Auto-Update: 2024-07-25T18:00:17.578467+00:00

This commit is contained in:
cad-safe-bot 2024-07-25 18:03:14 +00:00
parent efc21f9f5b
commit 1899f3d483
55 changed files with 2510 additions and 539 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-0808",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-04-09T03:29:00.873",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T16:19:34.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2022-05-03",
@ -20,13 +20,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -89,8 +89,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "84079754-7D44-439C-ADFC-C560945B6DF1"
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": true,
@ -99,13 +99,8 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"matchCriteriaId": "B320A104-9037-487E-BC9A-62B4A6B49FD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
}
]
}
@ -115,7 +110,12 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/157616/Microsoft-Windows-NtUserMNDragOver-Local-Privilege-Escalation.html",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0808",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-11510",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-08T17:29:00.630",
"lastModified": "2024-02-27T21:04:17.560",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T16:20:01.487",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-04-23",
@ -304,6 +304,7 @@
"url": "http://packetstormsecurity.com/files/154176/Pulse-Secure-SSL-VPN-8.1R15.1-8.2-8.3-9.0-Arbitrary-File-Disclosure.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
@ -329,6 +330,7 @@
"url": "https://badpackets.net/over-14500-pulse-secure-vpn-endpoints-vulnerable-to-cve-2019-11510/",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -336,6 +338,7 @@
"url": "https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
@ -350,6 +353,7 @@
"url": "https://kb.pulsesecure.net/?atype=sa",
"source": "cve@mitre.org",
"tags": [
"Not Applicable",
"Vendor Advisory"
]
},
@ -357,13 +361,17 @@
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.apache.org/thread.html/ff5fa1837b6bd1b24d18a42faa75e165a4573dbe2d434910c15fd08a%40%3Cuser.guacamole.apache.org%3E",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-1429",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-11-12T19:15:14.770",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T16:32:27.493",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2022-05-03",
@ -159,33 +159,33 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC160B20-3EA0-49A0-A857-4E7A1C2D74E2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A363CE8F-F399-4B6E-9E7D-349792F95DDB"
},
{
"vulnerable": false,
@ -240,7 +240,12 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/155433/Microsoft-Internet-Explorer-Use-After-Free.html",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1429",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-15752",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-28T21:15:10.880",
"lastModified": "2023-11-07T03:05:32.240",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T16:24:56.683",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2022-05-03",
@ -20,13 +20,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -108,20 +108,47 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:geode:1.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8DD32C20-8B17-4197-9943-B8293D1C3BED"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/157404/Docker-Credential-Wincred.exe-Privilege-Escalation.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://medium.com/%40morgan.henry.roman/elevation-of-privilege-in-docker-for-windows-2fd8450b478e",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-15999",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2020-11-03T03:15:14.853",
"lastModified": "2024-02-15T02:00:01.647",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:25:29.553",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -165,6 +165,7 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Broken Link",
"Mailing List",
"Third Party Advisory"
]
@ -204,7 +205,10 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://security.gentoo.org/glsa/202011-12",
@ -222,12 +226,16 @@
},
{
"url": "https://security.gentoo.org/glsa/202401-19",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2021/dsa-4824",
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-16009",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2020-11-03T03:15:15.527",
"lastModified": "2023-11-07T03:18:01.830",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:26:01.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2022-05-03",
@ -190,6 +190,7 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Broken Link",
"Mailing List",
"Third Party Advisory"
]
@ -198,6 +199,7 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Broken Link",
"Mailing List",
"Third Party Advisory"
]
@ -223,16 +225,23 @@
"url": "https://crbug.com/1143772",
"source": "chrome-cve-admin@google.com",
"tags": [
"Permissions Required"
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://security.gentoo.org/glsa/202011-12",
@ -245,6 +254,7 @@
"url": "https://www.debian.org/security/2021/dsa-4824",
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-3569",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2020-09-23T01:15:15.503",
"lastModified": "2023-11-07T03:22:55.700",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:21:08.993",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2022-05-03",
@ -26,20 +26,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
"impactScore": 4.0
},
{
"source": "ykramarz@cisco.com",
@ -120,8 +120,53 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92587AA0-BDB6-4594-8F14-DC2A91FA4CD6"
"criteria": "cpe:2.3:o:cisco:ios_xr:6.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FC06F7E7-D67F-4C91-B545-F7EB62858BA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "370F74EC-829D-4574-BE7D-85700E15C433"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:6.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47F3F8E3-D93B-4BAB-8643-AFBFC36940AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:6.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E67F538A-3E1A-4749-BB8D-4F8043653B6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "86E05C3F-4095-4B9C-8C11-E32567EB14AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B8AE8971-5003-4A39-8173-E17CE9C2523F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "36944A2B-E4F5-41DE-AC4D-55BFA603BE5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5F70AB37-3C0B-40A8-BC37-5A79DA5F45F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8B842317-A5DB-4890-948A-DD26B7AE2540"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "48928FFF-871C-4C07-8352-8C802FAD8F53"
}
]
},
@ -129,31 +174,6 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8E7FFF-82A8-4ECB-BA0C-CBF0C2FDA3A3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87DC4C2F-01C5-4D89-8D79-E5D28EDAD0F2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5E2AE67-DED3-4414-A194-386ADB2C8DC7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3920133A-684D-4A9F-B65A-FF4EAE5052E5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9ED06361-5A68-4656-AEA5-240C290594CD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:*:*",
@ -209,11 +229,6 @@
"criteria": "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7AA58E5-D7E1-48CF-93FF-C60EB85B2BC7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ios_xrv_9000_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703D3DE6-1E69-4A00-91F0-193E5AAFDCF4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ncs_5001:-:*:*:*:*:*:*:*",
@ -282,6 +297,226 @@
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.2",
"matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ncs_5001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A8C028-107B-4410-BCC6-5BCB8DB63603"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ncs_5002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA13FE67-F4AE-46DF-921B-3FB91BDF742B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ncs_5011:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98622F14-CC47-45E0-85E4-A7243309487C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ncs_520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5249FE7A-FAAE-42C4-9250-DF4B2009F420"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ncs_540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7AE6C1-B7C6-4056-9719-B5CFF71970AD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A972EFE-4F7E-4BFC-8631-66A2D16B74A3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ncs_5501:se:*:*:*:*:*:*:*",
"matchCriteriaId": "22FE69B4-DF27-46F1-8037-4B8D1F229C6B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F72AEF0-EE70-40F8-B52B-1390820B87BB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ncs_5502:se:*:*:*:*:*:*:*",
"matchCriteriaId": "603980FE-9865-4A71-A37C-A90B7F3B72D6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43D21B01-A754-474F-8E46-14D733AB307E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17D6424C-972F-459C-B8F7-04FFD9F541BC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ncs_560:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4CC8256-E4F8-4DCB-B69A-40A7C5AA41E8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ncs_6008:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61AF653C-DCD4-4B20-A555-71120F9A5BB9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:6.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FC06F7E7-D67F-4C91-B545-F7EB62858BA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:6.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E67F538A-3E1A-4749-BB8D-4F8043653B6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:6.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4132A8AA-008B-49DA-AA5C-EB39CC65A2E9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B051AF4-592A-4201-9DD3-8683C1847A00"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-1_16-slot_line_card_chassis:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A5D5476-202C-476C-BC43-C0A963C99079"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-1_16-slot_single-shelf_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0F7E3D1-B738-4B69-AB38-3A273F454B9A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-1_4-slot_single-shelf_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2039DB3-F6BA-434D-A395-41DF7B641E4D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-1_8-slot_line_card_chassis:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C078ABAD-0E35-481F-8096-FDD40451A318"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-1_8-slot_single-shelf_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A8B9BF-E548-4CD9-AEC0-7030B89C4A32"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-1_fabric_card_chassis:-:*:*:*:*:*:*:*",
"matchCriteriaId": "941333EC-86D4-43AC-BD9A-D286B2276C95"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-1_line_card_chassis_\\(dual\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD07CEAB-98E4-4FEE-BFA4-ADA520F7A61F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-1_line_card_chassis_\\(multi\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE33AF1E-5E5C-43A1-B2E3-28E823C47E99"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-1_multishelf_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBA0BE4-ED73-4B8C-BE53-5A2AB76981D0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-3_16-slot_single-shelf_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F8EEEF-085A-49A5-A50E-24922B300F75"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-3_4-slot_single-shelf_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10698948-E6E0-4C9B-9CB9-3626E4076336"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-3_8-slot_single-shelf_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40EF0D7E-FB4E-433A-A983-34E44E790542"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-3_multishelf_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15448B60-0A19-477C-A08A-17578CF7C92C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-8\\/s-b_crs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D31F6ED1-B20E-44CA-A74B-9D767EDF045F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-8\\/scrs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDEC7F0-D4D5-45F0-89A4-49C596318C01"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62F5E007-0CB6-424C-9AE8-01618C8C44E0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-x_16-slot_single-shelf_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16770F6C-539D-4B65-9C52-60F008C283D2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs-x_multishelf_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4F47E9F-D7BA-49B9-8070-1BC610B6AE2D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:crs_performance_route_processor:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D383DA-04D7-4789-B7F7-B31FD645BA8F"
}
]
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-5902",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2020-07-01T15:15:15.360",
"lastModified": "2023-11-14T03:15:07.810",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T16:42:50.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2022-05-03",
@ -685,6 +685,7 @@
"url": "http://packetstormsecurity.com/files/158333/BIG-IP-TMUI-Remote-Code-Execution.html",
"source": "f5sirt@f5.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
@ -701,6 +702,7 @@
"url": "http://packetstormsecurity.com/files/158366/F5-BIG-IP-TMUI-Directory-Traversal-File-Upload-Code-Execution.html",
"source": "f5sirt@f5.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
@ -717,13 +719,19 @@
"url": "http://packetstormsecurity.com/files/158581/F5-Big-IP-13.1.3-Build-0.0.6-Local-File-Inclusion.html",
"source": "f5sirt@f5.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://packetstormsecurity.com/files/175671/F5-BIG-IP-TMUI-Directory-Traversal-File-Upload-Code-Execution.html",
"source": "f5sirt@f5.com"
"source": "f5sirt@f5.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://badpackets.net/over-3000-f5-big-ip-endpoints-vulnerable-to-cve-2020-5902/",
@ -737,6 +745,7 @@
"url": "https://github.com/Critical-Start/Team-Ares/tree/master/CVE-2020-5902",
"source": "f5sirt@f5.com",
"tags": [
"Broken Link",
"Exploit",
"Third Party Advisory"
]
@ -752,6 +761,7 @@
"url": "https://swarm.ptsecurity.com/rce-in-f5-big-ip/",
"source": "f5sirt@f5.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-8515",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-02-01T13:15:12.623",
"lastModified": "2023-11-07T03:26:36.773",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T16:40:16.430",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2022-05-03",
@ -187,12 +187,16 @@
"url": "https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html",
"source": "cve@mitre.org",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-%28cve-2020-8515%29/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1497",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2021-05-06T13:15:10.500",
"lastModified": "2023-11-07T03:28:26.200",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:32:35.267",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -90,7 +90,7 @@
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -98,6 +98,16 @@
"value": "CWE-78"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
@ -110,8 +120,16 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:4.0\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4E04A6D2-3FF8-4921-BF2F-4D2A97EBE2E2"
"criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0\\(2e\\)",
"matchCriteriaId": "17BC381C-F6CD-4B90-B4AE-8544966ECCE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.5\\(2a\\)",
"matchCriteriaId": "D125A3BA-3182-4E44-92CB-E46CA2D5292D"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1498",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2021-05-06T13:15:10.537",
"lastModified": "2023-11-07T03:28:26.367",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:33:21.813",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -90,8 +90,18 @@
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,8 +128,8 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndIncluding": "4.5\\(2a\\)",
"matchCriteriaId": "1ED94F5B-C90F-4967-B0B3-04A53240E4C3"
"versionEndExcluding": "4.5\\(2a\\)",
"matchCriteriaId": "D125A3BA-3182-4E44-92CB-E46CA2D5292D"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1732",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:13.930",
"lastModified": "2023-12-29T23:15:26.480",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:53:12.640",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -109,48 +109,48 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A"
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1B570A8-ED1A-46B6-B8AB-064445F8FC4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372"
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DBE5B2-AE10-4251-BCDA-DC5EDEE6EE67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AFD13A6-A390-4400-9029-2F4058CA17E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F"
"criteria": "cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADE7E7B1-64AC-4986-A50B-0918A42C05BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"matchCriteriaId": "C253A63F-03AB-41CB-A03A-B2674DEA98AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82"
"criteria": "cpe:2.3:o:microsoft:windows_server_2004:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62224791-644C-4D1F-AD77-56B16CF27630"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84F9B6B1-4FEE-4D4B-B35F-B07822CCD669"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-20090",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2021-04-29T15:15:10.630",
