200000
+CVE-2024-52975,0,1,c7e48721ea649894731b23d514124708c483471050f40374a79201ffbfa714fa,2025-01-23T08:15:16.990000
CVE-2024-5298,0,0,329feabae44ccd7ff86530cac1ce0ba86c416ea44126377af7ea7290b6d65a10,2024-11-21T09:47:23.103000
CVE-2024-52982,0,0,87ddbec0fddbec6a4eb61fd0607c77d31103b1dd9283c5a13ec4d5a36a8ccef0,2024-12-18T18:22:52.637000
CVE-2024-52983,0,0,6cf30a09aaa853464d214fc07b1d213f931e08bd912522971a9cefc2fb965c45,2024-12-18T18:23:06.273000
@@ -271631,7 +271631,7 @@ CVE-2024-53365,0,0,a93e9b8a9b0b556658347d02609f6ad1ef6238df632d2e5010e1700b801de
CVE-2024-5337,0,0,833c775533ef7ae5a7edcd24b7882543f8822839060a2f050988cae0593a7c5b,2024-11-21T09:47:26.857000
CVE-2024-53375,0,0,03acfc3ce1465046824ce662fbf44dee8291f967ecd696fbbf82e7a2b14619b6,2024-12-17T21:15:08.073000
CVE-2024-53376,0,0,8911dbfc8997baa2a57cf32f34b4dcc9a56903a67bd0c4ffc9a41950a9065ad0,2024-12-17T20:15:22.380000
-CVE-2024-53379,0,0,95edf34644620739a2efb13c91b00934e0f73651feb53c97aacccb3536dec3d1,2025-01-23T23:15:07.993000
+CVE-2024-53379,0,1,b196798263c255cddef295024e688d19551c7c80cc21700ca7c536fc19103185,2025-01-23T23:15:07.993000
CVE-2024-5338,0,0,abd3cd0960193de57487be3582f664d37ab06a1518c59aace36e92f8c263b67a,2024-11-21T09:47:26.997000
CVE-2024-5339,0,0,710abf6b65aa86d6904f8abe1101ad889bace87733c06f79ec2fe20822e1db4d,2024-11-21T09:47:27.133000
CVE-2024-5340,0,0,2c2fba286498156a3309f1d9db161c67194b50596b7c53b6a9c7d8df9b89917d,2024-11-21T09:47:27.263000
@@ -271726,11 +271726,11 @@ CVE-2024-5368,0,0,0267b73ce86fd5c42a4c0cf503f4bdead8427924f402a3554f435c1bc916f4
CVE-2024-53680,0,0,d00cdef75190d88cc2c8633c99dc18973cdcb2e6508d8e02eb8a8af87c5c3651,2025-01-11T13:15:25.710000
CVE-2024-53681,0,0,275dd62378dbefc087157f568efe3961eacafb9ec6438e48555a840aa194132c,2025-01-15T13:15:10.963000
CVE-2024-53682,0,0,a5d4ca048009fac74a0c53cb8280cfc915e85962207104b096449f6d9567af72,2025-01-11T13:15:25.860000
-CVE-2024-53683,0,0,8ed3f44393e22eea3f080e26403389aa2eeebf5c0860ee00e51eb42f73e4ab91,2025-01-17T17:15:12.053000
+CVE-2024-53683,0,1,3f4e0dd07db6947759f0c0b8e35d7c951945ba108d141abf33595205ce071ee0,2025-01-17T17:15:12.053000
CVE-2024-53685,0,0,ecacad7a6ebc3eb816a9eebcd1da87727ce91971bf3c065e2e438328b16be089,2025-01-23T17:15:15.277000
-CVE-2024-53687,0,0,2d6ff7ead580eff771695e1bda58b2af04695f06576730dca8b266502dfc63ac,2025-01-11T13:15:26.120000
+CVE-2024-53687,0,1,98abe3ff07e18a9322923a5e5ffaf288d2f33ec5bc5d45064ffe7ce40492b944,2025-01-11T13:15:26.120000
CVE-2024-53688,0,0,19e807e9f218b9a73099ef1ac03cb800eed5ec697cf2f5b2b26094211e5b9782,2024-12-18T07:15:08.233000
-CVE-2024-53689,0,0,fe9d8a3bf209cb2ad2405bd8604640e12f460f2d15f1045beecc250fa01ee7ab,2025-01-16T16:21:09.993000
+CVE-2024-53689,0,1,0ede54e325c84cca386b96bd5ac55ed73ad47a9a3279d9020d922d0043651aad,2025-01-16T16:21:09.993000
CVE-2024-5369,0,0,14abdfed4d5003ff16a96b2708e00658833baa1f8166ee56f5ba2dba896b20f5,2024-11-21T09:47:31.020000
CVE-2024-53690,0,0,145186003a2e20e895b910273e087e978c037a99e9a7d237f6c4661d59d1c9b5,2025-01-11T13:15:26.470000
CVE-2024-53691,0,0,09846e368cf7a07a1d919202728e77d0589572ed56c2c2f1bb03db07c3ec7fb0,2024-12-06T17:15:10.520000
@@ -271872,7 +271872,7 @@ CVE-2024-53823,0,0,c8e08da3916e0ba5bcd6157a564655c4bd7969a7e9baa9ec5cf68a8149a06
CVE-2024-53824,0,0,ba3b0995b198dddbea8e833e326899bd456b4ee76119ba0f40443a51770415d1,2024-12-06T14:15:24.800000
CVE-2024-53825,0,0,07af7202ddabda05f0daeb42ca06edbcf3fb20c192ea7ca7dd7082861a20bb4a,2024-12-06T14:15:24.937000
CVE-2024-53826,0,0,0b04b1b5846f39442507bbeb125d0ae4870d599699b329db9d8ecf7c2429b842,2024-12-06T14:15:25.077000
-CVE-2024-53829,0,0,7629fe4ae215d51b999df46e32346257b9c7a8bbdd79f0882eb229370da8cd5d,2025-01-21T15:15:13.200000
+CVE-2024-53829,0,1,5da8bd9f2a723130fc67f6c200a52276b15a1d0328bcee21413008a77bbd3916,2025-01-21T15:15:13.200000
CVE-2024-5383,0,0,093acdd4201567d005275d52c1174349cc9fb95effb23b8b65de339d75e5f1d2,2024-11-21T09:47:32.963000
CVE-2024-53832,0,0,1b2ce5c4938b0e1ecf47a9786c83880b95c4a4c43364160d8ae6a9eea87843bf,2024-12-10T14:30:46.853000
CVE-2024-53833,0,0,b0263a13fde25401d454efd3fc9f5d9e65a4ba307004af4c26526c703bab4f08,2025-01-06T17:15:39.110000
@@ -272000,7 +272000,7 @@ CVE-2024-5402,0,0,369141076231aa822f3b7e1a9c4a08753a10cb13fa106f6575157419573799
CVE-2024-54021,0,0,13a0709ef7a4e77dec1177a991cc8b9c7e150472cbf3b901ccd7992c11bb3fd1,2025-01-14T14:15:34.287000
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
CVE-2024-54030,0,0,07c84f217a6fa368622d2a223843d19c0c7e728e80537c7c260b676bb124b4cd,2025-01-07T08:15:25.760000
-CVE-2024-54031,0,0,4ae67926939f395dbb9b982b52cc595624b4a9cbb64e71c57385fb6c364e81cb,2025-01-15T13:15:11.203000
+CVE-2024-54031,0,1,e561fa8b1140e643c613ddbd502d702389ee48a6a06d0cb85808f49f71337f6f,2025-01-15T13:15:11.203000
CVE-2024-54032,0,0,44cb0433c08109f277c1dd7cec5998b3891bdf37d9d532da1f33f5a7f93f3073,2025-01-15T17:39:38.073000
CVE-2024-54034,0,0,83dca3980c80c6f06926ab88e74747734aa5bb2d63881378b4e8bfa35a06c61f,2025-01-21T17:07:46.623000
CVE-2024-54036,0,0,4ee392ab45a7ebdf90ca04024f547832268a482e455a4e1084a47025aea11ef9,2025-01-15T17:54:40.237000
@@ -272425,7 +272425,7 @@ CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03cc
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000
CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000
-CVE-2024-5460,0,0,4fd3803d5642b199779bc2b20d7719ab0ace3a1c11cf46e9cd8f6687357b8e08,2024-11-21T09:47:43.710000
+CVE-2024-5460,0,1,7046c178eefca6c6b073c219da29e97442af7e310cdabeff0163e83e01c0ec6a,2024-11-21T09:47:43.710000
CVE-2024-5463,0,0,357d166209285de4e8f9b5c7c2d63d7eb415952b3a9d1476d831eb91162afaf7,2024-11-21T09:47:43.833000
CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce5d,2024-11-21T09:47:43.990000
CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000
@@ -272443,7 +272443,7 @@ CVE-2024-54677,0,0,7738db23e6dfe0ca7bf4e6721884297e1312bf0f9f87462addf38007bea25
CVE-2024-54679,0,0,381ad7e6890c67d9b6c47b47a43cd175dd5b1319ea7d6b78a90445a532dafd14,2024-12-06T15:15:09.693000
CVE-2024-5468,0,0,83f1a353a5b95b83c36aafd7fb0e880d8454855ef6bbd816a181cff50dcb4279,2024-11-21T09:47:44.527000
CVE-2024-54680,0,0,23c42810796888c623043dfa17bf2c05e67e8cb1f0dd95a5d3bb0378d9b39a60,2025-01-16T15:17:54.520000
-CVE-2024-54681,0,0,253e5dec99c9346d03e651bfd86679c7c1afa29b9d10690c2c2c73d3edd05e49,2025-01-17T17:15:12.227000
+CVE-2024-54681,0,1,da50ddc8ef645fe6cea7f30366b954bdd2a108ff287b579d55bc6878ab1f1d52,2025-01-17T17:15:12.227000
CVE-2024-54682,0,0,014e168d2df7708ff5f91a3c7e1142a04001293f3734328797e32d8f370d3481,2024-12-16T08:15:05.513000
CVE-2024-54683,0,0,35ec2d70086ae912ff4eae7d82bb097dcf57dbd99c9eaf862ef970893175a37f,2025-01-16T15:18:09.453000
CVE-2024-54687,0,0,ae08c85d224b757e1a5c6be5c8bc6b223baab48ee4ede4a56265487768ca764e,2025-01-13T20:15:28.927000
@@ -272472,9 +272472,9 @@ CVE-2024-54775,0,0,3fdaf8fe1f78335459cdc17721da7bdc51023f16b45ae3c005b68536d3244
CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000
CVE-2024-5479,0,0,f92bceb83a5a9014c15956c2e58b8be8249c2eaaa0c8984e346563da1cce7cef,2024-11-21T09:47:45.750000
CVE-2024-54790,0,0,0ee4dafcee56af807dcd515a4c0847583886eaa6a1dbd401c4125154c4c81fc3,2024-12-19T16:15:08.950000
-CVE-2024-54792,0,0,629950a94e130ed3de3d0e4a0b80ede9f4a464d198cc2a82e8faa2a6fc037bfa,2025-01-21T19:15:11.080000
-CVE-2024-54794,0,0,707863a0e42076cfd30e62ebe07c66022551c7856e679cbd3bccd481feea32b7,2025-01-21T19:15:11.243000
-CVE-2024-54795,0,0,cdbb1af45dde030fc6ba29883577c083e4bdbce6260659815f96caa41ed059c3,2025-01-21T19:15:11.407000
+CVE-2024-54792,0,1,98468856aeeedfaaa62e1fc26bc1fac81265f3b59cbbffb650074881345bad2d,2025-01-21T19:15:11.080000
+CVE-2024-54794,0,1,c49ffe9b769b5cd233f7d6bd6f86fb56ddf647e4b0a80553364112532cd337f3,2025-01-21T19:15:11.243000
+CVE-2024-54795,0,1,189377580c088768ee02d63dd643544c9e329d819648f0ba84334338aef4e9e3,2025-01-21T19:15:11.407000
CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000
CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000
CVE-2024-54810,0,0,98b1b32485df996df7d9929d6a4a4f3f6576d87de7e3a8405b0f88648f287e10,2024-12-13T18:15:21.707000
@@ -272487,7 +272487,7 @@ CVE-2024-5484,0,0,b3b185b98c733a0f4717de1a808b2127ff5f3061f156212c34336d217a3681
CVE-2024-54842,0,0,ccaf3a44f3596e593a08308e4797efa5052c648d3a0bb0b78b9bc5f97386b385,2024-12-12T18:15:25.580000
CVE-2024-54846,0,0,cd293e372cd7b688684fe1a669519f7fd7cf9e715a92b3759a56aa794ae915b5,2025-01-13T21:15:12.913000
CVE-2024-54847,0,0,92cd9612836c1d70a209fa90bb5658c416e64e42258c013167fdea7601604aec,2025-01-13T21:15:13.060000
-CVE-2024-54848,0,0,abe11eeff9270b99a0212209e764ce9100c7a8167e4b1af609b1ad75cba4abb6,2025-01-13T21:15:13.200000
+CVE-2024-54848,0,1,fca36b4a3cd43d449a0063f1140e6078c6c911adb34e99322685fae7121d1dd1,2025-01-13T21:15:13.200000
CVE-2024-54849,0,0,ecb2618b47660945a630d6edeb58e480eb8019d05c1f299b012bdc19f7f4588d,2025-01-13T21:15:13.347000
CVE-2024-5485,0,0,f687486069d8da51bc217d8f3c1b4f2cb223a1d0f0b0390694d1cbb1988c70fb,2024-11-21T09:47:46.253000
CVE-2024-5486,0,0,6dfb8e6d8cb1d8bab5afe16e5d1d045c354e9fc780a2307ae97dd3f4b30153b6,2024-11-21T09:47:46.367000
@@ -272579,10 +272579,10 @@ CVE-2024-5517,0,0,9c6c0ed78bbf755155b1de3e7badf246bb353c07efc38fd531426187fbced7
CVE-2024-5518,0,0,67f3312fdd1ae90617f9bd3a59508e7bb4618cb669e21c1a0f613af9578fc941,2024-11-21T09:47:51.250000
CVE-2024-55186,0,0,80cbe31f0c6c827f9fe1ea965ee9f035483ef81bd6d62228d42baa84cd806d8a,2024-12-20T21:15:08.850000
CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263eb7,2024-11-21T09:47:51.393000
-CVE-2024-55192,0,0,a56c7faa22ebef8e9d010323a9fd8fe5022442e6a938fa5676899c129665e687,2025-01-23T22:15:14.333000
+CVE-2024-55192,0,1,578bf5cd95b055e6f8fe1927d392f06ecc291e7aec5d564d1ff85089ed561a72,2025-01-23T22:15:14.333000
CVE-2024-55193,0,0,90629f8274796f894b01b17f5a7ef0934dbb53d009417deff7ad371f489b7b38,2025-01-24T22:15:33.730000
-CVE-2024-55194,0,0,73695d5499ae35c8dafa515c011b252fa8b1630d83d647c457bfadbe91834035,2025-01-23T22:15:14.560000
-CVE-2024-55195,0,0,eef925944b14c0d2b71d4e49f25815e61145ad788d6e98f788ac82d4069cff8b,2025-01-23T22:15:14.690000
+CVE-2024-55194,0,1,804005f6f22f8eb7b3daff5cc3dacd38f1b9547678c0f9c5fac19784b314cc6e,2025-01-23T22:15:14.560000
+CVE-2024-55195,0,1,7deb8159637db6659b96d42dc9114dc77a022ffe3e95e7d421e2db44f5b66e21,2025-01-23T22:15:14.690000
CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000
CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000
CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000
@@ -272634,7 +272634,7 @@ CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53
CVE-2024-55470,0,0,dcfc79f3be29f89e1f2e700b61e3b076a29307f3f819bb5e3e6622ca15c02991,2024-12-20T18:15:30.370000
CVE-2024-55471,0,0,53c8545095dcd233b02e5b5368ccdda8e9894ef3eef3c8dd7b456e3a987cf26a,2024-12-20T18:15:30.730000
CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000
-CVE-2024-55488,0,0,f0f3e524c8548fe1fe6d4f124bfe8710d694b8d638ca11299653bfd921fc9617,2025-01-22T16:15:29.770000
+CVE-2024-55488,0,1,1d03e181ce457fbb7c2aa92ec4781f980cd9e08377b209ae1689ecd41de2adc6,2025-01-22T16:15:29.770000
CVE-2024-5549,0,0,523dae47b6780776874c36c71ab66f8ac6e8e99599490648ee341f214b628e63,2024-11-21T09:47:54.507000
CVE-2024-55492,0,0,8ed1b6fc2ceef3fd61acd090adb38bc92ce31dd641c3b527d1e8f1507c1a53ee,2024-12-18T19:15:11.777000
CVE-2024-55494,0,0,a1b10176f7d1839512005775c9e7583ed311f893fd691a402dee6bebdd80dd5c,2025-01-13T22:15:14.153000
@@ -272642,7 +272642,7 @@ CVE-2024-55496,0,0,c5e38095d75676960b7fbf7f58bdc885b4b159f2f77ece315454c30d8284a
CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e870c,2024-11-21T09:47:54.640000
CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000
CVE-2024-55503,0,0,064b1132dd99b0fc79a8dd51ea340f43a83611c4433b6171fe0e3b54bc9f811d,2025-01-17T22:51:48.330000
-CVE-2024-55504,0,0,5be908b97dc9083e02b7a6f482fc286c0fbfc0f736cb9671e111bd152e4ee714,2025-01-21T19:15:11.567000
+CVE-2024-55504,0,1,6917e546e66911d72a2d6f725102338c9b04fae01f5a59fdddec1e7de9f6c741,2025-01-21T19:15:11.567000
CVE-2024-55505,0,0,95dbb5d9746aa9dcee4d91d0bb5c6de34af0ae63a0cc3e08bcc1dd1518ddf13c,2024-12-18T22:15:07.477000
CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b91675cc,2024-12-26T20:15:22.867000
CVE-2024-55507,0,0,e090c8e2ae47f2afd9c837e2f8b0be6d662da9c654c585f5e405c25baac19616,2025-01-03T21:15:13.340000
@@ -272773,7 +272773,7 @@ CVE-2024-55896,0,0,d7dd07510a57c238a16c0fe0788b36dab26d7ddf0b08fae01a783db92ce18
CVE-2024-55897,0,0,86f551f0669482615238eeaffb68bcc56791f5e1b9341f9faf1df69a0f9917a0,2025-01-03T23:15:08.573000
CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000
CVE-2024-5591,0,0,5b452d13d5bfa9a2af82af55a6427cebed5363226c02cb0163eff6e664b73ee7,2025-01-03T15:15:10.813000
-CVE-2024-55916,0,0,7502995a20458315a9946b04859af6b86781c5ddbc0a9a47dd47bfb5e67dec22,2025-01-16T15:18:39.293000
+CVE-2024-55916,0,1,bb2f39fb2dbe90e6c07ae14f8caf688273b3c9276641493fe6ca8dc8b8b6b9eb,2025-01-16T15:18:39.293000
CVE-2024-55917,0,0,c12e2bbc393b15d20fbce1ec995c8d1d26abb7f3ae27ddc186e402fd7d620706,2024-12-31T17:15:09.140000
CVE-2024-55918,0,0,bbfbb68501d5d412b5390769769529160437a59c66144983bc4b57777cd87c8a,2024-12-17T20:15:23.140000
CVE-2024-55920,0,0,d289d579894e9ae556d4916665c72b6c96b36944bb6699227a0817a4ecbe37a8,2025-01-14T20:15:29.613000
@@ -272781,12 +272781,12 @@ CVE-2024-55921,0,0,5fa81d92601e70d676a1016b709a0f2741abaf55426856cddb4a06e34b9a7
CVE-2024-55922,0,0,ab9ba749ee333e9f82aad55cb9be15ec2bea94f8fc77977baf33bef44d3cce51,2025-01-14T20:15:30.033000
CVE-2024-55923,0,0,219ffcee25fb405d9a02cdc68a4fa5af829e860803373b590c58a214037e5d08,2025-01-14T20:15:30.197000
CVE-2024-55924,0,0,51b538faaafc8081c0d91ed65951b4c0e863d37d4f9e21b793ae96fe9f20d0fe,2025-01-14T20:15:30.367000
-CVE-2024-55925,0,0,79ec4d8b4129a8038473716ffd3ee940bcee5be2cf896f282fddf358bd7b04dc,2025-01-23T17:15:15.380000
-CVE-2024-55926,0,0,dd50ee80d77e0aca73c2e52b5213102eeb00bdbf097b6b075d2552920d1bd614,2025-01-23T18:15:31.780000
-CVE-2024-55927,0,0,509795c3b5753e2e47431e4d26e54244cb681a02af6fb1451087ec44e5de71ec,2025-01-23T18:15:31.940000
-CVE-2024-55928,0,0,c3c55ec2ce530b6be2e428b0308c4c19bf779856542c79cd1fc36c6cc68301ef,2025-01-23T18:15:32.100000
-CVE-2024-55929,0,0,3cfd4651ea4fbbc48121935d31fd79fd8d1aa4a4333d98bc83c4a8b115ee1bfc,2025-01-23T18:15:32.277000
-CVE-2024-55930,0,0,cbc534df0a83545dddaf34520c6e91bb0fbae5b756e38a252e0e3b69778c649f,2025-01-23T18:15:32.450000
+CVE-2024-55925,0,1,961913985d3386f6c86102111b163be1e0dec1cbc156cf09d6d78e0158a190d4,2025-01-23T17:15:15.380000
+CVE-2024-55926,0,1,8acda5d8d52cc50290b086c9f0359aa2ec2a57ac51fddabf5ffc20018c5d599a,2025-01-23T18:15:31.780000
+CVE-2024-55927,0,1,e9dc07f5eb5f9d28b02daa24fc00449ee0e818832b12e9965b64bc86560693ba,2025-01-23T18:15:31.940000
+CVE-2024-55928,0,1,26436780a4b8e6f989af2337cf5de2b76f8edb52b6911b1d544e8d7ea0325a88,2025-01-23T18:15:32.100000
+CVE-2024-55929,0,1,8c1cee5d60b08abc234564e76ef472a48008d96afccbcf76650e32b8ea7ab8b9,2025-01-23T18:15:32.277000
+CVE-2024-55930,0,1,5e3f6dbbc16ec6a457fb969cf3b7dce59a102175d84f10d68af4b8b250cbc52c,2025-01-23T18:15:32.450000
CVE-2024-5594,0,0,e7555e7b165259baf6d7812e78b67ccc956e8357ef83023a2dc849ba891436dd,2025-01-06T17:15:44.383000
CVE-2024-55945,0,0,51c4c796163d23f85b889df289eaf5efe1a92af8ca1f7066684ce494ee386866,2025-01-14T20:15:30.527000
CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000
@@ -272807,7 +272807,7 @@ CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e
CVE-2024-55969,0,0,1d80cecd30844cd68ce96a6b7ee5ef5d3b9107e1b08adee083a129c50a18336c,2024-12-16T17:15:12.337000
CVE-2024-5597,0,0,c028f291e4b563828a2ebebe088654ce56adccaea078f8905bc0de855460aa3c,2024-11-21T09:47:59.443000
CVE-2024-55970,0,0,16abb0c0e0265704de9252f7802bb4c1dcee3b6024c122812d4fa638388a012b,2024-12-16T17:15:12.517000
-CVE-2024-55971,0,0,64c8f1a825e5121b19be7d1cbf13b17b132dd2d3140daea5904dba05b9ffab49,2025-01-23T16:15:36.307000
+CVE-2024-55971,0,1,c62f3cb14a12ddf737dc415a479463f54e7063a5e8a22f33b1efc0085c6af9b5,2025-01-23T16:15:36.307000
CVE-2024-55972,0,0,073f1f7a76af32f336baa61e0f294014ab40da0fb83d4a54259f78e7d1bd8738,2024-12-16T15:15:23.613000
CVE-2024-55973,0,0,fff94d3b5918852053047fe137036975c3faaa8f02b96e59835ccb1b0e28c022,2024-12-16T15:15:23.767000
CVE-2024-55974,0,0,2fe0e66dd935fe894618bf0d375698cc30434c243d25601468e9e5918dcbb737,2024-12-16T15:15:24.397000
@@ -273038,7 +273038,7 @@ CVE-2024-56273,0,0,f3b339a750cf26c8f041bfebab629309f499d098dce492405c144e6fabc53
CVE-2024-56274,0,0,46dfc2899337e1c799d2cccc8e16e1704e1f7d8e3aa091b747fa7acd8e7f8465,2025-01-07T11:15:08.960000
CVE-2024-56275,0,0,9300415b3d7dfdb21e4bcf98e6b049d2270278d0318cd78cd0580d5bb4fa3aff,2025-01-07T11:15:09.130000
CVE-2024-56276,0,0,00f6b9e0227c33f5e8b70946c15e191837645d3c728e7697707e4b3163250bbd,2025-01-07T11:15:09.293000
-CVE-2024-56277,0,0,2e998490e9ffec0a7b2a36877ee380083c55ff607a9a9a755baaa2dcdf6aabc0,2025-01-21T14:15:09.593000
+CVE-2024-56277,0,1,8c7a23d612b7b2aab83c4f798f0d670e6b97dbf3e2fd7e133652a5597cc22702,2025-01-21T14:15:09.593000
CVE-2024-56278,0,0,7b39d950ef51de16ae31685f069f6c6d113d1e47d70ded5845406aa9152618e9,2025-01-07T11:15:09.460000
CVE-2024-56279,0,0,b9950fa6d62ea9e65991aa518c54819f9abe48771ec7badc646331c83db213d0,2025-01-07T11:15:09.633000
CVE-2024-5628,0,0,755412ba03c7f502c54c635c9705b96a4154da09bb9bfca64f93d1d41d08cf6a,2024-09-26T15:14:26.547000
@@ -273466,7 +273466,7 @@ CVE-2024-56784,0,0,246e46b18d01297182b84d0eeedb7f89be5b067468d07e5fbcd2a4701c7c5
CVE-2024-56785,0,0,8f5cb98439d0416d3248c986cf648022357f0a09f9da0115702bc78871254399,2025-01-09T21:27:27.500000
CVE-2024-56786,0,0,ea16236b0070d1ee086d935f00ebc5682fd5b368b3f0ac1efe1f4df73b3ea78c,2025-01-10T18:53:06.473000
CVE-2024-56787,0,0,77f49900ebe1e38ab8e44c5b5372eb9d15671b545bb90d2215966dec4b8fe2e1,2025-01-09T21:28:12.873000
-CVE-2024-56788,0,0,3a36c511427dff664270186cc18fb40335209c34976451cd94bb4b753be21e11,2025-01-11T13:15:29.090000
+CVE-2024-56788,0,1,51dd43caa6c390f7c49e9d88b01231376fef9ee874b8f580ebd095d6eb630ba3,2025-01-11T13:15:29.090000
CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000
CVE-2024-56799,0,0,7c81f75b0fadc031d3c3a69969ffb946d254b09a307c8ed595c44ee135ddd7a5,2024-12-30T19:15:08.160000
CVE-2024-5680,0,0,926c5c2f45d297ec0fa81be8768753266fc85d73f972d4984111118e8fceffa2,2024-11-21T09:48:08.837000
@@ -273502,9 +273502,9 @@ CVE-2024-5696,0,0,9ae6c44d348ef9d24ec8ca5439b37c50da2ca251572759d1d18bb2a62c7efe
CVE-2024-5697,0,0,b7a4dc6c87306b1faedc3f85852add4556913bfcdad208dc9ec44ed1d967aaa8,2024-11-21T09:48:11.493000
CVE-2024-5698,0,0,f82f3ede8f3a0f37db39e7c1594784573d509729718d4233e67322de0394663b,2024-11-21T09:48:11.610000
CVE-2024-5699,0,0,1f6b745154d0c66e136c94c9cf6848fa0ef03de7ad43314ef7aabc398131e7bc,2024-11-21T09:48:11.727000
-CVE-2024-56990,0,0,5992e3c54fb722255aa3c3615bc37d6b52e525e4fe4a97af0ed7e1a420105c20,2025-01-21T16:15:13.947000
-CVE-2024-56997,0,0,1729024cf9ec54372b23b532a4d6c51cf30cddda79e0c299aab02010308a5464,2025-01-21T20:15:35.757000
-CVE-2024-56998,0,0,0eef8e945109bf477b4b0a0f8c57a79c772ced9131561b7b2dec68d7dea0ff75,2025-01-21T20:15:35.937000
+CVE-2024-56990,0,1,69df5a378059c143fb0394a632fffd1a0d17ff51d4e63a6bcfb36930a4a43f66,2025-01-21T16:15:13.947000
+CVE-2024-56997,0,1,b9e3b1a369f281014b3d6ae47db288812e253e2c05f0cfa169a74fad7957b7e9,2025-01-21T20:15:35.757000
+CVE-2024-56998,0,1,f5f48efbc8b4fff5f7922bcdd7558331389f08761b2f0b3a0f88eaf8ce382ca8,2025-01-21T20:15:35.937000
CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329d1,2024-11-21T09:48:11.903000
CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000
CVE-2024-57011,0,0,e423cf8108eeaccf1a4a6a564034672c57143be7df30237f44f891951f76e1ce,2025-01-16T15:15:13.873000
@@ -273524,13 +273524,13 @@ CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed738
CVE-2024-57024,0,0,dd6768df4410fc37cc8c4e8a948bb715a9d72db959034294e4bc9c1d5752aa77,2025-01-21T17:15:14.723000
CVE-2024-57025,0,0,ba6eba255be4ec8bea25a2cdeb615de849af222ae85f044e2a8f32f3b1f8d1b7,2025-01-21T17:15:14.910000
CVE-2024-5703,0,0,3d28349807701c555fbb2ea67def24c228f00e38f4a4f9bb2c70209ffe7ffa47,2024-11-21T09:48:12.467000
-CVE-2024-57030,0,0,e2085dbd261ee8fb49a18a0a03fb91173298ac1c000f3b1b7e66eedd701a1450,2025-01-17T21:15:09.823000
-CVE-2024-57031,0,0,b0164426db7f4760460d5669562ec10a97e33462ec0f4ed9fec29cbe2eafbd7c,2025-01-21T17:15:15.130000
-CVE-2024-57032,0,0,4bb814055a1b8f710099c46fbffb94c9c1683334e1f060d0d2d81b46229107a4,2025-01-21T17:15:15.313000
+CVE-2024-57030,0,1,01cfe55aec58900b151b329d4f4c994ce5192423d15550098a7bc9a4f1082c3b,2025-01-17T21:15:09.823000
+CVE-2024-57031,0,1,ef32ef9e4d2d23eda7d5f5fca1a8a9bb5c5abeeb6fb81fc6e1717dc224a1eaa2,2025-01-21T17:15:15.130000
+CVE-2024-57032,0,1,c44ddb8d6c7e924f7e3a4a1f8b2a801cae252e0630b13e5adf63bc93f16d111d,2025-01-21T17:15:15.313000
CVE-2024-57033,0,0,b213e3eee22d5746b72c15bc18b2e100f2a7f8ef13f3a1ff51e93f85d64bfa75,2025-01-23T17:15:16.950000
-CVE-2024-57034,0,0,de036f3ae14f1b62005a975b4bfce6fdd6790752b5eed7979f69e97b8eb0cb39,2025-01-21T17:15:15.513000
-CVE-2024-57035,0,0,1e6427aacaea51c871421f79fcbc3481eaa36132b14f2391d58f6d6e395b671f,2025-01-21T17:15:15.703000
-CVE-2024-57036,0,0,3a425a52d7d12c5a0f18067d93edc2459610041510f5c755af20fa9200d1b9b6,2025-01-21T16:15:14.143000
