From 1899f3d483e1df85c90c64fdb963e91c0de3f74b Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 25 Jul 2024 18:03:14 +0000 Subject: [PATCH] Auto-Update: 2024-07-25T18:00:17.578467+00:00 --- CVE-2019/CVE-2019-08xx/CVE-2019-0808.json | 30 +- CVE-2019/CVE-2019-115xx/CVE-2019-11510.json | 14 +- CVE-2019/CVE-2019-14xx/CVE-2019-1429.json | 35 ++- CVE-2019/CVE-2019-157xx/CVE-2019-15752.json | 43 ++- CVE-2020/CVE-2020-159xx/CVE-2020-15999.json | 16 +- CVE-2020/CVE-2020-160xx/CVE-2020-16009.json | 20 +- CVE-2020/CVE-2020-35xx/CVE-2020-3569.json | 311 +++++++++++++++++--- CVE-2020/CVE-2020-59xx/CVE-2020-5902.json | 16 +- CVE-2020/CVE-2020-85xx/CVE-2020-8515.json | 10 +- CVE-2021/CVE-2021-14xx/CVE-2021-1497.json | 28 +- CVE-2021/CVE-2021-14xx/CVE-2021-1498.json | 20 +- CVE-2021/CVE-2021-17xx/CVE-2021-1732.json | 42 +-- CVE-2021/CVE-2021-200xx/CVE-2021-20090.json | 38 +-- CVE-2021/CVE-2021-211xx/CVE-2021-21148.json | 18 +- CVE-2021/CVE-2021-211xx/CVE-2021-21166.json | 25 +- CVE-2021/CVE-2021-212xx/CVE-2021-21206.json | 23 +- CVE-2021/CVE-2021-212xx/CVE-2021-21220.json | 32 +- CVE-2021/CVE-2021-212xx/CVE-2021-21224.json | 26 +- CVE-2021/CVE-2021-225xx/CVE-2021-22502.json | 28 +- CVE-2021/CVE-2021-238xx/CVE-2021-23874.json | 9 +- CVE-2021/CVE-2021-264xx/CVE-2021-26411.json | 124 ++++---- CVE-2021/CVE-2021-268xx/CVE-2021-26857.json | 99 ++++++- CVE-2021/CVE-2021-268xx/CVE-2021-26858.json | 104 ++++++- CVE-2021/CVE-2021-270xx/CVE-2021-27059.json | 39 +-- CVE-2021/CVE-2021-270xx/CVE-2021-27065.json | 23 +- CVE-2021/CVE-2021-270xx/CVE-2021-27085.json | 32 +- CVE-2021/CVE-2021-286xx/CVE-2021-28663.json | 21 +- CVE-2021/CVE-2021-286xx/CVE-2021-28664.json | 21 +- CVE-2024/CVE-2024-13xx/CVE-2024-1394.json | 6 +- CVE-2024/CVE-2024-224xx/CVE-2024-22444.json | 81 ++++- CVE-2024/CVE-2024-279xx/CVE-2024-27905.json | 2 +- CVE-2024/CVE-2024-319xx/CVE-2024-31970.json | 81 ++++- CVE-2024/CVE-2024-365xx/CVE-2024-36541.json | 63 +++- CVE-2024/CVE-2024-365xx/CVE-2024-36542.json | 21 ++ CVE-2024/CVE-2024-393xx/CVE-2024-39345.json | 81 ++++- CVE-2024/CVE-2024-400xx/CVE-2024-40060.json | 64 +++- CVE-2024/CVE-2024-404xx/CVE-2024-40422.json | 73 ++++- CVE-2024/CVE-2024-404xx/CVE-2024-40430.json | 64 +++- CVE-2024/CVE-2024-405xx/CVE-2024-40575.json | 68 ++++- CVE-2024/CVE-2024-407xx/CVE-2024-40767.json | 6 +- CVE-2024/CVE-2024-408xx/CVE-2024-40872.json | 56 ++++ CVE-2024/CVE-2024-413xx/CVE-2024-41319.json | 80 ++++- CVE-2024/CVE-2024-417xx/CVE-2024-41703.json | 74 ++++- CVE-2024/CVE-2024-417xx/CVE-2024-41704.json | 75 ++++- CVE-2024/CVE-2024-418xx/CVE-2024-41800.json | 68 +++++ CVE-2024/CVE-2024-418xx/CVE-2024-41801.json | 64 ++++ CVE-2024/CVE-2024-419xx/CVE-2024-41914.json | 81 ++++- CVE-2024/CVE-2024-65xx/CVE-2024-6535.json | 12 +- CVE-2024/CVE-2024-70xx/CVE-2024-7007.json | 78 +++++ CVE-2024/CVE-2024-70xx/CVE-2024-7068.json | 74 ++++- CVE-2024/CVE-2024-70xx/CVE-2024-7069.json | 63 +++- CVE-2024/CVE-2024-70xx/CVE-2024-7079.json | 56 +++- CVE-2024/CVE-2024-71xx/CVE-2024-7101.json | 133 +++++++++ README.md | 68 +++-- _state.csv | 210 ++++++------- 55 files changed, 2510 insertions(+), 539 deletions(-) create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36542.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40872.json create mode 100644 CVE-2024/CVE-2024-418xx/CVE-2024-41800.json create mode 100644 CVE-2024/CVE-2024-418xx/CVE-2024-41801.json create mode 100644 CVE-2024/CVE-2024-70xx/CVE-2024-7007.json create mode 100644 CVE-2024/CVE-2024-71xx/CVE-2024-7101.json diff --git a/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json b/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json index 08bccbb4dbe..1ab56685998 100644 --- a/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json +++ b/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json @@ -2,8 +2,8 @@ "id": "CVE-2019-0808", "sourceIdentifier": "secure@microsoft.com", "published": "2019-04-09T03:29:00.873", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T16:19:34.190", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", @@ -20,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -89,8 +89,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:*:*", - "matchCriteriaId": "84079754-7D44-439C-ADFC-C560945B6DF1" + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" }, { "vulnerable": true, @@ -99,13 +99,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", - "matchCriteriaId": "B320A104-9037-487E-BC9A-62B4A6B49FD0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", - "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", + "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" } ] } @@ -115,7 +110,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/157616/Microsoft-Windows-NtUserMNDragOver-Local-Privilege-Escalation.html", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0808", diff --git a/CVE-2019/CVE-2019-115xx/CVE-2019-11510.json b/CVE-2019/CVE-2019-115xx/CVE-2019-11510.json index 550b4935280..d16d331a6d5 100644 --- a/CVE-2019/CVE-2019-115xx/CVE-2019-11510.json +++ b/CVE-2019/CVE-2019-115xx/CVE-2019-11510.json @@ -2,8 +2,8 @@ "id": "CVE-2019-11510", "sourceIdentifier": "cve@mitre.org", "published": "2019-05-08T17:29:00.630", - "lastModified": "2024-02-27T21:04:17.560", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T16:20:01.487", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-04-23", @@ -304,6 +304,7 @@ "url": "http://packetstormsecurity.com/files/154176/Pulse-Secure-SSL-VPN-8.1R15.1-8.2-8.3-9.0-Arbitrary-File-Disclosure.html", "source": "cve@mitre.org", "tags": [ + "Exploit", "Third Party Advisory", "VDB Entry" ] @@ -329,6 +330,7 @@ "url": "https://badpackets.net/over-14500-pulse-secure-vpn-endpoints-vulnerable-to-cve-2019-11510/", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -336,6 +338,7 @@ "url": "https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/", "source": "cve@mitre.org", "tags": [ + "Exploit", "Third Party Advisory" ] }, @@ -350,6 +353,7 @@ "url": "https://kb.pulsesecure.net/?atype=sa", "source": "cve@mitre.org", "tags": [ + "Not Applicable", "Vendor Advisory" ] }, @@ -357,13 +361,17 @@ "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "https://lists.apache.org/thread.html/ff5fa1837b6bd1b24d18a42faa75e165a4573dbe2d434910c15fd08a%40%3Cuser.guacamole.apache.org%3E", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010", diff --git a/CVE-2019/CVE-2019-14xx/CVE-2019-1429.json b/CVE-2019/CVE-2019-14xx/CVE-2019-1429.json index f14c380e6b8..b7e576ffd83 100644 --- a/CVE-2019/CVE-2019-14xx/CVE-2019-1429.json +++ b/CVE-2019/CVE-2019-14xx/CVE-2019-1429.json @@ -2,8 +2,8 @@ "id": "CVE-2019-1429", "sourceIdentifier": "secure@microsoft.com", "published": "2019-11-12T19:15:14.770", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T16:32:27.493", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", @@ -159,33 +159,33 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC160B20-3EA0-49A0-A857-4E7A1C2D74E2" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A363CE8F-F399-4B6E-9E7D-349792F95DDB" }, { "vulnerable": false, @@ -240,7 +240,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/155433/Microsoft-Internet-Explorer-Use-After-Free.html", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1429", diff --git a/CVE-2019/CVE-2019-157xx/CVE-2019-15752.json b/CVE-2019/CVE-2019-157xx/CVE-2019-15752.json index 67295673661..b05c537acdf 100644 --- a/CVE-2019/CVE-2019-157xx/CVE-2019-15752.json +++ b/CVE-2019/CVE-2019-157xx/CVE-2019-15752.json @@ -2,8 +2,8 @@ "id": "CVE-2019-15752", "sourceIdentifier": "cve@mitre.org", "published": "2019-08-28T21:15:10.880", - "lastModified": "2023-11-07T03:05:32.240", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T16:24:56.683", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", @@ -20,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -108,20 +108,47 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:geode:1.12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8DD32C20-8B17-4197-9943-B8293D1C3BED" + } + ] + } + ] } ], "references": [ { "url": "http://packetstormsecurity.com/files/157404/Docker-Credential-Wincred.exe-Privilege-Escalation.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://medium.com/%40morgan.henry.roman/elevation-of-privilege-in-docker-for-windows-2fd8450b478e", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-159xx/CVE-2020-15999.json b/CVE-2020/CVE-2020-159xx/CVE-2020-15999.json index b17de38d211..71fcabaefed 100644 --- a/CVE-2020/CVE-2020-159xx/CVE-2020-15999.json +++ b/CVE-2020/CVE-2020-159xx/CVE-2020-15999.json @@ -2,8 +2,8 @@ "id": "CVE-2020-15999", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2020-11-03T03:15:14.853", - "lastModified": "2024-02-15T02:00:01.647", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:25:29.553", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -165,6 +165,7 @@ "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html", "source": "chrome-cve-admin@google.com", "tags": [ + "Broken Link", "Mailing List", "Third Party Advisory" ] @@ -204,7 +205,10 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://security.gentoo.org/glsa/202011-12", @@ -222,12 +226,16 @@ }, { "url": "https://security.gentoo.org/glsa/202401-19", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2021/dsa-4824", "source": "chrome-cve-admin@google.com", "tags": [ + "Mailing List", "Third Party Advisory" ] } diff --git a/CVE-2020/CVE-2020-160xx/CVE-2020-16009.json b/CVE-2020/CVE-2020-160xx/CVE-2020-16009.json index fc8672ef8af..add717f501e 100644 --- a/CVE-2020/CVE-2020-160xx/CVE-2020-16009.json +++ b/CVE-2020/CVE-2020-160xx/CVE-2020-16009.json @@ -2,8 +2,8 @@ "id": "CVE-2020-16009", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2020-11-03T03:15:15.527", - "lastModified": "2023-11-07T03:18:01.830", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:26:01.377", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", @@ -190,6 +190,7 @@ "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html", "source": "chrome-cve-admin@google.com", "tags": [ + "Broken Link", "Mailing List", "Third Party Advisory" ] @@ -198,6 +199,7 @@ "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html", "source": "chrome-cve-admin@google.com", "tags": [ + "Broken Link", "Mailing List", "Third Party Advisory" ] @@ -223,16 +225,23 @@ "url": "https://crbug.com/1143772", "source": "chrome-cve-admin@google.com", "tags": [ - "Permissions Required" + "Exploit", + "Issue Tracking" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://security.gentoo.org/glsa/202011-12", @@ -245,6 +254,7 @@ "url": "https://www.debian.org/security/2021/dsa-4824", "source": "chrome-cve-admin@google.com", "tags": [ + "Mailing List", "Third Party Advisory" ] } diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3569.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3569.json index 5c006757d5d..6438ecf4871 100644 --- a/CVE-2020/CVE-2020-35xx/CVE-2020-3569.json +++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3569.json @@ -2,8 +2,8 @@ "id": "CVE-2020-3569", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-09-23T01:15:15.503", - "lastModified": "2023-11-07T03:22:55.700", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:21:08.993", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", @@ -26,20 +26,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 8.6, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, - "impactScore": 3.6 + "impactScore": 4.0 }, { "source": "ykramarz@cisco.com", @@ -120,8 +120,53 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios_xr:-:*:*:*:*:*:*:*", - "matchCriteriaId": "92587AA0-BDB6-4594-8F14-DC2A91FA4CD6" + "criteria": "cpe:2.3:o:cisco:ios_xr:6.1.4:*:*:*:*:*:*:*", + "matchCriteriaId": "FC06F7E7-D67F-4C91-B545-F7EB62858BA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:6.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "370F74EC-829D-4574-BE7D-85700E15C433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:6.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "47F3F8E3-D93B-4BAB-8643-AFBFC36940AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:6.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E67F538A-3E1A-4749-BB8D-4F8043653B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "86E05C3F-4095-4B9C-8C11-E32567EB14AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B8AE8971-5003-4A39-8173-E17CE9C2523F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "36944A2B-E4F5-41DE-AC4D-55BFA603BE5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5F70AB37-3C0B-40A8-BC37-5A79DA5F45F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "8B842317-A5DB-4890-948A-DD26B7AE2540" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.1.15:*:*:*:*:*:*:*", + "matchCriteriaId": "48928FFF-871C-4C07-8352-8C802FAD8F53" } ] }, @@ -129,31 +174,6 @@ "operator": "OR", "negate": false, "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3D8E7FFF-82A8-4ECB-BA0C-CBF0C2FDA3A3" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*", - "matchCriteriaId": "87DC4C2F-01C5-4D89-8D79-E5D28EDAD0F2" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F5E2AE67-DED3-4414-A194-386ADB2C8DC7" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3920133A-684D-4A9F-B65A-FF4EAE5052E5" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9ED06361-5A68-4656-AEA5-240C290594CD" - }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:*:*", @@ -209,11 +229,6 @@ "criteria": "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7AA58E5-D7E1-48CF-93FF-C60EB85B2BC7" }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:ios_xrv_9000_router:-:*:*:*:*:*:*:*", - "matchCriteriaId": "703D3DE6-1E69-4A00-91F0-193E5AAFDCF4" - }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:ncs_5001:-:*:*:*:*:*:*:*", @@ -282,6 +297,226 @@ ] } ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.2", + "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ncs_5001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2A8C028-107B-4410-BCC6-5BCB8DB63603" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ncs_5002:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA13FE67-F4AE-46DF-921B-3FB91BDF742B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ncs_5011:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98622F14-CC47-45E0-85E4-A7243309487C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ncs_520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5249FE7A-FAAE-42C4-9250-DF4B2009F420" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ncs_540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC7AE6C1-B7C6-4056-9719-B5CFF71970AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A972EFE-4F7E-4BFC-8631-66A2D16B74A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ncs_5501:se:*:*:*:*:*:*:*", + "matchCriteriaId": "22FE69B4-DF27-46F1-8037-4B8D1F229C6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F72AEF0-EE70-40F8-B52B-1390820B87BB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ncs_5502:se:*:*:*:*:*:*:*", + "matchCriteriaId": "603980FE-9865-4A71-A37C-A90B7F3B72D6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43D21B01-A754-474F-8E46-14D733AB307E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17D6424C-972F-459C-B8F7-04FFD9F541BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ncs_560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4CC8256-E4F8-4DCB-B69A-40A7C5AA41E8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ncs_6008:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61AF653C-DCD4-4B20-A555-71120F9A5BB9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:6.1.4:*:*:*:*:*:*:*", + "matchCriteriaId": "FC06F7E7-D67F-4C91-B545-F7EB62858BA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:6.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E67F538A-3E1A-4749-BB8D-4F8043653B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:6.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "4132A8AA-008B-49DA-AA5C-EB39CC65A2E9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B051AF4-592A-4201-9DD3-8683C1847A00" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-1_16-slot_line_card_chassis:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A5D5476-202C-476C-BC43-C0A963C99079" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-1_16-slot_single-shelf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0F7E3D1-B738-4B69-AB38-3A273F454B9A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-1_4-slot_single-shelf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2039DB3-F6BA-434D-A395-41DF7B641E4D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-1_8-slot_line_card_chassis:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C078ABAD-0E35-481F-8096-FDD40451A318" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-1_8-slot_single-shelf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A8B9BF-E548-4CD9-AEC0-7030B89C4A32" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-1_fabric_card_chassis:-:*:*:*:*:*:*:*", + "matchCriteriaId": "941333EC-86D4-43AC-BD9A-D286B2276C95" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-1_line_card_chassis_\\(dual\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD07CEAB-98E4-4FEE-BFA4-ADA520F7A61F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-1_line_card_chassis_\\(multi\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE33AF1E-5E5C-43A1-B2E3-28E823C47E99" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-1_multishelf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BBA0BE4-ED73-4B8C-BE53-5A2AB76981D0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-3_16-slot_single-shelf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76F8EEEF-085A-49A5-A50E-24922B300F75" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-3_4-slot_single-shelf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "10698948-E6E0-4C9B-9CB9-3626E4076336" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-3_8-slot_single-shelf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40EF0D7E-FB4E-433A-A983-34E44E790542" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-3_multishelf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15448B60-0A19-477C-A08A-17578CF7C92C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-8\\/s-b_crs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D31F6ED1-B20E-44CA-A74B-9D767EDF045F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-8\\/scrs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BDEC7F0-D4D5-45F0-89A4-49C596318C01" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62F5E007-0CB6-424C-9AE8-01618C8C44E0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-x_16-slot_single-shelf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16770F6C-539D-4B65-9C52-60F008C283D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs-x_multishelf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4F47E9F-D7BA-49B9-8070-1BC610B6AE2D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:crs_performance_route_processor:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6D383DA-04D7-4789-B7F7-B31FD645BA8F" + } + ] + } + ] } ], "references": [ diff --git a/CVE-2020/CVE-2020-59xx/CVE-2020-5902.json b/CVE-2020/CVE-2020-59xx/CVE-2020-5902.json index 88c33436e5d..9960ec31ed4 100644 --- a/CVE-2020/CVE-2020-59xx/CVE-2020-5902.json +++ b/CVE-2020/CVE-2020-59xx/CVE-2020-5902.json @@ -2,8 +2,8 @@ "id": "CVE-2020-5902", "sourceIdentifier": "f5sirt@f5.com", "published": "2020-07-01T15:15:15.360", - "lastModified": "2023-11-14T03:15:07.810", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T16:42:50.637", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", @@ -685,6 +685,7 @@ "url": "http://packetstormsecurity.com/files/158333/BIG-IP-TMUI-Remote-Code-Execution.html", "source": "f5sirt@f5.com", "tags": [ + "Exploit", "Third Party Advisory", "VDB Entry" ] @@ -701,6 +702,7 @@ "url": "http://packetstormsecurity.com/files/158366/F5-BIG-IP-TMUI-Directory-Traversal-File-Upload-Code-Execution.html", "source": "f5sirt@f5.com", "tags": [ + "Exploit", "Third Party Advisory", "VDB Entry" ] @@ -717,13 +719,19 @@ "url": "http://packetstormsecurity.com/files/158581/F5-Big-IP-13.1.3-Build-0.0.6-Local-File-Inclusion.html", "source": "f5sirt@f5.com", "tags": [ + "Exploit", "Third Party Advisory", "VDB Entry" ] }, { "url": "http://packetstormsecurity.com/files/175671/F5-BIG-IP-TMUI-Directory-Traversal-File-Upload-Code-Execution.html", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://badpackets.net/over-3000-f5-big-ip-endpoints-vulnerable-to-cve-2020-5902/", @@ -737,6 +745,7 @@ "url": "https://github.com/Critical-Start/Team-Ares/tree/master/CVE-2020-5902", "source": "f5sirt@f5.com", "tags": [ + "Broken Link", "Exploit", "Third Party Advisory" ] @@ -752,6 +761,7 @@ "url": "https://swarm.ptsecurity.com/rce-in-f5-big-ip/", "source": "f5sirt@f5.com", "tags": [ + "Exploit", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-85xx/CVE-2020-8515.json b/CVE-2020/CVE-2020-85xx/CVE-2020-8515.json index 2c54a058116..cfadd191aca 100644 --- a/CVE-2020/CVE-2020-85xx/CVE-2020-8515.json +++ b/CVE-2020/CVE-2020-85xx/CVE-2020-8515.json @@ -2,8 +2,8 @@ "id": "CVE-2020-8515", "sourceIdentifier": "cve@mitre.org", "published": "2020-02-01T13:15:12.623", - "lastModified": "2023-11-07T03:26:36.773", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T16:40:16.430", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", @@ -187,12 +187,16 @@ "url": "https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html", "source": "cve@mitre.org", "tags": [ + "Permissions Required", "Third Party Advisory" ] }, { "url": "https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-%28cve-2020-8515%29/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1497.