"lastModified": "2023-10-18T01:15:24.427",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:32:27.007",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -89,9 +89,10 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:buffalo:wsr-2533dhpl2-bk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B03FA14-33E3-44D2-8165-197CB446F2D2"
"vulnerable": true,
"criteria": "cpe:2.3:o:buffalo:wsr-2533dhpl2-bk_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.02",
"matchCriteriaId": "D861729C-023B-4D73-8C4C-BF7E8B0B7045"
}
]
},
@ -100,10 +101,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:buffalo:wsr-2533dhpl2-bk_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.02",
"matchCriteriaId": "D861729C-023B-4D73-8C4C-BF7E8B0B7045"
"vulnerable": false,
"criteria": "cpe:2.3:h:buffalo:wsr-2533dhpl2-bk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B03FA14-33E3-44D2-8165-197CB446F2D2"
}
]
}
@ -117,9 +117,10 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:buffalo:wsr-2533dhp3-bk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AA91D93-E2B9-4415-B541-1968F1F39814"
"vulnerable": true,
"criteria": "cpe:2.3:o:buffalo:wsr-2533dhp3-bk_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.24",
"matchCriteriaId": "63232EC8-B2B8-4867-93DB-C0C5147E2730"
}
]
},
@ -128,10 +129,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:buffalo:wsr-2533dhp3-bk_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.24",
"matchCriteriaId": "63232EC8-B2B8-4867-93DB-C0C5147E2730"
"vulnerable": false,
"criteria": "cpe:2.3:h:buffalo:wsr-2533dhp3-bk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AA91D93-E2B9-4415-B541-1968F1F39814"
}
]
}
@ -149,7 +149,11 @@
},
{
"url": "https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/",
"source": "vulnreport@tenable.com"
"source": "vulnreport@tenable.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2021-13",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21148",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2021-02-09T16:15:12.390",
"lastModified": "2023-11-07T03:29:33.490",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:52:35.147",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -146,8 +146,7 @@
"url": "https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop_4.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes",
"Vendor Advisory"
"Release Notes"
]
},
{
@ -159,11 +158,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7ACWYJ74Z3YN2XH4QMUEGNBC3VXX464L/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUQSMNV7INLDDSD3RKI5S5EAULX2QC7P/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://security.gentoo.org/glsa/202104-08",
@ -176,6 +181,7 @@
"url": "https://www.debian.org/security/2021/dsa-4858",
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21166",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2021-03-09T18:15:16.297",
"lastModified": "2023-11-07T03:29:34.903",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:34:26.050",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -75,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-362"
"value": "NVD-CWE-Other"
}
]
}
@ -143,8 +143,7 @@
"url": "https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes",
"Vendor Advisory"
"Release Notes"
]
},
{
@ -156,15 +155,24 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCIDZ77XUDMB2EBPPWCQXPEIJERDNSNT/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://security.gentoo.org/glsa/202104-08",
@ -177,6 +185,7 @@
"url": "https://www.debian.org/security/2021/dsa-4886",
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21206",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2021-04-26T17:15:08.213",
"lastModified": "2024-02-15T02:00:01.650",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:31:14.790",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -128,28 +128,37 @@
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes",
"Third Party Advisory"
"Release Notes"
]
},
{
"url": "https://crbug.com/1196781",
"source": "chrome-cve-admin@google.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://security.gentoo.org/glsa/202104-08",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21220",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2021-04-26T17:15:08.593",
"lastModified": "2023-12-14T16:15:43.700",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:31:21.870",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -128,40 +128,54 @@
"url": "http://packetstormsecurity.com/files/162437/Google-Chrome-XOR-Typer-Out-Of-Bounds-Access-Remote-Code-Execution.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://packetstormsecurity.com/files/176210/Chrome-V8-JIT-XOR-Arbitrary-Code-Execution.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes",
"Third Party Advisory"
"Release Notes"
]
},
{
"url": "https://crbug.com/1196683",
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://security.gentoo.org/glsa/202104-08",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21224",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2021-04-26T17:15:08.703",
"lastModified": "2023-11-07T03:29:40.187",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:31:25.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -143,28 +143,37 @@
"url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes",
"Third Party Advisory"
"Release Notes"
]
},
{
"url": "https://crbug.com/1195777",
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://security.gentoo.org/glsa/202104-08",
@ -177,6 +186,7 @@
"url": "https://www.debian.org/security/2021/dsa-4906",
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-22502",
"sourceIdentifier": "security@opentext.com",
"published": "2021-02-08T22:15:12.527",
"lastModified": "2023-11-07T03:30:14.610",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:52:31.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -100,19 +100,35 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/162408/Micro-Focus-Operations-Bridge-Reporter-Unauthenticated-Command-Injection.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://softwaresupport.softwaregrp.com/doc/KM03775947",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-153/",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-154/",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-23874",
"sourceIdentifier": "trellixpsirt@trellix.com",
"published": "2021-02-10T11:15:12.943",
"lastModified": "2023-11-07T03:30:55.993",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:53:02.490",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -131,7 +131,10 @@
"references": [
{
"url": "http://service.mcafee.com/FAQDocument.aspx?&id=TS103114",
"source": "trellixpsirt@trellix.com"
"source": "trellixpsirt@trellix.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26411",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-11T16:15:13.863",
"lastModified": "2023-12-29T17:15:59.767",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:29:04.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -46,19 +46,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
@ -104,44 +104,55 @@
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77D197D7-57FB-4898-8C70-B19D5F0D5BE0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1B570A8-ED1A-46B6-B8AB-064445F8FC4C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372"
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DBE5B2-AE10-4251-BCDA-DC5EDEE6EE67"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AFD13A6-A390-4400-9029-2F4058CA17E2"
},
{
"vulnerable": false,
@ -154,61 +165,61 @@
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77D197D7-57FB-4898-8C70-B19D5F0D5BE0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"matchCriteriaId": "D7809F78-8D56-4925-A8F9-4119B973A667"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1B570A8-ED1A-46B6-B8AB-064445F8FC4C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372"
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DBE5B2-AE10-4251-BCDA-DC5EDEE6EE67"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AFD13A6-A390-4400-9029-2F4058CA17E2"
},
{
"vulnerable": false,
@ -251,17 +262,6 @@
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"matchCriteriaId": "D7809F78-8D56-4925-A8F9-4119B973A667"
}
]
}
]
},
@ -273,9 +273,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
}
]
},
@ -284,9 +284,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26857",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-03T00:15:12.167",
"lastModified": "2023-12-29T17:16:01.073",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:53:21.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-04-16",
@ -112,11 +112,61 @@
"criteria": "cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*",
"matchCriteriaId": "3E5EA9AD-1E84-4AB5-A1EF-3B9F2AC84755"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_22:*:*:*:*:*:*",
"matchCriteriaId": "751FD35F-2ECD-4B75-9589-988CC6AD3058"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*",
"matchCriteriaId": "DA166F2A-D83B-4D50-AD0B-668D813E0585"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2013:sp1:*:*:*:*:*:*",
"matchCriteriaId": "0C21F84B-E99C-451D-9EAF-6352FD2B0EAF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_10:*:*:*:*:*:*",
"matchCriteriaId": "63E362CB-CF75-4B7E-A4B1-D6D84AFCBB68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_11:*:*:*:*:*:*",
"matchCriteriaId": "9BE04790-85A2-4078-88CE-1787BC5172E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_12:*:*:*:*:*:*",
"matchCriteriaId": "CCF101BE-27FD-4E2D-A694-C606BD3D1ED7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_13:*:*:*:*:*:*",
"matchCriteriaId": "4DF5BDB5-205D-4B64-A49A-0152AFCF4A13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_14:*:*:*:*:*:*",
"matchCriteriaId": "55284CF7-0D04-4216-83FE-4B1F9CA94207"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_15:*:*:*:*:*:*",
"matchCriteriaId": "CA2CE223-AA49-49E6-AC32-59270EFF55AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_16:*:*:*:*:*:*",
"matchCriteriaId": "4830D6A9-AF74-480C-8F69-8648CD619980"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:*",
"matchCriteriaId": "079E1E3F-FF25-4B0D-AC98-191D6455A014"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:*",
@ -127,6 +177,51 @@
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*",
"matchCriteriaId": "28FCA0E8-7D27-4746-9731-91B834CA3E64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_8:*:*:*:*:*:*",
"matchCriteriaId": "075E907F-AF2F-4C31-86C7-51972BE412A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_9:*:*:*:*:*:*",
"matchCriteriaId": "69AF19DC-3D65-49A8-A85F-511085CDF27B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:-:*:*:*:*:*:*",
"matchCriteriaId": "40D8A6DB-9225-4A3F-AD76-192F6CCCF002"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_1:*:*:*:*:*:*",
"matchCriteriaId": "051DE6C4-7456-4C42-BC51-253208AADB4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_2:*:*:*:*:*:*",
"matchCriteriaId": "EE320413-D2C9-4B28-89BF-361B44A3F0FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_3:*:*:*:*:*:*",
"matchCriteriaId": "104F96DC-E280-4E0A-8586-B043B55888C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_4:*:*:*:*:*:*",
"matchCriteriaId": "73B3B3FE-7E85-4B86-A983-2C410FFEF4B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_5:*:*:*:*:*:*",
"matchCriteriaId": "8A9FB275-7F17-48B2-B528-BE89309D2AF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_6:*:*:*:*:*:*",
"matchCriteriaId": "D4AB3C25-CEA8-4D66-AEE4-953C8B17911A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_7:*:*:*:*:*:*",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26858",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-03T00:15:12.227",
"lastModified": "2023-12-29T17:16:01.327",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:53:33.987",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-04-16",
@ -107,11 +107,66 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*",
"matchCriteriaId": "3E5EA9AD-1E84-4AB5-A1EF-3B9F2AC84755"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_22:*:*:*:*:*:*",
"matchCriteriaId": "751FD35F-2ECD-4B75-9589-988CC6AD3058"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*",
"matchCriteriaId": "DA166F2A-D83B-4D50-AD0B-668D813E0585"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2013:sp1:*:*:*:*:*:*",
"matchCriteriaId": "0C21F84B-E99C-451D-9EAF-6352FD2B0EAF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_10:*:*:*:*:*:*",
"matchCriteriaId": "63E362CB-CF75-4B7E-A4B1-D6D84AFCBB68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_11:*:*:*:*:*:*",
"matchCriteriaId": "9BE04790-85A2-4078-88CE-1787BC5172E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_12:*:*:*:*:*:*",
"matchCriteriaId": "CCF101BE-27FD-4E2D-A694-C606BD3D1ED7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_13:*:*:*:*:*:*",
"matchCriteriaId": "4DF5BDB5-205D-4B64-A49A-0152AFCF4A13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_14:*:*:*:*:*:*",
"matchCriteriaId": "55284CF7-0D04-4216-83FE-4B1F9CA94207"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_15:*:*:*:*:*:*",
"matchCriteriaId": "CA2CE223-AA49-49E6-AC32-59270EFF55AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_16:*:*:*:*:*:*",
"matchCriteriaId": "4830D6A9-AF74-480C-8F69-8648CD619980"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:*",
"matchCriteriaId": "079E1E3F-FF25-4B0D-AC98-191D6455A014"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:*",
@ -122,6 +177,51 @@
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*",
"matchCriteriaId": "28FCA0E8-7D27-4746-9731-91B834CA3E64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_8:*:*:*:*:*:*",
"matchCriteriaId": "075E907F-AF2F-4C31-86C7-51972BE412A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_9:*:*:*:*:*:*",
"matchCriteriaId": "69AF19DC-3D65-49A8-A85F-511085CDF27B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:-:*:*:*:*:*:*",
"matchCriteriaId": "40D8A6DB-9225-4A3F-AD76-192F6CCCF002"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_1:*:*:*:*:*:*",
"matchCriteriaId": "051DE6C4-7456-4C42-BC51-253208AADB4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_2:*:*:*:*:*:*",
"matchCriteriaId": "EE320413-D2C9-4B28-89BF-361B44A3F0FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_3:*:*:*:*:*:*",
"matchCriteriaId": "104F96DC-E280-4E0A-8586-B043B55888C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_4:*:*:*:*:*:*",
"matchCriteriaId": "73B3B3FE-7E85-4B86-A983-2C410FFEF4B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_5:*:*:*:*:*:*",
"matchCriteriaId": "8A9FB275-7F17-48B2-B528-BE89309D2AF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_6:*:*:*:*:*:*",
"matchCriteriaId": "D4AB3C25-CEA8-4D66-AEE4-953C8B17911A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_7:*:*:*:*:*:*",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-27059",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-11T16:15:17.583",
"lastModified": "2023-12-29T17:16:04.247",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:29:45.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -46,8 +46,8 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
@ -55,10 +55,10 @@
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"exploitabilityScore": 0.6,
"impactScore": 5.9
}
],
@ -109,23 +109,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "BB0CF266-A7EE-474A-B3D3-4A7FE33F4C2C"
"criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"matchCriteriaId": "081DE1E3-4622-4C32-8B9C-9AEC1CD20638"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "DC25ACD6-8F48-4534-AF7B-53F0D10C0843"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "24DD7E07-4BB1-4914-9CDE-5A27A9A3920E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*",
"matchCriteriaId": "ADA0E394-3B5E-4C34-955B-EAB645A37518"
"criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"matchCriteriaId": "120690A6-E0A1-4E36-A35A-C87109ECC064"
},
{
"vulnerable": true,
@ -134,13 +124,8 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*",
"matchCriteriaId": "72324216-4EB3-4243-A007-FEF3133C7DF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*",
"matchCriteriaId": "0FBB0E61-7997-4F26-9C07-54912D3F1C10"
"criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
"matchCriteriaId": "E0B3B0BC-C7C6-4687-AD72-DCA29FF9AE3A"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-27065",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-03T00:15:12.307",
"lastModified": "2023-12-29T17:16:04.983",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:34:21.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-04-16",
@ -109,13 +109,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_22:*:*:*:*:*:*",
"matchCriteriaId": "751FD35F-2ECD-4B75-9589-988CC6AD3058"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*",
"matchCriteriaId": "DA166F2A-D83B-4D50-AD0B-668D813E0585"
"criteria": "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_21:*:*:*:*:*:*",
"matchCriteriaId": "B560F8FD-068E-4A16-A37F-A62DCE88FCF2"
},
{
"vulnerable": true,
@ -177,11 +172,6 @@
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_8:*:*:*:*:*:*",
"matchCriteriaId": "075E907F-AF2F-4C31-86C7-51972BE412A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_9:*:*:*:*:*:*",
"matchCriteriaId": "69AF19DC-3D65-49A8-A85F-511085CDF27B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:-:*:*:*:*:*:*",
@ -197,6 +187,11 @@
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_2:*:*:*:*:*:*",
"matchCriteriaId": "EE320413-D2C9-4B28-89BF-361B44A3F0FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_3:*:*:*:*:*:*",
"matchCriteriaId": "104F96DC-E280-4E0A-8586-B043B55888C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_4:*:*:*:*:*:*",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-27085",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-11T16:15:18.677",
"lastModified": "2023-12-29T17:16:07.137",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:30:49.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -46,19 +46,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