+CVE-2024-57034,0,1,532c19a19bce4f1154e6252ae78be4d2c5ad6b3aefd0c92a026a2bc0955f97bc,2025-01-21T17:15:15.513000
+CVE-2024-57035,0,1,5b4d21f0e6f76521453f47b20f8d7e46bcfa11378320e2eaefaad51e3d6def2f,2025-01-21T17:15:15.703000
+CVE-2024-57036,0,1,53a08b77e64e14052538b358d3b699e5ff91badbb6cbef1e8c382e8b41ad333f,2025-01-21T16:15:14.143000
CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000
CVE-2024-57041,0,0,ddfb29be19bbf27e0e79d11117c70804483f6627ba362e993db3cc41d054c8a6,2025-01-24T20:15:33.353000
CVE-2024-5708,0,0,f68252af81d3d9fd48c33f6db887b706921f7e4e9ec883679703f59930376646,2024-08-06T16:30:24.547000
@@ -273542,7 +273542,7 @@ CVE-2024-5712,0,0,d9053a973766129971458824397812ec1e4acf4c6e0c33b032abc440bd305a
CVE-2024-5713,0,0,3391d5de33d01a2f3feb723b6a12c2cc29413174b2bdbe5c4e85347aebdc9be5,2024-11-21T09:48:13.273000
CVE-2024-5714,0,0,849fc94b6902757fdfdae1f78ce00df63ab2c5ba63744e880696de74b0f190ce,2024-11-21T09:48:13.440000
CVE-2024-5715,0,0,8c569768d6a890bf6135b49c7618937c530109ec67dd48fa94109e61c60d211f,2024-11-21T09:48:13.567000
-CVE-2024-57159,0,0,87b08e206ddc43db244ef415dcb6a137db640416ec561fc3cf69cd71d133ddf8,2025-01-16T16:15:32.700000
+CVE-2024-57159,0,1,074546348cb712979d082ef53a8cb20b67f57ab9bbf273d62b45e710958a913d,2025-01-16T16:15:32.700000
CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000
CVE-2024-57160,0,0,aa8c59ac0526c71da83328e18c9141cb756c3f85c3b3a889d7b7ff6da4e9d450,2025-01-22T17:15:20.300000
CVE-2024-57161,0,0,a5c89c4fcaf2013dde33803c2e35f39270b837cce1b452b06abc4903399ec188,2025-01-22T17:15:14.067000
@@ -273568,7 +273568,7 @@ CVE-2024-57228,0,0,2b2ede4eee89a9d230ac4fe6f1506a12a678e5912df7ff0d6e847af20a26c
CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b02,2024-11-26T02:16:48.200000
CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000
CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000
-CVE-2024-57252,0,0,628dc6b1296f8743687d596afba3a931ec7c07f8b9dd88efd06e94d742bfce54,2025-01-17T22:15:28.817000
+CVE-2024-57252,0,1,1934cc1672f51074e73fec8f79c8c1a0c2b2ef217ce3d8eb4ed233f3d5050e7d,2025-01-17T22:15:28.817000
CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000
CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000
CVE-2024-57277,0,0,cf3bfbd32910c82a101c705fc837da91aff2f392e35fb884cbc5ee32ed42427b,2025-01-24T20:15:33.587000
@@ -273585,10 +273585,10 @@ CVE-2024-5734,0,0,e11a2eabf858c649c3672ef7dfee7440a5aa55af470ebaa049ac3482850265
CVE-2024-5735,0,0,1aecf1dad861da728b2f9826c6f1c9c383af7e2a97744eeffda3009b167fdae6,2024-11-21T09:48:15.447000
CVE-2024-5736,0,0,6b1b18dd72938ab32e71ae9b9c3e5aef903a076b6bda077e482ad25858245f35,2024-11-21T09:48:15.580000
CVE-2024-57360,0,0,b55b093ca2518eac39079440800bfb25c14c6bd692dd0f78a706c0ccb71a2e4b,2025-01-23T16:15:36.437000
-CVE-2024-57369,0,0,08768297729630cc31e03f050602de5b90fde20bc72ba089df28838013f0de04,2025-01-17T20:15:29.140000
+CVE-2024-57369,0,1,ce35d8d439ec5b10e19b8254c4b2aaedfd6d2315486d0723f1d0dfc5c7549525,2025-01-17T20:15:29.140000
CVE-2024-5737,0,0,fb7afad0bdcad96b29de7c5519f73ad0e5af614975f3cc39b56e0ff717aa63e5,2024-11-21T09:48:15.713000
CVE-2024-57370,0,0,dba61003ac0742f925ea5ff1cc95bfbaed4369615ca108aeba895cf60279fedb,2025-01-23T21:15:14.663000
-CVE-2024-57372,0,0,c305f1ff8dee898dc877fd7092322892cec8b12f543ffd49cc6c6aec831bb670,2025-01-17T22:15:28.957000
+CVE-2024-57372,0,1,359f6085d50456f0eac4043a58ce1cc9b440df64af0e5401b40a68976c846ffa,2025-01-17T22:15:28.957000
CVE-2024-57386,0,0,581b3c2804a2401ceb5ccd2cee1eff29157b5f56941a4ae147cc84b888d64fff,2025-01-24T22:15:34.727000
CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000
CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f02a,2024-11-21T09:48:15.963000
@@ -273611,10 +273611,10 @@ CVE-2024-5751,0,0,a075ba1bce0283dcf2eb1909116e18ed1aeef6c0cfd6415ef5931a3fb6320c
CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000
CVE-2024-57536,0,0,02e8c7373d9548e0be6ef2dd6f50d54d1dae50f3849a42bda8fca1e700f8b5b0,2025-01-22T21:15:10.100000
CVE-2024-57537,0,0,7a57264ee99ea2cf07d8beff99c09ac577ded2e5e2c43aa0cae71e5949ab6ad2,2025-01-22T21:15:10.287000
-CVE-2024-57538,0,0,bc61ad6127f282910d4e166c783db7ea08bb67c6253e72bde5ee423ff16fbdf6,2025-01-21T21:15:11.803000
-CVE-2024-57539,0,0,d7e7e175f8d96639983141667092508f99061026d460ac67b8322700ab3ad970,2025-01-21T21:15:11.920000
+CVE-2024-57538,0,1,cd5690522299166d7d3b5c94ae6adb093799a28371cc34b53a2ee8c321062505,2025-01-21T21:15:11.803000
+CVE-2024-57539,0,1,eb3b72956f964eb5950331f2e2bbcf9cfa2081217cffaaefa2ea82d3a928fa1b,2025-01-21T21:15:11.920000
CVE-2024-5754,0,0,f2c4f40343fb16d68e3a72c7a389800b829b93f31dea5ecdb29b9f34a3018f5d,2024-09-19T01:44:29.550000
-CVE-2024-57540,0,0,79a9779108f44258ef94bf1b1a819a906779f1cdb43812df3e2bdf578c02e1a1,2025-01-21T21:15:12.040000
+CVE-2024-57540,0,1,e9bc8bb8d371d0d08c5d00c3244575707f168508cb1b7bef72858858f2e4eb7e,2025-01-21T21:15:12.040000
CVE-2024-57541,0,0,dd2049b57cd1989e6fcbdb2380ed3e62d7ed6520c2b79fda0eef8f38c76fb1b0,2025-01-22T21:15:10.453000
CVE-2024-57542,0,0,9f4f21ed016285b89d83a6c564ff71907e5abf82e51bb01bf73b7d294ec7a6a8,2025-01-22T21:15:10.630000
CVE-2024-57543,0,0,898d6f8a88c778c4280c4ecff7f0698ccecae47925ad74f2985898b4ac306118,2025-01-22T21:15:10.837000
@@ -273749,7 +273749,7 @@ CVE-2024-57785,0,0,135792af397929898d575e62bc51d4dfce68cd8f2d0c7ad555f4b589f8dc7
CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46fc9,2024-06-12T08:15:51.240000
CVE-2024-57791,0,0,326f1a56f934ffc176ce7b6a2932ae3ce07749c9076db086eba2ded026e10e86,2025-01-11T13:15:29.253000
CVE-2024-57792,0,0,e53647b80dd687b9a2a0064a755fece6d3e4e026a6a0cb58d2d0e7aa75150018,2025-01-11T13:15:29.420000
-CVE-2024-57793,0,0,cbf0da07a4c9afee3e09b6e7fa843829f62740c20d9e81fcd5d7f4c67ce8d3d2,2025-01-11T13:15:29.593000
+CVE-2024-57793,0,1,e9b7a7fae892be6eee516cf000e8b375a33c60ab507666266d3a6f69d2535658,2025-01-11T13:15:29.593000
CVE-2024-57795,0,0,c27fd0f8d7d3c2986e45448963a7c33f5baa1cb6168473b82dcd9b787e8c4fce,2025-01-15T13:15:11.563000
CVE-2024-57798,0,0,4a1f3bb2d59332011559f877ff25acf23b999788a69bcc4818b5054d0f8fede0,2025-01-11T13:15:29.743000
CVE-2024-57799,0,0,629fd8bffc1c970081661553b3588a57b03911cce9c0036c62f31188e3006930,2025-01-16T15:19:18.117000
@@ -273770,18 +273770,18 @@ CVE-2024-57823,0,0,5ca581226a27965f69cc1b47d8d6ed60ad65266a2e4a0de113585f678075f
CVE-2024-5783,0,0,457a67b18c53addb8fb271e75294a5e3a7e25c57923089dcfbdfc7dbab590f38,2024-06-12T08:15:51.480000
CVE-2024-57838,0,0,7205305ae1088ef41361b6511691e021bab207c0c324bab7b09b17a8c1a06218,2025-01-11T14:15:25.940000
CVE-2024-57839,0,0,5656e2417e5685f2e1ff410b1767104ed6341a8132fd402fbef4fd6f8615e85a,2025-01-11T15:15:07.050000
-CVE-2024-5784,0,0,79d7c651de1735758dc5225e9f9f2125237472cf1705bb9d1ed95eddc5ac5820,2024-09-03T14:48:19.570000
+CVE-2024-5784,0,1,f27ecf8abffd9e6c282a3d3ca16cce2ce0cb1c19ecd7f5c543f166278a4d8c33,2024-09-03T14:48:19.570000
CVE-2024-57841,0,0,7514da2dfb595c91f83690723d606b92d1221f68ae1ec5a14cc40df5468d5513,2025-01-21T17:38:48.263000
CVE-2024-57843,0,0,a291eea3f115dccf31a54bfbd28c6238356a52daec4febc3cf5227594411c753,2025-01-11T15:15:07.170000
-CVE-2024-57844,0,0,f734d8e057021cf9231035e98438abc5d0e9fed583f1c26eb8ba3bf110c62926,2025-01-15T13:15:12.277000
-CVE-2024-57849,0,0,420286e04a2b5df2768777fd4bdfc11c4ee05ccbead76e085b79ccd6c51b560b,2025-01-11T15:15:07.290000
+CVE-2024-57844,0,1,ba7a9af927cdccfb32d77efd3b08b23135ba420a4b94376a9ac04ef40ed20ba5,2025-01-15T13:15:12.277000
+CVE-2024-57849,0,1,6c1a4f1831f5a2a9c9af19f1c5a93dad2a70d3fd672b039b5a9c54549819e120,2025-01-11T15:15:07.290000
CVE-2024-5785,0,0,0e9b551c455c61638ce3e7d2f5874ca2c1cf14d589c0a4025501beedb178de88,2024-11-21T09:48:19.780000
CVE-2024-57850,0,0,47b5473b2f10d731d0387dd9768f510a3a9dbe99cecf1312c304ff971055ab13,2025-01-11T15:15:07.423000
CVE-2024-57857,0,0,42661a463d36aadb20f3e64c41126783ca9e0b1df58ab33691cea597d9ac1a2b,2025-01-15T13:15:12.403000
CVE-2024-5786,0,0,8f234ab6daf42312db402cec6a9780e6a0a03ed9070824749daf6f62affc4884,2024-11-21T09:48:19.897000
CVE-2024-5787,0,0,1d58b2484cfc2497ce3be8bc315153e4937b24852bc87d95aee088e2aedc7438,2024-11-21T09:48:20.010000
CVE-2024-57872,0,0,c3ffa0e155e2ac44fac8a82673746753e090198753fbd02da0ed8386c1ecfa6e,2025-01-16T15:19:51.637000
-CVE-2024-57874,0,0,e1e398505659ea2f6049b654f218c3865dc245e6cbf829a65b85cf47f7916af9,2025-01-11T15:15:07.680000
+CVE-2024-57874,0,1,45e3dde5693a9c2fbd7080e84b3d782e5010a199e7cb0413a1c4e70f3b5c106b,2025-01-11T15:15:07.680000
CVE-2024-57875,0,0,3a16f7ba20f0485e3dd71d1132dd8a89eaffde288852f03ec6f11461188bba68,2025-01-11T15:15:07.803000
CVE-2024-57876,0,0,86fef3f8a5e8b98f66eadd24a1ef85fb6575aae013277463bce306740c013a1b,2025-01-11T15:15:07.930000
CVE-2024-57877,0,0,6cc5b6ddda506445b2c50af5c05c5b092ef136c192d216dd4cd3cf15a6a06d3c,2025-01-11T15:15:08.063000
@@ -273802,7 +273802,7 @@ CVE-2024-5789,0,0,9dcfcd4111ea0e9e739e91d8fd580d0fefd90ab28ec12c3acba80730fef979
CVE-2024-57890,0,0,876228291e28ce2dbcf91efd1283214e54d4069730fa474ebc3b3b0d9a53418a,2025-01-21T17:41:24.450000
CVE-2024-57891,0,0,cd33e3a4e8d37a5f36fd34bd5a361c07ff62e7972f171735ba5dd223fe03e6f1,2025-01-15T13:15:13.590000
CVE-2024-57892,0,0,4777094aae31385f24992b5ac3611a721c2d0a1db0618ebce759958271b159b5,2025-01-23T17:15:18.800000
-CVE-2024-57893,0,0,ea76fbdb02327d656582ece1adff77b631ec4a0f910aebc930df923bcb513738,2025-01-15T13:15:13.820000
+CVE-2024-57893,0,1,de1df3ef6db19acaf3c7c48dd5c62fb10118eacffbfad185b7dbbf80a82129c6,2025-01-15T13:15:13.820000
CVE-2024-57894,0,0,d7d6f6140de35b010b1b5beb6457a2e35be159e74f947f8b4b5cce28e627637c,2025-01-15T13:15:13.943000
CVE-2024-57895,0,0,9ad2e608235ea6296b191cd61921ed3a449403f186ff27dacefb37686d68c65d,2025-01-21T17:47:20.323000
CVE-2024-57896,0,0,594166af4dc3727612e48db8ff6a9be4baa10d714e9bf631f7889efcef1c706c,2025-01-21T17:45:10.633000
@@ -273815,52 +273815,52 @@ CVE-2024-57901,0,0,012acb0ab56cc61cb0a7817e0eee65ff7532b8e18ae1a7773ea269400d685
CVE-2024-57902,0,0,746e8d9a9ea49c354baeba85ccf563446e433549d54a4b087d31671d2185f287,2025-01-15T13:15:14.867000
CVE-2024-57903,0,0,50052b64b55d2c4762de701d92d82de00114bebd2de7c535247b43c4bcdb95f1,2025-01-15T13:15:14.973000
CVE-2024-57904,0,0,0da01fdb0e488747e29c64338b911494ba9256214263b5bcf307ede87831630b,2025-01-23T17:15:18.950000
-CVE-2024-57905,0,0,d3620fa4ac8a87306937d4e2b56bbe743d912dd8ed38df70240f222fe7e1af4d,2025-01-19T12:15:24.710000
+CVE-2024-57905,0,1,eaedf2e013c5b9eb4c722f559718a760736fa52ce79c32231cba28fe363a5ba8,2025-01-19T12:15:24.710000
CVE-2024-57906,0,0,3f3b1863cc7fc5315f586b8e77bb29b9900135f604688fa011dfb42840f6bb54,2025-01-23T17:15:19.070000
CVE-2024-57907,0,0,a26ab31f0f19dfbe39600c61c5a6561ca8464b78c9fb5e9ebb457dd3a72c2c8f,2025-01-23T17:15:19.197000
CVE-2024-57908,0,0,222d2a3894f0fbe66b72e0629b851bd7bf952fc6ecbcfc4ec514aa189ee3c2bd,2025-01-23T17:15:19.347000
-CVE-2024-57909,0,0,b43f2cab87455b830dceb0f50c529cc3c5110160cb6bbac92ceac57d733d961e,2025-01-19T12:15:25.083000
+CVE-2024-57909,0,1,20beca3b55e8ba8e1792a65aa4f8efba94e31f5b40d511d1b8cdf5c3c80696ac,2025-01-19T12:15:25.083000
CVE-2024-5791,0,0,c186795f1b9cb5c37849e995a8b3a0b74da1832637d3182b3a656dc9e7491fd6,2024-11-21T09:48:20.453000
CVE-2024-57910,0,0,2af2f67f4a77cfd3fca69c5ad4f828385fc90b32271f2397c7851dd44775195c,2025-01-23T17:15:19.453000
CVE-2024-57911,0,0,ff5ecd12078747d77578e60dd1d0e5b156b28c67ba70d866e566936feaaefaa7,2025-01-23T17:15:19.550000
CVE-2024-57912,0,0,fd1f9f30d4f58cbfb797b8bb38c2d0ce8004b95abd68dc3a9b7edf59feff8d2b,2025-01-23T17:15:19.657000
CVE-2024-57913,0,0,25ba5117d3f714505baa0a236a2ad08a7917e1ad6bd7be128417021ffea4c2f3,2025-01-23T17:15:19.803000
-CVE-2024-57914,0,0,85e309e9145cbd38d9d57d9b153e28eefd4191aaba0014a07ff96267a7570432,2025-01-19T12:15:25.573000
+CVE-2024-57914,0,1,843733c9a02866235086480f4d3b29a68896cb3ee300c2920535c66f981e322a,2025-01-19T12:15:25.573000
CVE-2024-57915,0,0,13b8822325644814e520e69e08dac26fd0c0682460dd85341f51cb2ef6e21633,2025-01-23T17:15:19.960000
-CVE-2024-57916,0,0,92a69385f522abe9ffb476a6cd9ec580ae292291f85ef182e3a11974f6bad4fe,2025-01-19T12:15:25.763000
+CVE-2024-57916,0,1,0f652372cdc52048530c608b55b545395f7986fa64d076a529ff1e83fb34d711,2025-01-19T12:15:25.763000
CVE-2024-57917,0,0,b1167e5c425222d1e86557f7fbfade37e2c05b542cac17d0614dacc0faf5facb,2025-01-23T17:15:20.330000
-CVE-2024-57918,0,0,0985a80618e31599fb15475d9d6fcbf08982f010ca993923a4a3c2be7a7124fe,2025-01-19T12:15:25.960000
-CVE-2024-57919,0,0,6c664a0abb11c547897613b59be54e309293f4de68c85e30c22cd68a92f75561,2025-01-19T12:15:26.053000
+CVE-2024-57918,0,1,51a0ae7790d69294b939f21a09ba710f5e4fba529bc7fb169229a8b80c38f093,2025-01-19T12:15:25.960000
+CVE-2024-57919,0,1,a919ba0f56bd6285ec7e7e9a0b4772bdadbb38e74f76504867054bdc580ce0b5,2025-01-19T12:15:26.053000
CVE-2024-5792,0,0,50e11f463088247110774be144fbfaca02cb5ac823192aaf13a748fe05bdb47b,2024-11-21T09:48:20.570000
-CVE-2024-57920,0,0,0b1d753b41b42d4b7405fa6955cfedb7556de7795a451b4ecb45fc20a587a4d9,2025-01-19T12:15:26.150000
-CVE-2024-57921,0,0,085be1fe849a71114471074b7a1c7f64e3d24b19763a90adf9d093e5b757e1fb,2025-01-19T12:15:26.247000
+CVE-2024-57920,0,1,05c144fc213deb035ca56e5f20c83d1cd18bb751206c0c2a6034a93879334dc6,2025-01-19T12:15:26.150000
+CVE-2024-57921,0,1,c7302d486dbfb4c3bec63ccb147bf84370f9dbf24a7b88cf2b3ffd88950eddd1,2025-01-19T12:15:26.247000
CVE-2024-57922,0,0,447718f7a22f81db92f75438022dfa31a73064392d56f233b92cef003019020f,2025-01-23T17:15:20.717000
-CVE-2024-57923,0,0,7b7ee22817d1763e3292d38ec5528d3cd3eb5a6e45a05da3d445bd0755022bd5,2025-01-19T12:15:26.433000
+CVE-2024-57923,0,1,8d53fe837f5375f53275d78002c8e62a8004542cf9a9d70aff773f09fd6c7f44,2025-01-19T12:15:26.433000
CVE-2024-57924,0,0,c92a50e178b5d221bdeae6b80dfc50cafc870e22fd3eee5233088f1c4de7f103,2025-01-23T17:15:21.070000
CVE-2024-57925,0,0,e8aff92882d12613d2e8ba940d419d1d26c5b2dc476bbc022ba2cff21e4b9394,2025-01-23T17:15:21.350000
-CVE-2024-57926,0,0,4eaac2edd5aec3c0ccd10f3a763ffe14a52a4e7f073846e72cc58f39987782ab,2025-01-19T12:15:26.713000
-CVE-2024-57927,0,0,0b956e6350555e8b5ea2acdf79ef7cfb9a66dd16a7df89342f758d8803aa3d26,2025-01-19T12:15:26.810000
-CVE-2024-57928,0,0,4412ceae5c4967ccbde2b773167aa35d2d70c86f93eb985ffd79716abee92366,2025-01-19T12:15:26.903000
+CVE-2024-57926,0,1,3dda61cb6722fbaa34a5b3b53b16059a90b8808345a9217cf2d2b2b690f7d11f,2025-01-19T12:15:26.713000
+CVE-2024-57927,0,1,d366eca00eae786b1e8dbb8a7d0110c89afc3da96a8ea7bd93a1195f0b99c116,2025-01-19T12:15:26.810000
+CVE-2024-57928,0,1,c958344925b23189b5084226c6eebf997feb724091f51913b4610fc8bba5819f,2025-01-19T12:15:26.903000
CVE-2024-57929,0,0,e34b45297c24cb40bd8e0f2d022a1c612846047e5ba3c1b22967a548dc95c543,2025-01-23T17:15:21.693000
CVE-2024-5793,0,0,0b18df4d2dde9f10f63097b806cad3cc9d51ae7c2ac550a36fec1a23c0e391bb,2024-11-21T09:48:20.673000
-CVE-2024-57930,0,0,28e6c7167ba130e9d2bb9fe716fd2e8f5146a8dadd573fe902b0a9d90eb763d3,2025-01-21T12:15:26.600000
-CVE-2024-57931,0,0,ef8b598f8ddd4428ab096ad25ca71fe2ac1458c1a2d30e4ee4df724312f40f52,2025-01-21T12:15:26.713000
-CVE-2024-57932,0,0,688bc5a581e562ea6a34243ed22eb114551e0d55b007f2c57ecd88c71662dd16,2025-01-21T12:15:26.837000
-CVE-2024-57933,0,0,a5f09101c1f266dd013e3ec124d1c1801c0703b5babe99bf295e942e95532e21,2025-01-21T12:15:26.947000
-CVE-2024-57934,0,0,43034e503550b569256632c4502d946f08931a3530bd54d0ff9ea3c30d627029,2025-01-21T12:15:27.047000
-CVE-2024-57935,0,0,e6daeb99554ae407cceaff9066c461bc5bc63d681f5adb174db5d16d19702a15,2025-01-21T12:15:27.153000
-CVE-2024-57936,0,0,417d6b45a5c6544407230a177f750b81a6fb6c38ea6d13678499dd9c742ed051,2025-01-21T12:15:27.257000
+CVE-2024-57930,0,1,94a6cd36a388f60e55b904e5c2967fc93fc62a2c24f551093d7bc1fc6ebce43d,2025-01-21T12:15:26.600000
+CVE-2024-57931,0,1,850feebef8f5e99716b8aee53bc54bf61303831fdecae3825f24d2fe16e517cd,2025-01-21T12:15:26.713000
+CVE-2024-57932,0,1,f682dbce85c95d101f3a39c1ce300ce214e215cf8183d2b35f730465c3db3f0d,2025-01-21T12:15:26.837000
+CVE-2024-57933,0,1,9cf1d2d16fb8806408444b80d535b523f7e8dc0e29e14ceb1a91cda4cc2d8096,2025-01-21T12:15:26.947000
+CVE-2024-57934,0,1,87a71e783cc1cafe9c0c331aaf1666cd30fefeb46d309a3fc6187b67dd99a6e6,2025-01-21T12:15:27.047000
+CVE-2024-57935,0,1,8b3eb97b6b95c3fe9d0c269036f5d7d9ad4b4664482a4f748b3e7a6a9e25f371,2025-01-21T12:15:27.153000
+CVE-2024-57936,0,1,76bb9a17847208e201d8a03062287095715af2de891728ec102a50fec66b64aa,2025-01-21T12:15:27.257000
CVE-2024-57937,0,0,f2713cfe55ce0b98723add19c398fbf3ee712c696fe715eebadbe1d21a06c1df,2025-01-22T13:15:20.400000
-CVE-2024-57938,0,0,b46b86ea806e0c459fb1ead615d70e4371d2946e79a6ef81fedd49881f631f14,2025-01-22T23:01:40.253000
+CVE-2024-57938,0,1,022de8c3b6d7b500c1435550930859d5402a56a98c16bccf8052dcc8ee4769e5,2025-01-22T23:01:40.253000
CVE-2024-57939,0,0,09f70c539d9230a19a35377691ed45128be51147eb85b3cc2374aa6a57fe1a60,2025-01-23T17:15:21.920000
CVE-2024-57940,0,0,b32ad53f455333b7451a9224681d2580d612a500a9a961f6409c7707b2c14096,2025-01-23T17:15:22.037000
-CVE-2024-57941,0,0,7f374a575eccdb21ec7f9d09d0a4e62f6384f134349957689e6f5a5cb2bb715c,2025-01-21T13:15:08.640000
-CVE-2024-57942,0,0,e3741427d2b6e1a9f599b350dcdf4410a474f8e8c65342410e7099c356758a40,2025-01-21T13:15:08.743000
-CVE-2024-57943,0,0,dc7e0684b8377f15667d88e1273c5a5004a8c0a280d7d1767bad721d5d8df413,2025-01-21T13:15:08.837000
+CVE-2024-57941,0,1,190517d4aefb28eedc9bf0b3a946b8bab0775c3c00af67d3032e3eb13313e131,2025-01-21T13:15:08.640000
+CVE-2024-57942,0,1,674dcdb666d8ffd6793b2df8b7ea512b83519af3dc884bfce784c82a02be56e2,2025-01-21T13:15:08.743000
+CVE-2024-57943,0,1,1e87abea139119874ac26247a034b80161926fef227cee294343cc884636c87f,2025-01-21T13:15:08.837000
CVE-2024-57944,0,0,69f37fc5a40b866c95e7b5f04fa783680bd7856897f3b164ec222c4155dd5693,2025-01-22T23:02:41.850000
-CVE-2024-57945,0,0,8e35c260271a7d05a4130bce464cd053ddcd7430dc8ad698dc9980a797cf9881,2025-01-21T13:15:09.033000
-CVE-2024-57946,0,0,c7f36f65d43623d48215412aac78ff97bd2f343757e90cf928c2a23f40930377,2025-01-21T13:15:09.137000
-CVE-2024-57947,0,0,a5bc692266299472dc91cada34422b6dd2b65fd92beba8b3a286d0b670606528,2025-01-23T14:15:25.293000
+CVE-2024-57945,0,1,ba7b321eb8cd0d1e792a1582e6a8309da43ab8d76c6981c78527fc0b4c2a565b,2025-01-21T13:15:09.033000
+CVE-2024-57946,0,1,7694bfd6f4bfcb27622fd33f724eed0c14a58bd72141bedb13eda08e23a02026,2025-01-21T13:15:09.137000
+CVE-2024-57947,0,1,0f394f81965ff60be8ebf8ad0ab0612e0d5ea1bd9618d127584b4c77570cc2fc,2025-01-23T14:15:25.293000
CVE-2024-5795,0,0,8c27870eb8f46b4876cdd6a9335698b3a6adeccd1af066b5f5391281ef70b349,2024-11-21T09:48:20.780000
CVE-2024-5796,0,0,10c3848976491ca5eeb295d89b1679f80388276c56109509ef1777f493022afe,2024-11-21T09:48:20.910000
CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000
@@ -274481,7 +274481,7 @@ CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d
CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000
CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000
CVE-2024-6465,0,0,68d8747a1edb551a38d59b6ec4dd4815476646c814dc40035dcb46acd92026f8,2024-11-21T09:49:42.103000
-CVE-2024-6466,0,0,5ff79ef0ff8a1740c75c5580a4a530d412de202f5b3d30fa93c1bfcb22d39fef,2025-01-21T20:15:36.103000
+CVE-2024-6466,0,1,99c40e8b7e6b5842d2d8cee45ed38675d3f81e54ab8f191429983e278d144783,2025-01-21T20:15:36.103000
CVE-2024-6467,0,0,9106e28416ddacf000ab37b1593381e2fec3faec61ecd6e9335c0f9dfca2fd14,2024-11-21T09:49:42.217000
CVE-2024-6468,0,0,bf6dfce1135e8cc0869c78add4d8cc7410dc08a391c67b63c78ccc7aa0f1b72a,2024-11-21T09:49:42.340000
CVE-2024-6469,0,0,762a4dd73155da121b92d0ce24e9b3e8d90a41d9c751ed8a9040813e9a61f6c4,2024-11-21T09:49:42.447000
@@ -275399,7 +275399,7 @@ CVE-2024-7512,0,0,6e6986c7b9ae27924efa1b771bcbe402501f560cb58148172cc36bd006ab92
CVE-2024-7513,0,0,a0b177aecfbd2f734939ad8dd9a1241704f6abbdbf43364c61f3c9c8ac7af1f7,2024-08-15T13:01:10.150000
CVE-2024-7514,0,0,14ce9dcc3ffed0373a6deaa5aa3e357b4b0f7014d133d7f13dac237fa2f5873a,2024-10-15T12:58:51.050000
CVE-2024-7515,0,0,144060b2d32affc4e63578ef1d58b4a89b0be73fa975a25e8bdeb2b20501ddf2,2024-08-15T13:01:10.150000
-CVE-2024-7516,0,0,75c839ba243fc9a30541086e075ac17ee9f25ebc08954bfad8d4c8ed1dbfe1fe,2024-11-21T17:15:25.520000
+CVE-2024-7516,0,1,852f3ddaf7a0c44d6dc8db6129ed31ca9ebf7633fb7316ad89e0114b4d95db4a,2024-11-21T17:15:25.520000
CVE-2024-7517,0,0,7efa31a8ab7bf5454771eaae8841c53ec59ba67a365b66dc848915031ceb3149,2024-11-21T13:57:24.187000
CVE-2024-7518,0,0,3b0dcafb77453d8cc2fdabac4c13d17bf38d6dfd279e8d4067ed746793e3f86e,2024-10-29T20:35:43.097000
CVE-2024-7519,0,0,05acbea0f5b6788e514f26ac7bbde64d19991e936293d8e0394f5caa6fb0f53e,2024-08-12T16:04:20
@@ -276406,7 +276406,7 @@ CVE-2024-8718,0,0,08f9f7324fe1750583259b3c93648593ad90bf879a6e322b24780fec64fd46
CVE-2024-8719,0,0,f09775703ce33efd1a382062d7fd99b2a3df4a10d5639e789be4bdf90386ec17,2024-10-18T12:53:04.627000
CVE-2024-8720,0,0,a92271303c4f165ef6918751e334ec6c2a5d2eedb6ef1b6e7529ea9a9bccddee,2024-10-04T13:51:25.567000
CVE-2024-8721,0,0,b55737cb0e83f3810876edbd5f2c3fe227126cdd659227e4dbd42dea98b92ee8,2024-12-24T10:15:06.803000
-CVE-2024-8722,0,0,797d6b7fa82068b880881b15e8ef201f4d1a15ebdce9f4386bc0b1744a17d6af,2025-01-19T05:15:07.987000
+CVE-2024-8722,0,1,eac57c815438d9019c9094aa8dff4d9b352cabd60ec25751095f7c5ae497a4d6,2025-01-19T05:15:07.987000