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1497.json index 908b60ee18b..65c91d49614 100644 --- a/CVE-2021/CVE-2021-14xx/CVE-2021-1497.json +++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1497.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1497", "sourceIdentifier": "ykramarz@cisco.com", "published": "2021-05-06T13:15:10.500", - "lastModified": "2023-11-07T03:28:26.200", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:32:35.267", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -90,7 +90,7 @@ }, "weaknesses": [ { - "source": "ykramarz@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -98,6 +98,16 @@ "value": "CWE-78" } ] + }, + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ @@ -110,8 +120,16 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:4.0\\(2a\\):*:*:*:*:*:*:*", - "matchCriteriaId": "4E04A6D2-3FF8-4921-BF2F-4D2A97EBE2E2" + "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0\\(2e\\)", + "matchCriteriaId": "17BC381C-F6CD-4B90-B4AE-8544966ECCE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.5\\(2a\\)", + "matchCriteriaId": "D125A3BA-3182-4E44-92CB-E46CA2D5292D" } ] }, diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1498.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1498.json index dfbb701c6d8..4c8e43c738b 100644 --- a/CVE-2021/CVE-2021-14xx/CVE-2021-1498.json +++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1498.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1498", "sourceIdentifier": "ykramarz@cisco.com", "published": "2021-05-06T13:15:10.537", - "lastModified": "2023-11-07T03:28:26.367", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:33:21.813", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -90,8 +90,18 @@ }, "weaknesses": [ { - "source": "ykramarz@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + }, + { + "source": "ykramarz@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -118,8 +128,8 @@ "vulnerable": true, "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.5", - "versionEndIncluding": "4.5\\(2a\\)", - "matchCriteriaId": "1ED94F5B-C90F-4967-B0B3-04A53240E4C3" + "versionEndExcluding": "4.5\\(2a\\)", + "matchCriteriaId": "D125A3BA-3182-4E44-92CB-E46CA2D5292D" } ] }, diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1732.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1732.json index 9165dd74882..1bba3835bcc 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1732.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1732.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1732", "sourceIdentifier": "secure@microsoft.com", "published": "2021-02-25T23:15:13.930", - "lastModified": "2023-12-29T23:15:26.480", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:53:12.640", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -109,48 +109,48 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1B570A8-ED1A-46B6-B8AB-064445F8FC4C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372" + "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4DBE5B2-AE10-4251-BCDA-DC5EDEE6EE67" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", - "matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AFD13A6-A390-4400-9029-2F4058CA17E2" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F" + "criteria": "cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE7E7B1-64AC-4986-A50B-0918A42C05BB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "C253A63F-03AB-41CB-A03A-B2674DEA98AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", - "matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82" + "criteria": "cpe:2.3:o:microsoft:windows_server_2004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62224791-644C-4D1F-AD77-56B16CF27630" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84F9B6B1-4FEE-4D4B-B35F-B07822CCD669" } ] } diff --git a/CVE-2021/CVE-2021-200xx/CVE-2021-20090.json b/CVE-2021/CVE-2021-200xx/CVE-2021-20090.json index e907c551d94..6c644fa16fe 100644 --- a/CVE-2021/CVE-2021-200xx/CVE-2021-20090.json +++ b/CVE-2021/CVE-2021-200xx/CVE-2021-20090.json @@ -2,8 +2,8 @@ "id": "CVE-2021-20090", "sourceIdentifier": "vulnreport@tenable.com", "published": "2021-04-29T15:15:10.630", - "lastModified": "2023-10-18T01:15:24.427", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:32:27.007", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -89,9 +89,10 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:buffalo:wsr-2533dhpl2-bk:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1B03FA14-33E3-44D2-8165-197CB446F2D2" + "vulnerable": true, + "criteria": "cpe:2.3:o:buffalo:wsr-2533dhpl2-bk_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.02", + "matchCriteriaId": "D861729C-023B-4D73-8C4C-BF7E8B0B7045" } ] }, @@ -100,10 +101,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:buffalo:wsr-2533dhpl2-bk_firmware:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.02", - "matchCriteriaId": "D861729C-023B-4D73-8C4C-BF7E8B0B7045" + "vulnerable": false, + "criteria": "cpe:2.3:h:buffalo:wsr-2533dhpl2-bk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B03FA14-33E3-44D2-8165-197CB446F2D2" } ] } @@ -117,9 +117,10 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:buffalo:wsr-2533dhp3-bk:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7AA91D93-E2B9-4415-B541-1968F1F39814" + "vulnerable": true, + "criteria": "cpe:2.3:o:buffalo:wsr-2533dhp3-bk_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.24", + "matchCriteriaId": "63232EC8-B2B8-4867-93DB-C0C5147E2730" } ] }, @@ -128,10 +129,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:buffalo:wsr-2533dhp3-bk_firmware:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.24", - "matchCriteriaId": "63232EC8-B2B8-4867-93DB-C0C5147E2730" + "vulnerable": false, + "criteria": "cpe:2.3:h:buffalo:wsr-2533dhp3-bk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AA91D93-E2B9-4415-B541-1968F1F39814" } ] } @@ -149,7 +149,11 @@ }, { "url": "https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/", - "source": "vulnreport@tenable.com" + "source": "vulnreport@tenable.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.tenable.com/security/research/tra-2021-13", diff --git a/CVE-2021/CVE-2021-211xx/CVE-2021-21148.json b/CVE-2021/CVE-2021-211xx/CVE-2021-21148.json index 11f755f088c..a862cbaafb2 100644 --- a/CVE-2021/CVE-2021-211xx/CVE-2021-21148.json +++ b/CVE-2021/CVE-2021-211xx/CVE-2021-21148.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21148", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-02-09T16:15:12.390", - "lastModified": "2023-11-07T03:29:33.490", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:52:35.147", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -146,8 +146,7 @@ "url": "https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop_4.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Release Notes", - "Vendor Advisory" + "Release Notes" ] }, { @@ -159,11 +158,17 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7ACWYJ74Z3YN2XH4QMUEGNBC3VXX464L/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUQSMNV7INLDDSD3RKI5S5EAULX2QC7P/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://security.gentoo.org/glsa/202104-08", @@ -176,6 +181,7 @@ "url": "https://www.debian.org/security/2021/dsa-4858", "source": "chrome-cve-admin@google.com", "tags": [ + "Mailing List", "Third Party Advisory" ] } diff --git a/CVE-2021/CVE-2021-211xx/CVE-2021-21166.json b/CVE-2021/CVE-2021-211xx/CVE-2021-21166.json index 6a6bf1eb55b..d81c30b4b28 100644 --- a/CVE-2021/CVE-2021-211xx/CVE-2021-21166.json +++ b/CVE-2021/CVE-2021-211xx/CVE-2021-21166.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21166", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-03-09T18:15:16.297", - "lastModified": "2023-11-07T03:29:34.903", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:34:26.050", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -75,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-362" + "value": "NVD-CWE-Other" } ] } @@ -143,8 +143,7 @@ "url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Release Notes", - "Vendor Advisory" + "Release Notes" ] }, { @@ -156,15 +155,24 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCIDZ77XUDMB2EBPPWCQXPEIJERDNSNT/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://security.gentoo.org/glsa/202104-08", @@ -177,6 +185,7 @@ "url": "https://www.debian.org/security/2021/dsa-4886", "source": "chrome-cve-admin@google.com", "tags": [ + "Mailing List", "Third Party Advisory" ] } diff --git a/CVE-2021/CVE-2021-212xx/CVE-2021-21206.json b/CVE-2021/CVE-2021-212xx/CVE-2021-21206.json index a49c351d499..b050c7ffc53 100644 --- a/CVE-2021/CVE-2021-212xx/CVE-2021-21206.json +++ b/CVE-2021/CVE-2021-212xx/CVE-2021-21206.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21206", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-04-26T17:15:08.213", - "lastModified": "2024-02-15T02:00:01.650", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:31:14.790", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -128,28 +128,37 @@ "url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Release Notes", - "Third Party Advisory" + "Release Notes" ] }, { "url": "https://crbug.com/1196781", "source": "chrome-cve-admin@google.com", "tags": [ + "Permissions Required", "Third Party Advisory" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://security.gentoo.org/glsa/202104-08", diff --git a/CVE-2021/CVE-2021-212xx/CVE-2021-21220.json b/CVE-2021/CVE-2021-212xx/CVE-2021-21220.json index b3587e0a881..48e34f44722 100644 --- a/CVE-2021/CVE-2021-212xx/CVE-2021-21220.json +++ b/CVE-2021/CVE-2021-212xx/CVE-2021-21220.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21220", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-04-26T17:15:08.593", - "lastModified": "2023-12-14T16:15:43.700", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:31:21.870", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -128,40 +128,54 @@ "url": "http://packetstormsecurity.com/files/162437/Google-Chrome-XOR-Typer-Out-Of-Bounds-Access-Remote-Code-Execution.html", "source": "chrome-cve-admin@google.com", "tags": [ + "Exploit", "Third Party Advisory", "VDB Entry" ] }, { "url": "http://packetstormsecurity.com/files/176210/Chrome-V8-JIT-XOR-Arbitrary-Code-Execution.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Release Notes", - "Third Party Advisory" + "Release Notes" ] }, { "url": "https://crbug.com/1196683", "source": "chrome-cve-admin@google.com", "tags": [ - "Third Party Advisory" + "Exploit", + "Issue Tracking" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://security.gentoo.org/glsa/202104-08", diff --git a/CVE-2021/CVE-2021-212xx/CVE-2021-21224.json b/CVE-2021/CVE-2021-212xx/CVE-2021-21224.json index 4fd97ce4010..0715f231371 100644 --- a/CVE-2021/CVE-2021-212xx/CVE-2021-21224.json +++ b/CVE-2021/CVE-2021-212xx/CVE-2021-21224.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21224", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-04-26T17:15:08.703", - "lastModified": "2023-11-07T03:29:40.187", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:31:25.827", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -143,28 +143,37 @@ "url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Release Notes", - "Third Party Advisory" + "Release Notes" ] }, { "url": "https://crbug.com/1195777", "source": "chrome-cve-admin@google.com", "tags": [ - "Third Party Advisory" + "Exploit", + "Issue Tracking" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://security.gentoo.org/glsa/202104-08", @@ -177,6 +186,7 @@ "url": "https://www.debian.org/security/2021/dsa-4906", "source": "chrome-cve-admin@google.com", "tags": [ + "Mailing List", "Third Party Advisory" ] } diff --git a/CVE-2021/CVE-2021-225xx/CVE-2021-22502.json b/CVE-2021/CVE-2021-225xx/CVE-2021-22502.json index 99be0bd35df..706a43529e9 100644 --- a/CVE-2021/CVE-2021-225xx/CVE-2021-22502.json +++ b/CVE-2021/CVE-2021-225xx/CVE-2021-22502.json @@ -2,8 +2,8 @@ "id": "CVE-2021-22502", "sourceIdentifier": "security@opentext.com", "published": "2021-02-08T22:15:12.527", - "lastModified": "2023-11-07T03:30:14.610", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:52:31.453", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -100,19 +100,35 @@ "references": [ { "url": "http://packetstormsecurity.com/files/162408/Micro-Focus-Operations-Bridge-Reporter-Unauthenticated-Command-Injection.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://softwaresupport.softwaregrp.com/doc/KM03775947", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-153/", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-154/", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-238xx/CVE-2021-23874.json b/CVE-2021/CVE-2021-238xx/CVE-2021-23874.json index 07972649d5a..90ef0d8c1a6 100644 --- a/CVE-2021/CVE-2021-238xx/CVE-2021-23874.json +++ b/CVE-2021/CVE-2021-238xx/CVE-2021-23874.json @@ -2,8 +2,8 @@ "id": "CVE-2021-23874", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2021-02-10T11:15:12.943", - "lastModified": "2023-11-07T03:30:55.993", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:53:02.490", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -131,7 +131,10 @@ "references": [ { "url": "http://service.mcafee.com/FAQDocument.aspx?&id=TS103114", - "source": "trellixpsirt@trellix.com" + "source": "trellixpsirt@trellix.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-264xx/CVE-2021-26411.json b/CVE-2021/CVE-2021-264xx/CVE-2021-26411.json index 2516cec2ac6..d06b35b3b5c 100644 --- a/CVE-2021/CVE-2021-264xx/CVE-2021-26411.json +++ b/CVE-2021/CVE-2021-264xx/CVE-2021-26411.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26411", "sourceIdentifier": "secure@microsoft.com", "published": "2021-03-11T16:15:13.863", - "lastModified": "2023-12-29T17:15:59.767", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:29:04.120", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -46,19 +46,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", - "attackComplexity": "HIGH", + "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 8.8, "baseSeverity": "HIGH" }, - "exploitabilityScore": 1.6, + "exploitabilityScore": 2.8, "impactScore": 5.9 } ], @@ -104,44 +104,55 @@ { "operator": "AND", "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77D197D7-57FB-4898-8C70-B19D5F0D5BE0" + } + ] + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1B570A8-ED1A-46B6-B8AB-064445F8FC4C" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372" + "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4DBE5B2-AE10-4251-BCDA-DC5EDEE6EE67" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", - "matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AFD13A6-A390-4400-9029-2F4058CA17E2" }, { "vulnerable": false, @@ -154,61 +165,61 @@ "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" } ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", - "matchCriteriaId": "77D197D7-57FB-4898-8C70-B19D5F0D5BE0" - } - ] } ] }, { "operator": "AND", "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*", + "matchCriteriaId": "D7809F78-8D56-4925-A8F9-4119B973A667" + } + ] + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1B570A8-ED1A-46B6-B8AB-064445F8FC4C" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372" + "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4DBE5B2-AE10-4251-BCDA-DC5EDEE6EE67" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", - "matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AFD13A6-A390-4400-9029-2F4058CA17E2" }, { "vulnerable": false, @@ -251,17 +262,6 @@ "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" } ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*", - "matchCriteriaId": "D7809F78-8D56-4925-A8F9-4119B973A667" - } - ] } ] }, @@ -273,9 +273,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", - "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", + "matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360" } ] }, @@ -284,9 +284,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", - "matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360" + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" } ] } diff --git a/CVE-2021/CVE-2021-268xx/CVE-2021-26857.json b/CVE-2021/CVE-2021-268xx/CVE-2021-26857.json index 813eb131a1a..59bf441e85d 100644 --- a/CVE-2021/CVE-2021-268xx/CVE-2021-26857.json +++ b/CVE-2021/CVE-2021-268xx/CVE-2021-26857.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26857", "sourceIdentifier": "secure@microsoft.com", "published": "2021-03-03T00:15:12.167", - "lastModified": "2023-12-29T17:16:01.073", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:53:21.247", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-04-16", @@ -112,11 +112,61 @@ "criteria": "cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*", "matchCriteriaId": "3E5EA9AD-1E84-4AB5-A1EF-3B9F2AC84755" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_22:*:*:*:*:*:*", + "matchCriteriaId": "751FD35F-2ECD-4B75-9589-988CC6AD3058" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*", "matchCriteriaId": "DA166F2A-D83B-4D50-AD0B-668D813E0585" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2013:sp1:*:*:*:*:*:*", + "matchCriteriaId": "0C21F84B-E99C-451D-9EAF-6352FD2B0EAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_10:*:*:*:*:*:*", + "matchCriteriaId": "63E362CB-CF75-4B7E-A4B1-D6D84AFCBB68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_11:*:*:*:*:*:*", + "matchCriteriaId": "9BE04790-85A2-4078-88CE-1787BC5172E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_12:*:*:*:*:*:*", + "matchCriteriaId": "CCF101BE-27FD-4E2D-A694-C606BD3D1ED7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_13:*:*:*:*:*:*", + "matchCriteriaId": "4DF5BDB5-205D-4B64-A49A-0152AFCF4A13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_14:*:*:*:*:*:*", + "matchCriteriaId": "55284CF7-0D04-4216-83FE-4B1F9CA94207" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_15:*:*:*:*:*:*", + "matchCriteriaId": "CA2CE223-AA49-49E6-AC32-59270EFF55AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_16:*:*:*:*:*:*", + "matchCriteriaId": "4830D6A9-AF74-480C-8F69-8648CD619980" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:*", + "matchCriteriaId": "079E1E3F-FF25-4B0D-AC98-191D6455A014" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:*", @@ -127,6 +177,51 @@ "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*", "matchCriteriaId": "28FCA0E8-7D27-4746-9731-91B834CA3E64" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_8:*:*:*:*:*:*", + "matchCriteriaId": "075E907F-AF2F-4C31-86C7-51972BE412A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_9:*:*:*:*:*:*", + "matchCriteriaId": "69AF19DC-3D65-49A8-A85F-511085CDF27B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:-:*:*:*:*:*:*", + "matchCriteriaId": "40D8A6DB-9225-4A3F-AD76-192F6CCCF002" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_1:*:*:*:*:*:*", + "matchCriteriaId": "051DE6C4-7456-4C42-BC51-253208AADB4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_2:*:*:*:*:*:*", + "matchCriteriaId": "EE320413-D2C9-4B28-89BF-361B44A3F0FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_3:*:*:*:*:*:*", + "matchCriteriaId": "104F96DC-E280-4E0A-8586-B043B55888C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_4:*:*:*:*:*:*", + "matchCriteriaId": "73B3B3FE-7E85-4B86-A983-2C410FFEF4B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_5:*:*:*:*:*:*", + "matchCriteriaId": "8A9FB275-7F17-48B2-B528-BE89309D2AF5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_6:*:*:*:*:*:*", + "matchCriteriaId": "D4AB3C25-CEA8-4D66-AEE4-953C8B17911A" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_7:*:*:*:*:*:*", diff --git a/CVE-2021/CVE-2021-268xx/CVE-2021-26858.json b/CVE-2021/CVE-2021-268xx/CVE-2021-26858.json index f9f01d6ad67..e7ad919589a 100644 --- a/CVE-2021/CVE-2021-268xx/CVE-2021-26858.json +++ b/CVE-2021/CVE-2021-268xx/CVE-2021-26858.