@ -121,28 +121,28 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A"
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1B570A8-ED1A-46B6-B8AB-064445F8FC4C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372"
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DBE5B2-AE10-4251-BCDA-DC5EDEE6EE67"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AFD13A6-A390-4400-9029-2F4058CA17E2"
},
{
"vulnerable": false,

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-28663",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-10T15:15:07.557",
"lastModified": "2023-12-13T13:51:52.563",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:33:47.580",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -91,22 +91,22 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r0p0",
"versionEndIncluding": "r28p0",
"matchCriteriaId": "86D3D5C7-EF1B-401B-836C-79FD7C16B5CA"
"versionEndExcluding": "r29p0",
"matchCriteriaId": "D4A585CF-8557-4660-BD0B-EAE94D1BF8A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:midgard_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r4p0",
"versionEndIncluding": "r30p0",
"matchCriteriaId": "C57F0AF0-BB86-41BE-B41F-951FC34878D2"
"versionEndExcluding": "r31p0",
"matchCriteriaId": "6E1FE39A-BD55-4C5F-BBAA-1138340F8329"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r19p0",
"versionEndIncluding": "r28p0",
"matchCriteriaId": "3D901BF7-E72F-4BC7-96DD-FC9D87F3AE8A"
"versionEndExcluding": "r29p0",
"matchCriteriaId": "AA218DCD-3CAF-4A64-BE97-F7E4916D9C6F"
}
]
}
@ -130,7 +130,10 @@
},
{
"url": "https://github.com/lntrx/CVE-2021-28663",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-28664",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-10T15:15:07.590",
"lastModified": "2023-12-13T13:51:52.563",
"vulnStatus": "Modified",
"lastModified": "2024-07-25T17:59:50.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -91,22 +91,22 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r0p0",
"versionEndIncluding": "r28p0",
"matchCriteriaId": "86D3D5C7-EF1B-401B-836C-79FD7C16B5CA"
"versionEndExcluding": "r29p0",
"matchCriteriaId": "D4A585CF-8557-4660-BD0B-EAE94D1BF8A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:midgard_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r8p0",
"versionEndIncluding": "r30p0",
"matchCriteriaId": "36164B50-6A20-4FCD-8382-3B9C9069C9E7"
"versionEndExcluding": "r31p0",
"matchCriteriaId": "914DDE6A-9D92-46E2-BF0E-0E3FC58F6BF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r19p0",
"versionEndIncluding": "r28p0",
"matchCriteriaId": "3D901BF7-E72F-4BC7-96DD-FC9D87F3AE8A"
"versionEndExcluding": "r29p0",
"matchCriteriaId": "AA218DCD-3CAF-4A64-BE97-F7E4916D9C6F"
}
]
}
@ -116,7 +116,10 @@
"references": [
{
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://developer.arm.com/support/arm-security-updates",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1394",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-21T13:00:08.037",
"lastModified": "2024-07-23T22:15:05.363",
"lastModified": "2024-07-25T16:15:03.637",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -176,6 +176,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:4672",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4699",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4761",
"source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22444",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-07-24T16:15:06.220",
"lastModified": "2024-07-24T17:12:32.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T17:46:52.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -13,6 +13,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-alert@hpe.com",
"type": "Secondary",
@ -35,10 +55,65 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.1.0",
"versionEndIncluding": "9.1.9",
"matchCriteriaId": "F7DAAFB4-149A-4CF2-96E3-34CF185ECE12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.2.0",
"versionEndIncluding": "9.2.9",
"matchCriteriaId": "E20B1C8F-4068-4B88-9819-3913A2A2AB7F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.3.0",
"versionEndExcluding": "9.3.3",
"matchCriteriaId": "C9FCF925-3E4D-43C7-A524-008FADCF97A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.4.0",
"versionEndExcluding": "9.4.2",
"matchCriteriaId": "3FDE31DF-800F-4F99-8632-F5CD3A52B062"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04672en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27905",
"sourceIdentifier": "security@apache.org",
"published": "2024-02-27T15:15:07.930",
"lastModified": "2024-05-17T02:37:34.130",
"lastModified": "2024-07-25T16:15:04.310",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31970",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-24T16:15:06.600",
"lastModified": "2024-07-24T17:12:32.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T17:46:25.310",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -11,15 +11,86 @@
"value": "AdTran SRG 834-5 HDC17600021F1 devices (with SmartOS 11.1.1.1 and fixed in Version 12.1.3.1) have SSH enabled by default, accessible both over the LAN and the Internet. During a window of time when the device is being set up, it uses a default username and password combination of admin/admin with root-level privileges. An attacker can exploit this window to gain unauthorized root access by either modifying the existing admin account or creating a new account with equivalent privileges. This vulnerability allows attackers to execute arbitrary commands."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:adtran:sdg_smartos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.1.3.1",
"matchCriteriaId": "CD1A4E83-2A74-459B-A681-2109BC8EEF60"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:adtran:834-5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C1207CF-E200-4642-9961-C866D07CF9FE"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/actuator/cve/blob/main/AdTran/CVE-2024-31970",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/actuator/cve/blob/main/AdTran/SRG-834-5",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36541",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-24T16:15:06.870",
"lastModified": "2024-07-24T17:12:32.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T17:44:25.170",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -11,11 +11,66 @@
"value": "Insecure permissions in logging-operator v4.6.0 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kube-logging:logging-operator:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1EC19C7-4D89-4CE6-8861-4E3976EBF4E6"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/HouqiyuA/f972d1c152f3b8127af01206f7c2af0d",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-36542",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-25T17:15:10.710",
"lastModified": "2024-07-25T17:15:10.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in kuma v2.7.0 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/HouqiyuA/e1685843b6f42b47dbf97e2e92e63428",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39345",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-24T15:15:12.360",
"lastModified": "2024-07-24T17:12:32.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T17:48:18.550",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -11,15 +11,86 @@
"value": "AdTran 834-5 HDC17600021F1 (SmartOS 11.1.1.1) devices enable the SSH service by default and have a hidden, undocumented, hard-coded support account whose password is based on the devices MAC address. All of the devices internet interfaces share a similar MAC address that only varies in their final octet. This allows network-adjacent attackers to derive the support user's SSH password by decrementing the final octet of the connected gateway address or via the BSSID. An attacker can then execute arbitrary OS commands with root-level privileges."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:adtran:sdg_smartos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.1.3.1",
"matchCriteriaId": "CD1A4E83-2A74-459B-A681-2109BC8EEF60"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:adtran:834-5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C1207CF-E200-4642-9961-C866D07CF9FE"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/actuator/cve/blob/main/AdTran/CVE-2024-39345",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/actuator/cve/blob/main/AdTran/TBA",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40060",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-23T15:15:04.810",
"lastModified": "2024-07-24T12:55:13.223",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T17:49:00.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": " Se descubri\u00f3 que go-chart v2.1.1 contiene un bucle infinito a trav\u00e9s de la funci\u00f3n drawCanvas()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wcharczuk:go-chart:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.1.1",
"matchCriteriaId": "6530F293-3005-42DF-9C86-B0323B273B20"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/F3iG0n9/4d0d7c863eea6874eeeb26a3073aa5f8",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40422",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-24T16:15:07.087",
"lastModified": "2024-07-24T17:12:32.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T17:42:19.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -11,19 +11,80 @@
"value": "The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the server. This can potentially lead to unauthorized access to critical system files and compromise the confidentiality and integrity of the system."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E48B4C29-E925-4C73-BFC6-83FAF8741CCC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/alpernae/CVE-2024-40422",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/stitionai/devika",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/stitionai/devika/pull/619",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40430",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-22T07:15:02.207",
"lastModified": "2024-07-22T13:00:31.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T17:07:13.977",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "En SFTPGO 2.6.2, la implementaci\u00f3n de JWT carece de ciertas medidas de seguridad, como el uso de reclamos de JWT ID (JTI), nonces y mecanismos adecuados de caducidad e invalidaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sftpgo_project:sftpgo:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7B3817-DF8C-4DC3-AAEF-306552248D56"
}
]
}
]
}
],
"references": [
{
"url": "https://alexsecurity.rocks/posts/cve-2024-40430/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40575",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-24T16:15:07.150",
"lastModified": "2024-07-24T17:12:32.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T17:35:28.913",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -11,15 +11,73 @@
"value": "An issue in Huawei Technologies opengauss (openGauss 5.0.0 build) v.7.3.0 allows a local attacker to cause a denial of service via the modification of table attributes"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:huawei:opengauss:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CA21BB01-C2AB-4A03-A747-D1557F5DA6CF"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/RuiHuaLiu2023/92059b0fa6c625e3d39001c5a9b2dc71",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://opengauss.org",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40767",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-24T05:15:12.907",
"lastModified": "2024-07-24T12:55:13.223",
"lastModified": "2024-07-25T17:15:10.910",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -25,6 +25,10 @@
"url": "https://security.openstack.org",
"source": "cve@mitre.org"
},
{
"url": "https://security.openstack.org/ossa/OSSA-2024-002.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/07/23/2",
"source": "cve@mitre.org"

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-40872",
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
"published": "2024-07-25T17:15:10.977",
"lastModified": "2024-07-25T17:15:10.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is an elevation of privilege vulnerability in server\nand client components of Absolute Secure Access prior to version 13.07.\nAttackers with local access and valid desktop user credentials can elevate\ntheir privilege to system level by passing invalid address data to the vulnerable\ncomponent. This could be used to\nmanipulate process tokens to elevate the privilege of a normal process to\nSystem. The scope is changed, the impact to system confidentiality and\nintegrity is high, the impact to the availability of the effected component is\nnone."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-822"
}
]
}
],
"references": [
{
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1307/cve-2024-40872/",
"source": "SecurityResponse@netmotionsoftware.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41319",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-23T15:15:05.050",
"lastModified": "2024-07-24T12:55:13.223",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T17:49:23.857",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,85 @@
"value": " Se descubri\u00f3 que TOTOLINK A6000R V1.0.1-B20201211.2000 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro cmd en la funci\u00f3n webcmd."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a6000r_firmware:1.0.1-b20201211.2000:*:*:*:*:*:*:*",
"matchCriteriaId": "E40BA1D3-29A2-4480-99EB-4BD8EE7CADCE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a6000r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33AF9CA4-E966-4E72-A676-ADDC1DA0B9A2"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/yanggao017/40efb889800ae2691c38086ebf80c037",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/yanggao017/vuln/blob/main/TOTOLINK/A6000R/CI_7_webcmd/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41703",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-22T05:15:03.450",
"lastModified": "2024-07-22T13:00:31.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T16:55:48.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,79 @@
"value": " LibreChat hasta 0.7.4-rc1 tiene control de acceso incorrecto para actualizaciones de mensajes. (El trabajo en una versi\u00f3n fija comenz\u00f3 en PR 3363.)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.7.3",
"matchCriteriaId": "07976B79-F984-49AC-A56D-F3989BCB7916"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:librechat:librechat:0.7.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "92F06C4A-1DE2-4DB8-B652-7E920751ABCF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/danny-avila/LibreChat/discussions/3315#discussioncomment-10074284",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/danny-avila/LibreChat/pull/3363",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41704",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-22T05:15:03.537",
"lastModified": "2024-07-22T13:00:31.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T16:55:24.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,80 @@
"value": " LibreChat hasta 0.7.4-rc1 no valida las rutas de acceso normalizadas de las im\u00e1genes. (El trabajo en una versi\u00f3n fija comenz\u00f3 en PR 3363.)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:librechat:librechat:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.7.3",
"matchCriteriaId": "07976B79-F984-49AC-A56D-F3989BCB7916"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:librechat:librechat:0.7.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "92F06C4A-1DE2-4DB8-B652-7E920751ABCF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/danny-avila/LibreChat/discussions/3315#discussioncomment-10074284",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/danny-avila/LibreChat/pull/3363",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
]
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-41800",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-25T17:15:11.203",
"lastModified": "2024-07-25T17:15:11.203",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Craft is a content management system (CMS). Craft CMS 5 allows reuse of TOTP tokens multiple times within the validity period. An attacker is able to re-submit a valid TOTP token to establish an authenticated session. This requires that the attacker has knowledge of the victim's credentials. This has been patched in Craft 5.2.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/craftcms/cms/commit/7c790fa5ad5a8cb8016cb6793ec3554c4c079e38",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/craftcms/cms/releases/tag/5.2.3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-wmx7-pw49-88jx",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240617-01_CraftCMS_TOTP_Valid_After_Use",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-41801",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-25T17:15:11.423",
"lastModified": "2024-07-25T17:15:11.423",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenProject is open source project management software. Prior to version 14.3.0, using a forged HOST header in the default configuration of packaged installations and using the \"Login required\" setting, an attacker could redirect to a remote host to initiate a phishing attack against an OpenProject user's account. This vulnerability affects default packaged installation of OpenProject without any additional configuration or modules on Apache (such as mod_security, manually setting a host name, having a fallthrough VirtualHost). It might also affect other installations that did not take care to fix the HOST/X-Forwarded-Host headers. Version 14.3.0 includes stronger protections for the hostname from within the application using the HostAuthorization middleware of Rails to reject any requests with a host name that does not match the configured one. Also, all generated links by the application are now ensured to use the built-in hostname. Users who aren't able to upgrade immediately may use mod_security for Apache2 or manually fix the Host and X-Forwarded-Host headers in their proxying application before reaching the application server of OpenProject. Alternatively, they can manually apply the patch to opt-in to host header protections in previous versions of OpenProject."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://github.com/opf/openproject/security/advisories/GHSA-g92v-vrq6-4fpw",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/user-attachments/files/16371759/host-protection.patch",