CVE-2024-8723,0,0,83a844d582685fdefc602bc8b434e71b492fde6813a7ae6c416922e3445759df,2024-10-02T17:00:23.603000
CVE-2024-8724,0,0,79eb3fc36e2ade01b1d81ee061bd0ccc9d41db170377c76707443e9b9b4c1829,2024-09-27T15:56:00.073000
CVE-2024-8725,0,0,46dd31707149bc30a113fe6e731b5768bd17b167e63d858b2e790e78d82762b2,2024-10-01T14:16:42.727000
@@ -276893,7 +276893,7 @@ CVE-2024-9304,0,0,0c5f7319a5f4329e1cad78a3bd868784935dd3f5c24595949fdd780973db67
CVE-2024-9305,0,0,67496173bf6765fc8feb128e0c96eb05e98292a81d60f1e0246a7dd00fc6c8c4,2024-10-16T16:38:14.557000
CVE-2024-9306,0,0,84a9ea83565c03ad670918f12a454396eb78292a897f7ffd96803c418d88cabd,2024-10-08T16:25:29.877000
CVE-2024-9307,0,0,5beeccc0d13dd928213a2571e46ba7a17d8dcf0dea0aa18ed538428ef3acf9d0,2024-11-08T21:18:16.210000
-CVE-2024-9310,0,0,03f0c6b5394ae42d4bf6ad12529344e08cf539504ebe9151257b67a1eaec0b68,2025-01-22T19:15:10.277000
+CVE-2024-9310,0,1,72831f9f181c5f7a631728f30bdbe11d8b0df441ba328570b5b567ebc5df3e27,2025-01-22T19:15:10.277000
CVE-2024-9312,0,0,0fd6178da2444019bc4e09b7bffd86350c5ac6210bde4d3d718739d29bb97fb3,2024-10-15T12:58:51.050000
CVE-2024-9313,0,0,4a370cdecaa476383f96e8d39069d449b031601015e89b01e1554e767bcd3c89,2024-10-04T13:50:43.727000
CVE-2024-9314,0,0,1ee9881095d3d64e7892961bc10913a640c149487c65cc5aa68787f2e938f9c8,2024-10-07T17:48:28.117000
@@ -277558,10 +277558,10 @@ CVE-2025-0299,0,0,3081f6deab5547666aabb0e346ae06d6f615099839721c542410106d67cb7c
CVE-2025-0300,0,0,8b048794f60fe275045fdbb30c1864513f09183fd67ca00f819acbe6a078dfaf,2025-01-07T17:15:32.090000
CVE-2025-0301,0,0,cda9ba0b82510401c2a22912601ff18ed3f9b7d844758d6122fa1a90dc462c4a,2025-01-07T18:15:21.460000
CVE-2025-0306,0,0,4d323f73db0781dad08a71cd877278ed734b33cabf11626e82510c57e39603e9,2025-01-09T04:15:13
-CVE-2025-0308,0,0,f89e0b2f51bdc31095df6c5f8dd7a032387c24a0f205d06445d4128d7f7c613d,2025-01-18T06:15:27.880000
+CVE-2025-0308,0,1,20b4c30a137b0aa706dc02a1057e58a96a971a6dabc5b03c8f76206a7f24265f,2025-01-18T06:15:27.880000
CVE-2025-0311,0,0,366f4de7a1625931fb622647148fc1b4e4ac9da9319c64a1d46f443dbcb2d417,2025-01-16T21:29:36.977000
-CVE-2025-0314,0,0,80ca5f927f75e0b60dc3f48da0cdffb06a6e0f021c4ff3fd3ad16896077ecbd6,2025-01-24T03:15:07.320000
-CVE-2025-0318,0,0,18fbca098a2261f52e0f9c17a94d13e877ff02eac8f34202aac0d050b892d79d,2025-01-18T06:15:28.017000
+CVE-2025-0314,0,1,d6f6a7f253b8a536b6fb7606569b954bc6b057dc74b0a95945c4b8f290e0c4a2,2025-01-24T03:15:07.320000
+CVE-2025-0318,0,1,43ba6204cbaa4c110e5bf9b669f9a8b449a31e92da6e4bc8237af066e2eac204,2025-01-18T06:15:28.017000
CVE-2025-0328,0,0,983a37850e7593e52c7049d9c87a360510a226adf3c659d5ad2fe111082fc07f,2025-01-09T17:15:17.330000
CVE-2025-0331,0,0,dbc642b98482c7a868d38d7a4b1240421a9e262e76044ff9bb695321876694a4,2025-01-09T17:15:17.933000
CVE-2025-0333,0,0,3183afb9350c8085fce656cea7939729bf7b0c3b383c8f7105e9da54dedb25bd,2025-01-09T17:15:18.077000
@@ -277584,9 +277584,9 @@ CVE-2025-0354,0,0,428d38f2781814173c07276c3123b7894bf18887b24de42981453e8b9fe91f
CVE-2025-0355,0,0,60139aab38184d5553deea3c96ee67451ff405f2b0f65acb32b8c01c91586866,2025-01-21T04:15:07.877000
CVE-2025-0356,0,0,00c4e703b995e5d2c2e4f165848b6efa20e85198e0b810bdb74efa5802e75a40,2025-01-21T04:15:07.980000
CVE-2025-0357,0,0,637a6ef73ca88597a9faee7a213f2c9e042293b4e1599306e7baf4be91a58fdb,2025-01-25T02:15:26.990000
-CVE-2025-0369,0,0,60e0263b7bdd9bb8b2fbff594a1f912ed9cb257670ae53622ab1064bad30f4a5,2025-01-18T07:15:09.720000
-CVE-2025-0371,0,0,5204757392b802de2ea741b3e076d05df7ac5ea75604db8718cee7d5330989cb,2025-01-21T09:15:07.747000
-CVE-2025-0377,0,0,aa55b8120230ab743cc2893b218f537bed059fac30bd283d6a35143ffcd50fcc,2025-01-21T16:15:14.290000
+CVE-2025-0369,0,1,968f1c7b7fff7a404f2212aa81591bd64fc1ef313f079e18ed81ef90b8b12902,2025-01-18T07:15:09.720000
+CVE-2025-0371,0,1,18ffada388be2678f214977e07d493519ae075018ff1c002d7153323b6bcbb2a,2025-01-21T09:15:07.747000
+CVE-2025-0377,0,1,1df5153b8a72b25478d0a1c4aa2347b3a7ff1e86a04300cb39dc18c1f91a367e,2025-01-21T16:15:14.290000
CVE-2025-0390,0,0,a9cacf0ddfe16d7ce6aba119743e725f69b4f5561bb60e372a0dcb6744d412ca,2025-01-11T08:15:26.527000
CVE-2025-0391,0,0,ab8f7905746a492810fe86765faefb1fff997fc4d75bb4be776d20c58a35599f,2025-01-11T09:15:05.937000
CVE-2025-0392,0,0,59785954f613ac3d294944412df9ed2ed102ba9c9ed7f965ef5916a645263c65,2025-01-11T11:15:06.657000
@@ -277612,7 +277612,7 @@ CVE-2025-0411,0,0,506084f290a8ea5ea4a0efc27b50984e7338b12946697eca474a50bc0a957a
CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000
CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000
CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000
-CVE-2025-0430,0,0,3df411857494f23f4104c7f6ca6fdc22130d91a76d6c4544b3161220203412c9,2025-01-17T18:15:30.920000
+CVE-2025-0430,0,1,a8200addb62401843f5be6a163be32dcec6bbc5c81068c809f1c7b05c4147e88,2025-01-17T18:15:30.920000
CVE-2025-0434,0,0,9423e4a9647036afb879cbc64af4784af28d91fab549e68c542c16a9ee7ea8f9,2025-01-15T15:15:14.273000
CVE-2025-0435,0,0,6d6e40a41cd469c8312087bc239581bfd90670921823d0c0e139702d7eee198e,2025-01-15T15:15:14.430000
CVE-2025-0436,0,0,1941a6cad10f95e483c28366f53c7ac5f049d3cbdae2452e2d07517bee4202b8,2025-01-15T15:15:14.620000
@@ -277626,7 +277626,7 @@ CVE-2025-0443,0,0,c1909e796cb00e8de6a9a5854d80254cec51da86d4853de7e67dd141d38121
CVE-2025-0446,0,0,94e6a4f8238ac08191b1b1193dfc6ed660ba2c81f2654a86993face2b3a1da98,2025-01-15T15:15:15.960000
CVE-2025-0447,0,0,3557744a211333232e7804efa6ea8142b021fe0e2643e57c3966ef0e6eae106e,2025-01-15T15:15:16.123000
CVE-2025-0448,0,0,fd891759faceb30544c1e8bca8f73da87c02e801462e8b0ca59fcc1cdae9bb12,2025-01-15T15:15:16.277000
-CVE-2025-0450,0,0,72a68fd04846059d252f15073dbabd133ee3ab883fab4b780450285039285c87,2025-01-21T11:15:10.593000
+CVE-2025-0450,0,1,b38cc1b8bbfcc6d3647330d9f8e0167854327a3c3ad51d1f3e314ec78717ad4d,2025-01-21T11:15:10.593000
CVE-2025-0455,0,0,0788a35b7031b1503942329db48de69d2dae6db6b33ff6b776c7fa5eff813a90,2025-01-16T02:15:27.203000
CVE-2025-0456,0,0,c3118eb6282d0d2d5cf0b0b18ba4321a7c4ee4642eefb293f75da78a6b102328,2025-01-16T02:15:27.387000
CVE-2025-0457,0,0,6c68c67055a4f977d01fcaec54af3a741663b7ba3a654f25dcda2d901b15c7c0,2025-01-16T02:15:27.553000
@@ -277642,8 +277642,8 @@ CVE-2025-0471,0,0,9169e9b54a074f1e0d8f97ed160fc9e64cab0efe853cd7456e368c08c8fa76
CVE-2025-0472,0,0,0f40580898fe8da8d58e11b525a8aafe4140ddc85dd699a671742e2ebf135a96,2025-01-16T13:15:07.353000
CVE-2025-0473,0,0,1dd10a9273539100ae454eabb570ef30f5a1ca54c056c49681717a1070ea05e3,2025-01-16T13:15:07.540000
CVE-2025-0474,0,0,82177afd4a03f9b6718aa062961dc28425e1582c17c2ed083ad764687f417f46,2025-01-14T19:15:32.930000
-CVE-2025-0476,0,0,d5dedaf074b8e1ffdbcdfb09b37c5419fb4718d4a0a50274a1a3fdd85de6ca12,2025-01-16T00:15:25.217000
-CVE-2025-0479,0,0,6e614cded5f343ee5bef56c97dfc84718ef3f3e1c55cd2c6a9e5eb3afc8bed99,2025-01-20T12:15:23.563000
+CVE-2025-0476,0,1,fac19eeb41e69ef9b9ba32b4e73c5aedd599dc2dafbcc6b1f4512a698dd08737,2025-01-16T00:15:25.217000
+CVE-2025-0479,0,1,3b74b294c992ea5491503457a835103494c1a2488659275a1f3a07e930c3a2a9,2025-01-20T12:15:23.563000
CVE-2025-0480,0,0,0cb09a8f6ce0b89170992f0c154f24058b4f34598442baf21a60641247a52751,2025-01-15T18:15:24.457000
CVE-2025-0481,0,0,ea23d14dcc3acce7aaf6b481730febc16b60b2cfb742b3ce32274b3236e29b50,2025-01-15T19:15:26.807000
CVE-2025-0482,0,0,51755e11e1fe85bcdf8c3ef7c747a7a90c189e81d239d3c797b168fc9a111599,2025-01-15T21:15:14.653000
@@ -277660,64 +277660,64 @@ CVE-2025-0492,0,0,84421fce7cc144b94f0258c9d48e69eeae8d312d182afca6c8016ab8e7304b
CVE-2025-0500,0,0,becd023656775ff5c4936a59a68e6a89715d3f37dd13ea15331831b7fe4160a8,2025-01-15T19:15:27.003000
CVE-2025-0501,0,0,ea1a77153105d5c413ffaf8904427d77aca61ab1caf34964f69950874cc4ca25,2025-01-15T19:15:27.190000
CVE-2025-0502,0,0,bf19161cdd08710fcd7f99c1f7c838e68552d69acf9f5504bdead56cab49bd6c,2025-01-15T18:15:24.650000
-CVE-2025-0515,0,0,04ba16d00bf299820d0a2921e327edb4cf22faf321c246adae3849e409768183,2025-01-18T07:15:09.903000
+CVE-2025-0515,0,1,5ac36c3cf0188576defc5041e4d2f1cb1b09ae44d7e3c5256fa040d2f88a4731,2025-01-18T07:15:09.903000
CVE-2025-0518,0,0,6d3c5b8ffb150f75c389bd7e05b7aa905d22be4fb895631f5a9526d167be6180,2025-01-16T17:15:12.577000
-CVE-2025-0527,0,0,5f842d2c319b31715d60bd1a297bca44c8c2e53a1d74ca710562a1fb7cff2398,2025-01-17T14:15:32.840000
-CVE-2025-0528,0,0,a15c2aaa54c0d6dda4ceb20cf00f64dbe2db0fc4448eba47d2af25047a4d8649,2025-01-17T15:15:12.430000
-CVE-2025-0529,0,0,69e90ad7e3f6788572850afb1656942815d90ae34b98fce961e18202b13be561,2025-01-17T15:15:12.670000
-CVE-2025-0530,0,0,e5a25d489129220890dc2444b8dbc044679c369120b99e93eb7cc0e0c586681e,2025-01-17T16:15:33.937000
-CVE-2025-0531,0,0,70772c7ab6e128acaeccb2025ef3d3d40ee700c16af0c59c4844f2cb87966cbf,2025-01-17T16:15:34.250000
-CVE-2025-0532,0,0,57b53e96da2412756b4fef80266712dadfdebfb11647f2c711ae8c21db4e262f,2025-01-21T16:15:14.560000
-CVE-2025-0533,0,0,7f9d32a2b8498bdcb13287d845ecf92659d969c766d3960e43e297ee75f74856,2025-01-17T21:15:10.487000
-CVE-2025-0534,0,0,aa1feda9d93d553c893a821acdcd6e6031ddccdc91780da53a73a7286a0a0e2d,2025-01-17T21:15:10.650000
-CVE-2025-0535,0,0,5a48cbe37cc6faf64ba365aa6de697acb47cafc26dc38136399586f670165567,2025-01-21T17:15:16.677000
-CVE-2025-0536,0,0,bc38c8ba5af4e7472d7f22d13aed2c6d2fe30298a4c118afbe0638c85b0b1188,2025-01-17T20:15:29.583000
-CVE-2025-0537,0,0,e9b01e0e46262a9663cbca458d19a40294de3b3457766cc7a94219e1b39c3a92,2025-01-18T09:15:07.307000
-CVE-2025-0538,0,0,fdb71c169a1ff00025f3221162997061f56b4148118b4d440f7c0776cc2e91ec,2025-01-18T09:15:07.570000
-CVE-2025-0540,0,0,0fe6a3968060e1d9e108f736a24030b6ee6db8d0695d6022f7d1a51c2ca09a50,2025-01-17T21:15:11.037000
-CVE-2025-0541,0,0,422e97928ac96e00be4b8b72ccf9ce9a6f4a23518705054b1953468a190b5cd0,2025-01-17T22:15:29.337000
-CVE-2025-0542,1,1,ec3a256d444b58c869581713e9014aa5027c2a9699d557e8128524bd9c3636a2,2025-01-25T17:15:21.030000
-CVE-2025-0543,1,1,b9d3d0389afe479b9b0ba48f494bb68f90326db92d7b20889079c93d18253dc5,2025-01-25T17:15:21.720000
-CVE-2025-0554,0,0,7cdbd44c1d3cc981944ecd6d5c9c3ad7d1c5de5034144b9547e97228edf48404,2025-01-18T06:15:28.160000
-CVE-2025-0557,0,0,02f1591d13c69cc704deb2418c78ecda10342b88f0da7a742a9052ce142dadb8,2025-01-18T09:15:07.710000
-CVE-2025-0558,0,0,e6ae7cd63ee086a636ac4e9d186d59f2a3d6ddbb3865e941307bd5dda93830f2,2025-01-18T13:15:20.417000
-CVE-2025-0559,0,0,df08034282181cdc941834fd33602e6c18b0d413afe7d3021c77fd9edddb43a9,2025-01-18T14:15:25.420000
-CVE-2025-0560,0,0,a8dad0e6326d118750e8c8a516030a35fe209a3585b22295c165d1200aa0617a,2025-01-18T15:15:08.343000
-CVE-2025-0561,0,0,fd9b012ebdaece6d373c25b915aa1ce00990c69daaaaf36bf7683a0e1e96a65c,2025-01-19T00:15:25.077000
-CVE-2025-0562,0,0,c526f2bbf0ee53dbd7b87b3a977b73812d0b8c8e2d0a2cc04f356d0f5568981e,2025-01-19T02:15:24.380000
-CVE-2025-0563,0,0,c8aedbc0ad6c989f8bd21315356fde60bbf39135f127f9d691ff6d583ecc9784,2025-01-19T02:15:24.560000
-CVE-2025-0564,0,0,83206ab7d4a6b165cdb38999cbacf04d2d848dbd063370cc5da16a0083e91bfd,2025-01-19T04:15:07.090000
-CVE-2025-0565,0,0,9e441f2e362b4078450931d0ef12dd08184a10cee05c1fd1b5de39e0c8230d42,2025-01-19T06:15:06.820000
-CVE-2025-0566,0,0,29c988a17c3fb61aaa2263e5040acaf54697440fab1afb4ecce6f68279db4262,2025-01-19T07:15:06.407000
-CVE-2025-0567,0,0,12e8fb9b6df8c41abec3a05439a422290094ca4ba107624ce5bfa8b951012bc1,2025-01-19T08:15:06.637000
-CVE-2025-0575,0,0,d4d2531949ce585bd3baa2e011227dda5e0ee79ea48b13bf070b89056542be86,2025-01-19T23:15:20.013000
-CVE-2025-0576,0,0,33042c2c9506f882ba6a621133bd8825c25f4dd36b4e81f06b5571a45795f2e3,2025-01-20T00:15:16.320000
-CVE-2025-0578,0,0,764ff709c23ac6178f7d66316cb4aec54b2dfbe6625cd8cb6a69eb284ca4d3a9,2025-01-20T02:15:18.913000
-CVE-2025-0579,0,0,4bf4284d61e0ebd3bbd203f2a976e8a3dd3acde8d57175905d24e3a8040c3de6,2025-01-20T03:15:08.353000
-CVE-2025-0580,0,0,82b3778c09f3d27a4fa11249a0e721a1762d63be7160786d6b647269f397a1a7,2025-01-20T03:15:08.540000
-CVE-2025-0581,0,0,13fb6e24d315bd45783b9c0881a22fb74d00e7171e4dd037493ebd439940d206,2025-01-20T03:15:08.737000
-CVE-2025-0582,0,0,ea0037b479d3b3b435211f8fd8ac749d947b1ab1b6f1628bde45f368e3251d18,2025-01-20T03:15:08.930000
-CVE-2025-0583,0,0,8ed8078758003cecf37178786f4bd906ad77d831a470114523ae1b97531b8713,2025-01-20T02:15:19.767000
-CVE-2025-0584,0,0,37edd7443b159fd364fe1f94f606e27d6a33e0c9083f38da0f466f56b50d0a54,2025-01-20T03:15:09.120000
-CVE-2025-0585,0,0,da99d05fd55072bf46a920856a2fb4b6ebf8e817a63e5b48426e8c31494a0fa3,2025-01-20T03:15:09.283000
-CVE-2025-0586,0,0,abf0a06c875b8bd5421f2c6f6ef5b8719d6ca1dacc61f1270de8b585f4b2e6ab,2025-01-20T03:15:09.433000
-CVE-2025-0590,0,0,c554cb9a0bdc14b97d65dbcaf6b8f0519615dcf5380f9d8d26f0b94a792fad9b,2025-01-21T15:15:14.117000
-CVE-2025-0604,0,0,87d9407a02620becef67b9dd9028944889fa4567f9f58fb72c0a174c2afe74dd,2025-01-22T15:15:14.827000
-CVE-2025-0611,0,0,9364b1416a7a33dd471b0c521a34c8b70fa6951c89778d62b69aa66a8efa50e8,2025-01-22T20:15:30.860000
-CVE-2025-0612,0,0,1069fb650a0c64c6cad9693950a6e4f99324eb2817faaa8c05920b69ada2dea1,2025-01-22T20:15:30.957000
-CVE-2025-0614,0,0,c85e5b141df45983a9b8023744afed1074e3155c77698a4efcba3b1933f20f8e,2025-01-21T12:15:27.580000
-CVE-2025-0615,0,0,24948b17ddad86445a37019481e808c754a1ff5ca4b2da53c27f9618c73c00c8,2025-01-21T12:15:27.737000
-CVE-2025-0619,0,0,d46ffdfae1888b85241d4dc2752362911c1afe391e732b7c722898ead62a749c,2025-01-23T11:15:10.700000
+CVE-2025-0527,0,1,290a49b972de635b98003404e947a6429993db3c6731bc1fc678a3824730e7d5,2025-01-17T14:15:32.840000
+CVE-2025-0528,0,1,e3f7a40f975e109bf5214cfef482edb88f65284729988309787cc2f9ee957859,2025-01-17T15:15:12.430000
+CVE-2025-0529,0,1,b7599e714e3df556905823f6cbc3ee4b0615bbfc883d87e213cfa26e9ecdbabb,2025-01-17T15:15:12.670000
+CVE-2025-0530,0,1,880ebd5c2e3e16a0178d5956810c2f8d863e8c374c27881fd797cbb15a4aa313,2025-01-17T16:15:33.937000
+CVE-2025-0531,0,1,4b60c2c1860877e99541b9d489b8f336ac72e7ec80c53e83f54ef57a3ad8cbc3,2025-01-17T16:15:34.250000
+CVE-2025-0532,0,1,e13cfbfb42c9094cf8c5a6935bd3b0d442799ada29316df86f31dce0e09823f1,2025-01-21T16:15:14.560000
+CVE-2025-0533,0,1,1dedd3e4a1234a5a47eb7b62083704d58f5b3df0c80e59037ac80e845228d0e2,2025-01-17T21:15:10.487000
+CVE-2025-0534,0,1,34983a4241e36f3fc78b62b2b2d44b507f8674acd51eab0825ea4c631744e146,2025-01-17T21:15:10.650000
+CVE-2025-0535,0,1,104e981e15294dcff5cba7f6eadb4a5b0a5c7a8c4d210171d1e7e3c26467bb96,2025-01-21T17:15:16.677000
+CVE-2025-0536,0,1,450b477dc0d2d4fab7e064af8be5e0569f64a4fa6080592520dccc9dc928926e,2025-01-17T20:15:29.583000
+CVE-2025-0537,0,1,4b1002dc1eb1213d494971ccfb4702896c02b2b033946d506b40a21dd8fe0327,2025-01-18T09:15:07.307000
+CVE-2025-0538,0,1,964141e7bb34fcd4b7e631b4a78e6c4c2463ad0a610a3ec6b17fc1543871804a,2025-01-18T09:15:07.570000
+CVE-2025-0540,0,1,cba602a12922bb21512b3481971d044c5bbff78d40d55caf4f2c11731dd91971,2025-01-17T21:15:11.037000
+CVE-2025-0541,0,1,2bcf4b49dafe0ca8072dca95d533896ed37e1521635c2f052072b52c75beca7e,2025-01-17T22:15:29.337000
+CVE-2025-0542,0,0,ec3a256d444b58c869581713e9014aa5027c2a9699d557e8128524bd9c3636a2,2025-01-25T17:15:21.030000
+CVE-2025-0543,0,0,b9d3d0389afe479b9b0ba48f494bb68f90326db92d7b20889079c93d18253dc5,2025-01-25T17:15:21.720000
+CVE-2025-0554,0,1,d63933ab2a1fc2c70aefeeec5806ddf95b1569c2ec4a93f64ef98e2e1c34bb43,2025-01-18T06:15:28.160000
+CVE-2025-0557,0,1,e808bac35fe14e1bd365beea3de65d9f8e7338d7448163ead06636689058d369,2025-01-18T09:15:07.710000
+CVE-2025-0558,0,1,27ffe131a6321b0cb805cae5fc680fb74b1dcbc47a4ad8efbfdf40a5f678d3c5,2025-01-18T13:15:20.417000
+CVE-2025-0559,0,1,0a800171c944689ff17e82031a900e5ceea035631c8364601a835471cdd72821,2025-01-18T14:15:25.420000
+CVE-2025-0560,0,1,e77afe8274e70825762583db5d3f4f7b4102d4740927e5bb9870063ef31b46fd,2025-01-18T15:15:08.343000
+CVE-2025-0561,0,1,91221a1dbf30e889118c136f255a866d7a11c4d0a6d65bfaa1646f0f9921d939,2025-01-19T00:15:25.077000
+CVE-2025-0562,0,1,e5aaaf44b32efc0666630cfaff96c171c72d4cee7e5cb5692b5ebff44d9e90ad,2025-01-19T02:15:24.380000
+CVE-2025-0563,0,1,ef7f44d10f793d1a3544b68b3af5562459dc53b1a17c78226f8657e7c2bb608a,2025-01-19T02:15:24.560000
+CVE-2025-0564,0,1,650024fd0623317926e582a4bc38450ac7a271a00a83ea4a9c09178300ec9577,2025-01-19T04:15:07.090000
+CVE-2025-0565,0,1,6d54c323cb03fbdc464fad55525c07932b33678b23db46f9285fc46354f35617,2025-01-19T06:15:06.820000
+CVE-2025-0566,0,1,0c4672880628de41f7c45af060cc7b25efbd38a8957fdd01f169568312b347b3,2025-01-19T07:15:06.407000
+CVE-2025-0567,0,1,b74c6df89c0fcb1255eef76d90ddfd33f5a9dfee00996fcba186fc7c7f150e7e,2025-01-19T08:15:06.637000
+CVE-2025-0575,0,1,03dc0a766dd40ef1508c8693499211717a20a0fac5daca493e9cc3db02b14fbc,2025-01-19T23:15:20.013000
+CVE-2025-0576,0,1,0748bbaf647d6707eade27f8dc93756df57bac5912fbaf14160dda0b1ead7d0c,2025-01-20T00:15:16.320000
+CVE-2025-0578,0,1,f37c1d0a7be8fd73d8bd509c7e4aac11e1c01571a42f10fb7d9157af68e7ed19,2025-01-20T02:15:18.913000
+CVE-2025-0579,0,1,6625b5b44c1ffa5ca8fe2b0cc837b5a19cc4d2842a43eb1a65246486eafcde23,2025-01-20T03:15:08.353000
+CVE-2025-0580,0,1,fda8fb61a3cdc2db3fcdb8292f5345d15c29ba314f9f65646414ca046ec89171,2025-01-20T03:15:08.540000
+CVE-2025-0581,0,1,355111966a7748d8c66c0257b3ba9c482eb1d91c4772bed9ef3dccba11b714cd,2025-01-20T03:15:08.737000
+CVE-2025-0582,0,1,0999956d4cba806a318a373076bdc5a35f0cc37f4d3d3d0d2f1dd4d99bc1270d,2025-01-20T03:15:08.930000
+CVE-2025-0583,0,1,3309be0bd9417030616155e70103c52eaa78dc57edd605475e0a342fdeb59935,2025-01-20T02:15:19.767000
+CVE-2025-0584,0,1,b6ebfcb7703542335a8173fc5a4ab8c33a7e3e0c6c92bba5dc58412b0c892d56,2025-01-20T03:15:09.120000
+CVE-2025-0585,0,1,119134bf231d480ab92b157699965013bafbfc56920a2e232ae3b58aecfc3ffd,2025-01-20T03:15:09.283000
+CVE-2025-0586,0,1,c173218ec5f02f93feb0d4cf939be10f56c7035ad9f75a3f6402979497f3b437,2025-01-20T03:15:09.433000
+CVE-2025-0590,0,1,95827083638699773bc7292ef6b29aa078951517d7ac26deb9bb9819d19a8b52,2025-01-21T15:15:14.117000
+CVE-2025-0604,0,1,3cb99a99633c427e33c4b1743e20c64e11ef1eac358bb5492ee1b6b1ccdc4014,2025-01-22T15:15:14.827000
+CVE-2025-0611,0,1,33818d84cd766c795e916835fb8e5f709c092788d1af3a8a445def22659ba4fe,2025-01-22T20:15:30.860000
+CVE-2025-0612,0,1,74eda8f03a911d68e88afbdbaf458bf6e2093d241acc11fe4e39d5637d890647,2025-01-22T20:15:30.957000
+CVE-2025-0614,0,1,35aebd2508e8a73e5890659bb27b5833c263157a992866f88cfa4a06211488f5,2025-01-21T12:15:27.580000
+CVE-2025-0615,0,1,ebbe675921592ae8cbe2172db6e2765a464d273fff841eec1146e0ddf51f2dff,2025-01-21T12:15:27.737000
+CVE-2025-0619,0,1,76104b7b24094ee59b4cec6d4f4ee7db8e2e97a6bfdfd21603079adfc8fdb2bd,2025-01-23T11:15:10.700000
CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000
-CVE-2025-0625,0,0,97945102dd6c22c6dc52ba933146d415b8d38ebf36377c41b72b344e1c0821f3,2025-01-22T19:15:10.397000
-CVE-2025-0635,0,0,2046aa43a5a3ad67b4f86fa1a13efb4964c1879d2d3815bf714cc71830b99120,2025-01-23T11:15:10.890000
-CVE-2025-0637,0,0,7558412677df096c788c66c019e4972a9d596c55f846c7ce4b4d39874f828668,2025-01-23T16:15:36.617000
-CVE-2025-0638,0,0,ac9cca0d245198ff4674963eab0600993bc0b56692f14b75cf07327388ff27d0,2025-01-22T16:15:29.977000
-CVE-2025-0648,0,0,f9d79465ad3803b75ff57d725f789e40aa0e726161afba05440d8db3881a4794,2025-01-23T11:15:11.030000
-CVE-2025-0650,0,0,c255caf8716f9fc68172a701cd0571e8e2d98976a4a7a688b3c43cb943fe86cc,2025-01-23T18:15:33.110000
-CVE-2025-0651,0,0,8c67aa0f80c9f1e30412c542495f9f971e1fa118a8f80db65a60da0b955bdf05,2025-01-22T18:15:20.363000
+CVE-2025-0625,0,1,7f36541620787f4bb57811d2ab5017a08dd72bab5c190081458ac3e7009d06f3,2025-01-22T19:15:10.397000
+CVE-2025-0635,0,1,48e9501b358d6daac6b23f86a2f36310ca1507ac697731ba1d1365d13a451552,2025-01-23T11:15:10.890000
+CVE-2025-0637,0,1,527088f0979b18ce444b6ef69464399256b011e8d9eae0913ca1205a9c4503aa,2025-01-23T16:15:36.617000
+CVE-2025-0638,0,1,a6e4b77b7413b2b4aa2934053a70dffa8b1ba9dca4ba939faec1f3b554888d0d,2025-01-22T16:15:29.977000
+CVE-2025-0648,0,1,7c07f8a9922bc43bc4487ab208bcf7a7d7e60788bb09a129a0ee4eabefb874ff,2025-01-23T11:15:11.030000
+CVE-2025-0650,0,1,663c6fb0447de5acea936c032379a880e4e49090359ea8a19f79bd3aea4faf70,2025-01-23T18:15:33.110000
+CVE-2025-0651,0,1,98e32274420f8a5656f4a2c8f7df94f72b4c741ddf88cf485a3c74564694db6e,2025-01-22T18:15:20.363000
CVE-2025-0682,0,0,92fd5473746c4976c6352d82859f2d6dd42876faa3743bd2fa1f5cfd951d9a04,2025-01-25T06:15:28.740000
-CVE-2025-0693,0,0,2dbd0ee2fa3f9bda7df2c547c0b425cdbbb9ef75c33ee753ae3804f02fa74725,2025-01-23T22:15:15.397000
+CVE-2025-0693,0,1,14192c50df5b152461c9d8412a1ed956f9746262f631bd7707b7658d21e54a87,2025-01-23T22:15:15.397000
CVE-2025-0697,0,0,2b300d6fe20cc05389e1f1da76da10c584853d80e73da80ea6280f5fc93d0276,2025-01-24T15:15:12.130000
CVE-2025-0698,0,0,41b2c00dd6b2e11497e6ad0d5935ff7e418c7e8ce23cb7590bf86289758b8bd6,2025-01-24T16:15:37.717000
CVE-2025-0699,0,0,a52cce5fc729b9f7c244ab5c5dc069fe63ab6c6e0e5e97843aece40a8ddee923,2025-01-24T16:15:37.977000
@@ -277739,18 +277739,18 @@ CVE-2025-20055,0,0,2d78db23287090ae5d3190213b75b348c3d1d689e77c9b32372b6d83b934f
CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000
CVE-2025-20086,0,0,c718ee138c5d706935ee7319c465eb1db60c32a8ee92f074be268892106cc0d1,2025-01-15T17:15:19.107000
CVE-2025-20088,0,0,d069a0a8d0e55448ae448cb2d1bba620f97cc6785542779fdc1ef2f2206cb89e,2025-01-15T17:15:19.243000
-CVE-2025-20123,0,0,54512af23f890abd1fef44213c66523a0b62c1420699fcab5bda08e37f5f4455,2025-01-08T16:15:38.150000