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26858", "sourceIdentifier": "secure@microsoft.com", "published": "2021-03-03T00:15:12.227", - "lastModified": "2023-12-29T17:16:01.327", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:53:33.987", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-04-16", @@ -107,11 +107,66 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*", + "matchCriteriaId": "3E5EA9AD-1E84-4AB5-A1EF-3B9F2AC84755" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_22:*:*:*:*:*:*", + "matchCriteriaId": "751FD35F-2ECD-4B75-9589-988CC6AD3058" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*", "matchCriteriaId": "DA166F2A-D83B-4D50-AD0B-668D813E0585" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2013:sp1:*:*:*:*:*:*", + "matchCriteriaId": "0C21F84B-E99C-451D-9EAF-6352FD2B0EAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_10:*:*:*:*:*:*", + "matchCriteriaId": "63E362CB-CF75-4B7E-A4B1-D6D84AFCBB68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_11:*:*:*:*:*:*", + "matchCriteriaId": "9BE04790-85A2-4078-88CE-1787BC5172E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_12:*:*:*:*:*:*", + "matchCriteriaId": "CCF101BE-27FD-4E2D-A694-C606BD3D1ED7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_13:*:*:*:*:*:*", + "matchCriteriaId": "4DF5BDB5-205D-4B64-A49A-0152AFCF4A13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_14:*:*:*:*:*:*", + "matchCriteriaId": "55284CF7-0D04-4216-83FE-4B1F9CA94207" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_15:*:*:*:*:*:*", + "matchCriteriaId": "CA2CE223-AA49-49E6-AC32-59270EFF55AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_16:*:*:*:*:*:*", + "matchCriteriaId": "4830D6A9-AF74-480C-8F69-8648CD619980" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:*", + "matchCriteriaId": "079E1E3F-FF25-4B0D-AC98-191D6455A014" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:*", @@ -122,6 +177,51 @@ "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*", "matchCriteriaId": "28FCA0E8-7D27-4746-9731-91B834CA3E64" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_8:*:*:*:*:*:*", + "matchCriteriaId": "075E907F-AF2F-4C31-86C7-51972BE412A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_9:*:*:*:*:*:*", + "matchCriteriaId": "69AF19DC-3D65-49A8-A85F-511085CDF27B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:-:*:*:*:*:*:*", + "matchCriteriaId": "40D8A6DB-9225-4A3F-AD76-192F6CCCF002" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_1:*:*:*:*:*:*", + "matchCriteriaId": "051DE6C4-7456-4C42-BC51-253208AADB4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_2:*:*:*:*:*:*", + "matchCriteriaId": "EE320413-D2C9-4B28-89BF-361B44A3F0FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_3:*:*:*:*:*:*", + "matchCriteriaId": "104F96DC-E280-4E0A-8586-B043B55888C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_4:*:*:*:*:*:*", + "matchCriteriaId": "73B3B3FE-7E85-4B86-A983-2C410FFEF4B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_5:*:*:*:*:*:*", + "matchCriteriaId": "8A9FB275-7F17-48B2-B528-BE89309D2AF5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_6:*:*:*:*:*:*", + "matchCriteriaId": "D4AB3C25-CEA8-4D66-AEE4-953C8B17911A" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_7:*:*:*:*:*:*", diff --git a/CVE-2021/CVE-2021-270xx/CVE-2021-27059.json b/CVE-2021/CVE-2021-270xx/CVE-2021-27059.json index 753a1a6b8f9..d03a963e23b 100644 --- a/CVE-2021/CVE-2021-270xx/CVE-2021-27059.json +++ b/CVE-2021/CVE-2021-270xx/CVE-2021-27059.json @@ -2,8 +2,8 @@ "id": "CVE-2021-27059", "sourceIdentifier": "secure@microsoft.com", "published": "2021-03-11T16:15:17.583", - "lastModified": "2023-12-29T17:16:04.247", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:29:45.397", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -46,8 +46,8 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", @@ -55,10 +55,10 @@ "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 6.8, + "baseScore": 6.5, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 0.9, + "exploitabilityScore": 0.6, "impactScore": 5.9 } ], @@ -109,23 +109,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:x64:*", - "matchCriteriaId": "BB0CF266-A7EE-474A-B3D3-4A7FE33F4C2C" + "criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", + "matchCriteriaId": "081DE1E3-4622-4C32-8B9C-9AEC1CD20638" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:x86:*", - "matchCriteriaId": "DC25ACD6-8F48-4534-AF7B-53F0D10C0843" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*", - "matchCriteriaId": "24DD7E07-4BB1-4914-9CDE-5A27A9A3920E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*", - "matchCriteriaId": "ADA0E394-3B5E-4C34-955B-EAB645A37518" + "criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", + "matchCriteriaId": "120690A6-E0A1-4E36-A35A-C87109ECC064" }, { "vulnerable": true, @@ -134,13 +124,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*", - "matchCriteriaId": "72324216-4EB3-4243-A007-FEF3133C7DF9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*", - "matchCriteriaId": "0FBB0E61-7997-4F26-9C07-54912D3F1C10" + "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "E0B3B0BC-C7C6-4687-AD72-DCA29FF9AE3A" } ] } diff --git a/CVE-2021/CVE-2021-270xx/CVE-2021-27065.json b/CVE-2021/CVE-2021-270xx/CVE-2021-27065.json index 019f5b0359b..c8c8de4b888 100644 --- a/CVE-2021/CVE-2021-270xx/CVE-2021-27065.json +++ b/CVE-2021/CVE-2021-270xx/CVE-2021-27065.json @@ -2,8 +2,8 @@ "id": "CVE-2021-27065", "sourceIdentifier": "secure@microsoft.com", "published": "2021-03-03T00:15:12.307", - "lastModified": "2023-12-29T17:16:04.983", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:34:21.940", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-04-16", @@ -109,13 +109,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_22:*:*:*:*:*:*", - "matchCriteriaId": "751FD35F-2ECD-4B75-9589-988CC6AD3058" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*", - "matchCriteriaId": "DA166F2A-D83B-4D50-AD0B-668D813E0585" + "criteria": "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_21:*:*:*:*:*:*", + "matchCriteriaId": "B560F8FD-068E-4A16-A37F-A62DCE88FCF2" }, { "vulnerable": true, @@ -177,11 +172,6 @@ "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_8:*:*:*:*:*:*", "matchCriteriaId": "075E907F-AF2F-4C31-86C7-51972BE412A1" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_9:*:*:*:*:*:*", - "matchCriteriaId": "69AF19DC-3D65-49A8-A85F-511085CDF27B" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:-:*:*:*:*:*:*", @@ -197,6 +187,11 @@ "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_2:*:*:*:*:*:*", "matchCriteriaId": "EE320413-D2C9-4B28-89BF-361B44A3F0FF" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_3:*:*:*:*:*:*", + "matchCriteriaId": "104F96DC-E280-4E0A-8586-B043B55888C2" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_4:*:*:*:*:*:*", diff --git a/CVE-2021/CVE-2021-270xx/CVE-2021-27085.json b/CVE-2021/CVE-2021-270xx/CVE-2021-27085.json index fe76b248bf4..12641f1f727 100644 --- a/CVE-2021/CVE-2021-270xx/CVE-2021-27085.json +++ b/CVE-2021/CVE-2021-270xx/CVE-2021-27085.json @@ -2,8 +2,8 @@ "id": "CVE-2021-27085", "sourceIdentifier": "secure@microsoft.com", "published": "2021-03-11T16:15:18.677", - "lastModified": "2023-12-29T17:16:07.137", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:30:49.863", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -46,19 +46,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", - "attackComplexity": "HIGH", + "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 8.8, "baseSeverity": "HIGH" }, - "exploitabilityScore": 1.6, + "exploitabilityScore": 2.8, "impactScore": 5.9 } ], @@ -121,28 +121,28 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1B570A8-ED1A-46B6-B8AB-064445F8FC4C" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372" + "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4DBE5B2-AE10-4251-BCDA-DC5EDEE6EE67" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", - "matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AFD13A6-A390-4400-9029-2F4058CA17E2" }, { "vulnerable": false, diff --git a/CVE-2021/CVE-2021-286xx/CVE-2021-28663.json b/CVE-2021/CVE-2021-286xx/CVE-2021-28663.json index 1ecb48b9b14..023c0dffaac 100644 --- a/CVE-2021/CVE-2021-286xx/CVE-2021-28663.json +++ b/CVE-2021/CVE-2021-286xx/CVE-2021-28663.json @@ -2,8 +2,8 @@ "id": "CVE-2021-28663", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-10T15:15:07.557", - "lastModified": "2023-12-13T13:51:52.563", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:33:47.580", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -91,22 +91,22 @@ "vulnerable": true, "criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*", "versionStartIncluding": "r0p0", - "versionEndIncluding": "r28p0", - "matchCriteriaId": "86D3D5C7-EF1B-401B-836C-79FD7C16B5CA" + "versionEndExcluding": "r29p0", + "matchCriteriaId": "D4A585CF-8557-4660-BD0B-EAE94D1BF8A2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:arm:midgard_gpu_kernel_driver:*:*:*:*:*:*:*:*", "versionStartIncluding": "r4p0", - "versionEndIncluding": "r30p0", - "matchCriteriaId": "C57F0AF0-BB86-41BE-B41F-951FC34878D2" + "versionEndExcluding": "r31p0", + "matchCriteriaId": "6E1FE39A-BD55-4C5F-BBAA-1138340F8329" }, { "vulnerable": true, "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*", "versionStartIncluding": "r19p0", - "versionEndIncluding": "r28p0", - "matchCriteriaId": "3D901BF7-E72F-4BC7-96DD-FC9D87F3AE8A" + "versionEndExcluding": "r29p0", + "matchCriteriaId": "AA218DCD-3CAF-4A64-BE97-F7E4916D9C6F" } ] } @@ -130,7 +130,10 @@ }, { "url": "https://github.com/lntrx/CVE-2021-28663", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-286xx/CVE-2021-28664.json b/CVE-2021/CVE-2021-286xx/CVE-2021-28664.json index ffe7fad58b7..b4e67f1db77 100644 --- a/CVE-2021/CVE-2021-286xx/CVE-2021-28664.json +++ b/CVE-2021/CVE-2021-286xx/CVE-2021-28664.json @@ -2,8 +2,8 @@ "id": "CVE-2021-28664", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-10T15:15:07.590", - "lastModified": "2023-12-13T13:51:52.563", - "vulnStatus": "Modified", + "lastModified": "2024-07-25T17:59:50.377", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -91,22 +91,22 @@ "vulnerable": true, "criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*", "versionStartIncluding": "r0p0", - "versionEndIncluding": "r28p0", - "matchCriteriaId": "86D3D5C7-EF1B-401B-836C-79FD7C16B5CA" + "versionEndExcluding": "r29p0", + "matchCriteriaId": "D4A585CF-8557-4660-BD0B-EAE94D1BF8A2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:arm:midgard_gpu_kernel_driver:*:*:*:*:*:*:*:*", "versionStartIncluding": "r8p0", - "versionEndIncluding": "r30p0", - "matchCriteriaId": "36164B50-6A20-4FCD-8382-3B9C9069C9E7" + "versionEndExcluding": "r31p0", + "matchCriteriaId": "914DDE6A-9D92-46E2-BF0E-0E3FC58F6BF7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*", "versionStartIncluding": "r19p0", - "versionEndIncluding": "r28p0", - "matchCriteriaId": "3D901BF7-E72F-4BC7-96DD-FC9D87F3AE8A" + "versionEndExcluding": "r29p0", + "matchCriteriaId": "AA218DCD-3CAF-4A64-BE97-F7E4916D9C6F" } ] } @@ -116,7 +116,10 @@ "references": [ { "url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://developer.arm.com/support/arm-security-updates", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json index 6087243e5b5..d7faea71fff 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1394", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-21T13:00:08.037", - "lastModified": "2024-07-23T22:15:05.363", + "lastModified": "2024-07-25T16:15:03.637", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -176,6 +176,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:4672", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:4699", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2024:4761", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22444.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22444.json index 964b0a21f29..0ce2a67ea3e 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22444.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22444.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22444", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T16:15:06.220", - "lastModified": "2024-07-24T17:12:32.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T17:46:52.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -13,6 +13,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-alert@hpe.com", "type": "Secondary", @@ -35,10 +55,65 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndIncluding": "9.1.9", + "matchCriteriaId": "F7DAAFB4-149A-4CF2-96E3-34CF185ECE12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.2.0", + "versionEndIncluding": "9.2.9", + "matchCriteriaId": "E20B1C8F-4068-4B88-9819-3913A2A2AB7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.3.0", + "versionEndExcluding": "9.3.3", + "matchCriteriaId": "C9FCF925-3E4D-43C7-A524-008FADCF97A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.4.0", + "versionEndExcluding": "9.4.2", + "matchCriteriaId": "3FDE31DF-800F-4F99-8632-F5CD3A52B062" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04672en_us&docLocale=en_US", - "source": "security-alert@hpe.com" + "source": "security-alert@hpe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27905.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27905.json index 56d1bb1eb07..13e92a08340 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27905.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27905.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27905", "sourceIdentifier": "security@apache.org", "published": "2024-02-27T15:15:07.930", - "lastModified": "2024-05-17T02:37:34.130", + "lastModified": "2024-07-25T16:15:04.310", "vulnStatus": "Awaiting Analysis", "cveTags": [ { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31970.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31970.json index 697733e3d87..d35221e2acf 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31970.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31970.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31970", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T16:15:06.600", - "lastModified": "2024-07-24T17:12:32.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T17:46:25.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -11,15 +11,86 @@ "value": "AdTran SRG 834-5 HDC17600021F1 devices (with SmartOS 11.1.1.1 and fixed in Version 12.1.3.1) have SSH enabled by default, accessible both over the LAN and the Internet. During a window of time when the device is being set up, it uses a default username and password combination of admin/admin with root-level privileges. An attacker can exploit this window to gain unauthorized root access by either modifying the existing admin account or creating a new account with equivalent privileges. This vulnerability allows attackers to execute arbitrary commands." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:adtran:sdg_smartos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.1.3.1", + "matchCriteriaId": "CD1A4E83-2A74-459B-A681-2109BC8EEF60" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:adtran:834-5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C1207CF-E200-4642-9961-C866D07CF9FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/actuator/cve/blob/main/AdTran/CVE-2024-31970", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/actuator/cve/blob/main/AdTran/SRG-834-5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36541.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36541.json index 21827cb62d9..6008716444f 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36541.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36541.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36541", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T16:15:06.870", - "lastModified": "2024-07-24T17:12:32.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T17:44:25.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -11,11 +11,66 @@ "value": "Insecure permissions in logging-operator v4.6.0 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kube-logging:logging-operator:4.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B1EC19C7-4D89-4CE6-8861-4E3976EBF4E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/f972d1c152f3b8127af01206f7c2af0d", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json new file mode 100644 index 00000000000..2c14fb5da40 --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-36542", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-25T17:15:10.710", + "lastModified": "2024-07-25T17:15:10.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insecure permissions in kuma v2.7.0 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/HouqiyuA/e1685843b6f42b47dbf97e2e92e63428", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39345.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39345.json index 6aafe87c64f..6ccdf0cf036 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39345.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39345.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39345", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T15:15:12.360", - "lastModified": "2024-07-24T17:12:32.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T17:48:18.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -11,15 +11,86 @@ "value": "AdTran 834-5 HDC17600021F1 (SmartOS 11.1.1.1) devices enable the SSH service by default and have a hidden, undocumented, hard-coded support account whose password is based on the devices MAC address. All of the devices internet interfaces share a similar MAC address that only varies in their final octet. This allows network-adjacent attackers to derive the support user's SSH password by decrementing the final octet of the connected gateway address or via the BSSID. An attacker can then execute arbitrary OS commands with root-level privileges." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:adtran:sdg_smartos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.1.3.1", + "matchCriteriaId": "CD1A4E83-2A74-459B-A681-2109BC8EEF60" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:adtran:834-5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C1207CF-E200-4642-9961-C866D07CF9FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/actuator/cve/blob/main/AdTran/CVE-2024-39345", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/actuator/cve/blob/main/AdTran/TBA", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40060.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40060.json index ce30baddc51..f5af4c5a177 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40060.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40060.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40060", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-23T15:15:04.810", - "lastModified": "2024-07-24T12:55:13.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T17:49:00.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": " Se descubri\u00f3 que go-chart v2.1.1 contiene un bucle infinito a trav\u00e9s de la funci\u00f3n drawCanvas()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wcharczuk:go-chart:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.1.1", + "matchCriteriaId": "6530F293-3005-42DF-9C86-B0323B273B20" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/F3iG0n9/4d0d7c863eea6874eeeb26a3073aa5f8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40422.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40422.json index 404d4bd50c7..94d03404cef 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40422.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40422.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40422", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T16:15:07.087", - "lastModified": "2024-07-24T17:12:32.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T17:42:19.