"source": "security-advisories@github.com"
},
{
"url": "https://www.openproject.org/docs/release-notes/14-3-0",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41914",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-07-24T15:15:12.437",
"lastModified": "2024-07-24T17:12:32.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T17:47:35.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -13,6 +13,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
},
{
"source": "security-alert@hpe.com",
"type": "Secondary",
@ -35,10 +55,65 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.1.0",
"versionEndIncluding": "9.1.9",
"matchCriteriaId": "F7DAAFB4-149A-4CF2-96E3-34CF185ECE12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.2.0",
"versionEndIncluding": "9.2.9",
"matchCriteriaId": "E20B1C8F-4068-4B88-9819-3913A2A2AB7F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.3.0",
"versionEndIncluding": "9.3.2",
"matchCriteriaId": "660467A7-8B8D-4633-AC96-078CDE317D3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.4.0",
"versionEndIncluding": "9.4.1",
"matchCriteriaId": "BCA950DB-1FF0-4483-B72F-BE35FD5BE6EC"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04672en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6535",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-07-17T03:15:01.890",
"lastModified": "2024-07-19T15:00:32.153",
"vulnStatus": "Analyzed",
"lastModified": "2024-07-25T16:15:04.583",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -99,6 +99,14 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:4865",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:4871",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-6535",
"source": "secalert@redhat.com",

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-7007",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-07-25T17:15:11.837",
"lastModified": "2024-07-25T17:15:11.837",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Positron Broadcast Signal Processor TRA7005 v1.20 is vulnerable to an authentication bypass exploit that could allow an attacker to have unauthorized access to protected areas of the application."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-207-02",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7068",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-24T15:15:12.750",
"lastModified": "2024-07-24T17:12:32.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T17:47:18.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -57,6 +57,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -105,6 +125,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +146,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/rtsjx-cve/cve/blob/main/xss2.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272349",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.272349",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.378874",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7069",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-24T16:15:07.357",
"lastModified": "2024-07-24T17:12:32.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T17:33:53.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -57,6 +57,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +136,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:employee_and_visitor_gate_pass_logging_system_project:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46FE63C8-C11F-4BEC-9F47-C72F45061A20"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/pineapple65/cve/blob/main/sql.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.272351",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.272351",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.378881",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7079",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-07-24T16:15:07.613",
"lastModified": "2024-07-24T17:12:32.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-25T17:31:23.670",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -13,6 +13,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -47,14 +67,42 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2F87326E-0B56-4356-A889-73D026DB1D4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "932D137F-528B-4526-9A89-CD59FA1AB0FE"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-7079",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299678",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -0,0 +1,133 @@
{
"id": "CVE-2024-7101",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-25T16:15:04.720",
"lastModified": "2024-07-25T16:15:04.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in ForIP Tecnologia Administra\u00e7\u00e3o PABX 1.x. This issue affects some unknown processing of the file /login of the component Authentication Form. The manipulation of the argument usuario leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272423. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.272423",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.272423",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.375832",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-25T16:00:18.767505+00:00
2024-07-25T18:00:17.578467+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-25T15:55:31.213000+00:00
2024-07-25T17:59:50.377000+00:00
```
### Last Data Feed Release
@ -33,46 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
257957
257963
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `6`
- [CVE-2024-36111](CVE-2024/CVE-2024-361xx/CVE-2024-36111.json) (`2024-07-25T14:15:12.650`)
- [CVE-2024-41806](CVE-2024/CVE-2024-418xx/CVE-2024-41806.json) (`2024-07-25T15:15:11.210`)
- [CVE-2024-36542](CVE-2024/CVE-2024-365xx/CVE-2024-36542.json) (`2024-07-25T17:15:10.710`)
- [CVE-2024-40872](CVE-2024/CVE-2024-408xx/CVE-2024-40872.json) (`2024-07-25T17:15:10.977`)
- [CVE-2024-41800](CVE-2024/CVE-2024-418xx/CVE-2024-41800.json) (`2024-07-25T17:15:11.203`)
- [CVE-2024-41801](CVE-2024/CVE-2024-418xx/CVE-2024-41801.json) (`2024-07-25T17:15:11.423`)
- [CVE-2024-7007](CVE-2024/CVE-2024-70xx/CVE-2024-7007.json) (`2024-07-25T17:15:11.837`)
- [CVE-2024-7101](CVE-2024/CVE-2024-71xx/CVE-2024-7101.json) (`2024-07-25T16:15:04.720`)
### CVEs modified in the last Commit
Recently modified CVEs: `53`
Recently modified CVEs: `47`
- [CVE-2024-37465](CVE-2024/CVE-2024-374xx/CVE-2024-37465.json) (`2024-07-25T15:52:09.033`)
- [CVE-2024-37466](CVE-2024/CVE-2024-374xx/CVE-2024-37466.json) (`2024-07-25T15:51:50.863`)
- [CVE-2024-37480](CVE-2024/CVE-2024-374xx/CVE-2024-37480.json) (`2024-07-25T15:51:31.297`)
- [CVE-2024-37485](CVE-2024/CVE-2024-374xx/CVE-2024-37485.json) (`2024-07-25T15:51:09.387`)
- [CVE-2024-38781](CVE-2024/CVE-2024-387xx/CVE-2024-38781.json) (`2024-07-25T15:50:29.157`)
- [CVE-2024-38782](CVE-2024/CVE-2024-387xx/CVE-2024-38782.json) (`2024-07-25T15:49:56.380`)
- [CVE-2024-38784](CVE-2024/CVE-2024-387xx/CVE-2024-38784.json) (`2024-07-25T15:55:31.213`)
- [CVE-2024-38785](CVE-2024/CVE-2024-387xx/CVE-2024-38785.json) (`2024-07-25T15:54:37.577`)
- [CVE-2024-38786](CVE-2024/CVE-2024-387xx/CVE-2024-38786.json) (`2024-07-25T15:54:12.073`)
- [CVE-2024-41709](CVE-2024/CVE-2024-417xx/CVE-2024-41709.json) (`2024-07-25T15:22:06.140`)
- [CVE-2024-5004](CVE-2024/CVE-2024-50xx/CVE-2024-5004.json) (`2024-07-25T15:21:18.437`)
- [CVE-2024-5529](CVE-2024/CVE-2024-55xx/CVE-2024-5529.json) (`2024-07-25T15:21:02.647`)
- [CVE-2024-5973](CVE-2024/CVE-2024-59xx/CVE-2024-5973.json) (`2024-07-25T15:18:05.157`)
- [CVE-2024-6243](CVE-2024/CVE-2024-62xx/CVE-2024-6243.json) (`2024-07-25T15:17:26.980`)
- [CVE-2024-6244](CVE-2024/CVE-2024-62xx/CVE-2024-6244.json) (`2024-07-25T15:15:39.890`)
- [CVE-2024-6271](CVE-2024/CVE-2024-62xx/CVE-2024-6271.json) (`2024-07-25T15:14:33.857`)
- [CVE-2024-6962](CVE-2024/CVE-2024-69xx/CVE-2024-6962.json) (`2024-07-25T15:47:18.363`)
- [CVE-2024-6963](CVE-2024/CVE-2024-69xx/CVE-2024-6963.json) (`2024-07-25T15:47:02.633`)
- [CVE-2024-6964](CVE-2024/CVE-2024-69xx/CVE-2024-6964.json) (`2024-07-25T15:46:37.340`)
- [CVE-2024-6965](CVE-2024/CVE-2024-69xx/CVE-2024-6965.json) (`2024-07-25T15:44:21.740`)
- [CVE-2024-6966](CVE-2024/CVE-2024-69xx/CVE-2024-6966.json) (`2024-07-25T15:42:54.563`)
- [CVE-2024-6967](CVE-2024/CVE-2024-69xx/CVE-2024-6967.json) (`2024-07-25T15:42:18.417`)
- [CVE-2024-6968](CVE-2024/CVE-2024-69xx/CVE-2024-6968.json) (`2024-07-25T15:41:38.410`)
- [CVE-2024-6969](CVE-2024/CVE-2024-69xx/CVE-2024-6969.json) (`2024-07-25T15:38:51.787`)
- [CVE-2024-6970](CVE-2024/CVE-2024-69xx/CVE-2024-6970.json) (`2024-07-25T15:36:44.567`)
- [CVE-2021-26858](CVE-2021/CVE-2021-268xx/CVE-2021-26858.json) (`2024-07-25T17:53:33.987`)
- [CVE-2021-27059](CVE-2021/CVE-2021-270xx/CVE-2021-27059.json) (`2024-07-25T17:29:45.397`)
- [CVE-2021-27065](CVE-2021/CVE-2021-270xx/CVE-2021-27065.json) (`2024-07-25T17:34:21.940`)
- [CVE-2021-27085](CVE-2021/CVE-2021-270xx/CVE-2021-27085.json) (`2024-07-25T17:30:49.863`)
- [CVE-2021-28663](CVE-2021/CVE-2021-286xx/CVE-2021-28663.json) (`2024-07-25T17:33:47.580`)
- [CVE-2021-28664](CVE-2021/CVE-2021-286xx/CVE-2021-28664.json) (`2024-07-25T17:59:50.377`)
- [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-07-25T16:15:03.637`)
- [CVE-2024-22444](CVE-2024/CVE-2024-224xx/CVE-2024-22444.json) (`2024-07-25T17:46:52.627`)
- [CVE-2024-27905](CVE-2024/CVE-2024-279xx/CVE-2024-27905.json) (`2024-07-25T16:15:04.310`)
- [CVE-2024-31970](CVE-2024/CVE-2024-319xx/CVE-2024-31970.json) (`2024-07-25T17:46:25.310`)
- [CVE-2024-36541](CVE-2024/CVE-2024-365xx/CVE-2024-36541.json) (`2024-07-25T17:44:25.170`)
- [CVE-2024-39345](CVE-2024/CVE-2024-393xx/CVE-2024-39345.json) (`2024-07-25T17:48:18.550`)
- [CVE-2024-40060](CVE-2024/CVE-2024-400xx/CVE-2024-40060.json) (`2024-07-25T17:49:00.047`)
- [CVE-2024-40422](CVE-2024/CVE-2024-404xx/CVE-2024-40422.json) (`2024-07-25T17:42:19.727`)
- [CVE-2024-40430](CVE-2024/CVE-2024-404xx/CVE-2024-40430.json) (`2024-07-25T17:07:13.977`)
- [CVE-2024-40575](CVE-2024/CVE-2024-405xx/CVE-2024-40575.json) (`2024-07-25T17:35:28.913`)
- [CVE-2024-40767](CVE-2024/CVE-2024-407xx/CVE-2024-40767.json) (`2024-07-25T17:15:10.910`)
- [CVE-2024-41319](CVE-2024/CVE-2024-413xx/CVE-2024-41319.json) (`2024-07-25T17:49:23.857`)
- [CVE-2024-41703](CVE-2024/CVE-2024-417xx/CVE-2024-41703.json) (`2024-07-25T16:55:48.747`)
- [CVE-2024-41704](CVE-2024/CVE-2024-417xx/CVE-2024-41704.json) (`2024-07-25T16:55:24.307`)
- [CVE-2024-41914](CVE-2024/CVE-2024-419xx/CVE-2024-41914.json) (`2024-07-25T17:47:35.247`)
- [CVE-2024-6535](CVE-2024/CVE-2024-65xx/CVE-2024-6535.json) (`2024-07-25T16:15:04.583`)
- [CVE-2024-7068](CVE-2024/CVE-2024-70xx/CVE-2024-7068.json) (`2024-07-25T17:47:18.717`)
- [CVE-2024-7069](CVE-2024/CVE-2024-70xx/CVE-2024-7069.json) (`2024-07-25T17:33:53.777`)
- [CVE-2024-7079](CVE-2024/CVE-2024-70xx/CVE-2024-7079.json) (`2024-07-25T17:31:23.670`)
## Download and Usage

View File

@ -88042,7 +88042,7 @@ CVE-2016-4818,0,0,7d8db30092fa7dfbedfade93058d57216c926b0c79cd56218d1b55ec80d4e2
CVE-2016-4819,0,0,1e1fd4a619ceb23227ac095d23ae2f3bc609b9072f99960bc233251f93a0f667,2016-06-23T11:59:30.383000
CVE-2016-4820,0,0,d280c9d629829366fb6c35e76294ebce52836ad3c6809f4ff6c1ffbcf9e75265,2016-06-21T17:48:34.423000
CVE-2016-4821,0,0,e77d7f50528abaa39fad25ddf349914d1e7948abaf2e342cb6e86979eda78f42,2016-06-20T23:14:33.363000
CVE-2016-4822,0,1,61fbf13c76bc4a8d8912de4a007e902a75c6084e54c707565cda15f85a583af9,2024-07-25T14:23:25.223000
CVE-2016-4822,0,0,61fbf13c76bc4a8d8912de4a007e902a75c6084e54c707565cda15f85a583af9,2024-07-25T14:23:25.223000
CVE-2016-4823,0,0,e27177cf8567f3c604aa0992b3eb84e789539eafb14a9cdd9f8d050bf7493119,2016-06-28T00:32:51.903000
CVE-2016-4824,0,0,e62c5bc2ca550cc16a58a25df8b9c256aefaa1c2fcb55f097bb0d50c6a95357e,2016-06-28T00:33:23.657000
CVE-2016-4825,0,0,9a8029e2b527359fc300dc706f9b5c96e154b35b76f0d5a9069b04f14c5260ba,2021-08-31T20:05:08.127000
@ -92894,7 +92894,7 @@ CVE-2017-0137,0,0,b39f4584e0ff4af5bfb7330eab92383093797e82e38cd33ebd6f78f4a401ca
CVE-2017-0138,0,0,396210bfb7406c5891dfed997fd42dbff9e3e8657280ea39b929e77669029713,2017-07-12T01:29:07.770000
CVE-2017-0140,0,0,d6331d35020d494ec23f5777199c63154b3dcddf238fc5006d74fc8b056eead0,2019-10-03T00:03:26.223000
CVE-2017-0141,0,0,59100e627c6d5e6c854f5c0a90877b657e168ea1ff42a1387282e4e78dd7f994,2023-06-12T07:15:09.250000
CVE-2017-0143,0,1,555f6b4717d2c9d8874919a106b5317f72b37a63969ec7a97e8d0e8120080bcf,2024-07-25T14:00:11.533000
CVE-2017-0143,0,0,555f6b4717d2c9d8874919a106b5317f72b37a63969ec7a97e8d0e8120080bcf,2024-07-25T14:00:11.533000
CVE-2017-0144,0,0,183ef3848db2ab20e84f06a306733e2dbc52adf7f438c21ff2d323a857e45b1d,2024-07-24T16:03:46.547000
CVE-2017-0145,0,0,232138ca57243f7f8c6aafce2480dfaecbcddbf5e8606d4b7a1beed701a61ebd,2024-07-24T16:22:57.507000
CVE-2017-0146,0,0,5fd4cf5faacc484bb38494cacd53c5f3a3c1b9631fcf0e3ea961d395f919c2da,2024-07-16T17:55:42.890000
@ -107269,7 +107269,7 @@ CVE-2017-7262,0,0,f78bc38632d70f21b7078a4e9db2032da6abc2c24dc4facf58d5aa5df81ab1
CVE-2017-7263,0,0,51b071ac9f1aedb7d54bc263a94d26159fb2954d002b42dfac4a37d8260b650c,2017-03-29T01:59:03
CVE-2017-7264,0,0,09de7ea4a569a0956bb7612ff8e6d13eae78f4f2b39bb1c33db0342689758d16,2024-07-15T21:15:02.673000
CVE-2017-7266,0,0,0b71a2968113f2f8d9030c214fd310d647c1171b7725d852e2a15e261686341b,2017-03-29T01:59:03.110000
CVE-2017-7269,0,1,5c55eb1ac33241769906ae5bd31be4a25232707aca13d8ab990794e81f06f3c3,2024-07-25T14:01:24.977000
CVE-2017-7269,0,0,5c55eb1ac33241769906ae5bd31be4a25232707aca13d8ab990794e81f06f3c3,2024-07-25T14:01:24.977000
CVE-2017-7271,0,0,4abb50bf24b45576e32e408897e16efe8f10cb28e2556d4eaeac68cb450ad3e9,2017-05-08T01:29:00.267000
CVE-2017-7272,0,0,e89b1f4a85547acca00700a7812009fff1e3fab6b5901c11a22989dac2431e2a,2018-02-26T02:29:00.423000
CVE-2017-7273,0,0,3408bdd468c6eb52aa3fcbed1868b7ad60c5be41e0344a38aa246e60d5a5a73f,2021-01-05T19:15:16.400000
@ -109063,7 +109063,7 @@ CVE-2017-9244,0,0,f28570bdd0ba969e83e607352897b1f823dfae3e7d62420afe1b27e5d76f00
CVE-2017-9245,0,0,bb516b731245553c86384b29e2b06472321ad0a91bf75e176da1a13be7df56a9,2019-03-19T13:59:40.953000
CVE-2017-9246,0,0,e9af4d9fee8802f74780b2db4d5cef49797bc7bdcafe06baa99b4d42dd1f1f93,2017-07-05T18:21:35.873000
CVE-2017-9247,0,0,760a786a2726d570c4f5c2bd097bf0ad1e052820781e0ec250a3fbd437340956,2017-08-25T11:43:55.450000
CVE-2017-9248,0,1,944d92e06f22200bbce2476b37cde0db77cea397cff60bd0e3f0e110aa3c9a74,2024-07-25T14:04:24.223000
CVE-2017-9248,0,0,944d92e06f22200bbce2476b37cde0db77cea397cff60bd0e3f0e110aa3c9a74,2024-07-25T14:04:24.223000
CVE-2017-9249,0,0,b6ae372b87f3b28440343fed26e849078f9ba67e0f0bd96b601954ea720dfb50,2020-03-02T18:58:25.307000
CVE-2017-9250,0,0,007b7bf6639dae103f447e49c63b632f752baf7b238833f9466c3652b5547325,2020-10-28T19:42:54.117000
CVE-2017-9251,0,0,7486fb7e089a2b4774747c319d6226a6c440a9684d10aaff8e1f4798a9878624,2024-02-14T01:17:43.863000
@ -112761,7 +112761,7 @@ CVE-2018-11772,0,0,c8c9557f2ee7f4672833a7f948daad087d968e8fadfc57e9a55783351ce4a
CVE-2018-11773,0,0,5b99f1ed69f95ec1671cbd3702d960f88cea851577040e391124f925b318a428,2023-11-07T02:51:45.873000
CVE-2018-11774,0,0,98e349b2df89930960ea8088b7ff1f786757c29b67acc8655d314fce4e739b21,2023-11-07T02:51:45.933000
CVE-2018-11775,0,0,c707bec47a537be835d6dcaa1b78ce09a455b4ce42a0d359291bbb9ce10a97ca,2023-11-07T02:51:45.990000
CVE-2018-11776,0,1,2d0b2bbf16413a004a73636bf012e8df83ffaab97c62e9852d81cfbb548605d0,2024-07-25T14:48:56.837000
CVE-2018-11776,0,0,2d0b2bbf16413a004a73636bf012e8df83ffaab97c62e9852d81cfbb548605d0,2024-07-25T14:48:56.837000
CVE-2018-11777,0,0,fb966a75e8f05a7fd09ef3046acf836093fb8c3f8989639f1862d35d2ab58add,2023-11-07T02:51:46.160000
CVE-2018-11778,0,0,3611e147fc10ebfb7a531c360f2a0e2d7b9a7db1105c6c173e73e64756e8e665,2023-11-07T02:51:46.227000
CVE-2018-11779,0,0,f71b5f2cca4f1866caa2c40dd48c035806d88370bc12c7f4e8fe71c71772bfb1,2023-11-07T02:51:46.287000
@ -114208,7 +114208,7 @@ CVE-2018-13374,0,0,d8d3cbda0879903d9708fa8ab377ca18fce7fb90f58417b260f2dbab0b870
CVE-2018-13375,0,0,d56d6bafd36bf4e0bb208e573685704fee8535e51d0b9a9e0de49024b4474a77,2019-05-30T15:19:19.737000
CVE-2018-13376,0,0,34379bca4498e8ec746f1a8397920cc44e22e9cefdf9bd673e27251e09c3a80a,2019-10-03T00:03:26.223000
CVE-2018-13378,0,0,9f71a7a5685934cdd46869122ec078124ae2ec66bfbc946ccbf9f49813590b58,2019-04-17T18:06:24.997000
CVE-2018-13379,0,1,af407aeeed99a01cc7a4409d5eb5be2ac5a2e06ee3acacc6a604d3bc95ea630f,2024-07-25T14:09:54.960000
CVE-2018-13379,0,0,af407aeeed99a01cc7a4409d5eb5be2ac5a2e06ee3acacc6a604d3bc95ea630f,2024-07-25T14:09:54.960000
CVE-2018-1338,0,0,d64411637977ae42c91121f0409cbf1c71d1031cb46205ab4bc91aedd4d1c053,2023-11-07T02:55:59.417000
CVE-2018-13380,0,0,480272033178ab224e15cb78036830ce2ce28e5ca27484adf0a78212d77e5330,2021-04-06T12:56:42.507000
CVE-2018-13381,0,0,c6d40fea6a34ff14b2a09585a7b5be2b92a5fed103e6436015156bf377343728,2021-03-16T02:41:08.027000
@ -116328,7 +116328,7 @@ CVE-2018-15957,0,0,443efe377b38ba992c46c52ce9f3391935a05c3f90ce032f6ac1ecb4a074e
CVE-2018-15958,0,0,ac1a8e19a4340d8b5a458ca5e5db9f2ab66721827c776852364801166454a695,2020-09-04T14:09:41.573000
CVE-2018-15959,0,0,a45daa34bc7684bba203e87c78fcf7110800122d2fbcabb77418590b0e95aa6c,2020-09-04T14:09:41.573000