-CVE-2025-20126,0,0,0fcc9383f8a59c5e0d551ae3c2ee7933f9c74701d79731c282030a0992412e7d,2025-01-08T19:15:38.553000
-CVE-2025-20128,0,0,47fb5de6da06ac449d2610501ca34ca927a02f85d092f55ceca7dc5b48f1b121,2025-01-22T17:15:12.583000
-CVE-2025-20156,0,0,4bfc4209b2cfe36d0a3ee83a991ba63b278b5299bedbcd6f0e6a8f03afd401ff,2025-01-22T17:15:12.800000
-CVE-2025-20165,0,0,7c386eb2d21dbfcb92b62e0c7c9dd42da0645cf465e4c16dec26060ce9893e4e,2025-01-22T17:15:13.010000
-CVE-2025-20166,0,0,188546bff78f1ed6c60c3dafa709981ac0aa7d116e226da5b14281c3f0f04183,2025-01-08T17:15:16.990000
-CVE-2025-20167,0,0,ea01454738582257d8f0561c538bde2bc3fca79642eac6232d7fa05917ea3b87,2025-01-08T17:15:17.163000
-CVE-2025-20168,0,0,f8a58ad4899086a228f10ada9d537b9205b9094ad2b0c298be3af0260ad230d2,2025-01-08T17:15:17.323000
-CVE-2025-20617,0,0,bfa0a81d5c608982ed2e777c1a51e6c6b6af19a2b00cd034d1118bfd02ffe398,2025-01-22T06:15:14.170000
+CVE-2025-20123,0,1,de0e2ee9204f4a04ceea1910b99fa9c19c34866a6ef4e69299265f979ffad510,2025-01-08T16:15:38.150000
+CVE-2025-20126,0,1,3777d2eff476c85da5fc4cb45d8938a798421c8f7fbe1d8cce16b92ec7e53c3f,2025-01-08T19:15:38.553000
+CVE-2025-20128,0,1,49a3ea4c4c30c63722b70d40b0901308ccfa54cc2769e27e3ea6c87f09ff367e,2025-01-22T17:15:12.583000
+CVE-2025-20156,0,1,9da0b6298f862c0f888e3d1071042845f197256e6c0fb045f01a2c7b704c7311,2025-01-22T17:15:12.800000
+CVE-2025-20165,0,1,245fa887fd26631b8371ae5a07816457d0e1aa152c69949ce63e7ac0e9c502d2,2025-01-22T17:15:13.010000
+CVE-2025-20166,0,1,96d5726ca24f4531a66ef2215a68dccdad336b2fd7d2f71791c019cb3a6d5163,2025-01-08T17:15:16.990000
+CVE-2025-20167,0,1,07090f5f73893ce7a7f63b8dbe397ff57d54c4cdc37bbefbe4dc905874869caa,2025-01-08T17:15:17.163000
+CVE-2025-20168,0,1,24fc772dc3ea5c2e7c84ac7fd0e2daf2c33d11c28d47f590a8d9933ab82b49d9,2025-01-08T17:15:17.323000
+CVE-2025-20617,0,1,5e5337fea3f32f18b26cd8ba8dd17d3809fb24229b1710efe951151848f1eb60,2025-01-22T06:15:14.170000
CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000
-CVE-2025-20621,0,0,6a114b51d7b17c045df262a66b6010baf7d9e3634e11632f91e2ccc96791ec1e,2025-01-16T19:15:29.960000
-CVE-2025-20630,0,0,b69f04020608923d2a464ad06edf2aa9ee933f1eafbc166f5b91bfd601e0dcfb,2025-01-16T19:15:30.110000
+CVE-2025-20621,0,1,060306fc4f84916fe909badb69a5829b34e2103b61fada341bb3713a68cfaebc,2025-01-16T19:15:29.960000
+CVE-2025-20630,0,1,0cb6d1c0b91807d74fd49faca2a027b3e775f1213907ee8f88e4e58cb3b78a59,2025-01-16T19:15:30.110000
CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000
CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000
CVE-2025-21101,0,0,1ef0167ef283dbabcdd7bd0e2debfd81378d1bf596b30170903b5a150ed83abb,2025-01-15T05:15:09.097000
@@ -277775,7 +277775,7 @@ CVE-2025-21172,0,0,e507c34130e80c6d7033019b7ff6f972bf61409eca72ebd570f655cdb9708
CVE-2025-21173,0,0,35ad3b00f130ff650bc6985e9c58510abac9fbd2f22ee21de290af1f777d528a,2025-01-14T19:15:34.583000
CVE-2025-21176,0,0,24a3cd046462e2f499d67b72b0cf5d2fbd91b0e878ed5c8363cdc49fdb58a368,2025-01-14T18:15:30.650000
CVE-2025-21178,0,0,313ae4e0255420332c87f4825c14d5de2516b425bf7ab10262d7813f1cb6e8a0,2025-01-14T18:15:30.847000
-CVE-2025-21185,0,0,1af79d3ef8f65c7dfb2c433d952a1d4f646119e4c304c6d9df90c5fba85cd1b8,2025-01-17T20:15:30.227000
+CVE-2025-21185,0,1,cb41c813b9325abbb01bf8ec1150f2d28aba165b47e2e45a6d0824ced24c6771,2025-01-17T20:15:30.227000
CVE-2025-21186,0,0,cc2d8a401f7f9d2cfee0bf21abab5b274fd96e0897d49742eb2f3685fa223624,2025-01-14T18:15:31.020000
CVE-2025-21187,0,0,16c411919c8d70c5bf88b3d7e5ce61dc3c1053f79679db20c0c8f7d2300656b0,2025-01-14T18:15:31.187000
CVE-2025-21189,0,0,af4658d3043c8d39e52bc68c4687db71941c01caa1f102e9573e17a0f099616a,2025-01-14T18:15:31.377000
@@ -277873,8 +277873,8 @@ CVE-2025-21309,0,0,43e88773ce79d3ac8425da5b30cafca156a5dbb4eddf0e3167581fbdb45e5
CVE-2025-21310,0,0,099e46304a735e30a828bfef6909dde2287720f5a5b8ca47538d7896500421bd,2025-01-24T21:50:53.527000
CVE-2025-21311,0,0,c1918edd35606730332735ebee7fb7970341bc3e23003b52c67502e783c288e5,2025-01-24T21:51:02.927000
CVE-2025-21312,0,0,47b42958fc99f7be1ed69c7cce535e211c2a133d312c9defde333ac23751e538,2025-01-24T21:51:19.847000
-CVE-2025-21313,0,0,7ac3ef64e6b325e25b46611210f95c57375237478ee561be5061d04148cdca80,2025-01-14T18:15:55.007000
-CVE-2025-21314,0,0,e10d4e44e3792ecb48788730063ade6b797b0fa3f6d495c19fac3cc1f4bb98a3,2025-01-14T18:15:55.163000
+CVE-2025-21313,0,1,665ce6cac7d0183a61e9c6dbcd90e1386f2822360c7382043362465d5adeedd7,2025-01-14T18:15:55.007000
+CVE-2025-21314,0,1,491423b29fa50bb9e34fe5c2d1b6bd67c5a9bc2874a7bd533804e8d1eaed801d,2025-01-14T18:15:55.163000
CVE-2025-21315,0,0,5a13d39751996d646bad2814d5d374399878c40170b6fad35ea2f1b021fad591,2025-01-22T14:40:33.967000
CVE-2025-21316,0,0,82452fd2c845ec85f7c6e5170cf3bd46a3abf2af010f9fecee630f5a318e9cab,2025-01-22T14:41:48.963000
CVE-2025-21317,0,0,47a39641747b93c1cf8683236678f9f7006a6541e67da79b6f56e0f7a89aa8b4,2025-01-22T14:42:50.910000
@@ -277925,7 +277925,7 @@ CVE-2025-21385,0,0,116d61f5bfd24a155e4d33133e1d992c619fbf22c0ac93200278bd13c2b58
CVE-2025-21389,0,0,b734af143001cdbe15aeee14fe9e8d94be90a7e77dca2b7c7e3d41d7dfa35e59,2025-01-17T15:44:04.177000
CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000
CVE-2025-21395,0,0,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000
-CVE-2025-21399,0,0,dd7dd15e0bf28105dde42fe08f9af97913f39e43de69ca54f29cd269a806e542,2025-01-17T21:15:11.283000
+CVE-2025-21399,0,1,35cd7b1b1969accaedcde29eba1e481458b35a096143c28ca4c47fcddb55b1c9,2025-01-17T21:15:11.283000
CVE-2025-21402,0,0,cfd0656a5c0196edaf476c2d05711d25a94de6b7e392f4deee80684030d57dc0,2025-01-14T18:16:04.190000
CVE-2025-21403,0,0,9a78aaa5fb9b94799380b10b0da1d8f532f4da03523ba6e06592273509ccfd42,2025-01-14T18:16:04.350000
CVE-2025-21405,0,0,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000
@@ -277941,11 +277941,11 @@ CVE-2025-21493,0,0,764caa554437fbca5b7d52e7918de33e7b17e17cee871cca7b0bad377e178
CVE-2025-21494,0,0,8a293e6ebd165cb16947e535d4a872bf7b2395365539ce264f87dff49d038515,2025-01-23T17:15:22.713000
CVE-2025-21495,0,0,fe11be338e1c05fec9619cc491b1fbe01f7127eb46f2c1cd0e8e0b8eeb09528c,2025-01-23T17:15:22.903000
CVE-2025-21497,0,0,d72398150450df53d5b7a47f71be2a91de3fc300c37f2167b3e74a3222c92d53,2025-01-23T17:15:23.070000
-CVE-2025-21498,0,0,1121a212146d5056853b73dcdb9fae89353866d7239590b2949de592cfc796b8,2025-01-21T21:15:14.617000
+CVE-2025-21498,0,1,0e0bccd91010d99104ee197395df1f3378611a1cf5bee61957d913c90b9da087,2025-01-21T21:15:14.617000
CVE-2025-21499,0,0,2c32e354ed5a6e4eea492ba23bb7728e07a08fad97151da4f29131ca6df8e113,2025-01-23T17:15:23.230000
CVE-2025-21500,0,0,bbe9f114cc8d8e49962ad9854df4e89c5a30ee8cfa74d29f4db3b527d20b85d8,2025-01-23T17:15:23.520000
CVE-2025-21501,0,0,b499d527899d3c99b0af0dd327ab08d36e2a133ebd4d99fcf7220ac8dcf2048e,2025-01-23T17:15:23.680000
-CVE-2025-21502,0,1,f5271a08eadae8ce4a3dde8ce36b330c6335abd8b196c7de7b953f387d6390a6,2025-01-25T18:15:26.790000
+CVE-2025-21502,0,0,f5271a08eadae8ce4a3dde8ce36b330c6335abd8b196c7de7b953f387d6390a6,2025-01-25T18:15:26.790000
CVE-2025-21503,0,0,080f9da947c7317b04f4eddb1ade32f90cb3468e2aae9c32affbab4901d70265,2025-01-23T17:15:23.987000
CVE-2025-21504,0,0,5e6343e63c0c757690808cbfd0f3aecf26233691269ccced5982828c9467730c,2025-01-23T17:15:24.147000
CVE-2025-21505,0,0,d38d80007487ff694532508e892a45688687c6b699ba24e27e4e84ef185a18d2,2025-01-22T19:15:10.520000
@@ -277957,8 +277957,8 @@ CVE-2025-21510,0,0,a9d4ed31cacc6780a953598023a9516bc432ebf53a4d880ebf8bed4d05eb1
CVE-2025-21511,0,0,a53b91609f0dde5b99ec85ee5e2f3015ee303e4f60a7051aed47d398a1b562cd,2025-01-23T22:15:15.583000
CVE-2025-21512,0,0,4eee0786dd6533099e7bc79f41166620e0d69b15829df1bc0a8a9db2b8b193d5,2025-01-23T22:15:15.720000
CVE-2025-21513,0,0,7a805e593a7c4f4e55d3570134a3b17a848f06cb0540fc337f8e0d9c8310bb65,2025-01-23T22:15:15.863000
-CVE-2025-21514,0,0,fb24f67270b1830013c2efade4d02084378c0a9c59d3535d6c6f8ee384fed963,2025-01-21T21:15:16.753000
-CVE-2025-21515,0,0,59a9856c8cd8ab49f48ae9e17de99874802936ffff1463e55b32488632b69d61,2025-01-21T21:15:16.887000
+CVE-2025-21514,0,1,49b633b63c077acfbf8b5121f90bffdd1a4bb4804425fce8ed66b6a0e6c09f0d,2025-01-21T21:15:16.753000
+CVE-2025-21515,0,1,003760a702a8bc2eada9ed9d0a1c9f7164c1aefa68c8d7b88c3a1e6d88780e8f,2025-01-21T21:15:16.887000
CVE-2025-21516,0,0,1bff2e6fc2e4a75f5082374868c71f556093e04406da8a3f368eb942875b3c0f,2025-01-22T19:15:10.880000
CVE-2025-21517,0,0,e6ce3ce90dfd2ca78ff83027905b529bbb9ea13ec96e6c8775fabfa89270d8d2,2025-01-22T19:15:10.990000
CVE-2025-21518,0,0,c9eaf260be716880ca796fe981cd87022ab8a92ceab0d36a88ce6c5ee05c86d3,2025-01-22T19:15:11.100000
@@ -277966,12 +277966,12 @@ CVE-2025-21519,0,0,953346c50dbdf4cef12c3fa84206e07ea88eb4d2d7232205446bca84001fd
CVE-2025-21520,0,0,a8393da1f727381379437de45c567aa2d807597d28fb46c2d614246a56f4d998,2025-01-22T19:15:11.340000
CVE-2025-21521,0,0,82cfbde2abe5d368e7cb3292856c6e197483ce94c21f4c3bf7942fb0fa7e28fa,2025-01-22T19:15:11.457000
CVE-2025-21522,0,0,cb66a3c1d1dfcbcb008084ba6cf867c8acb6791563e88e0edf7750492de7f060,2025-01-22T19:15:11.577000
-CVE-2025-21523,0,0,8d01d6c581abaa42c0bc58cfa7c91c9bbecb2777d3a4dd1c0999c044d793d6dc,2025-01-21T21:15:17.937000
-CVE-2025-21524,0,0,bf3157ac35201ed7bdb06d9bd0f5c9e0ad71ff1ea6c20a9ef76f4b4fed68d77b,2025-01-21T21:15:18.070000
+CVE-2025-21523,0,1,cd99637f905eb2d7bc332f6b7cd350812f920d02f680e5ba0144dcfa0c744de5,2025-01-21T21:15:17.937000
+CVE-2025-21524,0,1,46c853553c3919a89aad96656a15a61755d331573851f0339c362d10be2facde,2025-01-21T21:15:18.070000
CVE-2025-21525,0,0,7869072a71baaec403876ed8c4e7bedc0906c6a810619a82f167d35d4eea8aea,2025-01-22T19:15:11.697000
-CVE-2025-21526,0,0,eadb5f70cd6c5c15f528804be5703753e56b447d5a1326c9d52b172c381214bb,2025-01-21T21:15:18.337000
-CVE-2025-21527,0,0,cecb1eac10a032ffdd65739887cd72535a25bd8424276c4782816d3af0186cf1,2025-01-21T21:15:18.467000
-CVE-2025-21528,0,0,83beb13e142ab564dc1e2aff77180fbfe0bbb2899ecf4f862fb3b6e8ea646caa,2025-01-21T21:15:18.597000
+CVE-2025-21526,0,1,291ec3b9da7511e5cbe9402d9d2f6bf78e8bc830ff77a5db4255e44ed9584922,2025-01-21T21:15:18.337000
+CVE-2025-21527,0,1,81a728da38f4b9a72f3ae1e7a0f840757be5156c1111d5926d28955cb066c62d,2025-01-21T21:15:18.467000
+CVE-2025-21528,0,1,a92cd98b4d3d0bb5ada5ac678d97ee5580729b09764671da9a2e610dc228d484,2025-01-21T21:15:18.597000
CVE-2025-21529,0,0,dee20dece2eedb23e04324824e015e8f05eee7ea7433e5b61e65814c57dca6fa,2025-01-22T18:15:20.530000
CVE-2025-21530,0,0,5acf6e339ccb7e518b28b3b1dd72423eccb0a9ebb7d08da09f9b674845742584,2025-01-22T18:15:20.687000
CVE-2025-21531,0,0,a10f6ce71dcae33c91ea0d30cb2042611ddc0c276623a2f99632cda89a3d9a70,2025-01-22T19:15:11.807000
@@ -277993,28 +277993,28 @@ CVE-2025-21546,0,0,7b354cb639455f7b79dee856fae258a04fad8d3adfc2f13721943e45f8530
CVE-2025-21547,0,0,1ad1ab17972a6f4c685ea681af58cb7a2e8f77c6fa0cb4e31d27bc90763cf5b2,2025-01-22T18:15:21.433000
CVE-2025-21548,0,0,b5fe9c2065c67db5ec39b9f4d48c3c9b9dc1e5eb6eb9c70252399ff45425b5d2,2025-01-22T18:15:21.583000
CVE-2025-21549,0,0,9516fee84da3e6782710c423fcb70a88cfe6b1a5953c8090349aba05fb0d6897,2025-01-22T18:15:21.740000
-CVE-2025-21550,0,0,88bee3fde00b32aae760f5450a9a7991244cb321f331d0b969b610293eab5ff8,2025-01-21T21:15:21.510000
-CVE-2025-21551,0,0,6723f5bc41c6fc44ce87ea6a2a5266f1be465c8b310d568051e0a77054454e6d,2025-01-21T21:15:21.637000
-CVE-2025-21552,0,0,8b4c650dfe6daad3d9cce9104d88ef85d802e8adf195e3ffee6e10ec48772c3a,2025-01-21T21:15:21.763000
-CVE-2025-21553,0,0,099697896214c8f24c68bddab6ca9ac930f8ef65e236d764cebf5150247c1069,2025-01-21T21:15:21.880000
-CVE-2025-21554,0,0,8f9d28a9ba113b08490ffb966ff4710647f5f9920e39d47439ceef6b80544258,2025-01-21T21:15:22.020000
-CVE-2025-21555,0,0,db003452df55070da2b3fceb0768af74fac814fe8bdb48a6dedb83404b7ec09a,2025-01-21T21:15:22.163000
-CVE-2025-21556,0,0,445b17983b029199e8e2d32d759f1bf9a4e6a0082755730c59984ba4e223ddf8,2025-01-21T21:15:22.290000
-CVE-2025-21557,0,0,45e42b3e8dc5c992524a2171fdbee10d0b0dc0f6a8b2162bdd9b9d2487b86580,2025-01-21T21:15:22.423000
-CVE-2025-21558,0,0,b1910680bd2893bc03ed0b48232554eaeec226893beaaf51c7cacf2293b42fb1,2025-01-21T21:15:22.537000
-CVE-2025-21559,0,0,204f6085693e84f52e088359996edc843836a815d1d870df8673a9e68a8094f2,2025-01-21T21:15:22.667000
-CVE-2025-21560,0,0,ef09072f921a253fd977e08cad4aeaf03269dc1f0290f2f4b3a8426ed700aeec,2025-01-21T21:15:22.793000
-CVE-2025-21561,0,0,0b0f8e690264120bc88cc6bdb634112980a012ab7362d49d17b9f6031b770e31,2025-01-21T21:15:22.920000
-CVE-2025-21562,0,0,c622bd1910c5964ee529dc75ce7b0968b13d829c09f29d0f332211f09b3e1dac,2025-01-21T21:15:23.060000
-CVE-2025-21563,0,0,1b52a5b39002a1360003d4cf1e24ec792fd803c84708320ca6cfa4848baf68dc,2025-01-21T21:15:23.207000
-CVE-2025-21564,0,0,654862dbee436368f55418e36cd4eefc9a4a4a39949408ff82fff973d3acd1f2,2025-01-21T21:15:23.330000
-CVE-2025-21565,0,0,05b8e573ba1a933afdd03eb6fdb2562339efd1285fafcf4c9974dd7f57942b9a,2025-01-21T21:15:23.460000
-CVE-2025-21566,0,0,026e876a292af2d8c4d594c427e14f15b27504154f82ccb2c9d587eada7e7db1,2025-01-21T21:15:23.590000
-CVE-2025-21567,0,0,e46b1f0840d6e2b37c993c4b75301565fd76c8f4f459322208aa0f21ef095abf,2025-01-21T21:15:23.710000
-CVE-2025-21568,0,0,9a042159b8dc993c0b60d222340e7f7d9f0fdbd3a95ff4af5d1ffd3586879be4,2025-01-21T21:15:23.843000
-CVE-2025-21569,0,0,1365102b21c7ac90792a4fa1b018507f34ff699cebec9ab0e9bf6b14a8979239,2025-01-21T21:15:23.977000
-CVE-2025-21570,0,0,755268554ef9a00b2971113f612e8b44faa0adf3f80f4b3205acf7d5c1e37567,2025-01-21T21:15:24.113000
-CVE-2025-21571,0,0,9e61894b16e6270e8f76c12edbaf7e06407a9c75cd3a3f97c9cee2bec332d5d2,2025-01-21T21:15:24.260000
+CVE-2025-21550,0,1,fc6018fa8689705a1d97565e90143ad8107b7d09e9ac94ceaa7a818b6a1e81be,2025-01-21T21:15:21.510000
+CVE-2025-21551,0,1,daa54f6d6f11d62de70aabb398b2fdea0e2b5009532720b06e87bdb84d893d74,2025-01-21T21:15:21.637000
+CVE-2025-21552,0,1,184f54b713cc98d823a9fc2330b628ba0a292c83f1bc80e376a100e4eda1dd79,2025-01-21T21:15:21.763000
+CVE-2025-21553,0,1,7d308c146b3c7810fa852832243b2d92e2cfa13a5d7f7400a8a0b2f84234922d,2025-01-21T21:15:21.880000
+CVE-2025-21554,0,1,fdea1d1a9290a331c13afaa642e6b53d7015239c71aa687e3d14929cbab5ddf9,2025-01-21T21:15:22.020000
+CVE-2025-21555,0,1,e57db3c6bd259ef7446282faa445cd7ad5017e791a7401ea749189403f7689ff,2025-01-21T21:15:22.163000
+CVE-2025-21556,0,1,f0ca1d262afa25ce06e9714581f4f8b508fd291386a7c2a62887a84f4eecf2e7,2025-01-21T21:15:22.290000
+CVE-2025-21557,0,1,798e4b1b8a7014aa38ad2f372a3a346d564536908b595a9b4541227da7fcb731,2025-01-21T21:15:22.423000
+CVE-2025-21558,0,1,49eec64b7b3a060ba7815a1df52970f882fbc806a1ae78e400fae98a14c6394f,2025-01-21T21:15:22.537000
+CVE-2025-21559,0,1,9237171151be9682f8f6aabdb23cca6f39420b1a1db4c42dc3654fc832ff0bff,2025-01-21T21:15:22.667000
+CVE-2025-21560,0,1,427b5b325cf7d9f8a910a442b253036094970192417c92e1d0b3f2cc906b8a6d,2025-01-21T21:15:22.793000
+CVE-2025-21561,0,1,103f3afdaf46845d7fd30d0e314656d8447494da25afd1c40c34cbb19a363aec,2025-01-21T21:15:22.920000
+CVE-2025-21562,0,1,c4fcf668621bd5a314c0662999546e50fd68ae6809417b8bc8e8bcd20e6c19e7,2025-01-21T21:15:23.060000
+CVE-2025-21563,0,1,9dde7e85498b0c6cb479808cf9779a362e0054870f74eadbdd00723ac0a75dd4,2025-01-21T21:15:23.207000
+CVE-2025-21564,0,1,b4901d47146ac77220681a9cdc88c1e92d9cee9e0592a699f0129c2e4baadceb,2025-01-21T21:15:23.330000
+CVE-2025-21565,0,1,493b671d0a3624fc1e289c3830076af5d36863ee7e16754f3d0112f59a66caa8,2025-01-21T21:15:23.460000
+CVE-2025-21566,0,1,411df5815cf61160a077dbf0ffc61bc91f81e01a76cecbc5ef227f8b19f19507,2025-01-21T21:15:23.590000
+CVE-2025-21567,0,1,30f431b9eed922ce376418f546f35463e49e1244d56acee4378e60bbd74441c4,2025-01-21T21:15:23.710000
+CVE-2025-21568,0,1,4dc7b676470e9dd1d10f5dd0a2491adf3ca4a06c66fcfc5f3123dffde7c5d34f,2025-01-21T21:15:23.843000
+CVE-2025-21569,0,1,cf3f58f931e9773366d14ecd23870cbac4cc0d824183706e559dbbecfdc48406,2025-01-21T21:15:23.977000
+CVE-2025-21570,0,1,a04c7516d7f36fe28bfb4f0b643645b738334595446bebed2d2464fdf5a98452,2025-01-21T21:15:24.113000
+CVE-2025-21571,0,1,50564a3473f570ad80d5346b5d15e7c55894047d07322eef56c8cbdbd63aaf07,2025-01-21T21:15:24.260000
CVE-2025-21592,0,0,c76e12f3b53731aaade2a77d1972500240d5eb74acd4fba716952d05d47905b1,2025-01-09T17:15:18.203000
CVE-2025-21593,0,0,9b3446b9a612891bc98169a3bb8c97e2abea25024522a1368e878da109404cd9,2025-01-09T17:15:18.380000
CVE-2025-21596,0,0,aa7c0fc4f0d758bf67e3e13a54dacfc1fc5b4b975f6328e6068299303dc7e966,2025-01-09T17:15:18.593000
@@ -278024,7 +278024,7 @@ CVE-2025-21600,0,0,0511e8e443940a54ef072ec82b613cd606986ba56f640dd75add723416939
CVE-2025-21602,0,0,98fe9b608a65f60bdad3939961d20a9c1558362795b914622d82bfabf6cfafaa,2025-01-09T17:15:19.150000
CVE-2025-21603,0,0,de5a98ab5a1846941043ac114cde34c932a06d56fde93bc5468f6ea62d88c11e,2025-01-08T15:15:21.320000
CVE-2025-21604,0,0,0ed8064b9182950e530cb7b2f52528d7c551930e7450b1b19d40475d7a199d1b,2025-01-06T16:15:30.927000
-CVE-2025-21606,0,0,0349594481f2ded846f30215d0cfc0bb438d93beaae4bb599942eb1b2e5cec37,2025-01-17T21:15:11.420000
+CVE-2025-21606,0,1,96601cbde3c001e957b824bee33aade0518cac700d01b4fa6698bd49de4d74cd,2025-01-17T21:15:11.420000
CVE-2025-21607,0,0,1209306172347dde01f13b6689a1616e491e8e2e568e8703f282009eb4f87675,2025-01-15T16:15:34.463000
CVE-2025-21609,0,0,3c2fc9da6be905fe106ba75040e21828a0454c46abf195fca7a6951c7de8750f,2025-01-03T17:15:09.147000
CVE-2025-21610,0,0,7316a86caea5346e233350f085898ca7619157368c1365d30f5c1d1d8901ed25,2025-01-03T17:15:09.290000
@@ -278044,41 +278044,41 @@ CVE-2025-21628,0,0,0075ad45f4e081e6b1d4b87e45ccf38954b3b032c76d5db5fcb797ed5fc62
CVE-2025-21629,0,0,5bd27bb9a82cb5a5f09a5986e4163e86befaea4298f9b54578a62350a29978a7,2025-01-15T13:15:15.220000
CVE-2025-21630,0,0,b687cde38a98e756a80e569a98743dbd03093e3308ce5058c13044fa43b51e41,2025-01-17T09:15:08
CVE-2025-21631,0,0,f25ffbe04bf0457ccde892e70b90bc0b19ff0ad60d58d3cb509e18ac1718eb08,2025-01-23T17:15:24.477000
-CVE-2025-21632,0,0,4348553ed926767023b82306e7930ad4a22c009eec51e252ffe3f49ced112dfc,2025-01-19T11:15:08.650000
-CVE-2025-21633,0,0,7d17fca86dc2ed72902becb5ead587c9e01fb09fc2094f18996ab9eef5221464,2025-01-19T11:15:08.773000
-CVE-2025-21634,0,0,018d6cfde98ef1f7e21e6bd948a1dbf5265797c7bd275d512a1b9a036ec01752,2025-01-19T11:15:08.890000
-CVE-2025-21635,0,0,c8906577d74ba6ff40f2b077af59a1734822cd425c83ab357c7b284217ad8582,2025-01-19T11:15:09
+CVE-2025-21632,0,1,319c971763f332a963bcaca50f66216a12a2c5a0d07d26ccb015f5aed2bdc246,2025-01-19T11:15:08.650000
+CVE-2025-21633,0,1,5feddd6b17cfde18f8f70d5415e3d187d491e0f9f4fddbbb10eb6daf6c6066de,2025-01-19T11:15:08.773000
+CVE-2025-21634,0,1,8497b5e7bb213cdfc480c908fd0fa508b69d8364d5acd495badc81877135ec5d,2025-01-19T11:15:08.890000
+CVE-2025-21635,0,1,f68693db8da33a37c51f7f5f67c2bc3befefae2a56081d367cd2c2267ce553f1,2025-01-19T11:15:09
CVE-2025-21636,0,0,6097ea20b833d9169f54205d90a302acd27d436dea66efcd6b9cee92a1babbe7,2025-01-23T17:15:24.790000
CVE-2025-21637,0,0,b7a8d56ddd50af1471a0f4d7cac298ed3a55c9230ac55675f7f04a67673d6a2d,2025-01-23T17:15:25.090000
CVE-2025-21638,0,0,b6d0cc533537e2a4fd051e145f2d5850e585668256c1e081efc64bad28f2f89f,2025-01-23T17:15:25.283000
CVE-2025-21639,0,0,8b5e16b1f2149b8f64120ca01ada55d9d141ce0bbcc7effdacb992264c3f2aaf,2025-01-23T17:15:25.570000
CVE-2025-21640,0,0,96de9a9e69c1a519431ab123f70c5c342bc8138ca17f0d5d80d7025d8b5adbcd,2025-01-23T17:15:25.880000
-CVE-2025-21641,0,0,48fc8ec203ac50c16a25607b807ca130d06fae93453c8f6ea6a8f4c6e2c9ef51,2025-01-19T11:15:09.643000
-CVE-2025-21642,0,0,fc867e04f7105fae8d2e25f95fe6ef51a7e7c045ddf1058542803462df5658d6,2025-01-19T11:15:09.757000
-CVE-2025-21643,0,0,dddaa2125205a131379cf404d1090c7426d201b078c7d7100ef59bfac232ae58,2025-01-19T11:15:09.870000
-CVE-2025-21644,0,0,71bccfa815e1640d41b4fc2ec009eca0da8e4c76933c10e944f11a0d0f8a62f6,2025-01-19T11:15:09.977000
-CVE-2025-21645,0,0,9609d82b860f7532ce2e28fdfd181e61ade69ef325649d7b7aa85aa9f04e8b42,2025-01-19T11:15:10.090000
+CVE-2025-21641,0,1,04b9fd99762c44b8f3ca19150eb8accd0cb02486fd6ddc6ac2f8a2b9ca09a85b,2025-01-19T11:15:09.643000
+CVE-2025-21642,0,1,7e7fd1c700d97f26567385fb56b488a68fcf8391a48c0e63d1f78a56c3690430,2025-01-19T11:15:09.757000
+CVE-2025-21643,0,1,cabaf0da35f1a3435ec7869964661b97a8bf2d764f2f1be480a70dfedc80edc2,2025-01-19T11:15:09.870000
+CVE-2025-21644,0,1,73884a983efff5b1a573ec6d78191c5014b27796d3ea9316eeb719d0833f708a,2025-01-19T11:15:09.977000
+CVE-2025-21645,0,1,8f74f4ea3009e3fd1cfe74b6defc5f27e4d96879e50843473a83691c779da4b4,2025-01-19T11:15:10.090000
CVE-2025-21646,0,0,d3003deee6f069b6efac67ca535e496163d9b988cd5aa39fddab2637b6ab81fd,2025-01-23T17:15:26.030000
-CVE-2025-21647,0,0,99365d6629fa953bdd6c1e683aacc63e435081dfc2cf8c928f2d02a8d112f8ac,2025-01-19T11:15:10.307000
+CVE-2025-21647,0,1,ce1afef3673940b6e6e5f124841801fbe82d3ef8230b7a4e69bdc4d297b911a4,2025-01-19T11:15:10.307000
CVE-2025-21648,0,0,8eba68911d8aa082259d9f26b76f699d291897f1bc86a2a78f49c1a6f83eb795,2025-01-23T17:15:26.143000
-CVE-2025-21649,0,0,fe457f2ecfc380badb47f7b8b21347ca4731319abbdbc14ba0033053d4dc41a8,2025-01-19T11:15:10.517000
-CVE-2025-21650,0,0,8999d80331f22604edddfd75667fe17eab77150206057afd0258b361cf1da19e,2025-01-19T11:15:10.630000
-CVE-2025-21651,0,0,08b0d285d803ce14ca95c51ff0bb6822af7a1dfa543a30bb044ccb678d352dfa,2025-01-19T11:15:10.733000