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -11,19 +11,80 @@ "value": "The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the server. This can potentially lead to unauthorized access to critical system files and compromise the confidentiality and integrity of the system." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E48B4C29-E925-4C73-BFC6-83FAF8741CCC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/alpernae/CVE-2024-40422", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/stitionai/devika", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/stitionai/devika/pull/619", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40430.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40430.json index 0e0c5ff66b9..0cc06810c72 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40430.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40430.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40430", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T07:15:02.207", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T17:07:13.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "En SFTPGO 2.6.2, la implementaci\u00f3n de JWT carece de ciertas medidas de seguridad, como el uso de reclamos de JWT ID (JTI), nonces y mecanismos adecuados de caducidad e invalidaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sftpgo_project:sftpgo:2.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4D7B3817-DF8C-4DC3-AAEF-306552248D56" + } + ] + } + ] + } + ], "references": [ { "url": "https://alexsecurity.rocks/posts/cve-2024-40430/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40575.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40575.json index 0aa29a7fb3a..46df326dd68 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40575.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40575.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40575", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T16:15:07.150", - "lastModified": "2024-07-24T17:12:32.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T17:35:28.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -11,15 +11,73 @@ "value": "An issue in Huawei Technologies opengauss (openGauss 5.0.0 build) v.7.3.0 allows a local attacker to cause a denial of service via the modification of table attributes" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:huawei:opengauss:7.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA21BB01-C2AB-4A03-A747-D1557F5DA6CF" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/RuiHuaLiu2023/92059b0fa6c625e3d39001c5a9b2dc71", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://opengauss.org", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40767.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40767.json index 5841501ffcb..e7d93ff256e 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40767.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40767.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40767", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T05:15:12.907", - "lastModified": "2024-07-24T12:55:13.223", + "lastModified": "2024-07-25T17:15:10.910", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -25,6 +25,10 @@ "url": "https://security.openstack.org", "source": "cve@mitre.org" }, + { + "url": "https://security.openstack.org/ossa/OSSA-2024-002.html", + "source": "cve@mitre.org" + }, { "url": "https://www.openwall.com/lists/oss-security/2024/07/23/2", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40872.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40872.json new file mode 100644 index 00000000000..cea4f33c281 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40872.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-40872", + "sourceIdentifier": "SecurityResponse@netmotionsoftware.com", + "published": "2024-07-25T17:15:10.977", + "lastModified": "2024-07-25T17:15:10.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "There is an elevation of privilege vulnerability in server\nand client components of Absolute Secure Access prior to version 13.07.\nAttackers with local access and valid desktop user credentials can elevate\ntheir privilege to system level by passing invalid address data to the vulnerable\ncomponent. This could be used to\nmanipulate process tokens to elevate the privilege of a normal process to\nSystem. The scope is changed, the impact to system confidentiality and\nintegrity is high, the impact to the availability of the effected component is\nnone." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "SecurityResponse@netmotionsoftware.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "SecurityResponse@netmotionsoftware.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1307/cve-2024-40872/", + "source": "SecurityResponse@netmotionsoftware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41319.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41319.json index bb0f116cad0..56c638a5d88 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41319.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41319.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41319", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-23T15:15:05.050", - "lastModified": "2024-07-24T12:55:13.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T17:49:23.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,85 @@ "value": " Se descubri\u00f3 que TOTOLINK A6000R V1.0.1-B20201211.2000 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro cmd en la funci\u00f3n webcmd." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a6000r_firmware:1.0.1-b20201211.2000:*:*:*:*:*:*:*", + "matchCriteriaId": "E40BA1D3-29A2-4480-99EB-4BD8EE7CADCE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a6000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33AF9CA4-E966-4E72-A676-ADDC1DA0B9A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yanggao017/40efb889800ae2691c38086ebf80c037", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/yanggao017/vuln/blob/main/TOTOLINK/A6000R/CI_7_webcmd/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41703.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41703.json index c4b87489d19..b47e9d02d5c 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41703.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41703.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41703", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T05:15:03.450", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T16:55:48.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,79 @@ "value": " LibreChat hasta 0.7.4-rc1 tiene control de acceso incorrecto para actualizaciones de mensajes. (El trabajo en una versi\u00f3n fija comenz\u00f3 en PR 3363.)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.7.3", + "matchCriteriaId": "07976B79-F984-49AC-A56D-F3989BCB7916" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:librechat:librechat:0.7.4:rc1:*:*:*:*:*:*", + "matchCriteriaId": "92F06C4A-1DE2-4DB8-B652-7E920751ABCF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/danny-avila/LibreChat/discussions/3315#discussioncomment-10074284", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/danny-avila/LibreChat/pull/3363", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41704.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41704.json index 516accbb564..b79053e71ab 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41704.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41704.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41704", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T05:15:03.537", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T16:55:24.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,80 @@ "value": " LibreChat hasta 0.7.4-rc1 no valida las rutas de acceso normalizadas de las im\u00e1genes. (El trabajo en una versi\u00f3n fija comenz\u00f3 en PR 3363.)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.7.3", + "matchCriteriaId": "07976B79-F984-49AC-A56D-F3989BCB7916" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:librechat:librechat:0.7.4:rc1:*:*:*:*:*:*", + "matchCriteriaId": "92F06C4A-1DE2-4DB8-B652-7E920751ABCF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/danny-avila/LibreChat/discussions/3315#discussioncomment-10074284", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/danny-avila/LibreChat/pull/3363", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41800.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41800.json new file mode 100644 index 00000000000..49bf9f2e880 --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41800.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-41800", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-25T17:15:11.203", + "lastModified": "2024-07-25T17:15:11.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Craft is a content management system (CMS). Craft CMS 5 allows reuse of TOTP tokens multiple times within the validity period. An attacker is able to re-submit a valid TOTP token to establish an authenticated session. This requires that the attacker has knowledge of the victim's credentials. This has been patched in Craft 5.2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/craftcms/cms/commit/7c790fa5ad5a8cb8016cb6793ec3554c4c079e38", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/craftcms/cms/releases/tag/5.2.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/craftcms/cms/security/advisories/GHSA-wmx7-pw49-88jx", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240617-01_CraftCMS_TOTP_Valid_After_Use", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41801.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41801.json new file mode 100644 index 00000000000..d795380ee77 --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41801.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-41801", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-25T17:15:11.423", + "lastModified": "2024-07-25T17:15:11.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OpenProject is open source project management software. Prior to version 14.3.0, using a forged HOST header in the default configuration of packaged installations and using the \"Login required\" setting, an attacker could redirect to a remote host to initiate a phishing attack against an OpenProject user's account. This vulnerability affects default packaged installation of OpenProject without any additional configuration or modules on Apache (such as mod_security, manually setting a host name, having a fallthrough VirtualHost). It might also affect other installations that did not take care to fix the HOST/X-Forwarded-Host headers. Version 14.3.0 includes stronger protections for the hostname from within the application using the HostAuthorization middleware of Rails to reject any requests with a host name that does not match the configured one. Also, all generated links by the application are now ensured to use the built-in hostname. Users who aren't able to upgrade immediately may use mod_security for Apache2 or manually fix the Host and X-Forwarded-Host headers in their proxying application before reaching the application server of OpenProject. Alternatively, they can manually apply the patch to opt-in to host header protections in previous versions of OpenProject." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/opf/openproject/security/advisories/GHSA-g92v-vrq6-4fpw", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/user-attachments/files/16371759/host-protection.patch", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.openproject.org/docs/release-notes/14-3-0", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41914.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41914.json index a7445c5bf30..04b4072af37 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41914.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41914.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41914", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-24T15:15:12.437", - "lastModified": "2024-07-24T17:12:32.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T17:47:35.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -13,6 +13,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + }, { "source": "security-alert@hpe.com", "type": "Secondary", @@ -35,10 +55,65 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndIncluding": "9.1.9", + "matchCriteriaId": "F7DAAFB4-149A-4CF2-96E3-34CF185ECE12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.2.0", + "versionEndIncluding": "9.2.9", + "matchCriteriaId": "E20B1C8F-4068-4B88-9819-3913A2A2AB7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.3.0", + "versionEndIncluding": "9.3.2", + "matchCriteriaId": "660467A7-8B8D-4633-AC96-078CDE317D3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.4.0", + "versionEndIncluding": "9.4.1", + "matchCriteriaId": "BCA950DB-1FF0-4483-B72F-BE35FD5BE6EC" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04672en_us&docLocale=en_US", - "source": "security-alert@hpe.com" + "source": "security-alert@hpe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6535.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6535.json index d719779e4bc..b11558d7d67 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6535.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6535.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6535", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-17T03:15:01.890", - "lastModified": "2024-07-19T15:00:32.153", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-25T16:15:04.583", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -99,6 +99,14 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:4865", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:4871", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-6535", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7007.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7007.json new file mode 100644 index 00000000000..42e5af708de --- /dev/null +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7007.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-7007", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-07-25T17:15:11.837", + "lastModified": "2024-07-25T17:15:11.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Positron Broadcast Signal Processor TRA7005 v1.20 is vulnerable to an authentication bypass exploit that could allow an attacker to have unauthorized access to protected areas of the application." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-207-02", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7068.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7068.json index 126e59049f3..88dfa5e4720 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7068.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7068.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7068", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-24T15:15:12.750", - "lastModified": "2024-07-24T17:12:32.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T17:47:18.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -57,6 +57,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -105,6 +125,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +146,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/rtsjx-cve/cve/blob/main/xss2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.272349", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.272349", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.378874", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7069.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7069.json index d2e4b193888..ab1dcf93872 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7069.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7069.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7069", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-24T16:15:07.357", - "lastModified": "2024-07-24T17:12:32.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T17:33:53.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -57,6 +57,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +136,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:employee_and_visitor_gate_pass_logging_system_project:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46FE63C8-C11F-4BEC-9F47-C72F45061A20" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/pineapple65/cve/blob/main/sql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.272351", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.272351", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.378881", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7079.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7079.json index ee52ea06277..42adeb6c757 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7079.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7079.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7079", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-24T16:15:07.613", - "lastModified": "2024-07-24T17:12:32.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-25T17:31:23.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -13,6 +13,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -47,14 +67,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "2F87326E-0B56-4356-A889-73D026DB1D4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "932D137F-528B-4526-9A89-CD59FA1AB0FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-7079", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299678", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7101.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7101.json new file mode 100644 index 00000000000..0bf4ec497a2 --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7101.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2024-7101", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-25T16:15:04.720", + "lastModified": "2024-07-25T16:15:04.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in ForIP Tecnologia Administra\u00e7\u00e3o PABX 1.x. This issue affects some unknown processing of the file /login of the component Authentication Form. The manipulation of the argument usuario leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272423. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.272423", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.272423", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.375832", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9f9da63850c..022effaa218 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-25T16:00:18.767505+00:00 +2024-07-25T18:00:17.578467+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-25T15:55:31.213000+00:00 +2024-07-25T17:59:50.377000+00:00 ``` ### Last Data Feed Release @@ -33,46 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -257957 +257963 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `6` -- [CVE-2024-36111](CVE-2024/CVE-2024-361xx/CVE-2024-36111.json) (`2024-07-25T14:15:12.650`) -- [CVE-2024-41806](CVE-2024/CVE-2024-418xx/CVE-2024-41806.json) (`2024-07-25T15:15:11.210`) +- [CVE-2024-36542](CVE-2024/CVE-2024-365xx/CVE-2024-36542.json) (`2024-07-25T17:15:10.710`) +- [CVE-2024-40872](CVE-2024/CVE-2024-408xx/CVE-2024-40872.json) (`2024-07-25T17:15:10.977`) +- [CVE-2024-41800](CVE-2024/CVE-2024-418xx/CVE-2024-41800.json) (`2024-07-25T17:15:11.203`) +- [CVE-2024-41801](CVE-2024/CVE-2024-418xx/CVE-2024-41801.json) (`2024-07-25T17:15:11.423`) +- [CVE-2024-7007](CVE-2024/CVE-2024-70xx/CVE-2024-7007.json) (`2024-07-25T17:15:11.837`) +- [CVE-2024-7101](CVE-2024/CVE-2024-71xx/CVE-2024-7101.json) (`2024-07-25T16:15:04.720`) ### CVEs modified in the last Commit -Recently modified CVEs: `53` +Recently modified CVEs: `47` -- [CVE-2024-37465](CVE-2024/CVE-2024-374xx/CVE-2024-37465.json) (`2024-07-25T15:52:09.033`) -- [CVE-2024-37466](CVE-2024/CVE-2024-374xx/CVE-2024-37466.json) (`2024-07-25T15:51:50.863`) -- [CVE-2024-37480](CVE-2024/CVE-2024-374xx/CVE-2024-37480.json) (`2024-07-25T15:51:31.297`) -- [CVE-2024-37485](CVE-2024/CVE-2024-374xx/CVE-2024-37485.json) (`2024-07-25T15:51:09.387`) -- [CVE-2024-38781](CVE-2024/CVE-2024-387xx/CVE-2024-38781.json) (`2024-07-25T15:50:29.157`) -- [CVE-2024-38782](CVE-2024/CVE-2024-387xx/CVE-2024-38782.json) (`2024-07-25T15:49:56.380`) -- [CVE-2024-38784](CVE-2024/CVE-2024-387xx/CVE-2024-38784.json) (`2024-07-25T15:55:31.213`) -- [CVE-2024-38785](CVE-2024/CVE-2024-387xx/CVE-2024-38785.json) (`2024-07-25T15:54:37.577`) -- [CVE-2024-38786](CVE-2024/CVE-2024-387xx/CVE-2024-38786.json) (`2024-07-25T15:54:12.073`) -- [CVE-2024-41709](CVE-2024/CVE-2024-417xx/CVE-2024-41709.json) (`2024-07-25T15:22:06.140`) -- [CVE-2024-5004](CVE-2024/CVE-2024-50xx/CVE-2024-5004.json) (`2024-07-25T15:21:18.437`) -- [CVE-2024-5529](CVE-2024/CVE-2024-55xx/CVE-2024-5529.json) (`2024-07-25T15:21:02.647`) -- [CVE-2024-5973](CVE-2024/CVE-2024-59xx/CVE-2024-5973.json) (`2024-07-25T15:18:05.157`) -- [CVE-2024-6243](CVE-2024/CVE-2024-62xx/CVE-2024-6243.json) (`2024-07-25T15:17:26.980`) -- [CVE-2024-6244](CVE-2024/CVE-2024-62xx/CVE-2024-6244.json) (`2024-07-25T15:15:39.890`) -- [CVE-2024-6271](CVE-2024/CVE-2024-62xx/CVE-2024-6271.json) (`2024-07-25T15:14:33.857`) -- [CVE-2024-6962](CVE-2024/CVE-2024-69xx/CVE-2024-6962.json) (`2024-07-25T15:47:18.363`) -- [CVE-2024-6963](CVE-2024/CVE-2024-69xx/CVE-2024-6963.json) (`2024-07-25T15:47:02.633`) -- [CVE-2024-6964](CVE-2024/CVE-2024-69xx/CVE-2024-6964.json) (`2024-07-25T15:46:37.340`) -- [CVE-2024-6965](CVE-2024/CVE-2024-69xx/CVE-2024-6965.json) (`2024-07-25T15:44:21.740`) -- [CVE-2024-6966](CVE-2024/CVE-2024-69xx/CVE-2024-6966.json) (`2024-07-25T15:42:54.563`) -- [CVE-2024-6967](CVE-2024/CVE-2024-69xx/CVE-2024-6967.json) (`2024-07-25T15:42:18.417`) -- [CVE-2024-6968](CVE-2024/CVE-2024-69xx/CVE-2024-6968.json) (`2024-07-25T15:41:38.410`) -- [CVE-2024-6969](CVE-2024/CVE-2024-69xx/CVE-2024-6969.json) (`2024-07-25T15:38:51.787`) -- [CVE-2024-6970](CVE-2024/CVE-2024-69xx/CVE-2024-6970.json) (`2024-07-25T15:36:44.567`) +- [CVE-2021-26858](CVE-2021/CVE-2021-268xx/CVE-2021-26858.json) (`2024-07-25T17:53:33.987`) +- [CVE-2021-27059](CVE-2021/CVE-2021-270xx/CVE-2021-27059.json) (`2024-07-25T17:29:45.397`) +- [CVE-2021-27065](CVE-2021/CVE-2021-270xx/CVE-2021-27065.json) (`2024-07-25T17:34:21.940`) +- [CVE-2021-27085](CVE-2021/CVE-2021-270xx/CVE-2021-27085.json) (`2024-07-25T17:30:49.863`) +- [CVE-2021-28663](CVE-2021/CVE-2021-286xx/CVE-2021-28663.json) (`2024-07-25T17:33:47.580`) +- [CVE-2021-28664](CVE-2021/CVE-2021-286xx/CVE-2021-28664.json) (`2024-07-25T17:59:50.377`) +- [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-07-25T16:15:03.637`) +- [CVE-2024-22444](CVE-2024/CVE-2024-224xx/CVE-2024-22444.json) (`2024-07-25T17:46:52.627`) +- [CVE-2024-27905](CVE-2024/CVE-2024-279xx/CVE-2024-27905.json) (`2024-07-25T16:15:04.310`) +- [CVE-2024-31970](CVE-2024/CVE-2024-319xx/CVE-2024-31970.json) (`2024-07-25T17:46:25.310`) +- [CVE-2024-36541](CVE-2024/CVE-2024-365xx/CVE-2024-36541.json) (`2024-07-25T17:44:25.170`) +- [CVE-2024-39345](CVE-2024/CVE-2024-393xx/CVE-2024-39345.json) (`2024-07-25T17:48:18.550`) +- [CVE-2024-40060](CVE-2024/CVE-2024-400xx/CVE-2024-40060.json) (`2024-07-25T17:49:00.047`) +- [CVE-2024-40422](CVE-2024/CVE-2024-404xx/CVE-2024-40422.json) (`2024-07-25T17:42:19.727`) +- [CVE-2024-40430](CVE-2024/CVE-2024-404xx/CVE-2024-40430.json) (`2024-07-25T17:07:13.977`) +- [CVE-2024-40575](CVE-2024/CVE-2024-405xx/CVE-2024-40575.json) (`2024-07-25T17:35:28.913`) +- [CVE-2024-40767](CVE-2024/CVE-2024-407xx/CVE-2024-40767.json) (`2024-07-25T17:15:10.910`) +- [CVE-2024-41319](CVE-2024/CVE-2024-413xx/CVE-2024-41319.json) (`2024-07-25T17:49:23.857`) +- [CVE-2024-41703](CVE-2024/CVE-2024-417xx/CVE-2024-41703.json) (`2024-07-25T16:55:48.747`) +- [CVE-2024-41704](CVE-2024/CVE-2024-417xx/CVE-2024-41704.json) (`2024-07-25T16:55:24.307`) +- [CVE-2024-41914](CVE-2024/CVE-2024-419xx/CVE-2024-41914.json) (`2024-07-25T17:47:35.247`) +- [CVE-2024-6535](CVE-2024/CVE-2024-65xx/CVE-2024-6535.json) (`2024-07-25T16:15:04.583`) +- [CVE-2024-7068](CVE-2024/CVE-2024-70xx/CVE-2024-7068.json) (`2024-07-25T17:47:18.717`) +- [CVE-2024-7069](CVE-2024/CVE-2024-70xx/CVE-2024-7069.json) (`2024-07-25T17:33:53.777`) +- [CVE-2024-7079](CVE-2024/CVE-2024-70xx/CVE-2024-7079.json) (`2024-07-25T17:31:23.670`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 3c3c9c0b1ea..81b0361fb21 100644 --- a/_state.csv +++ b/_state.csv @@ -88042,7 +88042,7 @@ CVE-2016-4818,0,0,7d8db30092fa7dfbedfade93058d57216c926b0c79cd56218d1b55ec80d4e2 CVE-2016-4819,0,0,1e1fd4a619ceb23227ac095d23ae2f3bc609b9072f99960bc233251f93a0f667,2016-06-23T11:59:30.383000 CVE-2016-4820,0,0,d280c9d629829366fb6c35e76294ebce52836ad3c6809f4ff6c1ffbcf9e75265,2016-06-21T17:48:34.423000 CVE-2016-4821,0,0,e77d7f50528abaa39fad25ddf349914d1e7948abaf2e342cb6e86979eda78f42,2016-06-20T23:14:33.363000 -CVE-2016-4822,0,1,61fbf13c76bc4a8d8912de4a007e902a75c6084e54c707565cda15f85a583af9,2024-07-25T14:23:25.223000 +CVE-2016-4822,0,0,61fbf13c76bc4a8d8912de4a007e902a75c6084e54c707565cda15f85a583af9,2024-07-25T14:23:25.223000 CVE-2016-4823,0,0,e27177cf8567f3c604aa0992b3eb84e789539eafb14a9cdd9f8d050bf7493119,2016-06-28T00:32:51.903000 CVE-2016-4824,0,0,e62c5bc2ca550cc16a58a25df8b9c256aefaa1c2fcb55f097bb0d50c6a95357e,2016-06-28T00:33:23.657000 CVE-2016-4825,0,0,9a8029e2b527359fc300dc706f9b5c96e154b35b76f0d5a9069b04f14c5260ba,2021-08-31T20:05:08.127000 @@ -92894,7 +92894,7 @@ CVE-2017-0137,0,0,b39f4584e0ff4af5bfb7330eab92383093797e82e38cd33ebd6f78f4a401ca CVE-2017-0138,0,0,396210bfb7406c5891dfed997fd42dbff9e3e8657280ea39b929e77669029713,2017-07-12T01:29:07.770000 CVE-2017-0140,0,0,d6331d35020d494ec23f5777199c63154b3dcddf238fc5006d74fc8b056eead0,2019-10-03T00:03:26.223000 CVE-2017-0141,0,0,59100e627c6d5e6c854f5c0a90877b657e168ea1ff42a1387282e4e78dd7f994,2023-06-12T07:15:09.250000 -CVE-2017-0143,0,1,555f6b4717d2c9d8874919a106b5317f72b37a63969ec7a97e8d0e8120080bcf,2024-07-25T14:00:11.533000 +CVE-2017-0143,0,0,555f6b4717d2c9d8874919a106b5317f72b37a63969ec7a97e8d0e8120080bcf,2024-07-25T14:00:11.533000 CVE-2017-0144,0,0,183ef3848db2ab20e84f06a306733e2dbc52adf7f438c21ff2d323a857e45b1d,2024-07-24T16:03:46.547000 CVE-2017-0145,0,0,232138ca57243f7f8c6aafce2480dfaecbcddbf5e8606d4b7a1beed701a61ebd,2024-07-24T16:22:57.507000 CVE-2017-0146,0,0,5fd4cf5faacc484bb38494cacd53c5f3a3c1b9631fcf0e3ea961d395f919c2da,2024-07-16T17:55:42.890000 @@ -107269,7 +107269,7 @@ CVE-2017-7262,0,0,f78bc38632d70f21b7078a4e9db2032da6abc2c24dc4facf58d5aa5df81ab1 CVE-2017-7263,0,0,51b071ac9f1aedb7d54bc263a94d26159fb2954d002b42dfac4a37d8260b650c,2017-03-29T01:59:03 CVE-2017-7264,0,0,09de7ea4a569a0956bb7612ff8e6d13eae78f4f2b39bb1c33db0342689758d16,2024-07-15T21:15:02.673000 CVE-2017-7266,0,0,0b71a2968113f2f8d9030c214fd310d647c1171b7725d852e2a15e261686341b,2017-03-29T01:59:03.110000 -CVE-2017-7269,0,1,5c55eb1ac33241769906ae5bd31be4a25232707aca13d8ab990794e81f06f3c3,2024-07-25T14:01:24.977000 +CVE-2017-7269,0,0,5c55eb1ac33241769906ae5bd31be4a25232707aca13d8ab990794e81f06f3c3,2024-07-25T14:01:24.977000 CVE-2017-7271,0,0,4abb50bf24b45576e32e408897e16efe8f10cb28e2556d4eaeac68cb450ad3e9,2017-05-08T01:29:00.267000 CVE-2017-7272,0,0,e89b1f4a85547acca00700a7812009fff1e3fab6b5901c11a22989dac2431e2a,2018-02-26T02:29:00.423000 CVE-2017-7273,0,0,3408bdd468c6eb52aa3fcbed1868b7ad60c5be41e0344a38aa246e60d5a5a73f,2021-01-05T19:15:16.400000 @@ -109063,7 +109063,7 @@ CVE-2017-9244,0,0,f28570bdd0ba969e83e607352897b1f823dfae3e7d62420afe1b27e5d76f00 CVE-2017-9245,0,0,bb516b731245553c86384b29e2b06472321ad0a91bf75e176da1a13be7df56a9,2019-03-19T13:59:40.953000 CVE-2017-9246,0,0,e9af4d9fee8802f74780b2db4d5cef49797bc7bdcafe06baa99b4d42dd1f1f93,2017-07-05T18:21:35.873000 CVE-2017-9247,0,0,760a786a2726d570c4f5c2bd097bf0ad1e052820781e0ec250a3fbd437340956,2017-08-25T11:43:55.450000 -CVE-2017-9248,0,1,944d92e06f22200bbce2476b37cde0db77cea397cff60bd0e3f0e110aa3c9a74,2024-07-25T14:04:24.223000 +CVE-2017-9248,0,0,944d92e06f22200bbce2476b37cde0db77cea397cff60bd0e3f0e110aa3c9a74,2024-07-25T14:04:24.223000 CVE-2017-9249,0,0,b6ae372b87f3b28440343fed26e849078f9ba67e0f0bd96b601954ea720dfb50,2020-03-02T18:58:25.307000 CVE-2017-9250,0,0,007b7bf6639dae103f447e49c63b632f752baf7b238833f9466c3652b5547325,2020-10-28T19:42:54.117000 CVE-2017-9251,0,0,7486fb7e089a2b4774747c319d6226a6c440a9684d10aaff8e1f4798a9878624,2024-02-14T01:17:43.863000 @@ -112761,7 +112761,7 @@ CVE-2018-11772,0,0,c8c9557f2ee7f4672833a7f948daad087d968e8fadfc57e9a55783351ce4a CVE-2018-11773,0,0,5b99f1ed69f95ec1671cbd3702d960f88cea851577040e391124f925b318a428,2023-11-07T02:51:45.873000 CVE-2018-11774,0,0,98e349b2df89930960ea8088b7ff1f786757c29b67acc8655d314fce4e739b21,2023-11-07T02:51:45.933000 CVE-2018-11775,0,0,c707bec47a537be835d6dcaa1b78ce09a455b4ce42a0d359291bbb9ce10a97ca,2023-11-07T02:51:45.990000 -CVE-2018-11776,0,1,2d0b2bbf16413a004a73636bf012e8df83ffaab97c62e9852d81cfbb548605d0,2024-07-25T14:48:56.837000 +CVE-2018-11776,0,0,2d0b2bbf16413a004a73636bf012e8df83ffaab97c62e9852d81cfbb548605d0,2024-07-25T14:48:56.837000 CVE-2018-11777,0,0,fb966a75e8f05a7fd09ef3046acf836093fb8c3f8989639f1862d35d2ab58add,2023-11-07T02:51:46.160000 CVE-2018-11778,0,0,3611e147fc10ebfb7a531c360f2a0e2d7b9a7db1105c6c173e73e64756e8e665,2023-11-07T02:51:46.227000 CVE-2018-11779,0,0,f71b5f2cca4f1866caa2c40dd48c035806d88370bc12c7f4e8fe71c71772bfb1,2023-11-07T02:51:46.287000 @@ -114208,7 +114208,7 @@ CVE-2018-13374,0,0,d8d3cbda0879903d9708fa8ab377ca18fce7fb90f58417b260f2dbab0b870 CVE-2018-13375,0,0,d56d6bafd36bf4e0bb208e573685704fee8535e51d0b9a9e0de49024b4474a77,2019-05-30T15:19:19.737000 CVE-2018-13376,0,0,34379bca4498e8ec746f1a8397920cc44e22e9cefdf9bd673e27251e09c3a80a,2019-10-03T00:03:26.223000 CVE-2018-13378,0,0,9f71a7a5685934cdd46869122ec078124ae2ec66bfbc946ccbf9f49813590b58,2019-04-17T18:06:24.997000 -CVE-2018-13379,0,1,af407aeeed99a01cc7a4409d5eb5be2ac5a2e06ee3acacc6a604d3bc95ea630f,2024-07-25T14:09:54.960000 +CVE-2018-13379,0,0,af407aeeed99a01cc7a4409d5eb5be2ac5a2e06ee3acacc6a604d3bc95ea630f,2024-07-25T14:09:54.960000 CVE-2018-1338,0,0,d64411637977ae42c91121f0409cbf1c71d1031cb46205ab4bc91aedd4d1c053,2023-11-07T02:55:59.417000 CVE-2018-13380,0,0,480272033178ab224e15cb78036830ce2ce28e5ca27484adf0a78212d77e5330,2021-04-06T12:56:42.507000 CVE-2018-13381,0,0,c6d40fea6a34ff14b2a09585a7b5be2b92a5fed103e6436015156bf377343728,2021-03-16T02:41:08.027000 @@ -116328,7 +116328,7 @@ CVE-2018-15957,0,0,443efe377b38ba992c46c52ce9f3391935a05c3f90ce032f6ac1ecb4a074e CVE-2018-15958,0,0,ac1a8e19a4340d8b5a458ca5e5db9f2ab66721827c776852364801166454a695,2020-09-04T14:09:41.573000 CVE-2018-15959,0,0,a45daa34bc7684bba203e87c78fcf7110800122d2fbcabb77418590b0e95aa6c,2020-09-04T14:09:41.573000 CVE-2018-15960,0,0,456ff493c27f7c2bb5c0aed914c08b25f201cd0834d4f7649d14df781f830f3c,2020-09-04T14:09:41.573000 -CVE-2018-15961,0,1,5cef4f006824116fae0cb9f2bfff9a5fde0a5f19a7efcdbfbd9766fe69aafbeb,2024-07-25T14:08:30.757000 +CVE-2018-15961,0,0,5cef4f006824116fae0cb9f2bfff9a5fde0a5f19a7efcdbfbd9766fe69aafbeb,2024-07-25T14:08:30.757000 CVE-2018-15962,0,0,30c8d743e6db7e6a4fbde1cacd685ebe0d65b3d05d62a84545c93ba3b22589b5,2020-09-04T14:09:41.573000 CVE-2018-15963,0,0,a9f5d22596c14c0242fa25509317296d426c89d0093b1e953e18d95794243fb3,2020-09-04T14:09:41.573000 CVE-2018-15964,0,0,fea4a50cf9ab15b4dc4842dcbbf1ee321458a6a1d2cec0ef0e2176d82f1c5ed7,2020-09-04T14:09:41.573000 @@ -119789,7 +119789,7 @@ CVE-2018-20059,0,0,a45723de5add1e663a976427e38a1be6b9649033dc00f5e703ab52ba87054 CVE-2018-2006,0,0,765f3caaab97b982fe420e9e27673258fedf6eaa82506c2251cc142ce3ca53a3,2019-10-09T23:39:52.590000 CVE-2018-20060,0,0,651a2b7d04c96deca7263b2d73f01e54c209e5bf88c2bcb91adad0dc967f9c25,2023-11-07T02:56:07.787000 CVE-2018-20061,0,0,22fb0133d22d283ed476003dc01c7267347ddc0c491aa0651d6d83c8a96c3f37,2019-01-02T14:50:42.310000 -CVE-2018-20062,0,1,e33da00ab16d6131981aef0e6616c7815cb1b5e93200a8ffd9336dfdc58c5078,2024-07-25T14:56:27.793000 +CVE-2018-20062,0,0,e33da00ab16d6131981aef0e6616c7815cb1b5e93200a8ffd9336dfdc58c5078,2024-07-25T14:56:27.793000 CVE-2018-20063,0,0,5e0e518c5219445ff8e2c70a202e496fae7dc9792301f7b8bf63f3463b297bee,2023-11-07T02:56:07.883000 CVE-2018-20064,0,0,533a4530b27b3788522655f2c92710078a210682a81dd1265fd6e1e345c4f2ad,2018-12-31T18:36:32.117000 CVE-2018-20065,0,0,b1a2e8a294db9cf944bcf406e2e2c42dba5110e573ee97236804340acb00f939,2023-11-07T02:56:07.953000 @@ -127293,7 +127293,7 @@ CVE-2019-0207,0,0,422f7719eee18bb41a6fcb1c8a65092150373d7d22c407e48ce719c230480a CVE-2019-0208,0,0,47fa72fb1491e2eddd007ac660c2013a428a55186223ef7595fd512160713322,2023-11-07T03:01:49.670000 CVE-2019-0209,0,0,8a63648f5ca6170017076fde6d74e61036a2724c0ceca47b3baed4431df839de,2023-11-07T03:01:49.940000 CVE-2019-0210,0,0,81379cb863b04a0492c6a682cbfff45ba3248ce9a34d0ac9ef5b4de0664718f7,2023-11-07T03:01:50.263000 -CVE-2019-0211,0,1,726e0c431f8e55d5ddbea4912235460da30cf47cd8728153f128b74b0517fffb,2024-07-25T14:58:33.307000 +CVE-2019-0211,0,0,726e0c431f8e55d5ddbea4912235460da30cf47cd8728153f128b74b0517fffb,2024-07-25T14:58:33.307000 CVE-2019-0212,0,0,075227b03d37b259fe4718dd8f3f56ed34add98ca8553231e47e24b815a3ff3f,2023-11-07T03:01:50.600000 CVE-2019-0213,0,0,cce91e55bd63b5ef8523cbe7916cc647c1dd3fc78acb908420a62719e62899b7,2023-11-07T03:01:50.673000 CVE-2019-0214,0,0,149638d6a12b631ee7bd62375e0884de15dac65a89a4b918e62e894f9255c972,2023-11-07T03:01:50.747000 @@ -127611,7 +127611,7 @@ CVE-2019-0704,0,0,5ef210fa990cc7df15145c3d6dc29550992d6c33cd9189114ada0760c15f11 CVE-2019-0705,0,0,b641d29fa3ee6e51add602d57290db31e1158c4df07cf80f62876394e7c764e4,2023-11-07T03:01:59.500000 CVE-2019-0706,0,0,989359194e9c4b740182fb426d52576c77ae6a8834be180f4f4876ea6fec9bb3,2023-11-07T03:01:59.717000 CVE-2019-0707,0,0,1a50209a5d8c69cf2fb86129151ca653918e752a77cfc22645ecce83fe56307c,2020-08-24T17:37:01.140000 -CVE-2019-0708,0,1,a2914294db56d1e1135651d148ef7d98c5b878e5ccb6de60f1f875aa7f2cbc89,2024-07-25T14:09:23.880000 +CVE-2019-0708,0,0,a2914294db56d1e1135651d148ef7d98c5b878e5ccb6de60f1f875aa7f2cbc89,2024-07-25T14:09:23.880000 CVE-2019-0709,0,0,866e03a0533d3dbe6af0a9383c71f8b7f204e61423e10144c96547cf8fbac30c,2019-06-12T19:58:57.193000 CVE-2019-0710,0,0,db6585bfe20e01de4f3d57323c274809eb919891d10de7eba7ccda9aa0e18a81,2019-06-12T20:06:33.730000 CVE-2019-0711,0,0,66e9e73573983fd024a8c6a1700997a2c666d0089486222442f1e8b358962b94,2019-06-12T20:12:02.893000 @@ -127711,7 +127711,7 @@ CVE-2019-0804,0,0,78db97dc8254f1fd6dc7a4fbf968f941527ae18f7e3770108d25a0b4bf38bc CVE-2019-0805,0,0,666d1c5f87147f686d041af9da0a40785a9cd89036bda88a4e73f3c9e9af5add,2020-08-24T17:37:01.140000 CVE-2019-0806,0,0,884b129f9875c9d21be6cc8568a08bcbfb44602608a57709f54bfe1103f65f21,2020-08-24T17:37:01.140000 CVE-2019-0807,0,0,7f61e8cf377df686f7c9e89aea30597f1635e4599e3a6dd7674d0ddcbf1ea9bf,2023-11-07T03:02:04.083000 -CVE-2019-0808,0,0,196f9cc1b192db64b4ee8fb78f5525bde2834fb5864092daf23c34e6936299c9,2020-08-24T17:37:01.140000 +CVE-2019-0808,0,1,16a6b01c95a4b5be4e1318c87961f940d967e9dae2cd23bd3460bb3a8068b0dd,2024-07-25T16:19:34.190000 CVE-2019-0809,0,0,8f6301c9a0b79ac3de3bd2fe2385e3a49605eed10ed6c0478a50ecc0d4f44f2e,2019-04-10T03:01:20.203000 CVE-2019-0810,0,0,a521d551a4e619546c004f27ff4acb8b9e32a9e7943c4ccd22c618d4913c4cac,2023-03-20T16:25:03.047000 CVE-2019-0811,0,0,20aefa52dcfe37b56fa292f353552ddacb4f01e73e95faf6d918d15ba1d1d4eb,2019-07-19T13:55:12.017000 @@ -129685,7 +129685,7 @@ CVE-2019-11507,0,0,8a40651f51bb10aa6520da768f5df8b23ee0a5f05a9241cfa95967d56b60f CVE-2019-11508,0,0,57f51b231225454a660b03062d47f87467131b22bb1df5302f91410c7c1f2392,2024-02-27T21:04:17.560000 CVE-2019-11509,0,0,91dc765423eaed0ebfd0717b3c2d434929700f0da6c9cbcaa486a14dd40f6acb,2024-02-27T21:04:17.560000 CVE-2019-1151,0,0,d8a2886ff4009dbdb4c723e70ead8d189030925ee0a5227063aa3b83d5c70188,2024-05-29T17:16:01.967000 -CVE-2019-11510,0,0,0aedb6dde7aee8ec5c17f3631ae6f1e22395b3117a9562653f1ae34240193165,2024-02-27T21:04:17.560000 +CVE-2019-11510,0,1,e1961272342be791aecf8368e82cf74299e1fdae4c44e07a2d619efb7c8b15c3,2024-07-25T16:20:01.487000 CVE-2019-11511,0,0,c74f245f39bee79cc9a5f23f325a09b7b3e537a7993c371de95b18cfd8b998be,2019-06-03T20:29:00.610000 CVE-2019-11512,0,0,4336c062ac7174cd570c400b5ec1bbc9f0534450ff5b9fb9a8c633d9035d7bfd,2019-07-10T19:29:31.197000 CVE-2019-11513,0,0,987d54559e2ecb19c8df1278664b71eaed28e27e2e84acfc1a79cfe439d053e0,2019-04-27T00:49:19.470000 @@ -132160,7 +132160,7 @@ CVE-2019-14286,0,0,2b19388ca2d2ba501db9afa0d4a1356bbfdb69cb6f0c128f7e96e749a1d40 CVE-2019-14287,0,0,c20da8cae923a60ce7797b3664a7c69ddeb29ee5960f3c22b57843264eb7a9e1,2023-11-07T03:04:52.657000 CVE-2019-14288,0,0,50b65041152fb087ef72b9e54ba01be097e8936c47633ab6a1b8440d3d1d9acf,2019-07-29T14:04:47.417000 CVE-2019-14289,0,0,e69de95098f469763d38bd6dbe4dd583f24a2d931bfe9955f26a12c2fc64bc7d,2019-07-29T14:05:54.260000 -CVE-2019-1429,0,0,8879a00a975995226561f6e9ffe9c3a5a6682b6a9e2c8b9de0c4aeea8062fd0c,2020-08-24T17:37:01.140000 +CVE-2019-1429,0,1,b9c68e2d08601b0577ddededa722f81f05d856a3fef83d897a54cded1a17cfbf,2024-07-25T16:32:27.493000 CVE-2019-14290,0,0,669d42157aed05aa11af565753262a849f101a7d372d393c92cf66a228042a01,2019-07-29T14:07:35.970000 CVE-2019-14291,0,0,47a976188e69304d3a756eb44a8e85b79f33ca3b9b5a2940a7f9bdb072bffa74,2019-07-29T14:07:58.597000 CVE-2019-14292,0,0,586474816978d22f90924630b9be96f6e1cb06effddbc865d2dba6d0880983a4,2019-07-29T14:08:21.610000 @@ -133577,7 +133577,7 @@ CVE-2019-15749,0,0,45a39310dd9a960bd19d95877d8e462bf9dc9b4891ae05ba2e9dc2c0ce42f CVE-2019-1575,0,0,0f3082b7e7fd877d05d33974ace4826e604d837b23aca1a05e1b0ba44bb6818a,2020-08-11T16:30:35.677000 CVE-2019-15750,0,0,2eb78c253605c2b735008d1e232acac67354216c4e866573ae70ce86728f1793,2019-10-09T00:34:41.927000 CVE-2019-15751,0,0,6691a8c9abd1225c930f7d4e076be3d7e6025950b4f49ea2178c7d0116df0b31,2019-10-09T00:10:23.753000 -CVE-2019-15752,0,0,a904beb3b41ec131154fe19a3725b02776db0bd177f545f6765263827ba2071d,2023-11-07T03:05:32.240000 +CVE-2019-15752,0,1,dbce47a4a71cc495f911b76b8f763730c4766e5d3a8785126fa3a7b4083aa724,2024-07-25T16:24:56.683000 CVE-2019-15753,0,0,d0c66161ccad96a50a075beffb19d12242790f40b505dc207b9dbfd1ee818336,2020-08-24T17:37:01.140000 CVE-2019-15757,0,0,bec01fcf87ac6dd83062a2d2633f8b1b119cb6af709de67eac6732c6d829ddea,2019-09-10T03:15:16.823000 CVE-2019-15758,0,0,ae1a70b1310358108e042e3d5820b395fa8bef16fe688dda2b1ae940d15dc67e,2020-06-08T16:48:42.877000 @@ -135140,7 +135140,7 @@ CVE-2019-17554,0,0,6983c65a9d00a2e11bfca3e612794f142810fdc953b23da451fb92ae4582b CVE-2019-17555,0,0,d2648a3615c6464daa3170d66c437a8fe441b24c4d832b9196e7235f6d9d8bf2,2019-12-13T21:29:23.263000 CVE-2019-17556,0,0,93064054236e9c0e95c973f2b90da36605c59371d821a84b0a81c8613bc6ed73,2019-12-13T22:19:08.757000 CVE-2019-17557,0,0,d98e67f8aa1cb30d1fdf2533c09f4b38df0aa428b23e220340fb2300f1496618,2020-05-07T15:12:00.013000 -CVE-2019-17558,0,1,df8346f7172842af426c8860fab8d68abf00c35a8ad74ec086b3d4d08a590d80,2024-07-25T14:32:21.360000 +CVE-2019-17558,0,0,df8346f7172842af426c8860fab8d68abf00c35a8ad74ec086b3d4d08a590d80,2024-07-25T14:32:21.360000 CVE-2019-17559,0,0,04a76edc3158d64246074a9d933dd074b7a62d894206e72cca0e4a2966a499cf,2022-10-06T19:33:28.910000 CVE-2019-1756,0,0,983da4eb05ab24ad2a15ec74c6ede8f65f8032609a695532de06674cc8fe4be1,2019-10-09T23:47:59.220000 CVE-2019-17560,0,0,2207dfe8a6e68cc5ab75d3619bf572a23974b737b5156b674b75f044521584f0,2023-01-27T18:31:49.983000 @@ -136025,7 +136025,7 @@ CVE-2019-18931,0,0,f3a2ce43389c1d975c0b396249687c6aaa37dbaec4d2f43847a3743e594f9 CVE-2019-18932,0,0,b14fceab518b411ee415d70805ca495fe6ee9cd7b90330491c7021afacb1144a,2022-04-26T20:05:27.950000 CVE-2019-18933,0,0,9d7931aadf47e0ad71604dcd3ff81f184bd991a1b696d02c427d12b39d27385d,2020-08-24T17:37:01.140000 CVE-2019-18934,0,0,1e76b2dbb2805d96efce12080c423a97c398fd3bfe82c67e1f4870c5c4dc9fe8,2023-11-07T03:07:18.980000 -CVE-2019-18935,0,1,4e918a481310d4d6ded0eb4f3465d6123595db1ea59da8db43841216c08f3c65,2024-07-25T14:31:11.587000 +CVE-2019-18935,0,0,4e918a481310d4d6ded0eb4f3465d6123595db1ea59da8db43841216c08f3c65,2024-07-25T14:31:11.587000 CVE-2019-18936,0,0,d196746ef1fa97097ef96793881e988ae8b1babe59ab804079e1645822b8e5c9,2020-08-24T17:37:01.140000 CVE-2019-18937,0,0,ea021a3935464a358899bdc6588ee3f03d9b1daf076acdfa094788c6a6c711ca,2021-07-21T11:39:23.747000 CVE-2019-18938,0,0,6fed6c242c07b3b7c9a038ad5ff1508caf508633060ad62045499b42ab9257c9,2021-07-21T11:39:23.747000 @@ -137962,7 +137962,7 @@ CVE-2019-2211,0,0,c34275225dd85e60e312a3af253aadc2804765e31cf2bd2f8e47300067005c CVE-2019-2212,0,0,f7d66bb646529b26f0a177c1863f5a19afbb8730e4d3c61de6be2c5cf828b516,2020-08-24T17:37:01.140000 CVE-2019-2213,0,0,501e7a0329935e62204075e108258f5123b2916b82659a52d42f8c8deb57f7bc,2021-07-21T11:39:23.747000 CVE-2019-2214,0,0,5cd72416c06548a451a094398626fccc196d077fc1c4aa958ea54396e79a2c09,2022-04-18T15:46:19.163000 -CVE-2019-2215,0,1,3b583faf2f4e147cf52c48eb9a8fd5d743beec0fb319a929c41ccc8e883a3f5f,2024-07-25T14:10:44.723000 +CVE-2019-2215,0,0,3b583faf2f4e147cf52c48eb9a8fd5d743beec0fb319a929c41ccc8e883a3f5f,2024-07-25T14:10:44.723000 