CVE-2018-15960,0,0,456ff493c27f7c2bb5c0aed914c08b25f201cd0834d4f7649d14df781f830f3c,2020-09-04T14:09:41.573000
CVE-2018-15961,0,1,5cef4f006824116fae0cb9f2bfff9a5fde0a5f19a7efcdbfbd9766fe69aafbeb,2024-07-25T14:08:30.757000
CVE-2018-15961,0,0,5cef4f006824116fae0cb9f2bfff9a5fde0a5f19a7efcdbfbd9766fe69aafbeb,2024-07-25T14:08:30.757000
CVE-2018-15962,0,0,30c8d743e6db7e6a4fbde1cacd685ebe0d65b3d05d62a84545c93ba3b22589b5,2020-09-04T14:09:41.573000
CVE-2018-15963,0,0,a9f5d22596c14c0242fa25509317296d426c89d0093b1e953e18d95794243fb3,2020-09-04T14:09:41.573000
CVE-2018-15964,0,0,fea4a50cf9ab15b4dc4842dcbbf1ee321458a6a1d2cec0ef0e2176d82f1c5ed7,2020-09-04T14:09:41.573000
@ -119789,7 +119789,7 @@ CVE-2018-20059,0,0,a45723de5add1e663a976427e38a1be6b9649033dc00f5e703ab52ba87054
CVE-2018-2006,0,0,765f3caaab97b982fe420e9e27673258fedf6eaa82506c2251cc142ce3ca53a3,2019-10-09T23:39:52.590000
CVE-2018-20060,0,0,651a2b7d04c96deca7263b2d73f01e54c209e5bf88c2bcb91adad0dc967f9c25,2023-11-07T02:56:07.787000
CVE-2018-20061,0,0,22fb0133d22d283ed476003dc01c7267347ddc0c491aa0651d6d83c8a96c3f37,2019-01-02T14:50:42.310000
CVE-2018-20062,0,1,e33da00ab16d6131981aef0e6616c7815cb1b5e93200a8ffd9336dfdc58c5078,2024-07-25T14:56:27.793000
CVE-2018-20062,0,0,e33da00ab16d6131981aef0e6616c7815cb1b5e93200a8ffd9336dfdc58c5078,2024-07-25T14:56:27.793000
CVE-2018-20063,0,0,5e0e518c5219445ff8e2c70a202e496fae7dc9792301f7b8bf63f3463b297bee,2023-11-07T02:56:07.883000
CVE-2018-20064,0,0,533a4530b27b3788522655f2c92710078a210682a81dd1265fd6e1e345c4f2ad,2018-12-31T18:36:32.117000
CVE-2018-20065,0,0,b1a2e8a294db9cf944bcf406e2e2c42dba5110e573ee97236804340acb00f939,2023-11-07T02:56:07.953000
@ -127293,7 +127293,7 @@ CVE-2019-0207,0,0,422f7719eee18bb41a6fcb1c8a65092150373d7d22c407e48ce719c230480a
CVE-2019-0208,0,0,47fa72fb1491e2eddd007ac660c2013a428a55186223ef7595fd512160713322,2023-11-07T03:01:49.670000
CVE-2019-0209,0,0,8a63648f5ca6170017076fde6d74e61036a2724c0ceca47b3baed4431df839de,2023-11-07T03:01:49.940000
CVE-2019-0210,0,0,81379cb863b04a0492c6a682cbfff45ba3248ce9a34d0ac9ef5b4de0664718f7,2023-11-07T03:01:50.263000
CVE-2019-0211,0,1,726e0c431f8e55d5ddbea4912235460da30cf47cd8728153f128b74b0517fffb,2024-07-25T14:58:33.307000
CVE-2019-0211,0,0,726e0c431f8e55d5ddbea4912235460da30cf47cd8728153f128b74b0517fffb,2024-07-25T14:58:33.307000
CVE-2019-0212,0,0,075227b03d37b259fe4718dd8f3f56ed34add98ca8553231e47e24b815a3ff3f,2023-11-07T03:01:50.600000
CVE-2019-0213,0,0,cce91e55bd63b5ef8523cbe7916cc647c1dd3fc78acb908420a62719e62899b7,2023-11-07T03:01:50.673000
CVE-2019-0214,0,0,149638d6a12b631ee7bd62375e0884de15dac65a89a4b918e62e894f9255c972,2023-11-07T03:01:50.747000
@ -127611,7 +127611,7 @@ CVE-2019-0704,0,0,5ef210fa990cc7df15145c3d6dc29550992d6c33cd9189114ada0760c15f11
CVE-2019-0705,0,0,b641d29fa3ee6e51add602d57290db31e1158c4df07cf80f62876394e7c764e4,2023-11-07T03:01:59.500000
CVE-2019-0706,0,0,989359194e9c4b740182fb426d52576c77ae6a8834be180f4f4876ea6fec9bb3,2023-11-07T03:01:59.717000
CVE-2019-0707,0,0,1a50209a5d8c69cf2fb86129151ca653918e752a77cfc22645ecce83fe56307c,2020-08-24T17:37:01.140000
CVE-2019-0708,0,1,a2914294db56d1e1135651d148ef7d98c5b878e5ccb6de60f1f875aa7f2cbc89,2024-07-25T14:09:23.880000
CVE-2019-0708,0,0,a2914294db56d1e1135651d148ef7d98c5b878e5ccb6de60f1f875aa7f2cbc89,2024-07-25T14:09:23.880000
CVE-2019-0709,0,0,866e03a0533d3dbe6af0a9383c71f8b7f204e61423e10144c96547cf8fbac30c,2019-06-12T19:58:57.193000
CVE-2019-0710,0,0,db6585bfe20e01de4f3d57323c274809eb919891d10de7eba7ccda9aa0e18a81,2019-06-12T20:06:33.730000
CVE-2019-0711,0,0,66e9e73573983fd024a8c6a1700997a2c666d0089486222442f1e8b358962b94,2019-06-12T20:12:02.893000
@ -127711,7 +127711,7 @@ CVE-2019-0804,0,0,78db97dc8254f1fd6dc7a4fbf968f941527ae18f7e3770108d25a0b4bf38bc
CVE-2019-0805,0,0,666d1c5f87147f686d041af9da0a40785a9cd89036bda88a4e73f3c9e9af5add,2020-08-24T17:37:01.140000
CVE-2019-0806,0,0,884b129f9875c9d21be6cc8568a08bcbfb44602608a57709f54bfe1103f65f21,2020-08-24T17:37:01.140000
CVE-2019-0807,0,0,7f61e8cf377df686f7c9e89aea30597f1635e4599e3a6dd7674d0ddcbf1ea9bf,2023-11-07T03:02:04.083000
CVE-2019-0808,0,0,196f9cc1b192db64b4ee8fb78f5525bde2834fb5864092daf23c34e6936299c9,2020-08-24T17:37:01.140000
CVE-2019-0808,0,1,16a6b01c95a4b5be4e1318c87961f940d967e9dae2cd23bd3460bb3a8068b0dd,2024-07-25T16:19:34.190000
CVE-2019-0809,0,0,8f6301c9a0b79ac3de3bd2fe2385e3a49605eed10ed6c0478a50ecc0d4f44f2e,2019-04-10T03:01:20.203000
CVE-2019-0810,0,0,a521d551a4e619546c004f27ff4acb8b9e32a9e7943c4ccd22c618d4913c4cac,2023-03-20T16:25:03.047000
CVE-2019-0811,0,0,20aefa52dcfe37b56fa292f353552ddacb4f01e73e95faf6d918d15ba1d1d4eb,2019-07-19T13:55:12.017000
@ -129685,7 +129685,7 @@ CVE-2019-11507,0,0,8a40651f51bb10aa6520da768f5df8b23ee0a5f05a9241cfa95967d56b60f
CVE-2019-11508,0,0,57f51b231225454a660b03062d47f87467131b22bb1df5302f91410c7c1f2392,2024-02-27T21:04:17.560000
CVE-2019-11509,0,0,91dc765423eaed0ebfd0717b3c2d434929700f0da6c9cbcaa486a14dd40f6acb,2024-02-27T21:04:17.560000
CVE-2019-1151,0,0,d8a2886ff4009dbdb4c723e70ead8d189030925ee0a5227063aa3b83d5c70188,2024-05-29T17:16:01.967000
CVE-2019-11510,0,0,0aedb6dde7aee8ec5c17f3631ae6f1e22395b3117a9562653f1ae34240193165,2024-02-27T21:04:17.560000
CVE-2019-11510,0,1,e1961272342be791aecf8368e82cf74299e1fdae4c44e07a2d619efb7c8b15c3,2024-07-25T16:20:01.487000
CVE-2019-11511,0,0,c74f245f39bee79cc9a5f23f325a09b7b3e537a7993c371de95b18cfd8b998be,2019-06-03T20:29:00.610000
CVE-2019-11512,0,0,4336c062ac7174cd570c400b5ec1bbc9f0534450ff5b9fb9a8c633d9035d7bfd,2019-07-10T19:29:31.197000
CVE-2019-11513,0,0,987d54559e2ecb19c8df1278664b71eaed28e27e2e84acfc1a79cfe439d053e0,2019-04-27T00:49:19.470000
@ -132160,7 +132160,7 @@ CVE-2019-14286,0,0,2b19388ca2d2ba501db9afa0d4a1356bbfdb69cb6f0c128f7e96e749a1d40
CVE-2019-14287,0,0,c20da8cae923a60ce7797b3664a7c69ddeb29ee5960f3c22b57843264eb7a9e1,2023-11-07T03:04:52.657000
CVE-2019-14288,0,0,50b65041152fb087ef72b9e54ba01be097e8936c47633ab6a1b8440d3d1d9acf,2019-07-29T14:04:47.417000
CVE-2019-14289,0,0,e69de95098f469763d38bd6dbe4dd583f24a2d931bfe9955f26a12c2fc64bc7d,2019-07-29T14:05:54.260000
CVE-2019-1429,0,0,8879a00a975995226561f6e9ffe9c3a5a6682b6a9e2c8b9de0c4aeea8062fd0c,2020-08-24T17:37:01.140000
CVE-2019-1429,0,1,b9c68e2d08601b0577ddededa722f81f05d856a3fef83d897a54cded1a17cfbf,2024-07-25T16:32:27.493000
CVE-2019-14290,0,0,669d42157aed05aa11af565753262a849f101a7d372d393c92cf66a228042a01,2019-07-29T14:07:35.970000
CVE-2019-14291,0,0,47a976188e69304d3a756eb44a8e85b79f33ca3b9b5a2940a7f9bdb072bffa74,2019-07-29T14:07:58.597000
CVE-2019-14292,0,0,586474816978d22f90924630b9be96f6e1cb06effddbc865d2dba6d0880983a4,2019-07-29T14:08:21.610000
@ -133577,7 +133577,7 @@ CVE-2019-15749,0,0,45a39310dd9a960bd19d95877d8e462bf9dc9b4891ae05ba2e9dc2c0ce42f
CVE-2019-1575,0,0,0f3082b7e7fd877d05d33974ace4826e604d837b23aca1a05e1b0ba44bb6818a,2020-08-11T16:30:35.677000
CVE-2019-15750,0,0,2eb78c253605c2b735008d1e232acac67354216c4e866573ae70ce86728f1793,2019-10-09T00:34:41.927000
CVE-2019-15751,0,0,6691a8c9abd1225c930f7d4e076be3d7e6025950b4f49ea2178c7d0116df0b31,2019-10-09T00:10:23.753000
CVE-2019-15752,0,0,a904beb3b41ec131154fe19a3725b02776db0bd177f545f6765263827ba2071d,2023-11-07T03:05:32.240000
CVE-2019-15752,0,1,dbce47a4a71cc495f911b76b8f763730c4766e5d3a8785126fa3a7b4083aa724,2024-07-25T16:24:56.683000
CVE-2019-15753,0,0,d0c66161ccad96a50a075beffb19d12242790f40b505dc207b9dbfd1ee818336,2020-08-24T17:37:01.140000
CVE-2019-15757,0,0,bec01fcf87ac6dd83062a2d2633f8b1b119cb6af709de67eac6732c6d829ddea,2019-09-10T03:15:16.823000
CVE-2019-15758,0,0,ae1a70b1310358108e042e3d5820b395fa8bef16fe688dda2b1ae940d15dc67e,2020-06-08T16:48:42.877000
@ -135140,7 +135140,7 @@ CVE-2019-17554,0,0,6983c65a9d00a2e11bfca3e612794f142810fdc953b23da451fb92ae4582b
CVE-2019-17555,0,0,d2648a3615c6464daa3170d66c437a8fe441b24c4d832b9196e7235f6d9d8bf2,2019-12-13T21:29:23.263000
CVE-2019-17556,0,0,93064054236e9c0e95c973f2b90da36605c59371d821a84b0a81c8613bc6ed73,2019-12-13T22:19:08.757000
CVE-2019-17557,0,0,d98e67f8aa1cb30d1fdf2533c09f4b38df0aa428b23e220340fb2300f1496618,2020-05-07T15:12:00.013000
CVE-2019-17558,0,1,df8346f7172842af426c8860fab8d68abf00c35a8ad74ec086b3d4d08a590d80,2024-07-25T14:32:21.360000
CVE-2019-17558,0,0,df8346f7172842af426c8860fab8d68abf00c35a8ad74ec086b3d4d08a590d80,2024-07-25T14:32:21.360000
CVE-2019-17559,0,0,04a76edc3158d64246074a9d933dd074b7a62d894206e72cca0e4a2966a499cf,2022-10-06T19:33:28.910000
CVE-2019-1756,0,0,983da4eb05ab24ad2a15ec74c6ede8f65f8032609a695532de06674cc8fe4be1,2019-10-09T23:47:59.220000
CVE-2019-17560,0,0,2207dfe8a6e68cc5ab75d3619bf572a23974b737b5156b674b75f044521584f0,2023-01-27T18:31:49.983000
@ -136025,7 +136025,7 @@ CVE-2019-18931,0,0,f3a2ce43389c1d975c0b396249687c6aaa37dbaec4d2f43847a3743e594f9
CVE-2019-18932,0,0,b14fceab518b411ee415d70805ca495fe6ee9cd7b90330491c7021afacb1144a,2022-04-26T20:05:27.950000
CVE-2019-18933,0,0,9d7931aadf47e0ad71604dcd3ff81f184bd991a1b696d02c427d12b39d27385d,2020-08-24T17:37:01.140000
CVE-2019-18934,0,0,1e76b2dbb2805d96efce12080c423a97c398fd3bfe82c67e1f4870c5c4dc9fe8,2023-11-07T03:07:18.980000
CVE-2019-18935,0,1,4e918a481310d4d6ded0eb4f3465d6123595db1ea59da8db43841216c08f3c65,2024-07-25T14:31:11.587000
CVE-2019-18935,0,0,4e918a481310d4d6ded0eb4f3465d6123595db1ea59da8db43841216c08f3c65,2024-07-25T14:31:11.587000
CVE-2019-18936,0,0,d196746ef1fa97097ef96793881e988ae8b1babe59ab804079e1645822b8e5c9,2020-08-24T17:37:01.140000
CVE-2019-18937,0,0,ea021a3935464a358899bdc6588ee3f03d9b1daf076acdfa094788c6a6c711ca,2021-07-21T11:39:23.747000
CVE-2019-18938,0,0,6fed6c242c07b3b7c9a038ad5ff1508caf508633060ad62045499b42ab9257c9,2021-07-21T11:39:23.747000
@ -137962,7 +137962,7 @@ CVE-2019-2211,0,0,c34275225dd85e60e312a3af253aadc2804765e31cf2bd2f8e47300067005c
CVE-2019-2212,0,0,f7d66bb646529b26f0a177c1863f5a19afbb8730e4d3c61de6be2c5cf828b516,2020-08-24T17:37:01.140000
CVE-2019-2213,0,0,501e7a0329935e62204075e108258f5123b2916b82659a52d42f8c8deb57f7bc,2021-07-21T11:39:23.747000
CVE-2019-2214,0,0,5cd72416c06548a451a094398626fccc196d077fc1c4aa958ea54396e79a2c09,2022-04-18T15:46:19.163000
CVE-2019-2215,0,1,3b583faf2f4e147cf52c48eb9a8fd5d743beec0fb319a929c41ccc8e883a3f5f,2024-07-25T14:10:44.723000
CVE-2019-2215,0,0,3b583faf2f4e147cf52c48eb9a8fd5d743beec0fb319a929c41ccc8e883a3f5f,2024-07-25T14:10:44.723000
CVE-2019-2216,0,0,b1a4eb9414f18d29e79635fe575f01723f98a726e3832be466c7802bc420bdd1,2020-03-17T17:24:23.567000
CVE-2019-2217,0,0,516496c30b1f1dbfe079a44d632b61c0bd40749da9a57155f04e847c0fdec9da,2021-07-21T11:39:23.747000
CVE-2019-2218,0,0,99905d712ab16442d5251598448ca91f1ad0a16df9cf624c0fd9f64cca06ada6,2020-08-24T17:37:01.140000
@ -140547,7 +140547,7 @@ CVE-2019-5540,0,0,2e4ae06bd7b57e45d44c6267ac149cd0dd6ddde9b6217bd45e239bba1ab4e4
CVE-2019-5541,0,0,de9f11a3a506e427c830d59ade3bad80b8ce410cddd799dd357c55b213b8ea2c,2019-11-25T13:46:21.427000
CVE-2019-5542,0,0,73d5c57be229d4f0e431707e1eff53504e8d7e35337deccf8194aad5428f23a2,2021-07-21T11:39:23.747000
CVE-2019-5543,0,0,765655e0420daef9aea2c4c2d967e49ca5055cb1ef9a46e272dc1a67cb15bc1c,2020-03-20T14:16:37.073000
CVE-2019-5544,0,1,f19ff6260bc7567e9fe70f62c0b51e667454395b395860328cd3cfaaceccc74a,2024-07-25T14:15:46.900000
CVE-2019-5544,0,0,f19ff6260bc7567e9fe70f62c0b51e667454395b395860328cd3cfaaceccc74a,2024-07-25T14:15:46.900000
CVE-2019-5546,0,0,1e42d5c493601d0f3470c9f0366e204f2f47a98b4b72c6e38ab8bed91119a8af,2023-11-07T03:11:37.127000
CVE-2019-5547,0,0,2e47fd6fc8bec2aaae11467cde9d545694455b7aafb16cdd45a9186c76314c6a,2023-11-07T03:11:37.360000
CVE-2019-5548,0,0,d54d5cc9d4472d62b18a5e9364b0f09cdeced807615cc7034d3ecd25a84fe21c,2023-11-07T03:11:37.600000
@ -144081,7 +144081,7 @@ CVE-2019-9974,0,0,62cb55b6e85d6d22e7faa69b3db74acebe1499a120989baf0863ca4ea24bfd
CVE-2019-9975,0,0,da598c8c94b8bd29a8990cb117d69d1c8c2a0d3f0981dbe7d8fd5e29085c4eef,2019-04-12T11:50:40.567000
CVE-2019-9976,0,0,75940c9e7c658d0b3d234b04d9e3d1a4153f479c5cbcdeb0b1b6647df057d53c,2020-08-24T17:37:01.140000
CVE-2019-9977,0,0,a1e135daf45e3f8429f9aed27d4229b3a4aa8a021833d8e666daea78605bced7,2021-07-21T11:39:23.747000
CVE-2019-9978,0,1,ea0769ea71565ed15e48df881c092564c39fd8d3399311ee2ac5b7f6749594ae,2024-07-25T14:57:28.790000
CVE-2019-9978,0,0,ea0769ea71565ed15e48df881c092564c39fd8d3399311ee2ac5b7f6749594ae,2024-07-25T14:57:28.790000
CVE-2019-9983,0,0,511c668feaebd8d95980cf01158100a0f8ab755779eb3befa71dddab6b9af4b5,2023-11-07T03:13:49.863000
CVE-2020-0001,0,0,4e1ca99ee0d7bb43f9180d50c49544d413a4e2fb8eae08e3b026842d18802ccc,2021-07-21T11:39:23.747000
CVE-2020-0002,0,0,a91dec84f885e1e322cf1517f63e26c8cf1f5544710f0b3e1b8fbcc7661fc76e,2022-01-01T20:01:34.303000
@ -144149,7 +144149,7 @@ CVE-2020-0065,0,0,88af725dee29572fa056f71a0084011987527bddd7bcd57fef4ef71344c74e
CVE-2020-0066,0,0,1f784b827386a9ad069af3aa76db0b5d6737ac80f16bd39571d247b26d233410,2021-07-21T11:39:23.747000
CVE-2020-0067,0,0,fcb89f7ed28ada3be2468ecab24445ffcf664398852d89a7ada17633b7249ebe,2022-07-30T03:39:00.653000
CVE-2020-0068,0,0,1c585af14b3bbb923764e3dc8da0b6c912ff2e3ce6f082ffed54a163a40f2399,2021-07-21T11:39:23.747000
CVE-2020-0069,0,1,5d0717b50aa4d2c2e5ec1453e884d9e49ac77fd20d37ce6970ffef9f2c22a1f9,2024-07-25T14:32:59.103000
CVE-2020-0069,0,0,5d0717b50aa4d2c2e5ec1453e884d9e49ac77fd20d37ce6970ffef9f2c22a1f9,2024-07-25T14:32:59.103000
CVE-2020-0070,0,0,5a0841bb1e7fb7d2ece89292a0cbeb374e4e37755ac19aec4a89bb809ddcbf7d,2020-04-21T17:59:10.410000
CVE-2020-0071,0,0,752b58b085374f539e157d676e38bac0cce2d205e0c754b0509a69f292628da3,2020-04-21T18:01:37.463000
CVE-2020-0072,0,0,427090bbddc0bd9a281cf274d4f269424168bde0d5932c0bd0678e6db2aad38f,2020-04-22T20:25:58.153000
@ -150698,7 +150698,7 @@ CVE-2020-15995,0,0,e04844d4e46038beff6c24b9ad2b5bc1a5fc9fd0ac9d926f6d2378c39d02c
CVE-2020-15996,0,0,c0f84fed1bf4857bad6d4760ec25434c47b593266dc4ad8312f4247082a4ce10,2020-11-04T14:38:04.407000
CVE-2020-15997,0,0,fcda328626134842d34e9803c2502bd8f309d36e04389462a0b52f8cdc430979,2020-11-04T14:30:08.580000
CVE-2020-15998,0,0,eeaf11d5ed8eae52a2bfafc1a6efe79ec5978ffba9304c37a4dd3c9475dc7fbd,2020-11-04T14:29:45.890000
CVE-2020-15999,0,0,0b8eee3fa9c2328f7b6670efe9a340e1d6942fae938aca92b700884736fd6353,2024-02-15T02:00:01.647000
CVE-2020-15999,0,1,f8871ed4576fd43c3f642535c1469a4893ac8c3903e543d0a324a7a35c2fd167,2024-07-25T17:25:29.553000
CVE-2020-1600,0,0,c821639871c0a0499643fbca0e32382c8693aef651f667efe9930f1f8891a725,2021-09-14T13:21:46.983000
CVE-2020-16000,0,0,81c481e8e47c4bf31fc9746a2721ef7ecb8cb17a78160bb10c3fdd64c8f577bd,2023-11-07T03:18:00.863000
CVE-2020-16001,0,0,abb8e341e9d3451760fb43b8808fce054c2381c689b060a9aade31a2203e0f0d,2023-11-07T03:18:01.050000
@ -150709,7 +150709,7 @@ CVE-2020-16005,0,0,1eefc63c79dd2c5a2fe15b59f5fd48d63f98b41db9102baff36e6a4dcb03e
CVE-2020-16006,0,0,dc95ab3ce97a38d13db1b04a1dc9dfe8af72e050379c9a86645d6e71bf34c759,2023-11-07T03:18:01.650000
CVE-2020-16007,0,0,18d8340255f4d423d4f7e3aa89faa2195f6ad217d68aab481bf9c2eb4cf4df02,2021-07-21T11:39:23.747000
CVE-2020-16008,0,0,6dafd5b3bc26cc7b09a117afb4aaa86e193f9193244643f64605a941cadb3420,2023-11-07T03:18:01.743000
CVE-2020-16009,0,0,7202aff2bd0f67780ce67e892a94b0a56d3c69c2376b3ee8b6c9e217b6684fa8,2023-11-07T03:18:01.830000
CVE-2020-16009,0,1,8dcabce13df7b1f4f8ba04afbc0519150cd0cb9aba21259ed43e21af870e815a,2024-07-25T17:26:01.377000
CVE-2020-1601,0,0,8e8751d017b5350d35751be8282b7622c893ae821434c4639c6159998dd6bcb0,2021-07-21T11:39:23.747000
CVE-2020-16010,0,0,f56fe519a049a9dae386a7f65d4ef4428fd3175a6f7c63a6fcff40d98fe419ba,2024-02-15T02:00:01.647000
CVE-2020-16011,0,0,6937ac689e92a20b146451c94493124864da842fa3466b617d96e6b60c09d473,2021-03-11T18:14:40.907000
@ -158376,7 +158376,7 @@ CVE-2020-35684,0,0,a209d727a7991f35ba865f23f8609d26ae3fbe5d102bd4766ad1b2aa0893e
CVE-2020-35685,0,0,ca4ed41083be14e4b6b4a2d1a160a8097654bde4d22f830b2d4fd0e8adbba628,2021-08-26T18:21:15.667000
CVE-2020-35686,0,0,bfb17b8013ec180b19b94c96b0eb292174e9b0493ab131edb5e16575a4d13910,2021-01-21T21:27:55.227000
CVE-2020-35687,0,0,4b7b6800507b653f66092fcd0a5bb7e46923deba674fabd9c4946ce1c99bd8a5,2021-02-02T17:51:04.163000
CVE-2020-3569,0,0,37625048e4f2b8d02a50a0a0fd3fb682048416cc985b8c6800b9c966e6b5d3de,2023-11-07T03:22:55.700000
CVE-2020-3569,0,1,d3a67ed9b6c436abd357e7b78284593306776b08e9e4e3fa15d893d4bc4bf654,2024-07-25T17:21:08.993000
CVE-2020-35693,0,0,fa53cd93c8e2403f51dcde1c41a20cebb5100fbdd62e3adc0be134876c6c6c8b,2020-12-31T18:31:13.827000
CVE-2020-35698,0,0,a96f86dfb51bc42ee9736bb56d7476bd181b889d0316769520930c5686caacbd,2023-11-07T03:22:01.763000
CVE-2020-35700,0,0,12b68552360bd2e635a748835683f0a8ae6b1f47283ecb674c81851a41f08272,2021-02-09T18:42:41.113000
@ -161092,7 +161092,7 @@ CVE-2020-5898,0,0,a210287d547c106af61bd0cae8a17fa9cc3e56fb3027846310d656a6af8063
CVE-2020-5899,0,0,5892753a7d9b1052477978c83001f72500501c19e6dd18d482ed8a1d740ebf3f,2021-07-21T11:39:23.747000
CVE-2020-5900,0,0,b181a976cdcd2221abb6285ee83a522c66630492d867536c319a3423d2bc6866,2020-07-09T14:33:49.790000
CVE-2020-5901,0,0,05e81688aecd5872466abeac1e73450d1d8585b211910754ced758d7f01aa577,2020-07-10T18:44:08.297000
CVE-2020-5902,0,0,f2ac8d0f0b98a0ced240dc182847fab78c9abe90e2a249357ed70a2d932e9ab2,2023-11-14T03:15:07.810000
CVE-2020-5902,0,1,42d888daa8db8716be5ca00ed0683735586128f3063b9d992d6184ed236b51f0,2024-07-25T16:42:50.637000
CVE-2020-5903,0,0,e56fcd0f2a84fbcc3ac35bb76636607cf6637110c71036329c6579ca0cafd4be,2023-01-27T16:36:04.160000
CVE-2020-5904,0,0,10bf0b665f2f9e55bbfa23a1f336a88a0adf0a9dfafd626e1341b0d792a4c7df,2020-07-10T16:16:10.080000
CVE-2020-5905,0,0,112a7c9b0199f062b9637cf35f9d7cdad48da1d04ba5fa57331683d621ac3acd,2021-07-21T11:39:23.747000
@ -161556,7 +161556,7 @@ CVE-2020-6414,0,0,bc3807260c539f3f9f666fd2d9b300a756ba3591a908459a42b324b092270a
CVE-2020-6415,0,0,54a650e37ebb3002a888e099bfac75e7eb47aed88b97494b44239550b409c017,2023-11-07T03:24:18.717000
CVE-2020-6416,0,0,81585a90d5b95f5f9e38b644a14901e07a6f26d9a39081d203109f3100ccbfba,2023-11-07T03:24:18.830000