-CVE-2025-21652,0,0,781ce4cdff4e60cfb6f8b0eb373b8634b7b2c8bf54de4c678c30aac3d57ceb30,2025-01-19T11:15:10.830000
+CVE-2025-21649,0,1,cc3e56b2bb42f302e77146ccc8415bda0b3e72df266694fae65d4a162d04bebf,2025-01-19T11:15:10.517000
+CVE-2025-21650,0,1,5c2cc290747169083422e01affc4fe11f3615a46223fc7a7cd149465660494c6,2025-01-19T11:15:10.630000
+CVE-2025-21651,0,1,d057ff764ce31c4ac7e93c37cb4ba424635250ef668040e2530ccd52f14e89f7,2025-01-19T11:15:10.733000
+CVE-2025-21652,0,1,4b1aae65be46e062fa9449fba4606d2d9e05994de4017f257607e087bff65a69,2025-01-19T11:15:10.830000
CVE-2025-21653,0,0,e35c4eae1c7c810cbfb3e7931a2f36e3cb97bd011910726fd74483aea7a0d58a,2025-01-23T17:15:26.243000
CVE-2025-21654,0,0,4ec90f1484bdb180e8872bd379989357ef5549f6f68655399ae0221a6a448c8e,2025-01-24T16:15:38.177000
-CVE-2025-21655,0,0,e5a98c6155ef95beaa77c8f70c04ef1a52b9c9b57ffc8aa737b1a8a15dabbd07,2025-01-20T14:15:27.027000
-CVE-2025-21656,0,0,e08de214fec57f5455004c22ab31652820945256042ce332af5f60bc4ee6b0eb,2025-01-21T13:15:09.240000
-CVE-2025-21657,0,0,58d21ab8ed420cad449dc9439925bd7a4bd93e784737aa1340191a73104f8bd9,2025-01-21T13:15:09.340000
-CVE-2025-21658,0,0,5894a65bd40b58510d3865fd67c42c2240f0de76f9e61b59f9eda7ac84e5b943,2025-01-22T23:02:59.383000
-CVE-2025-21659,0,0,a1f4b697b66bab7b57666583da4fd3952bef7152142aae1d092214b71dd2eee4,2025-01-21T13:15:09.540000
-CVE-2025-21660,0,0,e8f48b67279b891fc134ba898fd31eb80bfc20852a82499d9e449abaf5daac6f,2025-01-21T13:15:09.643000
-CVE-2025-21661,0,0,e7b9e2e7e2e401ac2c3dd32c6ea5cfa7c3b00783dd71307395f255d241abd981,2025-01-21T13:15:09.747000
-CVE-2025-21662,0,0,af41abcf1f68bf0a5776b43dc9340073ad23b72bd3cee8298571e5e177588445,2025-01-21T13:15:09.847000
-CVE-2025-21663,0,0,b110f6094189cee8dc4774826cab090ea4bec63376a8653946f922277d4b8355,2025-01-21T13:15:09.947000
+CVE-2025-21655,0,1,1eabdf7a355ba98b3a0c06447e719ec81e53cba37d87ec4da3249b7fa751136f,2025-01-20T14:15:27.027000
+CVE-2025-21656,0,1,a701e9e2df732a25c44be693e4bcc732f0353202bde61b2316a6229f867fa42c,2025-01-21T13:15:09.240000
+CVE-2025-21657,0,1,1965d9c3d1118ed3d2f0e817295e796ed532b053adb84b7658e4c043ba09b4dd,2025-01-21T13:15:09.340000
+CVE-2025-21658,0,1,49f4fb1da0e36dec3735688e008c1d1b6e11cd524605dedd795d9dba62770702,2025-01-22T23:02:59.383000
+CVE-2025-21659,0,1,c34fae85ac5791c6acdfb8c055236ca0db3c10e1f998433ca0b29112c1552ff1,2025-01-21T13:15:09.540000
+CVE-2025-21660,0,1,62f40623237245457c3e1282812660b56ee49a4868b504432c0ca95a3b8af3bc,2025-01-21T13:15:09.643000
+CVE-2025-21661,0,1,0fa8c68f8e644a9e2944a5faceaf5fb67752dd573becbebbb71e40324bd4cdb4,2025-01-21T13:15:09.747000
+CVE-2025-21662,0,1,a5b1a0271d3432d1de3ee1bda0755a5b6602cc0585dec57fd031d28aaec3d7e4,2025-01-21T13:15:09.847000
+CVE-2025-21663,0,1,adf4d90fe890eb7047d924c99b97e4be605c879bb910a835e1b3e6e621f3836a,2025-01-21T13:15:09.947000
CVE-2025-21664,0,0,a03d1e78413d45883683b53d4573f14c457812f5c5d3f56140a4232f02a4012f,2025-01-23T17:15:26.457000
CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000
-CVE-2025-22131,0,0,8a8cd24dd50518945167d9268c0c244cc17a87d8ffed5574dca8152c7cdb7333,2025-01-20T16:15:27.880000
+CVE-2025-22131,0,1,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000
CVE-2025-22132,0,0,92f694afc6ce174171da36824da367c743ab8d73a418a3347309264d0570fa9a,2025-01-07T22:15:31.590000
CVE-2025-22133,0,0,32df1a7a06703aea1606771b300b1836f84903a2a4b183527a9471791c589465,2025-01-08T15:15:21.727000
CVE-2025-22134,0,0,3c2fd591225b705584c74bda8da9b9be07bc4fac46ac5a8cbc29997594d0c4cf,2025-01-13T21:15:14.333000
@@ -278094,18 +278094,18 @@ CVE-2025-22144,0,0,3f61829a0e73448014132f2edce6a94383842f3cf739a2152ba691301c580
CVE-2025-22145,0,0,88df2b27b4a7796924aa6277caf85bae572e95291858d2eee15b7f4eb271d86c,2025-01-08T21:15:13.480000
CVE-2025-22146,0,0,7d604299ba6a6dd89be2e2cf3b7b21ee971048df32dafde437c080eff11e6e7f,2025-01-15T20:15:30.557000
CVE-2025-22149,0,0,a38f1d25924ff640550a2206f96377b56b7eb734e7bb1771523eee3ff2dd77f7,2025-01-09T18:15:30.233000
-CVE-2025-22150,0,0,7fc60db0d4c225d834b97b3d830a21a02e2a19d798aea9113218acb08ea8e555,2025-01-21T18:15:14.887000
+CVE-2025-22150,0,1,5450e471d951fbd68d5df8eea6eabd0a1b7d976d2312ac6c1b261f61f3305a7e,2025-01-21T18:15:14.887000
CVE-2025-22151,0,0,21f9e4fddd90599ac45f0514a6d95c5510077d3d9b45eefd94598514744d82c1,2025-01-09T19:15:20.410000
CVE-2025-22152,0,0,089f04aace28abfa88265f6c9c2782b5476de8a0e353916617123187c142e722,2025-01-10T16:15:29.910000
-CVE-2025-22153,0,0,94c3a0785d0046a2ffe363cd970a8e92784ef4bd69fea0e781007658aaf1a7bf,2025-01-23T18:15:33.267000
+CVE-2025-22153,0,1,25942cbccd29909e1ea0be6d083f0e8cabc6b2b46ac2d218bce2acfdeffc85bf,2025-01-23T18:15:33.267000
CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000
CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000
CVE-2025-22261,0,0,33a310cbc7efb685d95693f6e008875a8290fc5f9c6bce0cde03f1c0742bf7b7,2025-01-07T11:15:13.290000
-CVE-2025-22262,0,0,d8ccc2867d2eece6059c27bd9ae3cb203a5caec3d70efe08069887af39a96863,2025-01-21T14:15:09.757000
-CVE-2025-22264,0,0,269d6d99d5d38020729c6f3bee1f95a3ddcf70ae68cef13e6fa32b4081a530d7,2025-01-23T16:15:37.257000
-CVE-2025-22267,0,0,d47c362d1903a3323a8cc11ac9dbcc52108524ecef96f08e310fc8a539fecd56,2025-01-21T18:15:15.100000
+CVE-2025-22262,0,1,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000
+CVE-2025-22264,0,1,79177f17455e861265910dfa8dd2caa5a78c248a179fa18c3179e839e36cde00,2025-01-23T16:15:37.257000
+CVE-2025-22267,0,1,f20afa71bc4d80e805bd92045ab58754dc4544d5a2500dd19c3f675f1704780a,2025-01-21T18:15:15.100000
CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000
-CVE-2025-22276,0,0,9aca83262c3920612e93723d56c2a06a28b9cd00bbd745a2a28e66846e451df2,2025-01-21T18:15:15.303000
+CVE-2025-22276,0,1,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000
CVE-2025-22293,0,0,0fb85e30408666f4049ff5e391f5eb0edea1a607b8157160cd5e0e00489520e9,2025-01-07T11:15:13.473000
CVE-2025-22294,0,0,fd3c530f54ed4c49be0865300ce0d8ca3b1fb9d97860cd5c24499f717ff48c10,2025-01-07T16:15:41.137000
CVE-2025-22295,0,0,136be5b556aad26e99b99b0d958bde14845140b7f49ffd508d9c54e6615a1e64,2025-01-09T16:16:25.140000
@@ -278124,18 +278124,18 @@ CVE-2025-22307,0,0,551dc24072f38079ff7384f32ecad5baae3d2cc5e837d9af57fca3b9f480f
CVE-2025-22308,0,0,9a6d70724a98274c9d996d44a4871290056075b233769a030b30dce33c596be8,2025-01-07T11:15:15.043000
CVE-2025-22309,0,0,41a5649d9f063abc40e2323ec834921c50bb20c7c3f52cc1cbc06eac9caf5064,2025-01-07T11:15:15.190000
CVE-2025-22310,0,0,01093bca114875827fdf0ce9f05a34c343d3d135e32d6b40cbb65ecb6d8c931c,2025-01-07T11:15:15.320000
-CVE-2025-22311,0,0,2bc394bd63cb993ac7ac9d5fcf5aabc46ee774d114462a2204464296891c6b55,2025-01-21T14:15:09.930000
+CVE-2025-22311,0,1,f3107125f67d6afdd2daf1f3d9821f17e7fef881547bbc4e18ee7cd02715a195,2025-01-21T14:15:09.930000
CVE-2025-22312,0,0,a7bf6287b60e0e496be523a78cca84a7ead7f5ce4262b249df941bdb26960569,2025-01-07T11:15:15.480000
CVE-2025-22313,0,0,5a053d272a7f80827a28d46605edf286de3cc07b2584d481167046830126dd01,2025-01-09T16:16:25.653000
CVE-2025-22314,0,0,b9054b96be0754de8c0a6cb596862922b24d4794887f456f87dfd0bb880d2088,2025-01-13T14:15:10.270000
CVE-2025-22315,0,0,a72855198b7b6c3f24eb2b601132daa754b13da0204b23fceae9c014a71d07ff,2025-01-07T11:15:15.627000
CVE-2025-22316,0,0,0ceb4f4ab42a49cc2d5309a5f4d9e71fec0d3cc6da31bc7e448e3f3e1c046b45,2025-01-07T11:15:15.763000
CVE-2025-22317,0,0,8c2b42f24e2f8faacd2e0bb645d3a6edfbe8586f973836795d4b0c5487694c1f,2025-01-15T16:15:34.590000
-CVE-2025-22318,0,0,f063a354a3af64ad69ba5adabe338b615a5b0efb66cf8aa090ca318bc54c685a,2025-01-21T14:15:10.110000
+CVE-2025-22318,0,1,5368a1418cfba2423af73277ae3342fb96667eca67d105e8830cafc6ce9b8c3c,2025-01-21T14:15:10.110000
CVE-2025-22319,0,0,e55624a930eb59e1a8b1dc4193cc8bdb767b79f4292003f9b671325f24154163,2025-01-07T17:15:32.810000
CVE-2025-22320,0,0,4a18a096a3e3278530b059a94ed0df6bda5c51f5655f0d9ec304e5a12141712d,2025-01-07T11:15:15.910000
CVE-2025-22321,0,0,c3ec78a4d8f363a8d35d3ed77c77053a584db7552a50bacc2a189071deec2efa,2025-01-07T11:15:16.073000
-CVE-2025-22322,0,0,12cf49a1d6804eb6c7f1da7881f2a8b165adb8e799c25bc5b0779faf5510680f,2025-01-21T14:15:10.280000
+CVE-2025-22322,0,1,5711464cd01fb205e940f0d33538503f520fad7d3447a10a22ef500677509847,2025-01-21T14:15:10.280000
CVE-2025-22323,0,0,dd17003bb8a99baf8d21124b28c9848ef4bfbc6ba2dd60dd9c6ef0cb160adaa0,2025-01-07T11:15:16.297000
CVE-2025-22324,0,0,94c175f2b1ba86cf0c93b127564efaedfd44eaca3605ff24fcb7ab34e8e5268b,2025-01-07T11:15:16.437000
CVE-2025-22325,0,0,0d9564c3b7a61f07790f6bed4b2e22bb71ad52f4f54ab2a6e38cb0f92019a94b,2025-01-07T11:15:16.577000
@@ -278187,7 +278187,7 @@ CVE-2025-22394,0,0,bd5883db5916f4fb62cd22d509388363d3fe283a637e665acf3a831ed6ef3
CVE-2025-22395,0,0,ce7db6acd5106ea1fc693f8e6a4248b50542a5f440a82a6c625194d64974a971,2025-01-07T03:15:06.047000
CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000
CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000
-CVE-2025-22450,0,0,bec0c231f15d89d6a89e728bff19768441055ad7674912604ce1fde8c802695c,2025-01-22T06:15:14.327000
+CVE-2025-22450,0,1,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000
CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000
CVE-2025-22499,0,0,2c7469ba06cedcc8f30abf0610d7acbf7462216a8d6077933c22c805fba653a7,2025-01-13T14:15:10.960000
CVE-2025-22500,0,0,c8f154061d3da5b6a8edbf6756b48a42d68c23a6466a5b364e986467d39302c7,2025-01-07T17:15:33.657000
@@ -278238,7 +278238,7 @@ CVE-2025-22549,0,0,2243b6eb8b296a608ea92af5e6385fdfc51b0684defe423e7779f8841f4c7
CVE-2025-22550,0,0,c9d757299ac608d3147eef8746a3a208a3edcf2333ca75bfc67dae5f69ae7a41,2025-01-07T16:15:50.960000
CVE-2025-22551,0,0,90112bb3c1110b8bbd32a85a1d9436643d5a83f07e10c0edcdb8cef72cc525d6,2025-01-07T16:15:51.127000
CVE-2025-22552,0,0,7e6657b0ee10386c62eaca5d65f3efd565d121c7415d032cef63bab59b1fea4a,2025-01-07T16:15:51.277000
-CVE-2025-22553,0,0,8354bbe8e84c7a9d4ff07b34e3cb75563183ea8bdbcd4de8a13acef22522dd53,2025-01-21T14:15:10.453000
+CVE-2025-22553,0,1,8fc8565f51c6d7e48354eb3ba1bca612a73616401925ffc5470b98d4f4e52468,2025-01-21T14:15:10.453000
CVE-2025-22554,0,0,bc14b75df4f6685e0e581ea026025de4daa6d4152c025c7d9f4666d66a4ca83a,2025-01-07T16:15:51.443000
CVE-2025-22555,0,0,ab5a543fc1826d9589dcc803970816b6726fc2ce1611621c5784a44278aa42b5,2025-01-07T16:15:51.627000
CVE-2025-22556,0,0,f3cc43d325236fd9c575f3da67d40762351c570124715d10a2e765d3fbe70747,2025-01-07T16:15:51.780000
@@ -278297,29 +278297,29 @@ CVE-2025-22616,0,0,7f488b29b5a5992519491e6ff0642ab58c7b42ed9dd948a09cb33aeb51796
CVE-2025-22617,0,0,20232c8c5ca40cd4ba4748fa93af15a5fbc45a8f7c51b1d0fff39e9d450de300,2025-01-13T21:15:15.370000
CVE-2025-22618,0,0,ad61907d0f72e0ce3f21a94e69cc540d7b1cd780e0ad571607d65d3ecdbef45a,2025-01-13T21:15:15.500000
CVE-2025-22619,0,0,13eaf69e13cd48ca237219c7a91847c694b4162a944b2e77691398b837195a0e,2025-01-13T21:15:15.620000
-CVE-2025-22620,0,0,b424599915f35c2fa1cfc2f2427cf97e6219f2288b3d20f0f209cfe60564c6b8,2025-01-20T16:15:28.017000
+CVE-2025-22620,0,1,428c7806e74732326369c718351571848c196156b9eb9eb7ffe99ba9002a1b52,2025-01-20T16:15:28.017000
CVE-2025-22621,0,0,6ff4aa50f3e07d892cb8ed858e238d42c832836da0723e6a77be4111c28ff27e,2025-01-15T17:15:20.810000
-CVE-2025-22661,0,0,63fbfcb1946e88c37512562ecbdecad12eabd461006f5cddca75363288605547,2025-01-21T18:15:15.707000
-CVE-2025-22706,0,0,bc11dd8300fc9a1be057709c8708e0e041b4e417c20205c24efb0ea69edc1d58,2025-01-21T14:15:10.640000
-CVE-2025-22709,0,0,c54d9dbd302c913fb0743bf511cad5ad5a1dffe36272d2f86b1ac8a0a529b722,2025-01-21T14:15:10.823000
-CVE-2025-22710,0,0,73c74c7b239c0913fe817302cba21d49f84b5b48b95d3d454e6c7e924f338bbd,2025-01-21T14:15:11
-CVE-2025-22711,0,0,b28d30dfcba4cba3ac47bffafee2cc1992b26d1437b4c78d644811b078b7cdbe,2025-01-21T14:15:11.173000
+CVE-2025-22661,0,1,5209e5b0f9c7939e902aaa866620e423d90372564b55d2924e42e42f27d6a81e,2025-01-21T18:15:15.707000
+CVE-2025-22706,0,1,426d0c1b0527ee1d623f40f809dfb7f93a7c42b34ad1ff79a058926eac7018d0,2025-01-21T14:15:10.640000
+CVE-2025-22709,0,1,3f8492adc78070ddb38f727e841374c07eca9b418229f22b07bd0ce34a8b5f25,2025-01-21T14:15:10.823000
+CVE-2025-22710,0,1,40f6e9b73df3fa17e0d165ff493773064dddeba801cd97e03af654cab32baf6e,2025-01-21T14:15:11
+CVE-2025-22711,0,1,c38591579c6fafc13f8a8d7fcc4d03f2cc3b7f08e79db700c89246ddca0afeac,2025-01-21T14:15:11.173000
CVE-2025-22714,0,0,f9bbe1ff9a98b0e93a8c970109dc3f4c31b8713a137198eb28ec9bbb9a62c13c,2025-01-24T11:15:09.823000
-CVE-2025-22716,0,0,f1763355086f640ef4b0c36d979f57d56b5690cafdae40925c2307c942199ed7,2025-01-21T14:15:11.343000
-CVE-2025-22717,0,0,37113c70c6b5e058145e4811f203ffe7d51a6be986a8a6c940c5784d5eb314fc,2025-01-21T14:15:11.527000
-CVE-2025-22718,0,0,f2f835c36b414fe513df89c42ea4829f0121edbfa7fb2040f1b7deb3cf948664,2025-01-21T14:15:11.697000
-CVE-2025-22719,0,0,47c0e00bad898207737324c6047fde538471ce4b62385cc9803296f6d2f31b53,2025-01-21T14:15:11.860000
-CVE-2025-22721,0,0,d4768f8fadcf466cfdf77f8e7bb9a1289dd0637a377644552945f71fe4c17618,2025-01-21T18:15:15.880000
-CVE-2025-22722,0,0,0d47c6a685986b1e321467ed2648e064fda300edf7ac22d3d41e53e26d810e89,2025-01-21T18:15:16.057000
-CVE-2025-22723,0,0,86c74807dd9f1832d2e111dae25fd604cafd227762343bdb5a03c1dc4e311c5c,2025-01-21T14:15:12.017000
+CVE-2025-22716,0,1,574cf0b5875717b93863e982d1cab0b81ccdb8ad9a1ac52da300f5eb0abacf14,2025-01-21T14:15:11.343000
+CVE-2025-22717,0,1,045d0e1e5f3cb0fdeed8a39d1665e4e46f6270d91c24ab8506dee6964c28d59b,2025-01-21T14:15:11.527000
+CVE-2025-22718,0,1,af552db1d51fb8ce52426df5d2512b6494860cf9b2184f61079c95efecaa5cb1,2025-01-21T14:15:11.697000
+CVE-2025-22719,0,1,5bd88b64227ddb0806bbf4a03d00b50965d6e95ab3764f375fda0f14d5c5be5c,2025-01-21T14:15:11.860000
+CVE-2025-22721,0,1,b262a715cba54c17fe83d44892573aa8774855ca798bef491313a71f26432b7d,2025-01-21T18:15:15.880000
+CVE-2025-22722,0,1,46dfbd6849c3dd98d390fb319b428d78acaf82f7d9a5f48a36560b752e60ded8,2025-01-21T18:15:16.057000
+CVE-2025-22723,0,1,9840575079edde83aa306dc43108d401256a5ee1d470cd37a6e795011bb563cc,2025-01-21T14:15:12.017000
CVE-2025-22724,0,0,4b71697c4166f64157fa259051322142853491130762e53a926cbeb456975423,2025-01-15T16:15:35.250000
-CVE-2025-22727,0,0,ef16073f6178f1c1f75d3989c28f1f49ffea000432f590e6689a327d4ab9d12a,2025-01-21T14:15:12.173000
+CVE-2025-22727,0,1,8d1395d07c39bf78bab959ae382e9d7d3cd5abcb4c9cd8b35dcbcfc6ddf2960d,2025-01-21T14:15:12.173000
CVE-2025-22729,0,0,b385c13a23a149f64df46d7196231b40966fb99b0f0f2a85978036f7c5cdb1e2,2025-01-15T16:15:35.400000
CVE-2025-22731,0,0,591ca873395a60ee615f6aa95897c12d402f7661783a3bda5439845de448c196,2025-01-15T16:15:35.550000
-CVE-2025-22732,0,0,5aab57ac4fdefa24c0ebcac172f9827ae68e840796b5e42ad0fd4205f5ea4f99,2025-01-21T14:15:12.387000
-CVE-2025-22733,0,0,e3f1cafbf03fb104a99ecdfd988e51ebc6ffd560c7df0e36746cda56ead5af8e,2025-01-21T14:15:12.570000
+CVE-2025-22732,0,1,9d0821ec10c5b1a62f175cf9908a52dbfcb9a254ac41317428585e83454ea58f,2025-01-21T14:15:12.387000
+CVE-2025-22733,0,1,bfe9070d5ce2cdd151d292e6709b64dab140c8bb1a8c1bebc8fd23f76ab9727c,2025-01-21T14:15:12.570000
CVE-2025-22734,0,0,ebb588399299ed7786c13a4d873d6a5e5a3c44188d8c165fdc0198076e15c29b,2025-01-15T16:15:35.703000
-CVE-2025-22735,0,0,082a0173e4b90ff7b5ff31fc811175174c408d506cd45232022fe4c91f72c36e,2025-01-21T14:15:12.737000
+CVE-2025-22735,0,1,de6a6f26a15403b2f22d28132a742d5d30dbb5d122c903ecf659b867065c2369,2025-01-21T14:15:12.737000
CVE-2025-22736,0,0,0f002f9c72e82e1a6604d70abaa51b2bc570bcdd5574d8a2c1f2e2cb9ae96bef,2025-01-15T16:15:35.877000
CVE-2025-22737,0,0,d993d76148f4207aebc67a18a146e07d4f4f3ca83cc7e5580153e5155464b350,2025-01-15T16:15:36.030000
CVE-2025-22738,0,0,edb589b683f4ed743fa5b90fa486af301e0f80b88774faf71aed08aa4a667bf8,2025-01-15T16:15:36.187000
@@ -278342,13 +278342,13 @@ CVE-2025-22759,0,0,9fd34399fa1530c21c9cfdecd9f53c69ec53b7cabdae01a2ee26417453f72
CVE-2025-22760,0,0,ceaff3b523ed1ab68ca9afc6e8dcc1721a356d85b9c6dbcc0d6dd64777fa93b0,2025-01-15T16:15:38.890000
CVE-2025-22761,0,0,1f457b8943bcdd333039377fe4c764bd2dfdb88365d9eefe6cccfdb7a18f652c,2025-01-15T16:15:39.053000
CVE-2025-22762,0,0,9c306109b16ba65d05e7076b45fa1179d0a359bb35d83cde3f7d3c02ff96f6bc,2025-01-15T16:15:39.227000
-CVE-2025-22763,0,0,3e85a52e82c035116a3ac3d410f3ab9700da1a1bd216374d985e1defc38ad3ad,2025-01-21T14:15:12.900000
+CVE-2025-22763,0,1,947af1deb8d9cae5ca079e909cf29879fdb4e7f4a385aecbc64b3952727ab4d4,2025-01-21T14:15:12.900000
CVE-2025-22764,0,0,bb4ba9e4fde2400f152116cd1aad7bbbdbb7d640219a8e01ca47cc112eba4fd3,2025-01-15T16:15:39.373000
CVE-2025-22765,0,0,05da1bdc9e7167edf5387de0586b61a1995a9741b623487d7015cbf79f0a61e1,2025-01-15T16:15:39.543000
CVE-2025-22766,0,0,343e87bbd358f52869bf43f77788e51e9a96e6bce59424af557599ac7a821c7c,2025-01-15T16:15:39.700000
-CVE-2025-22768,0,0,6ac53ba544255bca278ed1b113cc15aecb93d83acedbb483da3bc50fb90a3537,2025-01-23T16:15:37.403000
+CVE-2025-22768,0,1,d67e24e3bb095b6fc3cdd1ddf309e20d3ead32546acca77b1e796ad170199e1e,2025-01-23T16:15:37.403000
CVE-2025-22769,0,0,4e6d679e63f8fe706c18670ecdd89233f779b3c6dadefbabc9659ff336c0b4a9,2025-01-15T16:15:39.860000
-CVE-2025-22772,0,0,3a00e89ad909c68ba2b86c31324220231310a44e7a9d8f09a57bfe4d0193ce08,2025-01-22T15:15:14.990000
+CVE-2025-22772,0,1,29819acc65b378ee96e8944a7db77a0ab54f41d63e11841d86bc60c8baf1f3aa,2025-01-22T15:15:14.990000
CVE-2025-22773,0,0,fcf097b5a8bf8f017de7fe5f8a18a77369aacf0486c55459d6bb76d657f29d3d,2025-01-15T16:15:40.027000
CVE-2025-22776,0,0,3a44d2ed038c8fcf2a82ed573a85678c06e1f13008a49c36e4d4a59c650fa83c,2025-01-15T16:15:40.193000
CVE-2025-22777,0,0,6e361a5228daa020e40ee58c141da823e7968148e70048924a6df32b9ceb16ce,2025-01-13T18:15:22
@@ -278391,7 +278391,7 @@ CVE-2025-22821,0,0,aced97d1793e12e4f3cb4f90fa755ca4493ae0ec26fa69f38788bd73221f2
CVE-2025-22822,0,0,d5f87ffa31bc6be641104ef549aaeae7fc45b8348e2495ffb2fb8e5af7e7f9a7,2025-01-09T16:16:32.557000
CVE-2025-22823,0,0,16e8a59cbcc2bfc06c602dd1c4fa5e368ef951a41870f5a6e53ff24ecf09b103,2025-01-09T16:16:32.717000
CVE-2025-22824,0,0,fb201e5b5828770ff11d00a29d3f8e00f0da01f397b44ffb8e7c8ad29623f7e1,2025-01-09T16:16:32.893000
-CVE-2025-22825,0,0,2013e425d6984c95a3fbae46f7b021738bd9abdb28cbdb820d9a16f5e5159903,2025-01-21T14:15:13.060000
+CVE-2025-22825,0,1,c21ca5713a1aa3bda508edf6d7ba0513358e0245a32198c391997dcabc4fdcfb,2025-01-21T14:15:13.060000
CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000
CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000
CVE-2025-22828,0,0,327d4fbb4775debb7974f74b72faad2a6d9350ed385605b18892cfc7691fc3c9,2025-01-13T19:15:11.373000
@@ -278408,14 +278408,14 @@ CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11b
CVE-2025-22964,0,0,7b43a22f35a1092582599b8d0a085880cf69a0a81631ab9d491f283c3453cad7,2025-01-23T21:15:14.900000
CVE-2025-22968,0,0,41c7a798ef1cac51f67409788e09403bf1c73ade164309e1bf03d8de0a22a69b,2025-01-16T16:15:35.917000
CVE-2025-22976,0,0,7635385bbb1168f03f689653f73812b5306e7c676072ca854591d831ffee9997,2025-01-15T23:15:10.783000
-CVE-2025-22980,0,0,1b650497280c100d9e87200d77a5d79d3f284742776a6c05fc5e9f294577aa3c,2025-01-22T15:15:15.130000
+CVE-2025-22980,0,1,3170c0711c65ed88f85cdcd9ec101595d1a0370876a32617bed3dd684ff74c4e,2025-01-22T15:15:15.130000
CVE-2025-22983,0,0,3f91e33a7409029e8feb1969bf0fd19dc254a37fe16ab3c9358513b3c91fd751,2025-01-23T17:15:26.577000
CVE-2025-22984,0,0,79f7e0821d57086a5b30160c1ac3f4ee3a3942289c8274a9ca479dc29c59767f,2025-01-23T17:15:26.780000
CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000
CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000
CVE-2025-23006,0,0,977f772ea3b5876e891b28257119516496ae4d9450366cb495b2995cfcca3fa6,2025-01-25T02:00:01.990000
-CVE-2025-23011,0,0,e1ba900acd27ddaffe837f1b2cb99a0620e19220a4594e9e2e5e1cfb6f6dd686,2025-01-23T21:15:15.010000
-CVE-2025-23012,0,0,5a6363dd5cc5adf7b59d4da79cd0453ce862321fce6c24b705279a51911f41e0,2025-01-23T21:15:15.173000
+CVE-2025-23011,0,1,6ddf557c800a2528d5545b3d7911f3e609af1e4dccfa1a674d933303fd996813,2025-01-23T21:15:15.010000
+CVE-2025-23012,0,1,6b2b3bdfc203a9a9abe46f57ea7f825047d32c413c20c9ae87597afaa81bd3df,2025-01-23T21:15:15.173000
CVE-2025-23013,0,0,1fb74d6ea76ff5844d786cdd2a74f412fea41ae3954a5796fa59991a0a874edb,2025-01-16T22:15:40.520000
CVE-2025-23016,0,0,d6f57b5b395a069df7f809c3df8ada91e41979cd2f4b4f4edc46accb02e126b8,2025-01-10T12:15:25.480000
CVE-2025-23018,0,0,ad3bfa51bcf887bbb40aaa96a9f2385adb490b1540d4c17f9f0c08d58715f76c,2025-01-14T20:15:32.440000
@@ -278424,7 +278424,7 @@ CVE-2025-23022,0,0,bb805305ea96825569d9891ea5d8911d64b95f766e73f0709e01ab6077884
CVE-2025-23025,0,0,a430643fad54c298ac56c82186034eeeea39626036838a2f98e7e7672f4b6ffd,2025-01-14T18:16:05.650000
CVE-2025-23026,0,0,b268119f7916ba3a282a082a7a4e3bccaa70c542061d608ad26e1251c19332fd,2025-01-13T21:15:15.897000
CVE-2025-23027,0,0,21e7f0bf367301f9d9767775ff2fd1e8d057729c5ff745babdc630ff49bcccd7,2025-01-13T20:15:30.150000
-CVE-2025-23028,0,0,c633b45b1b4ee4fc0d4fe25566085043d900e838c5881e023fc6519e95918038,2025-01-22T17:15:13.487000
+CVE-2025-23028,0,1,13ae69c5262ef0d7ca2894534839a2881b38f9219b5ec547112dade56e7ccae9,2025-01-22T17:15:13.487000
CVE-2025-23030,0,0,5f5488f3db88e8c895880e2de98df446e60223d5e62859723fef77413b8f908c,2025-01-14T01:15:17.690000