CVE-2019-2216,0,0,b1a4eb9414f18d29e79635fe575f01723f98a726e3832be466c7802bc420bdd1,2020-03-17T17:24:23.567000 CVE-2019-2217,0,0,516496c30b1f1dbfe079a44d632b61c0bd40749da9a57155f04e847c0fdec9da,2021-07-21T11:39:23.747000 CVE-2019-2218,0,0,99905d712ab16442d5251598448ca91f1ad0a16df9cf624c0fd9f64cca06ada6,2020-08-24T17:37:01.140000 @@ -140547,7 +140547,7 @@ CVE-2019-5540,0,0,2e4ae06bd7b57e45d44c6267ac149cd0dd6ddde9b6217bd45e239bba1ab4e4 CVE-2019-5541,0,0,de9f11a3a506e427c830d59ade3bad80b8ce410cddd799dd357c55b213b8ea2c,2019-11-25T13:46:21.427000 CVE-2019-5542,0,0,73d5c57be229d4f0e431707e1eff53504e8d7e35337deccf8194aad5428f23a2,2021-07-21T11:39:23.747000 CVE-2019-5543,0,0,765655e0420daef9aea2c4c2d967e49ca5055cb1ef9a46e272dc1a67cb15bc1c,2020-03-20T14:16:37.073000 -CVE-2019-5544,0,1,f19ff6260bc7567e9fe70f62c0b51e667454395b395860328cd3cfaaceccc74a,2024-07-25T14:15:46.900000 +CVE-2019-5544,0,0,f19ff6260bc7567e9fe70f62c0b51e667454395b395860328cd3cfaaceccc74a,2024-07-25T14:15:46.900000 CVE-2019-5546,0,0,1e42d5c493601d0f3470c9f0366e204f2f47a98b4b72c6e38ab8bed91119a8af,2023-11-07T03:11:37.127000 CVE-2019-5547,0,0,2e47fd6fc8bec2aaae11467cde9d545694455b7aafb16cdd45a9186c76314c6a,2023-11-07T03:11:37.360000 CVE-2019-5548,0,0,d54d5cc9d4472d62b18a5e9364b0f09cdeced807615cc7034d3ecd25a84fe21c,2023-11-07T03:11:37.600000 @@ -144081,7 +144081,7 @@ CVE-2019-9974,0,0,62cb55b6e85d6d22e7faa69b3db74acebe1499a120989baf0863ca4ea24bfd CVE-2019-9975,0,0,da598c8c94b8bd29a8990cb117d69d1c8c2a0d3f0981dbe7d8fd5e29085c4eef,2019-04-12T11:50:40.567000 CVE-2019-9976,0,0,75940c9e7c658d0b3d234b04d9e3d1a4153f479c5cbcdeb0b1b6647df057d53c,2020-08-24T17:37:01.140000 CVE-2019-9977,0,0,a1e135daf45e3f8429f9aed27d4229b3a4aa8a021833d8e666daea78605bced7,2021-07-21T11:39:23.747000 -CVE-2019-9978,0,1,ea0769ea71565ed15e48df881c092564c39fd8d3399311ee2ac5b7f6749594ae,2024-07-25T14:57:28.790000 +CVE-2019-9978,0,0,ea0769ea71565ed15e48df881c092564c39fd8d3399311ee2ac5b7f6749594ae,2024-07-25T14:57:28.790000 CVE-2019-9983,0,0,511c668feaebd8d95980cf01158100a0f8ab755779eb3befa71dddab6b9af4b5,2023-11-07T03:13:49.863000 CVE-2020-0001,0,0,4e1ca99ee0d7bb43f9180d50c49544d413a4e2fb8eae08e3b026842d18802ccc,2021-07-21T11:39:23.747000 CVE-2020-0002,0,0,a91dec84f885e1e322cf1517f63e26c8cf1f5544710f0b3e1b8fbcc7661fc76e,2022-01-01T20:01:34.303000 @@ -144149,7 +144149,7 @@ CVE-2020-0065,0,0,88af725dee29572fa056f71a0084011987527bddd7bcd57fef4ef71344c74e CVE-2020-0066,0,0,1f784b827386a9ad069af3aa76db0b5d6737ac80f16bd39571d247b26d233410,2021-07-21T11:39:23.747000 CVE-2020-0067,0,0,fcb89f7ed28ada3be2468ecab24445ffcf664398852d89a7ada17633b7249ebe,2022-07-30T03:39:00.653000 CVE-2020-0068,0,0,1c585af14b3bbb923764e3dc8da0b6c912ff2e3ce6f082ffed54a163a40f2399,2021-07-21T11:39:23.747000 -CVE-2020-0069,0,1,5d0717b50aa4d2c2e5ec1453e884d9e49ac77fd20d37ce6970ffef9f2c22a1f9,2024-07-25T14:32:59.103000 +CVE-2020-0069,0,0,5d0717b50aa4d2c2e5ec1453e884d9e49ac77fd20d37ce6970ffef9f2c22a1f9,2024-07-25T14:32:59.103000 CVE-2020-0070,0,0,5a0841bb1e7fb7d2ece89292a0cbeb374e4e37755ac19aec4a89bb809ddcbf7d,2020-04-21T17:59:10.410000 CVE-2020-0071,0,0,752b58b085374f539e157d676e38bac0cce2d205e0c754b0509a69f292628da3,2020-04-21T18:01:37.463000 CVE-2020-0072,0,0,427090bbddc0bd9a281cf274d4f269424168bde0d5932c0bd0678e6db2aad38f,2020-04-22T20:25:58.153000 @@ -150698,7 +150698,7 @@ CVE-2020-15995,0,0,e04844d4e46038beff6c24b9ad2b5bc1a5fc9fd0ac9d926f6d2378c39d02c CVE-2020-15996,0,0,c0f84fed1bf4857bad6d4760ec25434c47b593266dc4ad8312f4247082a4ce10,2020-11-04T14:38:04.407000 CVE-2020-15997,0,0,fcda328626134842d34e9803c2502bd8f309d36e04389462a0b52f8cdc430979,2020-11-04T14:30:08.580000 CVE-2020-15998,0,0,eeaf11d5ed8eae52a2bfafc1a6efe79ec5978ffba9304c37a4dd3c9475dc7fbd,2020-11-04T14:29:45.890000 -CVE-2020-15999,0,0,0b8eee3fa9c2328f7b6670efe9a340e1d6942fae938aca92b700884736fd6353,2024-02-15T02:00:01.647000 +CVE-2020-15999,0,1,f8871ed4576fd43c3f642535c1469a4893ac8c3903e543d0a324a7a35c2fd167,2024-07-25T17:25:29.553000 CVE-2020-1600,0,0,c821639871c0a0499643fbca0e32382c8693aef651f667efe9930f1f8891a725,2021-09-14T13:21:46.983000 CVE-2020-16000,0,0,81c481e8e47c4bf31fc9746a2721ef7ecb8cb17a78160bb10c3fdd64c8f577bd,2023-11-07T03:18:00.863000 CVE-2020-16001,0,0,abb8e341e9d3451760fb43b8808fce054c2381c689b060a9aade31a2203e0f0d,2023-11-07T03:18:01.050000 @@ -150709,7 +150709,7 @@ CVE-2020-16005,0,0,1eefc63c79dd2c5a2fe15b59f5fd48d63f98b41db9102baff36e6a4dcb03e CVE-2020-16006,0,0,dc95ab3ce97a38d13db1b04a1dc9dfe8af72e050379c9a86645d6e71bf34c759,2023-11-07T03:18:01.650000 CVE-2020-16007,0,0,18d8340255f4d423d4f7e3aa89faa2195f6ad217d68aab481bf9c2eb4cf4df02,2021-07-21T11:39:23.747000 CVE-2020-16008,0,0,6dafd5b3bc26cc7b09a117afb4aaa86e193f9193244643f64605a941cadb3420,2023-11-07T03:18:01.743000 -CVE-2020-16009,0,0,7202aff2bd0f67780ce67e892a94b0a56d3c69c2376b3ee8b6c9e217b6684fa8,2023-11-07T03:18:01.830000 +CVE-2020-16009,0,1,8dcabce13df7b1f4f8ba04afbc0519150cd0cb9aba21259ed43e21af870e815a,2024-07-25T17:26:01.377000 CVE-2020-1601,0,0,8e8751d017b5350d35751be8282b7622c893ae821434c4639c6159998dd6bcb0,2021-07-21T11:39:23.747000 CVE-2020-16010,0,0,f56fe519a049a9dae386a7f65d4ef4428fd3175a6f7c63a6fcff40d98fe419ba,2024-02-15T02:00:01.647000 CVE-2020-16011,0,0,6937ac689e92a20b146451c94493124864da842fa3466b617d96e6b60c09d473,2021-03-11T18:14:40.907000 @@ -158376,7 +158376,7 @@ CVE-2020-35684,0,0,a209d727a7991f35ba865f23f8609d26ae3fbe5d102bd4766ad1b2aa0893e CVE-2020-35685,0,0,ca4ed41083be14e4b6b4a2d1a160a8097654bde4d22f830b2d4fd0e8adbba628,2021-08-26T18:21:15.667000 CVE-2020-35686,0,0,bfb17b8013ec180b19b94c96b0eb292174e9b0493ab131edb5e16575a4d13910,2021-01-21T21:27:55.227000 CVE-2020-35687,0,0,4b7b6800507b653f66092fcd0a5bb7e46923deba674fabd9c4946ce1c99bd8a5,2021-02-02T17:51:04.163000 -CVE-2020-3569,0,0,37625048e4f2b8d02a50a0a0fd3fb682048416cc985b8c6800b9c966e6b5d3de,2023-11-07T03:22:55.700000 +CVE-2020-3569,0,1,d3a67ed9b6c436abd357e7b78284593306776b08e9e4e3fa15d893d4bc4bf654,2024-07-25T17:21:08.993000 CVE-2020-35693,0,0,fa53cd93c8e2403f51dcde1c41a20cebb5100fbdd62e3adc0be134876c6c6c8b,2020-12-31T18:31:13.827000 CVE-2020-35698,0,0,a96f86dfb51bc42ee9736bb56d7476bd181b889d0316769520930c5686caacbd,2023-11-07T03:22:01.763000 CVE-2020-35700,0,0,12b68552360bd2e635a748835683f0a8ae6b1f47283ecb674c81851a41f08272,2021-02-09T18:42:41.113000 @@ -161092,7 +161092,7 @@ CVE-2020-5898,0,0,a210287d547c106af61bd0cae8a17fa9cc3e56fb3027846310d656a6af8063 CVE-2020-5899,0,0,5892753a7d9b1052477978c83001f72500501c19e6dd18d482ed8a1d740ebf3f,2021-07-21T11:39:23.747000 CVE-2020-5900,0,0,b181a976cdcd2221abb6285ee83a522c66630492d867536c319a3423d2bc6866,2020-07-09T14:33:49.790000 CVE-2020-5901,0,0,05e81688aecd5872466abeac1e73450d1d8585b211910754ced758d7f01aa577,2020-07-10T18:44:08.297000 -CVE-2020-5902,0,0,f2ac8d0f0b98a0ced240dc182847fab78c9abe90e2a249357ed70a2d932e9ab2,2023-11-14T03:15:07.810000 +CVE-2020-5902,0,1,42d888daa8db8716be5ca00ed0683735586128f3063b9d992d6184ed236b51f0,2024-07-25T16:42:50.637000 CVE-2020-5903,0,0,e56fcd0f2a84fbcc3ac35bb76636607cf6637110c71036329c6579ca0cafd4be,2023-01-27T16:36:04.160000 CVE-2020-5904,0,0,10bf0b665f2f9e55bbfa23a1f336a88a0adf0a9dfafd626e1341b0d792a4c7df,2020-07-10T16:16:10.080000 CVE-2020-5905,0,0,112a7c9b0199f062b9637cf35f9d7cdad48da1d04ba5fa57331683d621ac3acd,2021-07-21T11:39:23.747000 @@ -161556,7 +161556,7 @@ CVE-2020-6414,0,0,bc3807260c539f3f9f666fd2d9b300a756ba3591a908459a42b324b092270a CVE-2020-6415,0,0,54a650e37ebb3002a888e099bfac75e7eb47aed88b97494b44239550b409c017,2023-11-07T03:24:18.717000 CVE-2020-6416,0,0,81585a90d5b95f5f9e38b644a14901e07a6f26d9a39081d203109f3100ccbfba,2023-11-07T03:24:18.830000 CVE-2020-6417,0,0,be14debf5963498fbe0098e1587b6ad688f57a22780b7020016796ce6add7c0e,2023-11-07T03:24:18.920000 -CVE-2020-6418,0,1,9e857e952336da5b7298994fa11f033d94aa84c4cea7e607687626da887f2377,2024-07-25T14:32:38.550000 +CVE-2020-6418,0,0,9e857e952336da5b7298994fa11f033d94aa84c4cea7e607687626da887f2377,2024-07-25T14:32:38.550000 CVE-2020-6419,0,0,db56611e11ecc78712dc5385ebf65ed38bec89bd2292c31bc8015bb877ca5056,2020-06-04T17:21:05.410000 CVE-2020-6420,0,0,aeddcd3f7c1de5379f305625562338eae9d243377cea0f1773b4d9b01a8005cc,2023-11-07T03:24:19.077000 CVE-2020-6422,0,0,eb6bad012b13fbc8fa6e1314e525ac8e91271d91afbcfde13fca61d6fcaeced8,2023-11-07T03:24:19.147000 @@ -163329,7 +163329,7 @@ CVE-2020-8510,0,0,475ebbb546b3a4b81eb4201a706f2ecab806d24b2eba9965f3672028175f77 CVE-2020-8511,0,0,7e81bfc812ff1307128f80357ecb14bc4cfb07d8ea7b6a6f6f4d23c1bd0419c3,2020-03-25T16:08:51.920000 CVE-2020-8512,0,0,9163301b7fa2725b88ea2145a6c31f4a80c729ad8a1601319732bb5c88c4cd46,2020-02-04T04:15:10.777000 CVE-2020-8514,0,0,617b8ab25547a94d2c99206b3e9a2d056773c3db7554571b8877decfd5f4ceac,2021-09-08T17:22:36.363000 -CVE-2020-8515,0,0,c76cbbc540d4ef040215290e029481c1a6012e4c65865e09f446c718db3a7a22,2023-11-07T03:26:36.773000 +CVE-2020-8515,0,1,2c24877dff5a68918030470a17d589709bfb9931adbeb121c95f1c41a07023c7,2024-07-25T16:40:16.430000 CVE-2020-8516,0,0,c40d40cb374b73914db4840dea141cc23979f465002a4bdc009b78ac8aeda75a,2024-05-17T01:51:05.390000 CVE-2020-8517,0,0,a498d67ba21ac44e3aca797b4e058d287c7a2fa7698e39c32b040dd6b35bce4e,2021-07-21T11:39:23.747000 CVE-2020-8518,0,0,42cd734f5f36dfc00c9c06243fe80949c3cecaa71c2f93ed2e9b35e2e2505e2c,2023-11-07T03:26:36.897000 @@ -165840,8 +165840,8 @@ CVE-2021-1492,0,0,a69047622f80854df4ebb0282bbd625633a27bc29349c6dd23618cf9df0f72 CVE-2021-1493,0,0,1972fe993c347c9cea2e8eb1cb5110425f1d779b9b88aa05049e99c9a0ad82af,2023-11-07T03:28:25.657000 CVE-2021-1495,0,0,dc2985faadbc016aaf69732c00934b0bfe0e76ad4afb876f2b4d3c9fce405acd,2023-11-07T03:28:25.833000 CVE-2021-1496,0,0,8500d9350f301c5993471cace6bdea0ff38e1db7d30046ec6244f4d3b6c4fbb0,2023-11-07T03:28:26.017000 -CVE-2021-1497,0,0,209bbb651526f56b0f31bb43a5c6e071fcafe6cca92dff8e409a0d2edca91a59,2023-11-07T03:28:26.200000 -CVE-2021-1498,0,0,5752cde477bf0bf780e76b3b756770049133f022055ce53dc827246799aaba07,2023-11-07T03:28:26.367000 +CVE-2021-1497,0,1,7aff829bd7102e7218ed7977e28442b8bd5c83b225095b13fe23f759d2a734f0,2024-07-25T17:32:35.267000 +CVE-2021-1498,0,1,9cae6e23b1c4245a4279f662cd247dd2d0a151997369b562b13e8ccf4f05461d,2024-07-25T17:33:21.813000 CVE-2021-1499,0,0,e879e24465aa7fca6949f11e8238d250d8a531bdf170a4ec220df1a322c7a586,2023-11-07T03:28:26.697000 CVE-2021-1500,0,0,bb931793c6d604e6d6750714ca468123ca155ce465d1696175237ca9408e9c25,2023-11-07T03:28:27.010000 CVE-2021-1501,0,0,069ec510eea186164e63023dbc0b51be62d42a69f6ac21d6ce230066badac246,2023-11-07T03:28:27.190000 @@ -166064,7 +166064,7 @@ CVE-2021-1728,0,0,724ef1946af97ccb6b477969520582b5e76e2551cdb218cd4307bcf8e3c5ca CVE-2021-1729,0,0,6ff4559f3dd41c4b4a06faad170a4d61f76da2e4cf79953704051e5b7dfcd511,2023-12-29T20:15:48.390000 CVE-2021-1730,0,0,c3a3a1dffd720131414db1262d97480781cb7ef76ec0a7cadfbc7522f00ce8c1,2023-12-29T17:15:54.757000 CVE-2021-1731,0,0,01e5f6b0c05d7e9a256fd9b5d639cebd134b96ffba95c21fefdab28d0da25b4e,2023-12-29T23:15:26.257000 -CVE-2021-1732,0,0,c4c2c181fdd319229e8ddd3ce2ecc85d61f69332e44f0422009b4f7f38c006e5,2023-12-29T23:15:26.480000 +CVE-2021-1732,0,1,423a585530ac2ae3addff4fe3667128664ba9778c2c0d9ed48c71f32b62c565d,2024-07-25T17:53:12.640000 CVE-2021-1733,0,0,30be57a87abb239c67ed7b6494886c379e293c6b264083083f6cc65201cb944d,2023-12-29T17:15:54.940000 CVE-2021-1734,0,0,5196a2f45cf179e342124c5d62f6bf56dd0958dc06cf5f763f9e44983f68b831,2023-12-29T23:15:26.687000 CVE-2021-1736,0,0,68673b9e3b64548381256e44d4dd43ff5b0c9d866164fd9df4c7d64ea9900c0e,2021-04-07T20:14:31.293000 @@ -166384,7 +166384,7 @@ CVE-2021-20087,0,0,028dab5989d5dc5515f8f72e8d28b11ea19f1995a0b792bf922869fcd3a9d CVE-2021-20088,0,0,26071b4e134d5eb32ad92ab1b298b7c51add36ac288c1be4295041f179dd4fa5,2023-08-08T14:22:24.967000 CVE-2021-20089,0,0,0100cd665c2926a4c293124c078d0736f7d6fdbb99e38bae87c9fc2b3d1e63b8,2023-08-08T14:22:24.967000 CVE-2021-2009,0,0,99918b47f62ac1a87af2661bfb9ae5a93a078b9d2a0e9741a5eb2af183fcad3a,2023-11-07T03:32:46.483000 -CVE-2021-20090,0,0,3ad0d2933b69c0718fdc9b9343bd2f6e043a41a13dc8776fd27a60e9226a671e,2023-10-18T01:15:24.427000 +CVE-2021-20090,0,1,28d384954645eaf349900c802a77e5fd35eb2a7e4911eee2b8c424076086a66d,2024-07-25T17:32:27.007000 CVE-2021-20091,0,0,3e46740af7074c5c09a92ee3c4c1d132ca2d9066065fe96ad60376d9066d5d51,2021-05-05T18:01:58.707000 CVE-2021-20092,0,0,453d308d2c7b37080f234df89039e15950d4a82e60b3d557de91a129aa774279,2022-07-12T17:42:04.277000 CVE-2021-20093,0,0,388df8fe8b7b299103a1daad33c7a8637a6d9a11d01aef9d8aa0d6b3f7bd7107,2022-10-06T17:43:33.530000 @@ -167361,7 +167361,7 @@ CVE-2021-21144,0,0,9cf8c9cd9d31fc1da56de80204a58f7b792a938b7194e4a6abfa16d78e993 CVE-2021-21145,0,0,e3b1ac15f7436736d8645ca665cb41a076f6ada78f4209aab5d274de2022d080,2023-11-07T03:29:33.073000 CVE-2021-21146,0,0,24cd503e14d267e833dddeb60bde5038ead6213f67d620fb095273b8ae26b31e,2023-11-07T03:29:33.307000 CVE-2021-21147,0,0,89f0f04794a3398bf43aaf862e087f1634be96453437dc8d3c68a09fb59eefbc,2023-11-07T03:29:33.377000 -CVE-2021-21148,0,0,93e867b8590a04e8d6a7a1ceb7ae224967e9593200e601e2c31ef0e021ba5d88,2023-11-07T03:29:33.490000 +CVE-2021-21148,0,1,3322b5eb174169a2d6ce0c1a4451c87e479adb61dbb6252ca6fa4b3faae207a9,2024-07-25T17:52:35.147000 CVE-2021-21149,0,0,9db8b9192a6c67fe32784d1532243163780de3ca45a284280cf35a36da6853a2,2023-11-07T03:29:33.577000 CVE-2021-2115,0,0,2ddee9cee312db757bf31e6f8423258e1658afa92bc9a21b52814c9fe94f60dd,2021-01-26T16:44:00.987000 CVE-2021-21150,0,0,bb030ec265145171e23d5a38360708b42026fa6c948be3bf11451cdc221146d8,2023-11-07T03:29:33.713000 @@ -167380,7 +167380,7 @@ CVE-2021-21162,0,0,df5de8ee00ee1a611596d8a5fac6f172e93593ee340ff3e4f562a85277001 CVE-2021-21163,0,0,a3a27a5f548f9bb44f266a5db7f2de7354b7e00cb5dbc212753e61429e159d20,2023-11-07T03:29:34.647000 CVE-2021-21164,0,0,57418603312eec07dc8f5737ce50511107b20ee31a26cb1a230d3a48d910197b,2023-11-07T03:29:34.713000 CVE-2021-21165,0,0,dfc3318e9c0f6954948d5bab5198767d23a1a097483f2b969a9223ce8c4a763f,2023-11-07T03:29:34.823000 -CVE-2021-21166,0,0,a52b50c60477af2245e62ace289d934d3d42b6e64480d95e17751fdfcb0d73ec,2023-11-07T03:29:34.903000 +CVE-2021-21166,0,1,dc325eb5112716e9f78be458dab7952bad58cfb21c32c002000ce669069d7e9a,2024-07-25T17:34:26.050000 CVE-2021-21167,0,0,1acc7636f4bdb96b74df64633a9a8a36b6375b2ffd494d34e5ccf19aa4f76d8b,2023-11-07T03:29:35.083000 CVE-2021-21168,0,0,bf394be333b7304681a918a51ee592100597fc14bba861a2382be50d58f9f34a,2023-11-07T03:29:35.150000 CVE-2021-21169,0,0,878d60b043f2ddf46248010c5ddb91d4b37d92ea9373cbccf65d15327d1be153,2023-11-07T03:29:35.220000 @@ -167424,7 +167424,7 @@ CVE-2021-21202,0,0,27bdbbd1ca292ef2c56c6f695cd192dd6525e9aedffb89abba3690e7c668f CVE-2021-21203,0,0,722404ba7c75eb9e85bb8b696732ee4885778b708306d69009cee44eeb7c2ae1,2023-11-07T03:29:38.257000 CVE-2021-21204,0,0,7dd56403820d20a4da984d7b3cefdd973d0d3aa1f0a589a82a915d17cc2ae7c5,2023-11-07T03:29:38.320000 CVE-2021-21205,0,0,652d2811d3014118ffec31275197431b88b187fa5ac52b7446ca0e6f1b04cdad,2023-11-07T03:29:38.400000 -CVE-2021-21206,0,0,9b34d2562e66fec8288102a6184ba1c3e14f412d35c21eeba968137123fb5172,2024-02-15T02:00:01.650000 +CVE-2021-21206,0,1,28e489f5602560ad54e341e2bf168ff63586446918109a7b5af054cb08d8bc1d,2024-07-25T17:31:14.790000 CVE-2021-21207,0,0,c365db0056e4067c3a09e695bd28e67f352aec03ab0ee59a0909524eedd139c8,2023-11-07T03:29:38.587000 CVE-2021-21208,0,0,46436fed128ade9312bbd79228e0891fd4b091b23d0f9ae9080436e89d70e986,2023-11-07T03:29:38.650000 CVE-2021-21209,0,0,45d7488ef5635907c68ba18008ebb8aac2dda00ba679a691d46a6d2b5b65990c,2023-11-07T03:29:38.763000 @@ -167440,11 +167440,11 @@ CVE-2021-21217,0,0,54ba9a26b2a73120481057913285c9ababb07dbc6ad7c6955e25f2fb07233 CVE-2021-21218,0,0,b64a1ce2627baaead86a0d8a5662d2d81a7b28be8b74c51f89bd8341f0b6dfbc,2023-11-07T03:29:39.580000 CVE-2021-21219,0,0,252b81eb5e9b92e3d0d7870781c5036eeb1ba8194f5557c6ce804ee46ca55f30,2023-11-07T03:29:39.680000 CVE-2021-2122,0,0,ac758c903eb842fb3c64d3dfd2c7c937d01dcd52dfec54de5d7f0d1b2d410d52,2022-01-04T17:09:06.060000 -CVE-2021-21220,0,0,4864548048af2874f44b26b65fc7d2fcfd772616513b03852e20143ed8f4699d,2023-12-14T16:15:43.700000 +CVE-2021-21220,0,1,b4c393c55c22159075153899392e8069828ec05d50e9b540fc10a8386b849e0b,2024-07-25T17:31:21.870000 CVE-2021-21221,0,0,44f0b75c03b24f52f134fe14c0b77b90047bd1c89a7b8c4d85a242e42d284e8e,2023-11-07T03:29:39.900000 CVE-2021-21222,0,0,00d2d001be4d83b9ced5bf073312bf6399f90ace9384bbfa2bfeab6fb8756f6c,2023-11-07T03:29:39.970000 CVE-2021-21223,0,0,c3daa6f22748d50a82b25e565c9f52b4dcde7fadfd90d978a17c418a94af04be,2023-11-07T03:29:40.093000 -CVE-2021-21224,0,0,d80af276eb8bace8cec6a8341cb5090b4cbc5a09c24cd2bbfdd5987c61a12fe9,2023-11-07T03:29:40.187000 +CVE-2021-21224,0,1,8d8fc09674b6ef79ebed5732b3bbae230fa57ee1f009752e919de55d453b87c3,2024-07-25T17:31:25.827000 CVE-2021-21225,0,0,b33957d20d35447b16639448d1f70f5c45987c0da3f9253355374aeb6bb71d7c,2023-11-07T03:29:40.273000 CVE-2021-21226,0,0,19fcd2c251f2ff4ecc33deab53b3dacca64e6db280da0797de3baf402fed60cd,2023-11-07T03:29:40.343000 CVE-2021-21227,0,0,a42ca2b78c05460ac80e61789a06294bf6e4eb67085f8b1e3331be54c98fb32c,2023-11-07T03:29:40.430000 @@ -168704,7 +168704,7 @@ CVE-2021-22498,0,0,27abaee56acba5494ff8627c0d0e38543f9d76bc9eebaaee7e0459aa75ab9 CVE-2021-22499,0,0,70c055aa31b37148dca64de83c87eeb1f43d27137b2496f17ef113f50d4824e7,2023-11-07T03:30:14.067000 CVE-2021-2250,0,0,3a87a38ad4938462c03de55ab516a234235f4da6cfa48a3f28229d40f9d4b95e,2022-09-23T13:27:38.033000 CVE-2021-22500,0,0,bc568527a8f921b7d318316f66d48f00a67d6993e13f79bedaa2128449593258,2023-11-07T03:30:14.327000 -CVE-2021-22502,0,0,a0d1a7a623cd19cc30ad0806c7e93741ba1ff0e38352188af7ebc5fc53e94247,2023-11-07T03:30:14.610000 +CVE-2021-22502,0,1,e32c3dc7dba463b0f8bea66cf991a2b26228941d3e9adf82f206da08b4cdfa6c,2024-07-25T17:52:31.453000 CVE-2021-22504,0,0,a934ec069d5c4d2c90c76aac69d1c73a45459029286161b251ecd4721d8c8e93,2023-11-07T03:30:14.997000 CVE-2021-22505,0,0,675e854cabcaeacf3b78a58593a856837df3f64f635c2f4dd4c947fa88d2f6f3,2023-11-07T03:30:15.257000 CVE-2021-22506,0,0,a8b9c00fcc307ef934a8577b373b9f5f5a38d82950f3fc6ec2a9d19ada58949a,2023-11-07T03:30:15.533000 @@ -169676,7 +169676,7 @@ CVE-2021-23863,0,0,dbfe1b279d5f7b11394285ce2774ce75ffe818d4a2a971a98059d6a7670f8 CVE-2021-2387,0,0,911d964b708237f1a58323dbc755646882e56b656bfbd0c9cf1606aba7c282ce,2021-07-26T16:41:20.203000 CVE-2021-23872,0,0,a7164d0398b10bc63f6b2bb532d562293060c0dfc0d2e3e23faf4e11f9c7d8a7,2023-11-07T03:30:55.530000 CVE-2021-23873,0,0,e87bc345e14d4df0d008b245894f79651475d46c5d313940546c7f822f88a284,2023-11-07T03:30:55.750000 -CVE-2021-23874,0,0,28411f14e1d1f9061f1f410589e924885dde87f21dc9e19e07830e7b5a42de76,2023-11-07T03:30:55.993000 +CVE-2021-23874,0,1,b085b1ebbec791caeb37a22c91dfb3acc0c0f7ad19ac65370a59a0d59ff342e1,2024-07-25T17:53:02.490000 CVE-2021-23876,0,0,339841b790d0b872bbb68cfd37abb0b710e5f6cfbdd1c677ffa997ed45a651b7,2023-11-16T02:22:30.853000 CVE-2021-23877,0,0,2ee425b3b880c2943f3d4ba16af7aeca1f8f746fb0ec800ca19267ddf27dd978,2023-11-07T03:30:56.427000 CVE-2021-23878,0,0,0663cb0d8d9192663fea0e1b2389fe27d9e5476a99c1b6e89bbc48958b1048bb,2023-11-07T03:30:56.667000 @@ -171795,7 +171795,7 @@ CVE-2021-26406,0,0,a2d9530227d7d0a9e69845ea22b7481931dd718b51e408672674112a6f574 CVE-2021-26407,0,0,5b71acff303921c7eeee407ba9f34a80d4f61d6b4693ace50ea09b5a7cb9d017,2023-11-07T03:31:44.963000 CVE-2021-26408,0,0,a56d3b1c28ac53b39399acfde11f93e9e25809951d55fb46826068b6d43854b6,2022-05-17T20:18:12.863000 CVE-2021-26409,0,0,08ca624f9c078109a561b30b9749cde67207d2ca559269c9dd56a875d07aa0d1,2023-11-07T03:31:45.023000 -CVE-2021-26411,0,0,8d3591786789364d40c47ec8673ad12175b0f98c5f3ada573a98d1cc753de38b,2023-12-29T17:15:59.767000 +CVE-2021-26411,0,1,a6a9526b0582961a44cd57ec9609957b17bf4e6c97cfa752c1a12f1229b635a3,2024-07-25T17:29:04.120000 CVE-2021-26412,0,0,78e0c241ead586c54fe09866202695b99df0e7a65ea050b144296cbceee440c2,2023-12-29T17:15:59.983000 CVE-2021-26413,0,0,206935f01f2bc81eeff44306c7e592635d0edc8a78bbe151d9291b503a29b221,2023-12-29T20:15:49.243000 CVE-2021-26414,0,0,5944f20cb990bc8eaf3664b08897f2d92bd11f4f798b69c7b8bc9e6e22afdccd,2023-08-01T23:15:11.387000 @@ -172036,8 +172036,8 @@ CVE-2021-26844,0,0,a186a88c621b9734225d4ec1ac4c09a9b37ca74ccb5bc38caa5a6ea4f9a0b CVE-2021-26845,0,0,ee4adca810fc9655398c58c8441b9563d091a2814810290cea5f2e3800332aef,2023-05-16T20:21:29.777000 CVE-2021-26854,0,0,bb8a187eda545749f2140d803313d1196f94a8acb887db0aaadcb4db9869c2fa,2023-12-29T17:16:00.650000 CVE-2021-26855,0,0,1fc495f9fd41fe73f9535590304cfe46a751d419e57fbfea7458a7e2b8ee2e84,2024-02-15T20:18:22.123000 -CVE-2021-26857,0,0,ad9dac85666399e3bd92aaf5103c3a77b99aae9576001ccc309b27d9ba86ec21,2023-12-29T17:16:01.073000 -CVE-2021-26858,0,0,1e20b9f02cd81acf0031e892f87a10c05d8f5e244116cddfa5b2218f4920f7f8,2023-12-29T17:16:01.327000 +CVE-2021-26857,0,1,ea414a49d5aa4cd3bbc5c5ddd299fdd84b6f4a5cfedc6f23cc9dcfd3b8378a77,2024-07-25T17:53:21.247000 +CVE-2021-26858,0,1,708f9d97151f01b7b2714b50a79f075ef9ab04b2ccc2cfe45a6cf02cdb632b59,2024-07-25T17:53:33.987000 CVE-2021-26859,0,0,b9ec5662f8de0f5035f0395ab8ef3e31081123e2b624d9330057eb8da40f0580,2023-12-29T17:16:01.557000 CVE-2021-26860,0,0,9f9408c12c6a278705744770ed24b31ea578dff3117b9b8f58046a790b661e62,2023-12-29T20:15:50.110000 CVE-2021-26861,0,0,f8e114ad93fc307a753ff702a57f7fe7effacef5ba251b63f91c9b375c2c2e10,2023-12-29T20:15:50.297000 @@ -172214,13 +172214,13 @@ CVE-2021-27055,0,0,e1b0091e34b26a6c1ec65e212900dbaf30ef222e35009d946741ce7e6c377 CVE-2021-27056,0,0,5444193f26d216af949f9893845d1963ac44e45bd432953ee1f609321fbfb4b0,2023-12-29T17:16:03.677000 CVE-2021-27057,0,0,5ccece865212bb59ca45689860c29efabc849f8d4723b6ce3914d821da086047,2023-12-29T17:16:03.877000 CVE-2021-27058,0,0,e5cbdbc4ea8414c2572e92a7c0080b7f74d0cc54d6d6b019bd721a8e3b1f1372,2023-12-29T17:16:04.067000 -CVE-2021-27059,0,0,eef1fad6b08cc3cd49d687cf36a69c106658c967bdc7942a53b392f9dbeee137,2023-12-29T17:16:04.247000 +CVE-2021-27059,0,1,0a7f76f70523b85c3dad8e30c48f7a16872088303902fb2ae4ae5c9d09340ad1,2024-07-25T17:29:45.397000 CVE-2021-27060,0,0,4aa8e3b52c896852b66c590806306d3b2c3c009bfe16745d765716616a51808b,2023-12-29T17:16:04.430000 CVE-2021-27061,0,0,15890f46643314932b6274ac0e7b0ac109d0576916d5bec8772d10e429bc5bd0,2023-12-29T17:16:04.607000 CVE-2021-27062,0,0,336253f4217089e1937447be48906269a32c1ef6ca276e6c09ec8834e40502ea,2023-12-29T17:16:04.787000 CVE-2021-27063,0,0,65e7d09e44905082d01e617cebb57b874fa4fe3842ebf3bc1a678e1dfaa658d4,2023-12-29T20:15:58.440000 CVE-2021-27064,0,0,4171763a7d4764355a75e117dc83148c66d75b61ebd6c8fae2588b35fac3dd8e,2023-12-29T01:15:38.447000 -CVE-2021-27065,0,0,28b43adb04644bdcafc2cd893eb2cf4510aeea772acc0f27e16bb3cf4b013e9a,2023-12-29T17:16:04.983000 +CVE-2021-27065,0,1,62324817993a50662aa74c0f4008ad84797e79813a44c50c64943625f1d9c6da,2024-07-25T17:34:21.940000 CVE-2021-27066,0,0,5cd1890bc05adb7571f325cdb927cfe8da3c14469fedd8f738924ad032f6cb16,2023-12-29T17:16:05.190000 CVE-2021-27067,0,0,b088e873d0e6b9b13dadcd2a46b03c0ef0458a4f21212f87263d8d0066f17983,2023-12-29T01:15:38.650000 CVE-2021-27068,0,0,fbed421d3236e88b3fa3e69a0932e3ba76aa8abde0226d69a5b3762cbcc37554,2023-12-29T00:15:47.750000 @@ -172237,7 +172237,7 @@ CVE-2021-27081,0,0,fd83d6df496d185ad5f7284af0fa99df0a8b5250fc40021d28de2fa5ca2b2 CVE-2021-27082,0,0,d01468e6e451d0d88fcacd22d7533dffc77317f18656eff76a392aa5fccce84b,2023-12-29T17:16:06.610000 CVE-2021-27083,0,0,11c4208e1f97d957464f201b8c5effc5beed722ee59b8850b82b9c0a479ab255,2023-12-29T17:16:06.780000 CVE-2021-27084,0,0,e38a1ab8c860124bcada0778f32341acf9bdc4c38119faf22fba44efa00218dd,2023-12-29T17:16:06.947000 -CVE-2021-27085,0,0,2d5f1d3cebb61a885d8107ce309cefc508621d704b101e898a3ea13293a589bc,2023-12-29T17:16:07.137000 +CVE-2021-27085,0,1,4b4dac73c1660c3eef682834a8309d8d1105776c358b48aa8dbef6aeb4b8d11e,2024-07-25T17:30:49.863000 CVE-2021-27086,0,0,2c54519f7823f6c7fe4f1d89c2076fee3fff4d6b0c47d3345dd83406ba6d2315,2023-12-29T20:15:59.617000 CVE-2021-27088,0,0,1a46e5c76ebf0a9a59571e0689b457d0adac5dd478db3745a7867dfa4bdc3469,2023-12-29T20:15:59.813000 CVE-2021-27089,0,0,7f72d0c5b374a87b36b3757c2a133cef6aff850d879abdf077085207760f56e9,2023-12-29T20:16:00.017000 @@ -173306,8 +173306,8 @@ CVE-2021-28658,0,0,10240e8932be071f64b4d7ceed1e91e7f062e6003dbac0fc4e86da8e120c1 CVE-2021-28660,0,0,37dd1ac15f6bfc5905c8cee7cb65edb18da857d6aac9dd47852bf8d4c8fd5627,2023-11-09T14:44:33.733000 CVE-2021-28661,0,0,305c2bbe1579faf986356b3383f915c0a456f3474023c19856e9b6f20a6beaf4,2021-10-15T01:53:15 CVE-2021-28662,0,0,cea384b692d24de8092d9d160858a16e48ac42a91a4bc999dd6627163feb91ca,2023-11-07T03:32:18.137000 -CVE-2021-28663,0,0,8aa3973781e1bb618aeaaffdb213b0f9cabb7e25617c43f2e83b42251f0172fe,2023-12-13T13:51:52.563000 -CVE-2021-28664,0,0,899685542497ab063186da3b6fb0d6d6d7221203b4f9156b73f61dfa8652596d,2023-12-13T13:51:52.563000 +CVE-2021-28663,0,1,3111805e33df7854c014956f0c15854d9547c855507a13752f4e3e6d545b5ef0,2024-07-25T17:33:47.580000 +CVE-2021-28664,0,1,e5bcccc2bd506ab6b3600c389c3b4f5b03283589ad0db7b7f46fc6378cf228db,2024-07-25T17:59:50.377000 CVE-2021-28665,0,0,3bd907d3d23a03b2b014d35e71d71cd61a30be665ae5c6583c4556d40847301f,2022-07-12T17:42:04.277000 CVE-2021-28667,0,0,055fa8c06183fc89d048f9424e212a5e038d60254dfafa0d7be08895557719a4,2021-03-25T13:44:17.310000 CVE-2021-28668,0,0,ed7dcf87e75b8ae4d7b382fdbb2de958df5ce187a5a6bfaaa53419dfa817c185,2021-04-01T18:30:27.737000 @@ -214028,7 +214028,7 @@ CVE-2023-1707,0,0,a7b460eb62f03673fa2dd287c4e7dedfd8b551c0e58529601049970f0f80c8 CVE-2023-1708,0,0,0ed72b996f607824503e7071ef24a77423413405b22a844332a3120a4d0ee678,2023-04-12T19:20:07.090000 CVE-2023-1709,0,0,9fb6b8c8fc98c4126c2c2fe72eaa35a7b6c9f6232eefcbd3ba11e5609c219347,2023-11-07T04:04:41.863000 CVE-2023-1710,0,0,c155b486a1ce825fb81080d9a172401b3b0404c7d801e43dd529b57046496d6f,2023-04-12T19:16:09.267000 -CVE-2023-1711,0,1,2f5d97a1ceb3d9f9271b448468502401aadeabcd1a78b59b09d628b87d598160,2024-07-25T15:45:03.690000 +CVE-2023-1711,0,0,2f5d97a1ceb3d9f9271b448468502401aadeabcd1a78b59b09d628b87d598160,2024-07-25T15:45:03.690000 CVE-2023-1712,0,0,92918993d0bdf5edeb136a91e73652f2a279fe85dd3cfb4085264b400f984893,2023-04-05T13:37:27.220000 CVE-2023-1713,0,0,e96305c1a21f1bb528900658f6d91c6bfd2ea7fd111165f45aad85b4f0eea423,2023-11-09T20:37:42.650000 CVE-2023-1714,0,0,d96a18d929eaafcda336752f12112e0531bba0a7b74116cb68dea17eeddf87b0,2023-11-09T20:38:00.327000 @@ -223461,7 +223461,7 @@ CVE-2023-31412,0,0,c222bd11456f18e62aef7e3454f47776f6d36c7af1e68f5fcad10d5def1a6 CVE-2023-31413,0,0,0cc8624a68339ce38f38d7fbbd7f26f96523fdb324f20fe50f0ba974c7dbb12c,2023-05-11T13:56:23.657000 CVE-2023-31414,0,0,28d414d378160e499950ea6993f392d7c6fbd1446465ba45817e20a264c5b7b2,2023-05-11T13:43:42.117000 CVE-2023-31415,0,0,2b477b311ffb53cf567766f234a3b9b2a6f72427c47f432baba60ea8caa16db1,2023-05-11T13:38:07.060000 -CVE-2023-31416,0,1,c527d5c88b4288f57349f4e7665d978a9e5a6ef1be1457f29ad929a35eeedeaa,2024-07-25T14:21:30.457000 +CVE-2023-31416,0,0,c527d5c88b4288f57349f4e7665d978a9e5a6ef1be1457f29ad929a35eeedeaa,2024-07-25T14:21:30.457000 CVE-2023-31417,0,0,4d6db88f8a30dbf9b9dc91d7a56a466226e8c02902279ba56177303d2ad47677,2024-01-03T19:02:34.430000 CVE-2023-31418,0,0,2c9cd98e6609b770c9a4c4d9a8d3db88029e2951bc2134fd0947f56eafbbd095,2023-11-30T22:15:07.810000 CVE-2023-31419,0,0,1d843126a6f04e6d9e9d7dca179079d1db9434f05deae31bef420109476bc8b0,2024-02-01T02:16:30.827000 @@ -242074,7 +242074,7 @@ CVE-2024-1390,0,0,f2a25975c3042e30a42c5fcd19f4c398992a4b35179f84e0b51a1c441a4e4d CVE-2024-1391,0,0,50e2fbe1cc7d386fd26fed3bf083598946d64d5314a6236ebb9200766cf4f837,2024-03-13T18:15:58.530000 CVE-2024-1392,0,0,8db7abe472b85e00e4ae726e30591de82c7d16f05d2f6d5459004c50d152a5c0,2024-03-13T18:15:58.530000 CVE-2024-1393,0,0,4f5797aa4dbf368118dda7b12f73418a8cf88d40cd13e8c8978941ce6c41ad41,2024-03-13T18:15:58.530000 -CVE-2024-1394,0,0,2cca7b7e5b4353a646f6d26371296c26120a2f83d3de05d4698053b1109151f4,2024-07-23T22:15:05.363000 +CVE-2024-1394,0,1,3ad98461de2bde3a6ed0e6bea10034833203f18d18a912e4ec6ba17c366fe2a6,2024-07-25T16:15:03.637000 CVE-2024-1395,0,0,9f5cead23576320934b06ae7650426cd28c58ea3927d599eb3ccbebbf15a3072,2024-07-03T01:45:14.570000 CVE-2024-1396,0,0,0697e623a8579806097bf49373d31640770e9cf97f78e16b0038cfa8bc55a349,2024-05-02T18:00:37.360000 CVE-2024-1397,0,0,8da6b20072e696017f2fea6d653b85b1ce227e84921025d1f452d353bbc1383a,2024-03-13T12:33:51.697000 @@ -244323,7 +244323,7 @@ CVE-2024-22440,0,0,3d70b2afb8c1daefa939392497f652da82a7db6224ab8e08ddbf5f360293d CVE-2024-22441,0,0,d974db705829cf05b22e157df217440dd5d74842713d9bc45c9eb02f022d665b,2024-06-13T18:35:19.777000 CVE-2024-22442,0,0,6cd8943b606f82f9805c763a4b9ec31735cf88cf76efca2ccc718cdf40618170,2024-07-16T18:00:02.110000 CVE-2024-22443,0,0,c52632f4bcdeeb28d6bc6d5cd24263b0884e03dc4419b129318aba75fed40931,2024-07-24T17:12:32.367000 -CVE-2024-22444,0,0,45372a2223b95716cffc76bfc8a6d86ecfe275858c4bb765e202a696dfd6a002,2024-07-24T17:12:32.367000 +CVE-2024-22444,0,1,3825beb25185b939e72fc391292cfe01dac514d92713490d6fa45c5808dc7620,2024-07-25T17:46:52.627000 CVE-2024-22445,0,0,a6af5c7306e37f1c831f19f1accec343bae2ff2fdb348ced0577263d09a6b8e1,2024-02-27T16:51:44.013000 CVE-2024-22448,0,0,8e90df505cef41effc57c679101495cb231edb0790ae704dce635c915090456b,2024-04-10T13:23:38.787000 CVE-2024-22449,0,0,f33d4db580b05ecc377b9d7d6de8d5383f1a67c4e1bbff2a1ad282c40aa707a2,2024-02-03T00:30:30.737000 @@ -247456,7 +247456,7 @@ CVE-2024-27133,0,0,6574fdde089b4683da8bd06069d4a01e27d182b9361898f9a2a8686337a25 CVE-2024-27135,0,0,8f681cbd0423d5edcf1af419653a19c055e013668588c5e21fc1acd9f7af97d0,2024-05-01T17:15:30.087000 CVE-2024-27136,0,0,95371c097b782a9c3eb2e668bc7e52a3add3a0ca964de3d4fb22468a7d6fe516,2024-06-24T12:57:36.513000 CVE-2024-27138,0,0,1836c82669ad670bb3a94b818c7a2afb34e113da91f7a642ffc52f477f7ea951,2024-05-17T02:37:25.107000 -CVE-2024-27139,0,1,267f11a24a2cf4f0bced9e1704e452b13a7e03a87c492c5fc6b862090589e559,2024-07-25T15:15:10.693000 +CVE-2024-27139,0,0,267f11a24a2cf4f0bced9e1704e452b13a7e03a87c492c5fc6b862090589e559,2024-07-25T15:15:10.693000 CVE-2024-2714,0,0,fd707009e35b2adf97d47fd45e1287d327a5720e922cfb5f98c6896a9e8b6097,2024-05-17T02:38:26.850000 CVE-2024-27140,0,0,2b44ee1fb3d2df9684d9b09c30157caf9db44c6920a8d62ef396ce86eca01036,2024-05-17T02:37:25.260000 CVE-2024-27141,0,0,057b70aa4d3ef54e41334849d6465eb42f0fa3aefe9d620f030d33f3f65261da,2024-07-04T05:15:11.080000 @@ -247979,7 +247979,7 @@ CVE-2024-27900,0,0,43289950d0e6981ed8d43d7e3ee8bfbab5814f24d4206124d8ed280e39060 CVE-2024-27901,0,0,7b06fae9467006c18ceee57d1cb054462f92404e00919c92c5179777cfbbb010,2024-04-09T12:48:04.090000 CVE-2024-27902,0,0,cf303beda4f8d4d9a07f999c75e97958c265bcde9b8d48f8f915bd30d541f272,2024-03-12T12:40:13.500000 CVE-2024-27903,0,0,7a16b56caf0aadbdfc143727319a91c26c6417220b554521d1e591b4babb7dec,2024-07-11T14:46:26.300000 -CVE-2024-27905,0,0,19f0a59e8f761065289fc658ee0e52bc4a2463e47ffe4f9e0b2de0e6ae5efe76,2024-05-17T02:37:34.130000 +CVE-2024-27905,0,1,004207f94be0d80b2638fe4e9db3dad65e602a5212d2e74a69049b205b4fa9ba,2024-07-25T16:15:04.310000 CVE-2024-27906,0,0,97db0744843f13fb0cf1d6631e7648c6ea2ed51ac2b3c967607a8165c8586d2c,2024-02-29T13:49:29.390000 CVE-2024-27907,0,0,665becf063e38021c77d8567eafb4cfde9012aa9e5f2ff52b45354cada16677a,2024-03-12T12:40:13.500000 CVE-2024-27908,0,0,3241ca39ccff4fff26d10715dd0c806c47f3e26d7e3304c90e96bb32bb0598ea,2024-04-08T18:49:25.863000 @@ -250689,7 +250689,7 @@ CVE-2024-31965,0,0,c4b61ad2f9eef097e0954fa70290fdb78da64c708fb57d0eafd0380254742 CVE-2024-31966,0,0,e813fbcff3c742b22ff3620e22028114e0bd0dc18f84922743926ac1c55086d9,2024-07-03T01:55:39.753000 CVE-2024-31967,0,0,d11e85355b08311754a29e0c672ae95e7ac529a4f49e30497f6cb09093fb91b0,2024-07-03T01:55:40.527000 CVE-2024-3197,0,0,324c7a8dc9ccea612ec0432519a90414016d01b55429c0b6dc09fc2cc5af230b,2024-05-02T18:00:37.360000 -CVE-2024-31970,0,0,21aa8e8f2683c724f57644618668a330affa2842772381a1886887917836573a,2024-07-24T17:12:32.367000 +CVE-2024-31970,0,1,6dfe320b6c7685f7f66ae6d28a5499869f91f51c0a0ddcd2aff7031a565e585d,2024-07-25T17:46:25.310000 CVE-2024-31971,0,0,c01103c7a27f61a563b001c647885d07de844f2c03f92bb191e43610aaea5763,2024-07-24T17:12:32.367000 CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000 CVE-2024-31977,0,0,2e845dd8e2dbf0b94e2238c6740554d5934910b7cebbf8cf7289ad0332368bf6,2024-07-24T17:12:32.367000 @@ -253391,7 +253391,7 @@ CVE-2024-36108,0,0,96ea3864aa7aa12cb825aeb4159e54115a96c7432f3275236d52e71204991 CVE-2024-36109,0,0,3ea71255d409bd15051cdf17f3774b2fb655bff5470c764338e3b2b25934fec8,2024-05-29T13:02:09.280000 CVE-2024-3611,0,0,b6dd7cd7d7815f4cbb48b9149fec55f286cfb6042c7393dd23d868b1e93589f9,2024-05-22T12:46:53.887000 CVE-2024-36110,0,0,ae199b3fa22fadc918d8c236ca5c5c8f2be6b34351afd72d5f50bac8a0f84267,2024-05-29T13:02:09.280000 -CVE-2024-36111,1,1,15856eff599297894421df92310438cb921809d56a7ead804c7def387a582b25,2024-07-25T14:15:12.650000 +CVE-2024-36111,0,0,15856eff599297894421df92310438cb921809d56a7ead804c7def387a582b25,2024-07-25T14:15:12.650000 CVE-2024-36112,0,0,3d827ea0c3eaea362d7174c518f3ef1a48183f26c82b6430e889bcf33729a066,2024-05-29T13:02:09.280000 CVE-2024-36113,0,0,6bc43c60be61560011c5a869d0c4f6c363c6e119fc51a9d716fe375c402baa23,2024-07-05T12:55:51.367000 CVE-2024-36114,0,0,5e400f6e1accfe4ee34afe11a2ba03b10596fa4481251b5d420288b4320d1b3a,2024-05-30T13:15:41.297000 @@ -253684,7 +253684,8 @@ CVE-2024-36538,0,0,aac4f9929cddecc0784b98831a4a3c3b2e94512ba7cc3c149bdb1ef3488e9 CVE-2024-36539,0,0,fd8e06c5a4aafc35fe5ea218ed9e25a0b2fb207d6af8477fc6df401a6d78debf,2024-07-25T12:36:39.947000 CVE-2024-3654,0,0,a7708e7e436d988a91abde36ee9f26c2df705dde9b78c457b8712b905cf4dc6a,2024-04-19T16:19:49.043000 CVE-2024-36540,0,0,6eeb37da95be9363691e64f704f0832366ea0b62d194e2d6102f1975a215f8e9,2024-07-25T12:36:39.947000 -CVE-2024-36541,0,0,6a8a7f7727809c1260cd3b5c8c832484186631ab30a12c54c0721ce5292077c7,2024-07-24T17:12:32.367000 +CVE-2024-36541,0,1,4e1f62504c42e12434d71fc6d5ccb4805e081fdcc1882a1ff77952e2c03095f1,2024-07-25T17:44:25.170000 +CVE-2024-36542,1,1,21c32d058cd29ec4bb366408a307fea450d1ca65a702a91fe723835dae3d16d6,2024-07-25T17:15:10.710000 CVE-2024-36543,0,0,dbb1c819537d5d2e6ccb57b6fa0d1307530721c713dab080cb8c7f78417a5f63,2024-07-03T02:03:16.430000 CVE-2024-36547,0,0,63fa93ba07106c565a1033909cd3b8147be168386a42b3286a8bfe46cc4ab092,2024-06-06T15:16:11.897000 CVE-2024-36548,0,0,aff0414515c8e648334d6ef2a1bf413e6b70804d4ac2887710c25a232cc52bfc,2024-06-06T15:24:02.577000 @@ -254205,7 +254206,7 @@ CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcf CVE-2024-37388,0,0,3169d306b45a011b46c4d3fe95463302fc94255a3e5bff07d58cd00bed7bba75,2024-06-07T19:24:09.243000 CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000 CVE-2024-3739,0,0,ba8b07349fdcbf4927f1d53be7924c0ba58d0f09900d65fe34757229d7b34b0f,2024-05-17T02:40:06.067000 -CVE-2024-37391,0,1,150400ee309f1fb57b79e17db94532e7f68272dc6319e93487ad1b062271d45e,2024-07-25T15:13:09.723000 +CVE-2024-37391,0,0,150400ee309f1fb57b79e17db94532e7f68272dc6319e93487ad1b062271d45e,2024-07-25T15:13:09.723000 CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000 CVE-2024-3740,0,0,cf4cd6bcfe639a4f771a19ddc36f820864da86f0d9d9f91c68694d8633fab251,2024-05-17T02:40:06.170000 CVE-2024-37405,0,0,ff056e1e6b71205230bf39333b4a3618e5032f8631acafb990972570435f5468,2024-07-12T16:34:58.687000 @@ -254234,21 +254235,21 @@ CVE-2024-37437,0,0,83ef1ea78c6e8ed1e0567a248a21cf468b1495feae2ba1cce072befcd9536 CVE-2024-3744,0,0,40b0f0c765c7a4ad7df2de19ce2eb9519fa9c2af93a33399e8c5730df134e208,2024-06-10T16:15:16.980000 CVE-2024-37442,0,0,78875ce6f4ee251957afe776cc270daef543fd5a212b6acf13b07c615995ce9a,2024-07-09T18:19:14.047000 CVE-2024-37445,0,0,9fbba319cef8f463ac85b5dc242e13d4dfb1be19882473540ccb367598d4c0ae,2024-07-22T13:00:31.330000 -CVE-2024-37446,0,1,1c700fcd72ccaacb11c87eb1bade8d322d02aa58b87826f2e4b6fe02da4c6bd0,2024-07-25T15:49:38.057000 -CVE-2024-37447,0,1,f10e9afe37ccb297979ef745150f8f06fb020e18b5d41aa2bacde586c100172c,2024-07-25T15:49:15.190000 -CVE-2024-37449,0,1,9ade33135d3f6ca7bee3f73339a7862f6048411651fc6c5c343f59025cd80bb0,2024-07-25T15:48:38.073000 +CVE-2024-37446,0,0,1c700fcd72ccaacb11c87eb1bade8d322d02aa58b87826f2e4b6fe02da4c6bd0,2024-07-25T15:49:38.057000 +CVE-2024-37447,0,0,f10e9afe37ccb297979ef745150f8f06fb020e18b5d41aa2bacde586c100172c,2024-07-25T15:49:15.190000 +CVE-2024-37449,0,0,9ade33135d3f6ca7bee3f73339a7862f6048411651fc6c5c343f59025cd80bb0,2024-07-25T15:48:38.073000 CVE-2024-3745,0,0,6c9edfff9e79c22a28b880b426148983da8f8a5db27e4bfd2a1dfcfd3cb4de8f,2024-05-20T13:00:34.807000 CVE-2024-37454,0,0,5dd61dd0d84c4b3f5941735c6171883bab82a8d9b454b6d1ba19ff534234505c,2024-07-09T18:19:14.047000 CVE-2024-37455,0,0,57b2f9feca4098778a62954cb394ad6294cd222d3c3a0a03ec9db535b59c5042,2024-07-09T18:19:14.047000 -CVE-2024-37457,0,1,006d76ca2f7945a4e0f15c9687c3bbaa281863365a376188dfa2e9189c67a677,2024-07-25T15:47:55.217000 -CVE-2024-37459,0,1,cbe90287ef2be027d1aa251600e674d79c2f79c2676eb4ad36f7ef9d7b69050d,2024-07-25T15:53:49.883000 +CVE-2024-37457,0,0,006d76ca2f7945a4e0f15c9687c3bbaa281863365a376188dfa2e9189c67a677,2024-07-25T15:47:55.217000 +CVE-2024-37459,0,0,cbe90287ef2be027d1aa251600e674d79c2f79c2676eb4ad36f7ef9d7b69050d,2024-07-25T15:53:49.883000 CVE-2024-3746,0,0,b404a3f5af28975fb4e5d0eb577c67fe9710274ad0c55beaeeb6ef81bbf0e35b,2024-07-03T02:06:31.490000 -CVE-2024-37460,0,1,02e09703912f0037e6a7b662748ea365f6bf750e1f1d9f187949e93a57c95d4d,2024-07-25T15:53:23.317000 -CVE-2024-37461,0,1,ded408d38861fcbe6b63893f573a02e34c5f7c2b0c402d651fb6d6421f9f6ea7,2024-07-25T15:52:32.877000 +CVE-2024-37460,0,0,02e09703912f0037e6a7b662748ea365f6bf750e1f1d9f187949e93a57c95d4d,2024-07-25T15:53:23.317000 +CVE-2024-37461,0,0,ded408d38861fcbe6b63893f573a02e34c5f7c2b0c402d651fb6d6421f9f6ea7,2024-07-25T15:52:32.877000 CVE-2024-37462,0,0,44cdd4da08aa3278c309c9b230a9ebcb29a8195fe20831e74a9775071dc13635,2024-07-09T18:19:14.047000 CVE-2024-37464,0,0,d5dd0cd8721de83e6db957b2a4c4526c848f707b5f4204dfeac1e6b719416e1f,2024-07-09T18:19:14.047000 -CVE-2024-37465,0,1,b54ac5c991ae137e4db857985d832ab77f2e3f11dd17ec4350b94108ecaf4a17,2024-07-25T15:52:09.033000 -CVE-2024-37466,0,1,bfd79fbf2cc8fe5f4b671c7b28aed23901ff778f5b74f12d79e3146f6452b737,2024-07-25T15:51:50.863000 +CVE-2024-37465,0,0,b54ac5c991ae137e4db857985d832ab77f2e3f11dd17ec4350b94108ecaf4a17,2024-07-25T15:52:09.033000 +CVE-2024-37466,0,0,bfd79fbf2cc8fe5f4b671c7b28aed23901ff778f5b74f12d79e3146f6452b737,2024-07-25T15:51:50.863000 CVE-2024-3747,0,0,3219ce820822d72e46103b803901087d25784fb8e92da6509df83502f94f1ce3,2024-05-02T18:00:37.360000 CVE-2024-37471,0,0,d465bdcae3c1ad0d7280b371addcc2292b7e76a7a90d8614a04cd4784c1cba62,2024-07-19T17:02:31.163000 CVE-2024-37472,0,0,0212378c488764d33b1d17de1bc88a5356a23ba19a78046e8c133cfbba541862,2024-07-19T17:04:42.343000 @@ -254256,9 +254257,9 @@ CVE-2024-37474,0,0,e29b3ccf1312f58f8b90ea5bf768b9e4ab78293e46701b43859d8d72f1b6c CVE-2024-37476,0,0,beaa8c83ba0e39b20623f48990395c389b87f4d82490a453165560bffd5535b0,2024-07-19T16:52:39.713000 CVE-2024-37479,0,0,b47f15244b7d8bdc435b7b058e1a43515a90d9355fb7c5cb51f1025055601a89,2024-07-02T12:09:16.907000 CVE-2024-3748,0,0,130f91484f33c46b6a8a1b827c41c8bedf887e9f91a42beeaa1df38ecf15e978,2024-07-03T02:06:31.737000 -CVE-2024-37480,0,1,e29cc7c72f9882ed3de055148476e2a1c36aa1c43c58b1a0300753d9c3833c44,2024-07-25T15:51:31.297000 +CVE-2024-37480,0,0,e29cc7c72f9882ed3de055148476e2a1c36aa1c43c58b1a0300753d9c3833c44,2024-07-25T15:51:31.297000 CVE-2024-37484,0,0,5aa19fbeade225427f8be4047b53cf5aa423ef4d4466f797804f490d4e5cd642,2024-07-09T18:19:14.047000 -CVE-2024-37485,0,1,a28d87feb836359698fd84c975d93a2c25e461c295a0332494f41ca668e6a305,2024-07-25T15:51:09.387000 +CVE-2024-37485,0,0,a28d87feb836359698fd84c975d93a2c25e461c295a0332494f41ca668e6a305,2024-07-25T15:51:09.387000 CVE-2024-37486,0,0,89762654a3c14df0582a836b68f1756216cde47d535ca51b0f096751def5be44,2024-07-09T18:19:14.047000 CVE-2024-37487,0,0,1881ce5f8305b0a160049398550560b427b2570199b1574d01d760e63580f363,2024-07-22T13:00:31.330000 CVE-2024-37488,0,0,dc81d8a20d2889cd6c9e16ab92017a4087f3c8f6b2925aab93a085263be964af,2024-07-22T13:00:31.330000 @@ -254980,11 +254981,11 @@ CVE-2024-3877,0,0,4a72fb3a60020d6583c10cb3aed384330279f0439794d97578698eb4f04c72 CVE-2024-38773,0,0,3ca9062d9c3ad1444fb23819fc10b8b4f960ba0c81ee3a66e80badf8c4068cc0,2024-07-22T13:00:31.330000 CVE-2024-3878,0,0,5053df083f23b6f337fe4f8fdf53fe0df42d421dbd3425cfd92b488e4629a9db,2024-05-17T02:40:10.087000 CVE-2024-38780,0,0,ae16337cc2f7b6345cfbc91dc7be992225f0e3cd48711d005c1594aad3b12d58,2024-07-15T07:15:14.603000 -CVE-2024-38781,0,1,ad20639ae5229215377edc21882efa4f51ee03e1681dfd2ff9bba433bb35e6ce,2024-07-25T15:50:29.157000 -CVE-2024-38782,0,1,6a0be8e9b82da765a38c168f9379b39fb33153476e0513dd2ae6a8ab51f61d6f,2024-07-25T15:49:56.380000 -CVE-2024-38784,0,1,68643de9ae936963f628fb861e48c54d8865838667917b2af37f3e4b54727ab7,2024-07-25T15:55:31.213000 -CVE-2024-38785,0,1,1449b2ac862365f3baee2eb77470d4db33740002d25748517f05870fff11903e,2024-07-25T15:54:37.577000 -CVE-2024-38786,0,1,23327703659ded3b4e2e8a097a9d1da3633ff8f92d32364fd6984503c0102bb5,2024-07-25T15:54:12.073000 +CVE-2024-38781,0,0,ad20639ae5229215377edc21882efa4f51ee03e1681dfd2ff9bba433bb35e6ce,2024-07-25T15:50:29.157000 +CVE-2024-38782,0,0,6a0be8e9b82da765a38c168f9379b39fb33153476e0513dd2ae6a8ab51f61d6f,2024-07-25T15:49:56.380000 +CVE-2024-38784,0,0,68643de9ae936963f628fb861e48c54d8865838667917b2af37f3e4b54727ab7,2024-07-25T15:55:31.213000 +CVE-2024-38785,0,0,1449b2ac862365f3baee2eb77470d4db33740002d25748517f05870fff11903e,2024-07-25T15:54:37.577000 +CVE-2024-38786,0,0,23327703659ded3b4e2e8a097a9d1da3633ff8f92d32364fd6984503c0102bb5,2024-07-25T15:54:12.073000 CVE-2024-38788,0,0,b52c12b32244698424e5fd11bba953af5e3d345221d6e773f6cccb6022a2f647,2024-07-22T14:15:06.010000 CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000 CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26 @@ -255172,7 +255173,7 @@ CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000 CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000 CVE-2024-39340,0,0,8a19ea0d82baf517391d74de09fe55b24d4bbbe3d357c771c961dd3f6f9df19c,2024-07-15T22:15:02.910000 -CVE-2024-39345,0,0,2a86733888b892cf1f1a4162d3ac0a53217089ddee2bfb34560fb358e3388c2b,2024-07-24T17:12:32.367000 +CVE-2024-39345,0,1,6d2feb8f234ad516a0965e57f9549c5ee9e4635cabbb685a0e5a1bb100077b9b,2024-07-25T17:48:18.550000 CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000 CVE-2024-39348,0,0,798f996b4382b8a6e782460918b5005c42ce376a9b87c3209ffaa4789fe2c24c,2024-06-28T10:27:00.920000 CVE-2024-39349,0,0,d94bdd4e2f366e0736711898b6f6670e30f7a98126cdfe514679d42f61eff674,2024-06-28T10:27:00.920000 @@ -255492,7 +255493,7 @@ CVE-2024-40039,0,0,e210b5ff95f4cbe50930111bbfa1727a53319595db825c61fbcbca8d251a4 CVE-2024-4005,0,0,980f25dcabac4666d2a5ebf5d973009bd7c7226dd4f2e01aee26b530adf5da1a,2024-06-17T12:42:04.623000 CVE-2024-40051,0,0,75fd7f2906c40209756954dd66b5f5cee33a2db6630cc09e906c96ebd33a611b,2024-07-24T12:55:13.223000 CVE-2024-4006,0,0,94faf2d168fb54b3d152844d072ec60ae7893cacd318e45ba2a9ad56b250c9d0,2024-04-25T17:25:05.903000 -CVE-2024-40060,0,0,85f874f5d021af4dd22e5ffaf10dbd36a63e3c57527b1715c493b27582208cca,2024-07-24T12:55:13.223000 +CVE-2024-40060,0,1,7504692f17154526fcbd6b507446e89a200da94eac67d79678218fa628e27433,2024-07-25T17:49:00.047000 CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000 CVE-2024-40075,0,0,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43b0c,2024-07-24T12:55:13.223000 CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000 @@ -255549,10 +255550,10 @@ CVE-2024-40416,0,0,86aaef45b4dd45872bf5a38395b95958dd718e8a7700ea1c997426e37f7c7 CVE-2024-40417,0,0,298c0304c38ce2a49f170de68fce3e8c26e10c42ce4acaa74e6360f44eab21ad,2024-07-11T13:05:54.930000 CVE-2024-4042,0,0,96d4041426aa53c8eaed5efb2fa5542195ac0f31740a6b227c0436d63b09d34b,2024-07-18T16:07:41.967000 CVE-2024-40420,0,0,6e460149a3e6ef0d0e6e77ad5f5ac9ffef80b9a3e82ab52e80f4b03f5aaffd87,2024-07-18T12:28:43.707000 -CVE-2024-40422,0,0,4963621ab414826824241c81a39d448cd61e8f9693236d502f591f85170698f0,2024-07-24T17:12:32.367000 +CVE-2024-40422,0,1,cf7d03c100820abe753547ec333c455e4376586c4e6e08c0c23b86f8b1d272e5,2024-07-25T17:42:19.727000 CVE-2024-40425,0,0,ed5ea69d78e69de5a03f2dea647d2c038f05f8f6ff89f420995c2c0d1881d668,2024-07-17T13:34:20.520000 CVE-2024-4043,0,0,50e67cd87d2761034ee2e0514a61b1574f18a654fe271a8568be1eaa53e96b2e,2024-05-24T01:15:30.977000 -CVE-2024-40430,0,0,7c58e9bc8510ad060f5e444996a825bf66eaf89868c5789197ff059705e42f6d,2024-07-22T13:00:31.330000 +CVE-2024-40430,0,1,a04c0932360e0a6689683af18ba685f481546b7626dfc387e8fcb5f7f41626b2,2024-07-25T17:07:13.977000 CVE-2024-4044,0,0,e5bbe7519a57f32e10b3da751a3cb9112f45a7270ca309aa6997e34b1ffc6b95,2024-05-14T16:11:39.510000 CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b53,2024-05-28T12:39:42.673000 CVE-2024-40455,0,0,31e25278556a7a569f6d48ca8afce7491b76507f09027ad01ea2eacbbf9dde95,2024-07-17T13:34:20.520000 @@ -255593,7 +255594,7 @@ CVE-2024-40555,0,0,44ce04ab9d418b7756770fd44203b58128b20e8dfc6428e77d2706cc77d9f CVE-2024-4056,0,0,b8d993c32e0d1df4fc3c3b0df01e5b9a4366d92d1a2ad184a020d404aa44587a,2024-04-26T12:58:17.720000 CVE-2024-40560,0,0,885c8c46bcc9d242b11ff00568640d31e8526b7b94eab8b6f84ddb49fcdedf5c,2024-07-16T13:43:58.773000 CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000 -CVE-2024-40575,0,0,8361a854071c7d69cd1a3e473058d545702b5888d2814bf11b25808d1337e143,2024-07-24T17:12:32.367000 +CVE-2024-40575,0,1,a7c71d92efeafdadf78f6684eb12613d96e4b0b97e9613cb09ab480f64d564b0,2024-07-25T17:35:28.913000 CVE-2024-4058,0,0,e20d454336ea887bbb54d47433e5560889db558189699560ce98773941e9b99e,2024-06-07T15:40:49.707000 CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000 CVE-2024-40594,0,0,5f8b4e7b3001e206c4db42bfb10b66a5767bd1e5041c1bca9998a882526a992d,2024-07-08T15:49:22.437000 @@ -255668,7 +255669,7 @@ CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b98 CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 CVE-2024-4076,0,0,e0e2b007c1440dbf9672681a5eff521aa004949693c7d660a7d1e4ee3ddd4740,2024-07-24T12:55:13.223000 CVE-2024-40764,0,0,31190fa168623fbefe72005739844174b20afc4fdab83062110ac517be35c6d0,2024-07-18T12:28:43.707000 -CVE-2024-40767,0,0,9740acbc39a8ac904449fe819056cf1ca38febd48badc3555fe4572da26d47f5,2024-07-24T12:55:13.223000 +CVE-2024-40767,0,1,01a151f22bd3f1cd8b44f314114a7bbe92f50d1e2d88d2bec8d0eaa4d4f7e2fb,2024-07-25T17:15:10.910000 CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000 CVE-2024-4078,0,0,4f6a573d2d42430a81000704c37318a2f1d7afadf71bcba45d97fec5f925233f,2024-05-16T13:03:05.353000 CVE-2024-4079,0,0,77480512c155cc1ba9c6d21d28dd3b07d5f78d0d04ff147411735ae27b258bce,2024-07-24T12:55:13.223000 @@ -255680,6 +255681,7 @@ CVE-2024-4084,0,0,aed2355093521159d48a9084a5a18f34499717e2daefb72a4c03148c5f7b9d CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000 CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000 CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000 +CVE-2024-40872,1,1,f2809cb57fd2b96503f7a1d210b92f81105355a60a5707cf70672f7e05382fae,2024-07-25T17:15:10.977000 CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000 CVE-2024-40898,0,0,6d797ebcdf9c53e0eade3a2c00a2f7d68b1d101b3405603dd30cc2157b772084,2024-07-18T12:28:43.707000 CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000 @@ -255851,7 +255853,7 @@ CVE-2024-41315,0,0,a68e90aec55f0c153342e794139e84a95b20ef3a1a126ec70584092245e39 CVE-2024-41316,0,0,c9274bb79d4ba765ad537ccc2706ac76777f5e15d362d310fbcad6af2fafb632,2024-07-24T12:55:13.223000 CVE-2024-41317,0,0,5f2fa7a3fdee051d8d33c14a57cfa0a14785eb3306635111cfe4d986a4c4b209,2024-07-24T12:55:13.223000 CVE-2024-41318,0,0,43716bdb586662299e765abf70504c39aeb4e8f84836a086e46d45893e9363c9,2024-07-24T12:55:13.223000 -CVE-2024-41319,0,0,9ed7dbbc6270be6f827714a032ea704fb49466783bc5f7a869b9586ff0a3bf38,2024-07-24T12:55:13.223000 +CVE-2024-41319,0,1,bfb437b42963b0793282d02b7344fad2f16d4a046fba71ec7cf9211564769c72,2024-07-25T17:49:23.857000 CVE-2024-41320,0,0,c5a875fc50e40098ff2c260c87b7011f6622e714e9083a176560d9c8c9a46cbe,2024-07-24T12:55:13.223000 CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000 CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000 @@ -255915,12 +255917,12 @@ CVE-2024-41672,0,0,c445ad7d826ddcac22902530a2e686289f099e89069390baf727ebdc437f2 CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000 CVE-2024-4169,0,0,c62ff626929882f5d2c6f5c5b02ad92c379b5b400e34f72b774f8d063efba0f1,2024-06-04T19:20:31.780000 CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975dc,2024-06-04T19:20:31.883000 -CVE-2024-41703,0,0,1c3b299376ef5ce17a21e7b5646c9d050d5b45bd92d1e35dddd90617bf6ddc38,2024-07-22T13:00:31.330000 -CVE-2024-41704,0,0,0be617904c777d7b9dc53e786f05db778e1c4b756b7b2091d648829174b58747,2024-07-22T13:00:31.330000 +CVE-2024-41703,0,1,a85362978996c7d236f30e97fa16c337a7f9d6be679ddc12fca950c1a606cca0,2024-07-25T16:55:48.747000 +CVE-2024-41704,0,1,da6c19dec91a04b61d02ede6a13562fab5099a10133c7133c2bc4c7b7733b093,2024-07-25T16:55:24.307000 CVE-2024-41705,0,0,7ad36214246d3505f47341eca353a6e89a57c7421606f46a575e2c200ebd5197,2024-07-25T12:36:39.947000 CVE-2024-41706,0,0,c54f7449081e3b2cf2e3ab43d5a7b590b18453d449b7c4962e22d19102850392,2024-07-25T12:36:39.947000 CVE-2024-41707,0,0,24329663dd76ae1f72f3cfdd54c53a72b691e0b10ff003de1c551fa68a8194c1,2024-07-25T12:36:39.947000 -CVE-2024-41709,0,1,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e93b,2024-07-25T15:22:06.140000 +CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e93b,2024-07-25T15:22:06.140000 CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000 CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000 CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000 @@ -255929,7 +255931,9 @@ CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000 CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000 CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000 -CVE-2024-41806,1,1,fada7d53e3e2199f0b078a325bbd8761b8dad871eaa56e934d7ea42fe2265469,2024-07-25T15:15:11.210000 +CVE-2024-41800,1,1,c9aa70b9eaf587ef09690849cfa26ea13534efc3690d1375ef8b5e938dedeaa9,2024-07-25T17:15:11.203000 +CVE-2024-41801,1,1,f2a624c3a8302c960ea86b1d706f87c6e20f746155fba94a3068e7373f371bea,2024-07-25T17:15:11.423000 +CVE-2024-41806,0,0,fada7d53e3e2199f0b078a325bbd8761b8dad871eaa56e934d7ea42fe2265469,2024-07-25T15:15:11.210000 CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000 CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000 CVE-2024-41824,0,0,47989ccb6404b62a8cb0e5c16e1a456b7d013ad0bd3667ac206b0f700dc33163,2024-07-24T12:55:13.223000 @@ -255945,7 +255949,7 @@ CVE-2024-4185,0,0,2ebb1e96affd30f65338d1aa453a686ffeaefddcc6c26d6c3c25de17e937fc CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000 CVE-2024-41880,0,0,2045bc24fb104b692bbe32c5951eb01a25f3639f665062ea76ff47318e893861,2024-07-24T12:55:13.223000 CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000 -CVE-2024-41914,0,0,7ab23e43d61c969fead285fe596044f42ea4738f0bf39e697d71d27eaf24f8c6,2024-07-24T17:12:32.367000 +CVE-2024-41914,0,1,d5808dc00627495b7b5faa405c959ea318155a77c9ee4ab8151b4c57b16430b7,2024-07-25T17:47:35.247000 CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a121626318970662c,2024-05-01T13:02:20.750000 CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000 CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000 @@ -256647,7 +256651,7 @@ CVE-2024-5000,0,0,78aa4b3aa9bab8131501fa8740489ecb0fe42637a1055cb7cfa2d7935a7c9e CVE-2024-5001,0,0,d13fccabd833b06301db98a96a793d9305ac650b09885bcad3ab7a5e90e7be86,2024-07-23T20:32:50.207000 CVE-2024-5002,0,0,f7860d79f0c4960d9f9f9b184eddce2d975db46219a58cb625ab73e627c58cc7,2024-07-15T13:00:34.853000 CVE-2024-5003,0,0,657f01af6ae4ffebd5508957e0a4ee664437c9c42d64fc0c4eaff54aefed6593,2024-07-18T16:18:33.020000 -CVE-2024-5004,0,1,8ad61405010c77384afe101cfdad8fb69bea7d143ef0303370d5103f820274bf,2024-07-25T15:21:18.437000 +CVE-2024-5004,0,0,8ad61405010c77384afe101cfdad8fb69bea7d143ef0303370d5103f820274bf,2024-07-25T15:21:18.437000 CVE-2024-5006,0,0,275a7db4a7750ed7acf4e95109b09b599d0f03c3ae61db2773b61bbc80a38eed,2024-06-11T17:36:24 CVE-2024-5008,0,0,f3aaf1b56a85696455021e99c44b023e10f5e30320f1c5f1ff29548a21b19bae,2024-06-26T12:44:29.693000 CVE-2024-5009,0,0,e5007830320ec10d10aee0ad37c5a929e2247f2929e9cd3c875dca917cc302ee,2024-06-26T12:44:29.693000 @@ -257092,7 +257096,7 @@ CVE-2024-5523,0,0,d7a88b58421b5d1ae546562c97be2066f98eb204a278a9729ed09f63f682e1 CVE-2024-5524,0,0,acc6c718843a634b3681eccc60375ca60bf82b8427b94da2351e444fa46af424,2024-05-31T13:01:46.727000 CVE-2024-5525,0,0,02c49ace47b04c4d76443f16f3ee0a6fe51259c43b6dd84bf29c79a7efe72454,2024-05-31T13:01:46.727000 CVE-2024-5526,0,0,60bf48d4ea40ca252e5afebf1dc1ad6e5a4db01756ddf2bd31cc94e151a8720b,2024-06-11T17:25:55.677000 -CVE-2024-5529,0,1,937974f4dc8452080813e8845278bacd700ec1506795ce300b5e02849590121d,2024-07-25T15:21:02.647000 +CVE-2024-5529,0,0,937974f4dc8452080813e8845278bacd700ec1506795ce300b5e02849590121d,2024-07-25T15:21:02.647000 CVE-2024-5530,0,0,c11f1d7738a3ef2fbe260923ece5c37664d50f681ba992e1f901b970619d3d58,2024-06-11T13:54:12.057000 CVE-2024-5531,0,0,6e18bd4c00ec4db4743368aa05b5d810d40ae0d6bb9ac604deef69554fbe362e,2024-06-11T13:54:12.057000 CVE-2024-5533,0,0,9bad1fab6a90d68c007069d0bfcbdd7a7d72da6f38ffeb11140e803bac3bba45,2024-07-05T14:01:37.470000 @@ -257397,7 +257401,7 @@ CVE-2024-5967,0,0,c675e381b6c54a17455bb64c66cffebfea8bdbd8774aa5359fba110937f85e CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360bc1,2024-06-20T12:44:01.637000 CVE-2024-5971,0,0,357987ac7415afbcb31d94ddf79e1610c1e4bcbc7b687b78aa636fbb9a4c84d0,2024-07-09T18:19:14.047000 CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000 -CVE-2024-5973,0,1,2d8084cf190a1aabb2055b961565b9805ce6ba0f851f188224d67d99d834e8cf,2024-07-25T15:18:05.157000 +CVE-2024-5973,0,0,2d8084cf190a1aabb2055b961565b9805ce6ba0f851f188224d67d99d834e8cf,2024-07-25T15:18:05.157000 CVE-2024-5974,0,0,7ccf1724194ada1507df11f624ca32c0386136cdfa7ae25f910321f76e1abc40,2024-07-09T18:19:14.047000 CVE-2024-5976,0,0,0d4a23e2583616de98536e1ad4d7b2a882021b32cad502d23a934bbf343ef666,2024-06-17T12:43:31.090000 CVE-2024-5977,0,0,7de0cc63740102074a24c1686c7837a6d04da6c097ad8d0ab882790d8002a494,2024-07-19T18:27:34.967000 @@ -257585,8 +257589,8 @@ CVE-2024-6238,0,0,e8b3f57765062eca265deb8b1ecf893867ae3e3cc25fdad8633c66082a70ff CVE-2024-6239,0,0,f6fdb4572a4dbbcb94fcc324f5cf8790dec8289d28e940d8e84930cf2b5efdf8,2024-06-24T19:06:27.537000 CVE-2024-6240,0,0,ac0ea1c33037082252bc61d50d67379872fe94c26d657b4cc70544d56df4853f,2024-06-24T19:10:38.983000 CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654dfa,2024-06-24T19:42:44.280000 -CVE-2024-6243,0,1,6cbffb8f311963d638443470ee7cb5675156246eae2716de97eaddf11ed04317,2024-07-25T15:17:26.980000 -CVE-2024-6244,0,1,4cbb950433f554609a829b59a39adf424a1ad2c2835842fe2854036e922c35b5,2024-07-25T15:15:39.890000 +CVE-2024-6243,0,0,6cbffb8f311963d638443470ee7cb5675156246eae2716de97eaddf11ed04317,2024-07-25T15:17:26.980000 +CVE-2024-6244,0,0,4cbb950433f554609a829b59a39adf424a1ad2c2835842fe2854036e922c35b5,2024-07-25T15:15:39.890000 CVE-2024-6250,0,0,65144edeea3f44f34a4643fe614f57e1f379d6c9ac265963a9d3e1dd464fb73c,2024-06-27T19:25:12.067000 CVE-2024-6251,0,0,4ff3c6977b6838552fca6fd96450148c0a810a0b49d59064a41fd5d7df8c3900,2024-06-24T12:57:36.513000 CVE-2024-6252,0,0,f925951499780a86ba894fc39baf0f6088fcb6c4e2787ea242a732a2e35ea460,2024-06-26T19:15:14.383000 @@ -257601,7 +257605,7 @@ CVE-2024-6266,0,0,20534bd9562365f2e6a746e76af397ec0ac4597526b88e144b7ab5fafa0d22 CVE-2024-6267,0,0,693665502396a8f2760ff0a194782c5c48821dd90ed508792042af1972e2adac,2024-06-24T15:15:12.093000 CVE-2024-6268,0,0,e3e35d0049e774331d2151e442525bd992cba867b327c069ba368c32d8bd87bf,2024-06-26T20:15:16.893000 CVE-2024-6269,0,0,5faaf462a19676e34593dd0a0afbe0cb206ebbb8a7e70c532ba34e4117e361f3,2024-06-26T19:15:14.483000 -CVE-2024-6271,0,1,d024c16fd7c4b2b04328abf7d7f44dcfe36c0053b84c0bf959b0b51a37618966,2024-07-25T15:14:33.857000 +CVE-2024-6271,0,0,d024c16fd7c4b2b04328abf7d7f44dcfe36c0053b84c0bf959b0b51a37618966,2024-07-25T15:14:33.857000 CVE-2024-6273,0,0,ee5202b6a0bcfc7a40a266aa2aa86d2d546d7d0a335d210650da452fe4ac0950,2024-06-25T13:15:50.403000 CVE-2024-6274,0,0,5445e5244574eb35dee4d3a86757e63aa764a2dd3baf93da96725400aa49bff7,2024-06-24T12:57:36.513000 CVE-2024-6275,0,0,34263dcde8e1b5222af573d3152e1f6b3c783b399a6e9b4a2a7c05be9cba88fa,2024-06-25T16:15:25.923000 @@ -257750,7 +257754,7 @@ CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b CVE-2024-6527,0,0,4cbacb620d5954abb73dae2b3bfdb2a8824258a4de25ce8e7c75649e12d818a5,2024-07-09T18:19:14.047000 CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bedb0,2024-07-12T16:37:20.283000 CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000 -CVE-2024-6535,0,0,7e920196055804e6beeef53bb75ed2bd3a366087f8b193ad1d13704b3ca01837,2024-07-19T15:00:32.153000 +CVE-2024-6535,0,1,d515bd0c9a2788945f1c070eede854437b7a1c58e6a79916f8d2b46233d5b6de,2024-07-25T16:15:04.583000 CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 CVE-2024-6540,0,0,f13af52637070826766869c9a967d13110a057955f51f107eb0d0f88b4032338,2024-07-16T18:05:37.267000 CVE-2024-6542,0,0,54f8a75473ca23470adff5375410f0163accbe3baf07cee08839e7a197565332,2024-07-22T13:00:31.330000 @@ -257932,16 +257936,17 @@ CVE-2024-6957,0,0,924408b0dedd00d94c0dd53b44e0c61235554bbe440c23c479cd9465cad6df CVE-2024-6958,0,0,38bc6941154d7f4ae960dc04269075821ef23a2404bcdb434a690328e81c021b,2024-07-22T13:00:31.330000 CVE-2024-6960,0,0,087c703c889fa7d7c6f47315c3bfaa50308e86c66936c51203f75a9827a27024,2024-07-22T13:00:31.330000 CVE-2024-6961,0,0,b63f66663957ae448fcfafd25f4f2e14b1e15178a7ff048e7a656d9a7183d474,2024-07-22T13:00:31.330000 -CVE-2024-6962,0,1,b8054e2d59ceccdcd4628c1dbc900d3f0c22ab58e2eaf33700d9d63f648dd237,2024-07-25T15:47:18.363000 -CVE-2024-6963,0,1,9f0caaa27192dd5828a73618f480b0d55e017cc1128d5360802182c76c93fb85,2024-07-25T15:47:02.633000 -CVE-2024-6964,0,1,815859cc57fe1a509677a232142e7af830e9bd80af5bd8fd21b38ac7c8d853ca,2024-07-25T15:46:37.340000 -CVE-2024-6965,0,1,3fcc61d8816494da9c26f25f69a0ed15273dbb039cc70730e1622c80fae9b32d,2024-07-25T15:44:21.740000 -CVE-2024-6966,0,1,9388321e7c13943748e716250ce2e2e1d140f0c0a6a983b8f5a355ecdb57e818,2024-07-25T15:42:54.563000 -CVE-2024-6967,0,1,870b920e0be825c6590c6673bb0d8cf413db8e6c0b55292ec96a766089d15726,2024-07-25T15:42:18.417000 -CVE-2024-6968,0,1,57675d10d151b515d8654e4a2d23336a097aabe29c179fc0cfbb72272365b239,2024-07-25T15:41:38.410000 -CVE-2024-6969,0,1,2345a97b06e5d388bdf778f25c67289987f0f6d0622466c7c196f2cd07649113,2024-07-25T15:38:51.787000 -CVE-2024-6970,0,1,4194a84f3c5724b9bace97395e0f8e6456cd70a8d0cf3d46afccc165b27983cb,2024-07-25T15:36:44.567000 +CVE-2024-6962,0,0,b8054e2d59ceccdcd4628c1dbc900d3f0c22ab58e2eaf33700d9d63f648dd237,2024-07-25T15:47:18.363000 +CVE-2024-6963,0,0,9f0caaa27192dd5828a73618f480b0d55e017cc1128d5360802182c76c93fb85,2024-07-25T15:47:02.633000 +CVE-2024-6964,0,0,815859cc57fe1a509677a232142e7af830e9bd80af5bd8fd21b38ac7c8d853ca,2024-07-25T15:46:37.340000 +CVE-2024-6965,0,0,3fcc61d8816494da9c26f25f69a0ed15273dbb039cc70730e1622c80fae9b32d,2024-07-25T15:44:21.740000 +CVE-2024-6966,0,0,9388321e7c13943748e716250ce2e2e1d140f0c0a6a983b8f5a355ecdb57e818,2024-07-25T15:42:54.563000 +CVE-2024-6967,0,0,870b920e0be825c6590c6673bb0d8cf413db8e6c0b55292ec96a766089d15726,2024-07-25T15:42:18.417000 +CVE-2024-6968,0,0,57675d10d151b515d8654e4a2d23336a097aabe29c179fc0cfbb72272365b239,2024-07-25T15:41:38.410000 +CVE-2024-6969,0,0,2345a97b06e5d388bdf778f25c67289987f0f6d0622466c7c196f2cd07649113,2024-07-25T15:38:51.787000 +CVE-2024-6970,0,0,4194a84f3c5724b9bace97395e0f8e6456cd70a8d0cf3d46afccc165b27983cb,2024-07-25T15:36:44.567000 CVE-2024-6972,0,0,45bfc09a78a937a10b77612392aef83348a218e9546ffde91f758c134440c143,2024-07-25T12:36:39.947000 +CVE-2024-7007,1,1,ebf7c4138bdd4b37ac2230e65cd9afa1735a9ec22cd22a3b65361403556f01cd,2024-07-25T17:15:11.837000 CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000 CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000 CVE-2024-7047,0,0,a8a34e25dd02e2f4bae12fb422d77becb4b340aa4ac90e0b4f1ca7d693febb09,2024-07-25T12:36:39.947000 @@ -257950,9 +257955,10 @@ CVE-2024-7060,0,0,290f41e25897864e5bc7f39b896930a92e0ee9d30e699cee7ddb424244610f CVE-2024-7065,0,0,861ad9f4a94f327ec6cfd0f89d5da23664e863601bc1e4fe87c301d15a9d3692,2024-07-24T12:55:13.223000 CVE-2024-7066,0,0,f0b9597030c216e17a91b9bbd330c3ccd1220fd3a9abefaf98fb6df981dc96f4,2024-07-24T12:55:13.223000 CVE-2024-7067,0,0,cd81f5e59f5ccc969e002fbd0535f928704dbb9e13b2c7b953cab40d6b4980c7,2024-07-24T17:12:32.367000 -CVE-2024-7068,0,0,eb9a728b0e4f24863b90d18d69d6956459c7f7f272d8ea5eb0f258d70cb7d654,2024-07-24T17:12:32.367000 -CVE-2024-7069,0,0,c4ab9f752bac2645a76cae34601a6412cc6a70cc3262d39aa941af9fa7d8f5b8,2024-07-24T17:12:32.367000 -CVE-2024-7079,0,0,af9d3a4629d0dee8d9c1382cf5b8b38f2af1c4359748e6b63c5acce1d7ffd90b,2024-07-24T17:12:32.367000 +CVE-2024-7068,0,1,cac04426a823885bf463d5cf48bd0b19bdd9f06486030fe1d0967c67ee664aca,2024-07-25T17:47:18.717000 +CVE-2024-7069,0,1,78b88a4dfaca203680acecf4b770bf67b674c773d2cef9278ec8b5ea1e8b95a5,2024-07-25T17:33:53.777000 +CVE-2024-7079,0,1,68e61be40519330b32f107a33f12ffbe08d3803318162cc3f95b14c0cf6f3c17,2024-07-25T17:31:23.670000 CVE-2024-7080,0,0,0e8be1f5ff49b98f2e12f041d9740e0c98dcb4e55d2c6eaebafa31aadf939e95,2024-07-25T12:36:39.947000 CVE-2024-7081,0,0,4fe1e74e2e72cdc5207c5caa9565efa26fd09299ada94965c4896e36b361ec5f,2024-07-25T12:36:39.947000 CVE-2024-7091,0,0,e8d0dd8bb435701b961e03b8d58836a663b21eec4a32e53ec9bb349c72e7294b,2024-07-25T12:36:39.947000 +CVE-2024-7101,1,1,e38bfce381af474fe5d83b2a017b3d9cde94994938f5c809ee169a4122de7c78,2024-07-25T16:15:04.720000