CVE-2020-6417,0,0,be14debf5963498fbe0098e1587b6ad688f57a22780b7020016796ce6add7c0e,2023-11-07T03:24:18.920000
CVE-2020-6418,0,1,9e857e952336da5b7298994fa11f033d94aa84c4cea7e607687626da887f2377,2024-07-25T14:32:38.550000
CVE-2020-6418,0,0,9e857e952336da5b7298994fa11f033d94aa84c4cea7e607687626da887f2377,2024-07-25T14:32:38.550000
CVE-2020-6419,0,0,db56611e11ecc78712dc5385ebf65ed38bec89bd2292c31bc8015bb877ca5056,2020-06-04T17:21:05.410000
CVE-2020-6420,0,0,aeddcd3f7c1de5379f305625562338eae9d243377cea0f1773b4d9b01a8005cc,2023-11-07T03:24:19.077000
CVE-2020-6422,0,0,eb6bad012b13fbc8fa6e1314e525ac8e91271d91afbcfde13fca61d6fcaeced8,2023-11-07T03:24:19.147000
@ -163329,7 +163329,7 @@ CVE-2020-8510,0,0,475ebbb546b3a4b81eb4201a706f2ecab806d24b2eba9965f3672028175f77
CVE-2020-8511,0,0,7e81bfc812ff1307128f80357ecb14bc4cfb07d8ea7b6a6f6f4d23c1bd0419c3,2020-03-25T16:08:51.920000
CVE-2020-8512,0,0,9163301b7fa2725b88ea2145a6c31f4a80c729ad8a1601319732bb5c88c4cd46,2020-02-04T04:15:10.777000
CVE-2020-8514,0,0,617b8ab25547a94d2c99206b3e9a2d056773c3db7554571b8877decfd5f4ceac,2021-09-08T17:22:36.363000
CVE-2020-8515,0,0,c76cbbc540d4ef040215290e029481c1a6012e4c65865e09f446c718db3a7a22,2023-11-07T03:26:36.773000
CVE-2020-8515,0,1,2c24877dff5a68918030470a17d589709bfb9931adbeb121c95f1c41a07023c7,2024-07-25T16:40:16.430000
CVE-2020-8516,0,0,c40d40cb374b73914db4840dea141cc23979f465002a4bdc009b78ac8aeda75a,2024-05-17T01:51:05.390000
CVE-2020-8517,0,0,a498d67ba21ac44e3aca797b4e058d287c7a2fa7698e39c32b040dd6b35bce4e,2021-07-21T11:39:23.747000
CVE-2020-8518,0,0,42cd734f5f36dfc00c9c06243fe80949c3cecaa71c2f93ed2e9b35e2e2505e2c,2023-11-07T03:26:36.897000
@ -165840,8 +165840,8 @@ CVE-2021-1492,0,0,a69047622f80854df4ebb0282bbd625633a27bc29349c6dd23618cf9df0f72
CVE-2021-1493,0,0,1972fe993c347c9cea2e8eb1cb5110425f1d779b9b88aa05049e99c9a0ad82af,2023-11-07T03:28:25.657000
CVE-2021-1495,0,0,dc2985faadbc016aaf69732c00934b0bfe0e76ad4afb876f2b4d3c9fce405acd,2023-11-07T03:28:25.833000
CVE-2021-1496,0,0,8500d9350f301c5993471cace6bdea0ff38e1db7d30046ec6244f4d3b6c4fbb0,2023-11-07T03:28:26.017000
CVE-2021-1497,0,0,209bbb651526f56b0f31bb43a5c6e071fcafe6cca92dff8e409a0d2edca91a59,2023-11-07T03:28:26.200000
CVE-2021-1498,0,0,5752cde477bf0bf780e76b3b756770049133f022055ce53dc827246799aaba07,2023-11-07T03:28:26.367000
CVE-2021-1497,0,1,7aff829bd7102e7218ed7977e28442b8bd5c83b225095b13fe23f759d2a734f0,2024-07-25T17:32:35.267000
CVE-2021-1498,0,1,9cae6e23b1c4245a4279f662cd247dd2d0a151997369b562b13e8ccf4f05461d,2024-07-25T17:33:21.813000
CVE-2021-1499,0,0,e879e24465aa7fca6949f11e8238d250d8a531bdf170a4ec220df1a322c7a586,2023-11-07T03:28:26.697000
CVE-2021-1500,0,0,bb931793c6d604e6d6750714ca468123ca155ce465d1696175237ca9408e9c25,2023-11-07T03:28:27.010000
CVE-2021-1501,0,0,069ec510eea186164e63023dbc0b51be62d42a69f6ac21d6ce230066badac246,2023-11-07T03:28:27.190000
@ -166064,7 +166064,7 @@ CVE-2021-1728,0,0,724ef1946af97ccb6b477969520582b5e76e2551cdb218cd4307bcf8e3c5ca
CVE-2021-1729,0,0,6ff4559f3dd41c4b4a06faad170a4d61f76da2e4cf79953704051e5b7dfcd511,2023-12-29T20:15:48.390000
CVE-2021-1730,0,0,c3a3a1dffd720131414db1262d97480781cb7ef76ec0a7cadfbc7522f00ce8c1,2023-12-29T17:15:54.757000
CVE-2021-1731,0,0,01e5f6b0c05d7e9a256fd9b5d639cebd134b96ffba95c21fefdab28d0da25b4e,2023-12-29T23:15:26.257000
CVE-2021-1732,0,0,c4c2c181fdd319229e8ddd3ce2ecc85d61f69332e44f0422009b4f7f38c006e5,2023-12-29T23:15:26.480000
CVE-2021-1732,0,1,423a585530ac2ae3addff4fe3667128664ba9778c2c0d9ed48c71f32b62c565d,2024-07-25T17:53:12.640000
CVE-2021-1733,0,0,30be57a87abb239c67ed7b6494886c379e293c6b264083083f6cc65201cb944d,2023-12-29T17:15:54.940000
CVE-2021-1734,0,0,5196a2f45cf179e342124c5d62f6bf56dd0958dc06cf5f763f9e44983f68b831,2023-12-29T23:15:26.687000
CVE-2021-1736,0,0,68673b9e3b64548381256e44d4dd43ff5b0c9d866164fd9df4c7d64ea9900c0e,2021-04-07T20:14:31.293000
@ -166384,7 +166384,7 @@ CVE-2021-20087,0,0,028dab5989d5dc5515f8f72e8d28b11ea19f1995a0b792bf922869fcd3a9d
CVE-2021-20088,0,0,26071b4e134d5eb32ad92ab1b298b7c51add36ac288c1be4295041f179dd4fa5,2023-08-08T14:22:24.967000
CVE-2021-20089,0,0,0100cd665c2926a4c293124c078d0736f7d6fdbb99e38bae87c9fc2b3d1e63b8,2023-08-08T14:22:24.967000
CVE-2021-2009,0,0,99918b47f62ac1a87af2661bfb9ae5a93a078b9d2a0e9741a5eb2af183fcad3a,2023-11-07T03:32:46.483000
CVE-2021-20090,0,0,3ad0d2933b69c0718fdc9b9343bd2f6e043a41a13dc8776fd27a60e9226a671e,2023-10-18T01:15:24.427000
CVE-2021-20090,0,1,28d384954645eaf349900c802a77e5fd35eb2a7e4911eee2b8c424076086a66d,2024-07-25T17:32:27.007000
CVE-2021-20091,0,0,3e46740af7074c5c09a92ee3c4c1d132ca2d9066065fe96ad60376d9066d5d51,2021-05-05T18:01:58.707000
CVE-2021-20092,0,0,453d308d2c7b37080f234df89039e15950d4a82e60b3d557de91a129aa774279,2022-07-12T17:42:04.277000
CVE-2021-20093,0,0,388df8fe8b7b299103a1daad33c7a8637a6d9a11d01aef9d8aa0d6b3f7bd7107,2022-10-06T17:43:33.530000
@ -167361,7 +167361,7 @@ CVE-2021-21144,0,0,9cf8c9cd9d31fc1da56de80204a58f7b792a938b7194e4a6abfa16d78e993
CVE-2021-21145,0,0,e3b1ac15f7436736d8645ca665cb41a076f6ada78f4209aab5d274de2022d080,2023-11-07T03:29:33.073000
CVE-2021-21146,0,0,24cd503e14d267e833dddeb60bde5038ead6213f67d620fb095273b8ae26b31e,2023-11-07T03:29:33.307000
CVE-2021-21147,0,0,89f0f04794a3398bf43aaf862e087f1634be96453437dc8d3c68a09fb59eefbc,2023-11-07T03:29:33.377000
CVE-2021-21148,0,0,93e867b8590a04e8d6a7a1ceb7ae224967e9593200e601e2c31ef0e021ba5d88,2023-11-07T03:29:33.490000
CVE-2021-21148,0,1,3322b5eb174169a2d6ce0c1a4451c87e479adb61dbb6252ca6fa4b3faae207a9,2024-07-25T17:52:35.147000
CVE-2021-21149,0,0,9db8b9192a6c67fe32784d1532243163780de3ca45a284280cf35a36da6853a2,2023-11-07T03:29:33.577000
CVE-2021-2115,0,0,2ddee9cee312db757bf31e6f8423258e1658afa92bc9a21b52814c9fe94f60dd,2021-01-26T16:44:00.987000
CVE-2021-21150,0,0,bb030ec265145171e23d5a38360708b42026fa6c948be3bf11451cdc221146d8,2023-11-07T03:29:33.713000
@ -167380,7 +167380,7 @@ CVE-2021-21162,0,0,df5de8ee00ee1a611596d8a5fac6f172e93593ee340ff3e4f562a85277001
CVE-2021-21163,0,0,a3a27a5f548f9bb44f266a5db7f2de7354b7e00cb5dbc212753e61429e159d20,2023-11-07T03:29:34.647000
CVE-2021-21164,0,0,57418603312eec07dc8f5737ce50511107b20ee31a26cb1a230d3a48d910197b,2023-11-07T03:29:34.713000
CVE-2021-21165,0,0,dfc3318e9c0f6954948d5bab5198767d23a1a097483f2b969a9223ce8c4a763f,2023-11-07T03:29:34.823000
CVE-2021-21166,0,0,a52b50c60477af2245e62ace289d934d3d42b6e64480d95e17751fdfcb0d73ec,2023-11-07T03:29:34.903000
CVE-2021-21166,0,1,dc325eb5112716e9f78be458dab7952bad58cfb21c32c002000ce669069d7e9a,2024-07-25T17:34:26.050000
CVE-2021-21167,0,0,1acc7636f4bdb96b74df64633a9a8a36b6375b2ffd494d34e5ccf19aa4f76d8b,2023-11-07T03:29:35.083000
CVE-2021-21168,0,0,bf394be333b7304681a918a51ee592100597fc14bba861a2382be50d58f9f34a,2023-11-07T03:29:35.150000
CVE-2021-21169,0,0,878d60b043f2ddf46248010c5ddb91d4b37d92ea9373cbccf65d15327d1be153,2023-11-07T03:29:35.220000
@ -167424,7 +167424,7 @@ CVE-2021-21202,0,0,27bdbbd1ca292ef2c56c6f695cd192dd6525e9aedffb89abba3690e7c668f
CVE-2021-21203,0,0,722404ba7c75eb9e85bb8b696732ee4885778b708306d69009cee44eeb7c2ae1,2023-11-07T03:29:38.257000
CVE-2021-21204,0,0,7dd56403820d20a4da984d7b3cefdd973d0d3aa1f0a589a82a915d17cc2ae7c5,2023-11-07T03:29:38.320000
CVE-2021-21205,0,0,652d2811d3014118ffec31275197431b88b187fa5ac52b7446ca0e6f1b04cdad,2023-11-07T03:29:38.400000
CVE-2021-21206,0,0,9b34d2562e66fec8288102a6184ba1c3e14f412d35c21eeba968137123fb5172,2024-02-15T02:00:01.650000
CVE-2021-21206,0,1,28e489f5602560ad54e341e2bf168ff63586446918109a7b5af054cb08d8bc1d,2024-07-25T17:31:14.790000
CVE-2021-21207,0,0,c365db0056e4067c3a09e695bd28e67f352aec03ab0ee59a0909524eedd139c8,2023-11-07T03:29:38.587000
CVE-2021-21208,0,0,46436fed128ade9312bbd79228e0891fd4b091b23d0f9ae9080436e89d70e986,2023-11-07T03:29:38.650000
CVE-2021-21209,0,0,45d7488ef5635907c68ba18008ebb8aac2dda00ba679a691d46a6d2b5b65990c,2023-11-07T03:29:38.763000
@ -167440,11 +167440,11 @@ CVE-2021-21217,0,0,54ba9a26b2a73120481057913285c9ababb07dbc6ad7c6955e25f2fb07233
CVE-2021-21218,0,0,b64a1ce2627baaead86a0d8a5662d2d81a7b28be8b74c51f89bd8341f0b6dfbc,2023-11-07T03:29:39.580000
CVE-2021-21219,0,0,252b81eb5e9b92e3d0d7870781c5036eeb1ba8194f5557c6ce804ee46ca55f30,2023-11-07T03:29:39.680000
CVE-2021-2122,0,0,ac758c903eb842fb3c64d3dfd2c7c937d01dcd52dfec54de5d7f0d1b2d410d52,2022-01-04T17:09:06.060000
CVE-2021-21220,0,0,4864548048af2874f44b26b65fc7d2fcfd772616513b03852e20143ed8f4699d,2023-12-14T16:15:43.700000
CVE-2021-21220,0,1,b4c393c55c22159075153899392e8069828ec05d50e9b540fc10a8386b849e0b,2024-07-25T17:31:21.870000
CVE-2021-21221,0,0,44f0b75c03b24f52f134fe14c0b77b90047bd1c89a7b8c4d85a242e42d284e8e,2023-11-07T03:29:39.900000
CVE-2021-21222,0,0,00d2d001be4d83b9ced5bf073312bf6399f90ace9384bbfa2bfeab6fb8756f6c,2023-11-07T03:29:39.970000
CVE-2021-21223,0,0,c3daa6f22748d50a82b25e565c9f52b4dcde7fadfd90d978a17c418a94af04be,2023-11-07T03:29:40.093000
CVE-2021-21224,0,0,d80af276eb8bace8cec6a8341cb5090b4cbc5a09c24cd2bbfdd5987c61a12fe9,2023-11-07T03:29:40.187000
CVE-2021-21224,0,1,8d8fc09674b6ef79ebed5732b3bbae230fa57ee1f009752e919de55d453b87c3,2024-07-25T17:31:25.827000
CVE-2021-21225,0,0,b33957d20d35447b16639448d1f70f5c45987c0da3f9253355374aeb6bb71d7c,2023-11-07T03:29:40.273000
CVE-2021-21226,0,0,19fcd2c251f2ff4ecc33deab53b3dacca64e6db280da0797de3baf402fed60cd,2023-11-07T03:29:40.343000
CVE-2021-21227,0,0,a42ca2b78c05460ac80e61789a06294bf6e4eb67085f8b1e3331be54c98fb32c,2023-11-07T03:29:40.430000
@ -168704,7 +168704,7 @@ CVE-2021-22498,0,0,27abaee56acba5494ff8627c0d0e38543f9d76bc9eebaaee7e0459aa75ab9
CVE-2021-22499,0,0,70c055aa31b37148dca64de83c87eeb1f43d27137b2496f17ef113f50d4824e7,2023-11-07T03:30:14.067000
CVE-2021-2250,0,0,3a87a38ad4938462c03de55ab516a234235f4da6cfa48a3f28229d40f9d4b95e,2022-09-23T13:27:38.033000
CVE-2021-22500,0,0,bc568527a8f921b7d318316f66d48f00a67d6993e13f79bedaa2128449593258,2023-11-07T03:30:14.327000
CVE-2021-22502,0,0,a0d1a7a623cd19cc30ad0806c7e93741ba1ff0e38352188af7ebc5fc53e94247,2023-11-07T03:30:14.610000
CVE-2021-22502,0,1,e32c3dc7dba463b0f8bea66cf991a2b26228941d3e9adf82f206da08b4cdfa6c,2024-07-25T17:52:31.453000
CVE-2021-22504,0,0,a934ec069d5c4d2c90c76aac69d1c73a45459029286161b251ecd4721d8c8e93,2023-11-07T03:30:14.997000
CVE-2021-22505,0,0,675e854cabcaeacf3b78a58593a856837df3f64f635c2f4dd4c947fa88d2f6f3,2023-11-07T03:30:15.257000
CVE-2021-22506,0,0,a8b9c00fcc307ef934a8577b373b9f5f5a38d82950f3fc6ec2a9d19ada58949a,2023-11-07T03:30:15.533000
@ -169676,7 +169676,7 @@ CVE-2021-23863,0,0,dbfe1b279d5f7b11394285ce2774ce75ffe818d4a2a971a98059d6a7670f8
CVE-2021-2387,0,0,911d964b708237f1a58323dbc755646882e56b656bfbd0c9cf1606aba7c282ce,2021-07-26T16:41:20.203000
CVE-2021-23872,0,0,a7164d0398b10bc63f6b2bb532d562293060c0dfc0d2e3e23faf4e11f9c7d8a7,2023-11-07T03:30:55.530000
CVE-2021-23873,0,0,e87bc345e14d4df0d008b245894f79651475d46c5d313940546c7f822f88a284,2023-11-07T03:30:55.750000
CVE-2021-23874,0,0,28411f14e1d1f9061f1f410589e924885dde87f21dc9e19e07830e7b5a42de76,2023-11-07T03:30:55.993000
CVE-2021-23874,0,1,b085b1ebbec791caeb37a22c91dfb3acc0c0f7ad19ac65370a59a0d59ff342e1,2024-07-25T17:53:02.490000
CVE-2021-23876,0,0,339841b790d0b872bbb68cfd37abb0b710e5f6cfbdd1c677ffa997ed45a651b7,2023-11-16T02:22:30.853000
CVE-2021-23877,0,0,2ee425b3b880c2943f3d4ba16af7aeca1f8f746fb0ec800ca19267ddf27dd978,2023-11-07T03:30:56.427000
CVE-2021-23878,0,0,0663cb0d8d9192663fea0e1b2389fe27d9e5476a99c1b6e89bbc48958b1048bb,2023-11-07T03:30:56.667000
@ -171795,7 +171795,7 @@ CVE-2021-26406,0,0,a2d9530227d7d0a9e69845ea22b7481931dd718b51e408672674112a6f574
CVE-2021-26407,0,0,5b71acff303921c7eeee407ba9f34a80d4f61d6b4693ace50ea09b5a7cb9d017,2023-11-07T03:31:44.963000
CVE-2021-26408,0,0,a56d3b1c28ac53b39399acfde11f93e9e25809951d55fb46826068b6d43854b6,2022-05-17T20:18:12.863000
CVE-2021-26409,0,0,08ca624f9c078109a561b30b9749cde67207d2ca559269c9dd56a875d07aa0d1,2023-11-07T03:31:45.023000
CVE-2021-26411,0,0,8d3591786789364d40c47ec8673ad12175b0f98c5f3ada573a98d1cc753de38b,2023-12-29T17:15:59.767000
CVE-2021-26411,0,1,a6a9526b0582961a44cd57ec9609957b17bf4e6c97cfa752c1a12f1229b635a3,2024-07-25T17:29:04.120000
CVE-2021-26412,0,0,78e0c241ead586c54fe09866202695b99df0e7a65ea050b144296cbceee440c2,2023-12-29T17:15:59.983000
CVE-2021-26413,0,0,206935f01f2bc81eeff44306c7e592635d0edc8a78bbe151d9291b503a29b221,2023-12-29T20:15:49.243000
CVE-2021-26414,0,0,5944f20cb990bc8eaf3664b08897f2d92bd11f4f798b69c7b8bc9e6e22afdccd,2023-08-01T23:15:11.387000
@ -172036,8 +172036,8 @@ CVE-2021-26844,0,0,a186a88c621b9734225d4ec1ac4c09a9b37ca74ccb5bc38caa5a6ea4f9a0b
CVE-2021-26845,0,0,ee4adca810fc9655398c58c8441b9563d091a2814810290cea5f2e3800332aef,2023-05-16T20:21:29.777000
CVE-2021-26854,0,0,bb8a187eda545749f2140d803313d1196f94a8acb887db0aaadcb4db9869c2fa,2023-12-29T17:16:00.650000
CVE-2021-26855,0,0,1fc495f9fd41fe73f9535590304cfe46a751d419e57fbfea7458a7e2b8ee2e84,2024-02-15T20:18:22.123000
CVE-2021-26857,0,0,ad9dac85666399e3bd92aaf5103c3a77b99aae9576001ccc309b27d9ba86ec21,2023-12-29T17:16:01.073000
CVE-2021-26858,0,0,1e20b9f02cd81acf0031e892f87a10c05d8f5e244116cddfa5b2218f4920f7f8,2023-12-29T17:16:01.327000
CVE-2021-26857,0,1,ea414a49d5aa4cd3bbc5c5ddd299fdd84b6f4a5cfedc6f23cc9dcfd3b8378a77,2024-07-25T17:53:21.247000
CVE-2021-26858,0,1,708f9d97151f01b7b2714b50a79f075ef9ab04b2ccc2cfe45a6cf02cdb632b59,2024-07-25T17:53:33.987000
CVE-2021-26859,0,0,b9ec5662f8de0f5035f0395ab8ef3e31081123e2b624d9330057eb8da40f0580,2023-12-29T17:16:01.557000
CVE-2021-26860,0,0,9f9408c12c6a278705744770ed24b31ea578dff3117b9b8f58046a790b661e62,2023-12-29T20:15:50.110000
CVE-2021-26861,0,0,f8e114ad93fc307a753ff702a57f7fe7effacef5ba251b63f91c9b375c2c2e10,2023-12-29T20:15:50.297000
@ -172214,13 +172214,13 @@ CVE-2021-27055,0,0,e1b0091e34b26a6c1ec65e212900dbaf30ef222e35009d946741ce7e6c377
CVE-2021-27056,0,0,5444193f26d216af949f9893845d1963ac44e45bd432953ee1f609321fbfb4b0,2023-12-29T17:16:03.677000
CVE-2021-27057,0,0,5ccece865212bb59ca45689860c29efabc849f8d4723b6ce3914d821da086047,2023-12-29T17:16:03.877000
CVE-2021-27058,0,0,e5cbdbc4ea8414c2572e92a7c0080b7f74d0cc54d6d6b019bd721a8e3b1f1372,2023-12-29T17:16:04.067000
CVE-2021-27059,0,0,eef1fad6b08cc3cd49d687cf36a69c106658c967bdc7942a53b392f9dbeee137,2023-12-29T17:16:04.247000
CVE-2021-27059,0,1,0a7f76f70523b85c3dad8e30c48f7a16872088303902fb2ae4ae5c9d09340ad1,2024-07-25T17:29:45.397000
CVE-2021-27060,0,0,4aa8e3b52c896852b66c590806306d3b2c3c009bfe16745d765716616a51808b,2023-12-29T17:16:04.430000
CVE-2021-27061,0,0,15890f46643314932b6274ac0e7b0ac109d0576916d5bec8772d10e429bc5bd0,2023-12-29T17:16:04.607000
CVE-2021-27062,0,0,336253f4217089e1937447be48906269a32c1ef6ca276e6c09ec8834e40502ea,2023-12-29T17:16:04.787000
CVE-2021-27063,0,0,65e7d09e44905082d01e617cebb57b874fa4fe3842ebf3bc1a678e1dfaa658d4,2023-12-29T20:15:58.440000
CVE-2021-27064,0,0,4171763a7d4764355a75e117dc83148c66d75b61ebd6c8fae2588b35fac3dd8e,2023-12-29T01:15:38.447000
CVE-2021-27065,0,0,28b43adb04644bdcafc2cd893eb2cf4510aeea772acc0f27e16bb3cf4b013e9a,2023-12-29T17:16:04.983000
CVE-2021-27065,0,1,62324817993a50662aa74c0f4008ad84797e79813a44c50c64943625f1d9c6da,2024-07-25T17:34:21.940000
CVE-2021-27066,0,0,5cd1890bc05adb7571f325cdb927cfe8da3c14469fedd8f738924ad032f6cb16,2023-12-29T17:16:05.190000
CVE-2021-27067,0,0,b088e873d0e6b9b13dadcd2a46b03c0ef0458a4f21212f87263d8d0066f17983,2023-12-29T01:15:38.650000
CVE-2021-27068,0,0,fbed421d3236e88b3fa3e69a0932e3ba76aa8abde0226d69a5b3762cbcc37554,2023-12-29T00:15:47.750000
@ -172237,7 +172237,7 @@ CVE-2021-27081,0,0,fd83d6df496d185ad5f7284af0fa99df0a8b5250fc40021d28de2fa5ca2b2
CVE-2021-27082,0,0,d01468e6e451d0d88fcacd22d7533dffc77317f18656eff76a392aa5fccce84b,2023-12-29T17:16:06.610000
CVE-2021-27083,0,0,11c4208e1f97d957464f201b8c5effc5beed722ee59b8850b82b9c0a479ab255,2023-12-29T17:16:06.780000
CVE-2021-27084,0,0,e38a1ab8c860124bcada0778f32341acf9bdc4c38119faf22fba44efa00218dd,2023-12-29T17:16:06.947000
CVE-2021-27085,0,0,2d5f1d3cebb61a885d8107ce309cefc508621d704b101e898a3ea13293a589bc,2023-12-29T17:16:07.137000
CVE-2021-27085,0,1,4b4dac73c1660c3eef682834a8309d8d1105776c358b48aa8dbef6aeb4b8d11e,2024-07-25T17:30:49.863000
CVE-2021-27086,0,0,2c54519f7823f6c7fe4f1d89c2076fee3fff4d6b0c47d3345dd83406ba6d2315,2023-12-29T20:15:59.617000
CVE-2021-27088,0,0,1a46e5c76ebf0a9a59571e0689b457d0adac5dd478db3745a7867dfa4bdc3469,2023-12-29T20:15:59.813000
CVE-2021-27089,0,0,7f72d0c5b374a87b36b3757c2a133cef6aff850d879abdf077085207760f56e9,2023-12-29T20:16:00.017000
@ -173306,8 +173306,8 @@ CVE-2021-28658,0,0,10240e8932be071f64b4d7ceed1e91e7f062e6003dbac0fc4e86da8e120c1
CVE-2021-28660,0,0,37dd1ac15f6bfc5905c8cee7cb65edb18da857d6aac9dd47852bf8d4c8fd5627,2023-11-09T14:44:33.733000
CVE-2021-28661,0,0,305c2bbe1579faf986356b3383f915c0a456f3474023c19856e9b6f20a6beaf4,2021-10-15T01:53:15
CVE-2021-28662,0,0,cea384b692d24de8092d9d160858a16e48ac42a91a4bc999dd6627163feb91ca,2023-11-07T03:32:18.137000
CVE-2021-28663,0,0,8aa3973781e1bb618aeaaffdb213b0f9cabb7e25617c43f2e83b42251f0172fe,2023-12-13T13:51:52.563000
CVE-2021-28664,0,0,899685542497ab063186da3b6fb0d6d6d7221203b4f9156b73f61dfa8652596d,2023-12-13T13:51:52.563000
CVE-2021-28663,0,1,3111805e33df7854c014956f0c15854d9547c855507a13752f4e3e6d545b5ef0,2024-07-25T17:33:47.580000
CVE-2021-28664,0,1,e5bcccc2bd506ab6b3600c389c3b4f5b03283589ad0db7b7f46fc6378cf228db,2024-07-25T17:59:50.377000
CVE-2021-28665,0,0,3bd907d3d23a03b2b014d35e71d71cd61a30be665ae5c6583c4556d40847301f,2022-07-12T17:42:04.277000
CVE-2021-28667,0,0,055fa8c06183fc89d048f9424e212a5e038d60254dfafa0d7be08895557719a4,2021-03-25T13:44:17.310000
CVE-2021-28668,0,0,ed7dcf87e75b8ae4d7b382fdbb2de958df5ce187a5a6bfaaa53419dfa817c185,2021-04-01T18:30:27.737000
@ -214028,7 +214028,7 @@ CVE-2023-1707,0,0,a7b460eb62f03673fa2dd287c4e7dedfd8b551c0e58529601049970f0f80c8
CVE-2023-1708,0,0,0ed72b996f607824503e7071ef24a77423413405b22a844332a3120a4d0ee678,2023-04-12T19:20:07.090000
CVE-2023-1709,0,0,9fb6b8c8fc98c4126c2c2fe72eaa35a7b6c9f6232eefcbd3ba11e5609c219347,2023-11-07T04:04:41.863000