CVE-2025-23031,0,0,2703053b13ed5e9a113496ca6487c0768e722bf303bd843f213558ab4f1e3cfe,2025-01-14T01:15:17.833000
CVE-2025-23032,0,0,de6528be93400e7c6a12523068c65ae2de0c74bc389f9c5ab57be51bbf210243,2025-01-14T01:15:17.980000
@@ -278434,12 +278434,12 @@ CVE-2025-23035,0,0,81465ccfb56e217fe2ecb3ca3f250da427a8eae026b8a08248c7ffdc5d18b
CVE-2025-23036,0,0,a664e1f5756b5c8a2ba6b15f70f7fe75642c53b97e7a5e9d82b1f0ad0f464499,2025-01-14T01:15:18.563000
CVE-2025-23037,0,0,bba935f3814accd2dad6ca6d2fce59e40a56c8238ed43f73a2e894aba2d72b36,2025-01-14T01:15:18.717000
CVE-2025-23038,0,0,f2cad0907d419559c315d8ea07607ee4f285e136c4ef4195db4d0a456779f91a,2025-01-14T01:15:18.867000
-CVE-2025-23039,0,0,0f4c8b18d96f18300eb9751f08f87708b6a9147a90f825f661850c792e0bc10b,2025-01-17T21:15:11.560000
+CVE-2025-23039,0,1,7fc8622f059047fac19c0c3260e144f1d60b8ffa056e264de94704d62b5a89b4,2025-01-17T21:15:11.560000
CVE-2025-23040,0,0,d4de7a8421c067a3dee1e4828d031dbc8cced140cb9649eae08cdfa2830d8c5d,2025-01-15T18:15:24.797000
CVE-2025-23041,0,0,ffbaafde38ecaf1d57db26f1ec7a4a20e702b6709b42f775e18048cdcef4b867,2025-01-14T19:15:44.713000
CVE-2025-23042,0,0,92005faa00456aa5afa950bd4ab8b8a8c4ca330b482d221fa1133fac47b2b1ec,2025-01-14T19:15:44.863000
-CVE-2025-23044,0,0,bbbddc46c89dc84198e8ef72e664aac6dd19db0a67a15b707c4dde56a230e7bb,2025-01-20T16:15:28.170000
-CVE-2025-23047,0,0,1e42dbcadfbef3a0550a8212afe692278e219ab28b49b7f1aa815f315b176299,2025-01-22T18:15:21.893000
+CVE-2025-23044,0,1,5e238ef98168b46c67064d92777a89529d22a98b8fc7a39f7eca89a7360adfa3,2025-01-20T16:15:28.170000
+CVE-2025-23047,0,1,6fdba3566238181d8ca3c91ca160e254b213eed36441cd5f9334903c854d1fd2,2025-01-22T18:15:21.893000
CVE-2025-23051,0,0,2aefe97c0e4795e43708ca4aacb91936a81f90520498dd80e4c2079564f0d911,2025-01-23T22:15:16
CVE-2025-23052,0,0,9a4a619a1e7b14d6f53e5a9e3dd4b37f5c5ae0529b77755b68f828f3fee5c530,2025-01-23T22:15:16.133000
CVE-2025-23061,0,0,b4f49d5cfe4a6ddd334224104c930dfc4f06696fe9671dfd7fb46829caa69bfb,2025-01-15T05:15:10.517000
@@ -278451,12 +278451,12 @@ CVE-2025-23079,0,0,78406696c95877d502c4c9b4607328548f20c8246eeff924786f7d9228881
CVE-2025-23080,0,0,165d07f7f3ac467de5017c0ed6cba0e28a556747a1eb136b531ca8b1a8ca92c9,2025-01-14T18:16:06.110000
CVE-2025-23081,0,0,8e8adb61025ad816e7ca7d3f543c46c43aae9a6ff6f38d8ecfef81ad769cb146,2025-01-16T16:15:36.090000
CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9a7c,2025-01-14T16:15:36.200000
-CVE-2025-23083,0,0,96e17b9541b5785369a10e3178c2a88e7a9de1d1fb3ff3a42cc758823962d93d,2025-01-22T02:15:33.930000
-CVE-2025-23086,0,0,dde492bd5a142c0b11b6f02556e1eca938bbf23f3754936e124d8d0a78e264d8,2025-01-21T15:15:14.833000
+CVE-2025-23083,0,1,8381bb96d9de4f3a833b9505098a4089bf36e1c1fc3d25063d3a10cff18f7c26,2025-01-22T02:15:33.930000
+CVE-2025-23086,0,1,8c64985aeb33aba8982533ad038d52f283116181730bf252db15e74dc52799fa,2025-01-21T15:15:14.833000
CVE-2025-23087,0,0,ff3ef66bbdfadd92f4bceb83f017cee238f01afd217540d38de3c3bc4241e457,2025-01-23T22:15:16.260000
CVE-2025-23088,0,0,351c4fc9ce77a4e8c7f582485a4c81d867817a4e67e2a7d92df2d5afd4de1eba,2025-01-23T22:15:16.370000
CVE-2025-23089,0,0,53211e365cb35c1ca6468f83d4cfd887f23da2be04794ebbf5b6bdd46246c6fa,2025-01-23T22:15:16.460000
-CVE-2025-23090,0,0,60c2993f5152c1c2225f7fb0fe09e82c44ae30ca30de706890e8f55aedf9de0a,2025-01-22T02:15:34.443000
+CVE-2025-23090,0,1,1fa9642da31f6a1f285e901b43018a8c7dae722f8fb49437e281ea29c270fa57,2025-01-22T02:15:34.443000
CVE-2025-23108,0,0,0867ae52bf9537919e00df206497183b5abf45a3a43e56579f476cc3d26e8d6c,2025-01-13T18:15:22.680000
CVE-2025-23109,0,0,4d519c5c41161d21ebd8f814ea3659acc2224a598528dd7d3e4c7b87a5ad8cc0,2025-01-13T18:15:22.903000
CVE-2025-23110,0,0,b9e32d20d7e6cf23b28c590dc2ad7f239b5186f27517cd303db97f7275b077fa,2025-01-10T22:15:27.550000
@@ -278468,29 +278468,29 @@ CVE-2025-23125,0,0,2e6f0fce9ee8e787d649705f4cf1025930f6b72d6ac2efc70c4c1837b8d7d
CVE-2025-23126,0,0,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4089,2025-01-11T15:15:09.100000
CVE-2025-23127,0,0,ef1aeaee3e917139d62386eaa309c28fa46e54be8ed45ecdaab4f9d4f96931db,2025-01-11T15:15:09.173000
CVE-2025-23128,0,0,856260a69fb4f1bb5d13296c47ffc7dac686c7ca9a44fff8151b1b7f11a740a9,2025-01-11T15:15:09.250000
-CVE-2025-23184,0,0,85dc0b5143649e34450a3676900e6e40d3e1c3056b6e1dfc30b9a36cadde4291,2025-01-21T10:15:08.110000
+CVE-2025-23184,0,1,ee9dbda90e777617ae5cd025264147ad5c96f90afcc3e03d77678dd64ef19027,2025-01-21T10:15:08.110000
CVE-2025-23195,0,0,330ec078db97e6dc3fdb7cdbe57f6450c92255b88a9b52bc02ab0cb6754204fa,2025-01-22T15:15:15.237000
CVE-2025-23196,0,0,c86901772359f4512fdd147449b9ed6294fa0f580a5b9af77dfe2551cf2e530c,2025-01-22T15:15:15.390000
CVE-2025-23198,0,0,8821b8df90adb16cf3625e528f68c391c0bcfa1c8e1e079b50c30f527c621897,2025-01-16T23:15:08.410000
CVE-2025-23199,0,0,3b82f03297e12f7b25649af5d3a8aa211e1441848bb66c00094132bcfe252a94,2025-01-16T23:15:08.567000
CVE-2025-23200,0,0,76f8b53439f8a2997652c579cc0769759091077ab1b58d306f6ddac70c67ff17,2025-01-16T23:15:08.720000
CVE-2025-23201,0,0,1b3a64d48937b528e5dcf493da21f95120ce400124ea2d74eb5a80f41b9d79a2,2025-01-16T23:15:08.880000
-CVE-2025-23202,0,0,ebb9b3c0ec35ea830eb49777cc26a7423c92a02686e756805e9c6768f34595bd,2025-01-17T21:15:11.713000
-CVE-2025-23205,0,0,5dde18f3e1001012d88c0b2d8c423eb8fb8c3ba6cae70cd1181e6ed64426f77c,2025-01-17T21:15:11.850000
-CVE-2025-23206,0,0,ea12574764f66c161153bcbbbe1a91d389bf6c6631d0c7b641a3ca1fa029cc28,2025-01-17T21:15:12.003000
-CVE-2025-23207,0,0,e5de4237889cfabf27065c43b82af396f478aa914ba2d9d161effc65eaba9de4,2025-01-17T22:15:29.523000
-CVE-2025-23208,0,0,722b719f9dcffb0743a2a700fd962fc8d87ee9dd12d5c90b42efdfb8cdbc3a0a,2025-01-17T23:15:13.107000
-CVE-2025-23209,0,0,b5f5728016cefcd5c65fac9ec6e4863e254ca00e3ac538f16ec17bdaa0bbd53c,2025-01-18T01:15:07.633000
-CVE-2025-23214,0,0,8b7d5ac9bd9cd504a1c7e6ea93a409b3f56af5a24048b7bc7d936802dfa3bdd1,2025-01-20T18:15:14.127000
-CVE-2025-23218,0,0,0d9a220919abe3a17ac7afcfc75e9654aeb452859503c7554f342466bfb432de,2025-01-21T15:15:15.053000
-CVE-2025-23219,0,0,7bfc816a66d36eeb8427d1e438890d0ae6033f069415e0175c799b53ab2c0b1e,2025-01-21T15:15:15.247000
-CVE-2025-23220,0,0,7594bd1f2d5770c36a55b5b9fd690b04bf7606bfe4b3acd2181f9cbade146b08,2025-01-21T15:15:15.430000
-CVE-2025-23221,0,0,b9e220051865326d7bce5e6fa27b18637659ac0f27be03003737cde64e90648d,2025-01-20T17:15:07.987000
+CVE-2025-23202,0,1,606abfe8affcfffc46cfbe4934b3324efa1aa49aa7afc6ade9d35fe0827c8508,2025-01-17T21:15:11.713000
+CVE-2025-23205,0,1,13a68cb9c97041e77ea2e9c62ea3cdaa6d25fcbb9b0e282f62adcb7dbf3d3c8b,2025-01-17T21:15:11.850000
+CVE-2025-23206,0,1,7dc609075e2d325da43818b49c297d2a05018960dae87cf88a1c771faf87fea8,2025-01-17T21:15:12.003000
+CVE-2025-23207,0,1,a61af6f2707ecd45627a7e7ca479f8fbbb333f7f551bc284878a54328b3225b8,2025-01-17T22:15:29.523000
+CVE-2025-23208,0,1,bbf05788b0a0727b64438f71dac7780433656c51584efb22baeb9514bc090286,2025-01-17T23:15:13.107000
+CVE-2025-23209,0,1,a2ae850acf3d242275b1a23f48b16552263d960a288c8911fdea38e62d87c1f8,2025-01-18T01:15:07.633000
+CVE-2025-23214,0,1,c6114b08fe21248133ade50d2d6a2ac869f323455d1c9d1cedbe7eb7fbc50600,2025-01-20T18:15:14.127000
+CVE-2025-23218,0,1,b3958878a7e50b75603e021f29b22e3f870c93039e9cd62b904ad60b93ab16c6,2025-01-21T15:15:15.053000
+CVE-2025-23219,0,1,eeb1dd5028561d867342a9c6fb76f8efd39aecc175cf3f46b428158d47aff93a,2025-01-21T15:15:15.247000
+CVE-2025-23220,0,1,fba5d8369804436294572c6b5fbca3b0330d59661922d6ab94c95c9d1c63bd2b,2025-01-21T15:15:15.430000
+CVE-2025-23221,0,1,66ab94f1e6d3ea457770d55c62f0e0360d1ef2f8abc298fcd5936362cd0cc294,2025-01-20T17:15:07.987000
CVE-2025-23222,0,0,6e6cf8752e018e416c67330a2d8c338b5d549b55c5c98add2ee5e3a6cab2ac5a,2025-01-24T17:15:15.730000
-CVE-2025-23227,0,0,75fe948a80947a9372caedcd96d18d272ac6c356759cc5bc5433fe8af18f71c1,2025-01-23T18:15:33.440000
-CVE-2025-23237,0,0,d204c5fb01db488a0f6e27659293f1738cb1ba3c0404ed666043b41f571f334e,2025-01-22T06:15:14.480000
+CVE-2025-23227,0,1,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe29c,2025-01-23T18:15:33.440000
+CVE-2025-23237,0,1,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000
CVE-2025-23366,0,0,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000
-CVE-2025-23369,0,0,a33f07fef2f54f1f73f52a7436ab28743a9935849fa82f187ebe5927ae0216a0,2025-01-21T19:15:12.147000
+CVE-2025-23369,0,1,66187faf123cd1b620a69cca574fbe971b43952983c5e4f566d4fb3bc1049429,2025-01-21T19:15:12.147000
CVE-2025-23422,0,0,0bfcbffa99a5b85a71c8ee37755dbd0aca82e1025173efce8505c4ff37c6deb2,2025-01-24T11:15:09.987000
CVE-2025-23423,0,0,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb398,2025-01-16T20:15:33.573000
CVE-2025-23424,0,0,1257350394b4c232bb2fdb6b8eb342a15971b1159fa19176ca3462575142791d,2025-01-16T20:15:33.723000
@@ -278506,38 +278506,38 @@ CVE-2025-23438,0,0,d5b99d41ae258b81c318d76badc751e3c16a7fbfb5848a85ee9570d47579e
CVE-2025-23442,0,0,ff778f6541faf895ad64165d80b689e528bc89a7807a8adddefabde77d4edffa,2025-01-16T20:15:35.210000
CVE-2025-23444,0,0,bd139aa5f0d5452b293e56da4268a8dc616b5f5ec3a0335035b071fc8609deb1,2025-01-16T20:15:35.360000
CVE-2025-23445,0,0,641133bc0863203a2790eaa4ca8b7599bd8c7c6922be0e426f2e225feec309f9,2025-01-16T20:15:35.513000
-CVE-2025-23449,0,0,6bbcc9886e2c670b577a3a18178e87df9ed4a131fd95c3706bc4c5f073e90961,2025-01-22T15:15:15.650000
+CVE-2025-23449,0,1,613275bedb09e2e861bb62f59864f330acc376ff0c1b1b0bc074b5bdabaa7a78,2025-01-22T15:15:15.650000
CVE-2025-23452,0,0,9ae20555b511c9e710c7a052682906033b9071856145809833c544b191d171ae,2025-01-16T20:15:35.730000
CVE-2025-23453,0,0,559af2b40776602b954faf6eb051d0ee733c24375fc61f4efde0fb69b854694c,2025-01-16T20:15:35.883000
-CVE-2025-23454,0,0,378302c8707f6fd96559ef4a7f4efc3726f47806c14b509deb4db543cb645290,2025-01-21T18:15:16.223000
+CVE-2025-23454,0,1,ace1a82fe5cff36bdca7766343683a02cd2df950eb3a0de3ea36f28eddda747b,2025-01-21T18:15:16.223000
CVE-2025-23455,0,0,b68e42bf1b83a50e0ae3f133160e0d1ee1a7c47161ff1547208b101f38e9ccf6,2025-01-16T20:15:36.033000
CVE-2025-23456,0,0,b9d69f441ecef487989469cbcdd543bce473422ca06c51c0b02404c7506af3d0,2025-01-16T20:15:36.247000
-CVE-2025-23461,0,0,579c786c500a65f7aa3e7a2033668428f43b1c94463c7a65645aeaa42575698b,2025-01-21T18:15:16.387000
-CVE-2025-23462,0,0,c83da6f92808e55252781daa2b8102b2a0626a82ecff91e0a94155a57a6af52b,2025-01-22T15:15:15.800000
+CVE-2025-23461,0,1,98b2580e5c2e45a2882850561564e0c4ed549e275719c2e53782b2517aab4e0b,2025-01-21T18:15:16.387000
+CVE-2025-23462,0,1,1cbda40c7b026a7751435703bbbcd0136a0f74272df54465e1461cee90b3e6e0,2025-01-22T15:15:15.800000
CVE-2025-23463,0,0,98d57f4a46d47d157b5ed19edc615443bfb511b5852b7cb0045c98e9789a1faf,2025-01-16T20:15:36.397000
CVE-2025-23467,0,0,2bf367475f14e1f3924f0a4f22a4aea1a79671e1b9e87972e80793a0f370189e,2025-01-16T20:15:36.547000
CVE-2025-23470,0,0,8848375424af5ed790014076bbf48be372e428fab979e2d67fe4f034138fca32,2025-01-16T20:15:36.700000
CVE-2025-23471,0,0,8559e2ce78e3acc0fab057aadfea445292e3f0c4980827d748c143f09c30fffa,2025-01-16T20:15:36.840000
-CVE-2025-23475,0,0,abfa8175f15a8c73c768247625e270489041dc5b6e8d664338de8f476db8dfb7,2025-01-22T15:15:15.950000
+CVE-2025-23475,0,1,d500dd7531d8e566908097c481d89c76ffcb74e5f97db2505f6eec3dd0bd7878,2025-01-22T15:15:15.950000
CVE-2025-23476,0,0,2e73d00e315595f7a053681ff301d905967319719056a5b9f811682d4d934c03,2025-01-16T20:15:36.990000
-CVE-2025-23477,0,0,c7489baa6f69ef0bb4b1b7eaf1230c06dad483f56b09a6c00a2b524d2ba86b48,2025-01-21T18:15:16.570000
+CVE-2025-23477,0,1,5c6098808319de4505951baebf1a586e4793ae0be4627c3cf65438e22beac475,2025-01-21T18:15:16.570000
CVE-2025-23483,0,0,4bc6ad2f14d9de9a0797c4da2efee9475ed740963c9329c34f76f07dc090372d,2025-01-16T20:15:37.133000
-CVE-2025-23486,0,0,a151744ace0baf7355a35feb751799851f8129e7da75e14c50722636b3d28eae,2025-01-22T15:15:16.093000
-CVE-2025-23489,0,0,3a3896d255f4929b2a6075498e324095380c69536d4ce827a6f668f6ee92ce2a,2025-01-21T18:15:16.740000
-CVE-2025-23495,0,0,e624f14289c8ce911d08e4eb390eac71a09062a20dafcdb0b721551249a2164f,2025-01-22T15:15:16.230000
+CVE-2025-23486,0,1,5c4c60d12926429e3aa6889d885c1dbcc68f1739f8e2c1b42416d06709619e0f,2025-01-22T15:15:16.093000
+CVE-2025-23489,0,1,a8502fb4e83bb7ba28297e2543a85c84c18f12fcd380f120406bbfcdc0815675,2025-01-21T18:15:16.740000
+CVE-2025-23495,0,1,d57a8de8fb814af196722fecb5a18dd24edc9b7e5f0777d2711959a4e3c9cd30,2025-01-22T15:15:16.230000
CVE-2025-23497,0,0,e94acfea44c4d198d5a805782578eef8be632de6ca980583b81a625d10980e86,2025-01-16T20:15:37.293000
-CVE-2025-23498,0,0,2268e6bec17a5f4f64ae99a91e6f95b642dd60a2ee00673b34d1dc59aa5200c1,2025-01-22T15:15:16.370000
+CVE-2025-23498,0,1,832aa4ccbc864b3b2009bd82a545ef0f508abd5850cc23bdce93616b4f99ebc0,2025-01-22T15:15:16.370000
CVE-2025-23499,0,0,18de021795ada6e9003ac109fee0e567e9be54c39a2e050c169b423a62e8fca7,2025-01-16T20:15:37.440000
-CVE-2025-23500,0,0,91a82946fab21967d3b6dbee527f97915154ff38de1323f9bf60075ab19bd6a9,2025-01-22T15:15:16.500000
+CVE-2025-23500,0,1,13fca846a7ec937f53c89a8780adf032804b70357074afde7ee161850aeb9149,2025-01-22T15:15:16.500000
CVE-2025-23501,0,0,2ca3004ea38a2bebeea912643e9114dc05292b671294dc56e8b3bf1f4edc5f4c,2025-01-16T20:15:37.593000
-CVE-2025-23503,0,0,80be664a3eb5b76d13393576ef7abb61c375e9c1bc129f0052ec70eef733c7b3,2025-01-22T15:15:16.633000
-CVE-2025-23506,0,0,30310ef26b26ecaa96c1cd04907444f802ebcf0b7098d704f1603f14c78f517e,2025-01-22T15:15:16.777000
-CVE-2025-23507,0,0,812d4a62b581f6dd4957734d246921934999b28ae76f67f125c6191e54d589d3,2025-01-22T15:15:16.910000
+CVE-2025-23503,0,1,a4b02033d0eb7eda79fc433f2e97c75c34d43dd3fe46ff90a5f5c98245e13852,2025-01-22T15:15:16.633000
+CVE-2025-23506,0,1,90c0d814b62f233821c0c708a22ffd77876864daa325c90a434ee9f60721c1b9,2025-01-22T15:15:16.777000
+CVE-2025-23507,0,1,6d4784f49ae7dec9265fe8e44d24bc53626b4ac7122a1ce31d66a54ea9fb6fa4,2025-01-22T15:15:16.910000
CVE-2025-23508,0,0,790c1f1efcbcf318bf4001598b0da1f3fe803cd0e7ef29b63714b6cf9d49876c,2025-01-16T20:15:37.737000
-CVE-2025-23509,0,0,cb6c2b1174641777b3b8be8152dda4c81a20345e9ee36c211fce6f5f55ac5e1b,2025-01-22T15:15:17.043000
+CVE-2025-23509,0,1,cd414adb05be7092703d4d3195dd2132c055e823840265fb55ac1884ae5f8134,2025-01-22T15:15:17.043000
CVE-2025-23510,0,0,0551a63cb17b341b73a80a568037ce1923b810839cf988e2aae99d670ecbccb1,2025-01-16T20:15:37.890000
CVE-2025-23511,0,0,996d3c261b7453d558ae9e3bf08bfd98e9228b013a71ca7506bf459ee4c525d6,2025-01-16T20:15:38.040000
-CVE-2025-23512,0,0,25ea34cdd44b3fec289362e17617e718f5bd0062d0fb236a44d671db855c3fcf,2025-01-22T15:15:17.160000
+CVE-2025-23512,0,1,011f02699f82430054d11875d3465b72166e1f206c5c8a16a316f920c48dc0fe,2025-01-22T15:15:17.160000
CVE-2025-23513,0,0,b49e0ef03f655c5857bfec7a9b723b31c64932dc8261d0e026a3117175ad4f06,2025-01-16T20:15:38.193000
CVE-2025-23514,0,0,34e07e624b89702dfcb5b7bfffc35f3e8691ecd3b879348a43ce40f20c111b68,2025-01-16T20:15:38.337000
CVE-2025-23522,0,0,98ad48d238b58e05014b495e757593673327270f911d4e0eb6b8c40c96dd710a,2025-01-24T11:15:10.290000
@@ -278545,63 +278545,63 @@ CVE-2025-23528,0,0,12168907b0864434d8a4020bcee1f63e4e5adfac10d77e79ea19c426fc40d
CVE-2025-23530,0,0,8ec89260a35cc3a80dc4111e53382b9b64fc77741f1d33c294cb6047b2afd7ab,2025-01-16T20:15:38.630000
CVE-2025-23532,0,0,deffa93a5742d05598342f489a5313af6567bbdcc8641635c5652a151952e2c9,2025-01-16T20:15:38.783000
CVE-2025-23533,0,0,2feaf795f1df273221ac6faa2b92c08d09ccb79103144b0efc3eedd5b4158baa,2025-01-16T20:15:38.930000
-CVE-2025-23535,0,0,8c6c7853932dc86cad261901d628618e5a1cd59da8c0402b855e776a2dfe5b87,2025-01-22T15:15:17.290000
+CVE-2025-23535,0,1,3d511b60f3f593e8a9f930b9c1bcde4706da165ad4e13c65d31e0f22e6a2e21e,2025-01-22T15:15:17.290000
CVE-2025-23537,0,0,79e57ef42623bfacf08bcf48f182a917b206d07a7014897deba86aa5721ba1be,2025-01-16T20:15:39.070000
-CVE-2025-23540,0,0,cef6a133e0f519c346c79cf9e33c2d71b10256743d5e2f4f0af4cb7697679d1c,2025-01-23T16:15:37.577000
-CVE-2025-23541,0,0,c7e0188afdb6cca28b668f7051b2a69c753640319ff74d903037040d0d79347a,2025-01-23T16:15:37.737000
-CVE-2025-23544,0,0,a764e4fead4c6d296fbb4da3b7f8401895a7c52295237cb1a035f724f515f669,2025-01-23T16:15:37.897000
-CVE-2025-23545,0,0,76d07325ff33d10eafd194e0092c04e3cacf53ae93cfa80a4c4ba8eb628d45f1,2025-01-23T16:15:38.070000
+CVE-2025-23540,0,1,575604080a7e41dafefd577008aef472e583d091e6d52248a1f21517385238a3,2025-01-23T16:15:37.577000
+CVE-2025-23541,0,1,a1bc5006e3c889ba7c285bf5fa18384216ad56e7a9867f658d1b550cc20b4769,2025-01-23T16:15:37.737000
+CVE-2025-23544,0,1,4ed653671a235a9aa2508fedc1a9b552630d378203557455d39060521497ae62,2025-01-23T16:15:37.897000
+CVE-2025-23545,0,1,a51f95b294effe458db270d2606087be8df680dcb349024e6c23e9e2892cfe53,2025-01-23T16:15:38.070000
CVE-2025-23547,0,0,6f6ff07f3f424280073fce42bfdec78cd39e7aff8dc91e913640e544d32ed50a,2025-01-16T20:15:39.220000
-CVE-2025-23548,0,0,c721dc1137d98fc07da1935fe1c35885f96adfba5f6a1ac31f8a89ee20a0c5cc,2025-01-22T15:15:17.423000
-CVE-2025-23551,0,0,3a2e7c6f8f024397a3482b683af17f9f32814f81bbc6ca9c38c2f9e9c6fffb26,2025-01-21T18:15:16.927000
+CVE-2025-23548,0,1,276a2fb61b4341cb5e70c2b13edf0c0f801c0aabef24de04c20105072a319ad2,2025-01-22T15:15:17.423000
+CVE-2025-23551,0,1,e7126fb359d3cea65f3db6ed81dd450c90fcbee9b0dcd4eb99275aedc003ef05,2025-01-21T18:15:16.927000
CVE-2025-23557,0,0,4948e4f74dc87131949549d056234a4050a760fc1ac3fba66738bd84c832aa2e,2025-01-16T20:15:39.363000
CVE-2025-23558,0,0,4291468aaa8c22c74e0bbb0da124051b4e99d0d01c1849f5de31eebeb38c94a6,2025-01-16T20:15:39.503000
CVE-2025-23559,0,0,f107280d0e32fb23f5905ab5f11f98c3b724795adfc26ea0537d5d8ff93e33a0,2025-01-16T20:15:39.650000
CVE-2025-23560,0,0,19b166e58f91145a20070e52b1a91deda6a79a11328a651eb2f155e7b5e396b0,2025-01-16T20:15:39.797000
-CVE-2025-23562,0,0,0821333113da319954bd091c14293df487d7cd138f4dba1eca4a09fb86aeda7e,2025-01-22T15:15:17.557000
+CVE-2025-23562,0,1,9cb34621371243af71dd17df1a8fc22b08dbcd96327873a4a41a64849b184ef8,2025-01-22T15:15:17.557000
CVE-2025-23566,0,0,88ff034c0930eb7962346da8f31a94b9eca19a480252f7930366050551ebf8fd,2025-01-16T20:15:39.947000
CVE-2025-23567,0,0,a5334e3a1104d1d3b6196126e4f57ba74f8e92384c039079a9ba04e3f6d27982,2025-01-16T20:15:40.090000
CVE-2025-23569,0,0,e1a856fd806178c29488dac0d174aee24c02bc663bf84b5b8e41189ca4debaaf,2025-01-16T20:15:40.230000
CVE-2025-23572,0,0,de6082afe4a128b0f4da24928b9919e3a956306fd340d20a91397a5cf127b9da,2025-01-16T20:15:40.403000
CVE-2025-23573,0,0,47a2bcb665ab1e714c4b6c92d3ce819a124f5bc1e2f376db1bb99620f62cdb15,2025-01-16T20:15:40.740000
CVE-2025-23577,0,0,3b4af4e716479b74840f3095c9fd247d1229a5054ee21299e6427c4aa395d98c,2025-01-16T20:15:40.877000
-CVE-2025-23578,0,0,f708e31c6de5a86dea38d33547975de66c336e6d0303dec1b150fe8cc9302e08,2025-01-22T15:15:17.687000
-CVE-2025-23580,0,0,9eddf1eaf4a2583c5b20fc89e10aebe5e5cb76e2c48e48f723b868a0c186ea78,2025-01-21T18:15:17.133000
-CVE-2025-23583,0,0,89446bd1812e0bd45f0d3294b52f4322c4c517986038f3f90e76266ea92928eb,2025-01-22T15:15:17.820000
-CVE-2025-23589,0,0,74a757f601230eab4ee58c1089b93c9544751015dd8e4966bae8697ffb0cab88,2025-01-22T15:15:17.950000
-CVE-2025-23592,0,0,c87dc130bbf66b4c6a0968a3ed7dad715e6675098d8720b6f32bed0c19f7b3cc,2025-01-22T15:15:18.097000
-CVE-2025-23597,0,0,fc06c679d2a2b40c5e7f08a2d7abf6951e495ca8370aefad9cccc8430369bcef,2025-01-22T15:15:18.230000
-CVE-2025-23601,0,0,06c8c2a2a7ecfa69abe997380c981772165bf082de61b014b970f7589c636a06,2025-01-22T15:15:18.363000
-CVE-2025-23602,0,0,11e799a3cab86aa8163996cf13c6d2ad675df72a6f091c99c4bdf1bfb38ccaf5,2025-01-22T15:15:18.503000
-CVE-2025-23603,0,0,ed9daa648d35ef25153f47c4fad725ce6887686049499acb86c08fde0ba99a0f,2025-01-22T15:15:18.667000
-CVE-2025-23604,0,0,84fd112feffc0131ff3c203ca73c4af398db56f66a61c6d2835f3e2756ed98b2,2025-01-22T15:15:18.810000
-CVE-2025-23605,0,0,ae4fec196d1dc1b832453ea9215414736d1e98d98f373b6a2c7903b1d88cb17a,2025-01-22T15:15:18.937000
-CVE-2025-23606,0,0,0ee5355fde41d2bc73e2c4e9c6d390169df372d7a41f6d3a93a1090161861862,2025-01-22T15:15:19.073000
-CVE-2025-23607,0,0,c0547b75766f509223c1e036dccb8deb3606ab189e01667115b20b19b0f124f2,2025-01-22T15:15:19.200000
-CVE-2025-23609,0,0,df23a2919c94b2b16eb8d0e3352f2b745fe5bd0958b662e7f3acf295ea100218,2025-01-22T15:15:19.343000
-CVE-2025-23610,0,0,fded1830d43565dcaa6303361612e26a6faee72e05634f88161f185c38060986,2025-01-22T15:15:19.473000
-CVE-2025-23611,0,0,0fa9fe31de6eb13601640e8aa16e79063806ee87d181a3afe85dbc669bdecd23,2025-01-22T15:15:19.610000
+CVE-2025-23578,0,1,06d6355f414f82fbd5bf55726a97e1bfcad56da2ed33fa8e52f7f055aa010983,2025-01-22T15:15:17.687000
+CVE-2025-23580,0,1,59e55d87bb1152c0b33f0e647e86e7e0bf5bdb957c7b17144cb4b97c87ffc264,2025-01-21T18:15:17.133000
+CVE-2025-23583,0,1,822a096c4bf103ecc85a757b154ff2676bab47254e439d8f1a0dc183e1069329,2025-01-22T15:15:17.820000
+CVE-2025-23589,0,1,ddf5471ae852dabea42c5158329ef70238607d70b85f56376e4ac0c4bb487ae4,2025-01-22T15:15:17.950000
+CVE-2025-23592,0,1,c6c26f6ac5e063b93a35489a4c79c8c99eaee0347d8804de080707e83378d4fd,2025-01-22T15:15:18.097000
+CVE-2025-23597,0,1,3871369d91ae00dd4869bc54339db422ba0880625256256884fee491f4563202,2025-01-22T15:15:18.230000
+CVE-2025-23601,0,1,8cf3c2f8696e7e005f222e1bdb76c123a3be382277805d94473298416d95984a,2025-01-22T15:15:18.363000
+CVE-2025-23602,0,1,4cd584065e9b9f106e16ebb05185970d67a3f28867f9738a25ae9c2e26b7393f,2025-01-22T15:15:18.503000