CVE-2023-1710,0,0,c155b486a1ce825fb81080d9a172401b3b0404c7d801e43dd529b57046496d6f,2023-04-12T19:16:09.267000
CVE-2023-1711,0,1,2f5d97a1ceb3d9f9271b448468502401aadeabcd1a78b59b09d628b87d598160,2024-07-25T15:45:03.690000
CVE-2023-1711,0,0,2f5d97a1ceb3d9f9271b448468502401aadeabcd1a78b59b09d628b87d598160,2024-07-25T15:45:03.690000
CVE-2023-1712,0,0,92918993d0bdf5edeb136a91e73652f2a279fe85dd3cfb4085264b400f984893,2023-04-05T13:37:27.220000
CVE-2023-1713,0,0,e96305c1a21f1bb528900658f6d91c6bfd2ea7fd111165f45aad85b4f0eea423,2023-11-09T20:37:42.650000
CVE-2023-1714,0,0,d96a18d929eaafcda336752f12112e0531bba0a7b74116cb68dea17eeddf87b0,2023-11-09T20:38:00.327000
@ -223461,7 +223461,7 @@ CVE-2023-31412,0,0,c222bd11456f18e62aef7e3454f47776f6d36c7af1e68f5fcad10d5def1a6
CVE-2023-31413,0,0,0cc8624a68339ce38f38d7fbbd7f26f96523fdb324f20fe50f0ba974c7dbb12c,2023-05-11T13:56:23.657000
CVE-2023-31414,0,0,28d414d378160e499950ea6993f392d7c6fbd1446465ba45817e20a264c5b7b2,2023-05-11T13:43:42.117000
CVE-2023-31415,0,0,2b477b311ffb53cf567766f234a3b9b2a6f72427c47f432baba60ea8caa16db1,2023-05-11T13:38:07.060000
CVE-2023-31416,0,1,c527d5c88b4288f57349f4e7665d978a9e5a6ef1be1457f29ad929a35eeedeaa,2024-07-25T14:21:30.457000
CVE-2023-31416,0,0,c527d5c88b4288f57349f4e7665d978a9e5a6ef1be1457f29ad929a35eeedeaa,2024-07-25T14:21:30.457000
CVE-2023-31417,0,0,4d6db88f8a30dbf9b9dc91d7a56a466226e8c02902279ba56177303d2ad47677,2024-01-03T19:02:34.430000
CVE-2023-31418,0,0,2c9cd98e6609b770c9a4c4d9a8d3db88029e2951bc2134fd0947f56eafbbd095,2023-11-30T22:15:07.810000
CVE-2023-31419,0,0,1d843126a6f04e6d9e9d7dca179079d1db9434f05deae31bef420109476bc8b0,2024-02-01T02:16:30.827000
@ -242074,7 +242074,7 @@ CVE-2024-1390,0,0,f2a25975c3042e30a42c5fcd19f4c398992a4b35179f84e0b51a1c441a4e4d
CVE-2024-1391,0,0,50e2fbe1cc7d386fd26fed3bf083598946d64d5314a6236ebb9200766cf4f837,2024-03-13T18:15:58.530000
CVE-2024-1392,0,0,8db7abe472b85e00e4ae726e30591de82c7d16f05d2f6d5459004c50d152a5c0,2024-03-13T18:15:58.530000
CVE-2024-1393,0,0,4f5797aa4dbf368118dda7b12f73418a8cf88d40cd13e8c8978941ce6c41ad41,2024-03-13T18:15:58.530000
CVE-2024-1394,0,0,2cca7b7e5b4353a646f6d26371296c26120a2f83d3de05d4698053b1109151f4,2024-07-23T22:15:05.363000
CVE-2024-1394,0,1,3ad98461de2bde3a6ed0e6bea10034833203f18d18a912e4ec6ba17c366fe2a6,2024-07-25T16:15:03.637000
CVE-2024-1395,0,0,9f5cead23576320934b06ae7650426cd28c58ea3927d599eb3ccbebbf15a3072,2024-07-03T01:45:14.570000
CVE-2024-1396,0,0,0697e623a8579806097bf49373d31640770e9cf97f78e16b0038cfa8bc55a349,2024-05-02T18:00:37.360000
CVE-2024-1397,0,0,8da6b20072e696017f2fea6d653b85b1ce227e84921025d1f452d353bbc1383a,2024-03-13T12:33:51.697000
@ -244323,7 +244323,7 @@ CVE-2024-22440,0,0,3d70b2afb8c1daefa939392497f652da82a7db6224ab8e08ddbf5f360293d
CVE-2024-22441,0,0,d974db705829cf05b22e157df217440dd5d74842713d9bc45c9eb02f022d665b,2024-06-13T18:35:19.777000
CVE-2024-22442,0,0,6cd8943b606f82f9805c763a4b9ec31735cf88cf76efca2ccc718cdf40618170,2024-07-16T18:00:02.110000
CVE-2024-22443,0,0,c52632f4bcdeeb28d6bc6d5cd24263b0884e03dc4419b129318aba75fed40931,2024-07-24T17:12:32.367000
CVE-2024-22444,0,0,45372a2223b95716cffc76bfc8a6d86ecfe275858c4bb765e202a696dfd6a002,2024-07-24T17:12:32.367000
CVE-2024-22444,0,1,3825beb25185b939e72fc391292cfe01dac514d92713490d6fa45c5808dc7620,2024-07-25T17:46:52.627000
CVE-2024-22445,0,0,a6af5c7306e37f1c831f19f1accec343bae2ff2fdb348ced0577263d09a6b8e1,2024-02-27T16:51:44.013000
CVE-2024-22448,0,0,8e90df505cef41effc57c679101495cb231edb0790ae704dce635c915090456b,2024-04-10T13:23:38.787000
CVE-2024-22449,0,0,f33d4db580b05ecc377b9d7d6de8d5383f1a67c4e1bbff2a1ad282c40aa707a2,2024-02-03T00:30:30.737000
@ -247456,7 +247456,7 @@ CVE-2024-27133,0,0,6574fdde089b4683da8bd06069d4a01e27d182b9361898f9a2a8686337a25
CVE-2024-27135,0,0,8f681cbd0423d5edcf1af419653a19c055e013668588c5e21fc1acd9f7af97d0,2024-05-01T17:15:30.087000
CVE-2024-27136,0,0,95371c097b782a9c3eb2e668bc7e52a3add3a0ca964de3d4fb22468a7d6fe516,2024-06-24T12:57:36.513000
CVE-2024-27138,0,0,1836c82669ad670bb3a94b818c7a2afb34e113da91f7a642ffc52f477f7ea951,2024-05-17T02:37:25.107000
CVE-2024-27139,0,1,267f11a24a2cf4f0bced9e1704e452b13a7e03a87c492c5fc6b862090589e559,2024-07-25T15:15:10.693000
CVE-2024-27139,0,0,267f11a24a2cf4f0bced9e1704e452b13a7e03a87c492c5fc6b862090589e559,2024-07-25T15:15:10.693000
CVE-2024-2714,0,0,fd707009e35b2adf97d47fd45e1287d327a5720e922cfb5f98c6896a9e8b6097,2024-05-17T02:38:26.850000
CVE-2024-27140,0,0,2b44ee1fb3d2df9684d9b09c30157caf9db44c6920a8d62ef396ce86eca01036,2024-05-17T02:37:25.260000
CVE-2024-27141,0,0,057b70aa4d3ef54e41334849d6465eb42f0fa3aefe9d620f030d33f3f65261da,2024-07-04T05:15:11.080000
@ -247979,7 +247979,7 @@ CVE-2024-27900,0,0,43289950d0e6981ed8d43d7e3ee8bfbab5814f24d4206124d8ed280e39060
CVE-2024-27901,0,0,7b06fae9467006c18ceee57d1cb054462f92404e00919c92c5179777cfbbb010,2024-04-09T12:48:04.090000
CVE-2024-27902,0,0,cf303beda4f8d4d9a07f999c75e97958c265bcde9b8d48f8f915bd30d541f272,2024-03-12T12:40:13.500000
CVE-2024-27903,0,0,7a16b56caf0aadbdfc143727319a91c26c6417220b554521d1e591b4babb7dec,2024-07-11T14:46:26.300000
CVE-2024-27905,0,0,19f0a59e8f761065289fc658ee0e52bc4a2463e47ffe4f9e0b2de0e6ae5efe76,2024-05-17T02:37:34.130000
CVE-2024-27905,0,1,004207f94be0d80b2638fe4e9db3dad65e602a5212d2e74a69049b205b4fa9ba,2024-07-25T16:15:04.310000
CVE-2024-27906,0,0,97db0744843f13fb0cf1d6631e7648c6ea2ed51ac2b3c967607a8165c8586d2c,2024-02-29T13:49:29.390000
CVE-2024-27907,0,0,665becf063e38021c77d8567eafb4cfde9012aa9e5f2ff52b45354cada16677a,2024-03-12T12:40:13.500000
CVE-2024-27908,0,0,3241ca39ccff4fff26d10715dd0c806c47f3e26d7e3304c90e96bb32bb0598ea,2024-04-08T18:49:25.863000
@ -250689,7 +250689,7 @@ CVE-2024-31965,0,0,c4b61ad2f9eef097e0954fa70290fdb78da64c708fb57d0eafd0380254742
CVE-2024-31966,0,0,e813fbcff3c742b22ff3620e22028114e0bd0dc18f84922743926ac1c55086d9,2024-07-03T01:55:39.753000
CVE-2024-31967,0,0,d11e85355b08311754a29e0c672ae95e7ac529a4f49e30497f6cb09093fb91b0,2024-07-03T01:55:40.527000
CVE-2024-3197,0,0,324c7a8dc9ccea612ec0432519a90414016d01b55429c0b6dc09fc2cc5af230b,2024-05-02T18:00:37.360000
CVE-2024-31970,0,0,21aa8e8f2683c724f57644618668a330affa2842772381a1886887917836573a,2024-07-24T17:12:32.367000
CVE-2024-31970,0,1,6dfe320b6c7685f7f66ae6d28a5499869f91f51c0a0ddcd2aff7031a565e585d,2024-07-25T17:46:25.310000
CVE-2024-31971,0,0,c01103c7a27f61a563b001c647885d07de844f2c03f92bb191e43610aaea5763,2024-07-24T17:12:32.367000
CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000
CVE-2024-31977,0,0,2e845dd8e2dbf0b94e2238c6740554d5934910b7cebbf8cf7289ad0332368bf6,2024-07-24T17:12:32.367000
@ -253391,7 +253391,7 @@ CVE-2024-36108,0,0,96ea3864aa7aa12cb825aeb4159e54115a96c7432f3275236d52e71204991
CVE-2024-36109,0,0,3ea71255d409bd15051cdf17f3774b2fb655bff5470c764338e3b2b25934fec8,2024-05-29T13:02:09.280000
CVE-2024-3611,0,0,b6dd7cd7d7815f4cbb48b9149fec55f286cfb6042c7393dd23d868b1e93589f9,2024-05-22T12:46:53.887000
CVE-2024-36110,0,0,ae199b3fa22fadc918d8c236ca5c5c8f2be6b34351afd72d5f50bac8a0f84267,2024-05-29T13:02:09.280000
CVE-2024-36111,1,1,15856eff599297894421df92310438cb921809d56a7ead804c7def387a582b25,2024-07-25T14:15:12.650000
CVE-2024-36111,0,0,15856eff599297894421df92310438cb921809d56a7ead804c7def387a582b25,2024-07-25T14:15:12.650000
CVE-2024-36112,0,0,3d827ea0c3eaea362d7174c518f3ef1a48183f26c82b6430e889bcf33729a066,2024-05-29T13:02:09.280000
CVE-2024-36113,0,0,6bc43c60be61560011c5a869d0c4f6c363c6e119fc51a9d716fe375c402baa23,2024-07-05T12:55:51.367000
CVE-2024-36114,0,0,5e400f6e1accfe4ee34afe11a2ba03b10596fa4481251b5d420288b4320d1b3a,2024-05-30T13:15:41.297000
@ -253684,7 +253684,8 @@ CVE-2024-36538,0,0,aac4f9929cddecc0784b98831a4a3c3b2e94512ba7cc3c149bdb1ef3488e9
CVE-2024-36539,0,0,fd8e06c5a4aafc35fe5ea218ed9e25a0b2fb207d6af8477fc6df401a6d78debf,2024-07-25T12:36:39.947000
CVE-2024-3654,0,0,a7708e7e436d988a91abde36ee9f26c2df705dde9b78c457b8712b905cf4dc6a,2024-04-19T16:19:49.043000
CVE-2024-36540,0,0,6eeb37da95be9363691e64f704f0832366ea0b62d194e2d6102f1975a215f8e9,2024-07-25T12:36:39.947000
CVE-2024-36541,0,0,6a8a7f7727809c1260cd3b5c8c832484186631ab30a12c54c0721ce5292077c7,2024-07-24T17:12:32.367000
CVE-2024-36541,0,1,4e1f62504c42e12434d71fc6d5ccb4805e081fdcc1882a1ff77952e2c03095f1,2024-07-25T17:44:25.170000
CVE-2024-36542,1,1,21c32d058cd29ec4bb366408a307fea450d1ca65a702a91fe723835dae3d16d6,2024-07-25T17:15:10.710000
CVE-2024-36543,0,0,dbb1c819537d5d2e6ccb57b6fa0d1307530721c713dab080cb8c7f78417a5f63,2024-07-03T02:03:16.430000
CVE-2024-36547,0,0,63fa93ba07106c565a1033909cd3b8147be168386a42b3286a8bfe46cc4ab092,2024-06-06T15:16:11.897000
CVE-2024-36548,0,0,aff0414515c8e648334d6ef2a1bf413e6b70804d4ac2887710c25a232cc52bfc,2024-06-06T15:24:02.577000
@ -254205,7 +254206,7 @@ CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcf
CVE-2024-37388,0,0,3169d306b45a011b46c4d3fe95463302fc94255a3e5bff07d58cd00bed7bba75,2024-06-07T19:24:09.243000
CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000
CVE-2024-3739,0,0,ba8b07349fdcbf4927f1d53be7924c0ba58d0f09900d65fe34757229d7b34b0f,2024-05-17T02:40:06.067000
CVE-2024-37391,0,1,150400ee309f1fb57b79e17db94532e7f68272dc6319e93487ad1b062271d45e,2024-07-25T15:13:09.723000
CVE-2024-37391,0,0,150400ee309f1fb57b79e17db94532e7f68272dc6319e93487ad1b062271d45e,2024-07-25T15:13:09.723000
CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000
CVE-2024-3740,0,0,cf4cd6bcfe639a4f771a19ddc36f820864da86f0d9d9f91c68694d8633fab251,2024-05-17T02:40:06.170000
CVE-2024-37405,0,0,ff056e1e6b71205230bf39333b4a3618e5032f8631acafb990972570435f5468,2024-07-12T16:34:58.687000
@ -254234,21 +254235,21 @@ CVE-2024-37437,0,0,83ef1ea78c6e8ed1e0567a248a21cf468b1495feae2ba1cce072befcd9536
CVE-2024-3744,0,0,40b0f0c765c7a4ad7df2de19ce2eb9519fa9c2af93a33399e8c5730df134e208,2024-06-10T16:15:16.980000
CVE-2024-37442,0,0,78875ce6f4ee251957afe776cc270daef543fd5a212b6acf13b07c615995ce9a,2024-07-09T18:19:14.047000
CVE-2024-37445,0,0,9fbba319cef8f463ac85b5dc242e13d4dfb1be19882473540ccb367598d4c0ae,2024-07-22T13:00:31.330000
CVE-2024-37446,0,1,1c700fcd72ccaacb11c87eb1bade8d322d02aa58b87826f2e4b6fe02da4c6bd0,2024-07-25T15:49:38.057000
CVE-2024-37447,0,1,f10e9afe37ccb297979ef745150f8f06fb020e18b5d41aa2bacde586c100172c,2024-07-25T15:49:15.190000
CVE-2024-37449,0,1,9ade33135d3f6ca7bee3f73339a7862f6048411651fc6c5c343f59025cd80bb0,2024-07-25T15:48:38.073000
CVE-2024-37446,0,0,1c700fcd72ccaacb11c87eb1bade8d322d02aa58b87826f2e4b6fe02da4c6bd0,2024-07-25T15:49:38.057000
CVE-2024-37447,0,0,f10e9afe37ccb297979ef745150f8f06fb020e18b5d41aa2bacde586c100172c,2024-07-25T15:49:15.190000
CVE-2024-37449,0,0,9ade33135d3f6ca7bee3f73339a7862f6048411651fc6c5c343f59025cd80bb0,2024-07-25T15:48:38.073000
CVE-2024-3745,0,0,6c9edfff9e79c22a28b880b426148983da8f8a5db27e4bfd2a1dfcfd3cb4de8f,2024-05-20T13:00:34.807000
CVE-2024-37454,0,0,5dd61dd0d84c4b3f5941735c6171883bab82a8d9b454b6d1ba19ff534234505c,2024-07-09T18:19:14.047000
CVE-2024-37455,0,0,57b2f9feca4098778a62954cb394ad6294cd222d3c3a0a03ec9db535b59c5042,2024-07-09T18:19:14.047000
CVE-2024-37457,0,1,006d76ca2f7945a4e0f15c9687c3bbaa281863365a376188dfa2e9189c67a677,2024-07-25T15:47:55.217000
CVE-2024-37459,0,1,cbe90287ef2be027d1aa251600e674d79c2f79c2676eb4ad36f7ef9d7b69050d,2024-07-25T15:53:49.883000
CVE-2024-37457,0,0,006d76ca2f7945a4e0f15c9687c3bbaa281863365a376188dfa2e9189c67a677,2024-07-25T15:47:55.217000
CVE-2024-37459,0,0,cbe90287ef2be027d1aa251600e674d79c2f79c2676eb4ad36f7ef9d7b69050d,2024-07-25T15:53:49.883000
CVE-2024-3746,0,0,b404a3f5af28975fb4e5d0eb577c67fe9710274ad0c55beaeeb6ef81bbf0e35b,2024-07-03T02:06:31.490000
CVE-2024-37460,0,1,02e09703912f0037e6a7b662748ea365f6bf750e1f1d9f187949e93a57c95d4d,2024-07-25T15:53:23.317000
CVE-2024-37461,0,1,ded408d38861fcbe6b63893f573a02e34c5f7c2b0c402d651fb6d6421f9f6ea7,2024-07-25T15:52:32.877000
CVE-2024-37460,0,0,02e09703912f0037e6a7b662748ea365f6bf750e1f1d9f187949e93a57c95d4d,2024-07-25T15:53:23.317000
CVE-2024-37461,0,0,ded408d38861fcbe6b63893f573a02e34c5f7c2b0c402d651fb6d6421f9f6ea7,2024-07-25T15:52:32.877000
CVE-2024-37462,0,0,44cdd4da08aa3278c309c9b230a9ebcb29a8195fe20831e74a9775071dc13635,2024-07-09T18:19:14.047000
CVE-2024-37464,0,0,d5dd0cd8721de83e6db957b2a4c4526c848f707b5f4204dfeac1e6b719416e1f,2024-07-09T18:19:14.047000
CVE-2024-37465,0,1,b54ac5c991ae137e4db857985d832ab77f2e3f11dd17ec4350b94108ecaf4a17,2024-07-25T15:52:09.033000
CVE-2024-37466,0,1,bfd79fbf2cc8fe5f4b671c7b28aed23901ff778f5b74f12d79e3146f6452b737,2024-07-25T15:51:50.863000
CVE-2024-37465,0,0,b54ac5c991ae137e4db857985d832ab77f2e3f11dd17ec4350b94108ecaf4a17,2024-07-25T15:52:09.033000
CVE-2024-37466,0,0,bfd79fbf2cc8fe5f4b671c7b28aed23901ff778f5b74f12d79e3146f6452b737,2024-07-25T15:51:50.863000
CVE-2024-3747,0,0,3219ce820822d72e46103b803901087d25784fb8e92da6509df83502f94f1ce3,2024-05-02T18:00:37.360000
CVE-2024-37471,0,0,d465bdcae3c1ad0d7280b371addcc2292b7e76a7a90d8614a04cd4784c1cba62,2024-07-19T17:02:31.163000
CVE-2024-37472,0,0,0212378c488764d33b1d17de1bc88a5356a23ba19a78046e8c133cfbba541862,2024-07-19T17:04:42.343000
@ -254256,9 +254257,9 @@ CVE-2024-37474,0,0,e29b3ccf1312f58f8b90ea5bf768b9e4ab78293e46701b43859d8d72f1b6c
CVE-2024-37476,0,0,beaa8c83ba0e39b20623f48990395c389b87f4d82490a453165560bffd5535b0,2024-07-19T16:52:39.713000
CVE-2024-37479,0,0,b47f15244b7d8bdc435b7b058e1a43515a90d9355fb7c5cb51f1025055601a89,2024-07-02T12:09:16.907000
CVE-2024-3748,0,0,130f91484f33c46b6a8a1b827c41c8bedf887e9f91a42beeaa1df38ecf15e978,2024-07-03T02:06:31.737000
CVE-2024-37480,0,1,e29cc7c72f9882ed3de055148476e2a1c36aa1c43c58b1a0300753d9c3833c44,2024-07-25T15:51:31.297000
CVE-2024-37480,0,0,e29cc7c72f9882ed3de055148476e2a1c36aa1c43c58b1a0300753d9c3833c44,2024-07-25T15:51:31.297000
CVE-2024-37484,0,0,5aa19fbeade225427f8be4047b53cf5aa423ef4d4466f797804f490d4e5cd642,2024-07-09T18:19:14.047000
CVE-2024-37485,0,1,a28d87feb836359698fd84c975d93a2c25e461c295a0332494f41ca668e6a305,2024-07-25T15:51:09.387000
CVE-2024-37485,0,0,a28d87feb836359698fd84c975d93a2c25e461c295a0332494f41ca668e6a305,2024-07-25T15:51:09.387000
CVE-2024-37486,0,0,89762654a3c14df0582a836b68f1756216cde47d535ca51b0f096751def5be44,2024-07-09T18:19:14.047000
CVE-2024-37487,0,0,1881ce5f8305b0a160049398550560b427b2570199b1574d01d760e63580f363,2024-07-22T13:00:31.330000
CVE-2024-37488,0,0,dc81d8a20d2889cd6c9e16ab92017a4087f3c8f6b2925aab93a085263be964af,2024-07-22T13:00:31.330000
@ -254980,11 +254981,11 @@ CVE-2024-3877,0,0,4a72fb3a60020d6583c10cb3aed384330279f0439794d97578698eb4f04c72
CVE-2024-38773,0,0,3ca9062d9c3ad1444fb23819fc10b8b4f960ba0c81ee3a66e80badf8c4068cc0,2024-07-22T13:00:31.330000
CVE-2024-3878,0,0,5053df083f23b6f337fe4f8fdf53fe0df42d421dbd3425cfd92b488e4629a9db,2024-05-17T02:40:10.087000
CVE-2024-38780,0,0,ae16337cc2f7b6345cfbc91dc7be992225f0e3cd48711d005c1594aad3b12d58,2024-07-15T07:15:14.603000
CVE-2024-38781,0,1,ad20639ae5229215377edc21882efa4f51ee03e1681dfd2ff9bba433bb35e6ce,2024-07-25T15:50:29.157000
CVE-2024-38782,0,1,6a0be8e9b82da765a38c168f9379b39fb33153476e0513dd2ae6a8ab51f61d6f,2024-07-25T15:49:56.380000
CVE-2024-38784,0,1,68643de9ae936963f628fb861e48c54d8865838667917b2af37f3e4b54727ab7,2024-07-25T15:55:31.213000
CVE-2024-38785,0,1,1449b2ac862365f3baee2eb77470d4db33740002d25748517f05870fff11903e,2024-07-25T15:54:37.577000
CVE-2024-38786,0,1,23327703659ded3b4e2e8a097a9d1da3633ff8f92d32364fd6984503c0102bb5,2024-07-25T15:54:12.073000
CVE-2024-38781,0,0,ad20639ae5229215377edc21882efa4f51ee03e1681dfd2ff9bba433bb35e6ce,2024-07-25T15:50:29.157000
CVE-2024-38782,0,0,6a0be8e9b82da765a38c168f9379b39fb33153476e0513dd2ae6a8ab51f61d6f,2024-07-25T15:49:56.380000
CVE-2024-38784,0,0,68643de9ae936963f628fb861e48c54d8865838667917b2af37f3e4b54727ab7,2024-07-25T15:55:31.213000
CVE-2024-38785,0,0,1449b2ac862365f3baee2eb77470d4db33740002d25748517f05870fff11903e,2024-07-25T15:54:37.577000
CVE-2024-38786,0,0,23327703659ded3b4e2e8a097a9d1da3633ff8f92d32364fd6984503c0102bb5,2024-07-25T15:54:12.073000
CVE-2024-38788,0,0,b52c12b32244698424e5fd11bba953af5e3d345221d6e773f6cccb6022a2f647,2024-07-22T14:15:06.010000
CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000
CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26
@ -255172,7 +255173,7 @@ CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a
CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000
CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000
CVE-2024-39340,0,0,8a19ea0d82baf517391d74de09fe55b24d4bbbe3d357c771c961dd3f6f9df19c,2024-07-15T22:15:02.910000
CVE-2024-39345,0,0,2a86733888b892cf1f1a4162d3ac0a53217089ddee2bfb34560fb358e3388c2b,2024-07-24T17:12:32.367000
CVE-2024-39345,0,1,6d2feb8f234ad516a0965e57f9549c5ee9e4635cabbb685a0e5a1bb100077b9b,2024-07-25T17:48:18.550000
CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000
CVE-2024-39348,0,0,798f996b4382b8a6e782460918b5005c42ce376a9b87c3209ffaa4789fe2c24c,2024-06-28T10:27:00.920000
CVE-2024-39349,0,0,d94bdd4e2f366e0736711898b6f6670e30f7a98126cdfe514679d42f61eff674,2024-06-28T10:27:00.920000
@ -255492,7 +255493,7 @@ CVE-2024-40039,0,0,e210b5ff95f4cbe50930111bbfa1727a53319595db825c61fbcbca8d251a4
CVE-2024-4005,0,0,980f25dcabac4666d2a5ebf5d973009bd7c7226dd4f2e01aee26b530adf5da1a,2024-06-17T12:42:04.623000
CVE-2024-40051,0,0,75fd7f2906c40209756954dd66b5f5cee33a2db6630cc09e906c96ebd33a611b,2024-07-24T12:55:13.223000
CVE-2024-4006,0,0,94faf2d168fb54b3d152844d072ec60ae7893cacd318e45ba2a9ad56b250c9d0,2024-04-25T17:25:05.903000
CVE-2024-40060,0,0,85f874f5d021af4dd22e5ffaf10dbd36a63e3c57527b1715c493b27582208cca,2024-07-24T12:55:13.223000
CVE-2024-40060,0,1,7504692f17154526fcbd6b507446e89a200da94eac67d79678218fa628e27433,2024-07-25T17:49:00.047000
CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000
CVE-2024-40075,0,0,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43b0c,2024-07-24T12:55:13.223000
CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000
@ -255549,10 +255550,10 @@ CVE-2024-40416,0,0,86aaef45b4dd45872bf5a38395b95958dd718e8a7700ea1c997426e37f7c7
CVE-2024-40417,0,0,298c0304c38ce2a49f170de68fce3e8c26e10c42ce4acaa74e6360f44eab21ad,2024-07-11T13:05:54.930000
CVE-2024-4042,0,0,96d4041426aa53c8eaed5efb2fa5542195ac0f31740a6b227c0436d63b09d34b,2024-07-18T16:07:41.967000
CVE-2024-40420,0,0,6e460149a3e6ef0d0e6e77ad5f5ac9ffef80b9a3e82ab52e80f4b03f5aaffd87,2024-07-18T12:28:43.707000
CVE-2024-40422,0,0,4963621ab414826824241c81a39d448cd61e8f9693236d502f591f85170698f0,2024-07-24T17:12:32.367000
CVE-2024-40422,0,1,cf7d03c100820abe753547ec333c455e4376586c4e6e08c0c23b86f8b1d272e5,2024-07-25T17:42:19.727000
CVE-2024-40425,0,0,ed5ea69d78e69de5a03f2dea647d2c038f05f8f6ff89f420995c2c0d1881d668,2024-07-17T13:34:20.520000
CVE-2024-4043,0,0,50e67cd87d2761034ee2e0514a61b1574f18a654fe271a8568be1eaa53e96b2e,2024-05-24T01:15:30.977000
CVE-2024-40430,0,0,7c58e9bc8510ad060f5e444996a825bf66eaf89868c5789197ff059705e42f6d,2024-07-22T13:00:31.330000
CVE-2024-40430,0,1,a04c0932360e0a6689683af18ba685f481546b7626dfc387e8fcb5f7f41626b2,2024-07-25T17:07:13.977000
CVE-2024-4044,0,0,e5bbe7519a57f32e10b3da751a3cb9112f45a7270ca309aa6997e34b1ffc6b95,2024-05-14T16:11:39.510000
CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b53,2024-05-28T12:39:42.673000
CVE-2024-40455,0,0,31e25278556a7a569f6d48ca8afce7491b76507f09027ad01ea2eacbbf9dde95,2024-07-17T13:34:20.520000
@ -255593,7 +255594,7 @@ CVE-2024-40555,0,0,44ce04ab9d418b7756770fd44203b58128b20e8dfc6428e77d2706cc77d9f
CVE-2024-4056,0,0,b8d993c32e0d1df4fc3c3b0df01e5b9a4366d92d1a2ad184a020d404aa44587a,2024-04-26T12:58:17.720000
CVE-2024-40560,0,0,885c8c46bcc9d242b11ff00568640d31e8526b7b94eab8b6f84ddb49fcdedf5c,2024-07-16T13:43:58.773000
CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000
CVE-2024-40575,0,0,8361a854071c7d69cd1a3e473058d545702b5888d2814bf11b25808d1337e143,2024-07-24T17:12:32.367000
CVE-2024-40575,0,1,a7c71d92efeafdadf78f6684eb12613d96e4b0b97e9613cb09ab480f64d564b0,2024-07-25T17:35:28.913000
CVE-2024-4058,0,0,e20d454336ea887bbb54d47433e5560889db558189699560ce98773941e9b99e,2024-06-07T15:40:49.707000
CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000
CVE-2024-40594,0,0,5f8b4e7b3001e206c4db42bfb10b66a5767bd1e5041c1bca9998a882526a992d,2024-07-08T15:49:22.437000
@ -255668,7 +255669,7 @@ CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b98
CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000
CVE-2024-4076,0,0,e0e2b007c1440dbf9672681a5eff521aa004949693c7d660a7d1e4ee3ddd4740,2024-07-24T12:55:13.223000
CVE-2024-40764,0,0,31190fa168623fbefe72005739844174b20afc4fdab83062110ac517be35c6d0,2024-07-18T12:28:43.707000
CVE-2024-40767,0,0,9740acbc39a8ac904449fe819056cf1ca38febd48badc3555fe4572da26d47f5,2024-07-24T12:55:13.223000
CVE-2024-40767,0,1,01a151f22bd3f1cd8b44f314114a7bbe92f50d1e2d88d2bec8d0eaa4d4f7e2fb,2024-07-25T17:15:10.910000
CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000
CVE-2024-4078,0,0,4f6a573d2d42430a81000704c37318a2f1d7afadf71bcba45d97fec5f925233f,2024-05-16T13:03:05.353000
CVE-2024-4079,0,0,77480512c155cc1ba9c6d21d28dd3b07d5f78d0d04ff147411735ae27b258bce,2024-07-24T12:55:13.223000
@ -255680,6 +255681,7 @@ CVE-2024-4084,0,0,aed2355093521159d48a9084a5a18f34499717e2daefb72a4c03148c5f7b9d
CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000
CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000
CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000
CVE-2024-40872,1,1,f2809cb57fd2b96503f7a1d210b92f81105355a60a5707cf70672f7e05382fae,2024-07-25T17:15:10.977000
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
CVE-2024-40898,0,0,6d797ebcdf9c53e0eade3a2c00a2f7d68b1d101b3405603dd30cc2157b772084,2024-07-18T12:28:43.707000
CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000
@ -255851,7 +255853,7 @@ CVE-2024-41315,0,0,a68e90aec55f0c153342e794139e84a95b20ef3a1a126ec70584092245e39
CVE-2024-41316,0,0,c9274bb79d4ba765ad537ccc2706ac76777f5e15d362d310fbcad6af2fafb632,2024-07-24T12:55:13.223000
CVE-2024-41317,0,0,5f2fa7a3fdee051d8d33c14a57cfa0a14785eb3306635111cfe4d986a4c4b209,2024-07-24T12:55:13.223000
CVE-2024-41318,0,0,43716bdb586662299e765abf70504c39aeb4e8f84836a086e46d45893e9363c9,2024-07-24T12:55:13.223000
CVE-2024-41319,0,0,9ed7dbbc6270be6f827714a032ea704fb49466783bc5f7a869b9586ff0a3bf38,2024-07-24T12:55:13.223000
CVE-2024-41319,0,1,bfb437b42963b0793282d02b7344fad2f16d4a046fba71ec7cf9211564769c72,2024-07-25T17:49:23.857000
CVE-2024-41320,0,0,c5a875fc50e40098ff2c260c87b7011f6622e714e9083a176560d9c8c9a46cbe,2024-07-24T12:55:13.223000
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000
@ -255915,12 +255917,12 @@ CVE-2024-41672,0,0,c445ad7d826ddcac22902530a2e686289f099e89069390baf727ebdc437f2
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
CVE-2024-4169,0,0,c62ff626929882f5d2c6f5c5b02ad92c379b5b400e34f72b774f8d063efba0f1,2024-06-04T19:20:31.780000
CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975dc,2024-06-04T19:20:31.883000
CVE-2024-41703,0,0,1c3b299376ef5ce17a21e7b5646c9d050d5b45bd92d1e35dddd90617bf6ddc38,2024-07-22T13:00:31.330000
CVE-2024-41704,0,0,0be617904c777d7b9dc53e786f05db778e1c4b756b7b2091d648829174b58747,2024-07-22T13:00:31.330000
CVE-2024-41703,0,1,a85362978996c7d236f30e97fa16c337a7f9d6be679ddc12fca950c1a606cca0,2024-07-25T16:55:48.747000
CVE-2024-41704,0,1,da6c19dec91a04b61d02ede6a13562fab5099a10133c7133c2bc4c7b7733b093,2024-07-25T16:55:24.307000
CVE-2024-41705,0,0,7ad36214246d3505f47341eca353a6e89a57c7421606f46a575e2c200ebd5197,2024-07-25T12:36:39.947000
CVE-2024-41706,0,0,c54f7449081e3b2cf2e3ab43d5a7b590b18453d449b7c4962e22d19102850392,2024-07-25T12:36:39.947000
CVE-2024-41707,0,0,24329663dd76ae1f72f3cfdd54c53a72b691e0b10ff003de1c551fa68a8194c1,2024-07-25T12:36:39.947000
CVE-2024-41709,0,1,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e93b,2024-07-25T15:22:06.140000
CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e93b,2024-07-25T15:22:06.140000
CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000
CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000
CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000
@ -255929,7 +255931,9 @@ CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e
CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000
CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000
CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000
CVE-2024-41806,1,1,fada7d53e3e2199f0b078a325bbd8761b8dad871eaa56e934d7ea42fe2265469,2024-07-25T15:15:11.210000
CVE-2024-41800,1,1,c9aa70b9eaf587ef09690849cfa26ea13534efc3690d1375ef8b5e938dedeaa9,2024-07-25T17:15:11.203000
CVE-2024-41801,1,1,f2a624c3a8302c960ea86b1d706f87c6e20f746155fba94a3068e7373f371bea,2024-07-25T17:15:11.423000
CVE-2024-41806,0,0,fada7d53e3e2199f0b078a325bbd8761b8dad871eaa56e934d7ea42fe2265469,2024-07-25T15:15:11.210000
CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000
CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000
CVE-2024-41824,0,0,47989ccb6404b62a8cb0e5c16e1a456b7d013ad0bd3667ac206b0f700dc33163,2024-07-24T12:55:13.223000
@ -255945,7 +255949,7 @@ CVE-2024-4185,0,0,2ebb1e96affd30f65338d1aa453a686ffeaefddcc6c26d6c3c25de17e937fc
CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000
CVE-2024-41880,0,0,2045bc24fb104b692bbe32c5951eb01a25f3639f665062ea76ff47318e893861,2024-07-24T12:55:13.223000
CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000
CVE-2024-41914,0,0,7ab23e43d61c969fead285fe596044f42ea4738f0bf39e697d71d27eaf24f8c6,2024-07-24T17:12:32.367000
CVE-2024-41914,0,1,d5808dc00627495b7b5faa405c959ea318155a77c9ee4ab8151b4c57b16430b7,2024-07-25T17:47:35.247000
CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a121626318970662c,2024-05-01T13:02:20.750000
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000
@ -256647,7 +256651,7 @@ CVE-2024-5000,0,0,78aa4b3aa9bab8131501fa8740489ecb0fe42637a1055cb7cfa2d7935a7c9e
CVE-2024-5001,0,0,d13fccabd833b06301db98a96a793d9305ac650b09885bcad3ab7a5e90e7be86,2024-07-23T20:32:50.207000
CVE-2024-5002,0,0,f7860d79f0c4960d9f9f9b184eddce2d975db46219a58cb625ab73e627c58cc7,2024-07-15T13:00:34.853000
CVE-2024-5003,0,0,657f01af6ae4ffebd5508957e0a4ee664437c9c42d64fc0c4eaff54aefed6593,2024-07-18T16:18:33.020000
CVE-2024-5004,0,1,8ad61405010c77384afe101cfdad8fb69bea7d143ef0303370d5103f820274bf,2024-07-25T15:21:18.437000
CVE-2024-5004,0,0,8ad61405010c77384afe101cfdad8fb69bea7d143ef0303370d5103f820274bf,2024-07-25T15:21:18.437000
CVE-2024-5006,0,0,275a7db4a7750ed7acf4e95109b09b599d0f03c3ae61db2773b61bbc80a38eed,2024-06-11T17:36:24
CVE-2024-5008,0,0,f3aaf1b56a85696455021e99c44b023e10f5e30320f1c5f1ff29548a21b19bae,2024-06-26T12:44:29.693000
CVE-2024-5009,0,0,e5007830320ec10d10aee0ad37c5a929e2247f2929e9cd3c875dca917cc302ee,2024-06-26T12:44:29.693000
@ -257092,7 +257096,7 @@ CVE-2024-5523,0,0,d7a88b58421b5d1ae546562c97be2066f98eb204a278a9729ed09f63f682e1
CVE-2024-5524,0,0,acc6c718843a634b3681eccc60375ca60bf82b8427b94da2351e444fa46af424,2024-05-31T13:01:46.727000
CVE-2024-5525,0,0,02c49ace47b04c4d76443f16f3ee0a6fe51259c43b6dd84bf29c79a7efe72454,2024-05-31T13:01:46.727000
CVE-2024-5526,0,0,60bf48d4ea40ca252e5afebf1dc1ad6e5a4db01756ddf2bd31cc94e151a8720b,2024-06-11T17:25:55.677000
CVE-2024-5529,0,1,937974f4dc8452080813e8845278bacd700ec1506795ce300b5e02849590121d,2024-07-25T15:21:02.647000
CVE-2024-5529,0,0,937974f4dc8452080813e8845278bacd700ec1506795ce300b5e02849590121d,2024-07-25T15:21:02.647000
CVE-2024-5530,0,0,c11f1d7738a3ef2fbe260923ece5c37664d50f681ba992e1f901b970619d3d58,2024-06-11T13:54:12.057000
CVE-2024-5531,0,0,6e18bd4c00ec4db4743368aa05b5d810d40ae0d6bb9ac604deef69554fbe362e,2024-06-11T13:54:12.057000
CVE-2024-5533,0,0,9bad1fab6a90d68c007069d0bfcbdd7a7d72da6f38ffeb11140e803bac3bba45,2024-07-05T14:01:37.470000
@ -257397,7 +257401,7 @@ CVE-2024-5967,0,0,c675e381b6c54a17455bb64c66cffebfea8bdbd8774aa5359fba110937f85e
CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360bc1,2024-06-20T12:44:01.637000
CVE-2024-5971,0,0,357987ac7415afbcb31d94ddf79e1610c1e4bcbc7b687b78aa636fbb9a4c84d0,2024-07-09T18:19:14.047000
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
CVE-2024-5973,0,1,2d8084cf190a1aabb2055b961565b9805ce6ba0f851f188224d67d99d834e8cf,2024-07-25T15:18:05.157000
CVE-2024-5973,0,0,2d8084cf190a1aabb2055b961565b9805ce6ba0f851f188224d67d99d834e8cf,2024-07-25T15:18:05.157000
CVE-2024-5974,0,0,7ccf1724194ada1507df11f624ca32c0386136cdfa7ae25f910321f76e1abc40,2024-07-09T18:19:14.047000
CVE-2024-5976,0,0,0d4a23e2583616de98536e1ad4d7b2a882021b32cad502d23a934bbf343ef666,2024-06-17T12:43:31.090000
CVE-2024-5977,0,0,7de0cc63740102074a24c1686c7837a6d04da6c097ad8d0ab882790d8002a494,2024-07-19T18:27:34.967000
@ -257585,8 +257589,8 @@ CVE-2024-6238,0,0,e8b3f57765062eca265deb8b1ecf893867ae3e3cc25fdad8633c66082a70ff
CVE-2024-6239,0,0,f6fdb4572a4dbbcb94fcc324f5cf8790dec8289d28e940d8e84930cf2b5efdf8,2024-06-24T19:06:27.537000
CVE-2024-6240,0,0,ac0ea1c33037082252bc61d50d67379872fe94c26d657b4cc70544d56df4853f,2024-06-24T19:10:38.983000
CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654dfa,2024-06-24T19:42:44.280000
CVE-2024-6243,0,1,6cbffb8f311963d638443470ee7cb5675156246eae2716de97eaddf11ed04317,2024-07-25T15:17:26.980000
CVE-2024-6244,0,1,4cbb950433f554609a829b59a39adf424a1ad2c2835842fe2854036e922c35b5,2024-07-25T15:15:39.890000
CVE-2024-6243,0,0,6cbffb8f311963d638443470ee7cb5675156246eae2716de97eaddf11ed04317,2024-07-25T15:17:26.980000
CVE-2024-6244,0,0,4cbb950433f554609a829b59a39adf424a1ad2c2835842fe2854036e922c35b5,2024-07-25T15:15:39.890000
CVE-2024-6250,0,0,65144edeea3f44f34a4643fe614f57e1f379d6c9ac265963a9d3e1dd464fb73c,2024-06-27T19:25:12.067000
CVE-2024-6251,0,0,4ff3c6977b6838552fca6fd96450148c0a810a0b49d59064a41fd5d7df8c3900,2024-06-24T12:57:36.513000
CVE-2024-6252,0,0,f925951499780a86ba894fc39baf0f6088fcb6c4e2787ea242a732a2e35ea460,2024-06-26T19:15:14.383000
@ -257601,7 +257605,7 @@ CVE-2024-6266,0,0,20534bd9562365f2e6a746e76af397ec0ac4597526b88e144b7ab5fafa0d22
CVE-2024-6267,0,0,693665502396a8f2760ff0a194782c5c48821dd90ed508792042af1972e2adac,2024-06-24T15:15:12.093000
CVE-2024-6268,0,0,e3e35d0049e774331d2151e442525bd992cba867b327c069ba368c32d8bd87bf,2024-06-26T20:15:16.893000
CVE-2024-6269,0,0,5faaf462a19676e34593dd0a0afbe0cb206ebbb8a7e70c532ba34e4117e361f3,2024-06-26T19:15:14.483000
CVE-2024-6271,0,1,d024c16fd7c4b2b04328abf7d7f44dcfe36c0053b84c0bf959b0b51a37618966,2024-07-25T15:14:33.857000
CVE-2024-6271,0,0,d024c16fd7c4b2b04328abf7d7f44dcfe36c0053b84c0bf959b0b51a37618966,2024-07-25T15:14:33.857000
CVE-2024-6273,0,0,ee5202b6a0bcfc7a40a266aa2aa86d2d546d7d0a335d210650da452fe4ac0950,2024-06-25T13:15:50.403000
CVE-2024-6274,0,0,5445e5244574eb35dee4d3a86757e63aa764a2dd3baf93da96725400aa49bff7,2024-06-24T12:57:36.513000
CVE-2024-6275,0,0,34263dcde8e1b5222af573d3152e1f6b3c783b399a6e9b4a2a7c05be9cba88fa,2024-06-25T16:15:25.923000
@ -257750,7 +257754,7 @@ CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b
CVE-2024-6527,0,0,4cbacb620d5954abb73dae2b3bfdb2a8824258a4de25ce8e7c75649e12d818a5,2024-07-09T18:19:14.047000
CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bedb0,2024-07-12T16:37:20.283000
CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000
CVE-2024-6535,0,0,7e920196055804e6beeef53bb75ed2bd3a366087f8b193ad1d13704b3ca01837,2024-07-19T15:00:32.153000
CVE-2024-6535,0,1,d515bd0c9a2788945f1c070eede854437b7a1c58e6a79916f8d2b46233d5b6de,2024-07-25T16:15:04.583000
CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000
CVE-2024-6540,0,0,f13af52637070826766869c9a967d13110a057955f51f107eb0d0f88b4032338,2024-07-16T18:05:37.267000
CVE-2024-6542,0,0,54f8a75473ca23470adff5375410f0163accbe3baf07cee08839e7a197565332,2024-07-22T13:00:31.330000
@ -257932,16 +257936,17 @@ CVE-2024-6957,0,0,924408b0dedd00d94c0dd53b44e0c61235554bbe440c23c479cd9465cad6df
CVE-2024-6958,0,0,38bc6941154d7f4ae960dc04269075821ef23a2404bcdb434a690328e81c021b,2024-07-22T13:00:31.330000
CVE-2024-6960,0,0,087c703c889fa7d7c6f47315c3bfaa50308e86c66936c51203f75a9827a27024,2024-07-22T13:00:31.330000
CVE-2024-6961,0,0,b63f66663957ae448fcfafd25f4f2e14b1e15178a7ff048e7a656d9a7183d474,2024-07-22T13:00:31.330000
CVE-2024-6962,0,1,b8054e2d59ceccdcd4628c1dbc900d3f0c22ab58e2eaf33700d9d63f648dd237,2024-07-25T15:47:18.363000
CVE-2024-6963,0,1,9f0caaa27192dd5828a73618f480b0d55e017cc1128d5360802182c76c93fb85,2024-07-25T15:47:02.633000
CVE-2024-6964,0,1,815859cc57fe1a509677a232142e7af830e9bd80af5bd8fd21b38ac7c8d853ca,2024-07-25T15:46:37.340000
CVE-2024-6965,0,1,3fcc61d8816494da9c26f25f69a0ed15273dbb039cc70730e1622c80fae9b32d,2024-07-25T15:44:21.740000
CVE-2024-6966,0,1,9388321e7c13943748e716250ce2e2e1d140f0c0a6a983b8f5a355ecdb57e818,2024-07-25T15:42:54.563000
CVE-2024-6967,0,1,870b920e0be825c6590c6673bb0d8cf413db8e6c0b55292ec96a766089d15726,2024-07-25T15:42:18.417000
CVE-2024-6968,0,1,57675d10d151b515d8654e4a2d23336a097aabe29c179fc0cfbb72272365b239,2024-07-25T15:41:38.410000
CVE-2024-6969,0,1,2345a97b06e5d388bdf778f25c67289987f0f6d0622466c7c196f2cd07649113,2024-07-25T15:38:51.787000
CVE-2024-6970,0,1,4194a84f3c5724b9bace97395e0f8e6456cd70a8d0cf3d46afccc165b27983cb,2024-07-25T15:36:44.567000
CVE-2024-6962,0,0,b8054e2d59ceccdcd4628c1dbc900d3f0c22ab58e2eaf33700d9d63f648dd237,2024-07-25T15:47:18.363000
CVE-2024-6963,0,0,9f0caaa27192dd5828a73618f480b0d55e017cc1128d5360802182c76c93fb85,2024-07-25T15:47:02.633000
CVE-2024-6964,0,0,815859cc57fe1a509677a232142e7af830e9bd80af5bd8fd21b38ac7c8d853ca,2024-07-25T15:46:37.340000
CVE-2024-6965,0,0,3fcc61d8816494da9c26f25f69a0ed15273dbb039cc70730e1622c80fae9b32d,2024-07-25T15:44:21.740000
CVE-2024-6966,0,0,9388321e7c13943748e716250ce2e2e1d140f0c0a6a983b8f5a355ecdb57e818,2024-07-25T15:42:54.563000
CVE-2024-6967,0,0,870b920e0be825c6590c6673bb0d8cf413db8e6c0b55292ec96a766089d15726,2024-07-25T15:42:18.417000
CVE-2024-6968,0,0,57675d10d151b515d8654e4a2d23336a097aabe29c179fc0cfbb72272365b239,2024-07-25T15:41:38.410000
CVE-2024-6969,0,0,2345a97b06e5d388bdf778f25c67289987f0f6d0622466c7c196f2cd07649113,2024-07-25T15:38:51.787000
CVE-2024-6970,0,0,4194a84f3c5724b9bace97395e0f8e6456cd70a8d0cf3d46afccc165b27983cb,2024-07-25T15:36:44.567000
CVE-2024-6972,0,0,45bfc09a78a937a10b77612392aef83348a218e9546ffde91f758c134440c143,2024-07-25T12:36:39.947000
CVE-2024-7007,1,1,ebf7c4138bdd4b37ac2230e65cd9afa1735a9ec22cd22a3b65361403556f01cd,2024-07-25T17:15:11.837000
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
CVE-2024-7047,0,0,a8a34e25dd02e2f4bae12fb422d77becb4b340aa4ac90e0b4f1ca7d693febb09,2024-07-25T12:36:39.947000
@ -257950,9 +257955,10 @@ CVE-2024-7060,0,0,290f41e25897864e5bc7f39b896930a92e0ee9d30e699cee7ddb424244610f
CVE-2024-7065,0,0,861ad9f4a94f327ec6cfd0f89d5da23664e863601bc1e4fe87c301d15a9d3692,2024-07-24T12:55:13.223000
CVE-2024-7066,0,0,f0b9597030c216e17a91b9bbd330c3ccd1220fd3a9abefaf98fb6df981dc96f4,2024-07-24T12:55:13.223000
CVE-2024-7067,0,0,cd81f5e59f5ccc969e002fbd0535f928704dbb9e13b2c7b953cab40d6b4980c7,2024-07-24T17:12:32.367000
CVE-2024-7068,0,0,eb9a728b0e4f24863b90d18d69d6956459c7f7f272d8ea5eb0f258d70cb7d654,2024-07-24T17:12:32.367000
CVE-2024-7069,0,0,c4ab9f752bac2645a76cae34601a6412cc6a70cc3262d39aa941af9fa7d8f5b8,2024-07-24T17:12:32.367000
CVE-2024-7079,0,0,af9d3a4629d0dee8d9c1382cf5b8b38f2af1c4359748e6b63c5acce1d7ffd90b,2024-07-24T17:12:32.367000
CVE-2024-7068,0,1,cac04426a823885bf463d5cf48bd0b19bdd9f06486030fe1d0967c67ee664aca,2024-07-25T17:47:18.717000
CVE-2024-7069,0,1,78b88a4dfaca203680acecf4b770bf67b674c773d2cef9278ec8b5ea1e8b95a5,2024-07-25T17:33:53.777000
CVE-2024-7079,0,1,68e61be40519330b32f107a33f12ffbe08d3803318162cc3f95b14c0cf6f3c17,2024-07-25T17:31:23.670000
CVE-2024-7080,0,0,0e8be1f5ff49b98f2e12f041d9740e0c98dcb4e55d2c6eaebafa31aadf939e95,2024-07-25T12:36:39.947000
CVE-2024-7081,0,0,4fe1e74e2e72cdc5207c5caa9565efa26fd09299ada94965c4896e36b361ec5f,2024-07-25T12:36:39.947000
CVE-2024-7091,0,0,e8d0dd8bb435701b961e03b8d58836a663b21eec4a32e53ec9bb349c72e7294b,2024-07-25T12:36:39.947000
CVE-2024-7101,1,1,e38bfce381af474fe5d83b2a017b3d9cde94994938f5c809ee169a4122de7c78,2024-07-25T16:15:04.720000

Can't render this file because it is too large.