+CVE-2025-23603,0,1,78c7ce67009ca5ff3670bec4c2414ce10e207ec374be52fd04d889f79e1c45d6,2025-01-22T15:15:18.667000
+CVE-2025-23604,0,1,d56279144514cdc5daad5b3c466909526c99c448b3346e8bbf3af456f2ad5109,2025-01-22T15:15:18.810000
+CVE-2025-23605,0,1,67db90ee04d5018993fde42c4cde15d7d243e4cd1118b8da8651e1f58cdd59d4,2025-01-22T15:15:18.937000
+CVE-2025-23606,0,1,c38dd1d4a6ae1688029e183e8c5b2552914d27580c8f2a8048081c50f826293f,2025-01-22T15:15:19.073000
+CVE-2025-23607,0,1,ff9f11564527f742d653662d17554ba2049b908b8956639bf6ee3d6b405ae580,2025-01-22T15:15:19.200000
+CVE-2025-23609,0,1,14474854f21c759d648600eb840efea171c7e7d20eef7668d4509ac0d3752e4c,2025-01-22T15:15:19.343000
+CVE-2025-23610,0,1,bea3eb33df5c162c6ead2e8876c0bfdddeb3b4c2d4a16e339b3d37b5e18c09fe,2025-01-22T15:15:19.473000
+CVE-2025-23611,0,1,7e1c4e680d69d124fd569daf8ab7126df4498ea6de755d6d668d334f60cec1af,2025-01-22T15:15:19.610000
CVE-2025-23617,0,0,87ef3623aa25e2331adb93f67250ff54cd8c0a9d97a9df407392635eb142408e,2025-01-16T20:15:41.027000
CVE-2025-23618,0,0,2b70f46c9d14af7d7f45645689d4bdb93fcf0d60e0c8dbeddd3d561041eb97d6,2025-01-16T20:15:41.193000
CVE-2025-23620,0,0,09647c5f995fa9db6ccd9597829259959bc90db907c440ccec24baf4752a0b99,2025-01-16T20:15:41.340000
CVE-2025-23621,0,0,03e75f684d689751d79a19af0a8a959ac027b98797482ae51a48089f07f1a50d,2025-01-24T11:15:10.473000
CVE-2025-23622,0,0,eb14f90d3f5cc5815e9a632afafeb611c1e0ebb6f0534055a9479bab5cc880fb,2025-01-24T11:15:10.660000
CVE-2025-23623,0,0,3a19bc13049e6280f5b56d5b01402a56d91485d47ecc589213c73480465da52e,2025-01-16T20:15:41.480000
-CVE-2025-23624,0,0,04a0e2d4658a70bae539d06160d0bbfac021d785d3f991eb2891122803ef0954,2025-01-23T16:15:38.223000
-CVE-2025-23625,0,0,217e6ef7081bd7c0b9ba662afee4b1c58fb2a9d65b968b7120bc7c3250e2e5fd,2025-01-22T15:15:19.747000
-CVE-2025-23626,0,0,552ff36abda85a3a05a08e2ec71afadfe474336d7c6e11952e6cb92d480545f2,2025-01-23T16:15:38.390000
+CVE-2025-23624,0,1,5c95de6c074d63631385243931df402c52e16c3a001745489bc9b79a726c4079,2025-01-23T16:15:38.223000
+CVE-2025-23625,0,1,a59a3b27731f6288d88a5302b111545b9a930aa2ca0b866ad98c3adf5db1b1ec,2025-01-22T15:15:19.747000
+CVE-2025-23626,0,1,b66c1e85016793f473df918a67129c951eb96bbd711625b94732876ca7ac6479,2025-01-23T16:15:38.390000
CVE-2025-23627,0,0,a0e2c69c295a72f80218793a17c28928376cacd73ebedddc83b23cca208996f3,2025-01-16T20:15:41.617000
-CVE-2025-23628,0,0,e5185cd4b4fd73287ded2ad84fed082e8b618b2e894a5fc5f48fcb405d8bccd5,2025-01-23T16:15:38.547000
-CVE-2025-23629,0,0,70db2a49138b7c82bc30ad5d42d8884c6c0b19a0e7b22ac25b1729813fdde50d,2025-01-23T16:15:38.690000
-CVE-2025-23630,0,0,b208c37b8385004cf5b9ab8d1ec82d31a1f5c74f6a94ffaf184ddae9429cddca,2025-01-22T15:15:19.877000
-CVE-2025-23631,0,0,02f6d9465957d5054c431116ffffa3869b38bff6e84764dd8de2115daaa0a23a,2025-01-22T15:15:20.013000
-CVE-2025-23634,0,0,390adeebfff44ba4f5641b1783327c4b690697c42f732ffbf294ab7957288c76,2025-01-23T16:15:38.840000
-CVE-2025-23636,0,0,c9d16644b64e863e52791e93ca544c60202669ef2b5540fe69899ec81d2d7af3,2025-01-23T16:15:38.983000
+CVE-2025-23628,0,1,61ef90b5b835c8b8c4db79563b77ce2fcd12ed89eb60ee143e287e3231080409,2025-01-23T16:15:38.547000
+CVE-2025-23629,0,1,01b9b5cb6314ff066c0384dbc296f566c2de494bce7708202e96de9eafd128e5,2025-01-23T16:15:38.690000
+CVE-2025-23630,0,1,1716653dc7917dbcf33e289e7fd5e7ce17a5a66c790a1baac60673901798ceb8,2025-01-22T15:15:19.877000
+CVE-2025-23631,0,1,73bbe4ebbc3765d6afbad79c26009bc4cc6f77ef459a3c3dafd6282c7fd71706,2025-01-22T15:15:20.013000
+CVE-2025-23634,0,1,48e783563d53ec984be5a175a9f79a779ede5638e8c7f47318c460f317ddeb1f,2025-01-23T16:15:38.840000
+CVE-2025-23636,0,1,e471135e103e9f1102462023b0c8331f734cc9749182a76b579e62c7d60e2121,2025-01-23T16:15:38.983000
CVE-2025-23639,0,0,b5e6c8257038b7490893c42ae7e3121aaccdfc060b9557b2c3eb27b9ad45934a,2025-01-16T20:15:41.763000
CVE-2025-23640,0,0,118e59034a736b15100f4213d9ad0026082135513d4f080af852d559dd80b4a0,2025-01-16T20:15:41.900000
CVE-2025-23641,0,0,7d997794a239066a0b1939bc772f48c377254fbba43ec4f01793fcc89efd7a16,2025-01-16T20:15:42.037000
CVE-2025-23642,0,0,6e64755b7ebe6355ada34a7729dd7046343f3faf18763fdbff82b45cfa37662e,2025-01-16T20:15:42.190000
-CVE-2025-23643,0,0,9f37a10364f980bad82780c689fdd78a0deaa3ad1e962d401a820b194b2472df,2025-01-22T15:15:20.153000
+CVE-2025-23643,0,1,3da60483c0db5a8dc05580f03d199bb8be013bf0c2d67c3cf934aac37d8d4e02,2025-01-22T15:15:20.153000
CVE-2025-23644,0,0,326651915de9287cf85320be6c8601ed58c356f5737bd31685f6785764f50a52,2025-01-16T20:15:42.323000
CVE-2025-23649,0,0,a43a99cf921270df6f54630a1d678841e6741ab04c2bf8f250e77ecaecfc577f,2025-01-16T20:15:42.463000
CVE-2025-23654,0,0,e18c9b36c57bb400d64806c75d784772ed09a49c73653ec930b121712ce380df,2025-01-16T20:15:42.607000
@@ -278611,37 +278611,37 @@ CVE-2025-23661,0,0,1f7f57e7bde62e643387dd0bb1448a0354f6c08b04d2c093fc9523e9645f7
CVE-2025-23662,0,0,551ab5d2ddda20a665b042bd77267fd330911bfdaae473af13983770c49d1a4c,2025-01-16T20:15:43.167000
CVE-2025-23664,0,0,5eaae3d9bb9680e71179473e67178d8041daabfe633ea61ccf7a551976bb9be7,2025-01-16T20:15:43.320000
CVE-2025-23665,0,0,df3a85fb9b6ff519cb09c58b53e0bb17cb58cc0d047b57ae4c9ab7778577a02d,2025-01-16T20:15:43.460000
-CVE-2025-23672,0,0,c3fb91af1806348814c63d2074cf691c867e564aacd74a17c71282cea64e38ad,2025-01-22T15:15:20.287000
+CVE-2025-23672,0,1,9b4e91d2a971d6e816e88b382cc31c2340c56e76479cf040d6e0c5290d97a21a,2025-01-22T15:15:20.287000
CVE-2025-23673,0,0,29cefcd5e33b42efd9dd838456a4202e1ca110aefe8c270bd5abccdd213d0d3b,2025-01-16T20:15:43.620000
-CVE-2025-23674,0,0,564e59b5646963f90da8d6de7e570117f5c77d33a4ef7b8468aaa60a3e08443e,2025-01-22T15:15:20.420000
+CVE-2025-23674,0,1,82d0f47596aa91a27d7206050e2f23fe27e33f61b61152aa1cea9075ecc820e7,2025-01-22T15:15:20.420000
CVE-2025-23675,0,0,458c1564a7ab6b017d8c9eba76dd37a8a1853b4061aa5abc64dc3ca26db82593,2025-01-16T20:15:43.753000
-CVE-2025-23676,0,0,18be2b13b1b7ba91a99e0a34f4f28cd978a6f344061f3dcc8948012463f56f04,2025-01-22T15:15:20.563000
+CVE-2025-23676,0,1,4bf5bcff8c70c5fc669016ae3b941f120e4f35c0cd86965e40a70b87e03cf448,2025-01-22T15:15:20.563000
CVE-2025-23677,0,0,4f1d78d3726e731bfdb135ac6135bd5100b5ae0cb26c60d465015a36da99e6d2,2025-01-16T20:15:43.900000
-CVE-2025-23678,0,0,b3410bde97a95c9b9a03a0d369341d6c5658893135b851378c1d8f847642358e,2025-01-22T15:15:20.703000
-CVE-2025-23679,0,0,93895d1870d3adabcbd4fb28c2e5720cc79a9c04168bf33764d6520ba310bea0,2025-01-22T15:15:20.840000
-CVE-2025-23681,0,0,509cb0a613eb557f8ea195c8e72dfbcf0e8aa99589c2537e75cb3ffcf5700059,2025-01-22T15:15:20.977000
-CVE-2025-23682,0,0,bc0c141099979b7d253776b5d6bad67fbb952b19a1f94f525728324058074ac4,2025-01-22T15:15:21.123000
-CVE-2025-23683,0,0,a3fdbbfed0d3ea240d77190a49def75faa2f7492b32723bbf199bee3e981e548,2025-01-22T15:15:21.260000
-CVE-2025-23684,0,0,c46bc8e9bf9aa909760560cbfad6d08ccb9bc0c607ac7315a88722fbc67f3ef9,2025-01-22T16:15:30.260000
-CVE-2025-23686,0,0,0c58b3a3ffe3be2de9ae3d7864ede303d49849d5b1b75d6d89318e30ed12a089,2025-01-22T16:15:30.433000
+CVE-2025-23678,0,1,fd71e6b199925f30c7db158bd125e86d0da5e7af53b45a85e0f5b90b999f5666,2025-01-22T15:15:20.703000
+CVE-2025-23679,0,1,d3c0650d3ca5cd0faf6f02e15948c534f645d0490b46acfb754330667bba6368,2025-01-22T15:15:20.840000
+CVE-2025-23681,0,1,f82c042162b9a587262b47413d958267d20c3f8d612ca62fe945b1e2351f4565,2025-01-22T15:15:20.977000
+CVE-2025-23682,0,1,1dc79eb95a402a7bbf14eac586ef54c76d3485e19d55ca70f9f6d058ab92ff0a,2025-01-22T15:15:21.123000
+CVE-2025-23683,0,1,ebd9451f7c6683f1f03ad0508434ae28842ad93b8ec1d0606600726754117f3d,2025-01-22T15:15:21.260000
+CVE-2025-23684,0,1,234a24d1e8e96b3b72d83aaedcd8b6fb5cabaa06a6b98aaf99660e3c944bef03,2025-01-22T16:15:30.260000
+CVE-2025-23686,0,1,d9172ab9c0ee71061af46991f01973c528dac83ad23ce6e27eec0e926cde5394,2025-01-22T16:15:30.433000
CVE-2025-23689,0,0,3a077a022662cdd0d4798ac2d9b9685961bbdf05d3a8d2e748b53124c3ed929b,2025-01-16T20:15:44.040000
CVE-2025-23690,0,0,b9e8b4ce7cf418df7c2c552d6aa61f7715b27609fc2dbb370252e45d7528a647,2025-01-16T20:15:44.197000
CVE-2025-23691,0,0,8bccb2407b1830314e082c5ccc8a74914d5f3fb937895330615769bfb1ba0062,2025-01-16T20:15:44.353000
CVE-2025-23692,0,0,2e17dc09b58fdef7a64a307b9ebb3a4288c1a3ecd370c86b93c09184b7a088a4,2025-01-16T20:15:44.503000
CVE-2025-23693,0,0,35d2dbe83503ee70f28839300571a6bba777b599f92d984a8e0b4e211b5751b4,2025-01-16T20:15:44.637000
CVE-2025-23694,0,0,47fbe05d2104a10812a77806de68baefc74a15965356e2e1bafbd830b42b3650,2025-01-16T20:15:44.780000
-CVE-2025-23695,0,0,f166deda11b61054e0bf2058755f5b277ea75f7862850941337d49e768180aab,2025-01-22T16:15:30.597000
-CVE-2025-23696,0,0,216d48c3dd3286b58b62c74d3ad46886e08eb98e8b8830dc9f3fa8e90f181895,2025-01-22T16:15:30.757000
-CVE-2025-23697,0,0,4d7f30807308f17eb9712be7127e9c310d0f80a00ab56a911f3a4a58863881a2,2025-01-22T16:15:30.923000
+CVE-2025-23695,0,1,a10b825965d950622a7980e1502d6ef4f5fb0b26a2c5cf5646487e5e7c3748e4,2025-01-22T16:15:30.597000
+CVE-2025-23696,0,1,48c71d5ea46dfa4b3adea86ce3dd54342274a82ce61773d0d81a676579747e0f,2025-01-22T16:15:30.757000
+CVE-2025-23697,0,1,cf98c1c190ba1a1463886b28462da34a86382e6f72349b87f0921b2a6a012385,2025-01-22T16:15:30.923000
CVE-2025-23698,0,0,b0aad547409e3d2f2bb0d70a09a8547f4cac544665b4cf85000d48948b843e58,2025-01-16T20:15:44.910000
CVE-2025-23699,0,0,21e2b4434b6bbb2f1d160ef769c9fc35e826158249f91b861f8551b4bb2b9f2f,2025-01-16T20:15:45.060000
-CVE-2025-23700,0,0,86fab3e7b6c454fa73ec1009deff6ac4bf723429159a48741efb53d8e2023bc6,2025-01-22T16:15:31.097000
-CVE-2025-23701,0,0,be658b156f070fc8a4b1f52018bd898578f0d64f4fdda903c2aded4c368a4ad6,2025-01-22T15:15:22.250000
+CVE-2025-23700,0,1,cbb6b2caf6ccf5a9205e2726a9c7dd77ec16d9b7b6dbacd1a753e3133b9963e8,2025-01-22T16:15:31.097000
+CVE-2025-23701,0,1,f180e4de465a786563044b9ad2a957043368a8b9a59ce530c78c135c9fc61157,2025-01-22T15:15:22.250000
CVE-2025-23702,0,0,c6087cb20ed5d5e18a0f143ed78da44b9304f988bd02c1f96e1ffd07550520eb,2025-01-16T20:15:45.213000
CVE-2025-23703,0,0,80d20080ae636ff64d3abc90ff0d9b20e73943a9d0425a8d457e36c9952ac466,2025-01-16T20:15:45.350000
-CVE-2025-23706,0,0,8f7d835b9ae16e615e772d050f78aaa9773417aeee4d038d87e360deb07104fc,2025-01-22T15:15:22.387000
+CVE-2025-23706,0,1,1a2e161dc265b25c48ce688ec77864d23cc5f168373b72996a079ae2a991eb2b,2025-01-22T15:15:22.387000
CVE-2025-23708,0,0,eca4a26e61bfe7d5a4e9902977260b188ae344ef1b45725f171e324e5412b97a,2025-01-16T20:15:45.493000
-CVE-2025-23709,0,0,f5d5ed235fe031776e79eb893b7377cf13833832d5a076b93cfc7d39097e51e6,2025-01-22T15:15:22.510000
+CVE-2025-23709,0,1,3b359e76ab8a50cd15550330a3c8e58adb86b8d5b5a171ff389204815eb35981,2025-01-22T15:15:22.510000
CVE-2025-23710,0,0,45dbc592fe3473641cdbf2e1a14db4016a63a47b44096e0e2c864d61e4448449,2025-01-16T20:15:45.643000
CVE-2025-23711,0,0,27be562defc0a0b8c3c85d6434d9d5897de0983be29af91f2ba8d61f2796cb1b,2025-01-24T11:15:10.813000
CVE-2025-23712,0,0,94aa96484213156f9d49bbdc6963c4fd02ab0d8cdee27a020eca5b412a516f8b,2025-01-16T20:15:45.800000
@@ -278649,41 +278649,41 @@ CVE-2025-23713,0,0,e91ea4a4691cd6ea54cef5c014a380cbfb6e447d22416c2178d1e94d8d5e4
CVE-2025-23715,0,0,0640be33a6d521fa9ce6237978250a0e811e0054ca0a5799459a317b8874e4f3,2025-01-16T20:15:46.083000
CVE-2025-23717,0,0,79ec33c46c47146faede274dbb2e9b9df8747f6c2068f93e33c80d094e53ab2c,2025-01-16T20:15:46.247000
CVE-2025-23720,0,0,4f4258f5d82ee9a1c0adeb945db0c0e48cfc2254164386bb711744a2792e3be7,2025-01-16T20:15:46.397000
-CVE-2025-23722,0,0,0bcf58571cf873fc32169d20f13492478ddad9dbf8aaa979500b5b187b33c3be,2025-01-23T16:15:39.117000
-CVE-2025-23723,0,0,5f1ed318679bc99feea02fe6ddf6eaccade9bab6d893906a7ee5b6607115daa2,2025-01-23T16:15:39.260000
-CVE-2025-23724,0,0,58c5ebb527482973d07236a4ca9c79f34bc3e1269b530b5a36db7bb6411ba342,2025-01-23T16:15:39.387000
-CVE-2025-23725,0,0,71e3ffb043f554f65e4a7c23cf8ae19d3747dc9e5b8aeaaa4e7167a6f24624d3,2025-01-23T16:15:39.530000
-CVE-2025-23727,0,0,45eb30236fef8fb03a932f5da091eda55c76701a71c1117e393ac46a51058046,2025-01-23T16:15:39.660000
-CVE-2025-23729,0,0,ebf4ec956b33e866685666fcd6ca263cec7e1cdc00d9556d6f6950174b569d94,2025-01-23T16:15:39.790000
-CVE-2025-23730,0,0,8b973f814ba7f4f98ea0989788a9aab43aba0996496fe63c05892753cfe4a4f6,2025-01-23T16:15:39.933000
-CVE-2025-23732,0,0,f9c2c6f51463d41e0549eb7ece41c4bdf20f17f0aaca7cc5f9b2be741123ae8a,2025-01-22T15:15:22.640000
-CVE-2025-23733,0,0,81145a53a5d8d9ec9d46ceb599117071c92bb0ebe06808e5ffa0db26d38e0803,2025-01-23T16:15:40.073000
+CVE-2025-23722,0,1,c0bdf2b829d7a8bd43085e02d4e7e056c0d0ffd37b99bda77519f55464471ced,2025-01-23T16:15:39.117000
+CVE-2025-23723,0,1,327ff890c66bc4f6304f57f95f2945f2096ccacf1bac80331923afdca5553d32,2025-01-23T16:15:39.260000
+CVE-2025-23724,0,1,85759521dcceb6293655a1d413ae191700de02fc83895c480951d54c5ee558aa,2025-01-23T16:15:39.387000
+CVE-2025-23725,0,1,b40e5b6eb6e24477dabcc116432421fc90ad60ce2752a67c8fd0c42466cd8176,2025-01-23T16:15:39.530000
+CVE-2025-23727,0,1,06939e0ba718c2d1654b535cb4acdd19bc47301ebc0414aba09b8f3cba82ca80,2025-01-23T16:15:39.660000
+CVE-2025-23729,0,1,cf1c2fd2efceda0b2319b0d4ce7dee8c6bda7b3cf825d2b54b8fdeafbe7c4d3c,2025-01-23T16:15:39.790000
+CVE-2025-23730,0,1,6a3d7db8e71ff2248054b5e3980c0318785193417fad4c6b63c6b17ed4394eb7,2025-01-23T16:15:39.933000
+CVE-2025-23732,0,1,855177c0b63c939172b970774664b420c57545668681b17c5c2d27043d29fa01,2025-01-22T15:15:22.640000
+CVE-2025-23733,0,1,ba14d7b711147bcf408bf8e6bd2e361fbeeaf786be070e9273bee40e739e6a4d,2025-01-23T16:15:40.073000
CVE-2025-23734,0,0,7d7924df07b934a0117baea86b737e43ee2ae28800c5d13563e4701756e48a40,2025-01-24T11:15:10.967000
CVE-2025-23737,0,0,f33b7baed3618f1dcfc108f68f97e02471ba3d1eec1f568627a570515b404e1e,2025-01-24T11:15:11.103000
CVE-2025-23743,0,0,803f800009872449a18217dc53667bf2ed09ca71991d264f6860698994827cf0,2025-01-16T20:15:46.550000
CVE-2025-23745,0,0,09ea8b53d4365edcfe38eb3fcbe51bfbcfdfed88a9df4c2f4d1f35c6770b51bd,2025-01-16T20:15:46.687000
-CVE-2025-23746,0,0,7dbcfbc8753c7d90992ff04e5fd6d512faf8dd958e556fda8c0f424e0b99fb1e,2025-01-22T15:15:22.783000
+CVE-2025-23746,0,1,01c9493c9d9f35137d949e9259b4b92a38e781d34f3f66cad8da83d524975422,2025-01-22T15:15:22.783000
CVE-2025-23749,0,0,6aa13db4e4c786d5dfaed7476f7ecb15c17aa377119bb300a3e3bb269b753986,2025-01-16T20:15:46.830000
-CVE-2025-23758,0,0,004cddbb7fcbf8d1b137f59bee4ff830f62d28795451287aaac51385f35e31d2,2025-01-22T15:15:22.907000
+CVE-2025-23758,0,1,8eed9a0b591b6f7c4da32f087513eca80ea069aba6fbd197956f1fc2df31f12b,2025-01-22T15:15:22.907000
CVE-2025-23760,0,0,c926328276013ba4c92054487020a2c00b6299d54746739ff21a4a2b0e4582aa,2025-01-16T21:15:18.257000
CVE-2025-23761,0,0,54955953ddba7da6b8dc6db7af99134b4479d6ff349ea65bc12f9e3c7ac517a4,2025-01-16T21:15:18.410000
CVE-2025-23764,0,0,7f32d20a1e65ecaa3e33bea3553398156868c7ff8731a49a86f2b21b51701ff3,2025-01-16T21:15:18.550000
CVE-2025-23765,0,0,2796d242b4e694c96282a5c8ffeecba3b80388403b475a6ae706c6a35a37e943,2025-01-16T21:15:18.700000
CVE-2025-23767,0,0,76b955d01b413ad0d12074ad466dc5f46f00daa50de12aab124eaa31dd6c7055,2025-01-16T20:15:46.967000
-CVE-2025-23768,0,0,8a37b10750c0d8a9113da1349b6a5ac4b04213b749ef3d87a2eb18f4ebec01f4,2025-01-22T15:15:23.040000
-CVE-2025-23769,0,0,0205226b5568a6b8100dae57f65820a5a6c06790e358e13a78c3fed89ee846f3,2025-01-22T15:15:23.177000
-CVE-2025-23770,0,0,b80dd0a1eb611aff8eee8b8d24e1a997632aea8da27ccb5f8e9b6a5f01a62c02,2025-01-22T15:15:23.303000
+CVE-2025-23768,0,1,3f802da7f4aa35db0e6b02de15a38a000f9ce2b68be3e1feb0dcd6a8239d663a,2025-01-22T15:15:23.040000
+CVE-2025-23769,0,1,28ffdd398d1032f850ee92a9a99701e9bf3cdc75919eacdd81860cd9d940ebee,2025-01-22T15:15:23.177000
+CVE-2025-23770,0,1,217652d16d5d5af3f56a9f28df7581a7f8dff3e62ce235a7fce1b10e12f56222,2025-01-22T15:15:23.303000
CVE-2025-23772,0,0,982ec2219b56005812368f626d4b56d161e9940f6a430166e5a95ac8a677bf4d,2025-01-16T21:15:18.860000
-CVE-2025-23774,0,0,c9a419831e646d53a11d0e9bd0c3d52e6869c5009556ab9fd6a114e7e32a616a,2025-01-22T15:15:23.440000
+CVE-2025-23774,0,1,81233780e9b15e496b3dafcf5be3494c2961a8027fe18ab8c722fadcd8d91d96,2025-01-22T15:15:23.440000
CVE-2025-23775,0,0,881e3af0467c920e3a0da1ed882de028f641d7f31ac26735099153067f58bff2,2025-01-16T21:15:19.007000
CVE-2025-23776,0,0,37de3b2b14e271fcfbb20da8692ccd78a75aacda39d2827a4094c19b2c20520c,2025-01-16T21:15:19.160000
CVE-2025-23777,0,0,4a326f48ab7f72fda28a2029d2e8fcff1eb6ecc0b79f9b4a29e6b77da3703898,2025-01-16T21:15:19.323000
CVE-2025-23778,0,0,ec507f7d7972e2e40560045a380302593c7d0acc005e784a6facac59ad9068bf,2025-01-16T21:15:19.483000
CVE-2025-23779,0,0,529f2e7055a40628327b34353ab55d9e33e7bfdf9dee62cd6c791680554374f9,2025-01-16T21:15:19.640000
CVE-2025-23780,0,0,8e8a5a259b47149e41183320f4a6badd26f64cf46f39776b5541a103424e4292,2025-01-16T21:15:19.800000
-CVE-2025-23781,0,0,953665edb2cfe0730ade6a83e3c5162e57665918533376ee8284ca911772d51c,2025-01-22T15:15:23.573000
+CVE-2025-23781,0,1,47d6fe194029ab58fdc7cafb60d4e376c4c459471ba241479fa8805fbe182b86,2025-01-22T15:15:23.573000
CVE-2025-23783,0,0,87e60e041b1b360cdc15ef5034f69c2a2df8e80bf19196341df29f91771cdf1c,2025-01-16T20:15:47.100000
-CVE-2025-23784,0,0,22611a9b377599282030ad7b3a02cc917eec46e262e8b35598e213806a71df0c,2025-01-22T15:15:23.713000
+CVE-2025-23784,0,1,8c0d6e67f08bcd712d7618a2fdaed5576d6fe4cd62138647e95a874adb22e650,2025-01-22T15:15:23.713000
CVE-2025-23785,0,0,8fa57e244fde111a8cf011b78b0ec1aa32722f2ffac730a959e493b1a51f13a5,2025-01-16T21:15:19.967000
CVE-2025-23791,0,0,0a4e14fe20d5edd4b851b0fffb1f61f6e7f8fd7d1002fde34a1dd39504f5e9f6,2025-01-16T21:15:20.113000
CVE-2025-23793,0,0,75d4eba66871712d0a39959a57f39e10c86950a377381e50afae76d31dc84af5,2025-01-16T21:15:20.267000
@@ -278691,20 +278691,20 @@ CVE-2025-23794,0,0,8097f4da128cc9925b9ca616a7ea5eba076c4b40e08f589897a5a808ba282
CVE-2025-23795,0,0,f110438d2af14e24d173b3605ff2ed725867872c4e87dee92040f4ebb58e5378,2025-01-16T21:15:20.567000
CVE-2025-23796,0,0,0a3fabd756343760fb9fd7ea1faf1fd87c92ac1431e709162d1ddbc10e973b0c,2025-01-16T21:15:20.727000
CVE-2025-23797,0,0,082b5b5ea2fb63d11c655fbf0b483df0d8fb7cfd44eb169c32045a13b0f3b570,2025-01-16T21:15:20.877000
-CVE-2025-23798,0,0,ce8844ff13833d2ff14d80124c81af5080575f19c0ea76d8b6850f5fe5b0fd21,2025-01-22T15:15:23.873000
+CVE-2025-23798,0,1,4eddc7dccd70a41124893520bd0d29bf97c2632162339f6270ea91a744772948,2025-01-22T15:15:23.873000
CVE-2025-23800,0,0,878d719ae1f903e32e2d6add2209886c141de252f651652314e69251a4a34fb9,2025-01-16T21:15:21.040000
CVE-2025-23801,0,0,f35c3b1c7ca35d2725621e19aa2aa2edc970115b0f68db658f0c8dc9dcb2d2ec,2025-01-16T21:15:21.190000
CVE-2025-23802,0,0,c4f195bb87a3033611183b9369b140030963b1f0853d1ac42f2e5edb0b688d0d,2025-01-16T21:15:21.350000
-CVE-2025-23803,0,0,3bec4e0296fc9b80fb78e337cd054888f35cdcf565a99368252ca2182f0e0715,2025-01-22T15:15:24.020000
+CVE-2025-23803,0,1,ef00c343ef62923b13c17bd0a3eede2d8b4135f294d75f5cbc76f17fbd074081,2025-01-22T15:15:24.020000
CVE-2025-23804,0,0,f01e041339f930aed71b2815914fa94f4834913754ef387be79590cf4f99c081,2025-01-16T21:15:21.497000
CVE-2025-23805,0,0,3a5cec6a0d5f7ce2298f7397b6ff24f9044aef89b62bccf77a5ee52165d1206a,2025-01-16T21:15:21.643000
-CVE-2025-23806,0,0,d38ed68a9aa60596739d524b627f715144aa11c9d723e7cd418c21a919641003,2025-01-22T15:15:24.163000
+CVE-2025-23806,0,1,e66d9bba4e84acec01ebfc9290f8564209320a5db7b0d3b3a23d69525fdc96ac,2025-01-22T15:15:24.163000
CVE-2025-23807,0,0,c8793edd44edeaeef736793be45847bc259f064ecf1054a483762c7668919c71,2025-01-16T21:15:21.800000
CVE-2025-23808,0,0,bc9ac4b7d3fac9a3e82e2e48ff9c8301d6a5068db6fc11c17fa56f429c0d18b5,2025-01-16T21:15:21.957000
-CVE-2025-23809,0,0,3d3652094253c29220e58add24ab29cd5b4e555858960cd6abf015b210e62e31,2025-01-22T16:15:31.437000
+CVE-2025-23809,0,1,157b15f298a5a4365d28122fd8093190c68f942a2dd7cb54b8791f8dfbaf5bcf,2025-01-22T16:15:31.437000
CVE-2025-23810,0,0,3d886969fb81b13e95f7725e8aa5117b9c91c9b06310f0521237e64ca9eef400,2025-01-16T21:15:22.107000
-CVE-2025-23811,0,0,5630eea83a5805f16e1709ace6299319b1266cd947390180af8b627ebbac2c1e,2025-01-22T15:15:24.297000
-CVE-2025-23812,0,0,ebb6347b04bfb0418781d264a972d27c27171f0118a07bd3e7a70b67c1f80315,2025-01-22T15:15:24.437000
+CVE-2025-23811,0,1,a592ad1a6830f2a360212cc172215a45f90dfd6c63d414c7dee3d8568db17f46,2025-01-22T15:15:24.297000
+CVE-2025-23812,0,1,98c9b36f3f55314b83969519cd9d5dda0a8bf3f56438ff5e61298e815b303b5e,2025-01-22T15:15:24.437000
CVE-2025-23815,0,0,4a53eeb2a80c868296a8df4afc48475dd10d854a2810a22ebcb90f3a1fb7faf3,2025-01-16T21:15:22.257000
CVE-2025-23816,0,0,99e7a2982284cfe1c4b342546ab2ac7819e99932258e5aada2c1a28f9b0c569b,2025-01-16T21:15:22.407000
CVE-2025-23817,0,0,64c5a2eba1c8283bdb068da6e45257681009c02912f79237808c3a614cc30aa9,2025-01-16T21:15:22.560000
@@ -278722,16 +278722,16 @@ CVE-2025-23830,0,0,b29c1dbb724e30118134483053c6856e5726b7a86f2f6d719fdcfca154e0a
CVE-2025-23831,0,0,5197c9bfacc7e149482a79695ac12aead57f227753093688448b8bbc9868aa27,2025-01-16T21:15:24.360000
CVE-2025-23832,0,0,2679ff496b3a637ccd709dc676c5ecac70472f75fa8b558e60904410452695ff,2025-01-16T21:15:24.510000
CVE-2025-23833,0,0,4c637caa193ae54ea0fefd3799a58624823ed2bc221582b8c4c01c5796d4268d,2025-01-16T21:15:24.653000
-CVE-2025-23834,0,0,1dbd748210f1b6e4635c8b08763efddafce0123e23c5ca71c936fb8159d0def2,2025-01-23T16:15:40.203000
-CVE-2025-23835,0,0,7606968f85d01f1864ef71b7633253161c612c581c429178930cbdba5dc0a24f,2025-01-23T16:15:40.353000
-CVE-2025-23836,0,0,24a495984b66d46312cacf8bd7c83dca80ef9354b162ccd466b02fb58fc23980,2025-01-23T16:15:40.497000
+CVE-2025-23834,0,1,1c7a29b68491eb8349aae943e97359bc8a355e91542f23a5e0a5a9c4c2b1b67d,2025-01-23T16:15:40.203000
+CVE-2025-23835,0,1,8aed2cc804fd0bd5edb17ceb8a7b9cd637a45d67182f754f460ba4a91ec0ce1e,2025-01-23T16:15:40.353000
+CVE-2025-23836,0,1,5c76aa20fa64580f07d9530831e0cb5c7e88e1287b55c63d0300b02146b3c2ad,2025-01-23T16:15:40.497000
CVE-2025-23837,0,0,76685284ac2daee7a7d78877bc63e1e269bc18ca50fef32d9e575a57d12f9331,2025-01-24T11:15:11.240000
CVE-2025-23838,0,0,24fb8d63dd2f5ac819142d58e1c82f09424858eea57b098873816c3e13c28d44,2025-01-24T11:15:11.390000
CVE-2025-23839,0,0,406db93fd37c91a78cc08492e2e85dca42018a74a8633927306473bfef60b3f6,2025-01-24T11:15:11.523000
CVE-2025-23841,0,0,c097c459c2277c131514a3ea078b91eba98a25a334eaa639de34719734a5222a,2025-01-16T21:15:24.793000
CVE-2025-23842,0,0,2b0139d7daa7e9dee90c237d483621e8535d39bd8efb9a3ce143d2d5a6b0d36f,2025-01-16T21:15:24.940000
CVE-2025-23844,0,0,86105cb76b38d6ea0728b9c1232799c3e34ea63adb94598d263dfa4f4d3924ce,2025-01-16T21:15:25.080000
-CVE-2025-23846,0,0,efd4cbcf5a4ed00b418bc131812d8a0a511c669fd47459d9a748c96f746200d4,2025-01-22T15:15:24.570000
+CVE-2025-23846,0,1,114fb14cb9da08075fcfc087aa4768cbe85e21250c7be555b4cbae1d924c3409,2025-01-22T15:15:24.570000
CVE-2025-23848,0,0,89a987df9d0bbdbc45b1ea1fdc383b4ea7fa77b656809c9e88d08eb1cb2905d0,2025-01-16T21:15:25.220000
CVE-2025-23854,0,0,d260b02665c562e6c59db554faa1d37d019f8ad115df9a55a6f95eb87b662a62,2025-01-16T21:15:25.357000
CVE-2025-23856,0,0,a5c5728227279c4b26e1b13f4ba8f4d185c4e16a374fd50014963dfe066d3a3b,2025-01-16T21:15:25.507000
@@ -278742,21 +278742,21 @@ CVE-2025-23862,0,0,43e455fddf90f3c34447a467c3335ac8042fb5f9707f4b791661628b9dcec
CVE-2025-23863,0,0,d95616b48be55928594c24e61ae94fcfcf2463e7aaa3a762196667a8aa388657,2025-01-16T21:15:26.290000
CVE-2025-23864,0,0,1556074f6c47d6d73c0cc3aa4d602a6ab24890828b110133a498f4cdba0dea65,2025-01-16T21:15:26.430000
CVE-2025-23865,0,0,0f3c21c1c89d126d4283426d805a410361dee62541d9cde4b5cadf45f81c85ed,2025-01-16T21:15:26.583000
-CVE-2025-23866,0,0,30af30071ed15c62f01419cbc9bde4bf3883cc229504ebdc59ec189a68b97367,2025-01-22T15:15:24.707000
-CVE-2025-23867,0,0,03bf8ec767c5797644c323e1664c08a3c8b5ece2036bd5159b145eb3c55a998a,2025-01-22T15:15:24.847000
+CVE-2025-23866,0,1,8b6dd4c0fefdda63295f36e8bc7fce334126f823ccaeae7692672b84930cfc40,2025-01-22T15:15:24.707000
+CVE-2025-23867,0,1,d332b5c609038eb44e7753c96ce7f63ec627fbff04ee51ce728e5a187301cdb2,2025-01-22T15:15:24.847000
CVE-2025-23868,0,0,f054cc8161a63226e2f01ef4b9a1ba0ad43bff6340146631c56121e88c3bba58,2025-01-16T21:15:26.730000
CVE-2025-23869,0,0,4ff4bed04cf3b4deb5ef6b86c7b6e6145ded54a8b4752207bd266af492da5b3e,2025-01-16T21:15:26.893000
CVE-2025-23870,0,0,aa54609d2783feb35973271834ffff0b27116b97fe710c44aedeaea0cd9f042a,2025-01-16T21:15:27.040000
CVE-2025-23871,0,0,d9dbe04e8340ac78b18cddcea5b8bfc0e9baf12244cfae716035b32809abf62b,2025-01-16T21:15:27.200000
CVE-2025-23872,0,0,ad5d143e05278154fbef8060b107468b95d0105b74d84c1bd9fc37a9fe01c905,2025-01-16T21:15:27.357000
CVE-2025-23873,0,0,21fcc6c8e584e8c276265223255a97771a21324b69d85135cc089e2cd5c60517,2025-01-16T21:15:27.863000
-CVE-2025-23874,0,0,4e6b5a8a04f9e8846aff5d4043c5940f9c2943dd7d57278b4aee387d7e4be759,2025-01-22T15:15:24.980000
+CVE-2025-23874,0,1,6ff75a73e54be842c49e7b67185eb4866e933167c3b1358882b623e46bb83626,2025-01-22T15:15:24.980000
CVE-2025-23875,0,0,16f54e792dc7d4a56ea38d4496bd3b79642a5531dd27f8c7625708b8f89725af,2025-01-16T21:15:28.323000
CVE-2025-23876,0,0,f11fbcf0ce95bac97cefd73d61ac714e53732fcd35e4b468f025890b159066c2,2025-01-16T21:15:28.763000
CVE-2025-23877,0,0,67025350455285a68998b55a0ec477bcc912252817d20c216ea4c1dcc27f2fb9,2025-01-16T21:15:28.963000
CVE-2025-23878,0,0,807177fe8c69371ec7b74f4303cca26584dc822ecc32e3bde8ff81af05f082df,2025-01-16T21:15:29.140000
CVE-2025-23880,0,0,71a75ff3204104210dc427f5d046fe7419ca87cd3fedcae98d2508e2784497e7,2025-01-16T21:15:29.310000
-CVE-2025-23882,0,0,36131ddac86e672871dd2b6d7d5797bc0de4549602be74e627aabd01b0c3e405,2025-01-22T15:15:25.123000
+CVE-2025-23882,0,1,5fc47ada6fff7776856c53535f904c2d57950c5902aebddc0342440150417e08,2025-01-22T15:15:25.123000
CVE-2025-23884,0,0,2def982b7cbe8992747b18233289c0f945bb92c66265a1e1ac9f76f2473c47c3,2025-01-16T21:15:29.730000
CVE-2025-23885,0,0,1fc8e604ede3a89976e110715861a15ba4f9b2f7718b30177f16c10ff265158e,2025-01-24T11:15:11.660000
CVE-2025-23886,0,0,5adc366069b87d101e00a6524456b5154407eae636225dee1ada8aae236060c3,2025-01-16T21:15:29.927000
@@ -278767,7 +278767,7 @@ CVE-2025-23890,0,0,06096d84655a8da17a5b965f3272a549498ff12dc69e0803b4b53bf2d3e51
CVE-2025-23891,0,0,067509fca70a94da8bfba15188aa14a59b65e478f2187e1845f8151c6444963f,2025-01-16T21:15:30.417000
CVE-2025-23892,0,0,2815c48f9855c15c2bcac6a572f7de134068a4319b8bd6e8a763867a75cbfad5,2025-01-16T21:15:30.580000
CVE-2025-23893,0,0,a4a9f6251fc57ea25ea019d27ce11802eb6e7a61659770654bba0552cdead6b7,2025-01-16T21:15:30.797000
-CVE-2025-23894,0,0,4792914def3e38d1f4d1c9be4b4b323c528b212c91d29c466d00f6210a22499c,2025-01-23T16:15:40.637000
+CVE-2025-23894,0,1,7514f47e56bf0eb28fc877e4f2eed982e908cad00beb8a8f47505cb9bd5a32b2,2025-01-23T16:15:40.637000
CVE-2025-23895,0,0,0f6552a4efe4730b5fca6c1776d00ca6c96003dac49556dc3bb1c6b196286682,2025-01-16T21:15:30.967000
CVE-2025-23896,0,0,69eaaa34a46e8604218c9d61f1ccb999822d545454f0b80f6a3f239fa3cba4e3,2025-01-16T21:15:31.137000
CVE-2025-23897,0,0,b2f6344d86a531aa7a0520ca26d3ad0846e4161c55365af159a9362ee03debee,2025-01-16T21:15:31.310000
@@ -278779,17 +278779,17 @@ CVE-2025-23902,0,0,991c47a865a929869add2c8c1b94dc787e70c9818f90cecd06fc91fb70230
CVE-2025-23907,0,0,62f2d830555983225c93d67a33766339f0b5f5b8104b470ef809680dd862709a,2025-01-16T21:15:32.333000
CVE-2025-23908,0,0,4b396a8852131d43d79fe1137cb49df2e0d52a86fdb32e54e4afe34ce1d8d3d5,2025-01-16T21:15:32.480000
CVE-2025-23909,0,0,076770cf61637e2194048d503e6efbb5af30e3d945de88d9df8b24a008808b14,2025-01-16T21:15:32.637000
-CVE-2025-23910,0,0,0f01cddabcd226a245f97586cb95708d55b6526dc92dab0fad836d5a46f1c064,2025-01-22T15:15:25.267000
+CVE-2025-23910,0,1,8221a795c1f203e593277b7f4ce046bec4a04c175d2bfc6ec0a9298860def6fb,2025-01-22T15:15:25.267000
CVE-2025-23911,0,0,c84f3c03cbebcde516d9e7d2eb31121dc76cbe9eae3d6a160197ca5c801b3a0a,2025-01-16T21:15:32.780000
CVE-2025-23912,0,0,71f7ed0446b35740cd65fa0532ba539441677e227c9d6f0291e2824b2aeca7a5,2025-01-16T21:15:32.930000
CVE-2025-23913,0,0,1c0db589efde0430efbdd4fb08728bf77f22a5c19824f1868ffb6f7669d99839,2025-01-16T21:15:33.100000
-CVE-2025-23914,0,0,2d2a2d14a68c9ee5dd22c22c387a4bef0cd7dfcabd105c27d5e8551bcf567463,2025-01-22T16:15:31.780000
+CVE-2025-23914,0,1,fbb01a0853614510be59802ef766111ae1569e1bc2bfa4d35d8fcd6f215ed36a,2025-01-22T16:15:31.780000
CVE-2025-23915,0,0,fa24c11495785c31783d19f6d79202d5ec4bca34e91b58aa8e740d106f4a1d45,2025-01-16T21:15:33.253000
CVE-2025-23916,0,0,df230f94ac1ab867fbfdcf489fe576668e9fd039e54487be35c133ed2b81a0af,2025-01-16T21:15:33.433000
CVE-2025-23917,0,0,7adbd4e05f39d3ad757642f9dc07ad1eff7d27e478b9d8ca9b60045924a3a9d1,2025-01-16T21:15:33.580000
-CVE-2025-23918,0,0,0d64455764f99b6b2c96575cf79204b4b446db5619bb01e1367593ac54e3a919,2025-01-22T15:15:25.403000
+CVE-2025-23918,0,1,c9e5af0493ff324f7b943c59955503c0e62317b071b44500c7ce7adfe87c0c15,2025-01-22T15:15:25.403000
CVE-2025-23919,0,0,530a6f7b84536027ccf362bf86724781949239704cbb67f8ff6c932f12c95e60,2025-01-16T21:15:33.743000
-CVE-2025-23921,0,0,a9b5a7d55bac4c4dd84bffab829dcd3cbad96c80a5346c205b57ed5d74cb12d0,2025-01-22T15:15:25.547000
+CVE-2025-23921,0,1,16d88c856e9219a9cd4fd06c477c38fa836010451049643cb330afbaffd3d389,2025-01-22T15:15:25.547000
CVE-2025-23922,0,0,bb97fee5262b013c016123296c4a3d7cf40c3875e8a2ea8b79c5b398ca7c549f,2025-01-16T21:15:33.890000
CVE-2025-23924,0,0,d12978221d16424d8c65d853599bf7bdb6e6b9e944d35a5a447045d9d423687a,2025-01-16T21:15:34.040000
CVE-2025-23925,0,0,147c33496e609cb0b342453122e8ad0181b83b87a4b33c441f136e208bcf4a46,2025-01-16T21:15:34.187000
@@ -278798,60 +278798,60 @@ CVE-2025-23927,0,0,8d9bc571b10adf5f0a5277b4afea3bff2ef4c187801274cc14acbeffd320c
CVE-2025-23928,0,0,dda7521d0ca3a1016d24ef4001c08678b9721ea4cf47bd8a5c455160651349dd,2025-01-16T21:15:34.663000
CVE-2025-23929,0,0,7a78b750dcc7312313e19411143a886e72bc0ae48e8c8ee26d293e169e386b25,2025-01-16T21:15:34.817000
CVE-2025-23930,0,0,6ba6d73f7443c4991c12a7db93d08a3afb46e790500ca2b79d23bef6b9715d9d,2025-01-16T21:15:34.987000
-CVE-2025-23931,0,0,596bebb7e224b34cc7b6e2bda8402ebf761bce6b9747b26d0d8ab532ac0ee7ff,2025-01-22T15:15:25.687000
-CVE-2025-23932,0,0,43f9a9748d7a3614d7f11338bc0dbaa5c54c23077d555c8c17b25f14f0cdfba7,2025-01-22T15:15:25.827000
+CVE-2025-23931,0,1,72cf7343fea76bc74181624178c1dc4819038ac84963518c450546629043863e,2025-01-22T15:15:25.687000
+CVE-2025-23932,0,1,616f51628cb4aae04d16943544a6df13ff57edc77ce5e41bc57b50e3443b82db,2025-01-22T15:15:25.827000
CVE-2025-23933,0,0,5314812bb5bb73b3b9600ea0aa8e888771464c5c0299b578bc9a093b69f0f8ef,2025-01-16T21:15:35.210000
CVE-2025-23934,0,0,a8cb5365e4d11290f220de8207cb9b17a94fa7b952841219eee098e5e9d7f9bb,2025-01-16T21:15:35.367000
CVE-2025-23935,0,0,9d94e38cc5252425c16e22bbae5e8fd55332ed37693e2532154d3f3758f684a5,2025-01-16T21:15:35.513000
CVE-2025-23936,0,0,98ce9dfbd803e0feff46465ce5ff38cf3522df4082c1a68d72eabd4f11de5228,2025-01-16T21:15:35.677000
-CVE-2025-23938,0,0,19bf844e8ac0ee6a4d7788a637a5409669c34a0cffa27f702b4cd496e92edd50,2025-01-22T15:15:25.967000
+CVE-2025-23938,0,1,d323577cfec870a5caebea388f099147280b12f4cce3f7b5c850e5a652397791,2025-01-22T15:15:25.967000
CVE-2025-23939,0,0,b227fdb5ca72e62491a5d98a4ab01cce82bbd9f83860732763526745b1f362c4,2025-01-16T21:15:35.910000
CVE-2025-23940,0,0,9e516bed5aa526650bb86798b45bda26374c4c5498fa69a2ccaa76e3d1fb0ffa,2025-01-16T21:15:36.087000
CVE-2025-23941,0,0,1c0020dfccb64dc56163de9642fbb38130446635c08bc70e04e868e60ee25c62,2025-01-16T21:15:36.230000
-CVE-2025-23942,0,0,ecfe313cb6b825f55ce425b59b448fe4a36734d2197b057491ebea76cca1aaf6,2025-01-22T15:15:26.103000
+CVE-2025-23942,0,1,9ff883f88aebc589fded71e4d1d556ae5525a07b480db0ef640b99daa772431f,2025-01-22T15:15:26.103000
CVE-2025-23943,0,0,b11e5fd30a25f84e994f31d10cb8bcc269623009eb1bca3cbe37db51ed9b30fe,2025-01-16T21:15:36.373000
-CVE-2025-23944,0,0,15b1932ae6c8038ca12f3ca2f2547db955e4b5b16b65d6f01ad320413325aa0a,2025-01-22T15:15:26.240000
+CVE-2025-23944,0,1,76e51e816c27b01f3cdf754b9cae2c486c63b6d583abfd6832d9c386496da18d,2025-01-22T15:15:26.240000
CVE-2025-23946,0,0,9de3ccf4350f51c6d8e67eab9fdaace2b0128c36302335bbd7ddc29cf4115806,2025-01-16T21:15:36.520000
CVE-2025-23947,0,0,b918dd9018ba545f112604d29f16795478738d9868aa76eb24c352a7a4e3c4ec,2025-01-16T21:15:36.670000
-CVE-2025-23948,0,0,9aa38eedf8129d161855f1e2750a1f175a3eac2c0905506069f7c571d6484cdf,2025-01-22T15:15:26.383000
-CVE-2025-23949,0,0,5eecf838b220be3c1c102991b178db23ad071d86b150ba2b59c089f05bceccb6,2025-01-22T15:15:26.527000
+CVE-2025-23948,0,1,4481102127d3dce32badd9ebdeafadc80a72462ec6591465834ba75470210bbe,2025-01-22T15:15:26.383000
+CVE-2025-23949,0,1,9c9385318edc8ab53ea98f272f02ee39e2bb24c3ced19e7ab11f6b5916d89e6e,2025-01-22T15:15:26.527000
CVE-2025-23950,0,0,4ac29c4dd1a428d4afa0ee44a692bfd3a045bfda7b0c1933c7ec004bbdec77a8,2025-01-16T21:15:36.817000
CVE-2025-23951,0,0,2d32c1931f285be8ff0de2b01cdf7652c918f38bc79b845ac3d321ee8c1bb84b,2025-01-16T21:15:36.983000
-CVE-2025-23953,0,0,81292523bdc4ad689b105f905d2a58bfc25055e222d5fe31359e6aaed6770d15,2025-01-22T15:15:26.670000
+CVE-2025-23953,0,1,eb0193b784f344147429141f5d08971d2d61f4e055df9381d7e8b46d85433d11,2025-01-22T15:15:26.670000
CVE-2025-23954,0,0,c0b532e328dfa85d7de261ede6d898c1c93d187c5ff87f67c3d88a90ff144287,2025-01-16T21:15:37.133000
CVE-2025-23955,0,0,b35ff47ed4400b2edb51393bc234d7c4ad9797e847fec68985488245984a054d,2025-01-16T21:15:37.277000
CVE-2025-23957,0,0,40b759ae20a341b30b3caf9db81dbe00398828638d81ba3346ad7f7cf25fc424,2025-01-16T21:15:37.420000
-CVE-2025-23959,0,0,2b2438fe3b4602dbb82e2518e6b22fd87132fb61763724b02645b4f69574a537,2025-01-22T15:15:26.810000
-CVE-2025-23960,0,0,7e2ccea401d4e23a57a3b992ccc579da3606ae0f3c4d83461c2158f3c524421b,2025-01-23T16:15:40.777000
+CVE-2025-23959,0,1,9cbbad2c98204678b04ab36257b5bda72645a0a76867cc0f4be9c0f691b751dd,2025-01-22T15:15:26.810000
+CVE-2025-23960,0,1,fef5413834349b73f28bcc0fec0108a4368773674c1a2ae5d7728e978b8298e8,2025-01-23T16:15:40.777000
CVE-2025-23961,0,0,36c0da688ed3e8548f86716b57ea278db435c869e71f4caf3f9de5e6869464d4,2025-01-16T21:15:37.573000
CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96317,2025-01-16T21:15:37.730000
CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000
CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000
-CVE-2025-23966,0,0,fc7e5999f530a14a10296c13e28375f3f98dfdb4b4ec37b22cf284eaa57194f2,2025-01-22T15:15:26.950000
+CVE-2025-23966,0,1,0e6c6a1caa3d328f215893bbd7894611dd4559bc9c207666f24bc83d16a65051,2025-01-22T15:15:26.950000
CVE-2025-23991,0,0,09c292242e39739888eb9fe6d97bdb10055d45d713f6ffa829b0733e0b5456d2,2025-01-24T16:15:38.723000
-CVE-2025-23992,0,0,b353942bf3f0d4eb4ddb991ecb2094a0114d56869df6885590beeb621557c514,2025-01-22T16:15:32.120000
-CVE-2025-23994,0,0,70f6bae30845c345a2a47659ac6161a5d38902de51586bdd3566df0acd6686b4,2025-01-21T18:15:17.313000
-CVE-2025-23996,0,0,ae90e408390ff598631802aba137fcf08482552e78b237e33cc88a7d0fe325b3,2025-01-21T18:15:17.503000
-CVE-2025-23997,0,0,24391beabeac13aaabf73ec76c7bfade06e22f6f0a4bfa6ee1b706ec5c838819,2025-01-21T14:15:13.230000
-CVE-2025-23998,0,0,afcbc71c6708792fd11b4f592b59989e77a98412170ce416415393d1d58b28ba,2025-01-21T14:15:13.413000
-CVE-2025-24001,0,0,9bc88411f5af55c2bdf27b3fccf09d5e75987a6223d2ef54ae2afe451f25f694,2025-01-21T14:15:13.600000
-CVE-2025-24010,0,0,b1ad142cb0e12a44fa76d1536c3ae8cc5dc1c93205ad3e19be582c3fc492507c,2025-01-20T16:15:28.730000
-CVE-2025-24011,0,0,ef3054eb586d4103c7d4f1579402cb29fc72ef24ed77713f16aac75c22474bc3,2025-01-21T16:15:14.760000
-CVE-2025-24012,0,0,f5bd79beea47c443f1575823562f00b43e56d457ba89704e5bb3624bcfbaf130,2025-01-21T16:15:14.923000
-CVE-2025-24013,0,0,a013478a51520d1a805dca03a3a7f43a81c8ee1d4137efd7110dbaf0e05d94c6,2025-01-20T16:15:28.877000
-CVE-2025-24014,0,0,0c972738e3babcd39492772e29e55637e9d570d75dd7fbfa964ee94a33114b3d,2025-01-21T03:15:06.393000
-CVE-2025-24017,0,0,698e63f50e4aae7c13e0ddd63fe88001b8bc75e7f25590bd18e2f1e6f52f6590,2025-01-21T18:15:17.683000
-CVE-2025-24018,0,0,253cb165de2151aa99c00e094e395864d5f28218ab550c9418de5b539f47c113,2025-01-21T18:15:17.803000
-CVE-2025-24019,0,0,d677e8b4264557b8de91d13cc1839d782f81c7838cdf1014e4423ff0e2378420,2025-01-21T18:15:17.933000
-CVE-2025-24020,0,0,d1d82909cc1d36cd28a38444ff637a664659fd65670255997925f7aeb54551d2,2025-01-21T18:15:18.157000
-CVE-2025-24024,0,0,cc1a55cdc4aa0884265065c04ec8fcbe647c671a5eda489d6e2b90242b0234c1,2025-01-21T20:15:46.617000
+CVE-2025-23992,0,1,6d44f95ed9666a8a68923c67dcffd2f515365a6c1e7800071790e2d881846261,2025-01-22T16:15:32.120000
+CVE-2025-23994,0,1,db61266fc09611137499867f42a15cfdb3d24abf264ca83daab38bc4b3bec239,2025-01-21T18:15:17.313000
+CVE-2025-23996,0,1,044a631ccc7b953428bed6ca4f1e78634642ba7fb893e1284d5301e8ce6e28fa,2025-01-21T18:15:17.503000
+CVE-2025-23997,0,1,77e65675aa34b148df76ab43b9568b71cc7208d39621afbe6f65c277717cb0b4,2025-01-21T14:15:13.230000
+CVE-2025-23998,0,1,4ced4b8f68a6d09d5a1c825ec6107a84dbbb418c96e80844463996fce823e3ed,2025-01-21T14:15:13.413000
+CVE-2025-24001,0,1,2c753840ec158b2e8c5040a7ed2631e45b8667250a806707291f782ebc7cf4aa,2025-01-21T14:15:13.600000
+CVE-2025-24010,0,1,755be8be1475b71408bd0286ec94084c98023c6a02427820a8766e3be39154b8,2025-01-20T16:15:28.730000
+CVE-2025-24011,0,1,2164441650cce646420f00734bed063734f0b91471bedb4613983ebc219bdaf8,2025-01-21T16:15:14.760000
+CVE-2025-24012,0,1,51d1bc735a0825f2ee50236d91326ab7fbbbe63482c27f6fb0b2900bc52602b6,2025-01-21T16:15:14.923000
+CVE-2025-24013,0,1,7b40cfb2c3b6c4eade342d9fc55e4330f563cbcf759855be6657139e406290d2,2025-01-20T16:15:28.877000
+CVE-2025-24014,0,1,c01e1782ee7131bc5ad5aeeb3c598dd08e570d6bc857e837f2feba5725cf242d,2025-01-21T03:15:06.393000
+CVE-2025-24017,0,1,4127b8a7fb48204ccdedd278270e1a824a4426e6472255b67fd4d2229bebbdd7,2025-01-21T18:15:17.683000
+CVE-2025-24018,0,1,e4baea09df10b36d105667a7249c05293515d725374ccb74ed2a1fb48a8a06d4,2025-01-21T18:15:17.803000
+CVE-2025-24019,0,1,2a3a6a9851c247290336c704932309ffb09f759a478660ebcaeee5a66d59a10f,2025-01-21T18:15:17.933000
+CVE-2025-24020,0,1,8af21263c34fe60ecd58053859c55a054f32c688226633322d20a805caa3dc4f,2025-01-21T18:15:18.157000
+CVE-2025-24024,0,1,2eed754b499c2c804003117f998e15abebe8d400a886c780cd3d285697b11dd6,2025-01-21T20:15:46.617000
CVE-2025-24025,0,0,6d508ea1c30cfccb0c5ae2e501758315b05b3d1afc132071ad66997004094f14,2025-01-24T21:15:11.600000
-CVE-2025-24027,0,0,b4b9d72fc8e3425a087a0a1486908f265d010b0a775752f732c367a7acbbe48d,2025-01-22T15:15:27.090000
-CVE-2025-24030,0,0,e2fd122b8248f003d111dc0b5ddf9576f531248dec679d6a485c837f76e061a9,2025-01-23T04:15:07.100000
-CVE-2025-24033,0,0,5298ddf90a31dd5bed434b92ade2e1e1f159bb928c748f338aa55ed871c1edd6,2025-01-23T18:15:33.610000
-CVE-2025-24034,0,0,01368f671e1ddc2c3ae3eb7ad36c77d52e8bbadd88990239d386e351378f82b1,2025-01-23T18:15:33.793000
-CVE-2025-24337,0,0,07d30bbea6dfa209bcd4c6bc43756d477d6586721f50f7d7909041753d5deb68,2025-01-20T14:15:27.130000
-CVE-2025-24353,0,0,10800d697e68cd55cff6432e6a23d04d139654b7a35f7e8dc56fa2c5247f6ece,2025-01-23T18:15:33.990000
+CVE-2025-24027,0,1,f65ac7308f5c3c6cd8129d80f7855beb382ff6483816ea5d90d7daafc13bdf67,2025-01-22T15:15:27.090000
+CVE-2025-24030,0,1,5733e61c16a6bce864062ac2236910f12c910592f3dec3b8474553af8903d5b1,2025-01-23T04:15:07.100000
+CVE-2025-24033,0,1,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000
+CVE-2025-24034,0,1,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000
+CVE-2025-24337,0,1,909a943b00c8b637d3fed5ce70273699981b2448e37e3c32ed1614924942542d,2025-01-20T14:15:27.130000
+CVE-2025-24353,0,1,73a00e82e652255c53e1c9aa441604ca19c4f6e89dc8a22b2403655764d58be1,2025-01-23T18:15:33.990000
CVE-2025-24355,0,0,df091ddf8aeeb5f247d7b78b7e73863226f57cadf3f514eb1d8aa9b7831cf7ba,2025-01-24T17:15:16.047000
CVE-2025-24359,0,0,fe898aa41d1a6ecee2652ccd06e899fa4186d85ca361d42c0af02e968484e3d0,2025-01-24T17:15:16.197000
CVE-2025-24360,0,0,2e9c8b6331a8a88dee1c12b547eb6d5cc111d8eab816a900e080a9ac8d56f9f8,2025-01-25T01:15:24.047000
@@ -278865,14 +278865,14 @@ CVE-2025-24400,0,0,d4e33d3f64ab5857e07ca7edc1c70e091d835e180e9973f0447b96fc45e31
CVE-2025-24401,0,0,61fdb52a27a3fd9c35b206712217d25525cc5027272fe2bab11517220f296eb5,2025-01-23T16:15:41.050000
CVE-2025-24402,0,0,3418f6cf5d47b4d89538cc87e13ea06bddcc57e548cfa7657c6e36ff20730512,2025-01-23T16:15:41.190000
CVE-2025-24403,0,0,b2088ac01a9c55c649a445287155d64d27005e5dcd4113b43fe4eee61a530dc4,2025-01-23T16:15:41.333000
-CVE-2025-24456,0,0,5fe51cb996c5e88ea28ff025771c6fdd6bead7226d83716177b689e9ee536362,2025-01-21T18:15:18.320000
-CVE-2025-24457,0,0,0d337221a417a095ea0eb470ff71de9036b70c5502b7158bdb2ff26e48b1123e,2025-01-21T18:15:18.520000
-CVE-2025-24458,0,0,d40186eb9e20b87dbfe22ca8e82230b8c5ca63ed2b27afa922d0acbf4a5a6df1,2025-01-21T18:15:18.697000
-CVE-2025-24459,0,0,cf1053a49f1d3955a9edd8a62798e64293c85e15ea82c35fbb496d77989ebff7,2025-01-21T18:15:18.890000
-CVE-2025-24460,0,0,97eab806c8a3d30547891d4eaab3684701aff9d96e2ee7ed4dd851798df9859e,2025-01-21T18:15:19.067000
-CVE-2025-24461,0,0,4661385da2b0856294db236374b642678d50c8f98ffe4c271a944c44e0c44892,2025-01-21T18:15:19.260000
-CVE-2025-24529,0,0,7459c8f6ea6572438be054043522f6ad7d47bb47712c68b14b3279374ca9499e,2025-01-23T06:15:27.710000
-CVE-2025-24530,0,0,26bcbc2a7fc8ce39ab2344c25221d31ecec6ecd190428b8d21eb1bedd98340f6,2025-01-23T06:15:27.893000
+CVE-2025-24456,0,1,6523f3c101f4627bc76fe98572471b61eebbe2b2db1478b5e2b49419a77df538,2025-01-21T18:15:18.320000
+CVE-2025-24457,0,1,8215739f2c45f2f128765b5c9586342100742ab36e76214e9002205ed3878a50,2025-01-21T18:15:18.520000
+CVE-2025-24458,0,1,03e16f621e1b9e4e70e73985609e6df9be85cc317385d52b463a59fae87ddc54,2025-01-21T18:15:18.697000
+CVE-2025-24459,0,1,c083202f8944227211ab4ec18f1b1811e261bceb2079bbb92a48c6e7c058d3bc,2025-01-21T18:15:18.890000
+CVE-2025-24460,0,1,91287787f4d848d8e28c04d17a6364c6b1da8dd244cdf6af640fa2b8371b6e01,2025-01-21T18:15:19.067000
+CVE-2025-24461,0,1,ad0935e17c290ba8ab95f02ea53cd2528798caff1030b0f8ad947dd515e65dfd,2025-01-21T18:15:19.260000
+CVE-2025-24529,0,1,659084d0f901a45c8b21d541729e6cc04c83a80a3825fa751f6337219739cf86,2025-01-23T06:15:27.710000
+CVE-2025-24530,0,1,4a56bb568b6bd32a8936d0fb868cc9221851e3049a709c6787a03d46cd9e8858,2025-01-23T06:15:27.893000
CVE-2025-24542,0,0,06390c27c63870cfb207e6b1afc38cc2bd70c54f2ceb6de8405d7ce03a0795ae,2025-01-24T18:15:32.550000
CVE-2025-24543,0,0,a8808a4cea2b4649f0717c8217dced1494e1792562a41700280f034c2d3ba9ea,2025-01-24T18:15:32.703000
CVE-2025-24546,0,0,685ea9d400c8b68f55f713daec1971d56383230bb2c0cc8dfdd7487103aa25d1,2025-01-24T18:15:32.893000